Skip to content
Threat Feed

Severity

high 1211 briefs RSS
high advisory

Pillow Out-of-Bounds Write Vulnerability in PSD Processing (CVE-2026-42311)

Pillow versions 10.3.0 through 12.1.1 are vulnerable to an out-of-bounds write in PSD image decoding/encoding due to an integer overflow when computing tile extent sums, potentially leading to arbitrary code execution.

Pillow oob-write integer-overflow psd memory-corruption
2r 1t 1c
high advisory

Argo Workflows Credentials Exposed in Pod Logs

Argo Workflows versions 4.0.0 to 4.0.4 log artifact repository credentials in plaintext, allowing users with read access to pod logs to extract sensitive information such as S3 access keys and GCS service account keys.

argo-workflows credential-access kubernetes
2r 1t 1c
high advisory

Argo Workflows Template Referencing Restriction Bypass

Argo Workflows has an incomplete fix for CVE-2026-31892, allowing bypass of templateReferencing restrictions to modify pod specifications, leading to potential privilege escalation and security context overrides.

argo-workflows kubernetes privilege-escalation defense-evasion
3r 2t 1c
high advisory

WordPress Easy PayPal Events & Tickets Plugin Information Disclosure Vulnerability

An information disclosure vulnerability in the Easy PayPal Events & Tickets WordPress plugin (versions 1.3 and earlier) allows unauthenticated attackers to enumerate and retrieve all customer order records via the scan_qr.php endpoint.

Easy PayPal Events & Tickets plugin wordpress info-disclosure cve-2026-41471 unauthenticated enumeration
2r 1t 1c
high advisory

WordPress Easy PayPal Events & Tickets Plugin Authentication Bypass Vulnerability

An unauthenticated remote attacker can exploit a hardcoded authentication bypass vulnerability in the Easy PayPal Events & Tickets plugin for WordPress (versions 1.3 and earlier) by providing 'test' as the hash parameter, allowing retrieval of sensitive order details.

Easy PayPal Events & Tickets plugin wordpress authentication bypass vulnerability
2r 1t 1c 1i
high advisory

Quarkus Vertx HTTP Authorization Bypass via Matrix Parameters

Quarkus Vertx HTTP versions < 3.20.6.1, >= 3.21.0 and < 3.27.3.1, >= 3.30.0 and < 3.33.1.1, and >= 3.34.0 and < 3.35.1.1 are vulnerable to an authorization bypass where appending a semicolon and arbitrary text to the request URL allows unauthorized access to protected resources.

Quarkus Vertx HTTP +3 authentication-bypass authorization-bypass web-application
2r 2t
high advisory

Qualcomm Driver IOCTL Memory Corruption Vulnerability

A memory corruption vulnerability, CVE-2025-47408, exists in Qualcomm drivers when another driver calls an IOCTL with an invalid input/output buffer, potentially leading to code execution or denial of service.

memory corruption ioctl driver vulnerability cve-2025-47408
2r 1t 1c
high advisory

Memory Corruption Vulnerability in Digital Signal Processor (CVE-2025-47407)

CVE-2025-47407 describes a memory corruption vulnerability affecting the digital signal processor due to allocation failure at the kernel level, potentially leading to arbitrary code execution with elevated privileges on affected systems.

memory-corruption dsp qualcomm cve-2025-47407
2r 1t 1c
high advisory

Multi-Stage 'Code of Conduct' Phishing Campaign Leads to AiTM Token Compromise

A widespread phishing campaign utilized 'code of conduct' lures, a multi-step attack chain, and legitimate email services to distribute authenticated messages from attacker-controlled domains, ultimately leading to adversary-in-the-middle (AiTM) token compromise, primarily targeting US-based organizations.

Microsoft Defender for Office 365 phishing credential-theft AiTM token-compromise
2r 2t 2i
high advisory

AAP Gateway Account Hijacking Vulnerability (CVE-2026-6266)

CVE-2026-6266 allows a remote attacker to hijack user accounts in AAP gateway by manipulating the IDP-provided email during the user auto-linking process, potentially gaining unauthorized access, including administrative privileges.

AAP cve-2026-6266 account-hijacking authentication-bypass
2r 1t 1c
high advisory

Norton Secure VPN Privilege Escalation Vulnerability (CVE-2025-58074)

A privilege escalation vulnerability exists in Norton Secure VPN during installation via the Microsoft Store (CVE-2025-58074), allowing a low-privilege user to replace files leading to arbitrary file deletion and potential elevation of privileges.

Norton Secure VPN privilege-escalation windows vulnerability
2r 1t 1c
high advisory

Multiple Vulnerabilities in Progress Software MOVEit Automation

Multiple vulnerabilities in Progress Software MOVEit Automation can be exploited by an attacker to bypass security measures or gain elevated privileges.

MOVEit Automation vulnerability privilege-escalation defense-evasion
2r 2t
high advisory

Totolink N300RH Buffer Overflow Vulnerability in setWanConfig

A buffer overflow vulnerability exists in Totolink N300RH version 3.2.4-B20220812, specifically affecting the setWanConfig function within the /cgi-bin/cstecgi.cgi file, allowing a remote attacker to exploit it by manipulating the priDns argument in a POST request.

N300RH 3.2.4-B20220812 buffer-overflow router cve-2026-7749
2r 1t 1c
high advisory

MariaDB Vulnerability Allows Denial of Service and Potential Code Execution

A remote, authenticated attacker can exploit a vulnerability in MariaDB to perform a denial of service attack and potentially execute arbitrary program code.

MariaDB denial-of-service code-execution
2r 2t
high advisory

GoBGP AIGP Attribute Parser Buffer Overflow Vulnerability

A remote buffer overflow vulnerability exists in osrg GoBGP up to version 4.3.0 within the PathAttributeAigp.DecodeFromBytes function, allowing attackers to potentially execute arbitrary code by manipulating the AIGP Attribute Parser.

GoBGP cve-2026-7735 buffer-overflow bgp
2r 1c
high advisory

Funadmin Unrestricted File Upload Vulnerability (CVE-2026-7733)

Funadmin versions up to 7.1.0-rc6 are vulnerable to unrestricted file uploads due to improper handling of the File argument in the UploadService::chunkUpload function, potentially leading to remote code execution.

funadmin <= 7.1.0-rc6 cve unrestricted file upload remote code execution
2r 1t 1c
high advisory

Shandong Hoteam PDM Product Data Management System SQL Injection Vulnerability

Shandong Hoteam Software PDM Product Data Management System up to version 8.3.9 is vulnerable to SQL injection via manipulation of the SortOrder argument in the GetQueryMachineGridOnePageData function of the /Base/BaseService.asmx/DataService file, allowing remote attackers to potentially execute arbitrary SQL commands.

PDM Product Data Management System sql-injection cve-2026-7727 webserver
2r 1t 1c
high advisory

YunaiV yudao-cloud Authentication Bypass Vulnerability (CVE-2026-7710)

YunaiV yudao-cloud up to version 3.8.0 is vulnerable to an authentication bypass (CVE-2026-7710) due to improper handling of the mock-token argument in the JwtAuthenticationTokenFilter.java file, allowing remote attackers to bypass authentication.

yudao-cloud <= 3.8.0 +1 authentication bypass cve-2026-7710 web application
2r 1t 1c
high advisory

AV Stumpfl Pixera Two Media Server Code Injection Vulnerability

A remote code injection vulnerability exists in AV Stumpfl Pixera Two Media Server versions up to 25.2 R2 due to improper handling within the Websocket API, potentially allowing unauthenticated attackers to execute arbitrary code.

Pixera Two Media Server code-injection websocket cve-2026-7703
2r 1t 1c
high advisory

Acrel ECEMS SQL Injection Vulnerability

A SQL injection vulnerability in Acrel Electrical ECEMS Enterprise Microgrid Energy Efficiency Management System 1.3.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file.

ECEMS Enterprise Microgrid Energy Efficiency Management System 1.3.0 sql-injection cve-2026-7694 webserver
2r 1t 1c
high threat

Jinher OA 1.0 SQL Injection Vulnerability (CVE-2026-7670)

Jinher OA 1.0 is vulnerable to remote SQL injection via the DeptIDList parameter in the /C6/JHSoft.Web.PlanSummarize/UserSel.aspx file, potentially allowing attackers to execute arbitrary SQL queries.

OA 1.0 sql-injection cve-2026-7670 web-application
2r 1t 1c
high threat

InnoShop Improper Authentication Vulnerability (CVE-2026-7630)

InnoShop version 0.7.8 and earlier contains an improper authentication vulnerability in the InstallServiceProvider::boot function (CVE-2026-7630) that allows remote attackers to bypass authentication and gain unauthorized access to the installation endpoint.

exploited InnoShop cve authentication bypass web application
2r 1t 1c
high advisory

code-projects Online Hospital Management System SQL Injection Vulnerability

CVE-2026-7632 is a SQL injection vulnerability in code-projects Online Hospital Management System 1.0, allowing a remote attacker to execute arbitrary SQL commands by manipulating the 'delid' argument in the '/viewappointment.php' file.

Online Hospital Management System 1.0 sql-injection web-application vulnerability
2r 1t 1c
high advisory

WordPress WCFM Plugin Vulnerable to IDOR Leading to Account Deletion

The WCFM plugin for WordPress is vulnerable to an Insecure Direct Object Reference (IDOR) that allows authenticated attackers with Vendor-level access or higher to delete arbitrary users, including administrators.

WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin <= 6.7.25 idor wordpress woocommerce account-deletion
2r 1t 1c
high advisory

Potential Chroot Container Escape via Mount

The rule detects a potential chroot container escape via mount, which involves a user within a container mounting the host's root file system and using chroot to escape the containerized environment, indicating a privilege escalation attempt.

Elastic Defend +2 container-escape privilege-escalation linux
2r
high advisory

Chroot Execution in Container Context on Linux

Detects suspicious chroot execution within a Linux container context, potentially indicating a container escape attempt by pivoting to an alternate root filesystem.

Elastic Defend +1 container-escape privilege-escalation linux chroot
2r 1t
high advisory

Salon Booking System WordPress Plugin Arbitrary File Read Vulnerability

The Salon Booking System WordPress plugin is vulnerable to arbitrary file read, allowing unauthenticated attackers to exfiltrate local files by manipulating file-field values in booking confirmation emails.

Salon Booking System – Free Version plugin for WordPress <= 10.30.25 arbitrary-file-read wordpress plugin-vulnerability cve
2r 1t 1c
high advisory

Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification

The Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.

Paid Memberships Pro plugin wordpress stripe webhook vulnerability plugin
2r 3t 1c
high advisory

Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4062)

The Geo Mashup WordPress plugin is vulnerable to Time-Based SQL Injection due to insufficient input sanitization, allowing unauthenticated attackers to extract sensitive database information.

Geo Mashup plugin <= 1.13.18 sqli wordpress plugin
2r 1t 1c
high advisory

Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4061)

A time-based SQL injection vulnerability (CVE-2026-4061) exists in the Geo Mashup WordPress plugin (<= 1.13.18) due to insufficient sanitization of the 'map_post_type' parameter, enabling unauthenticated attackers to extract sensitive information via time-based blind SQL injection if the Geo Search feature is enabled.

Geo Mashup plugin sql-injection wordpress plugin
2r 1t 1c
high advisory

Zyosoft School App Insecure Direct Object Reference Vulnerability

Zyosoft's School App contains an Insecure Direct Object Reference vulnerability (CVE-2026-7491) that allows authenticated remote attackers to modify parameters and access or modify other users' data.

School App idor vulnerability web application cve-2026-7491
2r 3t 1c
high advisory

Sunnet CTMS/CPAS Arbitrary File Upload Vulnerability (CVE-2026-7490)

A privileged remote attacker can exploit CVE-2026-7490 in Sunnet CTMS and CPAS to upload and execute web shell backdoors, leading to arbitrary code execution on the server.

CTMS +1 arbitrary-file-upload web-shell code-execution
2r 3t 1c
high advisory

Sunnet CTMS SQL Injection Vulnerability (CVE-2026-7489)

Sunnet CTMS is vulnerable to SQL injection (CVE-2026-7489), allowing authenticated remote attackers to execute arbitrary SQL commands and compromise the database.

CTMS sqli cve-2026-7489 web-application
2r 1t 1c
high threat

PixelYourSite Pro WordPress Plugin SSRF Vulnerability (CVE-2026-7049)

The PixelYourSite Pro WordPress plugin is vulnerable to server-side request forgery (SSRF), allowing unauthenticated attackers to make arbitrary web requests from the server, potentially querying or modifying internal services.

PixelYourSite Pro – Your smart PIXEL ssrf wordpress plugin
2r 1t 1c
high advisory

WP Mail Gateway Plugin Vulnerability Leads to Privilege Escalation

The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check, allowing authenticated attackers to modify SMTP settings and escalate privileges.

WP Mail Gateway plugin wordpress privilege-escalation plugin-vulnerability
2r 1t 1c
high advisory

WordPress Import and Export Users Plugin Privilege Escalation Vulnerability

A privilege escalation vulnerability exists in the Import and export users and customers plugin for WordPress (versions <= 2.0.8) due to an incomplete blocklist allowing authenticated users to gain administrator privileges on subsites within a Multisite network.

Import and export users and customers plugin privilege-escalation wordpress cloud
2r 1t 1c
high threat

Increased npm Supply Chain Attacks Targeting SAP Developers

Threat actors are compromising npm packages, including those targeting SAP developers, to steal credentials, embed themselves in CI/CD pipelines, and deploy multi-stage payloads using techniques like wormable propagation and covert C2 channels on GitHub.

@bitwarden/cli +6 TeamPCP npm supply-chain credential-theft github
2r 5t 3i
high advisory

Expanding Detection Beyond Endpoints to Counter Evolving Threats

Threat actors are rapidly exfiltrating data by exploiting blind spots created by an over-reliance on endpoint data, necessitating a comprehensive security approach that incorporates cloud, identity, and network telemetry for effective threat detection and response.

Cortex XDR +8 cloud-security iam incident-response threat-detection
3r 6t
high advisory

GenAI Tools Accessing Sensitive Files for Credential Access and Persistence

This threat brief details the detection of GenAI tools accessing sensitive files containing credentials, SSH keys, browser data, and shell configurations, indicating potential credential harvesting and persistence attempts by attackers leveraging GenAI agents.

Elastic Endpoint Security genai credential-access persistence collection
2r 4t
high advisory

Sunwood-ai-labs command-executor-mcp-server OS Command Injection Vulnerability

CVE-2026-7593 is an OS command injection vulnerability in Sunwood-ai-labs command-executor-mcp-server up to version 0.1.0, allowing remote attackers to execute arbitrary commands via the execute_command function in src/index.ts.

command-executor-mcp-server cve-2026-7593 command-injection webserver
2r 1t 1c
high advisory

Flux159 mcp-game-asset-gen Path Traversal Vulnerability

A path traversal vulnerability exists in Flux159 mcp-game-asset-gen version 0.1.0, where manipulation of the `statusFile` argument in the `image_to_3d_async` function allows for remote exploitation.

mcp-game-asset-gen 0.1.0 path-traversal vulnerability web-application
2r 1t 1c
high advisory

AWS IAM Privilege Operations via Lambda Execution Role

Detection of IAM API calls that create or empower IAM users and roles, attach policies, or configure instance profiles when the caller is an assumed role session associated with AWS Lambda, potentially indicating privilege escalation or persistence.

AWS IAM +1 aws iam lambda privilege-escalation persistence
2r 3t
high advisory

SQL Injection Vulnerability in itsourcecode Courier Management System

itsourcecode Courier Management System 1.0 is vulnerable to SQL Injection via the ID parameter in /edit_staff.php, potentially allowing remote attackers to execute arbitrary SQL commands.

Courier Management System sql-injection web-application cve
2r 1t 1c
high advisory

Potential Kerberos SPN Spoofing via Suspicious DNS Query

Detects suspicious DNS queries containing a base64-encoded blob, indicating potential Kerberos coercion attacks and SPN spoofing via DNS to coerce authentication to attacker-controlled hosts, enabling Kerberos or NTLM relay attacks.

Elastic Defend credential-access kerberos spn-spoofing dns windows
2r 1t
high advisory

WP Editor Plugin CSRF Vulnerability

The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.2.9.2, allowing unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with malicious code by tricking a site administrator into clicking a link.

WP Editor plugin <= 1.2.9.2 csrf wordpress plugin vulnerability
2r 1t 1c
high advisory

Potential Root Effective Shell from Non-Standard Path via Auditd

This rule identifies process execution events where the effective user is root while the real user is not, the process arguments include the privileged shell flag commonly associated with setuid-capable shells, and the executable path is outside standard system binary directories, indicating potential privilege escalation.

Auditd Manager privilege-escalation linux auditd
2r 1t
high advisory

Malware Distribution via Hugging Face and ClawHub

Threat actors are using social engineering to distribute malware via AI distribution platforms such as Hugging Face and ClawHub by tricking users into downloading malicious files, which leads to malware infections on Windows, macOS, Linux, and Android systems.

Atomic macOS Stealer malware social-engineering ai-platforms
2r 1t
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to remote SQL injection via the ID parameter in the /ajax.php?action=delete_customer endpoint, allowing attackers to potentially read, modify, or delete database information.

Pharmacy Sales and Inventory System 1.0 sql-injection web-application vulnerability
2r 1t 1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

CVE-2026-7550 is an SQL injection vulnerability in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID argument in the /ajax.php?action=save_customer endpoint.

Pharmacy Sales and Inventory System 1.0 sql-injection web-application cve-2026-7550
2r 1t 1c
high advisory

Chromium Use-After-Free Vulnerability in ANGLE (CVE-2026-7359)

A use-after-free vulnerability in the ANGLE graphics engine within Chromium (CVE-2026-7359) allows for potential exploitation in Google Chrome and Microsoft Edge.

Chrome +1 use-after-free chromium edge cve-2026-7359
2r 1c
high advisory

Chromium Use-After-Free Vulnerability in Media Component (CVE-2026-7355)

CVE-2026-7355 is a use-after-free vulnerability in the Media component of Chromium, affecting Google Chrome and Microsoft Edge, potentially allowing for arbitrary code execution.

Chrome +1 use-after-free chromium cve-2026-7355 browser
2r 1t 1c
high advisory

Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7349)

CVE-2026-7349 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge.

Chrome +1 use-after-free browser chromium
2r 1t 1c
high advisory

SourceCodester Advanced School Management System SQL Injection Vulnerability

A SQL injection vulnerability (CVE-2026-7545) exists in SourceCodester Advanced School Management System 1.0 within the checkEmail endpoint of commonController.php, allowing remote attackers to potentially execute arbitrary SQL commands.

Advanced School Management System 1.0 sqli vulnerability web-application
2r 1t 1c
high advisory

Fujian Apex LiveBOS Path Traversal Vulnerability

A path traversal vulnerability exists in Fujian Apex LiveBOS version 2.0 and earlier, allowing remote attackers to read arbitrary files by manipulating the filename argument in the /feed/UploadImage.do endpoint.

LiveBOS path-traversal web-application cve-2026-7519
2r 1t 1c
high advisory

nextlevelbuilder GoClaw and GoClaw Lite Improper Authorization Vulnerability

nextlevelbuilder GoClaw and GoClaw Lite versions up to 3.8.5 are vulnerable to improper authorization in the RPC Handler component, potentially allowing remote attackers to bypass security controls.

GoClaw +1 improper-authorization rpc-handler
2r 1t 1c
high advisory

Kirby CMS Missing Authorization Vulnerability

A missing authorization vulnerability in Kirby CMS allows authenticated users to bypass intended access restrictions on pages and files, potentially leading to unauthorized information disclosure and content modification; patched in versions 4.9.0 and 5.4.0.

cms +3 authorization web-application
2r 2t
high advisory

Contrast CLI CopyFile Policy Subversion via Symlinks Allows Guest Root Filesystem Writes

A vulnerability in the CopyFile verification of Kata agent policies generated by the Contrast CLI allows arbitrary writes to the guest root filesystem, potentially leading to a full guest takeover.

Contrast CLI +2 kata-containers container-security privilege-escalation
2r 2t
high advisory

Clerk Authorization Bypass Vulnerability

Clerk has an authorization bypass vulnerability in multiple packages where the `has()` and `auth.protect()` predicates can incorrectly return true, potentially allowing unauthorized actions.

@clerk/shared +16 authorization bypass clerk cve-2026-42349
2r 1t
high advisory

GnuTLS DTLS Handshake Parsing Flaw (CVE-2026-33845)

A flaw in GnuTLS DTLS handshake parsing allows malformed fragments with zero length and non-zero offset, leading to an integer underflow during reassembly and resulting in an out-of-bounds read, potentially causing information disclosure or denial of service.

GnuTLS cve denial-of-service information-disclosure
2r 3t 1c
high advisory

n8n-mcp SDK Embedder SSRF Vulnerability via IPv6 Bypass

The n8n-mcp SDK embedder path is vulnerable to server-side request forgery (SSRF) due to the synchronous URL validator in `SSRFProtection.validateUrlSync()` not checking for IPv6 addresses, allowing attackers to access cloud metadata endpoints, RFC1918 private networks, or localhost services by supplying a crafted `n8nApiUrl`.

n8n-mcp ssrf cwe-918
2r 1t
high advisory

Jupyter Notebook Authentication Token Theft via CommandLinker XSS

A stored Cross-Site Scripting (XSS) vulnerability in Jupyter Notebook versions 7.0.0 through 7.5.5 and JupyterLab versions up to 4.5.6 allows attackers to steal authentication tokens by tricking users into interacting with malicious notebook files, leading to complete account takeover via the Jupyter REST API.

@jupyter-notebook/help-extension +4 xss jupyter authentication account-takeover vulnerability
2r
high advisory

Gotenberg Unauthenticated SSRF Vulnerability

Gotenberg version 8.29.1 is vulnerable to Server-Side Request Forgery (SSRF) due to an unfiltered webhook URL, allowing unauthenticated attackers to force outbound HTTP POST requests to arbitrary destinations, enabling internal network probing and interaction with internal services.

Gotenberg ssrf cve-2026-39383
3r 1t
high advisory

Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket

This rule detects potential exploitation of CVE-2026-31431, a Copy Fail vulnerability in the Linux kernel, via AF_ALG socket abuse, by correlating non-root AF_ALG-class socket or splice events with a subsequent process execution where the effective user is root but the login user remains non-root, indicating a privilege escalation attempt.

Auditbeat +1 privilege-escalation linux vulnerability cve-2026-31431
2r 2t 1c
high threat

Q1 2026 Email Threat Landscape: Rise in Phishing Techniques and Tycoon2FA Disruption

In Q1 2026, email threats increased, including credential phishing, QR code phishing, and CAPTCHA-gated campaigns, with Microsoft's disruption of the Tycoon2FA phishing platform leading to a 15% volume decrease and shifts in threat actor tactics; BEC activity remained prevalent at 10.7 million attacks.

Microsoft Defender Storm-1747 email phishing credential-theft Tycoon2FA BEC
2r 1t
high advisory

ClickFix 'BackgroundFix' Campaign Delivers CastleLoader, NetSupport RAT, and CastleStealer

The 'BackgroundFix' ClickFix campaign uses social engineering to trick victims into downloading malware disguised as a free image-editing tool, leading to the deployment of CastleLoader, NetSupport RAT for remote access, and CastleStealer for credential theft.

Microsoft Windows +2 clickfix malware social-engineering rat infostealer castleloader netsupport
2r 3t 1i
high advisory

ABB AWIN Gateway Vulnerabilities Allow Remote Reboot and Information Disclosure

Multiple vulnerabilities in ABB AWIN Gateways allow an unauthenticated attacker to remotely reboot the device (CVE-2025-13778) or disclose sensitive system configuration details (CVE-2025-13777, CVE-2025-13779).

ABB AWIN Firmware +3 ics vulnerability industrial_control_systems
3r 1t 3c
high advisory

ABB Ability OPTIMAX Authentication Bypass Vulnerability

CVE-2025-14510 allows an attacker to bypass Azure Active Directory Single-Sign On authentication in vulnerable ABB Ability OPTIMAX versions, potentially granting unauthorized access to critical infrastructure systems.

OPTIMAX 6.1 +4 authentication bypass ics vulnerability
2r 1t 1c
high threat

Unpatched Microsoft Windows RPC Vulnerability Allows Privilege Escalation

A local attacker can exploit an unpatched vulnerability in Microsoft Windows RPC to escalate privileges.

Windows RPC privilege-escalation windows unpatched-vulnerability
2r 1t
high advisory

Multiple Vulnerabilities in Absolute Secure Access

Multiple vulnerabilities in Absolute Secure Access could allow an attacker to escalate privileges, conduct a denial-of-service attack, and disclose sensitive information.

Secure Access vulnerability privilege-escalation denial-of-service information-disclosure
2r 3t 1c
high advisory

Acronis Cyber Protect Cloud Agent Multiple Vulnerabilities Allow Privilege Escalation

Multiple vulnerabilities in Acronis Cyber Protect Cloud Agent can be exploited by a local or remote, authenticated attacker to escalate privileges.

Cyber Protect Cloud Agent privilege-escalation acronis agent
2r 1t 2c
high threat

Multiple Vulnerabilities in SonicWall SonicOS Allow Privilege Escalation and DoS

Multiple vulnerabilities in SonicWall SonicOS allow a remote attacker to escalate privileges, bypass security measures, or cause a denial-of-service condition.

exploited SonicOS sonicwall vulnerability privilege-escalation denial-of-service
2r 3t 3c
high advisory

Multiple Vulnerabilities in Red Hat Enterprise Linux Fast Datapath

A remote, anonymous attacker can exploit multiple vulnerabilities in Fast Datapath for Red Hat Enterprise Linux to perform a denial-of-service attack or disclose sensitive information.

Fast Datapath redhat vulnerability denial-of-service
2r 4t
high advisory

CUPS Vulnerability Allows Local Privilege Escalation

A local attacker can exploit a vulnerability in CUPS to execute arbitrary program code with administrator privileges on Linux and macOS systems.

CUPS privilege-escalation linux macos
2r 1t
high advisory

Sudo Privilege Escalation Vulnerabilities

Multiple vulnerabilities in sudo allow a local attacker to bypass security precautions and escalate privileges to root.

sudo privilege-escalation linux
2r 1t 2c
high advisory

Multiple Vulnerabilities in Google Chrome

Multiple vulnerabilities in Google Chrome could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition.

Chrome vulnerability code-execution defense-evasion information-disclosure denial-of-service
2r 5t 5c
high advisory

PackageKit Local Privilege Escalation Vulnerability

A local attacker can exploit a vulnerability in PackageKit to escalate their privileges on a Linux system.

PackageKit privilege-escalation linux
2r 1t
high advisory

Multiple Vulnerabilities in Xen and Citrix Systems XenServer

Multiple vulnerabilities exist in Xen and Citrix Systems XenServer that could allow an attacker to escalate privileges, bypass security measures, modify and disclose data, or cause a denial-of-service condition.

XenServer +1 vulnerability privilege-escalation denial-of-service information-disclosure
3r 7t
high advisory

OpenPrinting CUPS Path Traversal Vulnerability (CVE-2026-34978)

CVE-2026-34978 is a path traversal vulnerability in OpenPrinting CUPS that allows writing files outside the CacheDir/rss directory, potentially overwriting the job.cache file.

path traversal cups cve-2026-34978 file write
2r 2t 1c
high advisory

CVE-2026-5778 Integer Underflow in ChaCha Decryption Leads to Out-of-Bounds Access

CVE-2026-5778 is an integer underflow vulnerability in the ChaCha decrypt path of an unspecified Microsoft product, leading to an out-of-bounds access issue.

integer-underflow memory-corruption cve
2r 1c
high advisory

VetCoders mcp-server-semgrep OS Command Injection Vulnerability

VetCoders mcp-server-semgrep version 1.0.0 is vulnerable to remote OS command injection due to manipulation of the ID argument in several functions of the MCP Interface component.

mcp-server-semgrep 1.0.0 command-injection vulnerability mcp-server-semgrep
2r 1t 1c
high advisory

Multiple Vulnerabilities in Wireshark Lead to Remote Code Execution and Denial of Service

Multiple vulnerabilities in Wireshark versions 4.4.x before 4.4.15 and 4.6.x before 4.6.5 could allow remote attackers to execute arbitrary code, cause a denial of service, or compromise data confidentiality.

Wireshark 4.4.x +1 wireshark vulnerability rce dos
2r
high advisory

Multiple Vulnerabilities in MISP Threat Intelligence Platform

Multiple vulnerabilities in MISP versions prior to 2.5.37 allow attackers to perform privilege escalation, SQL injection (SQLi), and security policy bypass.

MISP < 2.5.37 misp vulnerability sqli privilege-escalation security-policy-bypass
2r 1t
high advisory

Multiple Vulnerabilities in Exim Mail Transfer Agent

Multiple vulnerabilities in Exim versions prior to 4.99.2 allow an attacker to cause a remote denial of service, a breach of data confidentiality, and an unspecified security problem.

Exim vulnerability denial-of-service information-disclosure
3r 3t
high advisory

Komari Agent Abused as SYSTEM-Level Backdoor

Threat actors are abusing the Komari monitoring agent, a project hosted on GitHub, as a SYSTEM-level backdoor following initial access through compromised VPN credentials and lateral movement via Impacket.

Defender +2 komari backdoor nssm github rat reverse shell
2r 4t 2i
high advisory

n8n MCP OAuth Client XSS Vulnerability

n8n is vulnerable to cross-site scripting (XSS) via a malicious MCP OAuth client, allowing an unauthenticated attacker to inject arbitrary JavaScript into an authenticated user's session.

n8n xss oauth CVE-2026-42235
2r 1t
high advisory

n8n Python Task Runner Sandbox Escape Vulnerability

A sandbox escape vulnerability exists in n8n's Python Task Runner that allows an authenticated user with workflow creation/modification permissions to achieve arbitrary code execution on the task runner container, impacting n8n instances with the Python Task Runner enabled; upgrade to versions 1.123.32, 2.17.4, 2.18.1 or later to remediate the vulnerability.

n8n sandbox-escape code-execution vulnerability
2r 2t
high advisory

Relative Path Traversal Vulnerability in mcpo-simple-server

A relative path traversal vulnerability exists in getsimpletool mcpo-simple-server <= 0.2.0, allowing remote attackers to delete arbitrary files via manipulation of the `detail` argument in the `delete_shared_prompt` function.

mcpo-simple-server path-traversal web-application cve-2026-7404
2r 1t 1c
high advisory

Alloksoft Video Joiner Buffer Overflow Vulnerability (CVE-2018-25315)

Alloksoft Video Joiner 4.6.1217 is vulnerable to a local buffer overflow (CVE-2018-25315) allowing attackers to execute arbitrary code via a crafted license name.

Video joiner 4.6.1217 buffer-overflow code-execution cve-2018-25315 windows
2r 1t 1c
high advisory

Allok Soft WMV Converter Buffer Overflow Vulnerability (CVE-2018-25314)

Allok Soft WMV to AVI MPEG DVD WMV Converter 4.6.1217 is vulnerable to a buffer overflow, allowing local attackers to execute arbitrary code via a crafted License Name field.

WMV to AVI MPEG DVD WMV Converter 4.6.1217 buffer-overflow code-execution cve-2018-25314
2r 1t 1c
high advisory

SysGauge Pro 4.6.12 Local Buffer Overflow Vulnerability (CVE-2018-25307)

SysGauge Pro 4.6.12 is vulnerable to a local buffer overflow in the Register function, allowing local attackers to overwrite the structured exception handler and execute arbitrary code by supplying a crafted unlock key during registration.

SysGauge Pro 4.6.12 vulnerability buffer_overflow privilege_escalation
2r 2t 1c
high advisory

BuddyPress Xprofile Custom Fields Type 2.6.3 Remote Code Execution via Arbitrary File Deletion

CVE-2018-25308 is a remote code execution vulnerability in BuddyPress Xprofile Custom Fields Type 2.6.3 that allows authenticated users to delete arbitrary files on the server by manipulating POST parameters.

BuddyPress Xprofile Custom Fields Type rce file-deletion wordpress
2r 1t 1c
high advisory

XATABoost CMS 1.0.0 SQL Injection Vulnerability

XATABoost CMS 1.0.0 is vulnerable to union-based SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the id parameter via GET requests to news.php, enabling extraction of sensitive database information.

xataboost cms 1.0.0 sql-injection web-application cve
2r 1t 1c
high advisory

Prime95 Local Buffer Overflow Vulnerability (CVE-2018-25299)

Prime95 version 29.4b8 contains a local buffer overflow vulnerability, allowing attackers to execute arbitrary code by exploiting structured exception handling (SEH) mechanisms through a malicious payload in the PrimeNet proxy hostname field.

Prime95 buffer-overflow code-execution cve-2018-25299
2r 1t 1c
high advisory

Easy MPEG to DVD Burner 1.7.11 SEH Buffer Overflow

Easy MPEG to DVD Burner 1.7.11 contains a structured exception handling (SEH) local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying a malicious username string.

Easy MPEG to DVD Burner 1.7.11 buffer overflow seh overflow cve-2018-25301
2r 1t 1c
high advisory

Allok Video to DVD Burner Stack-Based Buffer Overflow Vulnerability (CVE-2018-25303)

Allok Video to DVD Burner 2.6.1217 contains a stack-based buffer overflow vulnerability (CVE-2018-25303) in the License Name field, allowing a local attacker to execute arbitrary code by triggering a structured exception handler (SEH) overwrite.

Allok Video to DVD Burner 2.6.1217 cve buffer overflow seh overwrite
2r 1t 1c
high advisory

Allok AVI to DVD SVCD VCD Converter Buffer Overflow Vulnerability

Allok AVI to DVD SVCD VCD Converter 4.0.1217 is vulnerable to a SEH-based buffer overflow, allowing local attackers to execute arbitrary code by providing a malicious string in the License Name field.

Allok AVI to DVD SVCD VCD Converter 4.0.1217 buffer-overflow seh cve-2018-25302
1r 1t 1c
high advisory

Path Traversal Vulnerability in mail-mcp-bridge

A path traversal vulnerability exists in fatbobman mail-mcp-bridge version 1.3.3 and earlier, allowing a remote attacker to read arbitrary files by manipulating the message_ids argument in the src/mail_mcp_server.py file.

mail-mcp-bridge path-traversal vulnerability web-application
2r 1t 1c
high advisory

EyouCMS SQL Injection Vulnerability (CVE-2026-7389)

A remote SQL injection vulnerability (CVE-2026-7389) exists in EyouCMS versions up to 1.7.9 due to improper handling of the 'sort_asc' argument in the GetSortData function, potentially allowing attackers to execute arbitrary SQL commands.

EyouCMS sql-injection cve-2026-7389 web-application
2r 1t 1c
high advisory

OpenClaw StrictInlineEval Approval Bypass Vulnerability (CVE-2026-42423)

OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that allows attackers to bypass strictInlineEval explicit-approval requirements on gateway and node exec hosts, leading to arbitrary command execution.

OpenClaw vulnerability privilege-escalation execution
2r 1t 1c
high advisory

OpenClaw Security Bypass Vulnerability Allows Persistent Browser Profile Mutation

OpenClaw before 2026.4.8 contains a security bypass vulnerability in node.invoke(browser.proxy) that allows attackers to circumvent the browser.request persistent profile-mutation guard and modify browser configurations.

openclaw security-bypass browser-automation profile-mutation
2r 1t 1c
high advisory

OpenClaw Role Bypass Vulnerability in device.token.rotate Function

OpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.token.rotate function, allowing attackers to mint tokens for unapproved roles and bypass intended approval processes.

OpenClaw role-bypass privilege-escalation cve-2026-42422
2r 1t 1c
high advisory

OpenClaw QQ Bot Media Download SSRF Vulnerability

OpenClaw before 2026.4.8 is vulnerable to server-side request forgery (SSRF) in QQ Bot media download paths, allowing attackers to bypass SSRF protections and access internal resources.

OpenClaw ssrf cve-2026-41914
2r 2t 1c
high advisory

OpenClaw Privilege Escalation via Trusted Proxy Authentication (CVE-2026-41404)

OpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in trusted-proxy authentication mode that allows operator.admin privilege escalation by declaring operator scopes on non-Control-UI clients.

OpenClaw privilege-escalation authentication cve-2026-41404
2r 1t 1c
high advisory

OpenClaw Plugin Archive Integrity Vulnerability (CVE-2026-42428)

OpenClaw versions before 2026.4.8 fail to enforce integrity verification on downloaded plugin archives, allowing attackers to install malicious plugins and compromise the local assistant environment.

OpenClaw vulnerability plugin integrity CVE-2026-42428
2r 1t 1c
high advisory

OpenClaw Incomplete Host Environment Variable Sanitization Vulnerability (CVE-2026-41387)

OpenClaw before 2026.3.22 is vulnerable to incomplete host environment variable sanitization, allowing attackers to redirect package resolution or runtime bootstrap to attacker-controlled infrastructure and execute trojanized content.

OpenClaw vulnerability supply-chain environment-variable
2r 1t 1c
high advisory

OpenClaw Execution Approval Bypass Vulnerability (CVE-2026-41380)

OpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows attackers to bypass intended execution restrictions by exploiting trust relationships with wrapper carrier executables, leading to privilege escalation and defense evasion.

OpenClaw cve-2026-41380 execution-approval-bypass privilege-escalation defense-evasion
2r 3t 1c
high advisory

OpenClaw Environment Variable Injection Vulnerability (CVE-2026-41384)

OpenClaw before 2026.3.24 is vulnerable to environment variable injection, allowing attackers to inject malicious environment variables through crafted workspace configurations in the CLI backend, leading to potential code execution or sensitive data exposure.

OpenClaw environment-variable-injection code-execution cve-2026-41384
2r 1t 1c
high advisory

OpenClaw Arbitrary Directory Deletion Vulnerability

OpenClaw before 2026.4.2 is vulnerable to arbitrary directory deletion in mirror mode, enabling attackers to delete remote directories by manipulating remoteWorkspaceDir and remoteAgentWorkspaceDir configuration values.

OpenClaw cve-2026-41383 directory-traversal file-deletion
2r 1t 1c
high advisory

Eiceblue Spire-PDF-MCP-Server Path Traversal Vulnerability (CVE-2026-7315)

A path traversal vulnerability exists in eiceblue spire-pdf-mcp-server version 0.1.1, allowing remote attackers to access arbitrary files via manipulation of the filepath argument in the get_pdf_path function.

spire-pdf-mcp-server path-traversal web-application cve
2r 1t 1c
high advisory

eiceblue spire-doc-mcp-server Path Traversal Vulnerability

A path traversal vulnerability exists in eiceblue spire-doc-mcp-server version 1.0.0, allowing a remote attacker to access arbitrary files by manipulating the 'document_name' argument in the 'get_doc_path' function.

spire-doc-mcp-server 1.0.0 path-traversal web-application cve-2026-7314
2r 1t 1c
high advisory

Multiple Vulnerabilities in cURL

Multiple vulnerabilities in cURL could allow an attacker to bypass security measures, disclose confidential information, or manipulate data.

cURL vulnerability
2r 3t 4c
high threat

Elinsky execution-system-mcp Path Traversal Vulnerability

Elinsky execution-system-mcp 0.1.0 is vulnerable to path traversal via manipulation of the context argument in the _get_context_file_path function, allowing remote attackers to access sensitive files.

exploited execution-system-mcp 0.1.0 path-traversal web-application cve-2026-7319
2r 1t 1c
high advisory

Red Hat Enterprise Linux LibRaw Multiple Vulnerabilities Allow Code Execution or DoS

Multiple vulnerabilities in Red Hat Enterprise Linux's LibRaw component allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.

Enterprise Linux vulnerability code-execution denial-of-service linux
2r 2t
high advisory

ProFTPD SQL Injection Vulnerability

An anonymous remote attacker can exploit a SQL injection vulnerability in ProFTPD.

ProFTPD sqli linux
2r 1t
high advisory

OpenClaw Privilege Escalation Vulnerability (CVE-2026-42432)

OpenClaw before 2026.4.8 contains a privilege escalation vulnerability that allows previously paired nodes to reconnect and execute privileged commands without proper authorization, potentially leading to complete system compromise.

OpenClaw privilege-escalation cve-2026-42432
2r 1t 1c
high advisory

OpenClaw Improper Authorization Vulnerability (CVE-2026-42426)

OpenClaw before 2026.4.8 contains an improper authorization vulnerability (CVE-2026-42426) allowing attackers with `operator.write` permissions to bypass node pairing approval and gain unauthorized access to `exec`-capable nodes by exploiting the `node.pair.approve` method which incorrectly accepts the `operator.write` scope instead of the narrower `operator.pairing` scope.

OpenClaw privilege-escalation vulnerability
2r 1t 1c
high advisory

OpenClaw Exec Allowlist Bypass Vulnerability (CVE-2026-41390)

OpenClaw before version 2026.3.28 contains an exec allowlist bypass vulnerability (CVE-2026-41390) that allows attackers to persist trust for wrapper binaries like /usr/bin/script to execute different underlying programs, potentially leading to privilege escalation.

OpenClaw allowlist bypass privilege escalation cve-2026-41390
2r 2t 1c
high threat

UNC6692 Combines Social Engineering, Malware, and Cloud Abuse

UNC6692 is a newly discovered, financially motivated threat actor that combines social engineering via Microsoft Teams, custom malware named SNOWBELT, and abuse of legitimate AWS S3 cloud infrastructure in its attack campaigns to steal credentials and prepare for data exfiltration.

Microsoft Teams +1 UNC6692 social-engineering malware cloud-abuse credential-theft lateral-movement
2r 12t
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

A remote SQL injection vulnerability exists in SourceCodester Pharmacy Sales and Inventory System 1.0 via manipulation of the ID parameter in the /ajax.php?action=delete_category endpoint, potentially leading to unauthorized data access or modification.

Pharmacy Sales and Inventory System 1.0 sqli web-application cve-2026-7130
2r 1t 1c
high advisory

mkdocs-mcp-plugin Path Traversal Vulnerability

A path traversal vulnerability exists in douinc mkdocs-mcp-plugin up to version 0.4.1, allowing remote attackers to access unauthorized files through manipulation of the docs_dir/file_path argument in the read_document/list_documents functions within server.py.

mkdocs-mcp-plugin path-traversal mkdocs CVE-2026-7159
2r 1t 1c
high advisory

AVACAST DLL Hijacking Vulnerability (CVE-2026-7279)

A DLL hijacking vulnerability in eMPIA Technology's AVACAST (CVE-2026-7279) allows authenticated local attackers to achieve arbitrary code execution with system privileges by placing a malicious DLL in a specific directory.

AVACAST dll-hijacking privilege-escalation code-execution
2r 1t 1c
high advisory

AgiFlow scaffold-mcp Path Traversal Vulnerability (CVE-2026-7237)

A path traversal vulnerability (CVE-2026-7237) exists in AgiFlow scaffold-mcp versions up to 1.0.27, allowing remote attackers to write to arbitrary files by manipulating the file_path argument in the write-to-file tool.

scaffold-mcp path-traversal cve web-application
2r 1t 1c
high advisory

BrowserOperator Core Path Traversal Vulnerability (CVE-2026-7234)

A path traversal vulnerability (CVE-2026-7234) exists in BrowserOperator browser-operator-core up to version 0.6.0, allowing remote attackers to read arbitrary files by manipulating the request.url argument in the startsWith function of scripts/component_server/server.js.

browser-operator-core path-traversal web-application cve-2026-7234
2r 1t 1c
high advisory

Totolink N300RT Buffer Overflow Vulnerability (CVE-2026-7219)

A remote buffer overflow vulnerability exists in Totolink N300RT 3.4.0-B20250430 via manipulation of the 'entry_name' argument in the /boafrm/formIpQoS file, potentially leading to arbitrary code execution.

N300RT buffer-overflow iot router cve-2026-7219
2r 1t 1c
high advisory

Path Traversal Vulnerability in engineer-your-data

A path traversal vulnerability (CVE-2026-7214) exists in eghuzefa's engineer-your-data up to version 0.1.3, allowing remote attackers to read or write arbitrary files by manipulating the WORKSPACE_PATH argument.

engineer-your-data path-traversal vulnerability
2r 1t 1c
high advisory

edvardlindelof notes-mcp Path Traversal Vulnerability (CVE-2026-7212)

A path traversal vulnerability exists in edvardlindelof notes-mcp up to version 0.1.4, affecting the notes_mcp.py file, allowing a remote attacker to access sensitive files by manipulating the `root_dir/path` argument.

notes-mcp path-traversal web-application CVE-2026-7212
2r 1t 1c
high advisory

Duartium papers-mcp-server Path Traversal Vulnerability (CVE-2026-7205)

A path traversal vulnerability exists in the `search_papers` function of `src/main.py` in duartium papers-mcp-server version 9ceb3812a6458ba7922ca24a7406f8807bc55598, allowing remote attackers to read arbitrary files by manipulating the `topic` argument, with a public exploit available.

papers-mcp-server path-traversal vulnerability web-application
2r 1t 1c
high threat

dvladimirov MCP Git Search API Command Injection Vulnerability

A command injection vulnerability (CVE-2026-7211) exists in the GitSearchRequest function of dvladimirov MCP up to version 0.1.0, allowing a remote attacker to execute arbitrary commands by manipulating the repo_url or pattern argument.

exploited MCP command-injection vulnerability git-search-api
2r 1t 1c
high threat

dubydu sqlite-mcp SQL Injection Vulnerability (CVE-2026-7206)

A SQL injection vulnerability exists in dubydu sqlite-mcp version 0.1.0 and earlier within the extract_to_json function allowing remote exploitation through manipulation of the output_filename argument.

exploited sqlite-mcp sql-injection cve-2026-7206 web-application
2r 1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability (CVE-2026-7199)

A SQL injection vulnerability (CVE-2026-7199) exists in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'ID' parameter in the `/ajax.php?action=delete_product` endpoint, potentially leading to data breach or system compromise.

Pharmacy Sales and Inventory System 1.0 sql-injection cve-2026-7199 web-application
2r 1t 1c
high advisory

OpenClaw Symlink Vulnerability in SSH Sandbox Tar Upload (CVE-2026-41364)

OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files by uploading a malicious tar archive containing symlinks, leading to arbitrary file write on the remote host.

OpenClaw symlink file-write sandbox-escape
2r 1t 1c
high advisory

Online Lot Reservation System SQL Injection Vulnerability

CVE-2026-7131 is a SQL injection vulnerability in code-projects Online Lot Reservation System up to version 1.0, affecting the /loginuser.php component via manipulation of the email/password arguments, which could allow remote attackers to execute arbitrary SQL queries.

Online Lot Reservation System sql-injection web-application cve
2r 1t 1c 1i
high threat

BlueNoroff Targeting Web3 Sector via Spear Phishing

BlueNoroff, a subgroup of the Lazarus Group, is targeting North American Web3 companies through spear-phishing campaigns, impersonating Fintech legal professionals.

BlueNoroff +3 spear-phishing web3 cryptocurrency fintech
2r 1t
high advisory

tufantunc ssh-mcp Command Injection Vulnerability (CVE-2026-7039)

A command injection vulnerability exists in tufantunc ssh-mcp up to version 1.5.0 via manipulation of the Description argument in the shell.write function.

ssh-mcp command-injection vulnerability
2r 1t 1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to SQL injection by manipulating the ID argument in the /ajax.php?action=save_receiving file, allowing remote attackers to execute arbitrary SQL commands.

Pharmacy Sales and Inventory System 1.0 sqli web-application cve-2026-7088
2r 1t 1c
high advisory

itsourcecode Construction Management System SQL Injection Vulnerability

A SQL injection vulnerability exists in itsourcecode Construction Management System version 1.0, affecting the processing of the /locations.php file, allowing a remote attacker to inject SQL commands by manipulating the 'address' argument, with a publicly available exploit.

Construction Management System 1.0 sql-injection web-application cve-2026-7075
2r 1t 1c
high advisory

CodePanda Source canteen_management_system SQL Injection Vulnerability

A SQL injection vulnerability exists in CodePanda Source canteen_management_system version 1.0 within the /api/login.php file by manipulating the Username argument, allowing remote attackers to execute arbitrary SQL commands.

canteen_management_system 1.0 sql-injection cve-2026-7072 web-application
1r 1t 1c
high advisory

SQL Injection Vulnerability in code-projects Inventory Management System 1.0

A SQL injection vulnerability exists in code-projects Inventory Management System 1.0 within the Login component, specifically affecting the Username argument, where a remote attacker can manipulate the Username parameter, leading to unauthorized data access or modification.

Inventory Management System 1.0 sql-injection web-application vulnerability
2r 1t 1c
high advisory

D-Link DIR-822 A_101 Command Injection via DHCP Hostname

A command injection vulnerability exists in D-Link DIR-822 A_101, specifically within the udhcpd DHCP service; by manipulating the Hostname argument, a remote attacker can inject commands, but the affected product is no longer supported.

DIR-822 A_101 command-injection dhcp iot
2r 1t 1c
high advisory

code-projects Employee Management System SQL Injection Vulnerability (CVE-2026-7063)

CVE-2026-7063 is a SQL Injection vulnerability in code-projects Employee Management System 1.0 via the 'pwd' parameter in /370project/process/eprocess.php, enabling remote attackers to execute arbitrary SQL commands.

Employee Management System 1.0 sqli cve-2026-7063 web-application
2r 1t 1c
high advisory

Toowiredd chatgpt-mcp-server OS Command Injection Vulnerability

Toowiredd chatgpt-mcp-server up to version 0.1.0 is vulnerable to OS command injection via the file src/services/docker.service.ts of the component MCP/HTTP, allowing for remote exploitation.

chatgpt-mcp-server cve-2026-7061 command-injection webserver
2r 1t 1c
high advisory

KLiK SocialMediaWebsite SQL Injection Vulnerability (CVE-2026-7002)

KLiK SocialMediaWebsite up to version 1.0.1 is vulnerable to SQL injection via manipulation of the c_id argument in the /includes/get_message_ajax.php file, specifically affecting the Private Message Handler component, which can be exploited remotely.

SocialMediaWebsite sql-injection vulnerability web-application
2r 1t 1c
high advisory

Tenda i9 Path Traversal Vulnerability (CVE-2026-7036)

CVE-2026-7036 is a path traversal vulnerability affecting the R7WebsSecurityHandlerfunction in the HTTP Handler component of Tenda i9 version 1.0.0.5(2204), allowing remote attackers to access sensitive files.

i9 cve-2026-7036 path-traversal tenda network
2r 1t 1c
high advisory

Cilium `cilium-bugtool` WireGuard Private Key Exposure

The `cilium-bugtool` debugging tool in Cilium exposes WireGuard private keys, potentially allowing unauthorized access to encrypted node-to-node communication in affected versions.

Cilium wireguard key-disclosure credential-access
2r 1t 1i
high advisory

SmythOS sre Authentication Bypass Vulnerability (CVE-2026-7022)

A remote improper authentication vulnerability exists in SmythOS sre up to version 0.0.15, allowing attackers to bypass authentication by manipulating the X-DEBUG-RUN/X-DEBUG-INJ arguments in the HTTP Header Handler component.

sre authentication-bypass CVE-2026-7022
2r 1t 1c
high advisory

PicoClaw Web Launcher Management Plane Command Injection Vulnerability

PicoClaw version 0.2.4 is vulnerable to command injection via the /api/gateway/restart endpoint of the Web Launcher Management Plane, allowing a remote attacker to execute arbitrary commands by manipulating input.

PicoClaw command-injection vulnerability web-application
2r 1t 1c
high advisory

Claude Code Trust Dialog Bypass via Git Worktree Spoofing

A vulnerability in Claude Code allowed for trust dialog bypass via git worktree spoofing, potentially leading to arbitrary code execution by crafting a malicious repository with a `commondir` file pointing to a previously trusted path, bypassing the trust dialog, and executing malicious hooks defined in `.claude/settings.json`.

Claude Code git code-execution trust-bypass
2r 1t
high advisory

Large-Scale OAuth Device Code Phishing Campaign Observed in April 2026

In early April 2026, Arctic Wolf tracked a large-scale device code phishing campaign across multiple regions and sectors where threat actors abused OAuth device code flow to trick victims into providing authentication codes.

Azure Active Directory oauth device-code phishing initial-access
2r 1t
high advisory

k8sGPT Operator Vulnerable to Prompt Injection

k8sGPT versions before 0.4.32 are vulnerable to prompt injection due to deserialization of AI-generated YAML without proper validation in the auto-remediation pipeline, potentially leading to arbitrary code execution within the Kubernetes cluster.

k8sgpt prompt-injection kubernetes ai vulnerability
2r 2t
high advisory

OVN DHCPv6 Out-of-Bounds Read Vulnerability (CVE-2026-5367)

A remote attacker can exploit an out-of-bounds read vulnerability in Open Virtual Network (OVN) by sending crafted DHCPv6 SOLICIT packets, leading to sensitive information disclosure.

OVN cve vulnerability network
2r 1t 1c
high advisory

OpenShell Arbitrary Code Execution Vulnerability (CVE-2026-41355)

OpenShell before 2026.3.28 is vulnerable to arbitrary code execution via mirror mode when converting untrusted sandbox files into workspace hooks, allowing attackers with mirror mode access to execute code during gateway startup.

OpenShell cve rce
2r 2t 1c
high advisory

OpenClaw Arbitrary Code Execution via Environment Variable Override (CVE-2026-41336)

OpenClaw before 2026.3.31 allows attackers to execute arbitrary code by overriding the OPENCLAW_BUNDLED_HOOKS_DIR environment variable using a workspace .env file, enabling the loading of attacker-controlled hook code.

OpenClaw cve code-execution environment-variable-override
2r 1t 1c
high advisory

Multiple Vulnerabilities in Microsoft Cloud Products Allow Privilege Escalation and Code Execution

Multiple vulnerabilities in Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps could allow an attacker to escalate privileges, execute arbitrary code, and conduct spoofing attacks.

Azure +3 cloud privilege-escalation code-execution spoofing
3r 3t 5c
high advisory

D-Link DWM-222W USB Wi-Fi Adapter Brute-Force Protection Bypass Vulnerability

D-Link DWM-222W USB Wi-Fi Adapter is vulnerable to brute-force attacks due to a protection bypass, allowing unauthenticated adjacent network attackers to gain control over the device by circumventing login attempt limits.

DWM-222W USB Wi-Fi Adapter brute-force credential-access network-device
2r 1c
high advisory

Kirby CMS Server-Side Template Injection via Double Template Resolution

A server-side template injection (SSTI) vulnerability exists in Kirby CMS within the option rendering feature due to double template resolution in option fields (checkboxes, color, multiselect, select, radio, tags, or toggles) when using options from a query or API with untrusted values, potentially allowing attackers to inject malicious queries.

cms ssti kirby template-injection
2r 1t
high advisory

Radare2 Path Traversal Vulnerability in Project Deletion

Radare2 versions prior to 6.1.4 are vulnerable to a path traversal in project deletion, allowing local attackers to recursively delete arbitrary directories by escaping the 'dir.projects' root, leading to integrity and availability loss.

radare2 path-traversal local-privilege-escalation
2r 1t 1c
high threat

Trigona Ransomware Employing Custom Data Exfiltration Tool

Trigona ransomware is using a custom data exfiltration tool named 'uploader_client.exe' to steal data from compromised environments, enhancing speed and evasion.

Windows +3 Trigona ransomware data exfiltration custom tool
2r 4t 1i
high advisory

CanisterSprawl: Self-Propagating npm Malware Campaign

The CanisterSprawl malware campaign targets npm packages, using a self-propagating approach to steal sensitive data from developer machines, including tokens and API keys, and attempting to publish malicious packages using hijacked credentials.

npm packages supply-chain malware npm
2r 6t
high advisory

rust-openssl Unchecked Callback Length Memory Leak

The rust-openssl crate versions 0.9.24 prior to 0.10.78 are vulnerable to memory leaks due to unchecked callback lengths in PSK/cookie trampolines, potentially leading to buffer overflows.

openssl rust memory leak buffer overflow
2r
high advisory

Daptin SQL Injection Vulnerability in Aggregate API

A SQL injection vulnerability exists in Daptin versions prior to 0.11.4 within the `/aggregate/:typename` endpoint, where the `column` and `group` query parameters are passed to `goqu.L()` without validation, allowing authenticated users to inject arbitrary SQL expressions and exfiltrate sensitive data.

Daptin sql-injection web-application
2r 1t
high threat

China-Nexus Cyber Actors Using Covert Networks of Compromised Devices

China-nexus cyber actors are increasingly using large-scale networks of compromised devices, including SOHO routers and IoT devices, to obscure the origin of their attacks and conduct various malicious activities, from reconnaissance to data exfiltration.

SOHO Routers +5 China-nexus cyber actors covert-network botnet china-nexus compromised-devices
2r 4t
high advisory

WeKan Missing Authorization Vulnerability in Integration REST API

WeKan before 8.35 contains a missing authorization vulnerability in the Integration REST API endpoints, allowing authenticated board members to perform administrative actions without proper privilege verification, potentially leading to unauthorized data access and modification.

WeKan missing-authorization rest-api privilege-escalation
2r 1t 1c 4i
high advisory

CVE-2026-31478 Vulnerability in Microsoft ksmbd

CVE-2026-31478 is a vulnerability in Microsoft's ksmbd implementation related to incorrect calculation of maximum output buffer length, potentially leading to a denial-of-service or remote code execution.

ksmbd cve smb memory-corruption
2r 3t 1c
high advisory

CVE-2026-31507 Double-Free Vulnerability in net/smc

CVE-2026-31507 is a double-free vulnerability in the net/smc module that occurs when the tee() function duplicates a splice pipe buffer, potentially leading to memory corruption and denial of service.

cve-2026-31507 double-free memory corruption denial of service
2r 2t 1c
high advisory

SiYuan Path Traversal via Double URL Encoding in `/export/` Endpoint

SiYuan is vulnerable to path traversal via double URL encoding in the `/export/` endpoint, bypassing an incomplete fix for CVE-2026-30869; an authenticated attacker can exploit this vulnerability to traverse directories and read arbitrary workspace files, including the SQLite database (`siyuan.db`), kernel log, and user documents due to a redundant `url.PathUnescape()` call in `serveExport()`.

siyuan path-traversal web-application
2r 1t 1c 1i
high advisory

Entra ID Excessive Account Lockouts Detected

A high volume of failed Microsoft Entra ID sign-in attempts resulting in account lockouts indicates potential brute-force attacks, such as password spraying or credential stuffing, targeting user accounts.

Entra ID azure entra_id credential_access brute_force
2r 3t
high advisory

AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure

Attackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.

AWS IAM +1 cloud aws github credential-theft initial-access lateral-movement
2r 2t
high advisory

GenAI Tool Access to Sensitive Files for Credential Harvesting and Persistence

This brief outlines the threat of attackers leveraging GenAI tools to access sensitive files containing credentials, SSH keys, browser data, and shell configurations for credential access and persistence.

credential-access genai file-access persistence
2r 4t
high advisory

LanSpy 2.0.1.159 Local Buffer Overflow Vulnerability

LanSpy 2.0.1.159 is vulnerable to a local buffer overflow, allowing an attacker to overwrite the instruction pointer by providing a crafted payload to the scan field, potentially leading to code execution.

LanSpy buffer-overflow code-execution cve-2018-25268
1r 1t 1c
high advisory

InstructLab Path Traversal Vulnerability (CVE-2026-6855)

A local attacker can exploit a path traversal vulnerability in InstructLab by manipulating the `logs_dir` parameter, leading to arbitrary file creation and modification.

path-traversal instructlab cve-2026-6855
2r 1t 1c
high advisory

WWBN AVideo Unauthenticated Path Traversal Vulnerability (CVE-2026-41058)

WWBN AVideo versions 29.0 and below contain a path traversal vulnerability (CVE-2026-41058) in the CloneSite functionality, allowing unauthenticated attackers to delete arbitrary files via manipulation of the `deleteDump` parameter.

path traversal cve-2026-41058 avideo webserver
2r 3t 1c
high advisory

WWBN AVideo SSRF Vulnerability (CVE-2026-41055)

WWBN AVideo versions 29.0 and below are vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete fix in the LiveLinks proxy, potentially allowing attackers to redirect traffic to internal endpoints.

ssrf avideo cve-2026-41055
2r 1t 1c 1i
high advisory

Tekton Pipelines Git Resolver API Token Leak via User-Controlled ServerURL

The Tekton Pipelines git resolver in API mode leaks the system-configured Git API token to a user-controlled `serverURL` when the user omits the `token` parameter, allowing an attacker with TaskRun or PipelineRun creation permissions to exfiltrate the shared API token.

tekton git credential-access api-token
2r 1t 1c
high advisory

Tekton Pipelines Git Resolver API Token Leak via ServerURL Manipulation (CVE-2026-40161)

Tekton Pipelines versions 1.0.0 to 1.10.0 are vulnerable to credential access, where the Git resolver in API mode transmits the system-configured Git API token to a user-controlled serverURL, enabling token exfiltration via a malicious server.

tekton credential-access cve-2026-40161
2r 1t 1c 4i
high advisory

Oracle Java SE, GraalVM Networking Component Denial-of-Service Vulnerability (CVE-2026-34282)

CVE-2026-34282 is a remotely exploitable vulnerability in the Networking component of Oracle Java SE and GraalVM that allows an unauthenticated attacker to cause a complete denial of service.

CVE-2026-34282 java graalvm dos denial-of-service
2r 1t 1c
high advisory

NTFS-3G Heap Buffer Overflow Vulnerability (CVE-2026-40706)

A heap buffer overflow vulnerability exists in NTFS-3G versions 2022.10.3 before 2026.2.25 that allows for heap memory corruption by processing a crafted NTFS image with multiple ACCESS_DENIED ACEs containing WRITE_OWNER from distinct group SIDs.

ntfs-3g heap-overflow privilege-escalation linux
2r 1t 1c
high advisory

NestJS Uncontrolled Recursion Denial-of-Service Vulnerability (CVE-2026-40879)

NestJS versions before 11.1.19 are susceptible to an uncontrolled recursion vulnerability (CVE-2026-40879) where sending many small JSON messages in a single TCP frame triggers a call stack overflow, resulting in a denial-of-service condition.

denial-of-service nestjs recursion cve-2026-40879 linux
2r 1t 1c
high advisory

HKUDS OpenHarness Insecure Default Configuration Vulnerability

HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit permissive access, potentially leading to unauthorized file disclosure and read access.

vulnerability insecure-configuration access-control
2r 1t 1c
high advisory

Hermes WebUI Arbitrary File Deletion Vulnerability (CVE-2026-6832)

Hermes WebUI is vulnerable to arbitrary file deletion via path traversal in the /api/session/delete endpoint due to insufficient validation of the session_id parameter, allowing authenticated attackers to delete writable JSON files on the host system.

cve-2026-6832 path-traversal file-deletion webui
2r 1t 1c
high advisory

goshs GitHub Token Leakage via ArtiPACKED Vulnerability (CVE-2026-40903)

The goshs SimpleHTTPServer prior to version 2.0.0-beta.6 is vulnerable to ArtiPACKED, potentially leading to leakage of the GITHUB_TOKEN through workflow artifacts.

cve-2026-40903 github_token credential-access artipacked
2r 1t 1c
high advisory

FreeScout Mass Assignment Vulnerability (CVE-2026-40569)

FreeScout versions prior to 1.8.213 contain a mass assignment vulnerability allowing authenticated admins to modify sensitive mailbox settings by injecting parameters into connection settings requests, leading to email exfiltration and account compromise.

freescout mass-assignment vulnerability email-exfiltration
2r 2t 1c
high advisory

Fortra GoAnywhere MFT SSH Key Brute-Force Vulnerability (CVE-2025-14362)

Fortra's GoAnywhere MFT prior to 7.10.0 is vulnerable to brute-force attacks on SSH keys because the login limit is not enforced on the SFTP service when Web Users are configured to log in with an SSH Key.

goanywhere mft bruteforce ssh
2r 1t 1c
high advisory

Binutils XCOFF Heap-Based Buffer Overflow Vulnerability (CVE-2026-6846)

A heap-buffer-overflow vulnerability exists in binutils when processing a specially crafted XCOFF object file, potentially leading to arbitrary code execution or denial of service.

binutils heap-buffer-overflow CVE-2026-6846 xcoff
2r 4t 1c 1i
high advisory

Telerik UI for AJAX RadAsyncUpload Uncontrolled Resource Consumption (CVE-2026-6022)

A vulnerability exists in Progress Telerik UI for AJAX prior to 2026.1.421, RadAsyncUpload, due to missing cumulative size enforcement during chunk reassembly, which allows file uploads to exceed the configured maximum size, leading to disk space exhaustion.

cve-2026-6022 telerik resource-exhaustion
2r 1t 1c
high advisory

Multiple Vulnerabilities in OpenBao Allow for Security Bypass, DoS, and SQL Injection

Multiple vulnerabilities in OpenBao can be exploited by an attacker to bypass security measures, conduct a denial of service attack, and conduct a SQL injection attack.

openbao vulnerability sql-injection dos
3r 3t
high advisory

pyLoad Privilege Escalation Vulnerability (CVE-2026-41133)

pyLoad versions up to 0.5.0b3.dev97 cache user roles and permissions in the session, leading to privilege escalation even after an admin revokes privileges.

pyLoad privilege-escalation CVE-2026-41133
2r 1t 1c
high advisory

Oracle VM VirtualBox CVE-2026-35246 Vulnerability

CVE-2026-35246 is a vulnerability in Oracle VM VirtualBox version 7.2.6, where a high-privileged attacker with local access can exploit it to compromise the application potentially leading to a complete takeover.

cve-2026-35246 virtualbox vulnerability
2r 1c
high advisory

NVIDIA CUDA-Q Out-of-Bounds Read Vulnerability (CVE-2026-24189)

NVIDIA CUDA-Q is vulnerable to an out-of-bounds read via a maliciously crafted request to an endpoint, potentially leading to denial of service and information disclosure as tracked by CVE-2026-24189.

cve-2026-24189 out-of-bounds read nvidia
2r 2t 1i
high advisory

OpenMage LTS Phar Deserialization RCE

A remote code execution vulnerability exists in OpenMage LTS versions prior to 20.16.1 due to Phar deserialization, where an attacker can upload a malicious phar file disguised as an image and trigger deserialization via functions like `getimagesize()`, `file_exists()`, or `is_readable()` when processing `phar://` stream wrapper paths, leading to arbitrary code execution.

phar deserialization remote code execution OpenMage LTS Magento 1.x
2r 2t
high advisory

CVE-2026-32223 Windows USB Printing Stack Elevation of Privilege Vulnerability

CVE-2026-32223 is an elevation of privilege vulnerability affecting the Windows USB Printing Stack (usbprint.sys), potentially allowing a local attacker to gain elevated privileges on a vulnerable system.

cve-2026-32223 elevation-of-privilege windows
2r 1t 1c
high advisory

FreePBX API Module Command Injection Vulnerability (CVE-2026-40520)

FreePBX api module version 17.0.8 and prior contain a command injection vulnerability in the initiateGqlAPIProcess() function, allowing authenticated users to execute arbitrary commands via crafted GraphQL mutations.

command-injection freepbx graphql cve-2026-40520
2r 1t 1c
high advisory

Notepad++ Updater (gup.exe) Creates Uncommon Files

The Notepad++ updater (gup.exe) creating files in suspicious locations can indicate potential exploitation for malware delivery or unwarranted file placement, potentially leading to credential access and collection.

supply-chain malware notepad++
2r 3t
high advisory

MetaSlider Responsive Slider Plugin Deserialization Vulnerability (CVE-2026-39467)

A deserialization of untrusted data vulnerability in the MetaSlider Responsive Slider plugin for WordPress (versions up to 3.106.0) allows for unauthenticated object injection, potentially leading to remote code execution.

wordpress object-injection deserialization cve-2026-39467
2r 1t 1c
high advisory

Bad Apples: Weaponizing Native macOS Primitives for Lateral Movement and Execution

Adversaries are increasingly targeting macOS environments, leveraging native tools like Remote Application Scripting (RAS) and Spotlight metadata to bypass security controls for remote code execution and lateral movement.

macos lotl lateral-movement execution
2r 2t
high advisory

Multiple Vulnerabilities in Fortinet FortiSandbox

Multiple vulnerabilities in Fortinet FortiSandbox allow attackers to perform cross-site scripting attacks, disclose information, bypass security measures, and execute arbitrary code, potentially leading to system compromise.

fortinet fortisandbox vulnerability xss code-execution
3r 3t
high advisory

Multiple Vulnerabilities in Roundcube

Multiple vulnerabilities in Roundcube allow an attacker to manipulate files, bypass security measures, perform cross-site scripting attacks, and disclose information.

roundcube vulnerability xss file-manipulation
2r 3t
high advisory

Multiple Vulnerabilities in Microsoft Developer Tools

Multiple vulnerabilities in Microsoft Visual Studio, .NET Framework, .NET, PowerShell, and Visual Studio Code can be exploited by an attacker to disclose sensitive information, conduct spoofing attacks, cause a denial of service, or bypass security measures, potentially leading to arbitrary code execution.

vulnerability code-execution spoofing denial-of-service information-disclosure windows
2r 4t
high advisory

Multiple Vulnerabilities in FreeRDP Allow Remote Code Execution and DoS

An anonymous remote attacker can exploit multiple vulnerabilities in FreeRDP to potentially execute arbitrary code, cause a denial-of-service condition, manipulate data, disclose confidential information, or perform other unspecified attacks.

freerdp vulnerability rdp
2r 5t
high advisory

Intel IPU, UEFI Reference Firmware: Multiple Vulnerabilities

A local attacker can exploit multiple vulnerabilities in Intel Firmware to disclose confidential information or gain elevated privileges.

intel firmware vulnerability privilege-escalation credential-access
2r 2t
high advisory

AiAssistant Type Privilege Bypass Vulnerability (CVE-2026-31368)

CVE-2026-31368 is a type privilege bypass vulnerability in AiAssistant, potentially leading to service availability issues and complete compromise of the system.

privilege-escalation vulnerability AiAssistant
2r 2t 1c
high advisory

FreeScout CSS Injection Vulnerability in Mailbox Signature Leads to Privilege Escalation (CVE-2026-40497)

FreeScout versions prior to 1.8.213 are vulnerable to CSS injection via the mailbox signature, allowing an attacker with mailbox settings access to exfiltrate CSRF tokens and escalate privileges.

freescout css-injection privilege-escalation cve-2026-40497
2r 2t 1c
high advisory

OpenClaw Improper Trust Boundary Vulnerability (CVE-2026-41295)

OpenClaw before 2026.4.2 contains an improper trust boundary vulnerability (CVE-2026-41295) allowing attackers to execute unintended code by cloning a workspace with a malicious plugin claiming a bundled channel id.

openclaw code-execution trust-boundary plugin
2r 1t 1c
high advisory

Rowboatlabs Rowboat Improper Authentication Vulnerability (CVE-2026-6635)

An improper authentication vulnerability in rowboatlabs rowboat <=0.1.67 allows remote attackers to bypass authentication by manipulating the X-Tools-JWE argument in the tool_call function, potentially leading to unauthorized access and control.

cve-2026-6635 authentication bypass web application
2r 1t 1c
high advisory

Metasoft MetaCRM SQL Injection Vulnerability (CVE-2026-6629)

A SQL injection vulnerability (CVE-2026-6629) exists in Metasoft MetaCRM up to version 6.4.0, allowing remote attackers to execute arbitrary SQL commands via manipulation of the sql argument in the Statement.executeUpdate function of the sql.jsp file.

cve-2026-6629 sql-injection web-application metasoft
2r 1t
high advisory

ThreatSonar Anti-Ransomware Arbitrary File Deletion Vulnerability

TeamT5's ThreatSonar Anti-Ransomware is vulnerable to arbitrary file deletion via path traversal, allowing authenticated remote attackers with web access to delete arbitrary files on the system.

vulnerability file-deletion path-traversal
2r 2t 1c
high advisory

Modelscope Agentscope Code Injection Vulnerability (CVE-2026-6603)

A code injection vulnerability exists in modelscope agentscope up to version 1.0.18, specifically affecting the execute_python_code/execute_shell_command functions, allowing for remote code execution.

code-injection remote-code-execution agentscope
2r 1t
high advisory

Silex Technology SD-330AC and AMC Manager Insecure Default Password Vulnerability (CVE-2026-32965)

Silex Technology's SD-330AC and AMC Manager are vulnerable to insecure default initialization, allowing a null string password to be set upon initial network connection (CVE-2026-32965).

cve-2026-32965 default-password silex-technology
2r 1c
high advisory

Langflow Unrestricted File Upload Vulnerability (CVE-2026-6596)

An unrestricted file upload vulnerability in langflow-ai langflow versions up to 1.1.0 allows remote attackers to execute arbitrary code via the create_upload_file function in the API Endpoint.

CVE-2026-6596 unrestricted-upload langflow
2r 2t
high advisory

brikcss merge Prototype Pollution Vulnerability (CVE-2026-6594)

A prototype pollution vulnerability (CVE-2026-6594) in brikcss merge up to version 1.3.0 allows remote attackers to modify object prototype attributes by manipulating the __proto__/constructor.prototype/prototype argument.

prototype-pollution javascript code-injection cve-2026-6594
2r 2t 1c
high advisory

liangliangyy DjangoBlog Hardcoded Cryptographic Key Vulnerability (CVE-2026-6580)

CVE-2026-6580 describes a vulnerability in liangliangyy DjangoBlog up to version 2.1.0.0 where manipulation of the 'key' argument in the Amap API Call Handler leads to the use of a hard-coded cryptographic key, enabling remote exploitation.

cve-2026-6580 djangoblog hardcoded-key web-application
2r 1c
high advisory

Apple Account Notification Phishing Campaign

A phishing campaign is abusing legitimate Apple account change notifications to deliver fake iPhone purchase scams, tricking users into calling malicious support numbers.

apple phishing callback phishing email
2r 1t 5i
high advisory

osuuu LightPicture Hardcoded Credentials Vulnerability (CVE-2026-6574)

CVE-2026-6574 allows remote attackers to manipulate the 'key' argument in the /public/install/lp.sql file via the API Upload Endpoint in osuuu LightPicture <= 1.2.2, leading to hardcoded credentials exposure.

cve-2026-6574 hardcoded-credentials web-application
2r 1t 1c
high threat

KodExplorer Path Traversal Vulnerability (CVE-2026-6568)

KodExplorer up to version 4.52 is vulnerable to a path traversal attack via manipulation of the path argument in the share.class.php::initShareOld function, potentially allowing remote attackers to access sensitive files.

exploited path-traversal kodexplorer cve-2026-6568
2r 1t 1c 5i
high advisory

WeGIA SQL Injection Vulnerability (CVE-2026-40285)

WeGIA versions prior to 3.6.10 are vulnerable to SQL injection via the cpf_usuario POST parameter, allowing authenticated users to query the database under an arbitrary identity.

wegia sql-injection cve-2026-40285 web-application
2r 1t 1c
high advisory

PraisonAI Multiple Backends Vulnerable to SQL Injection via Unvalidated Table Prefix

PraisonAI is vulnerable to SQL injection across nine database backends due to unsanitized `table_prefix` parameters, and in PostgreSQL due to an unsanitized `schema` parameter, enabling arbitrary SQL execution.

sql-injection praisonai web-application
2r 1t 1c
high advisory

DNN (DotNetNuke) SVG Upload Vulnerability (CVE-2026-40321)

DNN (formerly DotNetNuke) before 10.2.2 is vulnerable to stored cross-site scripting (XSS) via malicious SVG file uploads, potentially leading to account takeover and arbitrary code execution.

dnn dotnetnuke svg xss cve-2026-40321 upload
2r 3t 1c
high advisory

Anviz CrossChex Standard TDS7 PreLogin Encryption Vulnerability

Anviz CrossChex Standard is vulnerable to unauthorized database access due to the manipulation of TDS7 PreLogin, which disables encryption, leading to plaintext transmission of database credentials.

cve-2026-32650 credential-access database
2r 1t 1c 1i
high advisory

Firebird Server Denial-of-Service Vulnerability (CVE-2026-28224)

An unauthenticated attacker can trigger a denial-of-service condition on vulnerable Firebird servers by sending a specially crafted op_crypt_key_callback packet, leading to a null pointer dereference and server crash.

cve-2026-28224 denial-of-service firebird database
2r 1t 1c
high advisory

SecureDrop Client Code Execution via Gzip Extraction Vulnerability

A compromised SecureDrop server can achieve code execution on the SecureDrop client's virtual machine by exploiting improper filename validation during gzip archive extraction, allowing for the overwriting of critical files.

securedrop gzip code execution vulnerability linux
2r 1t 2c
high advisory

Dagster SQL Injection Vulnerability in Dynamic Partition Keys

A SQL injection vulnerability exists in Dagster's DuckDB, Snowflake, BigQuery, and DeltaLake I/O managers, where a user with 'Add Dynamic Partitions' permission can inject arbitrary SQL due to improper escaping of dynamic partition key values, leading to unauthorized data access or modification.

sqli dagster injection
2r 6t
high advisory

YesWiki Authenticated SQL Injection Vulnerability

YesWiki is vulnerable to authenticated SQL Injection via the id_fiche parameter in the EntryManager::formatDataBeforeSave() function, allowing attackers to inject arbitrary SQL commands and potentially extract sensitive data.

yeswiki sql-injection web-application
2r 1t 2i
high advisory

Movary Privilege Escalation Vulnerability (CVE-2026-40349)

Movary versions prior to 0.71.1 allow authenticated users to escalate privileges to administrator by manipulating the `isAdmin` field via a PUT request to the `/settings/users/{userId}` endpoint, due to missing authorization checks.

privilege-escalation web-application cve-2026-40349
2r 1t 1c 1i
high advisory

FastGPT NoSQL Injection Vulnerability in Password Change Endpoint

FastGPT versions prior to 4.14.9.5 are vulnerable to NoSQL injection in the password change endpoint, allowing authenticated attackers to bypass password verification and perform account takeover.

nosql-injection account-takeover cve fastgpt privilege-escalation
2r 2t 1c
high advisory

OpenClaw Environment Variable Injection Vulnerability

The openclaw package versions prior to 2026.4.10 are vulnerable to environment variable injection, where the exec environment policy missed interpreter startup variables allowing operator-supplied environment overrides to influence downstream execution or network behavior, addressed in versions 2026.4.10 and later.

npm openclaw environment-variable-injection vulnerability
2r 1t
high advisory

Anviz CX2 Lite and CX7 Unauthenticated Debug Setting Modification

Anviz CX2 Lite and CX7 devices are vulnerable to unauthenticated POST requests that allow modification of debug settings such as enabling SSH, leading to unauthorized state changes and potential compromise.

cve-2026-40461 authentication-bypass iot
2r 1t 1c
high advisory

Anviz CrossChex Standard TCP Packet Injection Vulnerability

Anviz CrossChex Standard lacks source verification in the client/server channel, enabling TCP packet injection by an attacker on the same network to alter or disrupt application traffic.

cve-2026-40434 tcp-injection industrial-control-system
2r 2t 1c 4i
high advisory

xrdp Privilege Escalation Vulnerability (CVE-2026-32107)

xrdp versions through 0.10.5 are vulnerable to a privilege escalation flaw (CVE-2026-32107) where improper privilege management during the privilege drop process could allow an authenticated local attacker to escalate privileges to root and execute arbitrary code.

xrdp privilege-escalation cve-2026-32107 linux
2r 2t 1c 1i
high advisory

ByteDance DeerFlow Path Traversal and Arbitrary File Write Vulnerability

ByteDance DeerFlow before commit 2176b2b contains a path traversal and arbitrary file write vulnerability in bootstrap-mode custom-agent creation where the agent name validation is bypassed, allowing attackers to write files outside the intended custom-agent directory.

path-traversal file-write bytedance deerflow
2r 1t 1c
high advisory

Dnsmasq Out-of-Bounds Write Vulnerability (CVE-2026-6507)

A remote attacker can exploit an out-of-bounds write vulnerability (CVE-2026-6507) in dnsmasq by sending a specially crafted BOOTREPLY packet to a server configured with the `--dhcp-split-relay` option, leading to a denial of service.

dnsmasq denial-of-service cve-2026-6507
2r 1t 1c
high advisory

zrok Unauthenticated Denial-of-Service Vulnerability

An unauthenticated attacker can cause a denial-of-service (DoS) in zrok by sending a crafted HTTP request with a large cookie chunk count to an OAuth-protected proxy share, triggering unbounded memory allocation and leading to process termination.

dos vulnerability zrok CVE-2026-40303
2r 1t
high advisory

Paperclip Unauthenticated API Access Vulnerability

Paperclip application suffers from multiple unauthenticated API access vulnerabilities allowing attackers to access sensitive data, gather reconnaissance, and potentially bypass authentication.

paperclip authentication-bypass api-vulnerability
2r 3t
high advisory

OCaml opam Path Traversal Vulnerability (CVE-2026-41082)

OCaml opam before 2.5.1 is vulnerable to path traversal via a crafted .install file, potentially allowing attackers to overwrite arbitrary files.

path-traversal package-manager ocaml
2r 1t 1c
high advisory

Meridian Library Multiple Defense-in-Depth Gaps

Multiple defense-in-depth gaps exist in Meridian versions prior to 2.1.1, including high severity issues related to bypassing safety caps on collection mapping that can lead to resource exhaustion, along with medium and low severity issues affecting constructor selection, telemetry, retry mechanisms, and exception handling.

defense-in-depth resource-exhaustion information-disclosure dotnet
3r 5t
high advisory

ManageEngine PAM360 and Password Manager Pro Authenticated SQL Injection Vulnerability (CVE-2026-5785)

An authenticated SQL injection vulnerability (CVE-2026-5785) in the query report module of Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Manager Pro versions from 8600 to 13230 allows attackers with low privileges to potentially read or modify sensitive database information.

cve-2026-5785 sqli manageengine pam360 passwordmanagerpro
2r 4t 1c
high advisory

Kyverno ConfigMap Cross-Namespace Read RBAC Bypass (CVE-2026-22039 Incomplete Fix)

CVE-2026-22039 incompletely fixed a cross-namespace privilege escalation vulnerability in Kyverno's apiCall context, as the ConfigMap context loader still lacks namespace validation, allowing a namespace admin to read ConfigMaps from any namespace using Kyverno's privileged service account, leading to a complete RBAC bypass in multi-tenant Kubernetes clusters.

kyverno rbac-bypass kubernetes privilege-escalation
2r 1t 1c
high advisory

Better Auth OAuth Provider Authorization Bypass Vulnerability

An authorization bypass vulnerability exists in Better Auth's OAuth provider, allowing low-privilege users to create OAuth clients despite configured clientPrivileges, potentially leading to unauthorized client registration and increased phishing risks.

oauth authorization bypass privilege-escalation defense-evasion
2r 2t
high advisory

Wavlink WL-WN530H4 OS Command Injection Vulnerability

A remote command injection vulnerability exists in the Wavlink WL-WN530H4 router, specifically in the `strcat/snprintf` function of the `/cgi-bin/internet.cgi` file, allowing attackers to execute arbitrary OS commands.

command-injection router cve-2026-6483
2r 2t 1c
high advisory

Dell PowerProtect Data Domain Improper Certificate Validation Vulnerability

Dell PowerProtect Data Domain versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.60, contain an improper certificate validation vulnerability in certificate-based login, potentially leading to privilege escalation.

privilege-escalation vulnerability dell
2r 1t 1c
high advisory

Dell Storage Manager Local Privilege Escalation Vulnerability

A local attacker can exploit a vulnerability in Dell Storage Manager to escalate their privileges on the system.

privilege-escalation dell storage manager
2r 1t
high advisory

Dell PowerProtect Data Domain BoostFS Credential Exposure Vulnerability (CVE-2025-36568)

Dell PowerProtect Data Domain BoostFS versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.50 are vulnerable to an insufficiently protected credentials vulnerability, allowing a low-privileged attacker with local access to expose credentials and potentially gain elevated privileges.

credential-exposure dell powerprotect CVE-2025-36568
2r 1t 1c
high advisory

Dell PowerProtect Data Domain Weak Credentials Vulnerability (CVE-2026-23853)

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.50, contain a use of weak credentials vulnerability (CVE-2026-23853) that can lead to unauthorized access by a local attacker.

cve-2026-23853 dell powerprotect data domain weak credentials
3r 2t 1c 2i
high advisory

Unlimited Elements for Elementor WordPress Plugin Arbitrary File Read (CVE-2026-4659)

The Unlimited Elements for Elementor plugin for WordPress is vulnerable to arbitrary file read due to insufficient path traversal sanitization, allowing authenticated attackers to read sensitive files from the WordPress host.

wordpress file-read path-traversal cve-2026-4659
2r 1t 1c
high advisory

Vault Token Leak via Authorization Header Forwarding

Vault instances configured to pass through the 'Authorization' header may forward Vault tokens to auth plugin backends when the header is used for authentication, potentially leading to token compromise; this vulnerability is tracked as CVE-2026-4525 and patched in versions 2.0.0, 1.21.5, 1.20.10, and 1.19.16.

vault token-leak authorization cve-2026-4525
2r 1t 1c 1i
high advisory

Paperclip codex_local Unauthorized Gmail Access

A Paperclip-managed `codex_local` runtime can access and utilize Gmail connectors connected in the ChatGPT/OpenAI apps UI without explicit Paperclip configuration, allowing unauthorized mailbox access and email sending capabilities due to a trust-boundary failure and dangerous default runtime settings.

paperclipai gmail openai authorization bypass
2r 5t
high advisory

Flowise SSRF Protection Bypass via Unprotected Built-in HTTP Modules

Flowise is vulnerable to SSRF protection bypass via unprotected built-in HTTP modules in the custom function sandbox, allowing authenticated users to access internal network resources by exploiting the lack of SSRF protection on Node.js `http`, `https`, and `net` modules.

ssrf flowise cloud
2r 1t
high advisory

@fastify/middie Middleware Bypass Vulnerability (CVE-2026-33804)

A middleware bypass vulnerability (CVE-2026-33804) exists in @fastify/middie versions 9.3.1 and earlier when the deprecated Fastify ignoreDuplicateSlashes option is enabled, potentially allowing unauthorized access.

fastify middie middleware bypass cve-2026-33804 defense-evasion
2r 1t 1c
high advisory

Weblate Improper Privilege Management via API Endpoint (CVE-2026-34393)

Weblate versions prior to 5.17 are vulnerable to improper privilege management due to an API endpoint failing to properly limit the scope of edits, potentially leading to unauthorized modifications.

weblate privilege-escalation web-application
2r 2t 1c
high advisory

Plisio Accept Cryptocurrencies Plugin Missing Authorization Vulnerability (CVE-2026-6372)

A missing authorization vulnerability in the Plisio Accept Cryptocurrencies with Plisio WordPress plugin (versions up to 2.0.5) allows attackers to bypass payment verification due to incorrectly configured access control security levels.

wordpress plugin payment-bypass cve-2026-6372
2r 1t 1c 1i
high advisory

Mirax RAT Targeting Android Users in Europe

Mirax RAT, a new Android RAT distributed as MaaS, is targeting European users by turning infected devices into residential proxy nodes and enabling credential theft via overlay and notification injection.

android rat mirax malware-as-a-service proxy
2r 4t
high advisory

Malicious Chrome Extensions Stealing Data and Opening Backdoors

A coordinated campaign uses 108 malicious Chrome extensions to steal user data, inject ads, and establish backdoors on over 20,000 systems via a shared command-and-control infrastructure.

chrome-extension credential-theft backdoor ad-injection exfiltration
2r 6t
high advisory

Google Chrome Turbofan Type Confusion Vulnerability (CVE-2026-6301)

A type confusion vulnerability in Google Chrome's Turbofan component (CVE-2026-6301) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page, impacting system integrity and availability.

type-confusion code-execution chrome
2r 1t 1c
high advisory

Google Chrome Sandbox Escape via Uninitialized Use in Accessibility (CVE-2026-6311)

A remote attacker who has compromised the renderer process in Google Chrome on Windows prior to version 147.0.7727.101 can potentially perform a sandbox escape via a crafted HTML page due to an uninitialized use in accessibility, as tracked by CVE-2026-6311.

cve-2026-6311 chrome sandbox-escape windows
2r 1t 1c 1i
high advisory

Google Chrome GPU Out-of-Bounds Write Vulnerability (CVE-2026-6314)

Google Chrome versions prior to 147.0.7727.101 are vulnerable to an out-of-bounds write in the GPU process (CVE-2026-6314), allowing a remote attacker with GPU process compromise to potentially perform a sandbox escape via a crafted HTML page.

chrome gpu oob-write sandbox-escape
2r 1t 1c
high advisory

Google Chrome Dawn Use-After-Free Vulnerability (CVE-2026-6310)

A use-after-free vulnerability (CVE-2026-6310) in Google Chrome's Dawn component allows a remote attacker, having compromised the renderer process, to potentially execute a sandbox escape via a specially crafted HTML page.

cve-2026-6310 use-after-free sandbox escape google chrome
2r 2t 1c 1i
high advisory

Google Chrome CSS Use-After-Free Vulnerability (CVE-2026-6300)

A use-after-free vulnerability in Google Chrome's CSS engine (CVE-2026-6300) allows a remote attacker to execute arbitrary code within a sandbox by exploiting a crafted HTML page.

cve-2026-6300 use-after-free chrome
1r 1t 1c
high advisory

Dragon Boss Solutions Adware Disabling Antivirus Protections

Digitally signed adware from Dragon Boss Solutions LLC deploys payloads with SYSTEM privileges to disable antivirus protections on thousands of endpoints across education, utilities, government, and healthcare sectors.

adware antivirus-evasion malware windows
2r 2t 2i
high advisory

Multiple Vulnerabilities in Cisco Unity Connection

Multiple vulnerabilities in Cisco Unity Connection can be exploited by an attacker to conduct cross-site scripting attacks, redirect users to malicious websites, manipulate data, and disclose confidential information.

cisco unity-connection vulnerability xss data-manipulation
2r 1t
high advisory

Multiple Vulnerabilities in libssh Allow File Manipulation and DoS

Multiple vulnerabilities in libssh allow an attacker to manipulate files or cause a denial-of-service condition, potentially leading to data corruption or service disruption.

libssh vulnerability dos file_manipulation
2r 1t
high advisory

Grafana Vulnerability Allows File Manipulation and Information Disclosure

A remote, authenticated attacker can exploit a vulnerability in Grafana to manipulate files and disclose sensitive information, potentially leading to persistence, unauthorized access, and significant impact.

grafana vulnerability file-manipulation information-disclosure
2r 4t
high advisory

rsync Use-After-Free Vulnerability in Extended Attribute Handling (CVE-2026-41035)

rsync versions 3.0.1 through 3.4.1 are vulnerable to a use-after-free vulnerability in the receive_xattr function during a qsort call, triggered by an untrusted length value when the -X/--xattrs option is used, potentially leading to code execution.

rsync use-after-free cve-2026-41035 linux
2r 1t 1c
high advisory

Riaxe Product Customizer WordPress Plugin SQL Injection Vulnerability

The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter within 'product_data' of the `/wp-json/InkXEProductDesignerLite/add-item-to-cart` REST API endpoint, allowing unauthenticated attackers to extract sensitive information from the database.

wordpress sqli plugin
2r 1t 1c
high advisory

Openfind MailGates/MailAudit CRLF Injection Vulnerability

Openfind MailGates/MailAudit is vulnerable to CRLF injection (CVE-2026-6351), enabling unauthenticated remote attackers to read system files by injecting malicious CRLF sequences.

crlf-injection vulnerability mailgates mailaudit
2r 1t 1c
high advisory

Radare2 Command Injection Vulnerability (CVE-2026-41015)

Radare2 before commit 9236f44, when configured on UNIX without SSL, is vulnerable to command injection via a PDB name passed to rabin2 -PP, potentially allowing arbitrary code execution.

radare2 command-injection cve-2026-41015 linux
2r 1t 1c
high advisory

wger Broken Access Control in Global Gym Configuration Update Endpoint

The wger application has a broken access control vulnerability in the global gym configuration update endpoint, allowing low-privileged authenticated users to modify installation-wide configuration settings and escalate privileges.

privilege-escalation broken-access-control web-application
2r 1t
high advisory

Luanti 5 Improper Access Control Vulnerability (CVE-2026-40960)

Luanti 5 before 5.15.2 allows unintended access to an insecure environment if a crafted mod intercepts requests when secure mods are enabled, potentially leading to unauthorized access and control.

cve-2026-40960 luanti access-control
2r 1t 1c 1i
high advisory

GIMP GIF Image Buffer Overflow Vulnerability

A buffer overflow vulnerability in the GIF image loading component of GIMP allows an attacker to write beyond an allocated buffer by processing a specially crafted GIF file, potentially leading to denial of service or arbitrary code execution.

cve-2026-6384 gimp buffer-overflow dos
2r 3t 1c
high advisory

Fastify Body Schema Validation Bypass via Leading Space in Content-Type Header

Fastify v5.x is vulnerable to a body schema validation bypass, allowing attackers to circumvent request body validation by prepending a single space to the Content-Type header, potentially compromising data integrity and security constraints.

fastify validation-bypass webserver
2r 1t 2c
high advisory

Weblate Project Backup Vulnerability Leads to Potential Remote Code Execution (CVE-2026-33435)

Weblate versions before 5.17 are susceptible to remote code execution due to unfiltered Git and Mercurial configuration files in project backups, potentially allowing attackers to execute arbitrary code under specific conditions.

cve-2026-33435 rce weblate
2r 3t 1c
high advisory

Velociraptor Authentication Bypass via query() Plugin

Velociraptor versions prior to 0.76.3 contain an authentication bypass vulnerability in the query() plugin, allowing authenticated users to access data from other organizations within the Velociraptor deployment, potentially leading to unauthorized data access and privilege escalation.

velociraptor authentication bypass privilege escalation cve-2026-6290
2r 2t 1c
high advisory

WC Lovers WCFM Marketplace SQL Injection Vulnerability (CVE-2025-63029)

An SQL Injection vulnerability, identified as CVE-2025-63029, exists in the WC Lovers WCFM Marketplace WordPress plugin up to version 3.7.1, potentially allowing attackers to execute arbitrary SQL queries.

sql-injection wordpress wcfm-marketplace
2r 1t 1c 1i
high advisory

Splunk MCP Server App Cleartext Credential Exposure (CVE-2026-20205)

A user with access to the `_internal` index or the `mcp_tool_admin` capability in Splunk MCP Server app versions below 1.0.3 can view user session and authorization tokens in clear text, leading to potential credential compromise.

splunk credential-access vulnerability
2r 1t 1c
high advisory

Zarf Path Traversal Vulnerability via Malicious Package Metadata.Name

Zarf is vulnerable to path traversal due to insufficient sanitization of the Metadata.Name field in package manifests when using the `zarf package inspect sbom` or `zarf package inspect documentation` commands, potentially leading to arbitrary file write.

zarf path-traversal arbitrary-file-write package-inspection linux
3r 1t
high advisory

Windows WinSock Use-After-Free Privilege Escalation (CVE-2026-26177)

CVE-2026-26177 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a local attacker to elevate privileges.

cve privilege-escalation windows
2r 1t 1c 1i
high advisory

Windows WinSock Race Condition Privilege Escalation (CVE-2026-26173)

CVE-2026-26173 is a race condition vulnerability in the Windows Ancillary Function Driver for WinSock that allows a local attacker to elevate privileges.

cve-2026-26173 privilege-escalation windows
2r 1t 1c
high advisory

Windows Win32K GRFX Privilege Escalation via Race Condition (CVE-2026-33104)

CVE-2026-33104 is a race condition vulnerability in Windows Win32K - GRFX that allows an authorized local attacker to elevate privileges by exploiting concurrent execution using a shared resource with improper synchronization.

cve-2026-33104 privilege-escalation windows
2r 1t 1c 1i
high advisory

Windows WalletService Use-After-Free Privilege Escalation (CVE-2026-32080)

CVE-2026-32080 is a use-after-free vulnerability in the Windows WalletService, allowing a locally authorized attacker to elevate privileges.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

Windows User Interface Core Race Condition Privilege Escalation (CVE-2026-27911)

CVE-2026-27911 is a race condition vulnerability in the Windows User Interface Core that allows a local attacker to elevate privileges due to improper synchronization when accessing shared resources.

privilege-escalation race-condition windows
2r 1t 1c 1i
high advisory

Windows TCP/IP Race Condition Vulnerability (CVE-2026-33827)

CVE-2026-33827 is a race condition vulnerability in Windows TCP/IP that allows an attacker to execute arbitrary code over the network by exploiting improper synchronization during concurrent execution using shared resources.

cve-2026-33827 race-condition windows tcp/ip code-execution
2r 2t 1c
high advisory

Windows Storage Spaces Controller Out-of-Bounds Read Privilege Escalation (CVE-2026-32076)

CVE-2026-32076 is an out-of-bounds read vulnerability in the Windows Storage Spaces Controller that allows an authorized local attacker to elevate privileges.

privilege-escalation windows cve-2026-32076
2r 1t 1c
high threat

Windows SSDP Service Race Condition Privilege Escalation (CVE-2026-32068)

CVE-2026-32068 is a race condition vulnerability in the Windows SSDP Service that allows an authorized attacker to elevate privileges locally.

exploited cve-2026-32068 privilege-escalation windows
2r 1t 1c
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32160)

CVE-2026-32160 describes a race condition vulnerability in Windows Push Notifications that allows a locally authorized attacker to elevate privileges.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32158)

CVE-2026-32158 is a race condition vulnerability in Windows Push Notifications that allows an authorized attacker to elevate privileges locally due to improper synchronization when using shared resources.

privilege escalation race condition windows
2r 1t 1c 1i
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-26172)

CVE-2026-26172 is a race condition vulnerability in Windows Push Notifications, allowing a locally authenticated attacker to elevate privileges.

cve-2026-26172 privilege-escalation race-condition windows
2r 1t 1c 1i
high advisory

Windows Projected File System Race Condition Privilege Escalation (CVE-2026-27927)

CVE-2026-27927 is a race condition vulnerability in the Windows Projected File System that allows an authorized attacker to escalate privileges locally.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

Windows LUAFV TOCTOU Vulnerability Allows Local Privilege Escalation (CVE-2026-27929)

CVE-2026-27929 is a time-of-check time-of-use (TOCTOU) race condition in Windows LUAFV that allows an authorized local attacker to elevate privileges.

privilege-escalation toctou windows
2r 1t 1c 1i
high advisory

Windows Kerberos Improper Authorization Privilege Escalation (CVE-2026-27912)

CVE-2026-27912 describes an improper authorization vulnerability in Windows Kerberos, enabling an attacker on an adjacent network with valid credentials to elevate privileges.

privilege-escalation kerberos windows cve-2026-27912
2r 1t 1c 2i
high advisory

Windows Hyper-V Improper Input Validation Vulnerability (CVE-2026-32149)

CVE-2026-32149 is a vulnerability in Windows Hyper-V due to improper input validation, which allows an authorized, local attacker to execute arbitrary code.

hyper-v code-execution vulnerability windows
2r 2t 1c 1i
high advisory

Windows BitLocker Security Feature Bypass Vulnerability (CVE-2026-27913)

CVE-2026-27913 describes an improper input validation vulnerability in Windows BitLocker that allows a local attacker to bypass security features.

bitlocker security-bypass windows cve-2026-27913
2r 1t 1c 1i
high advisory

Webkul Krayin CRM SSRF Vulnerability (CVE-2026-38527)

A Server-Side Request Forgery (SSRF) vulnerability in Webkul Krayin CRM v2.2.x allows attackers to scan internal resources by sending a crafted POST request to the /settings/webhooks/create endpoint.

cve-2026-38527 ssrf webkul krayin-crm
2r 1t 1c
high advisory

Microsoft Word Use-After-Free Vulnerability CVE-2026-23657

CVE-2026-23657 is a use-after-free vulnerability in Microsoft Office Word allowing a local attacker to execute arbitrary code with user privileges.

use-after-free code-execution office cve-2026-23657
2r 1t 1c
high advisory

Microsoft PowerShell Improper Input Validation Vulnerability (CVE-2026-26143)

An improper input validation vulnerability (CVE-2026-26143) in Microsoft PowerShell allows an unauthorized local attacker to bypass security features.

cve-2026-26143 powershell input-validation bypass-uac windows
2r 1t 1c 2i
high threat

Microsoft Office Word Use-After-Free Vulnerability (CVE-2026-33095)

A use-after-free vulnerability in Microsoft Office Word (CVE-2026-33095) could allow a local attacker to execute arbitrary code by opening a specially crafted document.

exploited cve-2026-33095 use-after-free microsoft-office word code-execution
2r 1t 1c 1i
high advisory

Microsoft Office Excel Use-After-Free Vulnerability (CVE-2026-32198)

CVE-2026-32198 is a use-after-free vulnerability in Microsoft Office Excel that allows an attacker to execute code locally on a vulnerable system.

use-after-free excel code-execution
3r 1t 1c
high advisory

Microsoft Management Console Improper Access Control Vulnerability (CVE-2026-27914)

CVE-2026-27914 is an improper access control vulnerability in Microsoft Management Console that allows a locally authorized attacker to elevate privileges.

privilege-escalation windows cve-2026-27914
2r 1t 1c 1i
high advisory

Microsoft Excel Use-After-Free Vulnerability (CVE-2026-32189)

CVE-2026-32189 is a use-after-free vulnerability in Microsoft Excel that allows a local attacker to execute arbitrary code by exploiting memory corruption.

use-after-free code-execution excel cve-2026-32189
2r 1t 1c 1i
high advisory

Microsoft Defender Privilege Escalation Vulnerability (CVE-2026-33825)

CVE-2026-33825 allows a locally authenticated attacker to escalate privileges in Microsoft Defender due to insufficient access control granularity.

privilege-escalation microsoft-defender cve-2026-33825
2r 1t 1c 1i
high advisory

Libsixel Use-After-Free Vulnerability (CVE-2026-33018)

A use-after-free vulnerability exists in libsixel versions 1.8.7 and prior when processing animated GIFs due to improper frame buffer management, potentially leading to code execution.

libsixel use-after-free CVE-2026-33018 gif
2r 1t 1c
high advisory

Krayin CRM v2.2.x SQL Injection Vulnerability

Krayin CRM v2.2.x is vulnerable to SQL injection via the rotten_lead parameter in /Lead/LeadDataGrid.php, potentially allowing attackers to read sensitive data.

sql-injection cve-2026-38528 krayin-crm
2r 1t 1c
high advisory

Jetty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing

Jetty is vulnerable to HTTP request smuggling due to improper parsing of quoted strings in HTTP/1.1 chunked transfer encoding extension values, potentially allowing attackers to inject arbitrary HTTP requests, poison caches, and bypass security controls.

request-smuggling jetty CVE-2026-2332 webserver
2r 1t 1c 2i
high advisory

Go Markdown Library Out-of-Bounds Read Vulnerability

A vulnerability in the go-markdown library exists where processing a malformed input containing a '<' character that is not followed by a '>' character with a SmartypantsRenderer can lead to an out-of-bounds read or a panic, causing a denial of service.

markdown denial-of-service go out-of-bounds read
2r 1t
high advisory

Fortinet FortiDDoS-F SQL Injection Vulnerability (CVE-2026-39815)

An SQL injection vulnerability (CVE-2026-39815) in Fortinet FortiDDoS-F versions 7.2.1 through 7.2.2 may allow a low-privilege attacker to execute unauthorized code or commands.

sqli fortinet cve-2026-39815
2r 3t 1c
high advisory

CVE-2026-33826: Windows Active Directory Improper Input Validation Vulnerability

An improper input validation vulnerability (CVE-2026-33826) in Windows Active Directory could allow an authenticated attacker on an adjacent network to execute code.

cve-2026-33826 active-directory code-execution vulnerability
2r 1t 1c 1i
high advisory

CVE-2026-33101 Use-After-Free Vulnerability in Windows Print Spooler

CVE-2026-33101 is a use-after-free vulnerability in the Windows Print Spooler Components that allows an authenticated local attacker to elevate privileges.

use-after-free privilege-escalation windows
2r 1t 1c 2i
high advisory

CVE-2026-33099: Windows WinSock Use-After-Free Privilege Escalation

A use-after-free vulnerability, CVE-2026-33099, in the Windows Ancillary Function Driver for WinSock, enables a locally authenticated attacker to elevate privileges on the system.

cve-2026-33099 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-33098 Use-After-Free in Windows Container Isolation FS Filter Driver

CVE-2026-33098 is a use-after-free vulnerability in the Windows Container Isolation FS Filter Driver that allows a locally authorized attacker to elevate privileges.

use-after-free privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-33096 HTTP.sys Out-of-Bounds Read Denial-of-Service

An unauthenticated, remote attacker can exploit an out-of-bounds read vulnerability (CVE-2026-33096) in Windows HTTP.sys to cause a denial-of-service condition.

cve-2026-33096 denial-of-service windows
2r 2t 1c
high advisory

CVE-2026-32195 Windows Kernel Stack-Based Buffer Overflow Privilege Escalation

CVE-2026-32195 is a stack-based buffer overflow vulnerability in the Windows Kernel that allows an authorized attacker to elevate privileges locally.

privilege-escalation buffer-overflow windows cve-2026-32195
2r 1t 1c 1i
high advisory

CVE-2026-32164 Windows User Interface Core Race Condition Privilege Escalation

CVE-2026-32164 is a race condition vulnerability in Windows User Interface Core that allows a locally authorized attacker to elevate privileges.

cve-2026-32164 privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-32155: Desktop Window Manager Use-After-Free Privilege Escalation

CVE-2026-32155 is a use-after-free vulnerability in the Desktop Window Manager that allows an authorized attacker to escalate privileges locally on a Windows system.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-32153 Windows Speech Use-After-Free Privilege Escalation

CVE-2026-32153 is a use-after-free vulnerability in Microsoft Windows Speech that allows a locally authorized attacker to elevate privileges.

cve-2026-32153 privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-32152 Use-After-Free in Desktop Window Manager

CVE-2026-32152 is a use-after-free vulnerability in the Desktop Window Manager (dwm.exe) that allows an authorized local attacker to elevate privileges.

privilege-escalation use-after-free cve-2026-32152
2r 1t 1c 1i
high advisory

CVE-2026-32078: Windows Projected File System Use-After-Free Elevation of Privilege

A use-after-free vulnerability, CVE-2026-32078, exists in the Windows Projected File System, allowing a locally authenticated attacker to escalate privileges.

cve-2026-32078 privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-32071: Windows LSASS Null Pointer Dereference DoS

CVE-2026-32071 is a null pointer dereference vulnerability in the Windows Local Security Authority Subsystem Service (LSASS), allowing an unauthorized network attacker to cause a denial-of-service condition.

cve-2026-32071 denial-of-service windows
2r 1t 1c 1i
high advisory

CVE-2026-27926 Windows Cloud Files Mini Filter Driver Privilege Escalation

CVE-2026-27926 is a race condition vulnerability in the Windows Cloud Files Mini Filter Driver that allows a local attacker to elevate privileges.

privilege-escalation race-condition windows
3r 1t 1c
high threat

CVE-2026-27917: Windows WFP NDIS Lightweight Filter Driver Use-After-Free Vulnerability

CVE-2026-27917 is a use-after-free vulnerability in the Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) that allows a locally authorized attacker to elevate privileges.

exploited cve-2026-27917 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

CVE-2026-27916 Use-After-Free in Windows UPnP Device Host

CVE-2026-27916 is a use-after-free vulnerability in Windows Universal Plug and Play (UPnP) Device Host that allows an authorized attacker to elevate privileges locally.

windows upnp privilege-escalation cve-2026-27916
2r 1t 1c 1i
high advisory

CVE-2026-27910: Windows Installer Local Privilege Escalation

CVE-2026-27910 describes a local privilege escalation vulnerability in Windows Installer due to improper handling of insufficient permissions, allowing an authorized attacker to gain elevated privileges.

privilege-escalation windows cve-2026-27910
2r 1t 1c 2i
high advisory

CVE-2026-27909 Use-After-Free in Windows Search Component Allows Privilege Escalation

CVE-2026-27909 is a use-after-free vulnerability in the Microsoft Windows Search Component that allows a locally authorized attacker to escalate privileges.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-27908 Use-After-Free in Windows TDI Translation Driver

A use-after-free vulnerability, CVE-2026-27908, exists in the Windows TDI Translation Driver (tdx.sys), allowing a locally authenticated attacker to elevate privileges.

cve-2026-27908 use-after-free privilege-escalation windows
2r 1t 1c 1i
high advisory

CVE-2026-26182: Windows WinSock Use-After-Free Privilege Escalation

CVE-2026-26182 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-26181 - Microsoft Brokering File System Use-After-Free Vulnerability

CVE-2026-26181 is a use-after-free vulnerability in the Microsoft Brokering File System that enables a locally authenticated attacker to escalate privileges on the system.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

CVE-2026-26179 Windows Kernel Double Free Privilege Escalation

CVE-2026-26179 is a double free vulnerability in the Windows Kernel, allowing a locally authenticated attacker to elevate privileges on the system.

privilege-escalation windows kernel double-free
2r 1t 1c
high advisory

CVE-2026-26163: Windows Kernel Double Free Privilege Escalation

CVE-2026-26163 is a double free vulnerability in the Windows Kernel, allowing an authorized attacker to elevate privileges locally with a CVSS v3.1 score of 7.8.

privilege-escalation windows cve-2026-26163
2r 1t 1c 1i
high advisory

CVE-2026-26153: Windows EFS Out-of-Bounds Read Privilege Escalation

CVE-2026-26153 is an out-of-bounds read vulnerability in the Windows Encrypting File System (EFS) that allows an authorized local attacker to elevate privileges.

efs privilege-escalation windows
2r 1t 1c 1i
high advisory

CVE-2026-26152: Windows Cryptographic Services Privilege Escalation

CVE-2026-26152 is an insecure storage of sensitive information vulnerability in Windows Cryptographic Services that allows a local, authorized attacker to elevate privileges.

cve-2026-26152 privilege-escalation windows
2r 1t 1c 1i
high advisory

Composer Command Injection via Malicious Perforce Repository

Composer is vulnerable to command injection via a malicious Perforce repository due to improper escaping of user-supplied Perforce connection parameters, potentially leading to arbitrary command execution in the context of the user running Composer.

composer command-injection php
2r 1t
high advisory

Azure Monitor Agent Improper Input Validation Vulnerability (CVE-2026-32168)

CVE-2026-32168 is an improper input validation vulnerability in Azure Monitor Agent that allows a locally authorized attacker to elevate privileges.

azure privilege escalation vulnerability cve-2026-32168
2r 1t 1c 1i
high advisory

Azure Monitor Agent Deserialization Vulnerability (CVE-2026-32192) Allows Local Privilege Escalation

CVE-2026-32192 allows a locally authorized attacker to escalate privileges on a host running the Azure Monitor Agent via deserialization of untrusted data.

cve-2026-32192 azure monitor agent privilege escalation deserialization
2r 1t 1c
high advisory

Autodesk Fusion Stored XSS Vulnerability (CVE-2026-4344)

CVE-2026-4344 is a stored cross-site scripting (XSS) vulnerability in the Autodesk Fusion desktop application where a malicious HTML payload in a component name, when displayed during the delete confirmation dialog and clicked by a user, can lead to arbitrary code execution.

xss autodesk cve-2026-4344
2r 3t 1c 3i
high advisory

Adobe Photoshop Out-of-Bounds Read Vulnerability (CVE-2026-27289)

An out-of-bounds read vulnerability (CVE-2026-27289) in Adobe Photoshop Desktop versions 27.4 and earlier allows for potential code execution via a crafted file, requiring user interaction to trigger the exploit.

cve-2026-27289 out-of-bounds read adobe photoshop code execution
2r 3t 1c 2i
high advisory

Adobe InDesign Heap-Based Buffer Overflow Vulnerability (CVE-2026-34629)

Adobe InDesign versions 20.5.2, 21.2 and earlier are vulnerable to a heap-based buffer overflow (CVE-2026-34629) that could lead to arbitrary code execution if a user opens a malicious file.

cve-2026-34629 heap-overflow adobe-indesign
2r 2t 1c
high advisory

Adobe ColdFusion Path Traversal Vulnerability (CVE-2026-34619)

A path traversal vulnerability (CVE-2026-34619) in Adobe ColdFusion versions 2023.18, 2025.6, and earlier allows an attacker to bypass security features and access unauthorized files or directories without user interaction.

path-traversal coldfusion cve-2026-34619
2r 1t 1c
high advisory

Adobe Bridge Heap-based Buffer Overflow Vulnerability (CVE-2026-27312)

A heap-based buffer overflow vulnerability in Adobe Bridge versions 16.0.2, 15.1.4 and earlier can lead to arbitrary code execution if a user opens a malicious file.

cve-2026-27312 heap-based buffer overflow adobe bridge code execution
2r 2t 1c
high advisory

Adobe Bridge Heap-Based Buffer Overflow Vulnerability (CVE-2026-27311)

A heap-based buffer overflow vulnerability in Adobe Bridge versions 16.0.2, 15.1.4, and earlier (CVE-2026-27311) allows for arbitrary code execution when a user opens a specially crafted file.

cve-2026-27311 heap-based-buffer-overflow adobe-bridge
2r 1t 1c
high advisory

Adobe Acrobat Reader Prototype Pollution Vulnerability (CVE-2026-34622)

A prototype pollution vulnerability in Adobe Acrobat Reader versions 26.001.21411, 24.001.30360, 24.001.30362 and earlier (CVE-2026-34622) allows for arbitrary code execution when a user opens a specially crafted malicious file.

cve-2026-34622 adobe-acrobat prototype-pollution code-execution
2r 1t 1c
high advisory

.NET Uncontrolled Resource Consumption Vulnerability (CVE-2026-26171)

CVE-2026-26171 is a vulnerability in .NET that allows an unauthorized attacker to perform a denial-of-service attack over a network due to uncontrolled resource consumption.

CVE-2026-26171 dotnet denial-of-service dos resource-consumption
1r 1c
high advisory

n8n AI Workflow Automation Platform Abused for Malware Delivery and Device Fingerprinting

Threat actors are abusing the n8n AI workflow automation platform to deliver malware and fingerprint devices via phishing campaigns, bypassing traditional security filters by leveraging trusted infrastructure.

n8n phishing malware workflow-automation
2r 6t 2i
high advisory

Kyverno SSRF Vulnerability in CEL HTTP Library

A Server-Side Request Forgery (SSRF) vulnerability in Kyverno's CEL HTTP library allows users with namespace-scoped policy creation permissions to make arbitrary HTTP requests, enabling unauthorized access to internal services, cloud metadata endpoints, and data exfiltration.

SSRF kyverno kubernetes cel cloud-security
2r 3t 1c 4i
high advisory

Kyverno Service Account Token Leak via API Call

Kyverno's apiCall serviceCall helper implicitly injects the Kyverno controller service account token into requests when policies lack an explicit Authorization header, allowing exfiltration to attacker-controlled endpoints and unauthorized actions.

kyverno token-leak cloud
2r 1t 5i
high advisory

free5gc UDR Improper Path Validation Allows Unauthenticated Access to Traffic Influence Subscriptions

An improper path validation vulnerability exists in the free5gc UDR service, allowing unauthenticated attackers with access to the 5G Service Based Interface (SBI) to read Traffic Influence Subscriptions.

free5GC UDR path-validation information-disclosure
2r 2t 1i
high advisory

CVE-2026-32183: Windows Snipping Tool Command Injection Vulnerability

CVE-2026-32183 is a command injection vulnerability in the Windows Snipping Tool that allows a local attacker to execute arbitrary code.

command-injection windows vulnerability
2r 2t 1c
high advisory

Windows Win32K Untrusted Pointer Dereference Vulnerability (CVE-2026-32222)

CVE-2026-32222 is an untrusted pointer dereference vulnerability in the Windows Win32K ICOMP component, allowing a local attacker to escalate privileges.

privilege-escalation windows cve-2026-32222
2r 1t 1c 1i
high advisory

CVE-2026-32156 Use-After-Free Vulnerability in Windows UPnP Device Host

CVE-2026-32156 is a use-after-free vulnerability in the Windows Universal Plug and Play (UPnP) Device Host service that allows an unauthorized attacker to execute code locally.

use-after-free windows upnp code-execution
2r 2t 1c 1i
high advisory

CVE-2026-26183 Windows RPC API Local Privilege Escalation

CVE-2026-26183 allows a locally authenticated attacker to escalate privileges due to improper access control within the Windows RPC API.

privilege-escalation windows rpc
2r 1t 1c 1i
high advisory

Windows Server Update Service (WSUS) Privilege Escalation via CVE-2026-26174

CVE-2026-26174 is a race condition vulnerability in Windows Server Update Service that allows an authorized attacker to elevate privileges locally.

cve-2026-26174 privilege-escalation windows wsus
2r 1t 1c 2i
high advisory

Adobe Connect XSS Vulnerability Leading to Privilege Escalation

Adobe Connect versions 2025.3, 12.10, and earlier are susceptible to a Cross-Site Scripting (XSS) vulnerability (CVE-2026-34617) that can lead to privilege escalation if a user interacts with a malicious URL or compromised web page.

adobe-connect xss cve-2026-34617 privilege-escalation
2r 1t 1c
high advisory

CVE-2026-33100: Windows WinSock Use-After-Free Privilege Escalation

CVE-2026-33100 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.

cve-2026-33100 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

Microsoft Graphics Component Heap-based Buffer Overflow Vulnerability (CVE-2026-32221)

CVE-2026-32221 is a heap-based buffer overflow vulnerability in the Microsoft Graphics Component, allowing a local attacker to execute arbitrary code.

cve-2026-32221 buffer-overflow local-privilege-escalation graphics-component
2r 2t 1c 1i
high advisory

CVE-2026-32224 Use-After-Free in Windows Server Update Service

CVE-2026-32224 is a use-after-free vulnerability in the Windows Server Update Service that allows a locally authenticated attacker to elevate privileges.

cve-2026-32224 use-after-free privilege-escalation windows
2r 1t 1c
high advisory

Microsoft Brokering File System Double Free Privilege Escalation (CVE-2026-32219)

CVE-2026-32219 is a double free vulnerability in the Microsoft Brokering File System, allowing an authorized attacker to escalate privileges locally on a vulnerable Windows system.

privilege-escalation windows
2r 1t 1c
high advisory

Microsoft PowerPoint Use-After-Free Vulnerability (CVE-2026-32200)

CVE-2026-32200 is a use-after-free vulnerability in Microsoft Office PowerPoint that allows an unauthorized attacker to achieve local code execution by enticing a user to open a specially crafted PowerPoint document.

cve-2026-32200 use-after-free powerpoint code-execution
2r 1t 1c 2i
high advisory

CVE-2026-32165 Use-After-Free in Windows User Interface Core

CVE-2026-32165 is a use-after-free vulnerability in Windows User Interface Core that allows a locally authenticated attacker to elevate privileges.

privilege-escalation use-after-free windows
2r 1t 1c
high advisory

Windows COM Privilege Escalation via CVE-2026-32162

CVE-2026-32162 allows an unauthorized attacker to achieve local privilege escalation in Windows COM by exploiting the acceptance of extraneous untrusted data with trusted data.

privilege-escalation windows CVE-2026-32162
2r 1t 1c 2i
high advisory

Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32159)

CVE-2026-32159 is a race condition vulnerability in Windows Push Notifications, allowing a local attacker with low privileges to elevate privileges by exploiting concurrent execution using a shared resource with improper synchronization.

privilege-escalation race-condition windows
2r 1t 1c 1i
high advisory

Microsoft Brokering File System Race Condition Vulnerability (CVE-2026-32091)

CVE-2026-32091 is a race condition vulnerability in the Microsoft Brokering File System, allowing an unauthenticated local attacker to escalate privileges.

privilege-escalation race-condition windows
2r 1t 1c
high advisory

CVE-2026-32087 Function Discovery Service Privilege Escalation

CVE-2026-32087 is a heap-based buffer overflow vulnerability in the Function Discovery Service (fdwsd.dll) that allows an authorized local attacker to elevate privileges on a Windows system.

privilege-escalation heap-overflow cve windows
2r 1t 1c
high advisory

CVE-2026-32070: Windows CLFS Driver Use-After-Free Privilege Escalation

A use-after-free vulnerability, CVE-2026-32070, exists in the Windows Common Log File System (CLFS) driver, enabling a locally authenticated attacker to escalate privileges on a vulnerable system.

privilege-escalation use-after-free windows
2r 1t 1c 1i
high advisory

Windows UPnP Device Host Untrusted Pointer Dereference Vulnerability (CVE-2026-27920)

CVE-2026-27920 is a local privilege escalation vulnerability in the Windows Universal Plug and Play (UPnP) Device Host due to an untrusted pointer dereference.

windows privilege-escalation cve
2r 1t 1c 2i
high advisory

Windows Shell Race Condition Vulnerability (CVE-2026-27918)

CVE-2026-27918 is a race condition vulnerability in Windows Shell, allowing a local attacker to elevate privileges due to improper synchronization when accessing shared resources.

race-condition privilege-escalation windows
2r 1t 1c
high advisory

Windows Projected File System Buffer Over-Read Privilege Escalation (CVE-2026-26184)

CVE-2026-26184 is a buffer over-read vulnerability in the Windows Projected File System (ProjFS) that allows a local attacker to elevate privileges.

cve-2026-26184 privilege-escalation windows
2r 1t 1c 1i
high advisory

Adobe Connect Reflected XSS Vulnerability (CVE-2026-27245)

Adobe Connect versions 2025.3, 12.10, and earlier are vulnerable to a reflected Cross-Site Scripting (XSS) attack, enabling attackers to execute malicious JavaScript in a victim's browser by enticing them to visit a crafted URL.

xss adobe-connect cve-2026-27245 reflected-xss
2r 1t 1c 3i
high advisory

CVE-2026-26176 Windows CSC Driver Privilege Escalation

CVE-2026-26176 is a heap-based buffer overflow vulnerability in the Windows Client Side Caching driver (csc.sys), which allows an authorized attacker to elevate privileges locally.

privilege-escalation buffer-overflow windows
2r 1t 1c 1i
high advisory

Windows Remote Desktop Licensing Service Privilege Escalation via CVE-2026-26159

CVE-2026-26159 allows a local attacker to escalate privileges on Windows systems due to a missing authentication check in the Remote Desktop Licensing Service (RDLS).

cve-2026-26159 privilege-escalation windows
2r 1t 1c 1i
high advisory

Fortinet FortiAnalyzer and FortiManager Cloud Heap-Based Buffer Overflow Vulnerability (CVE-2026-22828)

CVE-2026-22828 is a heap-based buffer overflow in Fortinet FortiAnalyzer and FortiManager Cloud versions 7.6.2 through 7.6.4, potentially allowing a remote unauthenticated attacker to execute arbitrary code with a significant preparation effort due to ASLR and network segmentation.

cve-2026-22828 fortinet heap-overflow cloud
2r 2t 1c
high advisory

State-Sponsored Actors Leveraging Vulnerabilities and Identity for Persistent Access (2025)

In 2025, state-sponsored actors from China, Russia, North Korea, and Iran leveraged vulnerabilities and identity compromise for initial access, focusing on persistence for long-term espionage or disruption.

state-sponsored apt persistence vulnerability-exploitation
2r 6t
high advisory

Eclipse Jetty HTTP/1.1 Request Smuggling via Chunk Extensions (CVE-2026-2332)

Eclipse Jetty's HTTP/1.1 parser is vulnerable to request smuggling due to improper handling of chunk extensions, allowing attackers to inject malicious requests.

request-smuggling jetty cve-2026-2332 funky-chunks
2r 3t 1c 2i
high advisory

PHPGurukul Daily Expense Tracking System SQL Injection Vulnerability

A remote SQL injection vulnerability exists in PHPGurukul Daily Expense Tracking System 1.1 within the /register.php file, where manipulation of the email argument allows for arbitrary SQL command execution, with a public exploit available.

sqli cve-2026-6193 php web-application
2r 1t 1c
high advisory

libTIFF Vulnerability Allows Code Execution and DoS

A remote, anonymous attacker can exploit a vulnerability in libTIFF to potentially execute arbitrary code or cause a denial-of-service condition.

libTIFF code execution denial of service
2r 2t
high advisory

RUGGEDCOM CROSSBOW SAM-P Privilege Escalation Vulnerability (CVE-2026-27668)

CVE-2026-27668 allows authenticated User Administrators in RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) to escalate their privileges and access any device group, due to an incorrect privilege assignment in versions prior to V5.8.

ruggedcom privilege-escalation cve-2026-27668 sam-p
2r 1t 1c
high advisory

Industrial Edge Management Authentication Bypass Vulnerability (CVE-2026-33892)

CVE-2026-33892 allows an unauthenticated remote attacker to bypass authentication and impersonate a legitimate user in affected Industrial Edge Management Pro and Virtual versions by exploiting improper enforcement of user authentication on remote connections to devices, potentially enabling unauthorized access and control.

CVE-2026-33892 authentication-bypass industrial-control-system edge-management
2r 1t 1c
high advisory

SINEC NMS Authentication Bypass Vulnerability (CVE-2026-24032)

An authentication bypass vulnerability (CVE-2026-24032) exists in SINEC NMS versions prior to V4.0 SP3 due to insufficient user identity validation in the UMC component, allowing unauthenticated remote attackers to gain unauthorized access.

sinec-nms authentication-bypass cve-2026-24032 siemens
2r 1t 1c 1i
high advisory

Smart Post Show WordPress Plugin PHP Object Injection Vulnerability

The Smart Post Show WordPress plugin versions 3.0.12 and earlier are vulnerable to PHP Object Injection via deserialization of untrusted input in the import_shortcodes() function, potentially leading to remote code execution if a suitable POP chain is present.

wordpress php object-injection rce
2r 1t 1c
high advisory

NestJS Microservices Denial-of-Service via Recursive handleData

A denial-of-service vulnerability exists in NestJS's @nestjs/microservices package, affecting versions 11.1.18 and earlier, where an attacker can send multiple small, valid JSON messages within a single TCP frame, causing a stack overflow.

nestjs denial-of-service microservices
2r 1t
high advisory

MinIO Unauthenticated Object Write Vulnerability

Two authentication bypass vulnerabilities in MinIO allow writing arbitrary objects to any bucket with only a valid access key, without the secret key or valid signature, impacting all MinIO deployments.

minio authentication-bypass object-storage
2r 3t
high advisory

ImageMagick Heap Buffer Overflow Vulnerability (CVE-2026-33901)

ImageMagick versions before 7.1.2-19 and 6.9.13-44 are vulnerable to a heap buffer overflow in the MVG decoder, potentially leading to an out-of-bounds write when processing a crafted image, which can result in denial of service or arbitrary code execution.

imagemagick heap-buffer-overflow cve-2026-33901
2r 1t 1c
high advisory

SQL Injection Vulnerability in Simple Content Management System 1.0

A remote SQL injection vulnerability exists in code-projects Simple Content Management System 1.0, specifically affecting the /web/admin/login.php file where manipulation of the 'User' argument allows unauthenticated attackers to execute arbitrary SQL queries.

sqli web-application cve-2026-6182
2r 1t 1c 5i
high advisory

VMware Tanzu Spring Cloud Gateway Security Bypass Vulnerability

An anonymous, remote attacker can exploit a vulnerability in VMware Tanzu Spring Cloud Gateway to bypass security measures, potentially gaining unauthorized access or control.

spring-cloud-gateway security-bypass defense-evasion
1r 1t
high advisory

SQL Injection Vulnerability in Faculty Management System

A remote attacker can exploit an SQL injection vulnerability (CVE-2026-6167) in the code-projects Faculty Management System 1.0 by manipulating the ID argument in the /subject-print.php file, potentially leading to data exfiltration or modification.

sql-injection web-application vulnerability
2r 1t 1c
high advisory

ZTE ZXEDM iEMS Password Reset Vulnerability (CVE-2026-40436)

CVE-2026-40436 is a vulnerability in the ZTE ZXEDM iEMS product that allows attackers to reset user passwords due to improper access control on the user list acquisition function within the cloud EMS portal, potentially leading to unauthorized operations and system compromise.

cve password-reset zte zxedm cloud
2r 2t 1c
high advisory

SQL Injection Vulnerability in Vehicle Showroom Management System 1.0

A remote attacker can exploit an SQL injection vulnerability (CVE-2026-6165) in code-projects Vehicle Showroom Management System 1.0 by manipulating the ID parameter in /util/Login_check.php, potentially leading to unauthorized data access and modification.

sqli web-application cve-2026-6165
2r 1t 1c
high advisory

SQL Injection Vulnerability in Lost and Found Thing Management 1.0

A remote SQL injection vulnerability (CVE-2026-6163) exists in code-projects Lost and Found Thing Management 1.0 via manipulation of the 'cat' parameter in /catageory.php, potentially allowing attackers to read, modify, or delete database information.

sql-injection web-application vulnerability
2r 1t 1c
high advisory

Samsung Escargot Out-of-Bounds Write Vulnerability (CVE-2026-25207)

CVE-2026-25207 is an out-of-bounds write vulnerability in Samsung Open Source Escargot that allows for buffer overflows, potentially leading to arbitrary code execution.

cve-2026-25207 out-of-bounds write buffer overflow samsung escargot
2r 2t 1c
high advisory

Simple ChatBox Unauthenticated SQL Injection Vulnerability (CVE-2026-6161)

CVE-2026-6161 is an unauthenticated SQL injection vulnerability in the Simple ChatBox application (<= 1.0) that can be exploited by sending a crafted HTTP request to `/chatbox/insert.php`.

sql-injection web-application cve-2026-6161
2r 1t 1c
high advisory

Samsung Escargot Heap-Based Buffer Overflow Vulnerability (CVE-2026-25205)

A heap-based buffer overflow vulnerability in Samsung Open Source Escargot (CVE-2026-25205) allows for out-of-bounds write operations, potentially leading to arbitrary code execution.

cve-2026-25205 heap-based buffer overflow escargot
2r 1t 1c
high advisory

Mesa WebGPU Out-of-Bounds Write Vulnerability (CVE-2026-40393)

An out-of-bounds write vulnerability exists in Mesa versions before 25.3.6 and 26 before 26.0.1 due to an untrusted allocation size in WebGPU, potentially leading to code execution.

cve vulnerability webgpu
2r 1c
high advisory

MyT-PM 1.5.1 SQL Injection Vulnerability

MyT-PM 1.5.1 is vulnerable to SQL injection, allowing authenticated attackers to execute arbitrary SQL queries via the Charge[group_total] parameter.

sql-injection web-application cve-2019-25713
2r 1t 1c 4i
high advisory

Dolibarr ERP-CRM 8.0.4 SQL Injection Vulnerability

Dolibarr ERP-CRM 8.0.4 is vulnerable to SQL injection via the rowid parameter in the admin dict.php endpoint, allowing attackers to execute arbitrary SQL queries and extract sensitive database information.

sqli cve-2019-25710 dolibarr web-application
2r 1t 1c
high advisory

ImpressCMS 1.3.11 Time-Based Blind SQL Injection Vulnerability

ImpressCMS 1.3.11 contains a time-based blind SQL injection vulnerability allowing authenticated attackers to manipulate database queries by injecting SQL code through the 'bid' parameter via POST requests to the admin.php endpoint.

sqli impresscms cve-2019-25703
2r 1t 1c 5i
high advisory

eBrigade ERP 4.5 SQL Injection Vulnerability (CVE-2019-25707)

eBrigade ERP 4.5 is vulnerable to SQL injection via the 'id' parameter in pdf.php, allowing authenticated attackers to execute arbitrary SQL queries and extract sensitive database information.

sql-injection web-application cve-2019-25707
2r 1t 1c 5i
high advisory

Easy Video to iPod Converter 1.6.20 Local Buffer Overflow Vulnerability

Easy Video to iPod Converter 1.6.20 is vulnerable to a local buffer overflow in the user registration field, allowing a local attacker to overwrite the structured exception handler (SEH) by providing a crafted payload exceeding 996 bytes in the username field, potentially leading to arbitrary code execution with user privileges.

cve-2019-25701 buffer-overflow local-privilege-escalation windows
2r 2t 1c
high advisory

CMSsite 1.0 SQL Injection Vulnerability (CVE-2019-25697)

CMSsite 1.0 is vulnerable to unauthenticated SQL injection (CVE-2019-25697) via the cat_id parameter in category.php, allowing attackers to extract sensitive database information.

sqli cve-2019-25697 webserver
2r 2t 1c
high advisory

HTML5 Video Player 1.2.5 Local Buffer Overflow Vulnerability

HTML5 Video Player version 1.2.5 is vulnerable to a local buffer overflow, allowing attackers to execute arbitrary code by providing an oversized key code string through the Help Register dialog.

buffer-overflow code-execution html5-video-player
2r 4t 1c
high advisory

zhayujie chatgpt-on-wechat CowAgent Authentication Bypass Vulnerability (CVE-2026-6126)

CVE-2026-6126 is an unauthenticated remote code execution vulnerability in zhayujie chatgpt-on-wechat CowAgent 2.0.4 due to missing authentication in the Administrative HTTP Endpoint.

CVE-2026-6126 authentication-bypass web-application
2r 1t 1c
high advisory

SiYuan Zero-Click NTLM Theft and Blind SSRF via Mermaid Diagrams

SiYuan is vulnerable to zero-click NTLM hash theft on Windows and blind SSRF on all platforms due to insecure Mermaid.js configuration, where a malicious Mermaid diagram containing a protocol-relative URL can be injected into a note, causing the Electron client to fetch the URL, triggering SMB authentication on Windows and sending the victim's NTLMv2 hash to the attacker. On macOS and Linux, the request acts as a tracking pixel and blind SSRF.

siyuan ntlm ssrf credential-theft mermaid
2r 3t 1c
high advisory

Red Hat OpenShift AI odh-dashboard Kubernetes Token Disclosure (CVE-2026-5483)

CVE-2026-5483 is a high-severity vulnerability in the `odh-dashboard` component of Red Hat OpenShift AI (RHOAI) that allows for the disclosure of Kubernetes Service Account tokens through a NodeJS endpoint, potentially leading to unauthorized access to Kubernetes resources.

openshift kubernetes token-disclosure cve-2026-5483
2r 1t 1c
high advisory

Postiz SSRF Vulnerability (CVE-2026-40168)

Postiz, an AI social media scheduling tool, is vulnerable to Server-Side Request Forgery (SSRF) in versions prior to 2.21.5, allowing attackers to access internal resources.

ssrf cve-2026-40168 postiz
2r 1c
high advisory

Math.js Improperly Controlled Modification of Object Attributes Leads to RCE

A vulnerability in math.js versions before 15.2.0 allows for arbitrary JavaScript execution through the expression parser when evaluating user-supplied expressions.

mathjs rce expression-injection
2r 1t
high advisory

Helm Plugin Path Traversal Vulnerability

A path traversal vulnerability in Helm versions 4.0.0 to 4.1.3 allows a malicious plugin to write files to arbitrary locations on the filesystem, leading to potential system compromise.

helm path-traversal vulnerability plugin kubernetes
2r 1t 1c
high advisory

DotNetNuke.Core Stored XSS via SVG Upload

DotNetNuke.Core is vulnerable to stored cross-site scripting (XSS) where a user can upload a specially crafted SVG file containing malicious scripts, potentially targeting both authenticated and unauthenticated DNN users, with successful exploitation requiring user interaction and leading to high impact on confidentiality, integrity, and availability.

dotnetnuke xss svg web-application
2r 2t
high advisory

CouchCMS Privilege Escalation via f_k_levels_list Parameter Manipulation (CVE-2026-29002)

CouchCMS is vulnerable to privilege escalation, allowing authenticated Admin-level users to create SuperAdmin accounts by manipulating the 'f_k_levels_list' parameter during user creation, granting them full application control.

privilege-escalation web-application cve
2r 1t 1c
high advisory

Chamilo LMS SSRF Vulnerability in Social Wall Feature

A Server-Side Request Forgery (SSRF) vulnerability exists in Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3, allowing authenticated attackers to make arbitrary HTTP requests, scan internal ports, and access cloud instance metadata via the Social Wall feature.

chamilo ssrf cve-2026-31941 lms
2r 1t 1c
high advisory

Chamilo LMS REST API Key Brute-Force Vulnerability (CVE-2026-33710)

Chamilo LMS versions prior to 1.11.38 and 2.0.0-RC.3 generate predictable REST API keys, allowing attackers with knowledge of a username and approximate key creation time to brute-force access.

cve-2026-33710 chamilo api-key brute-force webserver
2r 1t 1c
high advisory

Chamilo LMS Privilege Escalation via REST API (CVE-2026-33706)

Chamilo LMS before 1.11.38 allows authenticated users with a REST API key to escalate their privileges by modifying their user status via the update_user_from_username endpoint, potentially granting unauthorized course management capabilities.

privilege-escalation web-application CVE-2026-33706
2r 1t 1c
high advisory

Chamilo LMS Path Traversal Vulnerability (CVE-2026-31939)

A path traversal vulnerability (CVE-2026-31939) in Chamilo LMS versions prior to 1.11.38 allows authenticated attackers to delete arbitrary files via unsanitized user input in the 'test' parameter of savescores.php.

path-traversal file-deletion chamilo-lms
2r 1t 1c 1i
high advisory

Case Theme User WordPress Plugin Local File Inclusion Vulnerability (CVE-2025-5804)

CVE-2025-5804 is a PHP Local File Inclusion vulnerability in the Case Theme User WordPress plugin before version 1.0.4 due to improper filename control in include/require statements, potentially allowing attackers to execute arbitrary code by including malicious local files.

php lfi wordpress cve-2025-5804
2r 1t 1c 1i
high advisory

CactusThemes VideoPro Theme Local File Inclusion Vulnerability (CVE-2025-58913)

CVE-2025-58913 is a PHP Local File Inclusion vulnerability in the CactusThemes VideoPro WordPress theme, affecting versions from n/a through 2.3.8.1 due to improper control of the filename for include/require statements, potentially allowing unauthorized file access.

wordpress lfi cve-2025-58913
2r 1t 1c
high advisory

BugSink Authenticated File Write Vulnerability (CVE-2026-40162)

BugSink 2.1.0 is vulnerable to an authenticated file write vulnerability (CVE-2026-40162) allowing an attacker with a valid authentication token to write arbitrary content to the filesystem, potentially leading to code execution or data compromise.

cve-2026-40162 file-write authentication
2r 1t 1c 1i
high advisory

@sveltejs/adapter-node BODY_SIZE_LIMIT Bypass Vulnerability

A vulnerability exists in @sveltejs/adapter-node where requests could bypass the `BODY_SIZE_LIMIT` on SvelteKit applications, potentially leading to denial of service.

sveltekit denial-of-service vulnerability
2r 1t 1c
high advisory

Chartbrew Cross-Tenant Authorization Bypass Vulnerability

Chartbrew versions prior to 4.9.0 are vulnerable to a cross-tenant authorization bypass, allowing an authenticated attacker to access project data belonging to other teams.

chartbrew authorization-bypass web-application
2r 1t 1c
high advisory

Chamilo LMS Insecure Direct Object Reference Vulnerability (CVE-2026-32930)

An Insecure Direct Object Reference (IDOR) vulnerability in Chamilo LMS (CVE-2026-32930) allows authenticated teachers to modify gradebook evaluation settings of other courses by manipulating the 'editeval' GET parameter, leading to unauthorized data modification.

idor chamilo lms cve-2026-32930
2r 2t 1c
high advisory

OpenClaw Insufficient Access Control in Gateway Agent Session Reset (CVE-2026-35660)

OpenClaw before 2026.3.23 contains an insufficient access control vulnerability in the Gateway agent /reset endpoint that allows callers with operator.write permission to reset admin sessions by invoking /reset or /new messages with an explicit sessionKey, bypassing operator.admin requirements.

cve-2026-35660 openclaw access-control privilege-escalation
2r 1t 1c 5i
high advisory

OpenClaw Path Traversal Vulnerability (CVE-2026-35668)

OpenClaw before 2026.3.24 is vulnerable to path traversal, allowing sandboxed agents to read arbitrary files from other agents' workspaces via manipulated URL parameters.

path-traversal vulnerability openclaw
2r 1t 1c
high advisory

OpenClaw Arbitrary Code Execution via Malicious .npmrc File

OpenClaw before 2026.3.24 is vulnerable to arbitrary code execution via local plugin and hook installation, where an attacker can craft a .npmrc file with a git executable override to execute malicious code during npm install.

cve-2026-35641 code-execution npm
2r 1t 1c 1i
high advisory

Multiple External EDR Alerts by Host

This rule detects multiple external EDR alerts on the same host, indicating a potential compromise, by analyzing alert data from various EDR solutions like CrowdStrike, SentinelOne, and M365 Defender to identify hosts triggering multiple alerts, enabling prioritization of investigation and response.

threat-detection edr endpoint
3r 3t
high advisory

Multiple Cloud Secrets Accessed by Single Source IP

A single source IP accessing secret-management APIs across multiple cloud providers (AWS, GCP, Azure) and Kubernetes clusters within a short timeframe indicates potential credential theft, session hijacking, or token replay.

credential-access cloud kubernetes
2r 1t
high advisory

AWS IAM Login Profile Added for Root

An adversary with temporary root access in AWS may create a login profile for the root account to establish persistent console access, even if the original access keys are rotated or disabled.

cloud aws iam persistence
2r 2t
high advisory

Synology SSL VPN Client Plaintext Password Storage Vulnerability (CVE-2021-47961)

Synology SSL VPN Client before 1.4.5-0684 stores passwords in plaintext, allowing remote attackers to potentially access or manipulate user PIN codes, leading to unauthorized VPN configuration and traffic interception.

plaintext-password vpn synology
2r 1t 1c
high advisory

Vehicle Showroom Management System SQL Injection Vulnerability (CVE-2026-6038)

A remote SQL injection vulnerability (CVE-2026-6038) exists in the code-projects Vehicle Showroom Management System 1.0, specifically affecting the /util/RegisterCustomerFunction.php file by manipulating the BRANCH_ID argument.

cve-2026-6038 sql-injection web-application
2r 3t 1c
high advisory

SQL Injection Vulnerability in Vehicle Showroom Management System 1.0 (CVE-2026-6036)

A remote SQL injection vulnerability (CVE-2026-6036) exists in the Vehicle Showroom Management System 1.0 due to improper sanitization of the VEHICLE_ID parameter in /util/VehicleDetailsFunction.php, potentially allowing attackers to execute arbitrary SQL commands.

sqli cve-2026-6036 web-application
2r 2t 1c
high advisory

Perfmatters WordPress Plugin Arbitrary File Overwrite Vulnerability (CVE-2026-4351)

The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal, allowing authenticated attackers with subscriber-level access to overwrite arbitrary files on the server with a fixed PHP docblock content, potentially causing denial of service.

wordpress perfmatters file-overwrite path-traversal
2r 2t 1c
high advisory

Samsung MagicINFO 9 Server Local Privilege Escalation via Incorrect Default Permissions (CVE-2026-25203)

Samsung MagicINFO 9 Server versions prior to 21.1091.1 are susceptible to a local privilege escalation vulnerability due to incorrect default permissions, potentially allowing a low-privilege user to gain elevated privileges on the system.

privilege-escalation samsung magicinfo
2r 1t 1c 1i
high advisory

PraisonAI Unauthenticated WebSocket Allows Resource Exhaustion

PraisonAI before version 4.5.128 is vulnerable to resource exhaustion and API credit draining due to the `/media-stream` WebSocket endpoint accepting unauthenticated connections, allowing attackers to exhaust server resources and drain OpenAI API credits.

cve-2026-40116 resource-exhaustion websocket api-abuse cloud
2r 1t 1c
high advisory

PraisonAI SSRF Vulnerability via Unvalidated Webhook URL

PraisonAI versions prior to 4.5.128 are vulnerable to Server-Side Request Forgery (SSRF) due to a lack of URL validation on the webhook_url parameter in the /api/v1/runs endpoint, allowing unauthenticated attackers to send arbitrary POST requests from the server.

ssrf praisonai cve-2026-40114 web-application
2r 3t 1c
high advisory

OpenClaw Improper Access Control Vulnerability (CVE-2026-34512)

OpenClaw before 2026.3.25 contains an improper access control vulnerability (CVE-2026-34512) in the HTTP /sessions/:sessionKey/kill route, allowing any authenticated user to terminate arbitrary subagent sessions.

access-control vulnerability webserver
2r 1t 1c
high advisory

Nimiq Blockchain Timestamp Manipulation Vulnerability

A vulnerability in nimiq-blockchain versions 1.3.0 and earlier allows malicious validators to manipulate block timestamps, leading to inflation of the monetary supply.

blockchain timestamp-manipulation inflation
2r 4t 1c
high threat

WordPress adivaha Travel Plugin SQL Injection Vulnerability (CVE-2023-54359)

The WordPress adivaha Travel Plugin version 2.3 is vulnerable to time-based blind SQL injection via the 'pid' GET parameter, allowing unauthenticated attackers to inject SQL code through the /mobile-app/v3/ endpoint for potential data extraction or denial of service.

exploited wordpress sql-injection cve-2023-54359
2r 1t 1c 2i
high advisory

bsv-sdk and bsv-wallet Credential Forgery Vulnerability

The bsv-sdk and bsv-wallet packages are vulnerable to credential forgery because the `acquire_certificate` function persists certificate records to storage without verifying the certifier's signature, allowing attackers to forge identity certificates.

credential-forgery ruby bsv-sdk bsv-wallet
2r 1t
high advisory

MetaGPT Bash.run Command Injection Vulnerability (CVE-2026-5974)

A command injection vulnerability exists in FoundationAgents MetaGPT version 0.8.1 affecting the Bash.run function, enabling remote attackers to execute arbitrary OS commands via crafted input.

command-injection metagpt cve-2026-5974
2r 1t 1c
high advisory

CVE-2026-4436: Modbus Odorant Injection Manipulation

A low-privileged remote attacker can exploit CVE-2026-4436 by sending Modbus packets to manipulate register values controlling odorant injection in gas lines, potentially leading to hazardous conditions.

cve modbus industrial-control-system odorant-injection
2r 2t 1c
high advisory

HDF5 Heap Use-After-Free Vulnerability in h5dump (CVE-2026-34734)

A heap-use-after-free vulnerability (CVE-2026-34734) in HDF5 version 1.14.1-2 and earlier within the h5dump helper utility can be triggered by a malicious h5 file, leading to arbitrary code execution.

hdf5 heap-use-after-free cve-2026-34734 h5dump
2r 1t 1c
high advisory

MetaGPT Code Injection Vulnerability (CVE-2026-5970)

A code injection vulnerability, CVE-2026-5970, exists in FoundationAgents MetaGPT up to version 0.8.1, allowing remote attackers to execute arbitrary code via manipulation of the `check_solution` function in the HumanEvalBenchmark/MBPPBenchmark component.

code-injection metagpt cve-2026-5970
2r 1t 1c
high advisory

FoundationAgents MetaGPT Code Injection Vulnerability (CVE-2026-5971)

A code injection vulnerability exists in FoundationAgents MetaGPT <= 0.8.1 within the ActionNode.xml_fill function, allowing remote attackers to inject code due to improper neutralization of directives in dynamically evaluated code.

code-injection vulnerability metagpt CVE-2026-5971
2r 1t 1c
high advisory

BSV Ruby SDK Improper ARC Response Handling

BSV Ruby SDK versions before 0.8.2 improperly handle ARC responses, treating certain failure statuses as successful broadcasts, potentially tricking applications into trusting unaccepted transactions; version 0.8.2 resolves this vulnerability.

bsv ruby blockchain vulnerability
2r 1t 1c
high advisory

GNUTLS Denial of Service via Malformed ClientHello (CVE-2026-1584)

A remote, unauthenticated attacker can exploit CVE-2026-1584 in gnutls by sending a specially crafted ClientHello message with an invalid Pre-Shared Key (PSK) binder value during the TLS handshake, leading to a NULL pointer dereference and a denial-of-service condition.

cve-2026-1584 denial-of-service gnutls
2r 2t 1c
high advisory

SaaS Notification Pipeline Phishing and Medusa Ransomware Exploitation

Threat actors are weaponizing legitimate SaaS notification pipelines to deliver phishing and spam emails, bypassing traditional email authentication protocols, and Storm-1175 is exploiting CVE-2026-1731 to deploy Medusa ransomware.

saas phishing ransomware medusa
1r 1t 1c 2i
high advisory

MinIO S3 Select CSV Parsing Denial of Service

MinIO's S3 Select feature is vulnerable to denial of service due to unbounded memory allocation when processing CSV files without newlines, leading to memory exhaustion and server crashes.

dos minio s3select
2r 1t
high advisory

Laravel Passport Authentication Bypass Vulnerability (CVE-2026-39976)

Laravel Passport versions 13.0.0 before 13.7.1 contain an authentication bypass vulnerability (CVE-2026-39976) where machine-to-machine tokens can authenticate as a real user due to improper validation of the JWT sub claim.

cve-2026-39976 laravel oauth2 authentication bypass
2r 1t 1c
high advisory

Tmds.DBus Vulnerability Allows Signal Spoofing and Resource Exhaustion

Tmds.DBus and Tmds.DBus.Protocol are vulnerable to signal spoofing, resource exhaustion, and application crashes due to malformed messages from malicious D-Bus peers on the same bus.

dbus vulnerability dotnet
2r 1t 1c
high advisory

Plane Project Management Tool SSRF Vulnerability (CVE-2026-39843)

Plane project management tool versions before 1.3.0 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated low-privilege attackers to read internal resources by exploiting the favicon fetch functionality.

ssrf cve-2026-39843 plane project-management
2r 1t 1c
high advisory

osslsigncode Stack Buffer Overflow Vulnerability (CVE-2026-39853)

A stack buffer overflow vulnerability (CVE-2026-39853) exists in osslsigncode versions prior to 2.12 due to insufficient validation of digest length during PKCS#7 signature verification, potentially leading to arbitrary code execution.

osslsigncode buffer-overflow authenticode code-signing CVE-2026-39853
2r 1t 1c
high advisory

OPNsense LDAP Injection Vulnerability (CVE-2026-34578)

OPNsense versions prior to 26.1.6 are vulnerable to LDAP injection, allowing unauthenticated attackers to enumerate valid LDAP usernames and bypass group membership restrictions via the WebGUI login page.

ldap-injection vulnerability opnsense
2r 1t 1c
high advisory

OpenClaw RCE via Build Tool Environment Variable Injection

OpenClaw versions prior to 2026.4.8 are vulnerable to remote code execution (RCE) via build tool environment variable injection due to missing denylist entries for HGRCPATH, CARGO_BUILD_RUSTC_WRAPPER, RUSTC_WRAPPER, and MAKEFLAGS, allowing hostile environment variables to influence host exec commands.

rce environment-variable-injection openclaw
2r 2t
high advisory

OpenClaw Trust Model Vulnerability: System Prompt Channel Injection

OpenClaw versions 2026.4.2 and earlier are vulnerable to a trust model issue where authenticated wake hooks or mapped wake payloads can be promoted into the trusted System prompt channel, potentially leading to security vulnerabilities within the OpenClaw trust model.

openclaw trust-model system-prompt-injection npm
2r
high advisory

HashiCorp go-getter Arbitrary File Read Vulnerability (CVE-2026-4660)

HashiCorp's go-getter library up to v1.8.5 is vulnerable to arbitrary file reads on the file system during certain git operations through a maliciously crafted URL (CVE-2026-4660), potentially allowing attackers to access sensitive information.

cve-2026-4660 file-read go-getter information-disclosure
2r 1t 1c 1i
high advisory

OpenEXR DWA Lossy Decoder Heap Out-of-Bounds Write Vulnerability

A heap out-of-bounds write vulnerability exists in OpenEXR's DWA lossy decoder due to integer overflow during block pointer calculation, triggered via crafted DWAA files, leading to crashes during DCT execution.

openexr heap-overflow dwaa cve-2026-34589
2r 1t 1c 1i
high advisory

WAGO PLC OpenVPN Configuration Vulnerability (CVE-2024-1490)

An authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC to achieve arbitrary command execution on the device.

cve-2024-1490 wago-plc openvpn rce code-injection
2r 1t 1c 2i
high advisory

Vim Vulnerability Allows Local Code Execution

A local attacker can exploit a vulnerability in Vim to execute arbitrary code on a vulnerable system.

vim code-execution local-privilege-escalation
2r 1t
high advisory

Decolua 9router Authorization Bypass Vulnerability (CVE-2026-5842)

CVE-2026-5842 is an authorization bypass vulnerability in decolua 9router versions up to 0.3.47, allowing remote attackers to gain unauthorized access via manipulation of the /api endpoint.

cve authorization-bypass router
2r 1t 1c
high threat

PHPGurukul News Portal Project SQL Injection Vulnerability (CVE-2026-5837)

PHPGurukul News Portal Project version 4.1 is vulnerable to SQL injection via the Comment parameter in /news-details.php, potentially allowing remote attackers to execute arbitrary SQL queries.

exploited sql-injection web-application php CVE-2026-5837
2r 1t 1c
high advisory

code-projects Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5829)

A remote SQL injection vulnerability (CVE-2026-5829) exists in code-projects Simple IT Discussion Forum 1.0 due to improper handling of the 'post_id' argument in the '/pages/content.php' file, allowing attackers to execute arbitrary SQL queries.

sql-injection web-application cve-2026-5829
2r 1t 1c
high advisory

Simple IT Discussion Forum SQL Injection Vulnerability (CVE-2026-5827)

CVE-2026-5827 is a SQL injection vulnerability in code-projects Simple IT Discussion Forum 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'content' argument in /question-function.php.

sqli web-application injection
2r 1t 1c
high advisory

UAC (Unix-like Artifacts Collector) Command Injection Vulnerability

UAC before 3.3.0-rc1 is vulnerable to command injection in the _run_command() function, allowing attackers to execute arbitrary commands with the privileges of the UAC process through manipulated input values.

command-injection vulnerability uac
2r 1t 1c
high advisory

parseusbs Unsanitized LNK File Command Injection Vulnerability

parseusbs before 1.9 is vulnerable to OS command injection in parseUSBs.py due to unsanitized LNK file paths passed to os.popen(), allowing arbitrary command execution via crafted .lnk filenames.

command injection lnk parseusbs cve-2026-40029
2r 1t 1c
high advisory

parseusbs OS Command Injection Vulnerability (CVE-2026-40030)

parseusbs before 1.9 is vulnerable to OS command injection (CVE-2026-40030) due to improper sanitization of the volume listing path argument, potentially allowing arbitrary command execution via crafted volume paths.

command-injection vulnerability linux
2r 1t 1c 1i
high advisory

MemProcFS DLL and Shared Library Hijacking Vulnerability

MemProcFS before 5.17 is susceptible to DLL and shared-library hijacking due to unsafe library-loading patterns, allowing attackers to achieve arbitrary code execution by placing malicious libraries or manipulating the library search path.

dll-hijacking library-hijacking code-execution memprocfs cve-2026-40031
2r 3t 1c
high advisory

Sleuth Kit Path Traversal Vulnerability (CVE-2026-40024)

A path traversal vulnerability exists in The Sleuth Kit through 4.14.0 (tsk_recover), enabling attackers to write files to arbitrary locations via crafted filenames with path traversal sequences in a filesystem image, potentially leading to code execution.

path traversal code execution privilege escalation sleuth kit CVE-2026-40024
2r 3t 1c
high advisory

PraisonAI Unauthenticated Agent Activity Exposure (CVE-2026-39889)

PraisonAI versions prior to 4.5.115 expose agent activity without authentication due to improperly secured A2U event stream endpoints, potentially allowing unauthorized access to sensitive agent information.

cve-2026-39889 information-disclosure web-application
2r 1t 1c 1i
high advisory

Kamailio Out-of-Bounds Access Denial of Service Vulnerability

A remote attacker can exploit an out-of-bounds access vulnerability (CVE-2026-39863) in Kamailio versions prior to 6.1.1, 6.0.6, and 5.8.8 by sending a specially crafted data packet over TCP, causing a denial-of-service condition.

dos cve-2026-39863 kamailio
2r 1t 1c
high advisory

InvenTree Privilege Escalation via API Abuse (CVE-2026-35476)

A non-staff authenticated user can elevate their account to a staff level via a POST request against their user account endpoint in InvenTree versions prior to 1.2.7 and 1.3.0 due to improperly configured API write permissions.

inventree privilege-escalation cve-2026-35476
2r 1t 1c 1i
high advisory

React Server Components Denial of Service Vulnerability (CVE-2026-23869)

A denial of service vulnerability, CVE-2026-23869, exists in React Server Components due to excessive CPU usage triggered by specially crafted HTTP requests to Server Function endpoints, potentially leading to service disruption.

CVE-2026-23869 denial-of-service react
2r 1t 1c
high advisory

Immich Stored XSS Vulnerability in 360° Panorama Viewer (CVE-2026-35455)

A stored cross-site scripting (XSS) vulnerability in Immich versions before 2.7.0 allows authenticated users to inject arbitrary JavaScript via crafted equirectangular images, leading to session hijacking, data exfiltration, and unauthorized access.

immich xss cve-2026-35455 webserver
2r 2t 1c
high advisory

LORIS File Traversal Vulnerability (CVE-2026-34392)

A file traversal vulnerability (CVE-2026-34392) in LORIS versions 20.0.0 to before 27.0.3 and 28.0.1 allows an unauthenticated attacker to download arbitrary files via the static file router.

file-traversal web-application cve-2026-34392
2r 1t 1c
high advisory

mcp-from-openapi SSRF Vulnerability via Untrusted OpenAPI Specifications

The mcp-from-openapi library is vulnerable to Server-Side Request Forgery (SSRF) due to insecure handling of $ref pointers in OpenAPI specifications, allowing attackers to read local files, internal network resources, and cloud metadata endpoints by processing untrusted OpenAPI specifications.

ssrf openapi mcp-from-openapi
2r 2i
high advisory

Logstash Arbitrary File Write via Path Traversal (CVE-2026-33466)

CVE-2026-33466 describes a vulnerability in Logstash where improper validation of file paths within compressed archives allows arbitrary file writes, potentially leading to remote code execution.

path-traversal remote-code-execution logstash
2r 2t 1c
high advisory

Unauthenticated Access to kcp Cache Server

The kcp cache server is exposed without authentication, allowing unauthorized read access to sensitive data and a race condition for write access that could lead to temporary privilege escalation.

kcp kubernetes cache authentication authorization privilege-escalation
2r 2t
high advisory

XWiki Remote Code Execution via Unprotected Velocity Scripting API

XWiki is vulnerable to remote code execution due to an improperly protected scripting API, allowing users with script rights to bypass the Velocity scripting API sandbox and execute arbitrary code, leading to full instance compromise.

xwiki rce velocity scripting CVE-2026-33229
2r 2t
high advisory

CoolerControl-UI Stored XSS Vulnerability (CVE-2026-5301)

Unauthenticated attackers can perform a stored XSS attack against CoolerControl/coolercontrol-ui versions less than 4.0.0 by injecting malicious JavaScript into log entries, leading to potential service takeover.

xss cve-2026-5301 web-application
2r 2t 1c
high advisory

WooCommerce Ajax Product Filter Plugin Vulnerable to SQL Injection (CVE-2026-3396)

The WCAPF - WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection (CVE-2026-3396) due to insufficient escaping and SQL query preparation, allowing unauthenticated attackers to extract sensitive information from the database in versions up to 4.2.3.

woocommerce sqli cve-2026-3396 wordpress plugin
2r 1t 1c
high advisory

NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32864)

A memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds read in mgcore_SH_25_3!aligned_free(), potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted VI file.

cve-2026-32864 labview memory-corruption out-of-bounds-read
2r 4t 1c 1i
high advisory

Drizzle ORM SQL Injection Vulnerability (CVE-2026-39356)

Drizzle ORM versions before 0.45.2 and 1.0.0-beta.20 are vulnerable to SQL injection due to improper escaping of SQL identifiers, allowing attackers to inject malicious SQL code through manipulated input leading to potential data breaches.

sql-injection drizzle-orm cve-2026-39356 typescript orm
2r 5t 1c
high advisory

ChurchCRM Stored XSS Vulnerability in Person Property Management

A stored cross-site scripting (XSS) vulnerability in ChurchCRM versions prior to 7.0.0 allows authenticated users to inject arbitrary JavaScript code via dynamically assigned person properties, leading to potential session hijacking or account compromise when other users view the affected profile.

xss web-application churchcrm
2r 1t 2c
high advisory

D-LINK Router M60 and DIR-3040 'Airsnitch' Vulnerability

The 'Airsnitch' vulnerability in D-LINK Router M60 and DIR-3040 allows an attacker from an adjacent network to bypass security measures, disclose confidential information, and manipulate network traffic.

d-link router airsnitch vulnerability network-traffic-manipulation
2r 5t
high advisory

WordPress Plugin Vulnerability: Arbitrary File Upload in Gerador de Certificados – DevApps

The Gerador de Certificados – DevApps WordPress plugin is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.

wordpress plugin file-upload remote-code-execution
2r 2t 1c
high advisory

ASDA-Soft Stack-based Buffer Overflow Vulnerability (CVE-2026-5726)

A stack-based buffer overflow vulnerability exists in ASDA-Soft, potentially leading to arbitrary code execution, as identified by CVE-2026-5726 and reported by Deltaww with a CVSS v3.1 score of 7.8.

buffer-overflow asda-soft cve-2026-5726
2r 6t 1c 3i
high advisory

Product Feed PRO for WooCommerce Plugin CSRF Vulnerability (CVE-2026-3499)

The Product Feed PRO for WooCommerce WordPress plugin (versions 13.4.6-13.5.2.1) is vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing unauthenticated attackers to perform administrative actions by tricking an administrator into clicking a malicious link.

wordpress woocommerce csrf cve-2026-3499
3r 1t 1c
high advisory

Amazon Firecracker Virtio PCI Out-of-Bounds Write Vulnerability (CVE-2026-5747)

An out-of-bounds write vulnerability in Amazon Firecracker's virtio PCI transport (CVE-2026-5747) allows a local guest user with root privileges to potentially crash the VMM process or execute arbitrary code on the host.

cve-2026-5747 firecracker out-of-bounds write vmm virtio
3r 2t 1c
high advisory

WWBN AVideo SSRF Vulnerability via Incomplete CVE-2026-27732 Fix

WWBN AVideo is vulnerable to Server-Side Request Forgery (SSRF) due to an incomplete fix for CVE-2026-27732, allowing authenticated uploaders to bypass SSRF protection by providing a `downloadURL` with a common media extension, leading to internal response exfiltration.

ssrf avideo cve-2026-39370
2r 1t 2c 1i
high advisory

File Browser Share Links Accessible After Permission Revocation

File Browser share links remain accessible after Share/Download permissions are revoked, allowing continued access to shared files even after an administrator revokes the user's permissions.

filebrowser authorization-bypass github-advisory cve-2026-35604
3r 1t 1c
high advisory

LiteLLM Authentication Bypass via Password Hash Exposure and Pass-the-Hash

LiteLLM versions before 1.83.0 stored user passwords as unsalted SHA-256 hashes and exposed these hashes through multiple API endpoints, enabling an authenticated user to retrieve another user's password hash and use it to log in as that user due to the /v2/login endpoint accepting the raw SHA-256 hash without re-hashing, leading to potential privilege escalation.

litellm authentication-bypass credential-access privilege-escalation
2r 1t
high advisory

Unauthenticated Denial-of-Service and Information Disclosure in Podman Desktop

Podman Desktop versions prior to 1.26.2 expose an unauthenticated HTTP server, allowing remote attackers to trigger denial-of-service conditions by exhausting resources and extract sensitive information through verbose error responses.

podman-desktop denial-of-service information-disclosure cve-2026-34045 linux windows
2r 4t 1c
high advisory

PowerJob OpenAPI Endpoint Code Injection Vulnerability (CVE-2026-5739)

A code injection vulnerability exists in PowerJob versions 5.1.0, 5.1.1, and 5.1.2, allowing remote attackers to execute arbitrary code via the GroovyEvaluator.evaluate function in the OpenAPI Endpoint component by manipulating the nodeParams argument.

code-injection powerjob cve-2026-5739
2r 1t 1c
high advisory

OpenObserve SSRF via Improper IPv6 Validation

OpenObserve versions 0.70.3 and earlier are vulnerable to a server-side request forgery (SSRF) attack due to improper validation of IPv6 addresses in the validate_enrichment_url function, potentially allowing authenticated attackers to access internal services and retrieve sensitive cloud metadata.

ssrf openobserve cloud vulnerability
2r 1t 1c 1i
high advisory

NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32863)

A memory corruption vulnerability due to an out-of-bounds read in NI LabVIEW's `sentry_transaction_context_set_operation()` function could lead to information disclosure or arbitrary code execution by opening a specially crafted VI file.

cve-2026-32863 labview out-of-bounds read memory corruption arbitrary code execution information disclosure
2r 5t 1c
high advisory

NI LabVIEW Memory Corruption Vulnerability (CVE-2026-32862)

A memory corruption vulnerability (CVE-2026-32862) in NI LabVIEW versions 2026 Q1 (26.1.0) and prior, stemming from an out-of-bounds write in ResFileFactory::InitResourceMgr(), can lead to information disclosure or arbitrary code execution if a user opens a malicious VI file.

cve-2026-32862 ni-labview memory-corruption rce
2r 5t 1c
high advisory

NI LabVIEW LVLIB File Parsing Memory Corruption Vulnerability (CVE-2026-32860)

A memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds write when loading a corrupted LVLIB file, potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted .lvlib file.

cve-2026-32860 labview memory corruption out-of-bounds write lvlib
2r 2t 1c 1i
high advisory

NI LabVIEW LVCLASS File Parsing Out-of-Bounds Write Vulnerability (CVE-2026-32861)

A memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds write when loading a corrupted LVCLASS file (CVE-2026-32861), potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted .lvclass file.

cve-2026-32861 labview out-of-bounds write memory corruption
2r 4t 1c
high advisory

Mise Trust Bypass Vulnerability via Malicious .mise.toml

A vulnerability in mise allows an attacker who can place a malicious .mise.toml file in a repository to bypass trust checks and execute arbitrary code via `[env] _.source` due to improper loading of trust settings.

mise trust-bypass code-execution vulnerability
2r 2t
high advisory

PowerJob SQL Injection Vulnerability (CVE-2026-5736)

A remote SQL injection vulnerability, CVE-2026-5736, exists in PowerJob versions 5.1.0 through 5.1.2 within the detailPlus Endpoint, potentially allowing unauthenticated attackers to execute arbitrary SQL queries.

sql-injection vulnerability powerjob
2r 1t 1c
high advisory

ChurchCRM Authenticated API User Authorization Bypass (CVE-2026-39331)

An authenticated API user of ChurchCRM prior to v7.1.0 can bypass authorization checks and modify arbitrary family records by manipulating the familyId parameter in API requests, leading to privilege escalation and potential data manipulation.

cve-2026-39331 churchcrm authorization-bypass privilege-escalation web-application
2r 1t 1c
high advisory

NVIDIA Triton Inference Server Denial-of-Service Vulnerability (CVE-2026-24146)

NVIDIA Triton Inference Server is vulnerable to denial of service due to insufficient input validation that, when combined with a large number of outputs, can cause a server crash.

cve-2026-24146 denial-of-service nvidia triton
2r 1t 1c
high advisory

NVIDIA DALI Deserialization Vulnerability (CVE-2026-24156)

NVIDIA DALI contains a deserialization of untrusted data vulnerability, identified as CVE-2026-24156, which may lead to arbitrary code execution.

cve-2026-24156 deserialization nvidia dali
2r 2t 1c 1i
high advisory

SoftEtherVPN Pre-Authentication Denial-of-Service Vulnerability (CVE-2026-39312)

SoftEtherVPN version 5.2.5188 and earlier is vulnerable to a pre-authentication denial-of-service attack where an unauthenticated remote attacker can crash the vpnserver process by sending a malformed EAP-TLS packet over raw L2TP (UDP/1701), terminating all active VPN sessions.

dos softethervpn cve-2026-39312 l2tp
2r 2t 1c
high advisory

PolarLearn Privilege Escalation Vulnerability (CVE-2026-35610)

PolarLearn version 0-PRERELEASE-14 and earlier contains a privilege escalation vulnerability (CVE-2026-35610) in the account-management module, allowing authenticated non-admin users to execute administrative functions due to an inverted admin check.

cve-2026-35610 privilege-escalation polarnl
2r 1t 1c 1i
high advisory

Emissary OS Command Injection Vulnerability (CVE-2026-35581)

Emissary, a P2P data-driven workflow engine, is vulnerable to OS command injection due to insufficient sanitization of the PLACE_NAME parameter in versions prior to 8.39.0, allowing for arbitrary command execution.

cve command injection emissary
2r 1t 1c
high advisory

libssh Insecure Configuration Allows Local MITM Attacks (CVE-2025-14821)

CVE-2025-14821 in libssh allows local man-in-the-middle attacks, SSH downgrade attacks, and trusted host manipulation due to insecure default configuration loading from a world-writable directory on Windows.

libssh mitm windows cve-2025-14821 insecure-configuration
2r 2t 1c
high advisory

ChurchCRM SQL Injection Vulnerability (CVE-2026-35567)

ChurchCRM versions prior to 7.1.0 are vulnerable to SQL injection via the NewRole POST parameter, allowing authenticated users with the ManageGroups role to execute arbitrary SQL commands.

cve-2026-35567 sql-injection churchcrm
2r 1t 1c 2i
high advisory

text-generation-webui SSRF Vulnerability (CVE-2026-35486)

The text-generation-webui application before version 4.3 is vulnerable to server-side request forgery (SSRF) due to insufficient validation of user-supplied URLs by the superbooga and superboogav2 RAG extensions, potentially leading to credential theft and internal network reconnaissance.

ssrf text-generation-webui cve-2026-35486 cloud
2r 1t 1c 2i
high advisory

runZero Platform Superuser Privilege Escalation (CVE-2026-5373)

CVE-2026-5373 is an improper privilege management vulnerability in the runZero platform that allows all-organization administrators to promote accounts to superuser status, which was fixed in version 4.0.260202.0.

privilege-escalation cve runzero
2r 1t 1c 3i
high advisory

LibRaw Heap-Based Buffer Overflow Vulnerability (CVE-2026-24660)

A heap-based buffer overflow vulnerability (CVE-2026-24660) exists in the x3f_load_huffman functionality of LibRaw commit d20315b, where a specially crafted malicious file can lead to a heap buffer overflow.

libraw heap-overflow cve-2026-24660
2r 1t 1c
high advisory

LibRaw Integer Overflow Vulnerability in deflate_dng_load_raw

CVE-2026-20884 is an integer overflow vulnerability in LibRaw's deflate_dng_load_raw function that leads to a heap buffer overflow when processing crafted DNG files.

libraw integer-overflow heap-buffer-overflow cve-2026-20884
2r 1t 1c
high advisory

Apache Traffic Server Vulnerabilities Leading to Denial of Service

A remote attacker can exploit multiple vulnerabilities in Apache Traffic Server to conduct a denial of service or request smuggling attack.

apache traffic server denial of service request smuggling
2r 2t
high advisory

SaaS Notification Pipeline Abuse for Phishing and Spam Campaigns

Attackers are abusing notification pipelines in SaaS platforms like GitHub and Jira to deliver phishing and spam emails by exploiting legitimate platform features and bypassing traditional email security measures.

saas-abuse phishing credential-harvesting github jira
3r 1t 5i
high advisory

Malicious NPM Packages Target Strapi Users

A threat actor published 36 malicious NPM packages disguised as Strapi plugins in a supply chain attack, designed to execute code, escape containers, harvest credentials, and establish persistent implants on Linux systems targeting Strapi users, with specific focus on the Guardarian cryptocurrency payment gateway.

supply-chain npm strapi malware
3r 6t
high advisory

Tenda CX12L Router Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability exists in the Tenda CX12L router (version 16.03.53.12) due to improper handling of the 'page' argument in the 'fromwebExcptypemanFilter' function, potentially allowing attackers with local network access to execute arbitrary code.

tenda router buffer-overflow cve-2026-5684
2r 2t 1c
high advisory

Anthropic Claude Code CLI/Agent SDK OS Command Injection Vulnerability (CVE-2026-35021)

The Anthropic Claude Code CLI and Claude Agent SDK are vulnerable to OS command injection via crafted file paths, allowing arbitrary command execution.

cve-2026-35021 command-injection anthropic
2r 1t 1c
high advisory

Samsung Exynos Wi-Fi Driver Use-After-Free Vulnerability (CVE-2025-54602)

A use-after-free vulnerability exists in the Wi-Fi driver of Samsung Mobile and Wearable Processors Exynos 980, 850, 1080, 1280, 1330, 1380, 1480, 1580, W920, W930, and W1000 due to improper synchronization on a global variable, allowing attackers to trigger a race condition and potentially execute arbitrary code.

cve-2025-54602 use-after-free exynos samsung wifi
2r 1t 1c
high advisory

Samsung Exynos Processor Denial-of-Service Vulnerability (CVE-2025-57834)

A denial-of-service vulnerability, CVE-2025-57834, exists in Samsung Exynos processors and modems due to improper input validation, potentially leading to device malfunction or service disruption.

cve-2025-57834 denial-of-service samsung exynos
2r 1t 1c 1i
high advisory

Totolink A8000R Authentication Bypass Vulnerability (CVE-2026-5676)

A remote, unauthenticated attacker can bypass authentication on Totolink A8000R routers running firmware version 5.9c.681_B20180413 by manipulating the `langType` argument in the `setLanguageCfg` function of the `/cgi-bin/cstecgi.cgi` file.

cve-2026-5676 authentication-bypass totolink
2r 1t 1c
high advisory

Totolink A7100RU OS Command Injection Vulnerability (CVE-2026-5677)

A remote OS command injection vulnerability (CVE-2026-5677) exists in the CsteSystem function of the /cgi-bin/cstecgi.cgi file in Totolink A7100RU firmware version 7.4cu.2313_b20191024 due to improper handling of the resetFlags argument.

cve-2026-5677 totolink command-injection network-device
2r 1t 1c
high advisory

Plunk Email Platform CRLF Header Injection Vulnerability

A CRLF header injection vulnerability in Plunk versions prior to 0.8.0 allows authenticated API users to inject arbitrary email headers, enabling silent email forwarding, reply redirection, or sender spoofing.

crlf header-injection plunk cve-2026-34975 cloud
2r 1t 1c
high advisory

code-projects Online FIR System SQL Injection Vulnerability

A SQL injection vulnerability in code-projects Online FIR System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the email or password parameters in the /Login/checklogin.php file.

sqli cve-2026-5665 web-application
2r 1t 1c 6i
high advisory

ChurchCRM Time-Based Blind SQL Injection Vulnerability (CVE-2026-34402)

CVE-2026-34402 is a time-based blind SQL injection vulnerability in ChurchCRM versions prior to 7.1.0. Authenticated users with Edit Records or Manage Groups permissions can exploit the PropertyAssign.php endpoint to exfiltrate or modify database content, including user credentials, PII, and configuration secrets.

sqlinjection cve-2026-34402 churchcrm webserver
2r 1t 1c
high advisory

Qualcomm Memory Corruption Vulnerability CVE-2026-21382

CVE-2026-21382 is a memory corruption vulnerability related to handling power management requests with improperly sized input/output buffers, potentially leading to code execution.

cve-2026-21382 buffer-overflow memory-corruption qualcomm
2r 2t 1c 1i
high advisory

Qualcomm Memory Corruption Vulnerability in Auxiliary Sensor Processing (CVE-2026-21374)

CVE-2026-21374 describes a memory corruption vulnerability due to insufficient buffer size validation when processing auxiliary sensor input/output control commands, potentially allowing a local attacker to execute arbitrary code with elevated privileges.

cve memory-corruption qualcomm sensor
2r 1t 1c
high advisory

Qualcomm IOCTL Memory Corruption Vulnerability (CVE-2026-21375)

CVE-2026-21375 is a memory corruption vulnerability in Qualcomm chipsets due to insufficient output buffer size validation during IOCTL processing, potentially leading to arbitrary code execution.

cve-2026-21375 qualcomm memory-corruption ioctl
2r 1t 1c
high advisory

Qualcomm Camera Driver Memory Corruption Vulnerability

A memory corruption vulnerability exists in Qualcomm camera sensor drivers due to insufficient output buffer size validation during IOCTL processing, potentially leading to arbitrary code execution.

memory-corruption driver-vulnerability qualcomm
2r 1t 1c
high advisory

Memory Corruption Vulnerability in DMABUF IOCTL Calls (CVE-2026-21380)

A use-after-free vulnerability, identified as CVE-2026-21380, exists due to memory corruption when using deprecated DMABUF IOCTL calls for video memory management, potentially leading to arbitrary code execution.

cve-2026-21380 memory-corruption use-after-free
2r 1t 1c
high advisory

CVE-2026-21378 Memory Corruption in Camera Sensor Driver

A memory corruption vulnerability (CVE-2026-21378) exists in a camera sensor driver due to improper validation of output buffer size during IOCTL processing, potentially leading to arbitrary code execution.

camera-driver memory-corruption ioctl
2r 1t 1c
high advisory

Qualcomm Memory Corruption Vulnerability (CVE-2026-21371)

CVE-2026-21371 is a memory corruption vulnerability due to insufficient size validation when retrieving an output buffer, potentially leading to information disclosure or arbitrary code execution on affected Qualcomm devices.

cve memory-corruption qualcomm
2r 1t 1c
high threat

Qualcomm IOCTL Memory Corruption Vulnerability

A memory corruption vulnerability (CVE-2026-21372) exists when processing IOCTL requests with invalid buffer sizes leading to a heap-based buffer overflow, reported by Qualcomm with a CVSS v3.1 score of 7.8.

Qualcomm cve-2026-21372 memory-corruption heap-overflow ioctl
2r 1t 1c 1i
high advisory

Memory Corruption Vulnerability in Satellite Data Decoding (CVE-2025-47392)

CVE-2025-47392 describes a memory corruption vulnerability that occurs when decoding corrupted satellite data files with invalid signature offsets, reported by Qualcomm, Inc.

cve-2025-47392 memory corruption satellite data
2r 1t 1c 1i
high advisory

CVE-2025-47391 Qualcomm Memory Corruption Vulnerability

CVE-2025-47391 is a memory corruption vulnerability due to a stack-based buffer overflow (CWE-121) while processing a frame request, as detailed in the Qualcomm security bulletin for April 2026, potentially leading to arbitrary code execution.

cve-2025-47391 memory corruption qualcomm stack-based buffer overflow
3r 3t 1c 2i
high advisory

CVE-2025-47390: JPEG Driver IOCTL Memory Corruption Vulnerability

A memory corruption vulnerability (CVE-2025-47390) exists while preprocessing IOCTL requests in the JPEG driver, potentially leading to local privilege escalation or denial of service.

memory-corruption jpeg qualcomm
2r 1t 1c
high advisory

CVE-2025-47389 Memory Corruption Vulnerability in Attestation Report Generation

CVE-2025-47389 describes a memory corruption vulnerability stemming from a buffer copy operation failure due to an integer overflow during the attestation report generation process, potentially leading to arbitrary code execution.

cve-2025-47389 memory-corruption buffer-overflow attestation
2r 1t 1c 1i
high advisory

Potential File Download via a Headless Browser

Detects the execution of headless browsers from suspicious parent processes with arguments indicative of scripted retrieval, bypassing application control policies and restrictions on direct download tools.

command-and-control headless-browser file-download windows
2r 1t
high advisory

OFFIS DCMTK Command Injection Vulnerability (CVE-2026-5663)

A remote command injection vulnerability exists in OFFIS DCMTK version 3.7.0 and earlier due to insufficient input sanitization in the `storescp` application, potentially allowing unauthenticated attackers to execute arbitrary OS commands.

command-injection dcmtk cve-2026-5663 storescp
2r 1t 1c
high advisory

Media Library Assistant WordPress Plugin SQL Injection Vulnerability

The Media Library Assistant WordPress plugin through version 3.34 is vulnerable to SQL injection, allowing attackers to manipulate database queries.

sql-injection wordpress plugin-vulnerability
2r 1t 1c
high advisory

Distribution Toolkit Authentication Redirection Vulnerability (CVE-2026-33540)

A vulnerability in the distribution toolkit prior to 3.1.0 allows a malicious upstream registry or man-in-the-middle attacker to redirect authentication requests, potentially exposing upstream credentials.

CVE-2026-33540 authentication redirection container
2r 1t 1c
high advisory

GLPI Unauthenticated Time-Based Blind SQL Injection Vulnerability (CVE-2026-26263)

GLPI versions 11.0.0 to before 11.0.6 are susceptible to an unauthenticated time-based blind SQL injection vulnerability in the search engine, allowing remote attackers to potentially extract sensitive information.

sql-injection glpi cve-2026-26263 web-application
2r 1t 1c
high advisory

GLPI SQL Injection Vulnerability (CVE-2026-29047)

GLPI versions 10.0.0 before 10.0.24 and 11.0.6 are vulnerable to SQL Injection (CVE-2026-29047) via the logs export feature, allowing authenticated users to potentially execute arbitrary SQL commands.

glpi sqli cve-2026-29047
2r 1t 1c
high advisory

AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts

This rule correlates AWS Long-Term Access Key First Seen from Source IP alerts with other open alerts of medium or higher severity that share the same IAM access key ID to prioritize investigation of potentially compromised accounts, helping identify post-compromise activity.

cloud aws iam credential-access initial-access
2r 2t
high advisory

Mattermost Legal Hold Plugin Authentication Bypass Vulnerability

Mattermost Legal Hold plugin versions 1.1.4 and earlier allow authenticated attackers to bypass authorization checks, enabling unauthorized access and modification of legal hold data via crafted API requests.

mattermost authentication-bypass legal-hold
2r 2t 1c
high advisory

SQL Injection Vulnerability in Car Rental Project 1.0 (CVE-2026-5634)

A remote SQL injection vulnerability (CVE-2026-5634) exists in projectworlds Car Rental Project 1.0 via the fname parameter in /book_car.php, allowing unauthenticated attackers to potentially read, modify, or delete database information.

sqli web-application cve-2026-5634
2r 1t 1c 5i
high advisory

SQL Injection Vulnerability in Easy Blog Site 1.0

A SQL injection vulnerability exists in code-projects Easy Blog Site 1.0 within the login.php file, exploitable remotely by manipulating the username/password parameters, potentially leading to unauthorized database access.

sqlinjection cve-2026-5646 webapplication
2r 1t 1c
high advisory

SQL Injection Vulnerability in projectworlds Car Rental System 1.0

A SQL injection vulnerability (CVE-2026-5637) exists in projectworlds Car Rental System 1.0's /message_admin.php, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'Message' argument.

sql-injection web-application cve-2026-5637
2r 1t 1c
high advisory

GPT Researcher Server-Side Request Forgery Vulnerability (CVE-2026-5633)

A server-side request forgery (SSRF) vulnerability exists in assafelovic gpt-researcher up to version 3.4.3, affecting the ws Endpoint component, allowing a remote attacker to manipulate the source_urls argument and potentially access internal resources or conduct further attacks.

ssrf cve-2026-5633 gpt-researcher
2r 1t 1c 6i
high advisory

GPT Researcher Authentication Bypass Vulnerability (CVE-2026-5632)

CVE-2026-5632 is an authentication bypass vulnerability in assafelovic gpt-researcher up to version 3.4.3, affecting the HTTP REST API Endpoint and allowing remote attackers to perform actions without proper authorization.

CVE-2026-5632 authentication-bypass web-application
2r 1t 1c
high advisory

GPT Researcher Code Injection Vulnerability (CVE-2026-5631)

A remote code injection vulnerability exists in assafelovic gpt-researcher versions up to 3.4.3 due to improper handling of the 'args' argument in the extract_command_data function, potentially allowing attackers to execute arbitrary code.

code-injection vulnerability gpt-researcher
2r 1t 1c
high advisory

JeecgBoot AI Chat Module Authentication Bypass Vulnerability

JeecgBoot versions 3.9.0 and 3.9.1 are vulnerable to a remote unauthenticated bypass in the AI Chat Module, specifically affecting the JeecgBizToolsProvider.java file, potentially allowing unauthorized access.

jeecgboot authentication-bypass ai-chat-module
2r 1t 1c
high advisory

Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25704)

Kados R10 GreenBee is vulnerable to SQL injection (CVE-2019-25704), allowing attackers to manipulate database queries via the filter_user_mail parameter, potentially leading to data extraction or modification.

sql-injection cve-2019-25704 web-application
2r 1t 1c
high advisory

Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25702)

Kados R10 GreenBee is vulnerable to SQL injection via the id_project parameter, allowing attackers to manipulate database queries to extract sensitive information or modify data.

sql-injection web-application cve-2019-25702
2r 1t 1c
high advisory

Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25692)

Kados R10 GreenBee is vulnerable to SQL injection via the 'id_to_modify' parameter, enabling attackers to manipulate database queries and potentially extract or modify sensitive data.

sqli cve-2019-25692 web-application
2r 1t 1c
high advisory

RealTerm Serial Terminal SEH Buffer Overflow Vulnerability (CVE-2019-25679)

RealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH) buffer overflow vulnerability allowing local attackers to execute arbitrary code by supplying a malicious payload via the Echo Port tab.

cve-2019-25679 buffer-overflow seh local-code-execution realterm
2r 1t 1c 1i
high advisory

OpenDocMan 1.3.4 SQL Injection Vulnerability

OpenDocMan version 1.3.4 is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries via the 'where' parameter in search.php to extract sensitive information.

sqli vulnerability opendocman
2r 1t 1c
high advisory

River Past Video Cleaner 7.6.3 SEH Buffer Overflow Vulnerability

River Past Video Cleaner 7.6.3 contains a structured exception handler buffer overflow vulnerability allowing local attackers to execute arbitrary code by providing a malicious string in the Lame_enc.dll field.

cve-2019-25670 buffer-overflow seh-overflow windows
2r 2t 1c
high advisory

PilusCart 1.4.1 SQL Injection Vulnerability

PilusCart 1.4.1 is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter to extract sensitive database information.

sqli vulnerability web-application
2r 1t 1c
high advisory

News Website Script 2.0.5 SQL Injection Vulnerability

News Website Script 2.0.5 contains an SQL injection vulnerability (CVE-2019-25668) allowing unauthenticated attackers to extract sensitive information by injecting SQL code through the news ID parameter in GET requests.

sqli cve-2019-25668 webserver
2r 1t 1c
high advisory

SuiteCRM 7.10.7 Time-Based SQL Injection Vulnerability

SuiteCRM 7.10.7 is vulnerable to time-based SQL injection in the record parameter of the Users module DetailView action, allowing authenticated attackers to manipulate database queries and potentially extract sensitive information.

sql-injection cve-2019-25664 suitecrm
2r 1t 1c
high advisory

ResourceSpace 8.6 SQL Injection Vulnerability

ResourceSpace 8.6 is vulnerable to SQL injection, allowing unauthenticated attackers to execute arbitrary SQL queries via the 'ref' parameter in GET requests to the watched_searches.php endpoint, leading to sensitive data extraction.

sqli cve-2019-25662 resourcespace
2r 1t 1c
high advisory

R i386 3.5.0 Local Buffer Overflow Vulnerability (CVE-2019-25656)

R i386 version 3.5.0 is susceptible to a local buffer overflow in the GUI Preferences dialog, allowing a local attacker to overwrite the structured exception handler (SEH) by supplying a malicious string to the 'Language for menus and messages' field, leading to arbitrary code execution.

buffer-overflow seh-overwrite code-execution cve-2019-25656 windows
2r 2t 1c 5i
high advisory

SQL Injection Vulnerability in jkev Record Management System 1.0 (CVE-2026-5575)

A SQL injection vulnerability (CVE-2026-5575) exists in the Login component of SourceCodester/jkev Record Management System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the Username parameter in index.php.

sql-injection cve-2026-5575 web-application
2r 1t 1c
high advisory

Technostrobe HI-LED-WR120-G2 Unrestricted File Upload Vulnerability (CVE-2026-5573)

CVE-2026-5573 allows remote attackers to perform unrestricted file uploads on Technostrobe HI-LED-WR120-G2 devices by manipulating the 'cwd' argument when interacting with the /fs file.

CVE-2026-5573 file-upload web-application
2r 1t 1c 4i
high advisory

Technostrobe HI-LED-WR120-G2 Improper Authentication Vulnerability (CVE-2026-5570)

CVE-2026-5570 is an improper authentication vulnerability in the index_config function of the /LoginCB file of Technostrobe HI-LED-WR120-G2 version 5.5.0.1R6.03.30, allowing remote attackers to bypass authentication.

cve authentication-bypass webserver
2r 1t 1c
high advisory

Technostrobe HI-LED-WR120-G2 Improper Access Control Vulnerability (CVE-2026-5569)

CVE-2026-5569 describes a remote improper access control vulnerability in the /Technostrobe/ endpoint of Technostrobe HI-LED-WR120-G2 5.5.0.1R6.03.30, potentially leading to unauthorized access and control of affected devices.

cve-2026-5569 access-control technostrobe
2r 1t 1c
high advisory

code-projects Simple Laundry System 1.0 SQL Injection Vulnerability

A remote SQL Injection vulnerability exists in code-projects Simple Laundry System 1.0 within the /delmemberinfo.php file's userid parameter, potentially allowing attackers to execute arbitrary SQL commands.

sql-injection web-application vulnerability
2r 1t 1c
high advisory

Provectus Kafka UI Code Injection Vulnerability (CVE-2026-5562)

A code injection vulnerability exists in provectus kafka-ui up to version 0.7.2, specifically affecting the validateAccess function within the /api/smartfilters/testexecutions endpoint, allowing remote attackers to inject code.

code-injection kafka-ui vulnerability
2r 2t 1c
high threat

SQL Injection Vulnerability in Concert Ticket Reservation System

A remote attacker can exploit CVE-2026-5554 in code-projects Concert Ticket Reservation System 1.0 to perform SQL injection by manipulating the searching argument in the process_search.php file.

exploited sql-injection web-application vulnerability
2r 1t 1c
high advisory

SQL Injection Vulnerability in Free Hotel Reservation System 1.0 (CVE-2026-5551)

A SQL injection vulnerability (CVE-2026-5551) exists in itsourcecode Free Hotel Reservation System 1.0, specifically affecting the `email` parameter within the `/hotel/admin/login.php` file, allowing remote attackers to execute arbitrary SQL queries.

sql-injection web-application vulnerability
2r 1t 1c 1i
high advisory

Tenda 4G03 Pro Improper Access Control Vulnerability (CVE-2026-5526)

CVE-2026-5526 describes an improper access control vulnerability in the Tenda 4G03 Pro router's /bin/httpd file, allowing remote attackers to potentially gain unauthorized access.

cve-2026-5526 tenda router access-control
2r 1t 1c
high advisory

Snes9K 0.0.9z Buffer Overflow Vulnerability (CVE-2018-25251)

Snes9K 0.0.9z is vulnerable to a buffer overflow in the Netplay Socket Port Number field, enabling local attackers to execute arbitrary code via a crafted payload.

buffer-overflow code-execution cve-2018-25251 snes9k
2r 1t 1c
high advisory

Sheed AntiVirus Unquoted Service Path Privilege Escalation (CVE-2016-20061)

Sheed AntiVirus 2.3 contains an unquoted service path vulnerability in the ShavProt service that allows local attackers to escalate privileges by placing a malicious executable in the unquoted path, leading to arbitrary code execution as LocalSystem.

privilege-escalation unquoted-service-path cve-2016-20061
2r 1t 1c 4i
high advisory

prompts.chat Path Traversal Vulnerability (CVE-2026-22661)

A path traversal vulnerability exists in prompts.chat prior to commit 0f8d4c3, allowing attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames.

path-traversal file-write code-execution cve-2026-22661 prompts.chat linux
2r 1t 1c
high advisory

OpenEXR Heap Information Disclosure in PXR24 Decompression (CVE-2026-34543)

OpenEXR is vulnerable to a heap information disclosure in PXR24 decompression, where the undo_pxr24_impl function ignores the actual decompressed size, potentially leading to the exposure of uninitialized heap memory when processing crafted EXR files.

openexr heap-disclosure cve-2026-34543
2r 2t 1c 2i
high advisory

Mesop Framework WebSocket Denial-of-Service Vulnerability (CVE-2026-34824)

An unauthenticated attacker can exploit an uncontrolled resource consumption vulnerability in Mesop versions 1.2.3 to 1.2.4 by sending a rapid succession of WebSocket messages, leading to thread exhaustion and a denial-of-service condition.

denial-of-service websocket cve-2026-34824
2r 2t
high advisory

Juju Resource Poisoning Vulnerability Allows Unauthorized Resource Modification

An authenticated user, machine, or controller within a Juju controller can modify application resources due to a lack of authorization checks, potentially leading to resource poisoning and privilege escalation by uploading malicious resources.

juju resource-poisoning privilege-escalation cloud
2r 2t 1c
high advisory

Budibase Command Injection Vulnerability in Bash Automation Step

A command injection vulnerability exists in Budibase's bash automation step due to insufficient sanitization, allowing attackers with automation modification access to inject arbitrary shell commands, leading to remote code execution.

command-injection rce budibase
2r 1t
high advisory

ProfilePress WordPress Plugin Membership Payment Bypass Vulnerability

The ProfilePress WordPress plugin before 4.16.12 is vulnerable to an unauthorized membership payment bypass, allowing authenticated attackers to obtain paid memberships without payment by manipulating subscription IDs during checkout.

wordpress plugin vulnerability membership
2r 1t 1c
high advisory

libp2p-rendezvous Unlimited Namespace Registration DoS

A vulnerable libp2p-rendezvous server can be crashed via a denial-of-service attack where an unauthenticated peer registers unlimited namespaces, leading to memory exhaustion.

libp2p rendezvous denial-of-service
2r 1t
high advisory

Coder Code-Marketplace Zip Slip Vulnerability

A Zip Slip vulnerability in coder/code-marketplace allows authenticated users to upload malicious VSIX files containing path traversal entries, leading to arbitrary file writes outside the extension directory and potentially enabling persistence.

zip-slip path-traversal code-marketplace persistence
2r 2t
high advisory

Electron VideoFrame Context Isolation Bypass Vulnerability (CVE-2026-34780)

A context isolation bypass vulnerability exists in Electron applications that bridge VideoFrame objects via contextBridge, potentially allowing an attacker with JavaScript execution in the main world to access the isolated world and Node.js APIs.

electron context-isolation javascript xss CVE-2026-34780 defense-evasion privilege-escalation
2r 2t 1c
high advisory

PraisonAI OS Command Injection Vulnerability (CVE-2026-34937)

PraisonAI versions prior to 1.5.90 are vulnerable to OS Command Injection (CVE-2026-34937) due to insufficient escaping in the run_python() function, allowing arbitrary OS command execution via shell interpolation.

cve-2026-34937 os command injection praisonai
2r 1t 1c
high advisory

Piwigo SQL Injection Vulnerability (CVE-2026-27885)

CVE-2026-27885 is a SQL Injection vulnerability in Piwigo before version 16.3.0, affecting the Activity List API endpoint, allowing an authenticated administrator to extract sensitive data.

sql-injection web-application piwigo
2r 1t 1c 1i
high advisory

Piwigo SQL Injection Vulnerability (CVE-2026-27834)

A SQL Injection vulnerability (CVE-2026-27834) exists in Piwigo versions prior to 16.3.0, allowing authenticated administrators to execute arbitrary SQL commands via the pwg.users.getList Web Service API method.

piwigo sql-injection cve-2026-27834
2r 1t 1c 1i
high advisory

OAuthenticator Authentication Bypass Vulnerability (CVE-2026-33175)

OAuthenticator versions prior to 17.4.0 contain an authentication bypass vulnerability (CVE-2026-33175) that allows an attacker with an unverified email address on an Auth0 tenant to log in to JupyterHub when email is used as the username claim, potentially leading to account takeover.

authentication-bypass jupyterhub oauthenticator cve-2026-33175
2r 1t
high advisory

fast-jwt Library Vulnerability Allows crit Header Validation Bypass

The fast-jwt library fails to validate the 'crit' header, allowing attackers to bypass security policies and potentially achieve split-brain verification in mixed-library environments.

jwt vulnerability authentication authorization
2r 1t 1c
high advisory

curl_cffi SSRF Vulnerability via Redirects

curl_cffi versions before 0.15.0 are vulnerable to server-side request forgery (SSRF) due to unrestricted redirects to internal IP ranges, potentially enabling access to sensitive internal resources and cloud metadata.

ssrf curl_cffi cloud
2r 1t 1c 3i
high advisory

Amazon Athena ODBC Driver Man-in-the-Middle Vulnerability

A man-in-the-middle vulnerability exists in Amazon Athena ODBC driver versions prior to 2.1.0.0 due to improper certificate validation, potentially allowing attackers to intercept authentication credentials when connecting to external identity providers.

cve-2026-35560 athena odbc man-in-the-middle mitm credential-theft
2r 1t 1c
high advisory

Amazon Athena ODBC Driver Denial of Service Vulnerability (CVE-2026-35562)

A remote, unauthenticated attacker can cause a denial of service by sending crafted input to vulnerable versions of the Amazon Athena ODBC driver, triggering excessive resource consumption during parsing operations.

CVE-2026-35562 denial-of-service amazon athena odbc driver
2r 1t 1c
high advisory

Amazon Athena ODBC Driver Authentication Bypass Vulnerability (CVE-2026-35561)

CVE-2026-35561 describes an insufficient authentication security control vulnerability in the browser-based authentication components of the Amazon Athena ODBC driver before version 2.1.0.0, potentially allowing a threat actor to intercept or hijack authentication sessions.

amazon athena odbc authentication hijacking cve-2026-35561
2r 2t 1c
high advisory

Unauthenticated Access to Administrative Endpoint (CVE-2026-32646)

CVE-2026-32646 allows unauthenticated access to a specific administrative endpoint, potentially exposing device management functions, with a CVSS v3.1 score of 7.5.

cve-2026-32646 authentication-bypass device-management
2r 1t 1c
high advisory

Amazon Athena ODBC Driver Command Injection Vulnerability (CVE-2026-35558)

A command injection vulnerability (CVE-2026-35558) exists in the Amazon Athena ODBC driver before 2.1.0.0 due to improper neutralization of special elements in connection parameters, potentially leading to arbitrary code execution or authentication redirection.

command injection cve-2026-35558 athena
2r 2t 1c
high advisory

prompts.chat Fal.ai SSRF Vulnerability (CVE-2026-22664)

prompts.chat prior to commit 30a8f04 is vulnerable to server-side request forgery (SSRF) in Fal.ai media status polling, allowing authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs, leading to potential credential theft and internal network probing.

ssrf cve-2026-22664 fal.ai prompts.chat
2r 1t 1c 3i
high advisory

Hirschmann HiOS EtherNet/IP Stack Denial-of-Service Vulnerability (CVE-2020-37216)

A denial-of-service vulnerability in Hirschmann HiOS devices allows remote attackers to crash or hang the device by sending crafted UDP EtherNet/IP packets with invalid length fields.

dos cve-2020-37216 network
2r 2t 1c
high advisory

Hardcoded Storage Credentials in Mobile App and Device Firmware (CVE-2025-10681)

CVE-2025-10681 describes a vulnerability where hardcoded storage credentials in a mobile app and device firmware, with inadequate permission limits and lack of expiration, could lead to unauthorized access to production storage containers.

cve-2025-10681 hardcoded-credentials ics-cert ot
2r 1t 1c
high threat

Rise in Software Supply Chain Attacks Targeting Open-Source Libraries

Multiple supply chain attacks, including the compromise of Axios and Trivy via hijacked GitHub repositories by TeamPCP, demonstrate the increasing threat to open-source software.

TeamPCP supply-chain software-compromise github
3r 1t
high advisory

Budibase Stored Cross-Site Scripting Vulnerability (CVE-2026-35218)

A stored cross-site scripting (XSS) vulnerability in Budibase versions prior to 3.32.5 allows authenticated users with Builder access to inject malicious HTML payloads into entity names, leading to potential session cookie theft and account takeover when other Builder users open the Command Palette.

budibase xss cve-2026-35218 web-application
2r 1t 1c
high advisory

AIRBUS PSS TETRA Connectivity Server Privilege Escalation via Incorrect Permissions

AIRBUS PSS TETRA Connectivity Server version 7.0 on Windows Server is vulnerable to incorrect default permissions, allowing local privilege escalation to SYSTEM by placing a malicious file in a specific directory.

cve-2025-7024 privilege-escalation windows
2r 1t 1c
high advisory

Pymetasploit3 Command Injection Vulnerability (CVE-2026-5463)

A command injection vulnerability in pymetasploit3 versions up to 1.0.6 allows attackers to inject newline characters into module options, leading to arbitrary command execution within Metasploit sessions.

command-injection metasploit pymetasploit3
2r 1t 1c
high advisory

Ajenti Authorization Bypass Vulnerability (CVE-2026-35175)

Ajenti versions before 2.2.15 contain an authorization bypass vulnerability that allows authenticated non-superuser users to install custom packages, potentially leading to privilege escalation and system compromise.

ajenti authorization-bypass privilege-escalation CVE-2026-35175
2r 1t
high advisory

Wisp Multipart Parsing Vulnerability Leads to Denial of Service

A vulnerability in the multipart parsing logic of gleam-wisp allows an unauthenticated attacker to bypass request size limits and cause a denial of service by exhausting server memory or disk.

denial-of-service multipart-parsing gleam-wisp
3r 1t 1c
high advisory

Swift Crypto X-Wing HPKE Decapsulation Vulnerability

The X-Wing decapsulation path in swift-crypto accepts attacker-controlled encapsulated ciphertext bytes without enforcing the required fixed ciphertext length of 1120 bytes, leading to a potential out-of-bounds read.

vulnerability memory-safety swift-crypto
2r 1t
high advisory

Ech0 Unauthenticated Server-Side Request Forgery Vulnerability

Ech0 is vulnerable to Server-Side Request Forgery (SSRF) due to an unauthenticated API endpoint (`/api/website/title`) that fetches website titles from user-controlled URLs, lacking proper validation and TLS verification, allowing attackers to access internal resources and potentially cause denial of service.

ssrf ech0 web-application
2r 1t 2i
high advisory

Sudo Privilege Escalation Vulnerability (CVE-2026-35535)

CVE-2026-35535 describes a privilege escalation vulnerability in Sudo versions up to 1.9.17p2, where a non-fatal error during privilege dropping can allow an attacker to gain elevated privileges.

sudo privilege-escalation cve-2026-35535
2r 1t 1c
high advisory

OpenClaw Incomplete Scope Clearing Allows Privilege Escalation

An incomplete fix in OpenClaw versions 2026.3.28 and earlier allows for operator.admin privilege escalation via trusted-proxy authentication mode, which is fixed in version 2026.3.31.

privilege-escalation web-application openclaw
2r 1t
high advisory

Electron Use-After-Free Vulnerability in Offscreen Rendering with Child Windows

A use-after-free vulnerability (CVE-2026-34774) exists in Electron applications using offscreen rendering and allowing child windows, potentially leading to crashes or memory corruption if the parent WebContents is destroyed before the child window.

electron use-after-free vulnerability cve-2026-34774
2r 1i
high advisory

Electron Use-After-Free Vulnerability in PowerMonitor Module

A use-after-free vulnerability exists in the `powerMonitor` module of Electron applications on Windows and macOS. When the native `PowerMonitor` object is garbage-collected, dangling references are retained by OS-level resources. Subsequent session-change events on Windows or system shutdowns on macOS may dereference freed memory, potentially leading to a crash or memory corruption.

electron use-after-free vulnerability powermonitor windows macos
2r 1t 1i
high advisory

Azure SRE Agent Improper Authentication Vulnerability (CVE-2026-32173)

An improper authentication vulnerability (CVE-2026-32173) in the Azure SRE Agent allows an unauthorized attacker to disclose sensitive information over the network, potentially leading to data breaches or further compromise.

azure sre authentication information-disclosure
2r 1t 1c
high advisory

Hirschmann EagleSDV Denial-of-Service Vulnerability (CVE-2022-4986)

Hirschmann EagleSDV devices are vulnerable to denial-of-service (DoS) attacks where a device crash can be triggered by establishing TLS 1.0 or TLS 1.1 connections, leading to service disruption.

denial-of-service cve-2022-4986 network-device
2r 1t 1c
high advisory

Hirschmann HiLCOS Web Interface Heap Overflow Vulnerability (CVE-2024-14033)

A heap overflow vulnerability in the HiLCOS web interface of Hirschmann Industrial IT products (CVE-2024-14033) allows unauthenticated remote attackers to cause a denial-of-service condition by sending specially crafted requests, leading to device crashes and service disruption, particularly when the Public Spot functionality is enabled.

cve-2024-14033 denial-of-service heap-overflow hilcos
2r 1t 1c
high advisory

OpenClaw NPM Package Vulnerable to Python Package Index Redirection

The openclaw npm package is vulnerable to Python package-index redirection through host execution due to improper sanitization of `PIP_INDEX_URL` and `UV_INDEX_URL`, affecting versions 2026.3.28 and earlier.

openclaw npm package-index-redirection environment-variable-injection
2r
high advisory

Kiro IDE Code Execution Vulnerability via Crafted Color Theme (CVE-2026-5429)

CVE-2026-5429 is a code execution vulnerability in Kiro IDE before version 0.8.140 that allows a remote, unauthenticated attacker to execute arbitrary code by exploiting a crafted color theme name when a local user opens a workspace.

cve cve-2026-5429 code-execution kiro-ide
2r 2t 1c
high advisory

goshs Authentication Bypass Vulnerability (CVE-2026-34581)

goshs versions 1.1.0 to before 2.0.0-beta.2 are vulnerable to authentication bypass via Share Token, potentially allowing code execution (CVE-2026-34581).

cve-2026-34581 authentication-bypass code-execution
1r 1t
high advisory

CVE-2024-44250: macOS Sequoia Privilege Escalation Vulnerability

CVE-2024-44250 is a permission issue in macOS Sequoia 15.1 that allows an application to execute arbitrary code outside of its sandbox or with elevated privileges, potentially leading to full system compromise.

privilege-escalation macos cve-2024-44250
2r 1t 1c
high advisory

Balena Etcher for Windows TOCTOU Vulnerability

A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena Etcher for Windows prior to v2.1.4 allows attackers to escalate privileges and execute arbitrary code by replacing a legitimate script with a crafted payload during the flashing process.

privilege-escalation toctou balena-etcher
2r 1t 1c
high advisory

Endian Firewall Arbitrary File Deletion via Path Traversal (CVE-2026-34790)

Endian Firewall versions 3.3.25 and prior allow authenticated users to delete arbitrary files due to a path traversal vulnerability in the `remove ARCHIVE` parameter of the `/cgi-bin/backup.cgi` script, leading to unauthorized file system modification.

cve path-traversal file-deletion web-application
2r 1t 1c 1i
high threat

SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0

A SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component at /enrollment/index.php, where manipulating the deptid argument can lead to remote code execution, with public exploits available.

exploited sql-injection web-application cve-2026-5334
2r 1t 1c
high advisory

DefaultFuction CMS 1.0 Command Injection Vulnerability (CVE-2026-5333)

DefaultFuction Content-Management-System 1.0 is vulnerable to command injection via manipulation of the 'host' argument in the /admin/tools.php file, allowing remote attackers to execute arbitrary commands.

command-injection web-application cve-2026-5333
2r 2t 1c
high advisory

OpenSTAManager Time-Based Blind SQL Injection Vulnerability

OpenSTAManager versions before 2.10.2 are susceptible to time-based blind SQL injection via the 'options[stato]' GET parameter, allowing authenticated attackers to extract sensitive database information.

openstamanager sqli cve-2026-28805
2r 1t
high advisory

Keycloak UMA Policy Bypass Vulnerability (CVE-2026-4636)

CVE-2026-4636 describes a vulnerability in Keycloak where an authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation, leading to unauthorized access to victim-owned resources.

keycloak uma policy-bypass privilege-escalation
2r 3t 1c
high advisory

Keycloak Denial-of-Service Vulnerability via Excessive Scope Parameter (CVE-2026-4634)

An unauthenticated attacker can cause a denial-of-service on Keycloak servers by sending a crafted POST request to the OIDC token endpoint with an excessively long scope parameter, leading to high resource consumption.

cve-2026-4634 denial-of-service keycloak
2r 1t 1c
high advisory

Keycloak Authorization Code Forging Vulnerability (CVE-2026-4282)

An unauthenticated attacker can exploit CVE-2026-4282 in Keycloak's SingleUseObjectProvider to forge authorization codes, leading to privilege escalation and the creation of admin-capable access tokens.

keycloak privilege-escalation authorization
2r 1t 1c
high threat

TrueConf Zero-Day Exploitation Leading to Arbitrary Code Execution

Hackers exploited a zero-day vulnerability (CVE-2026-3502) in TrueConf conference servers to execute arbitrary files on connected endpoints, potentially deploying the Havoc C2 framework.

exploited TrueChaos trueconf zero-day cve-2026-3502 supply-chain attack
2r 3t 1c 4i
high advisory

SillyTavern Path Traversal Vulnerability in Chat Endpoints

A path traversal vulnerability in SillyTavern versions 1.16.0 and earlier allows an authenticated attacker to read and delete arbitrary files under their user data root by manipulating the avatar_url parameter in the `/api/chats/export` and `/api/chats/delete` endpoints.

path-traversal web-application sillytavern
3r 4t
high advisory

DeepLoad Malware Distributed via ClickFix

The DeepLoad malware steals credentials, installs malicious browser extensions, spreads via USB drives, and is being distributed via ClickFix campaigns using PowerShell loaders.

deepload clickfix credential-theft windows
2r 3t
high advisory

CVE-2026-33613: Remote Code Execution in generateSrpArray Function

CVE-2026-33613 describes a remote code execution (RCE) vulnerability due to improper neutralization of special elements used in an OS command in the generateSrpArray function, leading to full system compromise, but requires a separate method for writing arbitrary data to the user table.

cve-2026-33613 rce command-injection
2r 1t 1c
high advisory

Cesanta Mongoose TLS 1.3 Heap-Based Buffer Overflow Vulnerability (CVE-2026-5244)

A remote heap-based buffer overflow vulnerability exists in Cesanta Mongoose versions up to 7.20 due to improper handling of the pubkey argument in the mg_tls_recv_cert function, potentially leading to code execution.

cve-2026-5244 heap-based-buffer-overflow tls-1.3 remote-code-execution
2r 1t 1c
high advisory

WordPress Webmention Plugin SSRF Vulnerability (CVE-2026-0686)

The Webmention plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 5.6.2, allowing unauthenticated attackers to make arbitrary web requests and potentially query or modify internal services.

ssrf wordpress webmention cve-2026-0686
2r 1t 1c
high advisory

AlejandroArciniegas mcp-data-vis SQL Injection Vulnerability

A SQL injection vulnerability exists in the MCP Handler component of AlejandroArciniegas mcp-data-vis, specifically in the Request function of src/servers/database/server.js, allowing remote attackers to execute arbitrary SQL commands.

sql-injection web-application cve-2026-5322
2r 1t 1c
high advisory

vanna-ai vanna Authentication Bypass Vulnerability (CVE-2026-5320)

CVE-2026-5320 describes an unauthenticated remote access vulnerability in vanna-ai vanna up to version 2.0.2 via manipulation of the /api/vanna/v2/ Chat API endpoint, potentially allowing unauthorized access and actions.

authentication-bypass cve-2026-5320 vanna-ai
2r 2t 1c
high advisory

HCL BigFix Platform Insecure Permissions Vulnerability (CVE-2026-21765)

HCL BigFix Platform is vulnerable to insecure permissions on private cryptographic keys, where keys on a Windows host may have overly permissive file system permissions, potentially leading to unauthorized access and privilege escalation.

cve-2026-21765 privilege-escalation windows hcl-bigfix
2r 2t 1c
high advisory

PraisonAI SubprocessSandbox Shell Escape via sh/bash

PraisonAI's SubprocessSandbox allows attackers to bypass command restrictions due to the use of `shell=True` in `subprocess.run()` combined with an insufficient blocklist that does not include `sh` or `bash`, enabling command execution via `sh -c '<command>'`.

sandbox-escape command-injection praisonai
2r 3t
high advisory

PraisonAI SSRF Vulnerability via Unvalidated api_base Parameter

PraisonAI versions 4.5.89 and earlier are vulnerable to SSRF via the `api_base` parameter in the `passthrough()` function, allowing attackers to make requests to internal services or external hosts, potentially leading to IAM credential theft on cloud infrastructure or access to internal services within the VPC.

ssrf praisonai cloud
2r 1t 1i
high advisory

KubeAI OS Command Injection via Model URL in Ollama Engine Startup Probe

The KubeAI project is vulnerable to OS command injection because the `ollamaStartupProbeScript()` function constructs a shell command string using `fmt.Sprintf` with unsanitized model URL components (`ref`, `modelParam`), which is then executed via `bash -c` as a Kubernetes startup probe, allowing arbitrary command execution inside model server pods by attackers with the ability to create or update `Model` custom resources.

kubeai command-injection kubernetes cloud
2r 1t
high advisory

V-SFT Stack-Based Buffer Overflow Vulnerability (CVE-2026-32928)

V-SFT versions 6.2.10.0 and prior are susceptible to a stack-based buffer overflow vulnerability that could allow arbitrary code execution when a malicious V7 file is opened.

cve-2026-32928 buffer-overflow code-execution v-sft
2r 1t 1c
high advisory

IBM Verify and Security Verify Access Authentication Bypass Vulnerability

CVE-2026-4101 describes an authentication bypass vulnerability in IBM Verify Identity Access Container and IBM Security Verify Access Container versions 11.0 through 11.0.2 and 10.0 through 10.0.9.1, respectively, that could allow unauthorized access under specific load conditions.

authentication-bypass cve-2026-4101 ibm-verify
2r 1t 1c
high advisory

IBM Verify Identity Access and Security Verify Access Command Injection Vulnerability

Unauthenticated command execution is possible in IBM Verify Identity Access Container and IBM Security Verify Access Container due to improper validation of user-supplied input, allowing arbitrary command execution with lower privileges.

command-injection rce cve-2026-1345
2r 1t 1c
high advisory

Goshs Authentication Bypass via Share Token

Goshs is vulnerable to an authentication bypass via share tokens, allowing attackers to bypass authentication checks by using a valid share token in conjunction with other functionalities like WebSocket connections to gain unauthorized access and execute arbitrary commands on the server.

authentication-bypass code-execution goshs
2r 3t 2i
high advisory

Auth0-PHP SDK Cookie Forging Vulnerability (CVE-2026-34236)

Auth0-PHP SDK versions 8.0.0 to before 8.19.0 encrypt cookies with insufficient entropy, potentially allowing attackers to brute-force the encryption key and forge session cookies.

cve-2026-34236 auth0 php cookie-forging session-hijacking
2r 1t 1c
high advisory

Tina CMS Path Traversal Vulnerability (CVE-2026-34603)

Tina CMS versions before 2.2.2 are vulnerable to a path traversal attack that allows unauthorized file system access due to insufficient validation of symlinks and junction targets in media routes.

path-traversal tina-cms CVE-2026-34603
2r 1t
high advisory

pandas-ai SQL Injection Vulnerability (CVE-2026-30273)

pandas-ai v3.0.0 is vulnerable to SQL injection via the pandasai.agent.base._execute_sql_query component, potentially allowing unauthorized database access and modification.

sql-injection vulnerability pandas-ai
2r 1t 1c
high advisory

Lakeside SysTrack Agent Local Privilege Escalation via Race Condition (CVE-2026-35099)

Lakeside SysTrack Agent 11 before 11.2.1.28 is vulnerable to a race condition that allows for local privilege escalation to SYSTEM, as tracked by CVE-2026-35099.

lakeside systrack privilege-escalation race-condition cve-2026-35099 windows
2r 1t 1c
high threat

Potential JAVA/JNDI Exploitation Attempt

This rule detects a potential JAVA/JNDI exploitation attempt by identifying outbound network connections by JAVA to LDAP, RMI, or DNS standard ports followed by suspicious JAVA child processes such as shell interpreters and scripting languages, which may indicate a Java Naming and Directory Interface (JNDI) injection vulnerability exploitation attempt.

exploited jndi java log4shell rce exploitation
2r 5t 1c
high advisory

Libinput Code Injection Vulnerability via Malicious Lua Bytecode (CVE-2026-35093)

A local attacker can exploit CVE-2026-35093 in libinput by placing a specially crafted Lua bytecode file in configuration directories, allowing arbitrary code execution with the privileges of the application using libinput.

libinput code-injection lua cve-2026-35093
3r 6t 1c
high advisory

Dell AppSync 4.6.0 Incorrect Permission Assignment Vulnerability

Dell AppSync version 4.6.0 contains an incorrect permission assignment vulnerability that allows a low-privileged attacker with local access to elevate privileges on the system.

dell appsync privilege-escalation cve-2026-22768
2r 1t 1c
high advisory

Right-to-Left Override Character Used for Defense Evasion

Adversaries are using the Right-to-Left Override (RTLO) character (U+202E) in command-line arguments to obfuscate malicious file names and trick users into executing them, achieving defense evasion.

defense-evasion obfuscation
2r 1t
high advisory

BPFDoor Lock File Access

BPFDoor, an evasive Linux backdoor, is detected via the unusual access of process ID and lock files in the /var/run/ directory, indicating potential malicious activity.

bpfdoor linux backdoor ebpf
2r 2t
high advisory

SonicWall Email Security Appliance Multiple Vulnerabilities

A remote, authenticated attacker with administrator rights can exploit multiple vulnerabilities in SonicWall Email Security Appliance to perform cross-site scripting, manipulate data, or cause a denial-of-service.

sonicwall email security xss dos data manipulation
2r 2t
high advisory

gdk-pixbuf Vulnerability Allows Denial of Service and Potential Code Execution

A remote, anonymous attacker can exploit a vulnerability in gdk-pixbuf to cause a denial of service and potentially execute arbitrary code.

gdk-pixbuf denial-of-service code-execution
2r 1t
high advisory

cPanel/WHM Local Privilege Escalation Vulnerability

A local attacker can exploit a vulnerability in cPanel/WHM to escalate their privileges.

privilege-escalation cpanel whm
2r 1t
high advisory

7-Zip Multiple Vulnerabilities Allow Remote Code Execution

Multiple vulnerabilities in 7-Zip allow an attacker to execute arbitrary program code with the privileges of the service, potentially leading to system compromise.

7-zip code-execution vulnerability windows
2r 1t
high advisory

Multiple Vulnerabilities in PowerDNS

Multiple vulnerabilities in PowerDNS could be exploited by an attacker to disclose information, bypass security measures, cause a denial of service, and potentially execute code.

powerdns vulnerability dos information-disclosure code-execution
1r
high advisory

IBM App Connect Enterprise Multiple Vulnerabilities

A remote, anonymous attacker can exploit multiple vulnerabilities in IBM App Connect Enterprise to cause a denial-of-service condition or bypass security measures, enabling cross-site scripting attacks.

vulnerability dos xss ibm
2r 2t
high advisory

Django Multiple Vulnerabilities Leading to SQL Injection, Information Disclosure, and DoS

A remote, authenticated attacker can exploit multiple vulnerabilities in Django to perform SQL injections, disclose confidential information, or cause a denial-of-service condition.

django sql-injection information-disclosure denial-of-service web-application webserver
2r 2t
high advisory

Sanster IOPaint Path Traversal Vulnerability (CVE-2026-5258)

A path traversal vulnerability (CVE-2026-5258) exists in Sanster IOPaint 1.5.3, allowing remote attackers to read arbitrary files by manipulating the filename argument in the _get_file function within the File Manager component.

path traversal cve-2026-5258 web application
2r 1t 1c
high advisory

Foxit Application Use-After-Free Vulnerability (CVE-2026-3779)

CVE-2026-3779 is a use-after-free vulnerability in a Foxit application where stale references to page/form objects can lead to arbitrary code execution via crafted documents.

cve-2026-3779 use-after-free code-execution foxit
2r 1t 1c
high advisory

CVE-2026-3780: Local Privilege Escalation via Untrusted Search Path in Application Installer

An application installer vulnerable to CVE-2026-3780 runs with elevated privileges but resolves system executables and DLLs using an untrusted search path, enabling local privilege escalation by allowing a local attacker to inject malicious binaries.

privilege-escalation cve-2026-3780 untrusted-search-path dll-hijacking installer
2r 1t 1c
high advisory

XenForo Template Code Injection Vulnerability (CVE-2025-71281)

XenForo before 2.3.7 is vulnerable to code injection due to a loose prefix match for methods accessible within templates, potentially allowing unauthorized method invocations.

xenforo code-injection cve-2025-71281
2r 2t 1c 1i
high advisory

XenForo OAuth2 Unauthorized Scope Request Vulnerability

XenForo before 2.3.5 allows OAuth2 client applications to request unauthorized scopes, potentially allowing client applications to gain access beyond their intended authorization level due to improper authorization checks.

cve-2025-71278 oauth2 xenforo incorrect-authorization
2r 1t 1c 2i
high advisory

SiYuan Note Reflected XSS Vulnerability in SVG Processing

SiYuan Note versions prior to the fix for commit f09953afc57a are vulnerable to reflected cross-site scripting (XSS) via a namespace prefix bypass in the SanitizeSVG function when handling dynamic icons, allowing unauthenticated attackers to execute arbitrary JavaScript in a victim's browser.

xss siyuan svg reflected-xss
2r 1t
high advisory

itsourcecode Payroll Management System 1.0 SQL Injection Vulnerability

itsourcecode Payroll Management System 1.0 is vulnerable to SQL injection via the ID parameter in /view_employee.php, allowing remote attackers to execute arbitrary SQL commands.

sql-injection web-application payroll-system
2r 1t 1c 5i
high advisory

OpenClaw Gateway Unauthorized Session Reset Vulnerability

A vulnerability in OpenClaw Gateway allows a write-scoped gateway caller to rotate a target session, archive the prior transcript state, and force a new session id without admin scope via the `chat.send` path by reusing command authorization to trigger `/reset` session rotation.

openclaw session-reset privilege-escalation
2r 1t
high advisory

File Browser Stored XSS via Crafted EPUB File

File Browser version 2.62.1 and earlier is vulnerable to stored cross-site scripting (XSS) via crafted EPUB files, allowing attackers to execute arbitrary JavaScript in a victim's browser by exploiting the application's misconfigured iframe sandbox and stealing sensitive information like JWT tokens.

filebrowser xss epub cve-2026-34529
2r 5t 1c 2i
high advisory

SQL Injection Vulnerability in itsourcecode Payroll Management System 1.0 (CVE-2026-5237)

A SQL injection vulnerability (CVE-2026-5237) exists in itsourcecode Payroll Management System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID parameter in the /manage_user.php file.

sql-injection web-application payroll-system
2r 1t 1c
high advisory

Axios npm Package Compromised in Supply Chain Attack

The widely used Axios npm package was compromised via a supply chain attack on March 31, 2026, resulting in the publication of malicious versions through a compromised maintainer account.

supply-chain npm javascript
2r 1t
high advisory

SourceCodester Leave Application System 1.0 File Inclusion Vulnerability (CVE-2026-5210)

SourceCodester Leave Application System 1.0 is vulnerable to remote file inclusion (CVE-2026-5210) due to improper handling of the 'page' argument, potentially allowing attackers to execute arbitrary code.

cve-2026-5210 file-inclusion web-application
2r 1t 1c 6i
high advisory

AWS-C-EventStream Out-of-Bounds Write Vulnerability (CVE-2026-5190)

CVE-2026-5190 is an out-of-bounds write vulnerability in the aws-c-event-stream library before version 0.6.0 that allows a malicious third-party server to cause memory corruption and potential arbitrary code execution on client applications.

cve-2026-5190 aws-c-event-stream out-of-bounds write code execution
2r 3t 1c
high advisory

SciTokens C++ Authorization Bypass Vulnerability (CVE-2026-32725)

SciTokens C++ library before 1.4.1 is vulnerable to an authorization bypass (CVE-2026-32725) due to improper path normalization, allowing attackers to escalate privileges by using parent-directory traversal in scope claims.

authorization-bypass privilege-escalation cve
2r 1t 1c
high advisory

NVIDIA BioNeMo Deserialization Vulnerability (CVE-2026-24164)

NVIDIA BioNeMo is vulnerable to deserialization of untrusted data (CVE-2026-24164), potentially leading to code execution, denial of service, information disclosure, and data tampering.

cve deserialization nvidia
2r 1t 1c 1i
high advisory

NVIDIA Jetson Linux initrd Command Injection Vulnerability (CVE-2026-24154)

CVE-2026-24154 is a vulnerability in NVIDIA Jetson Linux where an unprivileged attacker with physical access can inject incorrect command line arguments into initrd, potentially leading to code execution, privilege escalation, denial of service, data tampering, and information disclosure.

cve-2026-24154 nvidia jetson initrd command injection privilege escalation
2r 5t 1c 1i
high advisory

NVIDIA Jetson JetPack Insecure Default Initialization Vulnerability (CVE-2026-24148)

CVE-2026-24148 is a vulnerability in NVIDIA Jetson for JetPack's system initialization logic, where an unprivileged attacker can cause the initialization of a resource with an insecure default, potentially leading to information disclosure, data tampering, and denial of service.

cve-2026-24148 nvidia-jetson insecure-default information-disclosure data-tampering denial-of-service
2r 2t 1c 1i
high advisory

OpenClaw Approval Integrity Vulnerability Leads to Code Execution (CVE-2026-32971)

OpenClaw before 2026.3.11 exhibits an approval-integrity vulnerability where attackers can place wrapper binaries to execute local code after operators approve misleading command text, due to the system displaying extracted shell payloads instead of the actual executed arguments.

cve-2026-32971 code-execution approval-bypass
2r 1t 1c
high advisory

SQL Injection Vulnerability in Student Membership System 1.0

CVE-2026-5198 is a SQL injection vulnerability in the Admin Login component of code-projects Student Membership System 1.0, affecting the /admin/index.php file, enabling remote exploitation through manipulation of username/password parameters.

sql-injection vulnerability web-application
2r 1t 1c
high advisory

code-projects Student Membership System SQL Injection Vulnerability (CVE-2026-5195)

A remote SQL injection vulnerability exists in the User Registration Handler component of code-projects Student Membership System 1.0, exploitable through manipulation of input.

sql-injection web-application cve-2026-5195
2r 1t 1c
high advisory

DELMIA Factory Resource Manager Stored XSS Vulnerability (CVE-2025-10553)

A stored cross-site scripting (XSS) vulnerability in DELMIA Factory Resource Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x (CVE-2025-10553) allows attackers to execute arbitrary script code within a user's browser session.

xss vulnerability web-application
2r 1t 1c
high advisory

ENOVIA Collaborative Industry Innovator Stored XSS Vulnerability (CVE-2025-10551)

A stored cross-site scripting (XSS) vulnerability in ENOVIA Collaborative Industry Innovator allows an attacker to execute arbitrary script code in a user's browser session by injecting malicious code into document management functions.

xss cve-2025-10551 enovia
2r 1t 1c 1i
high advisory

DELMIA Factory Resource Manager Path Traversal Vulnerability (CVE-2025-10559)

CVE-2025-10559 is a path traversal vulnerability in DELMIA Factory Resource Manager, affecting versions 3DEXPERIENCE R2023x through R2025x, which allows an attacker with low privileges to read or write files in specific directories on the server, potentially leading to information disclosure or code execution.

path-traversal vulnerability delmia cve-2025-10559
2r 1t 1c 1i
high advisory

SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5180)

A SQL Injection vulnerability (CVE-2026-5180) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'email' parameter in the /admin/ajax.php?action=login2 endpoint.

sql-injection vulnerability web-application
2r 1t 1c 5i
high advisory

SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5179)

A SQL injection vulnerability (CVE-2026-5179) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the Username argument in the /admin/login.php file, with a public exploit available.

sql-injection web-application vulnerability
2r 1t 1c
high advisory

vcpkg OpenSSL Windows Build Path Vulnerability (CVE-2026-34054)

A vulnerability exists in vcpkg versions prior to 3.6.1#3, where Windows builds of OpenSSL set openssldir to a path on the build machine, making that path vulnerable to attack on customer machines.

vulnerability openssl vcpkg cwe-427 windows
2r 2t 1c
high advisory

SciTokens Authorization Bypass Vulnerability (CVE-2026-32716)

SciTokens versions prior to 1.9.6 incorrectly validate scope paths using a prefix match, leading to an authorization bypass vulnerability where a token with access to a specific path can access sibling paths with the same prefix.

authorization-bypass scitokens CVE-2026-32716
2r 1t 1c 4i
high advisory

SciTokens Library Path Traversal Vulnerability (CVE-2026-32727)

A path traversal vulnerability (CVE-2026-32727) in SciTokens library versions prior to 1.9.7 allows attackers to bypass intended directory restrictions using dot-dot sequences in the scope claim of a token due to improper path normalization.

scitokens path-traversal cve-2026-32727 vulnerability
2r 1t 1c
high advisory

Moby Authorization Plugin Bypass Vulnerability (CVE-2026-34040)

A security vulnerability in Moby (prior to v29.3.1) allows attackers to bypass authorization plugins, potentially leading to unauthorized container access and privilege escalation.

containerization authorization bypass privilege escalation cve-2026-34040
2r 2t 1c 2i
high advisory

Botan SM2 Decryption Heap Over-read Vulnerability (CVE-2026-32877)

Botan C++ cryptography library versions 2.3.0 before 3.11.0 are vulnerable to a heap over-read during SM2 decryption due to insufficient validation of the authentication code length, potentially leading to crashes or undefined behavior.

cve vulnerability heap-overread botan
2r 1t 1c 2i
high advisory

SQL Injection Vulnerability in code-projects Accounting System 1.0 (CVE-2026-5150)

A remote SQL injection vulnerability (CVE-2026-5150) exists in code-projects Accounting System 1.0 via manipulation of the 'cos_id' argument in /viewin_costumer.php, potentially allowing attackers to execute arbitrary SQL commands.

sql-injection web-application cve-2026-5150
2r 1t
high advisory

YunaiV yudao-cloud SQL Injection Vulnerability

A remote SQL injection vulnerability (CVE-2026-5147) exists in YunaiV yudao-cloud up to version 2026.01 via the Website argument in the /admin-api/system/tenant/get-by-website endpoint, allowing unauthenticated attackers to potentially execute arbitrary SQL queries.

cve-2026-5147 sql-injection web-application
2r 1t
high advisory

GNU C Library iconv() Function Assertion Failure (CVE-2026-4046)

A vulnerability in the iconv() function of the GNU C Library (versions 2.43 and earlier) can cause a crash due to an assertion failure when handling IBM1390 or IBM1399 character sets, potentially leading to remote application denial-of-service.

glibc iconv denial-of-service crash cve-2026-4046
2r 1t
high advisory

Parse Server LiveQuery Protected Field Leak via Shared Mutable State

Parse Server versions before 8.6.65 and between 9.0.0 and 9.7.0-alpha.9 are vulnerable to a data leak where protected fields and authentication data can be exposed to unauthorized clients due to shared mutable objects across concurrent LiveQuery subscribers.

parse-server livequery data-leak cve-2026-34363
3r
high advisory

TinaCMS GraphQL Path Traversal Vulnerability

A path traversal vulnerability in @tinacms/graphql allows unauthenticated users to write and overwrite arbitrary files within the project root by manipulating the relativePath parameter in GraphQL mutations, leading to potential arbitrary code execution.

path-traversal graphql tinacms arbitrary-file-write
2r 2t
high advisory

Glances XML-RPC Server Cross-Origin Information Disclosure

The Glances XML-RPC server exposes sensitive system information due to a permissive CORS policy and missing Content-Type validation, enabling attackers to bypass CORS restrictions and steal data like hostnames, OS details, IP addresses, and process lists.

glances cors information-disclosure vulnerability
2r 3t 2i
high advisory

Gotenberg Chromium Deny-List Bypass via Case-Insensitive URL Scheme

Gotenberg versions before 8.29.0 are vulnerable to unauthenticated arbitrary file read, where a case-insensitive URL scheme bypasses the Chromium deny-list, allowing attackers to read sensitive files such as /etc/passwd by using mixed-case or uppercase URL schemes like FILE:///etc/passwd, leading to the leakage of sensitive data from the Gotenberg container and bypassing the fix for CVE-2024-21527.

gotenberg file-read vulnerability chromium
2r 1t
high advisory

libp2p-gossipsub Remote Denial of Service via Integer Overflow

A remote, unauthenticated attacker can crash applications using libp2p-gossipsub versions prior to 0.49.4 by sending a crafted PRUNE control message with a near-maximum backoff value, causing an arithmetic overflow during heartbeat processing.

libp2p gossipsub denial-of-service integer overflow rust
2r 1t
high advisory

Red Hat Undertow Multiple Vulnerabilities Allow Security Bypass

An anonymous remote attacker can exploit multiple vulnerabilities in Red Hat Undertow to bypass security measures, manipulate data, and disclose sensitive information.

redhat undertow security-bypass information-disclosure data-manipulation
2r 3t
high advisory

Langflow Vulnerability Allows File Manipulation

An authenticated, remote attacker can exploit a vulnerability in Langflow to manipulate files, potentially leading to unauthorized data modification or application compromise.

langflow file-manipulation vulnerability
2r 1t
high advisory

OpenBao Multiple Vulnerabilities Allow Security Bypass and XSS

An anonymous, remote attacker can exploit multiple vulnerabilities in OpenBao to bypass security measures or conduct cross-site scripting attacks.

openbao vulnerability security-bypass xss
2r 4t
high advisory

Multiple Vulnerabilities in Dovecot Mail Server

Multiple vulnerabilities in Dovecot can be exploited by an attacker to perform SQL injection attacks, bypass authentication, disclose sensitive information, or cause a denial-of-service condition.

dovecot vulnerability sql-injection authentication-bypass dos
2r 2t
high advisory

Internet Systems Consortium BIND Vulnerabilities Leading to Denial of Service

Multiple vulnerabilities in Internet Systems Consortium BIND can be exploited by a remote attacker to conduct a denial of service attack or bypass security measures.

dns denial-of-service bind
2r 1t
high advisory

Tinyproxy HTTP Chunked Encoding Integer Overflow Denial of Service

An integer overflow vulnerability in Tinyproxy's HTTP chunked transfer encoding parser (versions <= 1.11.3) allows an unauthenticated remote attacker to cause a denial of service by sending a crafted chunk size that bypasses validation, leading to resource exhaustion.

tinyproxy denial-of-service integer-overflow cve-2026-3945
2r 1t
high advisory

CVE-2026-2328 Unauthenticated Path Traversal Vulnerability

CVE-2026-2328 describes a vulnerability where an unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, leading to the exposure of sensitive information.

path-traversal vulnerability webserver
2r 1t 2i
high advisory

Securing AI Agents and Governing Shadow AI

CrowdStrike is introducing new capabilities to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments by providing detection and response (AIDR) for desktop AI applications, discovery of AI-related components, and runtime security for agents built in Microsoft Copilot Studio to combat attacks like living off the AI land (LOTAIL) by securing the agentic interaction layer.

AI agentic-soc shadow-ai
2r 1t
high advisory

GitLab Jira Connect Authentication Bypass Vulnerability (CVE-2026-2370)

GitLab CE/EE versions 14.3 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 are vulnerable to improper authorization checks in Jira Connect installations, allowing an authenticated user with minimal workspace permissions to obtain installation credentials and impersonate the GitLab application.

gitlab jira authentication authorization cve-2026-2370
2r 2t 1i
high advisory

OpenClaw Gateway Plugin Subagent Admin Scope Vulnerability

The openclaw package versions 2026.3.24 and earlier are vulnerable due to the gateway plugin subagent fallback `deleteSession` function dispatching `sessions.delete` with a synthetic `operator.admin` runtime scope, potentially leading to unauthorized session deletion.

openclaw vulnerability authorization
2r 1t
high advisory

OpenClaw SSRF Vulnerability via Unguarded Configured Base URLs

OpenClaw versions 2026.3.24 and earlier are vulnerable to Server-Side Request Forgery (SSRF) because of unguarded configured base URLs in multiple channel extensions, allowing attackers to potentially access internal resources.

ssrf openclaw cve-2026-28476
2r 1t
high advisory

Traefik gRPC Deny Rule Bypass Vulnerability (CVE-2026-33186)

A remote, unauthenticated attacker can bypass Traefik deny rules by sending malformed gRPC requests with a missing leading slash in the `:path` pseudo-header, exploiting a vulnerability in the gRPC-Go dependency, leading to unauthorized access if a fallback "allow" rule is configured.

traefik grpc authorization-bypass cve-2026-33186
2r 1t
high advisory

XPath Boolean Expression DoS Vulnerability

A vulnerability in the antchfx/xpath package allows for denial of service via CPU exhaustion by exploiting boolean expressions that evaluate to true, leading to an infinite loop.

xpath denial-of-service cve-2026-32287
2r 1t
high advisory

OpenClaw Credential Exposure via Leaked Pairing Codes

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials in pairing setup codes, allowing attackers with access to leaked codes to reuse credentials and gain unauthorized access.

credential-access vulnerability openclaw
2r 1t
high advisory

OpenClaw Code Execution via Script Modification (CVE-2026-32979)

OpenClaw before 2026.3.11 is vulnerable to an approval integrity issue (CVE-2026-32979) allowing attackers to execute arbitrary code by modifying approved local scripts before they are executed.

cve-2026-32979 code-execution openclaw
2r 1t
high advisory

OpenClaw Feishu Webhook Authentication Bypass (CVE-2026-32974)

OpenClaw before 2026.3.12 is vulnerable to an authentication bypass in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing unauthenticated network attackers to inject forged Feishu events and trigger downstream tool execution.

authentication-bypass webhook cve-2026-32974
2r 1t
high advisory

OpenClaw Session Sandbox Escape Vulnerability (CVE-2026-32918)

OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool, allowing sandboxed subagents to access and modify session data outside their intended scope.

openclaw sandbox-escape authorization
2r 1t
high advisory

OpenClaw Sandbox Boundary Bypass Vulnerability (CVE-2026-32915)

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability that allows low-privilege leaf subagents to access the subagents control surface and execute commands with broader tool policies due to insufficient authorization checks, potentially leading to privilege escalation and unauthorized control of sibling processes.

sandbox-escape privilege-escalation cve-2026-32915
2r 2t
high advisory

OpenClaw Insufficient Access Control Vulnerability (CVE-2026-32914)

OpenClaw before 2026.3.12 contains an insufficient access control vulnerability in the /config and /debug command handlers that allows command-authorized non-owners to access owner-only surfaces, enabling attackers with command authorization to read or modify privileged configuration settings.

insufficient-access-control privilege-escalation web-application
2r 1t 3i
high advisory

Tycoon2FA Phishing-as-a-Service Platform Persists After Takedown

The Tycoon2FA phishing-as-a-service (PhaaS) platform, used to bypass MFA and compromise email accounts, saw a temporary decrease in activity after a law enforcement takedown, but cloud compromises have since returned to pre-disruption levels with unchanged TTPs, indicating continued threat actor activity.

phishing credential-theft cloud
2r 2t
high threat

CrowdStrike CNAPP Enhanced with Adversary-Informed Risk Prioritization

CrowdStrike enhances its CNAPP capabilities by incorporating adversary intelligence for risk prioritization, application-layer visibility, and runtime analysis, addressing critical gaps in cloud security and enabling faster remediation based on threat actor behavior like LABYRINTH CHOLLIMA and SCATTERED SPIDER.

Lazarus Group +10 cloud_security cnapp threat_intelligence
3r 3t
high advisory

Vulnerabilities in AI Agents Addressed by CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails v0.20.0 to help organizations protect AI agents in production by blocking prompt injection attacks, redacting sensitive data, and controlling agent behavior.

ai prompt-injection data-security
2r 5t
high threat

CrowdStrike CNAPP Enhancements Prioritize Risk Based on Adversary Behavior

CrowdStrike's CNAPP enhancements prioritize cloud risk based on adversary behavior, correlating application insights with cloud infrastructure telemetry to identify and address critical exposures targeted by specific threat actors like LABYRINTH CHOLLIMA and SCATTERED SPIDER.

Lazarus Group +10 cloud-security cnapp threat-intelligence
2r 8t
high advisory

code-projects Accounting System 1.0 SQL Injection Vulnerability (CVE-2026-5034)

A remote SQL injection vulnerability exists in code-projects Accounting System 1.0 via manipulation of the 'cos_id' parameter in '/edit_costumer.php', potentially allowing unauthorized database access.

sqli cve-2026-5034 web-application
2r 1t
high advisory

SQL Injection Vulnerability in Simple Food Order System 1.0

A SQL injection vulnerability exists in code-projects Simple Food Order System 1.0 within the register-router.php file, where manipulation of the Name argument can lead to remote code execution.

sql-injection web-application vulnerability
2r 1t
high advisory

code-projects Simple Food Order System SQL Injection Vulnerability (CVE-2026-5017)

CVE-2026-5017 is a SQL injection vulnerability in code-projects Simple Food Order System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'Status' parameter in the `/all-tickets.php` file.

sql-injection web-application vulnerability
2r 1t
high advisory

CrowdStrike Falcon AIDR Supports NVIDIA NeMo Guardrails for AI Agent Protection

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails, providing enterprise-grade protection for AI agents by defending against runtime attacks like prompt injection, redacting sensitive data, defanging malicious content, and moderating unwanted topics to ensure agents stay within compliance boundaries in sectors like finance, healthcare, customer service, and software development.

ai-security prompt-injection data-exfiltration
2r 2t
high advisory

Securing AI Agents with CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails to protect AI agents from attacks like prompt injection, data exfiltration, and unauthorized actions, enabling organizations to deploy AI applications more securely.

ai-security prompt-injection data-protection ai-agents
2r 1t
high advisory

SQL Injection Vulnerability in Sinaptik AI PandasAI lancedb Extension

A SQL injection vulnerability exists in Sinaptik AI PandasAI up to version 0.1.4 within the pandasai-lancedb Extension, allowing remote exploitation through manipulation of multiple functions in the lancedb.py file.

sql-injection vulnerability pandasai
2r 1t
high advisory

SC v7.16 Stack-Based Buffer Overflow Vulnerability (CVE-2018-25222)

SC v7.16 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by providing oversized input exceeding 1052 bytes, leading to potential arbitrary code execution.

buffer-overflow code-execution CVE-2018-25222
2r 1t
high advisory

Flat Assembler Stack-Based Buffer Overflow Vulnerability (CVE-2017-20228)

Flat Assembler version 1.71.21 is susceptible to a stack-based buffer overflow vulnerability, allowing local attackers to achieve arbitrary code execution by providing a crafted, oversized input file.

cve-2017-20228 buffer-overflow local-privilege-escalation
2r 1t
high advisory

PInfo 0.6.9-5.1 Local Buffer Overflow Vulnerability

PInfo version 0.6.9-5.1 is susceptible to a local buffer overflow vulnerability, enabling local attackers to execute arbitrary code by providing an overly large argument to the '-m' parameter, ultimately allowing for shellcode execution with user privileges.

buffer-overflow local-privilege-escalation cve-2016-20044
2r 1t
high advisory

yTree Stack-Based Buffer Overflow Vulnerability (CVE-2016-20038)

yTree version 1.94-1.1 is vulnerable to a stack-based buffer overflow, allowing local attackers to execute arbitrary code by supplying an excessively long argument to overwrite the stack with shellcode.

cve-2016-20038 buffer-overflow local-code-execution
2r 1t
high advisory

TiEmu 3.03 Buffer Overflow Vulnerability (CVE-2016-20040)

TiEmu 3.03 is vulnerable to a buffer overflow in ROM parameter handling, enabling local attackers to crash the application or execute arbitrary code by providing an oversized ROM parameter via the command-line interface.

cve-2016-20040 buffer-overflow local-privilege-escalation
2r 1t
high advisory

Multi Emulator Super System (MESS) Buffer Overflow Vulnerability (CVE-2016-20039)

Multi Emulator Super System 0.154-3.1 is vulnerable to a buffer overflow (CVE-2016-20039) allowing local attackers to achieve arbitrary code execution by supplying a malicious gamma parameter, leading to potential system compromise.

cve buffer overflow code execution
2r 1t
high advisory

xwpe Stack-Based Buffer Overflow Vulnerability (CVE-2016-20037)

A stack-based buffer overflow vulnerability exists in xwpe version 1.5.30a-2.1 and prior, allowing a local attacker to execute arbitrary code or cause denial of service by supplying a crafted command-line argument with an overly long input string.

cve buffer-overflow code-execution
2r 3t
high advisory

Undertow Request Smuggling Vulnerability (CVE-2026-28368)

CVE-2026-28368 is a vulnerability in Undertow that allows a remote attacker to construct specially crafted requests, leading to request smuggling attacks and potential bypass of security controls, resulting in unauthorized resource access.

undertow request-smuggling cve-2026-28368
2r 1t
high threat

Silver Fox Spearphishing Campaign Targeting Japanese Firms During Tax Season

The Silver Fox threat actor is conducting a targeted spearphishing campaign against Japanese manufacturers and other businesses, exploiting the annual tax filing and organizational change season by sending emails containing malicious attachments that deploy ValleyRAT, leading to remote access, data theft, and persistence.

Silver Fox silverfox spearphishing valleyrat japan taxseason remoteaccesstrojan
2r 5t
high advisory

LibreChat SSRF Vulnerability (CVE-2026-31943)

LibreChat versions prior to 0.8.3 are vulnerable to Server-Side Request Forgery (SSRF), allowing authenticated users to bypass IP address validation and make the server issue HTTP requests to internal network resources.

ssrf librechat cve-2026-31943
2r 2t 1i
high advisory

Clerk SSRF Vulnerability in frontendApiProxy Allows Secret Key Leakage

A server-side request forgery (SSRF) vulnerability exists in the `clerkFrontendApiProxy` function of the `@clerk/backend` package, allowing an unauthenticated attacker to send the application's `Clerk-Secret-Key` to an attacker-controlled server.

ssrf vulnerability clerk cloud
2r 1t
high advisory

LangChain Core Path Traversal Vulnerability in Legacy APIs

A path traversal vulnerability in LangChain Core's legacy `load_prompt` functions allows attackers to read arbitrary files by injecting malicious paths into prompt configurations.

langchain path-traversal vulnerability
1r 1t
high advisory

CrowdStrike Falcon Enhancements Secure AI Agents and Govern Shadow AI

CrowdStrike is enhancing its Falcon platform with AI Detection and Response (AIDR) to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud, addressing threats like prompt injection attacks, data leaks, and policy violations.

ai shadow-ai prompt-injection data-leak endpoint-security
2r 3t
high advisory

Tycoon2FA PhaaS Platform Resurgence After Takedown

The Tycoon2FA phishing-as-a-service (PhaaS) platform, disrupted in March 2026, has resurged with consistent tactics, employing adversary-in-the-middle (AITM) techniques to bypass MFA and compromise email accounts through phishing campaigns, credential theft, and session cookie hijacking.

phishing credential-theft MFA-bypass
2r 2t 1i
high advisory

CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails Secure AI Agents

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails (v0.20.0), providing enterprise-grade protection for AI agents by managing data access, controlling responses, ensuring policy compliance, and blocking prompt injection attacks.

AI-security prompt-injection data-protection
2r 1t
high advisory

Tycoon2FA Phishing-as-a-Service Resurgence After Takedown

The Tycoon2FA Phishing-as-a-Service platform, used to bypass multifactor authentication (MFA), has resurged to pre-takedown levels of activity following a disruption effort in March 2026, maintaining its original tactics, techniques, and procedures (TTPs) for credential harvesting and cloud compromise.

phishing credential-theft MFA-bypass phishing-as-a-service
2r 2t 1i
high advisory

Oxygen Theme WordPress Plugin Vulnerable to Server-Side Request Forgery (CVE-2025-12886)

The Oxygen Theme for WordPress is vulnerable to Server-Side Request Forgery (SSRF) in versions up to 6.0.8, allowing unauthenticated attackers to make arbitrary web requests via the laborator_calc_route AJAX action.

ssrf wordpress oxygen-theme cve-2025-12886
2r 1t
high advisory

eswifi Socket Offload Driver Buffer Overflow Vulnerability (CVE-2026-1679)

CVE-2026-1679 describes a vulnerability in the eswifi socket offload driver where user-provided payloads are copied into a fixed buffer without proper size checking, leading to a buffer overflow and kernel memory corruption.

cve-2026-1679 buffer-overflow kernel-memory-corruption
2r 2t
high advisory

WeGIA Web Manager SQL Injection Vulnerability (CVE-2026-33991)

WeGIA web manager prior to version 3.6.7 is vulnerable to SQL injection via the `id_tag` parameter in the `deletar_tag.php` script due to unsanitized input and direct concatenation into SQL queries, potentially allowing attackers to read, modify, or delete data.

cve-2026-33991 sql-injection web-application
2r 1t
high advisory

OpenClaw Gateway Plugin Grants Unrestricted operator.admin Runtime Scope

The openclaw gateway plugin versions 2026.3.24 and earlier incorrectly grants operator.admin runtime scope to all callers, regardless of their granted scopes, potentially allowing unauthorized actions.

openclaw privilege-escalation vulnerability
2r 1t
high advisory

MinIO SSE Metadata Injection via Replication Headers Leads to Data Unreadability

A vulnerability in MinIO allows authenticated users with `s3:PutObject` permission to inject internal server-side encryption metadata into objects via crafted replication headers, leading to permanent data unreadability.

minio s3 metadata-injection denial-of-service
2r 1t
high advisory

LinkAce Server-Side Request Forgery Vulnerability (CVE-2026-33953)

LinkAce versions prior to 2.5.3 are vulnerable to server-side request forgery (SSRF), allowing an authenticated user to trigger server-side requests to internal services by referencing internal hostnames.

ssrf linkace vulnerability
2r 1t
high advisory

UniFi Network Controller Improper Certificate Verification Vulnerability (CVE-2019-25652)

UniFi Network Controller versions before 5.10.22 and 5.11.x before 5.11.18 contain an improper certificate verification vulnerability, enabling adjacent network attackers to perform man-in-the-middle attacks by presenting a fraudulent SSL certificate during SMTP connections to intercept traffic and steal credentials.

unifi mitm credential-theft cve-2019-25652
2r 2t
high advisory

AWS SDK for PHP CloudFront Policy Document Injection via Special Characters

A vulnerability exists in the AWS SDK for PHP CloudFront signing utilities where special characters in input values are not properly handled when creating policy documents, potentially leading to unintended access restrictions, affecting versions 3.11.7 through 3.371.3.

aws cloudfront injection security
2r 1t 1i
high advisory

Langflow IDOR Vulnerability Allows Cross-User Flow Manipulation

Langflow versions 1.5.0 and earlier contain an IDOR vulnerability (CVE-2026-34046) that allows authenticated users to read, modify, and delete flows belonging to other users due to a missing ownership check, potentially exposing sensitive information and enabling unauthorized control over AI agent logic.

idor langflow vulnerability
2r 3t
high advisory

@mobilenext/mobile-mcp Path Traversal Vulnerability

The @mobilenext/mobile-mcp package before version 0.0.49 is vulnerable to a Path Traversal vulnerability in the mobile_save_screenshot and mobile_start_screen_recording tools where the `saveTo` and `output` parameters are passed directly to filesystem operations without validation, potentially allowing an attacker to write files outside the intended workspace, leading to privilege escalation and persistence by overwriting sensitive host files.

path-traversal file-write privilege-escalation persistence
2r 2t
high advisory

Moby Authorization Plugin Bypass via Oversized Request Bodies

A vulnerability in Moby allows attackers to bypass authorization plugins by crafting API requests with oversized bodies, causing the Docker daemon to forward the request without the body to the plugin, potentially leading to unauthorized actions.

docker authz authorization bypass cve-2026-34040
2r
high advisory

Undertow HTTP Request Smuggling Vulnerability (CVE-2026-28367)

A remote attacker can exploit CVE-2026-28367 in Undertow by sending '\r\r\r' as a header block terminator, leading to request smuggling on vulnerable proxy servers.

cve request-smuggling undertow webserver
2r 1t
high advisory

Postiz App SSRF Vulnerability via Next.js

A high-severity SSRF vulnerability exists in the Postiz application via Next.js, allowing attackers to bypass firewalls, scan internal networks, access sensitive cloud metadata (AWS IMDS), potentially leak instance credentials, and pivot within the internal network.

ssrf vulnerability cloud
2r 1t 1i
high advisory

mingSoft MCMS Server-Side Request Forgery Vulnerability (CVE-2026-4953)

A server-side request forgery (SSRF) vulnerability (CVE-2026-4953) exists in mingSoft MCMS version 5.5.0, allowing remote attackers to manipulate the 'catchimage' argument in the catchImage function to potentially access or interact with internal resources.

SSRF mingSoft CVE-2026-4953
2r 3t
high advisory

OpenClaw Symlink Traversal via IDENTITY.md appendFile in agents.create/update

OpenClaw is vulnerable to symlink traversal via IDENTITY.md appendFile in agents.create/update. An attacker who can place a symlink in the agent workspace can hijack the IDENTITY.md path to append attacker-controlled content to arbitrary files on the system leading to remote code execution, persistent code execution, unauthorized SSH access, or service disruption.

openclaw symlink-traversal vulnerability npm rce persistence
2r 2t
high advisory

Zen C Compiler Stack-Based Buffer Overflow (CVE-2026-33491)

A stack-based buffer overflow vulnerability in Zen C compiler versions before 0.4.4 allows attackers to crash the compiler or potentially execute arbitrary code via a crafted `.zc` source file with overly long identifiers.

cve buffer_overflow compiler
2r 2t
high advisory

LIBPNG Out-of-Bounds Read/Write Vulnerability in Neon Optimization (CVE-2026-33636)

An out-of-bounds read and write vulnerability in LIBPNG's ARM/AArch64 Neon-optimized palette expansion path (CVE-2026-33636) allows attackers to potentially achieve denial-of-service or arbitrary code execution by crafting malicious PNG images.

libpng png oob CVE-2026-33636 vulnerability defense-evasion privilege-escalation
2r 2t
high advisory

Kestra Orchestration Platform XSS Vulnerability (CVE-2026-33664)

Kestra versions up to 1.3.3 are vulnerable to a cross-site scripting (XSS) vulnerability (CVE-2026-33664) allowing arbitrary JavaScript execution by viewing crafted flow metadata.

kestra xss cve-2026-33664 orchestration
2r 1t
high advisory

EVerest Out-of-Bounds Access Vulnerability (CVE-2026-26008)

EVerest, an EV charging software stack, has an out-of-bounds access vulnerability in versions prior to 2026.02.0, which can lead to remote crash or memory corruption when the CSMS sends UpdateAllowedEnergyTransferModes over the network.

cve ev-charging out-of-bounds denial-of-service
2r 2t 2i
high advisory

EVerest CAN Interface Stack Buffer Overflow Vulnerability (CVE-2026-23995)

A stack-based buffer overflow vulnerability exists in EVerest EV charging software stack versions prior to 2026.02.0. Passing an interface name longer than 16 characters to CAN open routines overflows `ifreq.ifr_name`, potentially leading to code execution.

everest buffer-overflow cve-2026-23995 ev-charging
2r 3t
high advisory

CVE-2026-4926: Regular Expression Denial of Service

CVE-2026-4926 describes a denial-of-service vulnerability due to an inefficient regular expression complexity issue when handling multiple sequential optional groups, leading to exponential growth and resource exhaustion.

denial-of-service regex cve
2r 2t
high advisory

BadAML Injection Allows Arbitrary Code Execution in Confidential VMs

The BadAML injection attack allows arbitrary code execution in confidential VMs by exploiting the ACPI interface, enabling attackers with host control to execute malicious AML code within the guest.

badaml acpi injection confidential-computing
2r 1t
high advisory

Red Hat OpenShift AI Llama Stack Unauthorized Access Vulnerability (CVE-2025-12805)

CVE-2025-12805 describes a flaw in Red Hat OpenShift AI (RHOAI) llama-stack-operator that allows unauthorized access to Llama Stack services in other namespaces via direct network requests due to missing NetworkPolicy restrictions, potentially enabling attackers to view or manipulate sensitive data.

openshift kubernetes networkpolicy unauthorized-access
2r 1t 2i
high advisory

Doveadm Credentials Vulnerable to Timing Oracle Attack (CVE-2026-27856)

Doveadm credentials are verified using direct comparison, making it susceptible to timing oracle attacks, allowing attackers to determine credentials and gain full access.

vulnerability timing oracle credential access doveadm
2r 1t
high advisory

Spring AI Redis Store TAG Injection Vulnerability (CVE-2026-22744)

CVE-2026-22744 is a code injection vulnerability in Spring AI's RedisFilterExpressionConverter which allows an attacker to inject arbitrary commands into RediSearch TAG blocks via unescaped user-controlled strings, affecting versions 1.0.0 before 1.0.5 and 1.1.0 before 1.1.4.

injection spring-ai redis
2r 1t
high advisory

Spring AI BedrockProxyChatModel SSRF Vulnerability (CVE-2026-22742)

Spring AI's spring-ai-bedrock-converse library is vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied media URLs in multimodal messages, allowing attackers to trigger HTTP requests to internal or external destinations.

ssrf spring-ai bedrockproxychatmodel cve-2026-22742
2r 1t 2i
high advisory

Shenzhen Ruiming Technology Streamax Crocus bis SQL Injection Vulnerability

A SQL injection vulnerability (CVE-2026-4910) exists in Shenzhen Ruiming Technology Streamax Crocus bis 1.3.44 via the /RemoteFormat.do endpoint, allowing remote attackers to execute arbitrary SQL commands by manipulating the State argument.

cve-2026-4910 sql-injection streamax webserver
2r 1t 5i
high advisory

cpp-httplib Vulnerability Leads to Credential Leakage via HTTP Redirects

The cpp-httplib library prior to version 0.39.0 forwards stored authentication credentials to arbitrary hosts via HTTP redirects, potentially exposing sensitive information to malicious actors.

cpp-httplib credential-leak cve-2026-33745 http-redirect credential-access cross-origin
2r 1t
high advisory

C2C CI utils Vulnerable to DoS via pyasn Dependency (CVE-2026-30922)

The c2cciutils package is vulnerable to denial of service due to an uncontrolled recursion vulnerability (CWE-674) in the pyasn dependency, specifically versions before 1.1.65.

denial-of-service pyasn c2cciutils dependency-vulnerability
2r 1t
high advisory

Sharp CMS Path Traversal Vulnerability (CVE-2026-33686)

A path traversal vulnerability exists in Sharp CMS versions prior to 9.20.0 due to improper sanitization of file extensions, potentially allowing attackers to bypass security restrictions and access sensitive files.

path-traversal cms laravel web-application
2r 1t
high advisory

Forge Ed25519 Signature Forgery Vulnerability

Forge is vulnerable to signature forgery in Ed25519 due to a missing check that S < L, allowing non-canonical signatures and potentially bypassing authentication/authorization logic, affecting versions before 1.4.0.

ed25519 signature-forgery forge javascript
2r 1t
high advisory

Node-Forge Certificate Chain Verification Bypass due to basicConstraints Violation

Node-forge's certificate chain verification fails to enforce RFC 5280 basicConstraints, allowing leaf certificates without basicConstraints and keyUsage extensions to act as Certificate Authorities, leading to potential certificate forgery and man-in-the-middle attacks.

certificate-forgery man-in-the-middle node-forge basicConstraints
2r 3t 1i
high advisory

OpenClaw ACP Chat Command Injection Vulnerability

A vulnerability in the openclaw npm package before version 2026.3.22 allowed mutating internal ACP chat commands without requiring operator.admin scope enforcement, potentially allowing unauthorized control-plane actions.

openclaw acp chat-command-injection vulnerability
2r
high advisory

Ory Polis DOM-based XSS Vulnerability (CVE-2026-33506)

Ory Polis versions prior to 26.2.0 are vulnerable to DOM-based XSS due to improper handling of the `callbackUrl` parameter, allowing attackers to execute arbitrary JavaScript in a user's browser.

xss ory-polis cve-2026-33506 cloud
2r 1t
high advisory

OpenClaw Nostr DM Unauthorized Crypto Computation Vulnerability

The openclaw npm package before version 2026.3.22 allows unauthorized pre-authentication computation due to improper handling of inbound Nostr DMs, where crypto and dispatch work are performed before enforcing sender and pairing policies.

supply-chain vulnerability npm
2r
high advisory

Netty HTTP Request Smuggling via Chunked Extension Quoted-String Parsing

Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks by terminating chunk header parsing at \r\n inside quoted strings instead of rejecting the malformed request.

netty request-smuggling http
2r 1t 2i
high advisory

Netty HTTP/2 CONTINUATION Frame Flood Denial of Service

A denial of service vulnerability exists in Netty's HTTP/2 server implementation where an unauthenticated user can exhaust server CPU resources by sending a flood of CONTINUATION frames with zero-byte payloads, bypassing size-based mitigations and leading to service unavailability with minimal bandwidth usage; affected versions include netty-codec-http2 < 4.1.132.Final and netty-codec-http2 versions >= 4.2.0.Alpha1 and < 4.2.10.Final.

denial-of-service http2 netty cve-2026-33871
1r
high advisory

Ory Kratos SQL Injection Vulnerability in ListCourierMessages API

A SQL injection vulnerability exists in the ListCourierMessages Admin API of Ory Kratos versions prior to 26.2.0 due to flaws in its pagination implementation, allowing attackers to craft malicious tokens if the pagination secret is known or the default secret is used.

ory-kratos sql-injection cve-2026-33503 cloud
2r 1t
high advisory

Mattermost mmctl Terminal Injection Vulnerability (CVE-2026-3108)

Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 are vulnerable to terminal injection, allowing attackers to manipulate administrator terminals via crafted messages containing ANSI and OSC escape sequences.

cve-2026-3108 mattermost terminal-injection
2r 1t
high advisory

Kysely SQL Injection Vulnerability (CVE-2026-33468)

A SQL injection vulnerability exists in Kysely versions prior to 0.28.14 due to insufficient backslash escaping in the `DefaultQueryCompiler.sanitizeStringLiteral()` function, potentially allowing attackers to inject arbitrary SQL when using the MySQL dialect, specifically affecting `CreateIndexBuilder.where()` and `CreateViewBuilder.as()` methods.

kysely sql-injection cve-2026-33468
2r 1t
high advisory

SQL Injection Vulnerability in Kysely TypeScript Library (CVE-2026-33442)

Kysely versions 0.28.12 and 0.28.13 are vulnerable to SQL injection due to insufficient escaping of backslashes in the `sanitizeStringLiteral` method, potentially leading to arbitrary SQL execution on MySQL servers.

sql-injection kysely cve-2026-33442
2r 1t
high advisory

CPCI85 and SICORE Base System XML Out-of-Bounds Write Vulnerability

An unauthenticated attacker can exploit an out-of-bounds write vulnerability in CPCI85 Central Processing/Communication and SICORE Base System by sending a malicious XML request, potentially causing a service crash leading to a denial-of-service condition.

cve-2026-27664 denial-of-service xml
2r 1t
high advisory

EVerest IsoMux Certificate Filename Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability exists in EVerest's IsoMux certificate filename handling before version 2026.02.0, potentially allowing code execution via a crafted filename.

buffer overflow EV charging code execution
2r 3t
high advisory

Fluent Booking WordPress Plugin Stored XSS Vulnerability

The Fluent Booking plugin for WordPress is vulnerable to stored cross-site scripting (XSS) allowing unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected page, affecting versions up to and including 2.0.01.

wordpress xss cve-2026-2231
2r 1t
high advisory

HCL Aftermarket DPC SQL Injection Vulnerability (CVE-2025-55262)

CVE-2025-55262 is a SQL Injection vulnerability affecting HCL Aftermarket DPC, allowing an attacker to retrieve sensitive information from the database and potentially gain unauthorized access.

cve-2025-55262 sql-injection web-application
2r 1t
high advisory

HCL Aftermarket DPC Missing Access Control Vulnerability (CVE-2025-55261)

A missing functional level access control vulnerability in HCL Aftermarket DPC (CVE-2025-55261) allows an attacker to escalate privileges, potentially compromising the application and leading to data theft or manipulation.

privilege-escalation access-control web-application
2r 1t 1i
high advisory

Online Quiz Maker 1.0 SQL Injection Vulnerability (CVE-2018-25207)

Online Quiz Maker 1.0 is vulnerable to SQL injection via the catid and usern parameters, allowing authenticated attackers to execute arbitrary SQL commands by submitting malicious POST requests to quiz-system.php or add-category.php.

sql-injection cve-2018-25207 web-application
2r 1t 4i
high advisory

KomSeo Cart 1.3 SQL Injection Vulnerability

KomSeo Cart 1.3 is vulnerable to SQL injection via the 'my_item_search' parameter in edit.php, allowing attackers to inject SQL commands and extract sensitive database information.

sqli vulnerability web-application
2r 1t
high advisory

ASP.NET jVideo Kit 1.0 SQL Injection Vulnerability

ASP.NET jVideo Kit 1.0 is vulnerable to SQL injection via the 'query' parameter in the search functionality, allowing unauthenticated attackers to inject malicious SQL payloads to extract sensitive database information.

sql-injection vulnerability asp.net
2r 1t
high threat

TeamPCP Supply Chain Attack via CI/CD Compromise

TeamPCP compromised CI/CD pipelines and GitHub accounts of multiple companies by deploying an infostealer to extract credentials from CI environments, .env files, and cloud tokens, impacting projects like Trivy, KICS, and LiteLLM.

TeamPCP supply-chain ci/cd infostealer
2r 1t
high advisory

OpenEMR XXE Vulnerability (CVE-2026-33913)

OpenEMR before version 8.0.0.3 is vulnerable to XML External Entity (XXE) injection, allowing an authenticated user with access to the Carecoordination module to upload a crafted CCDA document and read arbitrary files from the server.

cve-2026-33913 xxe openemr web-application
2r 1i
high advisory

OpenEMR Missing Authorization Allows Unauthorized Data Deletion

OpenEMR versions before 8.0.0.3 contain a missing authorization vulnerability in the AJAX deletion endpoint that allows any authenticated user to delete patient data.

openemr authorization-bypass data-deletion
2r 1t
high advisory

NATS Server WebSocket Frame Length Overflow Denial of Service

A vulnerability in NATS server allows a remote, unauthenticated attacker to cause a denial of service by sending a crafted WebSocket frame, leading to a server crash due to missing validation on WebSocket frame length.

nats websocket denial-of-service CVE-2026-27889 server-crash
2r 1t
high advisory

GitLab GraphQL CSRF Vulnerability (CVE-2026-3857)

CVE-2026-3857 describes a vulnerability in GitLab CE/EE versions 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1, where an unauthenticated user can execute arbitrary GraphQL mutations on behalf of authenticated users due to insufficient CSRF protection, potentially leading to data modification or privilege escalation.

gitlab csrf cve-2026-3857 graphql
2r 2t 1i
high advisory

SQL Injection Vulnerability in Simple Laundry System 1.0

A remote SQL Injection vulnerability exists in code-projects Simple Laundry System 1.0 within the Parameter Handler component's /checkregisitem.php file, where manipulating the Long-arm-shirtVol argument can trigger the injection, with a publicly available exploit.

sqli web-application vulnerability
2r 1t 6i
high advisory

SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0

A remote SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component affecting the `/sms/grades/index.php` file, allowing unauthorized database access and has been publicly disclosed.

sqli vulnerability web-application
2r 1t
high advisory

code-projects Online Food Ordering System SQL Injection Vulnerability (CVE-2026-4844)

CVE-2026-4844 describes a SQL injection vulnerability in the Admin Login Module of code-projects Online Food Ordering System 1.0, which can be exploited remotely by manipulating the Username argument in the /admin.php file.

sql-injection web-application cve-2026-4844
2r 1t
high advisory

SourceCodester Malawi Online Market SQL Injection Vulnerability (CVE-2026-4838)

A remote SQL injection vulnerability (CVE-2026-4838) exists in the /display.php file of SourceCodester Malawi Online Market 1.0 due to improper input sanitization of the ID parameter, potentially allowing attackers to execute arbitrary SQL queries.

sqli web-application cve-2026-4838
2r 1t 6i
high advisory

OpenEMR Blind SQL Injection Vulnerability in Patient Search (CVE-2026-29187)

OpenEMR versions prior to 8.0.0.3 are susceptible to a blind SQL injection vulnerability in the Patient Search functionality, allowing authenticated attackers to execute arbitrary SQL commands by manipulating HTTP parameter keys.

sqli openemr vulnerability
2r 1t
high advisory

Picomatch ReDoS Vulnerability via Extglob Quantifiers

Picomatch is vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns with quantifiers, leading to excessive CPU consumption and denial of service.

picomatch ReDoS denial-of-service extglob
2r 1t
high advisory

Protobuf PHP Library Denial of Service Vulnerability

A denial-of-service vulnerability exists in the Protobuf PHP library due to maliciously crafted messages with negative varints or deep recursion, leading to application crashes and impacting service availability.

protobuf dos php
2r 1t
high advisory

Sharp Laravel Admin Panel Unrestricted File Upload Vulnerability

The code16/sharp Laravel admin panel package contains a vulnerability in its file upload endpoint that allows authenticated users to bypass all file type restrictions by manipulating the validation_rule parameter, potentially leading to Remote Code Execution (RCE) if the storage disk is configured to be publicly accessible.

laravel file-upload rce code16/sharp
2r 1t 5i
high advisory

OpenCart Core SQL Injection Vulnerability (CVE-2024-58341)

OpenCart Core 4.0.2.3 is vulnerable to SQL injection via the 'search' parameter, enabling unauthenticated attackers to manipulate database queries and extract sensitive information through boolean-based or time-based blind SQL injection.

cve-2024-58341 sql-injection opencart
2r 1t
high advisory

Kiteworks Core Access Control Vulnerability (CVE-2026-23514)

Kiteworks Core versions 9.2.0 and 9.2.1 contain an access control vulnerability (CVE-2026-23514) due to improper ownership management, allowing authenticated users to access unauthorized content, which can be mitigated by upgrading to version 9.2.2 or later.

access-control vulnerability kiteworks
2r 1t 1i
high advisory

SourceCodester Online Catering Reservation SQL Injection Vulnerability (CVE-2026-4615)

A SQL injection vulnerability exists in SourceCodester Online Catering Reservation 1.0's `/search.php` file, allowing remote attackers to execute arbitrary SQL commands by manipulating the `rcode` argument.

sql-injection cve-2026-4615 web-application
2r 1t 5i
high advisory

Salvo Web Framework Denial of Service Vulnerability (CVE-2026-33241)

The Salvo web framework before version 0.89.3 is vulnerable to denial of service due to unbounded memory allocation when parsing form data, enabling attackers to crash services by sending large payloads.

denial-of-service web-framework rust
2r 1t
high advisory

Palo Alto Networks Recruiting Impersonation Phishing Campaign

Since August 2025, threat actors have been impersonating Palo Alto Networks talent acquisition staff in a sophisticated phishing campaign targeting senior professionals, using social engineering tactics to solicit fraudulent resume fees.

phishing recruiting social-engineering scam
2r 2t 6i
high advisory

Langflow Path Traversal Vulnerability (CVE-2026-33497)

A path traversal vulnerability in Langflow versions before 1.7.1 allows unauthenticated attackers to read sensitive files via the download_profile_picture endpoint due to insufficient filtering of the folder_name and file_name parameters.

path-traversal vulnerability web-application
2r 1t
high advisory

Device Code Phishing Campaign Targeting Cloud Platforms

A phishing campaign abuses Microsoft's Device Code OAuth flow to gain access to cloud-based file storage and document workflow platforms, bypassing traditional credential harvesting.

credential-access initial-access phishing oauth
2r 2t
high advisory

CVE-2026-4675: Google Chrome WebGL Heap Buffer Overflow Vulnerability

A heap buffer overflow vulnerability (CVE-2026-4675) exists in Google Chrome's WebGL implementation prior to version 146.0.7680.165, allowing a remote attacker to perform an out-of-bounds memory read via a specially crafted HTML page, potentially leading to information disclosure or arbitrary code execution.

cve-2026-4675 heap-buffer-overflow webgl chrome remote-code-execution
2r 2t
high advisory

CODESYS Control Runtime System Audit Log DoS Vulnerability (CVE-2026-3509)

An unauthenticated remote attacker can exploit CVE-2026-3509 in the CODESYS Control runtime system to control the format string of messages processed by the Audit Log, leading to a denial-of-service (DoS) condition.

codesys dos cve-2026-3509 ics ot
2r 1t
high advisory

Blinko Pre-1.8.4 OS Command Injection Vulnerability

Blinko versions before 1.8.4 are vulnerable to OS Command Injection (CWE-78), where the MCP server creation function allows specifying arbitrary commands and arguments that are executed when testing the connection, potentially leading to code execution for attackers with high privileges.

cve-2026-23882 command-injection blinko
2r 1t 4i
high advisory

Apache CXF Vulnerability Allows DoS and Information Disclosure

An anonymous remote attacker can exploit a vulnerability in Apache CXF to perform a denial of service attack and disclose sensitive information.

apache-cxf denial-of-service information-disclosure webserver
2r 2t
high advisory

IBM WebSphere Application Server Liberty Multiple Vulnerabilities

A remote, authenticated attacker can exploit multiple vulnerabilities in IBM WebSphere Application Server Liberty to escalate privileges, bypass security measures, and disclose information.

websphere vulnerability privilege-escalation defense-evasion information-disclosure
2r 3t
high advisory

TIBCO ActiveMatrix Vulnerability Allows Information Disclosure and Data Manipulation

A remote, authenticated attacker can exploit a vulnerability in TIBCO ActiveMatrix and TIBCO Administrator to disclose information and manipulate data, potentially leading to unauthorized access and control.

tibco vulnerability information-disclosure data-manipulation
2r 2t
high threat

M-Trends 2026: Evolving Threat Landscape

The M-Trends 2026 report highlights the increasing sophistication of threat actors, including voice phishing attacks targeting SaaS environments, ransomware groups actively destroying recovery capabilities, and espionage groups exploiting edge devices for persistent access, revealing a shift towards faster hand-offs between initial access brokers and ransomware deployers.

Scattered Spider +10 threat-report ransomware phishing saas
3r 10t
high threat

NICKEL ALLEY Targeting Developers with Fake Job Opportunities

NICKEL ALLEY, a North Korean threat group, is targeting technology professionals with fake job opportunities and malicious code repositories to deliver malware like PyLangGhost RAT and BeaverTail, aiming to steal cryptocurrency.

NICKEL ALLEY North Korea cryptocurrency supply-chain
2r 5t 4i
high advisory

Red Hat JBoss Enterprise Application Platform Multiple Vulnerabilities

An anonymous remote attacker can exploit multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform to cause a denial-of-service condition, manipulate data, and conduct further attacks such as cache poisoning and session hijacking.

jboss undertow denial-of-service cache-poisoning session-hijacking webserver
2r 3t
high advisory

Multiple Vulnerabilities in Grub Bootloader

Multiple vulnerabilities in the Grub bootloader allow attackers to execute arbitrary code and cause denial-of-service conditions.

bootloader grub2 vulnerability denial-of-service arbitrary-code-execution
2r 2t
high advisory

RedHat Multicluster Engine for Kubernetes Privilege Escalation Vulnerability

A local attacker can exploit a vulnerability in RedHat Multicluster Engine for Kubernetes to escalate privileges.

kubernetes privilege-escalation cloud
2r 1t
high advisory

Uncontrolled VM Growth Leading to Security Gaps in Cloud Environments

Uncontrolled growth of virtual machines (VM sprawl) in cloud environments allows attackers to exploit unmonitored VMs with overly permissive access for lateral movement, data exfiltration, and ransomware deployment.

cloud vm-sprawl identity-abuse
2r 7t
high advisory

Checkmk Vulnerability Allows Session Hijacking

An authenticated remote attacker can exploit a vulnerability in Checkmk to bypass security measures, leading to session hijacking.

checkmk session-hijacking vulnerability
2r 1t
high advisory

Multiple Vulnerabilities in Vim Allow Local Code Execution and DoS

Multiple vulnerabilities in vim allow a local attacker to execute arbitrary code, cause a denial-of-service condition, or manipulate data.

vim vulnerability code execution denial of service
2r 2t
high advisory

Froxlor Vulnerability Allows File Manipulation and Information Disclosure

A vulnerability in Froxlor allows an attacker to manipulate files and disclose sensitive information, potentially leading to data breaches or system compromise.

froxlor vulnerability file-manipulation information-disclosure
2r 1t
high advisory

Out-of-Cancel Vulnerability Class in Linux Workqueue Cancellation APIs

The 'Out-of-Cancel' vulnerability class stems from flaws in Linux workqueue cancellation APIs, potentially leading to exploitable conditions within the kernel.

linux kernel vulnerability workqueue
2r 1t
high advisory

Craft CMS Authenticated Remote Code Execution via Malicious Attached Behavior

A remote code execution vulnerability exists in Craft CMS versions 5.6.0 through 5.9.12, where any authenticated user with control panel access can exploit the vulnerability by injecting malicious behavior via the `fieldLayouts` parameter in `ElementIndexesController::actionFilterHud()` due to the unsanitized parameter being passed to `FieldLayout::createFromConfig()`.

craftcms rce vulnerability webserver
2r 1t
high advisory

Free5GC AMF Denial-of-Service Vulnerability (CVE-2026-30653)

A remote attacker can exploit CVE-2026-30653 in Free5GC v4.2.0 and earlier by sending crafted requests to the AMF component's HandleAuthenticationFailure function, leading to a denial-of-service condition.

free5gc denial-of-service cve-2026-30653 amf
2r 2t
high advisory

NGINX ngx_mail_auth_http_module Denial-of-Service Vulnerability (CVE-2026-27651)

NGINX Plus and NGINX Open Source are vulnerable to a denial-of-service condition (CVE-2026-27651) when the ngx_mail_auth_http_module is enabled, CRAM-MD5 or APOP authentication is used, and the authentication server permits retry via the Auth-Wait response header, leading to worker process termination.

nginx denial-of-service mail proxy cve-2026-27651
2r 2t 1i
high advisory

SQL Injection Vulnerability in Free Hotel Reservation System 1.0

A SQL injection vulnerability (CVE-2026-4612) exists in itsourcecode Free Hotel Reservation System 1.0 within the Parameter Handler component, allowing remote attackers to execute arbitrary SQL commands via the account_id parameter in the /hotel/admin/mod_users/index.php script.

cve-2026-4612 sql-injection web-application
2r 1t
high advisory

CVE-2026-4690: Mozilla Firefox, Firefox ESR, and Thunderbird XPCOM Sandbox Escape

A sandbox escape vulnerability, identified as CVE-2026-4690, exists in the XPCOM component of Mozilla Firefox, Firefox ESR, and Thunderbird due to incorrect boundary conditions and an integer overflow, potentially allowing an attacker to execute arbitrary code outside the sandbox.

sandbox escape integer overflow mozilla firefox mozilla thunderbird cve-2026-4690
2r 1t 1i
high advisory

libpng Vulnerability Allows Code Execution

A vulnerability in libpng allows a remote, anonymous attacker to potentially execute arbitrary code, disclose sensitive information, or cause a denial-of-service condition.

libpng code-execution vulnerability
2r 4t
high advisory

Inout Article Base CMS SQL Injection Vulnerability (CVE-2019-25640)

Inout Article Base CMS is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries through the 'p' and 'u' parameters via XOR-based payloads in GET requests to portalLogin.php, potentially leading to sensitive information extraction or denial-of-service.

sql-injection cve-2019-25640 inout-article-base-cms
2r 1t 4i
high advisory

Zeeways Jobsite CMS SQL Injection Vulnerability (CVE-2019-25636)

Zeeways Jobsite CMS is vulnerable to SQL injection, allowing unauthenticated attackers to inject SQL code through the 'id' GET parameter in crafted requests to news_details.php, jobs_details.php, or job_cmp_details.php to extract sensitive database information.

sql-injection cve-2019-25636 web-application
2r 1t 4i
high advisory

X-NetStat Pro 5.63 Local Buffer Overflow Vulnerability

X-NetStat Pro 5.63 contains a local buffer overflow vulnerability (CVE-2019-25637) allowing local attackers to execute arbitrary code by overwriting the EIP register.

buffer-overflow code-execution windows cve-2019-25637
2r 1t
high advisory

Meeplace Business Review Script SQL Injection Vulnerability (CVE-2019-25638)

Meeplace Business Review Script is vulnerable to SQL injection via the 'id' parameter in the addclick.php endpoint, allowing unauthenticated attackers to execute arbitrary SQL queries and potentially extract sensitive database information or cause a denial of service.

sql-injection web-application cve-2019-25638
2r 1t 4i
high advisory

Base64 Decoder 1.1.2 Stack-Based Buffer Overflow (CVE-2019-25634)

Base64 Decoder 1.1.2 is vulnerable to a stack-based buffer overflow (CVE-2019-25634) allowing local attackers to achieve arbitrary code execution via a crafted input file that triggers an SEH overwrite.

cve-2019-25634 buffer-overflow seh-overwrite code-execution
2r 2t
high advisory

AIDA64 Business SEH Buffer Overflow Vulnerability (CVE-2019-25631)

AIDA64 Business 5.99.4900 is vulnerable to a local Structured Exception Handling (SEH) buffer overflow (CVE-2019-25631) allowing attackers to execute arbitrary code by overwriting SEH pointers with malicious shellcode.

cve-2019-25631 buffer-overflow seh aida64 windows
2r 3t
high advisory

FlexHEX 2.71 Local Buffer Overflow Vulnerability (CVE-2019-25627)

FlexHEX 2.71 is vulnerable to a local buffer overflow in the Stream Name field, allowing local attackers to execute arbitrary code via a structured exception handler (SEH) overflow.

buffer-overflow seh-overflow local-privilege-escalation windows
2r 2t
high advisory

AIDA64 Extreme 5.99.4900 Structured Exception Handler Buffer Overflow

AIDA64 Extreme 5.99.4900 is vulnerable to a structured exception handler buffer overflow, allowing local attackers to execute arbitrary code by supplying a malicious CSV log file path through the Hardware Monitoring logging preferences.

aida64 buffer-overflow vulnerability
2r 1t 4i
high advisory

Compromised Litellm PyPI Package Versions

Versions 1.82.7 and 1.82.8 of the Litellm package on PyPI were compromised in a supply chain attack, potentially impacting numerous users, with recommendations to avoid updating to these versions.

supply-chain pypi litellm compromise
2r 4t 1i
high advisory

Multiple Vulnerabilities in cPanel/WHM

An anonymous remote attacker can exploit multiple vulnerabilities in cPanel/WHM to bypass security measures, perform XSS and SSRF attacks, disclose information, and potentially execute code.

cPanel WHM XSS SSRF vulnerability
2r 2t
high advisory

WWBN AVideo Unauthenticated decryptString Vulnerability

WWBN AVideo, up to version 26.0, contains an improper authentication vulnerability (CVE-2026-33512) in the API plugin's `decryptString` action, allowing unauthenticated users to decrypt publicly accessible ciphertext and potentially recover protected tokens/metadata.

cve-2026-33512 avideo improper-authentication api-vulnerability
2r 1t
high advisory

WP Job Portal Plugin SQL Injection Vulnerability

The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter, allowing unauthenticated attackers to extract sensitive database information in versions up to 2.4.8.

sql-injection wordpress plugin
2r 1t
high advisory

strongSwan EAP-TTLS AVP Integer Underflow Vulnerability (CVE-2026-25075)

An integer underflow vulnerability in strongSwan's EAP-TTLS AVP parser allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication, leading to excessive memory allocation or a NULL pointer dereference.

denial-of-service integer-underflow strongSwan CVE-2026-25075
2r 1t
high advisory

SourceCodester Online Library Management System SQL Injection Vulnerability (CVE-2026-4624)

A remote SQL injection vulnerability (CVE-2026-4624) exists in SourceCodester Online Library Management System 1.0 by manipulating the 'searchField' parameter in the /home.php file, potentially allowing attackers to execute arbitrary SQL commands.

sql-injection cve-2026-4624 web-application
2r 1t
high advisory

OpenClaw Improper Header Validation Leads to Credential Leakage

OpenClaw before 2026.3.7 is vulnerable to improper header validation in fetchWithSsrFGuard, allowing attackers to intercept sensitive authorization headers via cross-origin redirects.

cve-2026-32913 credential-access header-injection openclaw
2r 1t
high advisory

MacCMS 2025.1000.4052 Missing Authentication Vulnerability (CVE-2026-4562)

A missing authentication vulnerability exists in MacCMS 2025.1000.4052, specifically affecting the Timming API Endpoint component in application/api/controller/Timming.php, allowing remote attackers to bypass authentication.

CVE-2026-4562 authentication-bypass web-application
2r 1t
high advisory

Lucky Pasta Shellcode Loader for Windows

A shellcode loader dubbed 'Lucky Pasta' employs JIT decryption, string obfuscation, dynamic library loading, fiber-based execution, and AES instruction patching to evade AV detection, retrieving shellcode via HTTP/HTTPS and executing it on Windows systems.

shellcode windows jit defense-evasion
2r 3t 2i
high advisory

JetAudio jetCast Server 2.0 Stack-Based Buffer Overflow

JetAudio jetCast Server 2.0 is vulnerable to a stack-based buffer overflow in the Log Directory configuration, enabling local attackers to overwrite structured exception handling pointers and execute arbitrary code.

buffer-overflow privilege-escalation execution windows
2r 2t 5i
high advisory

Crunchyroll Data Breach via Telus Supply Chain Compromise

Crunchyroll suffered a data breach after a Telus employee was phished, leading to Okta credential theft and exfiltration of 100GB of customer data.

supply-chain data-breach credential-theft phishing
2r 3t 1i
high advisory

Connect-CMS Improper Authorization Vulnerability (CVE-2026-32299)

Connect-CMS versions 1.x up to 1.41.0 and 2.x up to 2.41.0 are vulnerable to improper authorization in the page content retrieval feature, potentially allowing retrieval of non-public information, addressed in versions 1.41.1 and 2.41.1.

cve-2026-32299 connect-cms authorization-bypass
2r 1t 1i
high advisory

Census CSWeb 8.0.1 Path Traversal Vulnerability (CVE-2025-60946)

CVE-2025-60946 details a vulnerability in Census CSWeb 8.0.1, where arbitrary file path input is permitted, allowing a remote, authenticated attacker to access unintended file directories.

path-traversal cve-2025-60946 web-application
2r 2t
high advisory

Census CSWeb 8.0.1 Arbitrary File Upload Vulnerability

A remote, authenticated attacker can exploit an arbitrary file upload vulnerability in Census CSWeb 8.0.1 (CVE-2025-60947) to upload malicious files, potentially leading to remote code execution.

file-upload remote-code-execution web-application
2r 2t
high advisory

OpenSSH Vulnerabilities Allow Local Code Execution

A local attacker can exploit multiple vulnerabilities in OpenSSH to execute arbitrary code, potentially leading to privilege escalation and system compromise.

openssh code-execution privilege-escalation
2r 1t
high advisory

PostgreSQL JDBC Driver SQL Injection Vulnerability

An anonymous, remote attacker can exploit a vulnerability in the PostgreSQL JDBC Driver to perform SQL injection attacks.

sql-injection postgresql jdbc
2r 1t
high advisory

Apache CXF Multiple Vulnerabilities Allow Information Disclosure and SSRF

A remote attacker can exploit multiple vulnerabilities in Apache CXF to disclose information and perform Server-Side Request Forgery (SSRF) attacks.

apache-cxf ssrf information-disclosure
2r 1t
high advisory

Multiple Vulnerabilities in FreeRDP Allow for DoS and Potential Code Execution

A remote, anonymous attacker can exploit multiple vulnerabilities in FreeRDP to cause a denial of service or potentially execute arbitrary program code.

freerdp rdp vulnerability denial-of-service code-execution
2r 2t
high advisory

Red Hat Enterprise Linux libxslt Vulnerability Allows Code Execution or File Manipulation

A local attacker can exploit a vulnerability in libxslt in Red Hat Enterprise Linux to execute arbitrary program code or manipulate files.

libxslt rhel code-execution file-manipulation linux
2r 3t
high advisory

Out-of-bounds Write Vulnerability in DualSenseY-v2

CVE-2026-33850 is an out-of-bounds write vulnerability in WujekFoliarz DualSenseY-v2 before version 54, potentially allowing an attacker to execute arbitrary code or cause a denial-of-service by writing data outside the allocated buffer.

cve vulnerability oob-write dualsensey-v2
2r 3t
high advisory

doslib Memory Buffer Overflow Vulnerability (CVE-2026-33851)

An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability exists in joncampbell123's doslib before version doslib-20250729, potentially leading to arbitrary code execution.

cve-2026-33851 buffer-overflow doslib
2r 3t
high advisory

linkingvision rapidvms Improper Memory Buffer Restriction Vulnerability (CVE-2026-33847)

An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in linkingvision rapidvms before PR#96 could lead to arbitrary code execution.

cve buffer-overflow rapidvms
2r 2t 1i
high advisory

Vitals ESP Incorrect Authorization Vulnerability (CVE-2026-4639)

CVE-2026-4639 is an Incorrect Authorization vulnerability in Galaxy Software Services' Vitals ESP, allowing authenticated remote attackers to perform administrative functions and escalate privileges.

incorrect-authorization privilege-escalation web-application
2r 1t
high advisory

Galaxy Software Services Vitals ESP Missing Authentication Vulnerability (CVE-2026-4640)

Vitals ESP developed by Galaxy Software Services suffers from a missing authentication vulnerability (CVE-2026-4640), enabling unauthenticated remote attackers to execute functions and obtain sensitive information.

cve-2026-4640 missing-authentication vitals-esp
2r 1t 3i
high advisory

SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0 (CVE-2026-4632)

CVE-2026-4632 is a SQL Injection vulnerability in itsourcecode Online Enrollment System 1.0, specifically affecting the Parameter Handler component at '/sms/user/index.php?view=add', allowing a remote attacker to inject malicious SQL code by manipulating the 'Name' argument, with a public exploit available.

sql-injection web-application cve-2026-4632
2r 1t
high advisory

D-Link DIR-825/825R OS Command Injection Vulnerability (CVE-2026-4627)

CVE-2026-4627 is an OS command injection vulnerability in the handler_update_system_time function of the libdeuteron_modules.so file in the NTP Service component of D-Link DIR-825 and DIR-825R devices, which can be exploited remotely by authenticated attackers.

command-injection router legacy-device
2r 2t
high advisory

SourceCodester Online Admission System 1.0 SQL Injection Vulnerability

A SQL injection vulnerability in SourceCodester Online Admission System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'program' argument in the /programmes.php file.

sql-injection web-application vulnerability
2r 1t 6i
high advisory

DefaultFuction Jeson-Customer-Relationship-Management-System Server-Side Request Forgery Vulnerability

A server-side request forgery (SSRF) vulnerability exists in the DefaultFuction Jeson-Customer-Relationship-Management-System's API Module, specifically affecting the /api/System.php file, allowing remote attackers to manipulate the 'url' argument and potentially access internal resources.

ssrf cve-2026-4623 jeson-crm webserver
2r 10t
high advisory

Google Chrome WebGPU Use-After-Free Vulnerability (CVE-2026-4678)

A use-after-free vulnerability in Google Chrome's WebGPU component (CVE-2026-4678) allows a remote attacker to execute arbitrary code within a sandbox by crafting a malicious HTML page, affecting Chrome versions prior to 146.0.7680.165.

cve-2026-4678 use-after-free chrome webgpu
2r 1t
high advisory

Google Chrome WebAudio Out-of-Bounds Read Vulnerability (CVE-2026-4677)

A remote attacker can trigger an out-of-bounds memory read in Google Chrome's WebAudio implementation by crafting a malicious HTML page (CVE-2026-4677), affecting versions prior to 146.0.7680.165.

cve-2026-4677 chrome webaudio out-of-bounds read
2r 1t 1i
high advisory

Google Chrome Use-After-Free Vulnerability (CVE-2026-4676)

A use-after-free vulnerability (CVE-2026-4676) in Google Chrome before 146.0.7680.165 allows a remote attacker to potentially perform a sandbox escape via a crafted HTML page.

use-after-free sandbox-escape chrome cve-2026-4676
2r 1t
high advisory

Google Chrome Font Integer Overflow Vulnerability (CVE-2026-4679)

A remote attacker can perform an out-of-bounds memory write on Google Chrome by exploiting an integer overflow in the Fonts component via a crafted HTML page in versions prior to 146.0.7680.165.

cve-2026-4679 chrome integer-overflow memory-corruption
2r 3t
high advisory

Google Chrome Out-of-Bounds Read Vulnerability (CVE-2026-4674)

A remote attacker can exploit an out-of-bounds read vulnerability (CVE-2026-4674) in Google Chrome versions prior to 146.0.7680.165 to achieve out-of-bounds memory access via a crafted HTML page, impacting confidentiality, integrity, and availability.

cve out-of-bounds read chrome
2r 1t 2i
high advisory

Spring Cloud Config Server Path Traversal Vulnerability (CVE-2026-22739)

A path traversal vulnerability exists in Spring Cloud Config Server versions 3.1.x before 3.1.13, 4.1.x before 4.1.9, 4.2.x before 4.2.3, 4.3.x before 4.3.2, and 5.0.x before 5.0.2, allowing unauthenticated remote attackers to access files outside configured search directories when using the native file system backend.

cve-2026-22739 path-traversal spring-cloud
2r 1t 1i
high advisory

SourceCodester E-Commerce Site SQL Injection Vulnerability (CVE-2026-4613)

A remote SQL injection vulnerability (CVE-2026-4613) exists in SourceCodester E-Commerce Site 1.0 within the /products.php file due to improper input sanitization of the 'Search' argument, potentially allowing attackers to read or modify sensitive database information.

sql-injection web-application ecommerce cve-2026-4613
2r 1t
high advisory

Go MCP SDK Vulnerable to Cross-Site POST Requests (CVE-2026-33252)

The Go MCP SDK before v1.4.1 is vulnerable to cross-site POST requests due to insufficient origin validation and content type enforcement, potentially leading to arbitrary tool execution on local servers in stateless or sessionless deployments.

cve-2026-33252 cross-site request forgery go-mcp-sdk
1r 1t
high advisory

Salvo Web Framework Path Traversal Vulnerability

Salvo web framework versions 0.39.0 through 0.89.2 are vulnerable to Path Traversal and Access Control Bypass, allowing unauthenticated external attackers to bypass proxy routing constraints and access unintended backend paths.

path-traversal access-control-bypass web-framework
2r 1t
high advisory

Connect-CMS Cabinet Plugin DOM-based XSS Vulnerability

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the Cabinet Plugin list view of Connect-CMS, affecting versions 1.35.0 to 1.41.0 and 2.35.0 to 2.41.0, which can lead to arbitrary script execution in the victim's browser.

xss connect-cms cabinet-plugin
2r 1t
high threat

TeamPCP Compromise of KICS GitHub Action Supply Chain

TeamPCP conducted a supply chain attack compromising the KICS GitHub Action, impacting users who integrated the compromised version into their CI/CD pipelines.

TeamPCP supply-chain github-actions ci/cd
2r 4t
high advisory

WWBN AVideo Privilege Escalation via Moderator Account

WWBN AVideo platform versions up to 26.0 allows a 'Videos Moderator' to escalate privileges and perform unauthorized video management operations due to inconsistent authorization checks.

avideo privilege-escalation web-application
2r 1t
high advisory

Schneider Electric Modicon PLC Denial-of-Service Vulnerability

Team82 disclosed vulnerabilities in Schneider Electric Modicon Controllers M241, M251, and M262 PLC lines, which can allow an attacker to cause a denial-of-service condition and affect controller availability.

plc denial-of-service industrial-control-system modicon
2r 1t 2i
high advisory

Erupt Framework SQL Injection Vulnerability (CVE-2026-4594)

A SQL injection vulnerability (CVE-2026-4594) exists in erupts erupt up to version 1.13.3, allowing remote attackers to execute arbitrary SQL commands by manipulating the sort.field argument in the geneEruptHqlOrderBy function.

sql-injection vulnerability erupt
2r 1t
high advisory

WWBN AVideo Unauthorized File Access and Deletion Vulnerability

WWBN AVideo platform versions up to 26.0 are vulnerable to unauthorized file access and deletion, where an authenticated user with upload permissions can exploit the `objects/import.json.php` endpoint by manipulating the `fileURI` parameter to steal private video files, read adjacent text files, and delete `.mp4` and other writable files on the filesystem.

avideo file-access vulnerability
2r 2t
high advisory

cgltf Integer Overflow Vulnerability in Sparse Accessor Validation

cgltf version 1.15 and prior contain an integer overflow vulnerability in the cgltf_validate() function when validating sparse accessors, allowing attackers to trigger out-of-bounds reads via crafted glTF/GLB files, leading to denial of service and potential memory disclosure.

integer-overflow denial-of-service memory-disclosure glTF cgltf
2r 2t
high advisory

Notepad2 PROPSYS.dll Uncontrolled Search Path Vulnerability (CVE-2026-4545)

CVE-2026-4545 describes a vulnerability in Flos Freeware Notepad2 4.2.25, where manipulating PROPSYS.dll leads to an uncontrolled search path, potentially allowing a local attacker to execute arbitrary code with elevated privileges.

cve uncontrolled search path privilege escalation
2r 1t
high advisory

FTP Shell Server 6.83 Buffer Overflow Vulnerability (CVE-2019-25619)

FTP Shell Server 6.83 contains a buffer overflow vulnerability (CVE-2019-25619) in the 'Account name to ban' field, enabling a local attacker to execute arbitrary code by injecting shellcode through a crafted string in the Manage FTP Accounts dialog.

buffer-overflow code-execution ftp
2r 1t
high advisory

EquityPandit 1.0 Insecure Logging Vulnerability (CVE-2019-25605)

EquityPandit 1.0 contains an insecure logging vulnerability (CVE-2019-25605) that allows attackers to capture sensitive user credentials by accessing developer console logs via Android Debug Bridge, specifically exposing plaintext passwords during the forgot password function.

insecure-logging credential-access android
2r 1t
high advisory

Admin Express 1.2.5.485 Local SEH Buffer Overflow Vulnerability

Admin Express 1.2.5.485 is susceptible to a local structured exception handling buffer overflow vulnerability, enabling local attackers to execute arbitrary code via a crafted payload in the Folder Path field of the System Compare feature.

cve-2019-25612 buffer-overflow local-privilege-escalation windows
2r 2t
high advisory

DVDXPlayer Pro 5.5 Local Buffer Overflow Vulnerability (CVE-2019-25604)

DVDXPlayer Pro 5.5 is vulnerable to a local buffer overflow, allowing local attackers to execute arbitrary code by crafting malicious playlist files.

buffer-overflow seh-overwrite cve-2019-25604 dvdxplayer
2r 2t
high advisory

Agent Skill Marketplace Supply Chain Attack via GitHub Account Hijacking

A supply chain attack targets agent skill marketplaces by exploiting GitHub username hijacking, allowing threat actors to intercept skill downloads from vulnerable repositories, with scanners showing significant disagreement on malicious skill identification and embedded live API credentials discovered.

supply-chain github agent-skills repository-hijacking
2r 1t 2i
high advisory

Xenstore Crash Vulnerability via Malicious Node Path Access (CVE-2026-23555)

A guest VM issuing a Xenstore command with the node path '/local/domain/' can crash xenstored (CVE-2026-23555), or, if NDEBUG is defined, cause denial of service by consuming all CPU resources.

xen xenstore denial-of-service CVE-2026-23555 hypervisor vulnerability linux
2r 1t
high advisory

Jsrsasign < 11.1.1 Incorrect Conversion Vulnerability (CVE-2026-4602)

Jsrsasign versions before 11.1.1 are vulnerable to an incorrect conversion between numeric types vulnerability, where an attacker can force the computation of incorrect modular inverses and break signature verification by calling modPow with a negative exponent.

jsrsasign vulnerability signature-bypass
2r 1t
high advisory

Jsrsasign Infinite Loop Vulnerability (CVE-2026-4598)

Jsrsasign versions before 11.1.1 are vulnerable to an infinite loop via the bnModInverse function when processing zero or negative inputs, potentially leading to a denial of service.

denial-of-service javascript node.js jsrsasign vulnerability
2r 1t
high advisory

WP Maps WordPress Plugin Time-Based SQL Injection Vulnerability (CVE-2026-2580)

The WP Maps WordPress plugin before version 4.9.2 is vulnerable to time-based SQL Injection via the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive information from the database.

wordpress sqli cve-2026-2580 web-application
2r 1t
high threat

TeamPCP Deploys CanisterWorm on NPM After Trivy Compromise

TeamPCP deployed the CanisterWorm malware on the NPM package registry following a compromise of the Trivy scanning tool.

TeamPCP supply-chain malware npm canisterworm
2r 3t
high advisory

Trivy Scanner Compromised in Supply Chain Attack

The widely used Trivy scanner has been compromised in an ongoing supply chain attack, potentially impacting numerous organizations using the tool for vulnerability management.

supply-chain vulnerability-scanner trivy
2r 3t
high advisory

GhostLoader Malware Targeting macOS via GitHub and AI Workflows

GhostLoader malware leverages GitHub repositories and AI-assisted development workflows to distribute credential-stealing payloads targeting macOS systems.

github malware macos credential-theft ai
2r 1t
high advisory

Trivy Security Scanner GitHub Actions Tag Hijacking for CI/CD Secret Theft

Attackers hijacked 75 tags associated with the Trivy Security Scanner GitHub Actions to steal CI/CD secrets from users of the compromised tags.

supply-chain github-actions ci/cd tag-hijacking
2r 4t
high advisory

Claude Code Workspace Trust Dialog Bypass via Settings Loading Order (CVE-2026-33068)

A maliciously crafted `.claude/settings.json` file in a Claude Code repository (versions prior to 2.1.53) can bypass the workspace trust confirmation dialog by exploiting a configuration loading order defect, allowing for arbitrary code execution within a supposedly untrusted workspace.

claude-code workspace-trust cve-2026-33068 bypass
2r 1t
high advisory

Speagle Malware Hijacks Cobra DocGuard for Data Exfiltration

The Speagle malware hijacks the Cobra DocGuard application to exfiltrate sensitive data from infected machines to attacker-controlled Cobra DocGuard servers, effectively masking malicious traffic as legitimate DocGuard communication.

malware data-exfiltration cobra-docguard speagle
2r 1t
high threat

China-Nexus Campaign Using Google Calendar as C2

A China-nexus threat actor is utilizing Google Calendar as a command and control (C2) infrastructure to conduct stealthy operations.

China-nexus actor google-calendar c2 china-nexus
2r 4t
high advisory

Potential snap-confine Privilege Escalation via CVE-2026-3888

An unprivileged user may exploit CVE-2026-3888 to escalate privileges to root by creating malicious files in the /tmp/.snap directory.

privilege-escalation linux cve-2026-3888
2r 1t
high advisory

Disruption of Large IoT DDoS Botnets

Law enforcement has disrupted significant IoT botnets responsible for launching record-breaking distributed denial-of-service (DDoS) attacks, impacting the availability of targeted systems.

iot ddos botnet disruption
2r 1t
high threat

VoidStealer Steals Secrets by Debugging Chrome

VoidStealer leverages Chrome debugging capabilities to extract sensitive information, such as credentials and session cookies, directly from the browser's memory.

VoidStealer credential-theft chrome debugging
2r 1t
high threat

Operation GhostMail: Russian APT Exploiting Zimbra XSS to Target Ukraine Government

A Russian APT group is exploiting a Zimbra XSS vulnerability (details unspecified) to target the Ukrainian government in an operation dubbed 'GhostMail'.

Russian APT zimbra xss ukraine apt
2r 1t
high advisory

SnappyClient Malware Delivered via HijackLoader

SnappyClient is a multi-functional malware delivered via HijackLoader that steals data from browsers, takes screenshots, logs keystrokes, and establishes a remote terminal for attacker command and control.

snappyclient hijackloader malware infostealer keylogger
2r 3t
high advisory

Vulnerabilities in Paxton Net2 Access Control Units

Vulnerabilities in Paxton Net2 Access Control Units (ACUs) could allow unauthorized remote access and control of secured doors, potentially affecting prisons and other high-security facilities.

access-control physical-security vulnerability
2r 8t 1i
high advisory

CISA Urges Endpoint Management System Hardening After Cyberattack

CISA is urging hardening of endpoint management systems following a cyberattack against a US organization, highlighting the potential for significant impact via compromised management infrastructure.

endpoint-management supply-chain cisa
2r 5t
high advisory

DarkSword iOS Exploit Used in Infostealer Attack

A new exploit dubbed 'DarkSword' is being actively exploited in infostealer campaigns targeting iPhones, potentially leading to unauthorized data access and device compromise.

ios exploit infostealer darksword
2r 3t
high advisory

Memory Exhaustion Vulnerability in Widely Used Python Library

A memory exhaustion vulnerability (CVE-2026-33155) exists in a widely used Python library, affecting services like SageMaker, DataHub, and acryl-datahub due to an incomplete patch for CVE-2025-58367, requiring pinning to version 8.6.2.

memory-exhaustion vulnerability denial-of-service python supply-chain
2r 1t
high threat

North Korean IT Worker Operation Infiltration Techniques

Analysis of North Korean IT workers reveals techniques for infiltrating Western tech companies, including fake identity creation, internal training, and recruitment of collaborators.

DPRK IT Workers dprk itw infiltration remote-work
2r 2t 1i
high advisory

MOTW Bypass via CAB, TAR, and 7-Zip Chaining

A newly discovered Mark of the Web (MOTW) bypass technique utilizes a chain of CAB, TAR, and 7-Zip archives to circumvent SmartScreen and execute files without security warnings.

motw bypass phishing defense-evasion archive 7-zip cab tar
2r 2t 1i
high advisory

Vulnerabilities Disclosed in IP KVM Devices from Multiple Vendors

Researchers have disclosed unspecified vulnerabilities in IP KVM devices from four manufacturers, potentially allowing attackers to gain unauthorized access to connected systems.

ip-kvm vulnerability remote-access
2r 2t
high advisory

CVE-2026-22729: JSONPath Injection Vulnerability in Spring AI's PgVectorStore

CVE-2026-22729 is a JSONPath Injection vulnerability found in Spring AI's PgVectorStore, potentially allowing for unauthorized data access or modification.

cve-2026-22729 jsonpath-injection spring-ai
2r 1t
high advisory

CISA Urges Securing Microsoft Intune Systems Following Stryker Breach

CISA is urging US organizations to secure their Microsoft Intune systems due to a breach at Stryker, highlighting potential vulnerabilities in cloud-based device management that could lead to unauthorized access and control over managed devices.

microsoft-intune cloud-security device-management cisa-alert
2r 6t
high threat

Kimsuky Malware Using Dropbox API for Command and Control

Kimsuky is using malware that leverages the Dropbox API for command and control, enabling file exfiltration and remote code execution.

Kimsuky +4 dropbox api command-and-control exfiltration
2r 2t
high advisory

DarkSword iOS Exploit Chain Proliferation

The DarkSword exploit chain targets iOS versions 18 and under by exploiting a WebKit vulnerability, and is being adopted by multiple threat actors for initial access and execution.

ios exploit webkit darksword
1r 2t
high advisory

CrowdStrike Falcon AIDR Supports NVIDIA NeMo Guardrails for AI Agent Protection

CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails (v0.20.0) to protect AI agents from prompt injection, data exposure, and unauthorized actions, enabling safer deployment of AI applications.

ai-security prompt-injection data-protection guardrails agentic-ai
2r 6t
high advisory

Interlock Ransomware Campaign Targeting Enterprise Firewalls

The Interlock ransomware campaign is targeting enterprise firewalls to encrypt sensitive data and demand ransom payment.

ransomware firewall network
2r 3t
high advisory

ScreenConnect 26.1 Cryptographic Material Protection Vulnerability

ScreenConnect version 26.1 has a vulnerability related to the insufficient protection of server-level cryptographic material, potentially allowing unauthorized access and data compromise.

screenconnect vulnerability cryptographic-material
2r 1t
high advisory

RegPwnBOF Registry Symlink Race Condition Exploit

RegPwnBOF exploits a registry symlink race condition in the Windows Accessibility ATConfig mechanism, enabling a normal user to write arbitrary values to protected HKLM registry keys for persistence and privilege escalation.

registry symlink race-condition accessibility privilege-escalation persistence windows
2r 2t
high advisory

EmEditor Supply Chain Compromise Delivering Infostealer

A trojanized EmEditor installer was distributed through a trusted source, delivering an infostealer, highlighting how attackers exploit legitimate software distribution channels to bypass user trust and security controls.

supply-chain infostealer windows
2r 1t
high advisory

Entra ID Federated Identity Credential Issuer Modified

Modification of the issuer URL of a federated identity credential in Entra ID can allow an attacker to authenticate as the application's service principal, granting persistent access to Azure resources by pointing to an attacker-controlled identity provider and bypassing normal authentication.

azure entra_id federated_identity persistence privilege_escalation
2r 2t
high advisory

DarkSword iOS Exploit Kit Targeting iOS Devices

The DarkSword exploit kit targets iOS devices, leveraging unknown vulnerabilities to compromise devices.

ios exploit-kit darksword
2r 3t
high advisory

Credential Guard Bypass and Detection Strategies

This brief covers offensive techniques to bypass Credential Guard, a Windows security feature designed to protect credentials, and provides detection strategies for these bypass attempts.

credential-guard bypass windows
2r 2t 1i
high advisory

Angular Cross-Site Scripting (XSS) Vulnerability

A cross-site scripting (XSS) vulnerability exists in Angular versions prior to 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20, allowing attackers to execute arbitrary code within the context of the vulnerable application, potentially leading to session hijacking, data exfiltration, and unauthorized actions.

angular xss vulnerability
2r 5t
high advisory

GlassWorm Threat: DLL Injection and Chrome Hijacking

The GlassWorm threat involves DLL injection and Chrome hijacking via COM abuse, confirming a full supply chain loop, potentially leading to data theft and system compromise.

dll-injection chrome-hijacking com-abuse supply-chain
2r 2t
high advisory

Unscoped API Keys in AI Agent Frameworks

A research report auditing popular AI agent projects found that 93% rely on unscoped API keys as the only authentication mechanism, leading to potential credential exposure, privilege escalation, and lateral movement within multi-agent systems.

ai-agent api-key authorization credential-theft
2r 1t 2i
high advisory

Mirai C2 Remote Denial-of-Service Vulnerability (CVE-2024-45163)

CVE-2024-45163 is a remote denial-of-service vulnerability affecting Mirai command and control (C2) infrastructure, potentially disrupting botnet operations and related malicious activities.

cve-2024-45163 mirai dos iot
2r 1t
high advisory

PylangGhost RAT Observed on npm Registry

A new remote access trojan (RAT) named PylangGhost has been observed on the npm registry, posing a supply chain risk to developers and applications using affected packages.

supply-chain rat npm pylangghost
2r 1t
high advisory

Fileless Multi-Stage Remcos RAT via Phishing

A fileless multi-stage Remcos RAT is delivered via phishing, achieving memory-resident execution, but specific technical details are not provided in this brief.

remcos rat fileless phishing
2r 4t
high advisory

Malware Spreading Through Fake 'Claude Code' Google Ads

Malware is distributed via malicious advertisements on Google impersonating 'Claude Code', targeting both Windows and macOS operating systems with the goal of infecting users.

malware google_ads initial_access windows macos
2r 1t
high advisory

Glassworm Malware Hidden in Unicode Characters Affecting GitHub Repositories

The Glassworm malware utilizes invisible unicode characters to infect over 150 GitHub repositories, posing a supply chain risk to developers and users.

supply-chain unicode malware github
3r 4t 1i
high advisory

Phishing Campaign Abusing Google Cloud Storage Redirectors

A phishing campaign leverages Google Cloud Storage as a redirect layer to serve victims scam pages related to surveys, giveaways, rewards, alerts, and job lures, primarily hosted on .autos domains.

phishing redirect google-cloud-storage
2r 1t 2i
high advisory

Multiple Network Intrusion Attempts Detected

Multiple network-based intrusion attempts were detected on 2026-03-14, targeting PHP information exposure, Fortigate VPN exploitation, sensitive file access, and credential exposure.

network-intrusion vulnerability-exploitation information-disclosure
3r 2t 8i
high threat

CISA Adds Google Skia and Chromium V8 Vulnerabilities to KEV Catalog

CISA added CVE-2026-3909, an out-of-bounds write vulnerability in Google Skia, and CVE-2026-3910, an unspecified vulnerability in Google Chromium V8 to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation, highlighting the need for timely remediation.

vulnerability chrome skia cve-2026-3909 cve-2026-3910
2r 3t
high advisory

RegPwn Windows Local Privilege Escalation Vulnerability

RegPwn is a now-fixed local privilege escalation vulnerability in Windows that allowed an attacker to gain elevated privileges.

windows lpe privilege-escalation
2r 1t
high advisory

Fortigate VPN CVE-2023-27997 Exploitation Attempt

IDS alerts indicate a potential exploitation attempt against a Fortigate VPN server using CVE-2023-27997, characterized by repeated GET requests to the /remote/logincheck endpoint originating from a specific IPv6 address.

fortigate vpn cve-2023-27997 exploit initial-access
2r 1t 1i
high advisory

Yokogawa CENTUM VP R6 and R7 Vulnerabilities Lead to Potential Denial of Service and Arbitrary Code Execution

Multiple vulnerabilities in Yokogawa CENTUM VP R6 and R7 Vnet/IP Interface Package can be exploited by sending maliciously crafted packets, leading to denial-of-service or arbitrary code execution.

ics denial-of-service out-of-bounds write
2r 3t
high advisory

Pelco Sarix Pro 3 Series IP Camera Authentication Bypass Vulnerability

An authentication bypass vulnerability (CVE-2026-1241) in the web management interface of Pelco Sarix Pro 3 Series IP Cameras (versions <= 02.52) allows unauthenticated attackers to access sensitive device data and bypass surveillance controls.

cve-2026-1241 authentication-bypass ip-camera ics
2r 1t
high advisory

Fortigate VPN Exploit Attempt via CVE-2023-27997 and Suspicious User-Agent

Multiple IDS alerts indicate potential exploitation attempts against Fortigate VPN servers using CVE-2023-27997, alongside traffic from a suspicious user agent, possibly indicating reconnaissance or exploit activity.

fortigate vpn cve-2023-27997 exploit network
3r 2t 3i
high advisory

LiteLLM Server-Side Template Injection Vulnerability

A server-side template injection vulnerability in LiteLLM versions 1.80.5 to before 1.83.7 allows authenticated users to execute arbitrary code within the LiteLLM Proxy process via a crafted prompt template, potentially exposing sensitive information and enabling command execution on the host.

LiteLLM ssti template-injection code-execution
2r 1t
high advisory

WDAC Policy File Creation by Unusual Process

Adversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.

Microsoft Defender XDR +5 wdac defense-evasion windows
2r 1t
high advisory

Untrusted DLL Loaded by Azure AD Connect Authentication Agent

The loading of an untrusted DLL by the Azure AD Connect Authentication Agent, potentially indicating credential access attempts via the Pass-through Authentication service, is detected by this rule.

Azure AD Connect Authentication Agent credential-access dll-side-loading azure-ad-connect
2r 1t
high advisory

MemProcFS Usage for Memory Dump Mounting and Credential Access

Adversaries use MemProcFS, a memory forensics tool, to mount memory dumps as virtual file systems and extract sensitive information like credentials from LSASS or registry hives.

credential-access memory-dump memprocfs
2r 3t
high advisory

GitHub Security Feature Disablement

An administrator or privileged user disables critical security features within a GitHub organization or repository, potentially leading to increased risk of unauthorized access, data breaches, and persistent compromise.

GitHub security-configuration defense-evasion
3r 3t
high advisory

OpenCanary HTTPPROXY Login Attempt Detection

Detection of attempted HTTP proxy use on an OpenCanary node, indicating potential reconnaissance or lateral movement by an attacker attempting to proxy another page.

OpenCanary honeypot httpproxy lateral-movement
2r 1t
high advisory

OpenCanary Telnet Login Attempt

The OpenCanary Telnet Login Attempt detection identifies unauthorized login attempts to a Telnet service monitored by an OpenCanary node, indicating potential reconnaissance or intrusion attempts targeting the network.

honeypot telnet reconnaissance intrusion opencanary
1r 2t
high advisory

Linux Shell Invocation via Env Command

The 'env' command is used to invoke a shell on Linux systems, potentially bypassing restricted environments or escalating privileges to execute arbitrary commands.

execution linux
2r 1t
high advisory

Evolver Path Traversal Vulnerability in `fetch` Command

A path traversal vulnerability exists in the `fetch` command of `@evomap/evolver` due to insufficient validation of the `--out` flag, allowing attackers to write files to arbitrary locations on the filesystem, potentially leading to overwriting critical system files and privilege escalation.

@evomap/evolver path-traversal arbitrary-file-write privilege-escalation evolver
2r 2t
high advisory

GitHub Secret Scanning Feature Disabled

Detection of the disabling of GitHub secret scanning at the business or repository level, potentially increasing the risk of exposed credentials and secrets.

Github attack.defense-impairment attack.t1685
2r 1t
high advisory

Malicious Usage of AWS IMDS Credentials Outside of Expected Services

Compromised EC2 instances may be leveraged to exfiltrate and misuse AWS Instance Metadata Service (IMDS) credentials to perform actions outside of the expected AWS Simple Systems Manager (SSM) service, indicating potential lateral movement or data exfiltration.

EC2 attack.privilege-escalation attack.initial-access attack.persistence attack.stealth attack.t1078 attack.t1078.002
2r 3t
high advisory

Traefik ForwardAuth Authentication Bypass via X-Forwarded-Prefix Spoofing

A high-severity authentication bypass vulnerability exists in Traefik's `ForwardAuth` middleware when `trustForwardHeader=false` is configured and Traefik is deployed behind a trusted upstream proxy; Traefik fails to sanitize the `X-Forwarded-Prefix` header, allowing attackers to spoof a trusted prefix value and gain unauthorized access to protected backend routes.

Traefik authentication-bypass webserver
2r 1t
high advisory

Detecting Potential PowerShell Pass-the-Hash/Relay Scripts

This rule detects PowerShell scripts associated with NTLM relay or pass-the-hash tooling and SMB/NTLM negotiation artifacts, indicating potential credential access and lateral movement attempts by attackers.

Windows credential-access pass-the-hash ntlm-relay powershell
2r 2t
high advisory

Suspicious Registry Hive Access via RegBack

This rule detects attempts to access registry backup hives (SAM, SECURITY, SYSTEM) via RegBack on Windows systems, which can contain or enable access to credential material.

Endpoint Defense +6 credential-access regback windows
2r 1t
high advisory

SimpleHelp Missing Authorization Vulnerability Leads to Privilege Escalation

A missing authorization vulnerability in SimpleHelp (CVE-2024-57726) allows low-privileged technicians to create API keys with excessive permissions, potentially escalating privileges to the server admin role.

SimpleHelp privilege-escalation missing-authorization cloud
2r 1t 1c
high advisory

Otter Blocks Plugin Purchase Verification Bypass Vulnerability (CVE-2026-2892)

CVE-2026-2892 is a purchase verification bypass vulnerability in the Otter Blocks plugin for WordPress, affecting versions up to 3.1.4, that allows unauthenticated attackers to access restricted content by forging a cookie used for purchase validation.

Otter Blocks plugin wordpress plugin purchase-bypass CVE-2026-2892 defense-evasion
3r 1t 1c
high advisory

Windows Parent Process PID Spoofing Detection

Adversaries use parent process PID spoofing to evade detection by creating processes with mismatched parent-child relationships, hindering process monitoring and potentially elevating privileges on Windows systems.

Elastic Defend defense-evasion process-injection windows
3r 1t
high advisory

OpenCanary SSH Connection Attempt

An SSH connection attempt to an OpenCanary node indicates a potential adversary probing for vulnerable services or attempting unauthorized access within a network.

OpenCanary honeypot ssh reconnaissance
2r 1t
high advisory

Argo Workflows ConfigMap Sync Service Missing Authorization Vulnerability

The Sync Service's ConfigMap-backed provider in Argo Workflows performs zero authorization checks on all CRUD operations, allowing any authenticated user to create, read, update, and delete Kubernetes ConfigMaps containing synchronization limits, potentially leading to denial of service, workflow disruption, information disclosure, or arbitrary ConfigMap manipulation in Argo Workflows versions v4.0.0 to v4.0.4.

argo-workflows/v4 argo-workflows kubernetes configmap authorization vulnerability
2r 1t
high advisory

Potential ADIDNS Poisoning via Wildcard Record Creation

Attackers can create wildcard records in Active Directory Integrated DNS (ADIDNS) to redirect traffic, enabling adversary-in-the-middle attacks for credential interception or relay.

Active Directory Integrated DNS credential-access adidns windows active-directory
2r 1t
high advisory

GitHub Push Protection Disabled

An administrator has disabled the GitHub push protection feature, potentially allowing secrets and other sensitive information to be pushed to repositories.

GitHub Enterprise Cloud attack.defense-impairment attack.t1685
2r 1t
high advisory

OpenCanary SSH Login Attempt Detection

Detects instances where an SSH service on an OpenCanary node has had a login attempt, indicating potential reconnaissance, privilege escalation, or lateral movement.

OpenCanary honeypot ssh initial-access
2r 1t
high advisory

Okta Admin Console Unusual Behavior Detection

This brief details detection of anomalous activity within the Okta Admin Console, potentially indicating privilege escalation, persistence, defense evasion, or initial access attempts by malicious actors.

Okta Identity Engine okta identity privilege-escalation persistence defense-evasion initial-access
2r 4t
high advisory

Grafana Privilege Escalation Vulnerability

A remote, authenticated attacker can exploit a vulnerability in Grafana to escalate privileges.

Grafana privilege-escalation web-application
2r 1t
high advisory

Okta Password Entered in AlternateID Field

Okta logs may contain user passwords if a user mistakenly enters their password into the username field during login, potentially exposing credentials in logs.

Okta Identity Engine attack.credential-access attack.t1552 okta password-leak
2r 1t
high advisory

Azure Identity Protection Suspicious Browser Activity

A suspicious browser activity alert indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser, potentially indicating compromised credentials or other malicious activity.

Azure identity-protection suspicious-browser
2r 6t
high advisory

Wireless Credential Dumping via Netsh

Adversaries use the Windows built-in utility Netsh to dump Wireless saved access keys in clear text, potentially leading to credential compromise.

Defender XDR +2 credential-access netsh windows
2r 2t
high advisory

TYPO3 CMS 14.2.0 Stores Passwords in Cleartext

TYPO3 CMS version 14.2.0 stores passwords in cleartext in the `uc` and `user_settings` fields of the `be_users` database table when users change their credentials in the backend user settings module.

CMS Backend typo3 cleartext-password credential-access cve-2026-6553
1r 1t
high advisory

Saltcorn Data Tenant Admin Privilege Escalation via Tenant Creation

A vulnerability in Saltcorn Data allows tenant admins to gain unauthorized admin-level access to the root domain by creating tenants in the root domain's schema instead of their own.

Saltcorn Data privilege-escalation web-application cloud
2r 1t
high advisory

PrefectHQ Prefect Authentication Bypass Vulnerability (CVE-2026-7723)

PrefectHQ Prefect versions up to 3.6.13 are vulnerable to an authentication bypass via manipulation of the /api/events/in WebSocket endpoint, potentially allowing remote attackers to execute unauthorized actions.

prefect CVE-2026-7723 authentication-bypass websocket prefecthq
2r 1t 1c
high advisory

Kentico Xperience Path Traversal Vulnerability (CVE-2025-2749)

Kentico Xperience contains a path traversal vulnerability (CVE-2025-2749) that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations, potentially leading to remote code execution or data compromise.

Kentico Xperience path traversal cve-2025-2749 kentico
2r 1t 1c
high advisory

CI4MS Authenticated Remote Code Execution via Theme Upload

CI4MS versions 0.26.0.0 through 0.31.6.0 are vulnerable to remote code execution; an authenticated backend user with theme upload permissions can upload a crafted ZIP file containing a PHP file, which is then installed into the web-accessible public directory without filtering, allowing direct execution via HTTP.

ci4-cms-erp/ci4ms code-execution web-application php
2r 2t
high advisory

changedetection.io XXE Vulnerability

A vulnerability in changedetection.io versions 0.54.9 and earlier allows a remote attacker to perform XML External Entity (XXE) attacks, potentially exposing sensitive local files.

changedetection.io XXE vulnerability
2r 1t
high advisory

Azure AD Sign-In with Unfamiliar Properties

This alert detects Azure AD sign-ins with properties unfamiliar to the user, indicating potential account compromise or unauthorized access.

Azure Active Directory azure identity_protection sign-in account_compromise risk_detection
2r 4t
high advisory

Azure AD Sign-in from New Country/Region

Detection of Azure AD sign-ins originating from countries or regions not previously associated with a user, indicating potential account compromise or anomalous activity.

Entra ID attack.stealth attack.t1078 attack.persistence attack.privilege-escalation attack.initial-access
2r 1t
high advisory

Suspicious Managed Code Hosting Process

This rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.

M365 Defender +3 defense-evasion windows managed code lolbin
2r 1t
high advisory

rust-openssl AES Key Wrap Out-of-Bounds Write Vulnerability

The rust-openssl package is vulnerable to an out-of-bounds write due to an incorrect bounds assertion in the `aes::unwrap_key()` function, potentially leading to arbitrary code execution if attacker-controlled buffer sizes are permitted.

openssl aes keywrap oob-write memory-corruption
2r
high advisory

AWS Identity API Access from Rare ASN Organizations

This rule detects AWS identities with API traffic dominated by cloud-provider source AS organization labels, but also exhibit traffic from other AS organizations, potentially indicating credential reuse or pivoting.

aws cloudtrail initial-access credential-access
2r 1t
high advisory

Acrel EEMS Enterprise Power Operation and Maintenance Cloud Platform SQL Injection Vulnerability

A SQL injection vulnerability exists in Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform 1.3.0 when manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file, potentially allowing for remote code execution or data exfiltration.

EEMS Enterprise Power Operation and Maintenance Cloud Platform sql-injection web-application vulnerability
2r 1t 1c
high advisory

Potential Remote Install via MsiExec

This rule detects attempts to install a file from a remote server using MsiExec, which adversaries may abuse to deliver malware, by identifying msiexec.exe processes running with arguments indicative of remote installations and executed from suspicious parent processes.

Microsoft Defender XDR +3 defense-evasion windows msiexec remote-install
2r 1t
high advisory

AMSI Enable Registry Key Modification for Defense Evasion

Adversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.

Microsoft Defender XDR +4 defense-evasion amsi registry windows
2r 1t
high advisory

Suspicious Alternate Data Stream (ADS) File Creation

Detects suspicious creation of Alternate Data Streams (ADS) on targeted files using script or command interpreters, indicative of malware hiding in ADS for defense evasion.

M365 Defender +3 defense-evasion ads file-creation windows
2r 1t
high advisory

xmldom XML Node Injection via Comment Serialization

The xmldom library is vulnerable to XML node injection, allowing attackers to inject arbitrary XML nodes into serialized output by manipulating comment content; this is mitigated by using the `requireWellFormed` option in `serializeToString` after upgrading to version 0.8.13 or 0.9.10.

xmldom xml injection deserialization vulnerability
2r 1t
high advisory

S3Browser IAM Policy Creation with Default Bucket Name

An AWS IAM policy is created by the S3Browser utility with the default S3 bucket name placeholder, potentially indicating unauthorized access or misconfiguration.

AWS IAM +1 aws iam s3browser s3 policy cloudtrail
2r 3t
high advisory

Qualcomm Memory Corruption Vulnerability in Performance Counter Deselect Operation (CVE-2026-24082)

CVE-2026-24082 is a use-after-free vulnerability in Qualcomm products that occurs when copying data from a freed source during a performance counter deselect operation, potentially leading to memory corruption and arbitrary code execution.

cve-2026-24082 use-after-free memory corruption qualcomm
2r 1t 1c
high advisory

PowerShell Kerberos Ticket Dumping via LSA Authentication Package Access

Detection of PowerShell scripts attempting to dump Kerberos tickets from memory by accessing LSA authentication packages, potentially leading to credential access and lateral movement.

PowerShell credential-access kerberos windows
2r 1t
high advisory

Potential Kerberos Coercion via DNS-Based SPN Spoofing

Adversaries may abuse MicrosoftDNS records containing a base64-encoded blob to coerce victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services, detected via directory-service access events.

Active Directory kerberos coercion dns spn spoofing credential-access
2r 1t
high advisory

i18next-http-middleware Prototype Pollution and Path Traversal Vulnerability

Versions of i18next-http-middleware before 3.9.3 are vulnerable to prototype pollution, path traversal, and server-side request forgery (SSRF) due to improper validation of user-controlled language and namespace parameters, potentially leading to denial of service or remote code execution.

i18next-http-middleware prototype-pollution path-traversal ssrf denial-of-service i18next
2r 2t
high advisory

Azure AD Device Registration Policy Changes Detected

Monitoring changes to the device registration policy can detect potential privilege escalation or defense impairment attempts by malicious actors aiming to weaken security controls related to device management in Azure Active Directory.

Azure Active Directory azure device-registration policy-change
2r 1t
high advisory

CVE-2026-3229 Integer Overflow in Certificate Chain Allocation

CVE-2026-3229 is an integer overflow vulnerability in certificate chain allocation affecting a Microsoft product, potentially leading to denial of service or arbitrary code execution.

integer_overflow certificate_chain denial_of_service code_execution cve
2r 1c
high threat

Suspicious Microsoft Diagnostics Wizard Execution

This rule detects potential abuse of the Microsoft Diagnostics Troubleshooting Wizard (MSDT) to proxy malicious command or binary execution via malicious process arguments on Windows systems.

Elastic Defend +2 defense-evasion msdt windows
3r 1t
high advisory

Unusual Executable File Creation by a System Critical Process

The rule identifies unexpected executable file creation or modification by critical Windows processes, potentially indicating remote code execution or exploitation attempts.

Microsoft Defender XDR +3 defense-evasion execution windows
2r 1t
high advisory

i18next-fs-backend Path Traversal Vulnerability

i18next-fs-backend versions before 2.6.4 are vulnerable to path traversal due to insufficient sanitization of the lng and ns values, potentially allowing attackers to read arbitrary files, overwrite files, or execute code if .js or .ts locale files are in use.

i18next-fs-backend path-traversal i18next arbitrary-file-read arbitrary-file-write code-execution
2r 1t
high advisory

First Time Seen Account Performing DCSync

Detection of a user account initiating the Active Directory replication process for the first time, potentially indicating a DCSync attack for credential theft and domain compromise.

Active Directory credential-access privilege-escalation windows active-directory
2r 1t
high advisory

CVE-2026-41445 KissFFT Integer Overflow leads to Heap Buffer Overflow

CVE-2026-41445 is a reported integer overflow vulnerability in the KissFFT library that could lead to a heap buffer overflow.

integer-overflow heap-overflow kissfft
1r 1t 1c
high advisory

radare2 PDB Parser Command Injection Vulnerability (CVE-2026-40517)

A command injection vulnerability exists in radare2 versions prior to 6.1.4, where a crafted PDB file with newline characters in symbol names can inject arbitrary radare2 commands, leading to arbitrary OS command execution.

radare2 command-injection CVE-2026-40517
2r 1t 1c
high advisory

NocoBase SQL Injection via Missing Validation on Update Endpoint

A SQL injection vulnerability exists in nocobase plugin-collection-sql versions 2.0.32 and earlier due to missing validation on the sqlCollection:update endpoint, allowing attackers with collection management permissions to execute arbitrary SQL queries and exfiltrate data.

plugin-collection-sql sql-injection web-application nocobase
2r 1t
high advisory

Multiple Alerts in Different ATT&CK Tactics by Host

This rule uses alert data to identify hosts with multiple alerts across different ATT&CK tactics, indicating a higher likelihood of compromise and enabling analysts to prioritize triage and response based on accumulated risk score.

threat-detection higher-order-rule
3r 3t
high advisory

Icinga Web Reflected XSS Vulnerability via Malformed Search Requests

A reflected cross-site scripting (XSS) vulnerability exists in Icinga Web versions 0.13.0 and earlier, allowing attackers to inject malicious JavaScript into a victim's browser through malformed search requests, potentially leading to arbitrary code execution within the Icinga Web context.

Icinga Web +1 xss web-application icinga
2r 1t
high advisory

engramx vulnerable to CSRF enabling graph exfiltration and prompt injection

The engramx HTTP server, enabled by default and binding to 127.0.0.1:7337, is vulnerable to CSRF and prompt injection attacks, allowing a malicious website to exfiltrate the local knowledge graph and inject persistent prompt-injection payloads.

engramx csrf prompt-injection
2r 2t
high advisory

CVE-2026-31611: ksmbd Sub-Authority Validation Vulnerability

CVE-2026-31611 is a vulnerability in ksmbd, requiring at least three sub-authorities before reading sub_auth[2], potentially leading to unauthorized access or code execution.

cve-2026-31611 ksmbd smb vulnerability
2r 1t 1c
high advisory

Credential Acquisition via Registry Hive Dumping

Detects attempts to export sensitive Windows registry hives (SAM/SECURITY) using reg.exe, potentially leading to credential compromise.

Elastic Endgame +6 credential-access registry-dump windows
2r 1t
high advisory

CoreDNS TSIG Authentication Bypass Vulnerability

CoreDNS versions prior to 1.14.3 are vulnerable to TSIG authentication bypass on gRPC, QUIC, DoH, and DoH3 transports, allowing unauthenticated network attackers to bypass authentication and potentially access TSIG-protected zone data or submit dynamic DNS updates.

coredns tsig authentication-bypass
2r 1t
high advisory

Azure AD Threat Intelligence Detection

This brief focuses on detecting unusual user activity and sign-in patterns flagged by Azure AD Threat Intelligence, which may indicate stealthy attacks, persistence attempts, privilege escalation, or initial access.

Azure Active Directory azuread threat-intelligence risk-detection
2r 1t
high advisory

Potential Process Injection via PowerShell

This detection identifies PowerShell scripts leveraging Win32 APIs for memory allocation, process access, and thread creation, indicative of potential process injection or in-memory payload execution on Windows systems.

Windows Defender Advanced Threat Protection process injection powershell defense evasion
2r 2t
high advisory

Multiple Alerts Involving a User Detection

This rule identifies when multiple different alerts involving the same user are triggered, which could indicate a compromised user account and requires further investigation.

Elastic Security threat-detection higher-order-rule
2r 3t
high advisory

Uncommon Svchost Command Line Parameters Indicate Potential Masquerading or Injection

Detection of svchost.exe executing with uncommon command-line parameters, excluding known legitimate patterns, which may indicate file masquerading, process injection, or process hollowing.

Windows defense-evasion privilege-escalation process-injection
2r 2t
high advisory

Renamed Automation Script Interpreter

Detects the renaming of automation script interpreter processes like AutoIt, AutoHotkey, and KIX32, a tactic used by malware operators to evade detection by obscuring the true nature of the executable.

Elastic Defend +1 defense-evasion masquerading autoit autohotkey kix32 windows
2r 1t
high advisory

GitPython Vulnerability Allows Arbitrary Code Execution via Git Hooks

A vulnerability in GitPython versions prior to 3.1.47 allows for command execution during repository cloning by manipulating the `multi_options` parameter to inject malicious Git configurations, such as `core.hooksPath`, leading to the execution of attacker-controlled hooks.

GitPython code-execution git-hooks command-injection
2r 1t 1c
high advisory

BigSweetPotatoStudio HyperChat AI Proxy Middleware Server-Side Request Forgery

A server-side request forgery (SSRF) vulnerability exists in BigSweetPotatoStudio HyperChat up to version 2.0.0-alpha.63, allowing a remote attacker to manipulate the 'baseurl' argument in the 'fetch' function of the AI Proxy Middleware component to make arbitrary HTTP requests.

HyperChat ssrf vulnerability webserver
2r 1t 1c
high advisory

Qualcomm Camera Sensor Memory Corruption Vulnerability

CVE-2025-47405 is a memory corruption vulnerability in Qualcomm products related to processing camera sensor input/output control codes with invalid output buffers, potentially leading to arbitrary code execution.

cve-2025-47405 memory corruption camera sensor qualcomm
2r 1c
high advisory

Azure Privileged Identity Management (PIM) Invalid License Detection

Detection of unauthorized access or privilege escalation attempts within Azure environments due to invalid or missing Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses for Privileged Identity Management (PIM).

Azure pim privileged-identity-management invalid-license
2r 1t
high advisory

Admidio Inverted 2FA Reset Allows Privilege Escalation

A logic error in Admidio's two-factor authentication reset inverts the authorization check, allowing non-admin users to remove other users' TOTP, including administrators, reducing their security to password-only authentication in versions 5.0.8 and earlier.

admidio 2fa bypass privilege-escalation
2r 2t
high advisory

Cisco Catalyst SD-WAN Manager Information Disclosure Vulnerability (CVE-2026-20133)

Cisco Catalyst SD-WAN Manager contains an information disclosure vulnerability (CVE-2026-20133) that could allow remote attackers to view sensitive information on affected systems, requiring immediate patching or mitigation.

Catalyst SD-WAN Manager cve vulnerability cisco sd-wan
2r 1t 1c
high advisory

NetExec File Creation Detection

This brief covers the detection of NetExec, a post-exploitation and lateral movement tool, through monitoring for unique file creation patterns associated with its execution and file extraction in Windows environments.

netexec crackmapexec lateral-movement post-exploitation hacktool
2r 3t
high advisory

PowerShell Kerberos Ticket Request via KerberosRequestorSecurityToken

This rule detects PowerShell scripts that request Kerberos service tickets using KerberosRequestorSecurityToken, potentially indicating Kerberoasting attacks for offline password cracking of service accounts.

Elastic Security kerberoasting credential_access windows
2r 1t
high advisory

Detecting External RPC Traffic for Initial Access

This brief focuses on detecting Remote Procedure Call (RPC) traffic originating from the internet, a common initial access vector, by monitoring network connections to TCP port 135 and filtering known internal IP ranges.

Elasticsearch initial-access network rpc
2r 2t
high advisory

Microsoft Build Engine Started by an Office Application

The Microsoft Build Engine (MSBuild) being started by an Office application is unusual behavior and could indicate a malicious document executing a script payload for defense evasion.

Microsoft Build Engine +2 defense-evasion execution msbuild windows
2r 1t
high advisory

Potential Antimalware Scan Interface Bypass via PowerShell

This rule detects PowerShell scripts that attempt to bypass the Antimalware Scan Interface (AMSI) in order to disable scanning and execute malicious PowerShell code undetected.

defense-evasion amsi powershell windows
3r 1t
high advisory

PowerShell Share Enumeration via ShareFinder or Native APIs

Detection of PowerShell scripts employing ShareFinder functions or Windows share enumeration APIs to discover accessible network shares for reconnaissance, lateral movement, or ransomware deployment.

PowerShell discovery share-enumeration lateral-movement ransomware
2r 1t
high advisory

Azure AD Activity From Anonymous IP Address

Detection of user activity originating from an IP address identified as an anonymous proxy, potentially indicating unauthorized access, privilege escalation, or persistence within an Azure Active Directory environment.

Azure Active Directory azuread anonymous-proxy identity-protection
2r 4t
high advisory

PowerShell Invoke-NinjaCopy Script Detection

The Invoke-NinjaCopy PowerShell script is used by attackers to directly access volume files, such as NTDS.dit or registry hives, for credential dumping.

Windows credential-access powershell ninjacopy
2r 1t
high advisory

Windows EventLog Autologger Session Disabled via Registry Modification

Adversaries may attempt to disable Windows EventLog autologger sessions via registry modification to evade detection and prevent security monitoring of early boot activities and system events.

Windows attack.defense-evasion attack.t1562.002
2r 1t
high advisory

Potential Local NTLM Relay via HTTP

Adversaries may coerce local NTLM authentication over HTTP via WebDAV named-pipe paths (Print Spooler, SRVSVC), then relay credentials to elevate privileges.

Microsoft Defender XDR +1 ntlm-relay credential-access windows webdav
2r 1t
high advisory

Suspicious LSASS Access via Malicious Secondary Logon Service

An attacker abuses the Secondary Logon service (seclogon.dll) to gain unauthorized access to the LSASS process, potentially leaking credentials.

Windows credential-access lsass seclogon
3r 1t
high advisory

OpenClaw MCP Loopback Token Spoofing Vulnerability

A vulnerability in OpenClaw versions 2026.4.21 and earlier allows a non-owner loopback client to spoof the owner context by manipulating request headers, potentially gaining unauthorized access to owner-gated operations.

openclaw vulnerability npm token spoofing
2r 1t
high advisory

liyupi yu-picture SQL Injection Vulnerability (CVE-2026-7060)

A SQL injection vulnerability (CVE-2026-7060) exists in liyupi yu-picture versions up to a053632c41340152bf75b66b3c543d129123d8ec, allowing a remote attacker to execute arbitrary SQL commands by manipulating the sortField argument in the PageRequest function of PictureServiceImpl.java.

yu-picture sql-injection cve-2026-7060 web-application
2r 1t 1c
high advisory

Contour HTTPProxy Lua Code Injection via Cookie Path Rewrite

Contour's Cookie Rewriting feature is vulnerable to Lua code injection; an attacker with RBAC permissions to create or modify HTTPProxy resources can craft a malicious value in the `spec.routes[].cookieRewritePolicies[].pathRewrite.value` or `spec.routes[].services[].cookieRewritePolicies[].pathRewrite.value` fields, resulting in arbitrary code execution in the Envoy proxy.

Contour lua code-injection httpproxy cve-2026-41246
2r 3t
high advisory

Potential LSASS Clone Creation via PssCaptureSnapShot

Detection of LSASS process cloning using PssCaptureSnapShot, where the parent process is also LSASS, indicating a potential attempt to dump LSASS memory for credential access.

credential-access lsass process-injection
2r 1t
high advisory

Kaggle-MCP Path Traversal Vulnerability in prepare_kaggle_dataset Function

A path traversal vulnerability exists in the prepare_kaggle_dataset function of kaggle-mcp up to version 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d, allowing remote attackers to access arbitrary files by manipulating the competition_id argument.

kaggle-mcp path-traversal web-application cve
2r 1t 1c
high advisory

GitPython Command Injection Vulnerability

GitPython versions 3.1.30 through 3.1.46 are vulnerable to command injection by passing attacker-controlled kwargs into `Repo.clone_from()`, `Remote.fetch()`, `Remote.pull()`, or `Remote.push()`, leading to arbitrary command execution due to bypassed safety checks.

GitPython command-injection vulnerability
2r 1t
high advisory

Rundll32 Execution with DLL Stored in Alternate Data Stream (ADS)

Adversaries may use rundll32.exe to execute DLLs stored within alternate data streams (ADS) to bypass security controls and conceal malicious code.

defense-evasion ads rundll32 windows
2r 1t
high advisory

rust-openssl Deriver::derive and PkeyCtxRef::derive Buffer Overflow Vulnerability (CVE-2026-41676)

CVE-2026-41676 is a buffer overflow vulnerability in rust-openssl's Deriver::derive and PkeyCtxRef::derive functions when used with OpenSSL 1.1.1, potentially leading to denial of service or arbitrary code execution.

rust-openssl openssl buffer overflow cve-2026-41676
2r 1c
high advisory

Royal Elementor Addons Plugin SSRF Vulnerability

The Royal Elementor Addons plugin for WordPress is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated attackers with Contributor-level access or higher to make arbitrary requests and retrieve sensitive information from internal services.

Royal Elementor Addons <= 1.7.1057 wordpress ssrf cve-2026-6229 plugin
2r 1t 1c
high advisory

Apache Struts CVE-2023-50164 Exploitation Leading to Web Shell Deployment

Exploitation of CVE-2023-50164, a critical path traversal vulnerability in Apache Struts 2, is detected by identifying malicious multipart/form-data POST requests with WebKitFormBoundary targeting Struts .action upload endpoints, followed by JSP web shell creation in Tomcat's webapps directories, indicating remote code execution.

Struts 2 apache-struts webshell cve-2023-50164 initial-access persistence command-and-control
2r 3t 1c
high advisory

Detection of Wevtutil.exe Used to Disable Event Logs

The execution of `wevtutil.exe` with parameters to disable event logs is a tactic commonly employed by ransomware to evade detection and hinder forensic investigations, leading to a significant reduction in visibility for defenders.

Splunk Enterprise +2 defense-evasion ransomware windows
2r 1t
high advisory

Azure PIM Account Stale Sign-in Alert

Detection of stale accounts in Azure Privileged Identity Management (PIM) through the 'staleSignInAlertIncident' event, indicating potential compromised or unused privileged accounts.

Azure Privileged Identity Management azure pim stale_account
2r 1t
high advisory

Azure PIM Elevation Approved or Denied

Detection of Azure Privileged Identity Management (PIM) elevation approvals or denials, which, if unexpected, may indicate unauthorized privilege escalation or malicious activity within an Azure environment.

Azure pim privilege-escalation persistence
2r 3t
high advisory

Azure AD User Added to Global or Device Admin Role

An attacker may attempt to add a user to a high-privilege Azure AD role, such as Global Administrator or Device Administrator, to establish persistence, gain initial access, escalate privileges, or operate stealthily within the compromised environment.

Azure Active Directory azuread role-assignment privilege-escalation persistence
2r 3t
high advisory

WordPress Drag and Drop File Upload Plugin Vulnerable to Arbitrary File Upload (CVE-2026-5364)

The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to 1.1.3, allowing unauthenticated attackers to upload arbitrary PHP files by manipulating the file type parameter and exploiting extension sanitization vulnerabilities.

Drag and Drop File Upload for Contact Form 7 plugin wordpress file-upload rce plugin CVE-2026-5364
2r 1t 1c
high advisory

PowerShell P/Invoke Process Injection API Chain Detection

This analytic detects PowerShell code that uses P/Invoke to call Windows API functions associated with process injection, such as VirtualAlloc, WriteProcessMemory, and CreateRemoteThread, indicating potential malicious activity.

PowerShell +3 process-injection pinvoke defense-evasion
2r 8t
high advisory

Kubernetes RBAC Wildcard Elevation on Existing Role

The rule detects when a Kubernetes Role or ClusterRole is patched or updated to grant wildcard verbs and resources, effectively granting cluster-admin-like privileges, which is often a deliberate privilege expansion and could indicate malicious activity.

kubernetes rbac privilege-escalation
2r 1t
high advisory

Azure PIM Role Activation Without MFA

Detection of Azure Privileged Identity Management (PIM) roles being activated without requiring multi-factor authentication, potentially leading to unauthorized privilege escalation and persistence.

Azure pim mfa privilege-escalation
2r 1t
high advisory

Browser Process Spawned from an Unusual Parent

Attackers may attempt credential theft by launching browsers (Chrome, Edge) with remote debugging, headless automation, or minimal arguments from an unusual parent process on Windows systems.

Edge +4 credential-access windows browser-exploitation
2r 1t
high advisory

Suspicious PowerShell Script Using Cryptography Namespace

The analytic detects suspicious PowerShell script execution involving the cryptography namespace (excluding SHA and MD5) via EventCode 4104, often associated with malware that decrypts or decodes additional malicious payloads leading to further code execution, privilege escalation, or persistence.

Splunk Enterprise +2 powershell cryptography malware asyncrat xworm vip keylogger
2r 1t
high advisory

PowerShell Suspicious Payload Encoded and Compressed

Detects PowerShell scripts employing Base64 decoding combined with .NET decompression (Deflate/GZip) to deobfuscate and reconstruct malicious payloads in memory, evading traditional defenses.

Windows Defender Advanced Threat Protection defense-evasion powershell windows
2r 1t
high advisory

itsourcecode Electronic Judging System SQL Injection Vulnerability (CVE-2026-7555)

A remote SQL injection vulnerability (CVE-2026-7555) exists in itsourcecode Electronic Judging System 1.0 via manipulation of the Username argument in the /intrams/login.php file, potentially leading to unauthorized data access and modification.

Electronic Judging System 1.0 sql-injection vulnerability web-application
2r 1t 1c
high advisory

AWS GuardDuty Detector Deletion or Disablement

Attackers may delete or disable AWS GuardDuty detectors to impair defenses and evade detection of malicious activities within the AWS environment.

GuardDuty defense-impairment aws cloudtrail
3r
high advisory

Detect Application AppID URI Configuration Changes in Azure

Detection of configuration changes to an application's AppID URI in Azure, potentially indicating malicious activity related to initial access, persistence, credential access, privilege escalation, or stealth.

Azure Active Directory azure appid uri application serviceprincipal credential-access privilege-escalation
2r 2t
high advisory

SeEnableDelegationPrivilege Assignment Detection

Detection of the assignment of the SeEnableDelegationPrivilege user right to a principal can indicate potential Active Directory compromise and privilege elevation by attackers.

Active Directory credential-access persistence windows active-directory
3r 2t
high advisory

Mimikatz MemSSP Log File Detection

This rule detects the creation of the default Mimikatz MemSSP credential log file, mimilsa.log, which is created after the misc::memssp module injects a malicious Security Support Provider into LSASS, potentially capturing credentials from subsequent logons.

Elastic Defend +3 credential-access mimikatz memssp windows
2r 1t 1i
high advisory

Long Base64 Encoded Command via Scripting Interpreter

Detection of oversized command lines used by Python, PowerShell, Node.js, or Deno interpreters containing base64 decoding or encoded-command patterns, indicating potential evasion and malicious execution.

Elastic Endpoint defense-evasion execution scripting-interpreter base64 command-line
2r 5t
high advisory

Detection of Invoke-Obfuscation via Standard Input

This brief outlines detection strategies for adversaries leveraging Invoke-Obfuscation techniques within PowerShell scripts executed via standard input, a method commonly used to evade traditional detection mechanisms.

Windows defense-evasion obfuscation powershell
2r 2t
high advisory

Azure AD Temporary Access Pass Added to Account

Detection of a temporary access pass (TAP) being added to an Azure AD account, which could indicate potential privilege escalation, initial access, persistence, or stealth activity.

Azure Active Directory azuread temporary-access-pass privilege-escalation initial-access persistence
2r 4t
high advisory

Adversaries Disabling Important Scheduled Tasks

Adversaries disable crucial scheduled tasks, such as those related to BitLocker, Windows Defender, System Restore and Windows Update, using schtasks.exe to disrupt services and potentially facilitate data destruction or ransomware deployment.

Windows attack.impact attack.t1489
2r 1t
high advisory

Non-Firefox Process Accessing Firefox Profile Directory

This analytic detects non-Firefox processes accessing the Firefox profile directory, potentially indicating malware attempting to harvest sensitive user data like login credentials, browsing history, and cookies.

Firefox +3 credential-access malware
2r 1t
high advisory

Windows Service Security Descriptor Tampering via sc.exe

Adversaries may modify service security descriptors to deny access to specific groups, potentially escalating privileges and hindering security services, by using sc.exe to set new deny ACEs (Access Control Entries) on Windows services.

Splunk Enterprise +2 defense-evasion privilege-escalation windows
2r 2t
high threat

Windows AutoLogger Session Tampering Detection

Attackers may disable AutoLogger sessions by modifying specific registry values to evade detection and prevent security monitoring of early boot activities and system events, a technique observed in intrusions involving IcedID and XingLocker ransomware.

exploited Windows attack.defense-evasion attack.t1562.002
3r 1t
high advisory

Suspicious Process Access via Direct System Call

Detects suspicious process access events where the call trace does not originate from known Windows system DLLs, indicating potential defense evasion by bypassing hooked APIs via direct syscalls.

EdgeWebView +4 defense-evasion execution windows
2r 3t
high advisory

Suspicious MSIExec Remote Download

The analytic detects the execution of msiexec.exe with an HTTP or HTTPS URL, which indicates an attempt to download and execute potentially malicious software from a remote server, leading to potential unauthorized code execution, system compromise, or malware deployment.

Splunk Enterprise +3 endpoint msiexec remote-download windows
2r 2t
high advisory

Suspicious Child Processes Spawned by WScript or CScript

Detects suspicious processes spawned by WScript or CScript, a common technique used by adversaries to execute LOLBINs, PowerShell, or inject code into suspended processes for defense evasion.

Splunk Enterprise +2 wscript cscript lolbin malware defense-evasion
2r 3t
high advisory

Suspicious Antimalware Scan Interface DLL Creation

An adversary may attempt to bypass AMSI by creating a rogue AMSI DLL in an unusual location to evade detection.

Microsoft Defender XDR +4 defense-evasion amsi-bypass dll-hijacking windows
2r 1t
high advisory

SourceCodester Hotel Management System SQL Injection Vulnerability

A SQL injection vulnerability exists in SourceCodester Hotel Management System 1.0 in the /index.php/reservation/check component due to improper sanitization of the room_type parameter, allowing a remote attacker to execute arbitrary SQL commands.

Hotel Management System 1.0 sqli vulnerability web application
2r 1t 1c
high advisory

Script Execution via Microsoft HTML Application

Detects the execution of scripts via HTML applications using Windows utilities rundll32.exe or mshta.exe to bypass defenses by proxying execution of malicious content with signed binaries.

Windows +8 defense-evasion script-execution
3r 1t
high advisory

PowerShell Obfuscation via Concatenated Dynamic Command Invocation

This rule detects PowerShell scripts that build commands from concatenated string literals within dynamic invocation constructs, a technique used by attackers to obscure execution intent, bypass keyword-based detections, and evade AMSI.

Elastic License v2 defense-evasion powershell obfuscation
2r 1t
high advisory

Potential Remote Credential Access via Registry

Detects remote access to the registry, potentially dumping credential data from the Security Account Manager (SAM) registry hive, indicating preparation for credential access and privilege elevation.

Elastic Defend credential-access lateral-movement windows
2r 2t
high advisory

Potential NTLM Relay Attack against a Computer Account

This rule detects potential NTLM relay attacks against computer accounts by identifying coercion attempts followed by authentication events originating from a different host, indicating that an attacker has captured and relayed the server's computer account hash to execute code on behalf of the compromised system.

Windows Security Event Logs credential-access ntlm-relay windows
2r
high advisory

Okta Alerts Following Unusual Proxy Authentication

Attackers use proxy infrastructure to mask their origin when using stolen Okta credentials, and this rule correlates the first occurrence of an Okta user session started via a proxy with subsequent Okta security alerts for the same user.

Okta identity cloud initial-access
2r 1t
high advisory

Nsenter to PID Namespace via Auditd

This rule detects nsenter executions that target a PID with a namespace target flag, a common pattern used to attach to the host init namespace from a container or session and run with host context, potentially escalating privileges.

privilege-escalation linux container
2r 1t
high advisory

Detection of Azure Subscription Permission Elevation

Detection of a user being assigned the 'User Access Administrator' role, which grants the ability to manage all Azure Subscriptions, potentially leading to privilege escalation and unauthorized access.

Azure attack.privilege-escalation attack.persistence attack.initial-access attack.stealth attack.t1078
2r 1t
high advisory

Conhost Proxy Execution for Defense Evasion

Adversaries abuse the Console Window Host (conhost.exe) with the `--headless` argument to proxy execution of malicious commands, evading detection by blending in with legitimate Windows software.

Elastic Defend +2 defense-evasion proxy-execution windows
3r 1t
high advisory

AWS Lateral Movement from Kubernetes Service Account via AssumeRoleWithWebIdentity

This rule detects lateral movement in AWS environments originating from Kubernetes service accounts by identifying instances where credentials obtained for a service account are used for multiple distinct AWS control-plane actions, potentially indicating unauthorized access.

AWS CloudTrail +1 cloud aws kubernetes lateral-movement credential-access discovery
2r 4t
high advisory

Potential Shadow Credentials added to AD Object

This rule detects the modification of the msDS-KeyCredentialLink attribute in an Active Directory Computer or User Object, which could indicate an attacker is creating shadow credentials to gain persistent and stealthy access.

Active Directory +2 credential-access shadow-credentials windows
2r 2t
high advisory

Detection of NetExec Hacktool Execution

The threat brief details the detection of NetExec (formerly CrackMapExec), a post-exploitation tool used for Active Directory penetration testing and network enumeration, often employed by threat actors for lateral movement and credential harvesting.

pentest post-exploitation lateral-movement active-directory
2r 2t
high advisory

Unusual Process Loading Mozilla NSS/Mozglue Module

Detection of processes loading Mozilla NSS/Mozglue libraries (mozglue.dll, nss3.dll) outside of known Mozilla applications, potentially indicating malware or unauthorized activity.

Firefox +9 defense-evasion anomaly windows
2r 1t
high advisory

System Restore Disabled via Registry Modification

Attackers may attempt to disable system restore via registry modifications through the command line to prevent recovery after malicious activity.

attack.impact attack.t1490
1r 1t
high advisory

Suspicious Script Interpreter Execution from Environment Variable Folders

Malware may execute scripts from suspicious directories accessible via environment variables using script interpreters like cscript, wscript, mshta, and powershell to evade detection.

Windows execution script-execution malware
2r 1t
high advisory

Nginx-UI SSRF Vulnerability via Cluster Node Proxy

Nginx-UI version 2.3.4 and earlier is vulnerable to Server-Side Request Forgery (SSRF) allowing authenticated users to access internal services by manipulating cluster node configurations.

Nginx-UI ssrf web-application
2r 1t 1i
high advisory

Multi-Cloud CLI Token and Credential Access via Command-Line Harvesting

This rule detects command-line activity indicative of credential access across multiple cloud platforms (GCP, Azure, AWS, GitHub, DigitalOcean, Oracle, Kubernetes), looking for specific commands used to print or access tokens and credentials, flagging hosts where multiple cloud targets are accessed within a five-minute window, suggesting potential credential harvesting activity.

gcloud +6 credential-access cloud cli token-harvesting
3r 2t
high advisory

Invoke-Obfuscation via Clip.exe

The use of `clip.exe` in conjunction with PowerShell and command-line obfuscation is used to evade detection.

Windows defense-evasion execution obfuscation
2r 2t
high advisory

Excessive Global Administrator Accounts in Azure PIM

Detection of an excessive number of Global Administrator accounts assigned within an Azure tenant, indicating potential privilege escalation or compromised accounts.

Azure pim global_admin privilege_escalation
2r 3t
high advisory

Detection of Python One-Liners with Base64 Decoding

This brief outlines a method to detect malicious use of Python one-liners employing base64 decoding to execute obfuscated payloads, a common tactic for evading traditional security measures.

attack.execution attack.defense-evasion attack.t1059.006 attack.t1027.010
2r 2t
high advisory

Detection of Privileged Identity Management (PIM) Settings Modifications

Detects unauthorized or malicious modifications to Privileged Identity Management (PIM) settings within Azure environments, potentially leading to privilege escalation, persistence, and stealthy access by attackers.

Azure Active Directory azure pim privilege-escalation persistence
2r 4t
high advisory

AWS SecurityHub Findings Evasion via API Calls

Attackers can impair defenses by modifying or deleting findings and insights within AWS SecurityHub using API calls such as BatchUpdateFindings, DeleteInsight, UpdateFindings, and UpdateInsight.

AWS Security Hub aws cloud securityhub defense-evasion
3r 2t
high advisory

AWS Identity Center Identity Provider Modification

An adversary modifies the AWS Identity Center identity provider configuration, potentially leading to persistent access and privilege escalation through user impersonation.

AWS Identity Center cloud aws identity persistence credential-access defense-evasion
2r 1t
high advisory

AWS IAM User or Access Key Creation via S3 Browser

The use of S3 Browser to create IAM users or access keys in AWS environments indicates a potential privilege escalation, persistence, or initial access attempt by threat actors leveraging a known cloud administration tool.

AWS IAM cloud aws iam privilege-escalation persistence
2r 2t
high advisory

Detecting RPC Traffic to the Internet

This brief focuses on detecting Remote Procedure Call (RPC) traffic originating from internal networks and reaching the public internet, which is indicative of potential initial access or backdoor activity.

Elastic License v2 network-traffic initial-access lateral-movement rpc
2r 2t
high threat

Suspicious Process Accessing Browser Password Store

Detection of non-browser processes accessing browser user data folders, a tactic used by malware such as Snake Keylogger to steal credentials and sensitive information.

Splunk Enterprise +2 Snake Keylogger credential-access stealer windows
2r 1t
high advisory

Proxy Execution via Windows OpenSSH Client

Detection of command execution via proxy using the Windows OpenSSH client (ssh.exe or sftp.exe) to bypass application control using trusted Windows binaries.

M365 Defender +2 defense-evasion proxy-execution openssh application-control-bypass
2r
high advisory

Azure Application URI Configuration Modification

Detection of Azure application URI modifications that can be indicative of malicious activity, such as using dangling URIs, non-HTTPS URIs, wildcard domains, or URIs pointing to uncontrolled domains, potentially leading to initial access, stealth, persistence, credential access, and privilege escalation.

Azure Active Directory cloud azure application uri modification persistence credential-access privilege-escalation
3r 4t
high advisory

xmldom XML Injection Vulnerability

The xmldom package is vulnerable to XML injection. The package serializes DocumentType node fields (internalSubset, publicId, systemId) verbatim without any escaping or validation. When these fields are set programmatically to attacker-controlled strings, XMLSerializer.serializeToString can produce output where the DOCTYPE declaration is terminated early and arbitrary markup appears outside it. To address this applications that pass untrusted data to createDocumentType() or write untrusted values directly to a DocumentType node's publicId, systemId, or internalSubset properties should audit all serializeToString() call sites and add the option.

@xmldom/xmldom +1 xml-injection xxe dom xmldom
2r 1t
high advisory

WordPress Custom Role Manager Plugin Privilege Escalation via CVE-2026-7106

Highland Software's Custom Role Manager plugin for WordPress, versions 1.0.0 and earlier, contains a privilege escalation vulnerability (CVE-2026-7106) that allows authenticated users with subscriber-level access to modify user roles due to insufficient authorization checks in the hscrm_save_user_roles() function.

Custom Role Manager plugin privilege-escalation wordpress cve
2r 1t 1c
high advisory

Windows Remote Desktop Network Bruteforce Attempt

This detection identifies potential RDP brute force attacks by monitoring network traffic for RDP application activity by detecting source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window.

Secure Access Firewall +3 rdp bruteforce credential-access windows network
2r 1t
high advisory

Windows Files and Dirs Access Rights Modification via Icacls

Detection of icacls.exe, cacls.exe, or xcacls.exe being used to modify file or directory permissions, often used by APTs and coinminers for defense evasion and persistence.

Splunk Enterprise +2 defense-evasion persistence windows access-control
2r 1t
high advisory

Unsecured Outlook Credentials Access in Windows Registry

An attacker attempts to access unsecured Outlook credentials stored in the Windows registry, potentially leading to unauthorized access to email accounts and sensitive information.

Outlook credential-access windows
2r 1t
high advisory

Unauthorized Access to Chrome Local State File

Detection of non-Chrome processes accessing the Chrome 'Local State' file, potentially leading to extraction of the master key used for decrypting saved passwords.

Chrome +3 credential-access password-stealing
2r 1t
high advisory

Suspicious SUID Binary Execution on Linux

This rule detects the execution of privilege escalation helpers under the root effective user, when initiated by a non-root user with a suspicious parent process, indicating potential privilege escalation attempts.

privilege-escalation suid linux
3r 2t
high advisory

Suspicious Script Interpreter Execution from Environment Variable Folders

Adversaries may execute script interpreters such as cscript, wscript, mshta, or powershell from suspicious directories accessible via environment variables to evade detection and execute malicious scripts.

Windows attack.execution attack.t1059
2r 1t
high advisory

Suspicious Process Execution from Unusual File Paths

Attackers may execute malicious code from unusual file paths such as Windows fonts or debug directories to evade defenses and gain unauthorized access, as detected by endpoint detection and response (EDR) agents.

Splunk Enterprise +2 defense-evasion persistence windows
2r 2t
high advisory

Suspicious Process Accessing Sensitive Identity Files via Auditd

This rule detects suspicious processes, such as copy utilities or scripting tools, accessing sensitive identity files on Linux systems, including Kubernetes tokens, cloud CLI configurations, and root SSH keys, indicating potential credential theft.

Elastic Agent Auditd Manager +4 credential-access linux auditd
3r 2t
high advisory

Suspicious Microsoft Antimalware Service Executable Execution

Detects suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances, which may indicate an attempt to evade defenses through DLL side-loading or masquerading.

Microsoft Antimalware Service Executable +6 defense-evasion execution windows
3r 1t
high advisory

Signal K Server WebSocket Login Brute-Force Vulnerability

The Signal K server's WebSocket login endpoint lacks rate limiting, allowing attackers to bypass HTTP rate limiting by opening a WebSocket connection and attempting unlimited password guesses.

signalk-server credential-access brute-force websocket
1r 1t
high advisory

Server-Side Request Forgery in mcp-data-vis

A server-side request forgery (SSRF) vulnerability exists in AlejandroArciniegas' mcp-data-vis due to improper handling of HTTP requests, potentially allowing remote attackers to make arbitrary requests through the vulnerable server.

mcp-data-vis ssrf vulnerability
2r 1t 1c
high advisory

rust-openssl Stack Buffer Overflow Vulnerability

The rust-openssl crate is vulnerable to a stack-based buffer overflow (CVE-2026-41681) where the `EVP_DigestFinal()` function writes beyond the allocated buffer, potentially corrupting the stack, affecting versions >= 0.10.39 and < 0.10.78.

openssl buffer overflow rust vulnerability
2r
high threat

Regsvr32 Silent and Install Parameter DLL Loading

Detection of regsvr32.exe being used with the silent and DLL install parameter to load a DLL, a technique used by RATs like Remcos and njRAT to execute arbitrary code.

Splunk Enterprise +2 Remcos +1 lolbin dll-loading regsvr32
2r 2t
high advisory

pyp2spec Code Injection Vulnerability

pyp2spec before 0.14.1 is vulnerable to code injection by writing PyPI package metadata into generated spec files without escaping RPM macro directives, allowing malicious packages to execute arbitrary commands on the build machine.

pyp2spec code-injection supply-chain rpm linux
3r 1t
high advisory

pygeoapi Unauthenticated SSRF Vulnerability in OGC API - Processes Subscriber

pygeoapi versions 0.23.0 to 0.23.2 contain an unauthenticated server-side request forgery (SSRF) vulnerability where OGC API process execution requests can use the subscriber object to make requests to internal HTTP services, which is resolved in version 0.23.3 by disabling internal requests by default.

pygeoapi ssrf ogc api cve-2026-42352 vulnerability cloud
2r 1t
high advisory

pygeoapi Path Traversal Vulnerability in STAC FileSystemProvider

A path traversal vulnerability exists in pygeoapi versions 0.23.0 to 0.23.2 within the STAC FileSystemProvider plugin, allowing unauthenticated access to directories when deployed without a URL-normalizing proxy.

pygeoapi path-traversal vulnerability webserver
2r 1t
high advisory

Privileged Identity Management (PIM) Alerting Disabled

An adversary disables Privileged Identity Management (PIM) alerts in Azure to evade detection and maintain persistent access with escalated privileges.

Azure pim alerts privilege-escalation persistence
2r 1t
high advisory

Print.exe Used to Dump Sensitive Files for Credential Access

Attackers are abusing the legitimate Windows Print.exe utility to copy sensitive files like NTDS.DIT and SAM in order to extract credentials, enabling local or remote credential access.

Windows credential-dumping credential-access print.exe
2r 2t
high advisory

PowerShell Token Obfuscation via Process Creation

Adversaries employ token obfuscation techniques within PowerShell commands to evade detection by security tools, leveraging methods such as character insertion, string concatenation, and environment variable manipulation to mask their malicious intent.

Windows defense-evasion token-obfuscation powershell
3r 1t
high advisory

PowerShell P/Invoke API Chain for Process Injection

This brief details detection of PowerShell scripts leveraging P/Invoke API calls to perform process injection, covering techniques like self-injection, remote thread injection, APC injection, thread-context hijacking, process hollowing, section-map injection, reflective DLL loading, and DLL injection.

PowerShell process-injection pinvoke
3r 7t
high advisory

PowerShell Obfuscation via String Concatenation

This rule detects PowerShell scripts employing string concatenation to evade static analysis and AMSI by fragmenting keywords or URLs at runtime.

PowerShell defense-evasion obfuscation windows
2r 1t
high advisory

PowerShell Obfuscation via Character Array Reconstruction

Detects PowerShell scripts using character array reconstruction to hide commands, URLs, or payloads, evading static analysis and AMSI.

powershell obfuscation defense-evasion windows
2r 1t
high advisory

PowerShell MiniDump Script Detection

This brief detects PowerShell scripts that reference MiniDumpWriteDump or full-memory minidump types, potentially used to capture process memory from credential-bearing processes like LSASS.

PowerShell credential-access minidump windows
2r 1t
high threat

Potential Vcruntime140 DLL Sideloading

Detects potential DLL sideloading of vcruntime140.dll, a common C++ runtime library, often used by threat actors like APT29 (via WinELOADER) to load malicious payloads under the guise of legitimate applications, leading to defense evasion, persistence, and privilege escalation.

Visual C++ Redistributable APT29 +5 dll-sideloading vcruntime140.dll wineloader defense-evasion persistence privilege-escalation
2r 3t
high advisory

Potential Machine Account Relay Attack via SMB

The rule identifies potential relay attacks against a machine account by detecting network share access events originating from a remote source IP but utilizing the target server's computer account, which may indicate an SMB relay attack.

Elastic License v2 credential-access smb-relay windows
2r 2t
high advisory

Potential Kerberos Relay Attack via Coerced Authentication against a Computer Account

Detects potential Kerberos relay attacks by identifying coercion attempts followed by authentication events using a target server's computer account, originating from a different host, indicating an attacker has captured and relayed Kerberos authentication material to execute code on behalf of the compromised system.

kerberos relay credential_access windows
3r 1t 1c
high advisory

Potential Credential Access via Windows Utilities

This rule detects the execution of known Windows utilities often abused to dump LSASS memory or the Active Directory database (NTDS.dit) in preparation for credential access by identifying specific command-line arguments and process names associated with credential dumping activities.

Elastic Defend +2 credential-access defense-evasion windows
3r 3t
high advisory

Path Traversal Vulnerability in WilliamCloudQi matlab-mcp-server

A path traversal vulnerability exists in WilliamCloudQi matlab-mcp-server up to version ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca, allowing a remote attacker to manipulate the scriptPath argument in the generate_matlab_code/execute_matlab_code function to access arbitrary files.

matlab-mcp-server path-traversal web-vulnerability
2r 1t 1c
high advisory

Outbound SMB Traffic Detection

This analytic detects outbound SMB connections from internal hosts to external servers, potentially indicating lateral movement and credential theft attempts.

Secure Firewall Threat Defense +4 network smb lateral-movement privilege-escalation
2r 1t
high advisory

OpenMRS ModuleResourcesServlet Path Traversal Vulnerability

OpenMRS Core versions 2.7.8 and earlier, as well as versions 2.8.0 through 2.8.5, contain a path traversal vulnerability in the ModuleResourcesServlet, allowing an unauthenticated attacker to read arbitrary files from the server filesystem by manipulating the URL.

Tomcat +2 path-traversal information-disclosure openmrs
2r 1t
high advisory

OpenClaw Plugin Trust Verification Bypass via Environment Variable Override

OpenClaw before 2026.3.31 allows attackers with control over workspace configuration to inject malicious plugins by overriding the OPENCLAW_BUNDLED_PLUGINS_DIR environment variable through workspace .env files, compromising plugin trust verification.

OpenClaw cve-2026-41396 environment-variable-override plugin-injection
2r 1t 1c
high advisory

Okta FastPass Phishing Attempt Detection

Okta FastPass detected and prevented a phishing attempt, indicating a user was likely targeted with a credential harvesting attack.

Okta phishing fastpass
2r 1t
high advisory

Non-Chrome Process Accessing Chrome Login Data

This analytic identifies non-Chrome processes accessing the Chrome user data file 'login data', which is an SQLite database containing sensitive information like saved passwords, potentially leading to credential theft.

Chrome +3 credential-access password-stealing windows
2r 1t
high advisory

Newly Observed High Severity Detection Alert in Elastic SIEM

This rule detects newly observed, low-frequency, high-severity Elastic SIEM detection alerts affecting a single agent, helping prioritize triage and response by highlighting alerts tied to specific detection rules that have not been seen previously for the host.

SIEM threat-detection higher-order-rule elastic-siem
3r
high advisory

n8n Credential Authorization Bypass in dynamic-node-parameters Allows Foreign API Key Replay

A credential authorization bypass vulnerability in n8n versions before 2.18.0 allows an authenticated user with access to a shared workflow to supply a foreign credential ID, causing the backend to decrypt and use that credential against attacker-controlled infrastructure, leading to API key exfiltration.

n8n credential-access authorization-bypass
2r 1t
high advisory

Multiple Alerts in Same ATT&CK Tactic by Host

This rule correlates multiple security alerts associated with the same ATT&CK tactic on a single host within a defined time window, helping to identify hosts exhibiting concentrated malicious behavior indicative of an active intrusion or post-compromise activity, focusing on Credential Access, Defense Evasion, Execution, and Command and Control tactics.

Elastic Security threat-detection higher-order-rule attack
2r 4t
high advisory

MiroFish Command Injection Vulnerability (CVE-2026-7058)

A command injection vulnerability exists in 666ghj MiroFish version 0.1.2 via the SimulationIPCClient.send_command function, allowing remote attackers to execute arbitrary commands.

MiroFish command-injection vulnerability ipc
2r 1t 1c
high advisory

Microsoft IIS Connection String Decryption via aspnet_regiis

An attacker with Microsoft IIS web server access can decrypt and dump hardcoded connection strings, such as MSSQL service account passwords, using the aspnet_regiis utility, potentially leading to credential compromise.

IIS credential-access aspnet_regiis windows
3r 1t
high advisory

MCPHub Path Traversal Vulnerability via Malicious MCPB Manifest Name

MCPHub is vulnerable to path traversal, where a malicious MCPB file with a crafted manifest.name can cause files to be extracted to arbitrary locations due to missing sanitization in the upload handler.

@samanhappy/mcphub path-traversal web-application mcphub
2r 2t
high advisory

mcp-dnstwist OS Command Injection Vulnerability (CVE-2026-7443)

An OS command injection vulnerability exists in BurtTheCoder's mcp-dnstwist version 1.0.4 and earlier due to improper handling of the Request argument in the fuzz_domain function within src/index.ts, potentially allowing remote attackers to execute arbitrary commands.

mcp-dnstwist command-injection vulnerability
2r 1t 1c
high advisory

LiteLLM Authenticated Command Execution via MCP stdio Test Endpoints

Authenticated users with low-privilege API keys could execute arbitrary commands on the host running LiteLLM via the `/mcp-rest/test/connection` and `/mcp-rest/test/tools/list` endpoints, by submitting a server configuration including command execution parameters.

litellm rce command-injection
2r 1t
high advisory

Kubernetes Secret Access with Suspicious User Agent

Detects read access to Kubernetes Secrets (`get`/`list`) with a user agent matching a curated set of non-standard or attacker-leaning clients, indicating potential credential access.

kubernetes credential-access cloud
2r 1t
high advisory

Kubernetes Rapid Secret GET Activity Against Multiple Objects

Detects an unusual volume of Kubernetes API get requests against multiple distinct Secret objects from the same client fingerprint, potentially indicating credential access or in-cluster reconnaissance.

Kubernetes credential-access threat-detection
2r 1t
high advisory

Kirby CMS Missing Authorization Vulnerability

Kirby CMS versions before 4.9.0 and between 5.0.0 and 5.3.3 contain a missing authorization vulnerability, allowing authenticated Panel users to access site model, user, and role information without proper permission checks, potentially leading to unauthorized information disclosure.

cms +1 authorization privilege-escalation web-application
3r 1t
high advisory

Kata Containers CopyFile Policy Subversion via Symlinks

An oversight in the CopyFile policy in Kata Containers allows untrusted hosts to write to arbitrary locations inside the guest workload image via symlinks, enabling binary overwrites and data exfiltration.

kata-containers/kata-containers kata-containers container-escape symlink
3r 2t 1c
high advisory

JoeCastrom mcp-chat-studio Server-Side Request Forgery Vulnerability

A server-side request forgery vulnerability exists in JoeCastrom mcp-chat-studio up to version 1.5.0 in the LLM Models API component, allowing remote attackers to manipulate the req.query.base_url argument and potentially conduct further attacks.

mcp-chat-studio cve-2026-7147 ssrf
2r 1t 1c
high advisory

Invoke-Obfuscation Obfuscated IEX Invocation via PowerShell

Attackers use Invoke-Obfuscation, a PowerShell obfuscation framework, to generate obfuscated IEX (Invoke-Expression) commands, evading detection and executing malicious code.

Windows defense-evasion execution powershell obfuscation
2r 2t
high advisory

Heimdall Authorization Bypass via Case-Sensitive URL-Encoded Slash Handling

Heimdall versions before 0.17.14 are vulnerable to inconsistent path interpretation due to case-sensitive handling of URL-encoded slashes; when `allow_encoded_slashes` is set to `off` (the default), the lowercase `%2f` is not recognized, potentially leading to authorization bypass if the default rule is overly permissive and the upstream service interprets `%2f` as a path separator.

Heimdall authorization-bypass url-encoding
2r 1t
high advisory

Heap/Stack Overflow in rust-openssl with OpenSSL 1.1.x

The rust-openssl crate's `Deriver::derive` and `PkeyCtxRef::derive` functions can cause heap/stack overflows when used with OpenSSL 1.1.x due to insufficient buffer length validation in X25519, X448, DH, and HKDF-extract, affecting rust-openssl versions >= 0.9.27 and < 0.10.78.

openssl buffer-overflow rust cryptography
2r
high advisory

GnuTLS DTLS Handshake Heap Overflow Vulnerability (CVE-2026-33846)

A heap buffer overflow vulnerability, CVE-2026-33846, exists in the DTLS handshake fragment reassembly logic of GnuTLS, allowing unauthenticated remote attackers to cause application crashes or potential memory corruption by sending crafted DTLS fragments with conflicting message lengths.

GnuTLS cve-2026-33846 dtls heap overflow network
2r 1t 1c
high advisory

Frequent Azure PIM Role Activation Detected

Detection of frequent role activation in Azure Privileged Identity Management (PIM) by the same user may indicate potential privilege escalation or account compromise.

Azure pim role-activation privilege-escalation
2r 3t
high advisory

florensiawidjaja BioinfoMCP Path Traversal Vulnerability

A path traversal vulnerability in florensiawidjaja BioinfoMCP allows remote attackers to write arbitrary files via manipulation of the 'Name' argument in the Upload function of app.py.

BioinfoMCP path-traversal web-application cve-2026-7398
2r 1t 1c
high advisory

Executable or Script Creation in Temporary Paths

Adversaries may create executables or scripts in temporary directories to evade detection, maintain persistence, and execute unauthorized code on Windows systems.

defense-evasion persistence privilege-escalation execution temp-directory file-creation
2r 1t
high advisory

Disabling LSA Protection via Registry Modification

Adversaries may modify the RunAsPPL registry key to disable LSA protection, which prevents nonprotected processes from reading memory and injecting code, potentially leading to credential access.

Elastic Defend +3 defense-evasion windows registry
2r 1t
high advisory

Detection of Python Base64 Encoded Execution on Linux

This brief focuses on detecting the execution of Python one-liners utilizing base64 decoding functions on Linux systems, a technique employed by malicious actors to obfuscate and execute payloads, thereby evading traditional security measures.

execution defense-evasion linux
2r 2t
high advisory

Detection of Important Scheduled Task Deletion or Disablement

Adversaries delete or disable critical scheduled tasks, such as those related to system restore, Windows Defender, BitLocker, Windows Backup, or Windows Update, to disrupt operations and potentially conduct data destructive activities.

Windows attack.execution attack.privilege-escalation attack.persistence attack.t1053.005
2r 1t
high advisory

Deletion of Critical Scheduled Tasks

Adversaries delete critical scheduled tasks, such as those related to BitLocker, ExploitGuard, System Restore, Windows Defender, and Windows Update, to disrupt security measures and enable data destruction.

Windows attack.impact attack.t1489
2r 1t
high advisory

CVE-2026-7337 Type Confusion Vulnerability in Chromium V8 Engine

CVE-2026-7337 is a type confusion vulnerability in the V8 JavaScript engine that affects Google Chrome and Microsoft Edge (Chromium-based).

Chrome +1 type confusion v8 engine chromium cve-2026-7337
2r 1t 1c
high advisory

Command Obfuscation via Unicode Modifier Letters

Adversaries use Unicode modifier letters to obfuscate command-line arguments, evading string-based detections on common Windows utilities like PowerShell and cmd.exe.

Microsoft Defender XDR +5 defense-evasion command-line unicode obfuscation
2r 1t
high advisory

CKAN Unauthenticated SQL Injection in datastore_search_sql

An unauthenticated SQL injection vulnerability in CKAN's `datastore_search_sql` function allows attackers to access private resources and PostgreSQL system information, affecting versions prior to 2.10.10 and versions 2.11.0 through 2.11.4.

ckan sql-injection vulnerability
2r 1t
high advisory

Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability

A vulnerability in Cisco ACI Multi-Site CloudSec encryption allows a remote attacker to read or modify intersite encrypted traffic due to a flaw in cipher implementation.

Nexus 9000 Series Fabric Switches in ACI mode cve-2023-20185 information-disclosure network
2r 1t 1c
high threat

ChatGPTNextWeb NextChat SSRF Vulnerability (CVE-2026-7178)

ChatGPTNextWeb NextChat versions up to 2.16.1 are vulnerable to server-side request forgery (SSRF) due to improper input validation in the storeUrl function, allowing remote attackers to potentially access internal resources or conduct other malicious activities.

exploited NextChat ssrf cve vulnerability web-application
2r 1t 1c
high advisory

Beghelli Sicuro24 SicuroWeb AngularJS Sandbox Escape via Template Injection

Beghelli Sicuro24 SicuroWeb is vulnerable to arbitrary JavaScript execution due to embedding an end-of-life AngularJS 1.5.2 component with known sandbox escape primitives combined with template injection, enabling attackers to compromise operator browser sessions via MITM attacks.

Sicuro24 SicuroWeb +1 cve-2026-41468 angularjs template-injection mitm
2r 1t 1c
high advisory

Azure Subscription Permission Elevation via Activity Logs

An attacker elevates their Azure subscription permissions to manage all subscriptions, potentially leading to unauthorized access and control over the environment.

Azure privilege-escalation persistence initial-access stealth
2r 1t
high advisory

AWS VPC Flow Logs Deletion for Defense Evasion

An adversary may delete VPC Flow Logs in AWS EC2 by calling the DeleteFlowLogs API to evade detection and hinder forensic investigations.

Elastic Compute Cloud cloud aws defense-evasion vpc flow-logs
2r 1t
high advisory

AWS STS GetFederationToken with AdministratorAccess in Request

Detection of AWS STS GetFederationToken calls with AdministratorAccess in the request parameters, indicating potential privilege escalation or dangerous automation via broadly privileged temporary credentials.

AWS STS aws privilege-escalation lateral-movement sts getfederationtoken
2r 2t
high advisory

AWS EC2 Stop, Start, and User Data Modification Correlation

Detection of a sequence of AWS EC2 management API calls indicative of malicious modification of instance user data to execute arbitrary code upon instance restart, potentially leading to privilege escalation and persistence.

EC2 aws user-data privilege-escalation persistence execution
3r 2t
high advisory

AWS EC2 Instance Profile Associated with Running Instance

An attacker may escalate privileges by associating a compromised EC2 instance with a more privileged IAM instance profile.

EC2 +1 aws privilege-escalation lateral-movement
2r 2t
high advisory

AWS AssumeRoleWithWebIdentity from Kubernetes SA and External ASN

Detects successful AWS `AssumeRoleWithWebIdentity` calls where the caller identity is a Kubernetes service account and the source autonomous system organization is not `Amazon.com, Inc.`, which may indicate a stolen or misused projected service-account token being exchanged for IAM credentials off-cluster.

EKS +1 aws cloudtrail iam kubernetes initial-access web-identity
2r 1t
high advisory

Avo Framework Broken Access Control Vulnerability

Avo framework version 3.x contains a critical Broken Access Control vulnerability in the ActionsController. Due to insecure action lookup logic, an authenticated user can execute any Action class on any resource, even if the action is not registered for that specific resource. This leads to Privilege Escalation and unauthorized data manipulation across the entire application. Version 3.31.2 remediates this issue.

avo broken-access-control privilege-escalation ruby
2r 1t
high advisory

ARMember WordPress Plugin Vulnerable to Time-Based Blind SQL Injection (CVE-2026-7649)

A time-based blind SQL Injection vulnerability exists in the ARMember WordPress plugin (<= 4.0.60) due to insufficient input sanitization of the 'orderby' parameter, allowing unauthenticated attackers to extract sensitive database information.

ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin <= 4.0.60 sql-injection wordpress armember cve-2026-7649
2r 1t 1c
high advisory

Arcane Unauthenticated Compose Template Content Disclosure

Arcane versions before 1.18.0 are vulnerable to an unauthenticated information disclosure on four GET endpoints under `/api/templates*`, allowing unauthorized access to Compose YAML and `.env` content including sensitive secrets.

Arcane information-disclosure vulnerability
2r 1t
high advisory

Appsmith SQL Injection Vulnerability in FilterDataService

A SQL injection vulnerability exists in Appsmith's FilterDataServiceCE.java in versions 1.98 and earlier where the dropTable method constructs a SQL DROP TABLE statement using string concatenation with the table name, allowing arbitrary SQL command execution, leading to potential data loss, exfiltration, or modification.

interfaces sql-injection data-loss appsmith
2r 1t
high advisory

Aider-MCP Command Injection Vulnerability (CVE-2026-7316)

A command injection vulnerability (CVE-2026-7316) exists in eiliyaabedini aider-mcp, allowing remote attackers to execute arbitrary commands by manipulating the working_dir/editable_files argument in the aider_mcp.py file.

aider-mcp command-injection vulnerability
2r 1t 1c
high advisory

666ghj MiroFish REST API Authentication Bypass (CVE-2026-7042)

A missing authentication vulnerability (CVE-2026-7042) exists in 666ghj MiroFish up to version 0.1.2, allowing remote attackers to bypass authentication via manipulation of the REST API Endpoint's create_app function.

MiroFish cve-2026-7042 authentication-bypass rest-api
2r 1t 1c
high advisory

Windows Proxy Execution of .NET Utilities via Scripts

Detects the execution of .NET utilities by script processes from unusual locations, indicative of signed binary proxy execution for defense evasion and code execution.

Windows proxy-execution net-utility defense-evasion execution signed-binary-proxy-execution
2r 2t
high advisory

Unusual Child Processes of RunDLL32 Execution Without Arguments

The execution of `rundll32.exe` without arguments, followed by a child process execution, indicates potential abuse of Rundll32 for proxy execution or payload handoff, often employed for defense evasion on Windows systems.

Elastic Defend defense-evasion proxy-execution rundll32
2r 1t
high advisory

Suspicious DNS Queries to Telegram API by Non-Telegram Processes

Detection of a process making DNS queries to the Telegram API domain, which is indicative of malware utilizing Telegram bots for command and control (C2) communications.

Splunk Enterprise +2 telegram command-and-control dns windows
2r 2t 1i
high advisory

PowerShell Loading .NET Assemblies via Reflection

This analytic detects PowerShell scripts leveraging .NET reflection to load assemblies into memory, a technique commonly used by threat actors to bypass defenses and execute malicious code.

PowerShell reflection dotnet memory-injection attack.execution attack.t1059.001
2r 1t
high advisory

PowerShell Execution via Environment Variables

Adversaries use PowerShell to execute malicious code stored in environment variables, leveraging Invoke-Expression or its aliases to bypass static analysis and execute payloads dynamically, as seen in malware loaders and stagers like the VIP Keylogger.

Splunk Enterprise +2 powershell environment-variable invoke-expression execution
2r 1t
high threat

Non-Chrome Process Accessing Chrome Default Directory

Detection of non-Chrome processes accessing the Chrome user data directory, potentially indicating credential theft or data exfiltration attempts by malware such as RATs or APT groups.

Splunk Enterprise +2 FIN7 +2 credential-access threat-type windows
2r 1t
high advisory

Logon Script Registry Modification for Persistence and Privilege Escalation

This brief details the detection of UserInitMprLogonScript registry entry modifications, a technique employed by threat actors for persistence and privilege escalation by ensuring payloads execute automatically at system startup.

Splunk Enterprise +2 persistence privilege-escalation windows
2r 2t
high advisory

IIS HTTP Logging Disabled via AppCmd

An attacker with IIS server access can disable HTTP Logging using `appcmd.exe` to evade defenses and prevent forensic analysis, as detected by the execution of `appcmd.exe` with arguments to disable logging.

Elastic Defend +3 defense-evasion iis httplogging appcmd windows
2r 1t
high advisory

Executable or Script Creation in Suspicious Paths

This analytic identifies the creation of executables or scripts in suspicious file paths on Windows systems, where adversaries often use these paths to evade detection and maintain persistence, potentially leading to unauthorized code execution, privilege escalation, or persistence within the environment.

Windows defense-evasion persistence privilege-escalation execution
2r 1t
high advisory

Detects Kirbi File Creation

Detects the creation of .kirbi files, a suspicious Kerberos ticket artifact often produced by ticket export or dumping tools such as Rubeus or Mimikatz, indicating preparation for Kerberos ticket theft or Pass-The-Ticket (PTT) attacks.

Microsoft Defender XDR +2 credential-access kerberos pass-the-ticket mimikatz rubeus
2r 1t
high advisory

CoreDNS Transfer Plugin ACL Bypass Vulnerability

CoreDNS' transfer plugin prior to version 1.14.3 can select the wrong ACL stanza due to lexicographic comparison, leading to unauthorized zone transfers by clients intended to be denied by subzone-specific transfer policies.

CoreDNS cve-2026-33489 acl-bypass dns zone-transfer
2r 1t
high threat

Braodo Stealer Screen Capture in TEMP Directory

This analytic detects the creation of screen capture files in the TEMP directory, specifically targeting activity associated with the Braodo stealer malware, which captures screenshots of the victim's desktop as part of its data theft activities.

Splunk Enterprise +2 Braodo Stealer stealc-stealer crypto-stealer braodo-stealer apt37 hellcat-ransomware vip-keylogger screen-capture malware
2r 1t
high advisory

Azure Identity Protection Atypical Travel Anomaly

The Atypical Travel detection in Azure Identity Protection identifies potentially compromised user accounts by detecting geographically improbable sign-in activity, indicative of account compromise or misuse.

Azure Active Directory +1 azure identity-protection atypical-travel account-compromise credential-theft
2r 1t
high advisory

Azure AD Privileged Role Assignment

Detection of a user being added to a privileged role in Azure AD, potentially indicating privilege escalation or persistence by an attacker.

Azure Active Directory azure privileged-access role-assignment
2r 2t
high advisory

Azure AD Account Created and Deleted Within a Close Time Frame

Detection of Azure Active Directory accounts that are created and deleted within a short timeframe, potentially indicating malicious activity such as privilege escalation or persistence attempts.

Azure Active Directory privilege-escalation persistence initial-access stealth account-manipulation
2r 3t
high advisory

Suspicious CSC.exe Parent Process

The Csc.exe (C# compiler) process is being launched by unusual parent processes or from suspicious locations, indicating potential malware execution or defense evasion.

Windows attack.execution attack.defense-evasion csc.exe payload-delivery
3r 3t
high advisory

Control Panel Process with Unusual Arguments

Adversaries may abuse control.exe to proxy execution of malicious code by using the Control Panel process to execute payloads from unusual locations, detected by identifying suspicious keywords or paths in the process command line.

Elastic Defend +3 defense-evasion proxy-execution windows
2r 1t
high threat

Suspicious Script Execution from Temporary Directory

This brief covers a detection for suspicious script execution, such as PowerShell, WScript, or MSHTA, originating from common temporary directories, potentially indicating malware activity.

exploited Windows execution script temp
2r 1t
high advisory

Detection of Suspicious Inbox Manipulation Rules in Azure

This brief focuses on detecting malicious inbox manipulation rules set within a user's Azure environment, often indicative of account compromise or insider threats aiming to conceal illicit activities.

Azure attack.stealth attack.t1140
2r 2t
high advisory

WScript or CScript Dropper

The WScript or CScript Dropper technique involves using cscript.exe or wscript.exe to write malicious script files (js, jse, vba, vbe, vbs, wsf, wsh) to suspicious locations on a Windows system for later execution.

Windows script-dropper file-creation
2r 2t
high advisory

WeKan SSRF Vulnerability in Webhook Integration

WeKan before 8.35 is vulnerable to server-side request forgery (SSRF), allowing attackers with integration modification privileges to set webhook URLs to internal network addresses, leading to unauthorized HTTP POST requests and potential comment manipulation.

WeKan ssrf cve-2026-41455
2r 1t 1c
high advisory

Unusual Child Process from a System Virtual Process

A suspicious child process of the Windows virtual system process is detected, potentially indicating code injection and defense evasion.

Elastic Defend +2 defense-evasion process-injection windows
2r 1t
high advisory

TencentCloudBase CloudBase-MCP Server-Side Request Forgery Vulnerability (CVE-2026-7221)

A server-side request forgery vulnerability exists in TencentCloudBase CloudBase-MCP up to version 2.17.0, allowing remote attackers to manipulate the `req.body.url` argument in the `openUrl` function of `mcp/src/interactive-server.ts` to conduct SSRF attacks.

CloudBase-MCP SSRF CVE-2026-7221 TencentCloudBase
2r 1c
high advisory

Suspicious PowerShell Reconnaissance via WMI Queries

Detection of suspicious PowerShell activity using Windows Management Instrumentation (WMI) to gather system information, indicative of reconnaissance efforts by adversaries potentially leading to further exploitation or lateral movement.

Splunk Enterprise +2 powershell wmi reconnaissance lateral_movement windows
2r 2t
high advisory

Suspicious Microsoft HTML Application Child Process

Mshta.exe spawning a suspicious child process, such as cmd.exe or powershell.exe, indicates potential adversarial activity leveraging Mshta to execute malicious scripts and evade detection on Windows systems.

Windows +2 defense-evasion mshta process-creation
2r 1t
high advisory

S3 Browser Used to Create IAM Login Profiles

The S3 Browser utility is being used to enumerate IAM users lacking login profiles and subsequently create them, potentially for reconnaissance, persistence, and privilege escalation within AWS environments.

AWS IAM aws cloud iam s3browser privilege-escalation persistence
2r 2t
high advisory

RustFS Notification Target Admin API Authorization Bypass

A vulnerability in RustFS allows a non-admin user to overwrite a shared admin-defined notification target, leading to event interception and audit evasion due to missing admin-action authorization on notification target admin API endpoints.

rustfs authorization-bypass ssrf event-interception
2r 3t
high advisory

Remote Registry Lateral Movement via RPC Firewall

This brief details detection of lateral movement attempts using remote RPC calls to modify the registry, potentially leading to code execution, detected via RPC Firewall logs.

lateral-movement defense-impairment persistence rpc
2r 3t
high advisory

Potential Masquerading as Svchost

Attackers may attempt to masquerade as the Service Host process `svchost.exe` by executing from non-standard paths to evade detection and blend in with normal system activity.

Windows defense-evasion masquerading
2r 1t
high advisory

Potential Credential Access via Renamed COM+ Services DLL

Detection of renamed COMSVCS.DLL being loaded by rundll32.exe, potentially used to dump LSASS memory for credential access while evading command-line detection.

Windows credential-access defense-evasion
2r 3t 1i
high advisory

Potential Credential Access via MSBuild Loading Credential Management DLLs

The detection rule identifies a potential credential access attempt via the trusted developer utility MSBuild by detecting instances where it loads DLLs associated with Windows credential management, specifically vaultcli.dll or SAMLib.DLL, which is often used for credential dumping.

MSBuild +2 credential-access defense-evasion windows
2r 1t
high advisory

OpenRemote Improper Access Control Leads to Privilege Escalation

OpenRemote is vulnerable to privilege escalation, allowing an attacker with write:admin privileges in one Keycloak realm to gain administrator access to the master realm by manipulating Keycloak realm roles due to missing authorization checks in the updateUserRealmRoles function.

openremote-manager privilege-escalation access-control openremote
2r 1t
high advisory

OpenClaw Symlink Race Condition Allows Sandbox Escape

A time-of-check/time-of-use (TOCTOU) race condition in OpenClaw versions 2026.4.21 and earlier allows a symlink swap to redirect filesystem writes outside the intended sandbox mount root, potentially leading to arbitrary file modification.

openclaw sandbox-escape symlink race-condition npm
1r 1t
high advisory

Okta User Session Start via Anonymizing Proxy Service

Detection of Okta user sessions initiated through anonymizing proxy services, potentially indicating malicious activity or attempts to evade security controls.

Okta identity proxy defense-evasion
2r 1t
high advisory

Nsenter Execution with Target Flag Inside Container

The rule detects nsenter executions from inside a monitored Linux container that include a namespace target flag (-t or --target), which can be abused to escape container isolation.

Defend for Containers container privilege-escalation linux
2r 1t
high advisory

Modification of WDigest Security Provider

The rule detects attempts to modify the WDigest security provider in the registry to force the user's password to be stored in clear text in memory, which could lead to credential dumping.

Windows +2 credential-access registry-modification
2r 1t
high advisory

MLOps_MCP Path Traversal Vulnerability (CVE-2026-7213)

A path traversal vulnerability exists in ef10007 MLOps_MCP version 1.0.0, allowing a remote attacker to manipulate the 'filename/destination' argument in the 'save_file Tool' component's 'fastmcp_server.py' file.

MLOps_MCP 1.0.0 path-traversal web-application cve-2026-7213
2r 1t 1c
high advisory

locize Client SDK Cross-Origin DOM XSS and Handler Hijack Vulnerability

The locize client SDK versions prior to 4.0.21 are vulnerable to cross-origin DOM XSS and handler hijack due to missing origin validation in the InContext Editor, allowing attackers to inject malicious code and exfiltrate data via crafted postMessage events.

locize client SDK xss dom-xss postMessage locize javascript
2r 1t
high advisory

Kubernetes Secrets Enumeration from Non-Loopback Client

Detection of Kubernetes Secrets listing from non-loopback clients targeting cluster-wide secrets or sensitive namespaces, potentially indicating unauthorized credential access or discovery.

kubernetes credential-access discovery cloud
2r 2t
high advisory

Impossible Travel Detection in Azure AD

This brief describes the detection of 'impossible travel' events in Azure AD, where a user appears to log in from geographically distant locations within an implausibly short time frame, potentially indicating account compromise.

Azure Active Directory azuread identity-protection impossible-travel account-compromise lateral-movement
2r 1t
high advisory

Heimdall Host Matching Case-Sensitivity Vulnerability

Heimdall performs case-sensitive host matching, which can lead to policy bypass because HTTP hostnames are case-insensitive, potentially leading to unauthorized access, data modification, or privilege escalation if the request host is part of the rule.

heimdall defense-evasion policy-bypass access-control
2r 1t
high advisory

Heimdall Authorization Bypass via Path Normalization Mismatch

Heimdall is vulnerable to an authorization bypass due to a path normalization mismatch between Heimdall and downstream components, potentially leading to unauthorized access and privilege escalation.

heimdall authorization-bypass path-normalization cloud
2r 2t
high advisory

GitPilot-MCP Command Injection Vulnerability (CVE-2026-6980)

A command injection vulnerability (CVE-2026-6980) in Divyanshu-hash GitPilot-MCP up to version 9ed9f153ba4158a2ad230ee4871b25130da29ffd allows remote attackers to execute arbitrary commands by manipulating the 'command' argument in the repo_path function of main.py, and public exploit code is available.

GitPilot-MCP command-injection web-application cve
2r 1t 1c
high advisory

geekgod382 filesystem-mcp-server Path Traversal Vulnerability (CVE-2026-7400)

A path traversal vulnerability exists in geekgod382 filesystem-mcp-server version 1.0.0 allowing remote attackers to access unauthorized files due to insufficient path validation in the is_path_allowed function.

filesystem-mcp-server path-traversal web-application cve-2026-7400
2r 1t 1c
high advisory

FastlyMCP Command Injection Vulnerability (CVE-2026-7220)

A command injection vulnerability (CVE-2026-7220) exists in jackwrichards FastlyMCP allowing remote attackers to execute arbitrary OS commands by manipulating the command argument in the fastly-mcp.mjs file.

FastlyMCP command-injection cve-2026-7220 fastly-mcp
2r 1t 1c
high advisory

Detection of Kali Linux Installation or Usage via Windows Subsystem for Linux (WSL)

Adversaries may attempt to install or use Kali Linux via Windows Subsystem for Linux (WSL) to avoid detection, potentially enabling them to perform malicious activities within a Windows environment while blending in with legitimate WSL usage.

Windows Subsystem for Linux +4 defense-evasion windows wsl kalilinux
2r 1t
high advisory

Detect-It-Easy Path Traversal Vulnerability (CVE-2026-43616)

Detect-It-Easy versions prior to 3.21 are vulnerable to path traversal, allowing attackers to write arbitrary files to the filesystem and potentially achieve code execution by crafting malicious archive entries.

Detect-It-Easy path-traversal vulnerability archive-extraction
2r 1t 1c
high advisory

D-Link DIR-825 Buffer Overflow Vulnerability in miniupnpd

A buffer overflow vulnerability (CVE-2026-7069) exists in the AddPortMapping function of the miniupnpd component within D-Link DIR-825 routers (up to version 3.00b32), potentially enabling attackers on the local network to execute arbitrary code.

DIR-825 buffer-overflow cve miniupnpd d-link
2r 1t 1c
high advisory

CVE-2018-0735 ECDSA Signature Generation Timing Attack

CVE-2018-0735 is a timing attack vulnerability in ECDSA signature generation affecting Microsoft products, potentially allowing attackers to recover private keys.

ecdsa timing-attack cryptography
2r 1t 1c
high advisory

Creation or Modification of Domain Backup DPAPI Private Keys

Detection of creation or modification of Domain Backup private keys, which adversaries may extract from a Domain Controller (DC) to decrypt domain user master key files.

Elastic Defend +2 credential-access dpapi domain-controller
3r 1t
high advisory

choieastsea simple-openstack-mcp OS Command Injection Vulnerability (CVE-2026-7066)

The choieastsea simple-openstack-mcp application is vulnerable to OS command injection via the exec_openstack function in server.py, allowing remote attackers to execute arbitrary commands.

simple-openstack-mcp command-injection vulnerability openstack
3r 1t 1c
high advisory

Budibase XSS Leads to Account Takeover via JWT Theft

The `budibase:auth` cookie in Budibase is set without the `httpOnly` flag, enabling attackers with XSS to steal JWTs and gain persistent access to user accounts.

Budibase xss account takeover jwt cookie
2r 1t
high advisory

BidingCC BuildingAI SSRF Vulnerability (CVE-2026-7065)

A server-side request forgery (SSRF) vulnerability exists in BidingCC BuildingAI up to version 26.0.1, allowing remote attackers to manipulate the `url` argument in the `uploadRemoteFile` function of `file-storage.service.ts` to conduct SSRF attacks.

BuildingAI ssrf cve-2026-7065 web-application
2r 1t 1c
high advisory

Azure PIM - Role Assignment Outside of Privileged Identity Management

Detection of privilege role assignments outside of Azure Privileged Identity Management (PIM) can indicate potential attacker activity related to initial access, stealth, persistence, or privilege escalation within the Azure environment.

Azure Active Directory azure pim role-assignment attack.initial-access attack.stealth attack.t1078 attack.persistence attack.privilege-escalation
2r 4t
high advisory

AWS GuardDuty IP Set Manipulation for Defense Impairment

An attacker modifies AWS GuardDuty IP sets, potentially whitelisting malicious IPs to disable security alerts and impair defenses.

AWS GuardDuty defense-impairment aws
2r 1t
high advisory

PowerShell Obfuscation via Backtick-Escaped Variable Expansion

PowerShell scripts use backtick-escaped characters inside `${}` variable expansion to reconstruct strings at runtime, enabling attackers to split keywords, hide commands, and evade static analysis and AMSI.

windows +1 powershell obfuscation defense-evasion variable-expansion
2r 1t
high advisory

NTDS or SAM Database File Copied

Detects copy operations of Active Directory Domain Database (ntds.dit) or Security Account Manager (SAM) files, potentially exposing sensitive hashed credentials on Windows systems.

Microsoft Defender XDR +2 credential-access windows ntds sam credential-theft
2r 1t
high advisory

Detection of IIS HTTP Logging Disabled via AppCmd.exe

This analytic detects the use of AppCmd.exe to disable HTTP logging on IIS servers, allowing adversaries to evade detection by removing evidence of their actions.

Splunk Enterprise +3 iis logging defense-evasion windows
2r 2t