Skip to content
Threat Feed

Tag

Vulnerability

372 briefs RSS
critical advisory

Arelle Unauthenticated Remote Code Execution Vulnerability

Arelle before 2.39.10 is vulnerable to unauthenticated remote code execution via the /rest/configure REST endpoint, allowing attackers to execute arbitrary Python code by supplying a malicious URL through the plugins parameter.

Arelle rce vulnerability
2r 1t 1c
high advisory

WordPress Easy PayPal Events & Tickets Plugin Authentication Bypass Vulnerability

An unauthenticated remote attacker can exploit a hardcoded authentication bypass vulnerability in the Easy PayPal Events & Tickets plugin for WordPress (versions 1.3 and earlier) by providing 'test' as the hash parameter, allowing retrieval of sensitive order details.

Easy PayPal Events & Tickets plugin wordpress authentication bypass vulnerability
2r 1t 1c 1i
high advisory

Norton Secure VPN Privilege Escalation Vulnerability (CVE-2025-58074)

A privilege escalation vulnerability exists in Norton Secure VPN during installation via the Microsoft Store (CVE-2025-58074), allowing a low-privilege user to replace files leading to arbitrary file deletion and potential elevation of privileges.

Norton Secure VPN privilege-escalation windows vulnerability
2r 1t 1c
critical advisory

OPNsense Multiple Vulnerabilities Leading to Remote Code Execution

A remote, anonymous attacker can exploit multiple vulnerabilities in OPNsense to bypass security measures and execute arbitrary code, potentially leading to complete system compromise.

OPNsense vulnerability rce firewall
2r 1t
high advisory

Multiple Vulnerabilities in Progress Software MOVEit Automation

Multiple vulnerabilities in Progress Software MOVEit Automation can be exploited by an attacker to bypass security measures or gain elevated privileges.

MOVEit Automation vulnerability privilege-escalation defense-evasion
2r 2t
medium advisory

libexif Vulnerability Allows Code Execution

A local attacker can exploit a vulnerability in libexif to potentially execute arbitrary code, cause a denial of service, or disclose sensitive information.

libexif vulnerability code-execution denial-of-service
2r 2t
medium advisory

Multiple Vulnerabilities in Rapid7 Velociraptor

Multiple vulnerabilities in Rapid7 Velociraptor could allow an attacker to disclose information or cause a denial of service.

Velociraptor vulnerability denial-of-service information-disclosure
2r 3t
medium advisory

osrg GoBGP Integer Underflow Vulnerability

osrg GoBGP up to version 4.3.0 is vulnerable to an integer underflow in the parseRibEntry function, potentially allowing a remote attacker to cause a denial of service or other unspecified impacts; version 4.4.0 addresses this issue.

GoBGP cve vulnerability integer underflow bgp
2r 1t 1c
critical advisory

Multiple Vulnerabilities in Mozilla Thunderbird Allow for Remote Code Execution and Data Breach

Multiple vulnerabilities in Mozilla Thunderbird prior to versions 150.0.1 and Thunderbird ESR prior to 140.10.1 could allow a remote attacker to achieve arbitrary code execution, data confidentiality breach, and security policy bypass.

Thunderbird ESR +1 vulnerability rce databreach securitybypass
2r 4t 5c
medium advisory

Microsoft Product Vulnerability CVE-2026-37555

CVE-2026-37555 is a vulnerability affecting a Microsoft product, requiring further investigation upon patch release.

vulnerability microsoft cve-2026-37555
2r 1c
low advisory

Microsoft CVE-2026-30656 Information Published

Microsoft published information regarding CVE-2026-30656, but the details of the vulnerability are not available.

vulnerability microsoft
1c
high advisory

code-projects Online Hospital Management System SQL Injection Vulnerability

CVE-2026-7632 is a SQL injection vulnerability in code-projects Online Hospital Management System 1.0, allowing a remote attacker to execute arbitrary SQL commands by manipulating the 'delid' argument in the '/viewappointment.php' file.

Online Hospital Management System 1.0 sql-injection web-application vulnerability
2r 1t 1c
high advisory

Paid Memberships Pro Plugin Vulnerability Allows Unauthorized Stripe Webhook Modification

The Paid Memberships Pro plugin for WordPress is vulnerable to unauthorized modification of Stripe webhook configurations due to missing capability checks, allowing authenticated attackers with Subscriber-level access to disrupt payment processing.

Paid Memberships Pro plugin wordpress stripe webhook vulnerability plugin
2r 3t 1c
high advisory

Zyosoft School App Insecure Direct Object Reference Vulnerability

Zyosoft's School App contains an Insecure Direct Object Reference vulnerability (CVE-2026-7491) that allows authenticated remote attackers to modify parameters and access or modify other users' data.

School App idor vulnerability web application cve-2026-7491
2r 3t 1c
high advisory

Flux159 mcp-game-asset-gen Path Traversal Vulnerability

A path traversal vulnerability exists in Flux159 mcp-game-asset-gen version 0.1.0, where manipulation of the `statusFile` argument in the `image_to_3d_async` function allows for remote exploitation.

mcp-game-asset-gen 0.1.0 path-traversal vulnerability web-application
2r 1t 1c
high advisory

WP Editor Plugin CSRF Vulnerability

The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.2.9.2, allowing unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with malicious code by tricking a site administrator into clicking a link.

WP Editor plugin <= 1.2.9.2 csrf wordpress plugin vulnerability
2r 1t 1c
medium advisory

Microsoft Product Vulnerability CVE-2026-41526

CVE-2026-41526 is a vulnerability affecting an unspecified Microsoft product, requiring further investigation upon patch release for exploitation details.

vulnerability microsoft
1c
high advisory

SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability

SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to remote SQL injection via the ID parameter in the /ajax.php?action=delete_customer endpoint, allowing attackers to potentially read, modify, or delete database information.

Pharmacy Sales and Inventory System 1.0 sql-injection web-application vulnerability
2r 1t 1c
critical advisory

Chromium Use-After-Free Vulnerability in Codecs (CVE-2026-7348)

CVE-2026-7348 is a use-after-free vulnerability in the Codecs component of Chromium, affecting Google Chrome and Microsoft Edge.

Chrome +1 use-after-free vulnerability browser
2r 1t 1c
high advisory

SourceCodester Advanced School Management System SQL Injection Vulnerability

A SQL injection vulnerability (CVE-2026-7545) exists in SourceCodester Advanced School Management System 1.0 within the checkEmail endpoint of commonController.php, allowing remote attackers to potentially execute arbitrary SQL commands.

Advanced School Management System 1.0 sqli vulnerability web-application
2r 1t 1c
critical advisory

HKUDS OpenHarness Remote Code Execution via /bridge Slash Command (CVE-2026-7551)

HKUDS OpenHarness contains a remote code execution vulnerability (CVE-2026-7551) in the /bridge slash command, allowing remote attackers to execute arbitrary operating system commands by injecting malicious commands via the /bridge spawn command, leading to unauthorized shell access and data exposure.

OpenHarness rce vulnerability injection
2r 1t 1c
critical advisory

IBM Turbonomic prometurbo Agent Privilege Escalation via Excessive Permissions (CVE-2026-6389)

IBM Turbonomic prometurbo agent versions 8.16.0 through 8.17.6 grants excessive cluster-wide permissions, including unrestricted read access to all secrets, allowing a compromised operator or service account to exfiltrate credentials, escalate privileges, and achieve full cluster compromise.

Turbonomic Application Resource Management +1 privilege-escalation credential-access kubernetes vulnerability
2r 2t 1c
medium advisory

IBM Langflow Desktop Unauthenticated Image Access via IDOR

IBM Langflow Desktop versions 1.0.0 through 1.8.4 are vulnerable to an indirect object reference (IDOR) vulnerability (CVE-2026-4503), allowing unauthenticated users to view other users' images due to a user-controlled key.

Langflow Desktop idor vulnerability privilege-escalation
2r 1t 1c
medium advisory

Sentry SAML SSO Improper Authentication Allows User Identity Linking

A critical vulnerability (CVE-2026-42354) exists in Sentry's SAML SSO implementation that allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance, affecting self-hosted users with multiple organizations configured if a malicious user has permissions to modify SSO settings, while Sentry SaaS was patched in April and self-hosted users are advised to upgrade to version 26.4.1 or higher.

sentry +1 authentication saml sso account takeover vulnerability
2r 1t
high advisory

Jupyter Notebook Authentication Token Theft via CommandLinker XSS

A stored Cross-Site Scripting (XSS) vulnerability in Jupyter Notebook versions 7.0.0 through 7.5.5 and JupyterLab versions up to 4.5.6 allows attackers to steal authentication tokens by tricking users into interacting with malicious notebook files, leading to complete account takeover via the Jupyter REST API.

@jupyter-notebook/help-extension +4 xss jupyter authentication account-takeover vulnerability
2r
high advisory

Potential Copy Fail (CVE-2026-31431) Exploitation via AF_ALG Socket

This rule detects potential exploitation of CVE-2026-31431, a Copy Fail vulnerability in the Linux kernel, via AF_ALG socket abuse, by correlating non-root AF_ALG-class socket or splice events with a subsequent process execution where the effective user is root but the login user remains non-root, indicating a privilege escalation attempt.

Auditbeat +1 privilege-escalation linux vulnerability cve-2026-31431
2r 2t 1c
critical threat

Local Privilege Escalation Vulnerability 'Copy Fail' in Linux Kernel

A local privilege escalation vulnerability, dubbed 'Copy Fail' (CVE-2026-31431), affects Linux kernels released since 2017, allowing an unprivileged local attacker to gain root permissions by exploiting a logic bug in the authencesn cryptographic template.

Linux kernel +4 Theori privilege-escalation linux vulnerability
2r 1t 1c
critical threat

Critical Authentication Bypass Vulnerability in cPanel & WHM (CVE-2026-41940)

CVE-2026-41940 is a critical authentication bypass vulnerability in cPanel & WHM, allowing unauthenticated remote attackers to gain administrative access by manipulating session data.

exploited cPanel & WHM authentication bypass cPanel web hosting vulnerability
2r 1t 1c
high advisory

ABB AWIN Gateway Vulnerabilities Allow Remote Reboot and Information Disclosure

Multiple vulnerabilities in ABB AWIN Gateways allow an unauthenticated attacker to remotely reboot the device (CVE-2025-13778) or disclose sensitive system configuration details (CVE-2025-13777, CVE-2025-13779).

ABB AWIN Firmware +3 ics vulnerability industrial_control_systems
3r 1t 3c
critical advisory

ABB Ability Symphony Plus Engineering Vulnerabilities Allow Remote Code Execution

Multiple vulnerabilities in ABB Ability Symphony Plus Engineering, stemming from underlying PostgreSQL flaws, could allow a remote attacker with network access to execute arbitrary code and compromise the system.

ABB Ability Symphony Plus S+ Engineering 2.2 +7 vulnerability ics postgresql
2r 3t 3c
high advisory

ABB Ability OPTIMAX Authentication Bypass Vulnerability

CVE-2025-14510 allows an attacker to bypass Azure Active Directory Single-Sign On authentication in vulnerable ABB Ability OPTIMAX versions, potentially granting unauthorized access to critical infrastructure systems.

OPTIMAX 6.1 +4 authentication bypass ics vulnerability
2r 1t 1c
critical advisory

Multiple Vulnerabilities in FreeBSD OS Allow Privilege Escalation and Arbitrary Code Execution

Multiple vulnerabilities in FreeBSD OS could allow an attacker to gain elevated privileges, execute arbitrary code, manipulate data, disclose sensitive information, or cause a denial of service.

FreeBSD OS vulnerability privilege-escalation code-execution
3r 3t
high advisory

Multiple Vulnerabilities in Absolute Secure Access

Multiple vulnerabilities in Absolute Secure Access could allow an attacker to escalate privileges, conduct a denial-of-service attack, and disclose sensitive information.

Secure Access vulnerability privilege-escalation denial-of-service information-disclosure
2r 3t 1c
high threat

Multiple Vulnerabilities in SonicWall SonicOS Allow Privilege Escalation and DoS

Multiple vulnerabilities in SonicWall SonicOS allow a remote attacker to escalate privileges, bypass security measures, or cause a denial-of-service condition.

exploited SonicOS sonicwall vulnerability privilege-escalation denial-of-service
2r 3t 3c
high advisory

Multiple Vulnerabilities in Red Hat Enterprise Linux Fast Datapath

A remote, anonymous attacker can exploit multiple vulnerabilities in Fast Datapath for Red Hat Enterprise Linux to perform a denial-of-service attack or disclose sensitive information.

Fast Datapath redhat vulnerability denial-of-service
2r 4t
medium advisory

libsndfile Vulnerability Allows Denial of Service

A remote, unauthenticated attacker can exploit an unpatched vulnerability in libsndfile to cause a denial of service.

libsndfile denial-of-service vulnerability
2r 1t
critical advisory

Multiple Vulnerabilities in CUPS

Multiple vulnerabilities in CUPS allow an attacker to bypass security measures, execute arbitrary code, escalate privileges, manipulate data, or cause a denial-of-service condition.

CUPS vulnerability privilege-escalation execution denial-of-service
2r 4t 1c
critical advisory

GIMP Multiple Vulnerabilities Allow Remote Code Execution

A remote, anonymous attacker can exploit multiple unspecified vulnerabilities in GIMP to achieve arbitrary code execution on a vulnerable system.

GIMP vulnerability rce
2r 1t 5c
high advisory

Multiple Vulnerabilities in Google Chrome

Multiple vulnerabilities in Google Chrome could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition.

Chrome vulnerability code-execution defense-evasion information-disclosure denial-of-service
2r 5t 5c
high advisory

Multiple Vulnerabilities in Xen and Citrix Systems XenServer

Multiple vulnerabilities exist in Xen and Citrix Systems XenServer that could allow an attacker to escalate privileges, bypass security measures, modify and disclose data, or cause a denial-of-service condition.

XenServer +1 vulnerability privilege-escalation denial-of-service information-disclosure
3r 7t
critical advisory

Multiple Vulnerabilities in Wazuh Allow for Code Execution and Data Manipulation

Multiple vulnerabilities in Wazuh allow an attacker to perform a denial of service attack, execute arbitrary code, manipulate data, disclose confidential information, or bypass security measures.

Wazuh vulnerability siem xdr
2r 6t 5c
medium advisory

DNSdist Multiple Vulnerabilities Leading to Denial of Service

Multiple vulnerabilities in DNSdist can be exploited by an attacker to perform a denial of service attack, impacting the availability of DNS services.

DNSdist denial-of-service vulnerability
2r 1t 1c
info advisory

Microsoft Published Information on CVE-2026-32777

Microsoft has published information regarding CVE-2026-32777, but no further details regarding the vulnerability or its exploitation are currently available.

cve-2026-32777 vulnerability
1c
medium advisory

Microsoft Published Information on CVE-2026-32776

Microsoft published information regarding CVE-2026-32776, however, further details require JavaScript to be enabled, limiting the actionable intelligence at this time.

cve vulnerability
1c
medium advisory

Microsoft CVE-2026-32778 Vulnerability Published

Microsoft published information regarding vulnerability CVE-2026-32778, but no details regarding the vulnerability are available at this time.

cve vulnerability
2r 1c
medium advisory

1024-lab smart-admin Improper Access Control Vulnerability (CVE-2026-7468)

CVE-2026-7468 is an improper access control vulnerability in 1024-lab smart-admin up to version 3.30.0, affecting the /smart-admin-api/druid/index.html file, which can be exploited remotely.

smart-admin access-control vulnerability web-application
2r 1t 1c
high advisory

VetCoders mcp-server-semgrep OS Command Injection Vulnerability

VetCoders mcp-server-semgrep version 1.0.0 is vulnerable to remote OS command injection due to manipulation of the ID argument in several functions of the MCP Interface component.

mcp-server-semgrep 1.0.0 command-injection vulnerability mcp-server-semgrep
2r 1t 1c
medium advisory

Netgate pfSense XSS Vulnerability

A cross-site scripting (XSS) vulnerability affects Netgate pfSense CE (<= 2.8.1) and pfSense Plus (<= 26.03), potentially allowing attackers to inject malicious code.

pfSense CE +1 xss vulnerability pfSense
2r
high advisory

Multiple Vulnerabilities in Wireshark Lead to Remote Code Execution and Denial of Service

Multiple vulnerabilities in Wireshark versions 4.4.x before 4.4.15 and 4.6.x before 4.6.5 could allow remote attackers to execute arbitrary code, cause a denial of service, or compromise data confidentiality.

Wireshark 4.4.x +1 wireshark vulnerability rce dos
2r
critical advisory

Multiple Vulnerabilities in Red Hat Linux Kernel

Multiple vulnerabilities in the Red Hat Linux kernel allow for arbitrary code execution, privilege escalation, and remote denial of service.

Red Hat CodeReady Linux Builder +1 vulnerability kernel redhat execution privilege-escalation denial-of-service
2r 3t 5c
high advisory

Multiple Vulnerabilities in MISP Threat Intelligence Platform

Multiple vulnerabilities in MISP versions prior to 2.5.37 allow attackers to perform privilege escalation, SQL injection (SQLi), and security policy bypass.

MISP < 2.5.37 misp vulnerability sqli privilege-escalation security-policy-bypass
2r 1t
high advisory

Multiple Vulnerabilities in Exim Mail Transfer Agent

Multiple vulnerabilities in Exim versions prior to 4.99.2 allow an attacker to cause a remote denial of service, a breach of data confidentiality, and an unspecified security problem.

Exim vulnerability denial-of-service information-disclosure
3r 3t
critical advisory

PolarVista xcode-mcp-server OS Command Injection Vulnerability

PolarVista xcode-mcp-server 1.0.0 is vulnerable to remote OS command injection via manipulation of the Request argument in the `build_project/run_tests` function, allowing attackers to execute arbitrary commands on the server.

xcode-mcp-server 1.0.0 command-injection vulnerability xcode-mcp-server
2r 1t 1c
high advisory

n8n Python Task Runner Sandbox Escape Vulnerability

A sandbox escape vulnerability exists in n8n's Python Task Runner that allows an authenticated user with workflow creation/modification permissions to achieve arbitrary code execution on the task runner container, impacting n8n instances with the Python Task Runner enabled; upgrade to versions 1.123.32, 2.17.4, 2.18.1 or later to remediate the vulnerability.

n8n sandbox-escape code-execution vulnerability
2r 2t
high advisory

SysGauge Pro 4.6.12 Local Buffer Overflow Vulnerability (CVE-2018-25307)

SysGauge Pro 4.6.12 is vulnerable to a local buffer overflow in the Register function, allowing local attackers to overwrite the structured exception handler and execute arbitrary code by supplying a crafted unlock key during registration.

SysGauge Pro 4.6.12 vulnerability buffer_overflow privilege_escalation
2r 2t 1c
high advisory

Path Traversal Vulnerability in mail-mcp-bridge

A path traversal vulnerability exists in fatbobman mail-mcp-bridge version 1.3.3 and earlier, allowing a remote attacker to read arbitrary files by manipulating the message_ids argument in the src/mail_mcp_server.py file.

mail-mcp-bridge path-traversal vulnerability web-application
2r 1t 1c
high advisory

OpenClaw StrictInlineEval Approval Bypass Vulnerability (CVE-2026-42423)

OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that allows attackers to bypass strictInlineEval explicit-approval requirements on gateway and node exec hosts, leading to arbitrary command execution.

OpenClaw vulnerability privilege-escalation execution
2r 1t 1c
high advisory

OpenClaw Plugin Archive Integrity Vulnerability (CVE-2026-42428)

OpenClaw versions before 2026.4.8 fail to enforce integrity verification on downloaded plugin archives, allowing attackers to install malicious plugins and compromise the local assistant environment.

OpenClaw vulnerability plugin integrity CVE-2026-42428
2r 1t 1c
high advisory

OpenClaw Incomplete Host Environment Variable Sanitization Vulnerability (CVE-2026-41387)

OpenClaw before 2026.3.22 is vulnerable to incomplete host environment variable sanitization, allowing attackers to redirect package resolution or runtime bootstrap to attacker-controlled infrastructure and execute trojanized content.

OpenClaw vulnerability supply-chain environment-variable
2r 1t 1c
critical advisory

Multiple Vulnerabilities in Spring Boot Allow Authorization Bypass and Potential RCE

Multiple vulnerabilities in Spring Boot, including CVE-2026-40976, CVE-2026-40973, and CVE-2026-40972, can allow attackers to bypass authorization, hijack sessions, or achieve remote code execution, potentially leading to data breaches and system compromise.

Spring Boot spring-boot vulnerability rce authentication-bypass session-hijacking
2r 3t 3c
high advisory

Multiple Vulnerabilities in cURL

Multiple vulnerabilities in cURL could allow an attacker to bypass security measures, disclose confidential information, or manipulate data.

cURL vulnerability
2r 3t 4c
medium advisory

Multiple Vulnerabilities in GNU libc

A remote, anonymous attacker can exploit multiple vulnerabilities in GNU libc to execute arbitrary program code, cause a denial-of-service condition, or disclose sensitive information.

libc vulnerability glibc denial-of-service code-execution
2r 3t 5c
high advisory

Red Hat Enterprise Linux LibRaw Multiple Vulnerabilities Allow Code Execution or DoS

Multiple vulnerabilities in Red Hat Enterprise Linux's LibRaw component allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.

Enterprise Linux vulnerability code-execution denial-of-service linux
2r 2t
medium advisory

CoreDNS DoQ Server Denial-of-Service Vulnerability

CoreDNS' DNS-over-QUIC (DoQ) server can be driven into large goroutine and memory growth by a remote client that opens many QUIC streams and stalls after sending only 1 byte, leading to denial of service in versions before 1.14.3.

coredns dos denial-of-service vulnerability
2r 3t 1c
high advisory

OpenClaw Improper Authorization Vulnerability (CVE-2026-42426)

OpenClaw before 2026.4.8 contains an improper authorization vulnerability (CVE-2026-42426) allowing attackers with `operator.write` permissions to bypass node pairing approval and gain unauthorized access to `exec`-capable nodes by exploiting the `node.pair.approve` method which incorrectly accepts the `operator.write` scope instead of the narrower `operator.pairing` scope.

OpenClaw privilege-escalation vulnerability
2r 1t 1c
critical advisory

VMware Tanzu Spring Boot Multiple Vulnerabilities

Multiple vulnerabilities in VMware Tanzu Spring Boot allow attackers to execute arbitrary code, bypass security measures, manipulate or disclose sensitive data, or hijack authenticated users.

Tanzu Spring Boot vmware spring-boot vulnerability
2r 4t
critical advisory

Multiple Vulnerabilities in Atlassian Products

Multiple vulnerabilities in Atlassian Bamboo, Bitbucket, Confluence, and Jira allow attackers to execute arbitrary code, bypass security measures, manipulate data, disclose information, or perform cross-site scripting attacks.

Bamboo +3 atlassian vulnerability code-execution xss
2r 4t 1c
high advisory

Path Traversal Vulnerability in engineer-your-data

A path traversal vulnerability (CVE-2026-7214) exists in eghuzefa's engineer-your-data up to version 0.1.3, allowing remote attackers to read or write arbitrary files by manipulating the WORKSPACE_PATH argument.

engineer-your-data path-traversal vulnerability
2r 1t 1c
high advisory

Duartium papers-mcp-server Path Traversal Vulnerability (CVE-2026-7205)

A path traversal vulnerability exists in the `search_papers` function of `src/main.py` in duartium papers-mcp-server version 9ceb3812a6458ba7922ca24a7406f8807bc55598, allowing remote attackers to read arbitrary files by manipulating the `topic` argument, with a public exploit available.

papers-mcp-server path-traversal vulnerability web-application
2r 1t 1c
high threat

dvladimirov MCP Git Search API Command Injection Vulnerability

A command injection vulnerability (CVE-2026-7211) exists in the GitSearchRequest function of dvladimirov MCP up to version 0.1.0, allowing a remote attacker to execute arbitrary commands by manipulating the repo_url or pattern argument.

exploited MCP command-injection vulnerability git-search-api
2r 1t 1c
high advisory

tufantunc ssh-mcp Command Injection Vulnerability (CVE-2026-7039)

A command injection vulnerability exists in tufantunc ssh-mcp up to version 1.5.0 via manipulation of the Description argument in the shell.write function.

ssh-mcp command-injection vulnerability
2r 1t 1c
high advisory

SQL Injection Vulnerability in code-projects Inventory Management System 1.0

A SQL injection vulnerability exists in code-projects Inventory Management System 1.0 within the Login component, specifically affecting the Username argument, where a remote attacker can manipulate the Username parameter, leading to unauthorized data access or modification.

Inventory Management System 1.0 sql-injection web-application vulnerability
2r 1t 1c
high advisory

KLiK SocialMediaWebsite SQL Injection Vulnerability (CVE-2026-7002)

KLiK SocialMediaWebsite up to version 1.0.1 is vulnerable to SQL injection via manipulation of the c_id argument in the /includes/get_message_ajax.php file, specifically affecting the Private Message Handler component, which can be exploited remotely.

SocialMediaWebsite sql-injection vulnerability web-application
2r 1t 1c
medium advisory

CVE-2026-23398 ICMP NULL Pointer Dereference

CVE-2026-23398 is a vulnerability related to a NULL pointer dereference in the ICMP protocol, potentially leading to a denial-of-service condition in affected Microsoft products.

icmp denial-of-service vulnerability cve
2r 1t 1c
high advisory

PicoClaw Web Launcher Management Plane Command Injection Vulnerability

PicoClaw version 0.2.4 is vulnerable to command injection via the /api/gateway/restart endpoint of the Web Launcher Management Plane, allowing a remote attacker to execute arbitrary commands by manipulating input.

PicoClaw command-injection vulnerability web-application
2r 1t 1c
critical threat

Rclone Unauthenticated Remote Code Execution Vulnerabilities

Rclone versions prior to 1.73.5 are vulnerable to two critical unauthenticated remote code execution vulnerabilities (CVE-2026-41176 and CVE-2026-41179) when the remote control API is enabled without authentication, potentially allowing attackers to execute arbitrary commands and compromise the system.

exploited Rclone vulnerability rce cloud
2r 2t 2c
medium advisory

vanna-ai vanna Improper Authorization Vulnerability (CVE-2026-6977)

An improper authorization vulnerability (CVE-2026-6977) exists in vanna-ai vanna up to version 2.0.2 due to manipulation of an unknown function within the Legacy Flask API, potentially allowing remote attackers to bypass intended access restrictions.

vanna vulnerability authorization web application
2r 1t 1c
medium advisory

Microsoft Product Vulnerability CVE-2026-41080

CVE-2026-41080 is a vulnerability affecting a Microsoft product; the specific product, impact, and exploitation details are currently undisclosed.

CVE-2026-41080 vulnerability microsoft
2r 1c
high advisory

k8sGPT Operator Vulnerable to Prompt Injection

k8sGPT versions before 0.4.32 are vulnerable to prompt injection due to deserialization of AI-generated YAML without proper validation in the auto-remediation pipeline, potentially leading to arbitrary code execution within the Kubernetes cluster.

k8sgpt prompt-injection kubernetes ai vulnerability
2r 2t
high advisory

OVN DHCPv6 Out-of-Bounds Read Vulnerability (CVE-2026-5367)

A remote attacker can exploit an out-of-bounds read vulnerability in Open Virtual Network (OVN) by sending crafted DHCPv6 SOLICIT packets, leading to sensitive information disclosure.

OVN cve vulnerability network
2r 1t 1c
critical advisory

OpenClaw Remote Code Execution via Node Scope Gate Bypass (CVE-2026-41352)

OpenClaw before 2026.3.31 is vulnerable to remote code execution (CVE-2026-41352) because a device-paired node can bypass the node scope gate authentication mechanism, allowing attackers with device pairing credentials to execute arbitrary node commands.

OpenClaw rce vulnerability cve-2026-41352
2r 1t 1c
medium advisory

OpenClaw Cross-Site Request Forgery Vulnerability

OpenClaw before 2026.3.31 is vulnerable to cross-site request forgery (CSRF) attacks due to missing browser-origin validation in HTTP operator endpoints when operating in trusted-proxy mode, allowing attackers to perform unauthorized actions.

OpenClaw csrf web-application vulnerability
2r 1t 1c
critical advisory

Marimo Pre-Authentication Remote Code Execution Vulnerability (CVE-2026-39987)

CVE-2026-39987 is a pre-authentication remote code execution vulnerability in Marimo, enabling unauthenticated attackers to execute arbitrary system commands.

Marimo CVE-2026-39987 rce vulnerability
2r 1t 1c
critical advisory

Flowise Multiple Vulnerabilities

Multiple vulnerabilities in Flowise allow an attacker to execute arbitrary code, bypass security measures, disclose information, and manipulate files.

Flowise vulnerability code-execution information-disclosure file-manipulation
2r 3t 5c
critical advisory

Multiple Vulnerabilities in Cisco Products Allow for Remote Code Execution

Multiple vulnerabilities in Cisco ASA, Secure Firewall Threat Defense, IOS, IOS XE, and IOS XR allow a remote attacker to bypass authentication and execute arbitrary code with administrator privileges.

ASA +4 cisco vulnerability rce authentication-bypass
2r 4t 3c
medium advisory

Cisco Integrated Management Controller (IMC) Multiple XSS Vulnerabilities

Multiple cross-site scripting (XSS) vulnerabilities in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow a remote attacker to conduct an XSS attack against a user of the interface.

Integrated Management Controller xss cisco cimc vulnerability
2r 1t 5c
critical advisory

Multiple Vulnerabilities in n8n Workflow Automation Tool

Multiple vulnerabilities in n8n can be exploited by an attacker to execute arbitrary code, bypass security measures, disclose sensitive information, conduct SQL injection attacks, cause denial-of-service, perform cross-site scripting, redirect users, or hijack sessions.

n8n vulnerability sqli xss rce session-hijacking
3r 5t 1c
medium advisory

Microsoft Product Vulnerability CVE-2026-22005

CVE-2026-22005 is a newly published vulnerability affecting a Microsoft product, requiring further investigation to determine the specific product, attack vector, and potential impact.

CVE-2026-22005 vulnerability microsoft
3r 1c
medium advisory

Microsoft Discloses Information Regarding CVE-2026-22004

Microsoft has released information regarding the vulnerability CVE-2026-22004, but details about the vulnerability and its exploitation are currently unavailable.

cve-2026-22004 vulnerability microsoft
1r 1t 1c
low advisory

Microsoft CVE-2026-35236 Information Published

Microsoft has published information regarding CVE-2026-35236, but no details about the vulnerability or its exploitation are currently available.

cve vulnerability microsoft
2r
medium advisory

CVE-2026-34303 Affecting Microsoft Products

CVE-2026-34303 is a vulnerability affecting an unspecified Microsoft product, requiring further investigation upon disclosure of details.

vulnerability cve microsoft
2r 1c
critical advisory

CI4MS Backup Restore Zip Slip Vulnerability Leads to RCE

The CI4MS Backup restore function is vulnerable to Zip Slip, allowing remote code execution by uploading a malicious ZIP archive that writes PHP files to the public web root due to missing validation of entry names during extraction, affecting versions prior to 0.31.5.0.

ci4-cms-erp/ci4ms zip-slip rce code-injection vulnerability
2r 2t
critical advisory

Critical RCE Vulnerabilities in Spinnaker

Critical vulnerabilities CVE-2026-32613 and CVE-2026-32604 in Spinnaker allow authenticated attackers to execute arbitrary code due to insufficient input validation in expression parsing and gitrepo artifact handling, potentially leading to complete system compromise.

Spinnaker rce vulnerability
2r 1t 2c
medium threat

NVIDIA KAI Scheduler Authentication Bypass Vulnerability

CVE-2026-24177 describes an authentication bypass vulnerability in NVIDIA KAI Scheduler that could allow unauthorized access to API endpoints, leading to information disclosure.

exploited vulnerability authentication-bypass nvidia
2r 2t 1c
high advisory

HKUDS OpenHarness Insecure Default Configuration Vulnerability

HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit permissive access, potentially leading to unauthorized file disclosure and read access.

vulnerability insecure-configuration access-control
2r 1t 1c
high advisory

FreeScout Mass Assignment Vulnerability (CVE-2026-40569)

FreeScout versions prior to 1.8.213 contain a mass assignment vulnerability allowing authenticated admins to modify sensitive mailbox settings by injecting parameters into connection settings requests, leading to email exfiltration and account compromise.

freescout mass-assignment vulnerability email-exfiltration
2r 2t 1c
medium advisory

FreeScout Incorrect Authorization Vulnerability (CVE-2026-41189)

FreeScout versions before 1.8.215 are vulnerable to an incorrect authorization issue where users without conversation access can edit customer threads due to a flaw in the `ThreadPolicy::edit()` function.

freescout authorization vulnerability
2r 1t 1c 4i
critical advisory

CrowdStrike LogScale Unauthenticated Path Traversal Vulnerability (CVE-2026-40050)

A critical unauthenticated path traversal vulnerability (CVE-2026-40050) in CrowdStrike LogScale allows remote attackers to read arbitrary files from the server filesystem if a specific cluster API endpoint is exposed, necessitating immediate patching for self-hosted customers.

path-traversal vulnerability logscale crowdstrike
2r 1t 1c
critical threat

JetBrains TeamCity Authentication Bypass and Path Traversal Vulnerabilities

Unpatched JetBrains TeamCity servers are being actively exploited via an authentication bypass (CVE-2024-27198) and path traversal vulnerability (CVE-2024-27199), allowing attackers to perform administrative actions and potentially conduct supply-chain attacks.

exploited teamcity vulnerability authentication bypass path traversal supply-chain
2r 1t 2c
medium advisory

BigBlueButton Vulnerabilities Allow Data Manipulation and Redirects

Multiple vulnerabilities in BigBlueButton can be exploited by an attacker to manipulate data and redirect users to attacker-controlled domains.

bigbluebutton vulnerability datamanipulation redirect
2r 1t
high advisory

Multiple Vulnerabilities in OpenBao Allow for Security Bypass, DoS, and SQL Injection

Multiple vulnerabilities in OpenBao can be exploited by an attacker to bypass security measures, conduct a denial of service attack, and conduct a SQL injection attack.

openbao vulnerability sql-injection dos
3r 3t
high advisory

Oracle VM VirtualBox CVE-2026-35246 Vulnerability

CVE-2026-35246 is a vulnerability in Oracle VM VirtualBox version 7.2.6, where a high-privileged attacker with local access can exploit it to compromise the application potentially leading to a complete takeover.

cve-2026-35246 virtualbox vulnerability
2r 1c
high advisory

Multiple Vulnerabilities in Fortinet FortiSandbox

Multiple vulnerabilities in Fortinet FortiSandbox allow attackers to perform cross-site scripting attacks, disclose information, bypass security measures, and execute arbitrary code, potentially leading to system compromise.

fortinet fortisandbox vulnerability xss code-execution
3r 3t
critical advisory

Multiple Vulnerabilities in Red Hat Hardened Images RPMs

Remote, anonymous attackers can exploit vulnerabilities in Red Hat Hardened Images RPMs to bypass security measures, cause denial of service, disclose sensitive information, or potentially execute code.

redhat vulnerability denial-of-service information-disclosure code-execution linux
2r 7t
critical advisory

GIMP Multiple Vulnerabilities Allow Code Execution

A remote, anonymous attacker can exploit multiple vulnerabilities in GIMP to execute arbitrary program code, potentially leading to system compromise.

gimp code-execution vulnerability
2r 1t
critical advisory

Cisco Catalyst SD-WAN Manager Multiple Vulnerabilities

Multiple vulnerabilities in Cisco Catalyst SD-WAN Manager allow a remote, anonymous, or local attacker to gain administrator privileges, bypass authentication, execute commands with Netadmin rights, read sensitive system information, and overwrite arbitrary files.

cisco sdwan vulnerability privilege-escalation
2r 4t
critical advisory

Libarchive Code Execution Vulnerability

A remote attacker can exploit a vulnerability in libarchive to achieve arbitrary code execution on a vulnerable system.

libarchive code-execution vulnerability
2r 1t
high advisory

Multiple Vulnerabilities in Roundcube

Multiple vulnerabilities in Roundcube allow an attacker to manipulate files, bypass security measures, perform cross-site scripting attacks, and disclose information.

roundcube vulnerability xss file-manipulation
2r 3t
high advisory

Multiple Vulnerabilities in Microsoft Developer Tools

Multiple vulnerabilities in Microsoft Visual Studio, .NET Framework, .NET, PowerShell, and Visual Studio Code can be exploited by an attacker to disclose sensitive information, conduct spoofing attacks, cause a denial of service, or bypass security measures, potentially leading to arbitrary code execution.

vulnerability code-execution spoofing denial-of-service information-disclosure windows
2r 4t
critical advisory

Multiple Vulnerabilities in Dell PowerProtect Data Domain OS

Multiple vulnerabilities in Dell PowerProtect Data Domain OS allow an attacker to execute arbitrary code with root privileges, escalate privileges to administrator, bypass security measures, manipulate data, disclose sensitive information, or conduct unspecified attacks.

dell powerprotect datadomain vulnerability privilege-escalation defense-evasion credential-access impact
2r 4t
high advisory

Multiple Vulnerabilities in FreeRDP Allow Remote Code Execution and DoS

An anonymous remote attacker can exploit multiple vulnerabilities in FreeRDP to potentially execute arbitrary code, cause a denial-of-service condition, manipulate data, disclose confidential information, or perform other unspecified attacks.

freerdp vulnerability rdp
2r 5t
medium advisory

libarchive Multiple Vulnerabilities Allow Information Disclosure and DoS

Multiple vulnerabilities in libarchive can be exploited by a remote attacker to disclose information or cause a denial-of-service condition.

vulnerability denial-of-service information-disclosure
2r 2t
high advisory

Intel IPU, UEFI Reference Firmware: Multiple Vulnerabilities

A local attacker can exploit multiple vulnerabilities in Intel Firmware to disclose confidential information or gain elevated privileges.

intel firmware vulnerability privilege-escalation credential-access
2r 2t
medium advisory

Microsoft CVE-2026-41254 Security Update

Microsoft released a security update for CVE-2026-41254, a vulnerability with unspecified details.

cve vulnerability microsoft
2r 1c
high advisory

AiAssistant Type Privilege Bypass Vulnerability (CVE-2026-31368)

CVE-2026-31368 is a type privilege bypass vulnerability in AiAssistant, potentially leading to service availability issues and complete compromise of the system.

privilege-escalation vulnerability AiAssistant
2r 2t 1c
medium advisory

Langflow Multiple Vulnerabilities

Multiple vulnerabilities in Langflow allow an attacker to manipulate files, disclose sensitive information, or conduct cross-site scripting attacks.

langflow vulnerability xss file-manipulation information-disclosure
2r 2t
medium advisory

Multiple Vulnerabilities in Gitea

Multiple vulnerabilities in Gitea could allow an attacker to disclose information, bypass security measures, and perform cross-site scripting attacks.

gitea vulnerability xss
1r 1t
critical advisory

Multiple Vulnerabilities in Firebird Database Server

Multiple vulnerabilities in Firebird allow an attacker to execute arbitrary code with administrator privileges, disclose sensitive information, or cause a denial-of-service condition.

firebird vulnerability sqldatabase
2r 3t
high advisory

ThreatSonar Anti-Ransomware Arbitrary File Deletion Vulnerability

TeamT5's ThreatSonar Anti-Ransomware is vulnerable to arbitrary file deletion via path traversal, allowing authenticated remote attackers with web access to delete arbitrary files on the system.

vulnerability file-deletion path-traversal
2r 2t 1c
critical advisory

Digiwin EasyFlow .NET SQL Injection Vulnerability (CVE-2026-5964)

Digiwin's EasyFlow .NET is susceptible to a SQL Injection vulnerability, enabling unauthenticated remote attackers to inject arbitrary SQL commands for unauthorized database access, modification, and deletion.

sql-injection vulnerability web-application
2r 1t 1c
high advisory

SecureDrop Client Code Execution via Gzip Extraction Vulnerability

A compromised SecureDrop server can achieve code execution on the SecureDrop client's virtual machine by exploiting improper filename validation during gzip archive extraction, allowing for the overwriting of critical files.

securedrop gzip code execution vulnerability linux
2r 1t 2c
high advisory

OpenClaw Environment Variable Injection Vulnerability

The openclaw package versions prior to 2026.4.10 are vulnerable to environment variable injection, where the exec environment policy missed interpreter startup variables allowing operator-supplied environment overrides to influence downstream execution or network behavior, addressed in versions 2026.4.10 and later.

npm openclaw environment-variable-injection vulnerability
2r 1t
high advisory

zrok Unauthenticated Denial-of-Service Vulnerability

An unauthenticated attacker can cause a denial-of-service (DoS) in zrok by sending a crafted HTTP request with a large cookie chunk count to an OAuth-protected proxy share, triggering unbounded memory allocation and leading to process termination.

dos vulnerability zrok CVE-2026-40303
2r 1t
high advisory

Dell PowerProtect Data Domain Improper Certificate Validation Vulnerability

Dell PowerProtect Data Domain versions 7.7.1.0 through 8.5, 8.3.1.0 through 8.3.1.20, and 7.13.1.0 through 7.13.1.60, contain an improper certificate validation vulnerability in certificate-based login, potentially leading to privilege escalation.

privilege-escalation vulnerability dell
2r 1t 1c
medium advisory

Mobatek MobaXterm Home Edition Uncontrolled Search Path Vulnerability (CVE-2026-6421)

CVE-2026-6421 is an uncontrolled search path vulnerability in Mobatek MobaXterm Home Edition up to version 26.1, affecting msimg32.dll, that can be exploited locally with high complexity.

cve vulnerability mobaxterm dll hijacking
2r 1t 1c
high advisory

Multiple Vulnerabilities in Cisco Unity Connection

Multiple vulnerabilities in Cisco Unity Connection can be exploited by an attacker to conduct cross-site scripting attacks, redirect users to malicious websites, manipulate data, and disclose confidential information.

cisco unity-connection vulnerability xss data-manipulation
2r 1t
high advisory

Multiple Vulnerabilities in libssh Allow File Manipulation and DoS

Multiple vulnerabilities in libssh allow an attacker to manipulate files or cause a denial-of-service condition, potentially leading to data corruption or service disruption.

libssh vulnerability dos file_manipulation
2r 1t
high advisory

Grafana Vulnerability Allows File Manipulation and Information Disclosure

A remote, authenticated attacker can exploit a vulnerability in Grafana to manipulate files and disclose sensitive information, potentially leading to persistence, unauthorized access, and significant impact.

grafana vulnerability file-manipulation information-disclosure
2r 4t
critical threat

Microsoft April 2026 Patch Tuesday Addresses 163 Vulnerabilities

Microsoft's April 2026 Patch Tuesday addresses 163 vulnerabilities, including 8 critical ones, ranging from Tampering to Remote Code Execution and Privilege Escalation, affecting various Microsoft products; it is recommended to apply patches immediately.

exploited patch-tuesday vulnerability remote-code-execution privilege-escalation windows
2r 4t 6c
critical advisory

Apache ActiveMQ Multiple Vulnerabilities Allow Remote Code Execution

An authenticated remote attacker can exploit multiple vulnerabilities in Apache ActiveMQ to manipulate files or execute arbitrary code.

apache-activemq vulnerability rce
2r 1t
high advisory

Openfind MailGates/MailAudit CRLF Injection Vulnerability

Openfind MailGates/MailAudit is vulnerable to CRLF injection (CVE-2026-6351), enabling unauthenticated remote attackers to read system files by injecting malicious CRLF sequences.

crlf-injection vulnerability mailgates mailaudit
2r 1t 1c
high advisory

Splunk MCP Server App Cleartext Credential Exposure (CVE-2026-20205)

A user with access to the `_internal` index or the `mcp_tool_admin` capability in Splunk MCP Server app versions below 1.0.3 can view user session and authorization tokens in clear text, leading to potential credential compromise.

splunk credential-access vulnerability
2r 1t 1c
high advisory

Windows Hyper-V Improper Input Validation Vulnerability (CVE-2026-32149)

CVE-2026-32149 is a vulnerability in Windows Hyper-V due to improper input validation, which allows an authorized, local attacker to execute arbitrary code.

hyper-v code-execution vulnerability windows
2r 2t 1c 1i
critical advisory

SQL Server Untrusted Pointer Dereference Vulnerability (CVE-2026-33120)

CVE-2026-33120 is an untrusted pointer dereference vulnerability in Microsoft SQL Server that allows an authenticated attacker to achieve remote code execution over a network.

sql-server rce vulnerability
2r 1t 1c 2i
medium advisory

Microsoft Excel Out-of-Bounds Read Vulnerability (CVE-2026-32188)

An out-of-bounds read vulnerability in Microsoft Office Excel (CVE-2026-32188) allows a local attacker to potentially disclose sensitive information through a maliciously crafted Excel file.

excel out-of-bounds read cve-2026-32188 information disclosure vulnerability
2r 1t 1c
high advisory

CVE-2026-33826: Windows Active Directory Improper Input Validation Vulnerability

An improper input validation vulnerability (CVE-2026-33826) in Windows Active Directory could allow an authenticated attacker on an adjacent network to execute code.

cve-2026-33826 active-directory code-execution vulnerability
2r 1t 1c 1i
high advisory

Azure Monitor Agent Improper Input Validation Vulnerability (CVE-2026-32168)

CVE-2026-32168 is an improper input validation vulnerability in Azure Monitor Agent that allows a locally authorized attacker to elevate privileges.

azure privilege escalation vulnerability cve-2026-32168
2r 1t 1c 1i
critical advisory

Multiple Vulnerabilities in Red Hat Ansible Automation Platform

A remote, anonymous attacker can exploit multiple vulnerabilities in Red Hat Ansible Automation Platform to perform denial of service, execute arbitrary code, bypass security measures, manipulate data, disclose information, or conduct XSS attacks.

ansible redhat vulnerability dos xss code-execution
2r 6t
high advisory

CVE-2026-32183: Windows Snipping Tool Command Injection Vulnerability

CVE-2026-32183 is a command injection vulnerability in the Windows Snipping Tool that allows a local attacker to execute arbitrary code.

command-injection windows vulnerability
2r 2t 1c
critical advisory

Fortinet FortiSandbox Path Traversal Vulnerability (CVE-2026-39813)

A path traversal vulnerability (CVE-2026-39813) in Fortinet FortiSandbox versions 5.0.0 through 5.0.5 and 4.4.0 through 4.4.8 may allow an unauthenticated attacker to escalate privileges via '../filedir'.

path-traversal vulnerability privilege-escalation fortinet
2r 1t 1c 2i
medium advisory

UniFi Play Improper Access Control Vulnerability (CVE-2026-22566)

An improper access control vulnerability in UniFi Play PowerAmp and Audio Port allows a malicious actor with access to the UniFi Play network to obtain WiFi credentials.

vulnerability access-control unifi
2r 1t 1c
critical threat

Adobe Acrobat and Reader CVE-2026-34621 Zero-Day Exploitation

Adobe patched CVE-2026-34621, a zero-day vulnerability in Acrobat and Reader exploited since December, allowing malicious PDFs to bypass sandboxes and execute arbitrary code, potentially leading to local file theft.

exploited adobe acrobat reader rce vulnerability
2r 2t 1c 1i
high advisory

SQL Injection Vulnerability in Faculty Management System

A remote attacker can exploit an SQL injection vulnerability (CVE-2026-6167) in the code-projects Faculty Management System 1.0 by manipulating the ID argument in the /subject-print.php file, potentially leading to data exfiltration or modification.

sql-injection web-application vulnerability
2r 1t 1c
high advisory

SQL Injection Vulnerability in Lost and Found Thing Management 1.0

A remote SQL injection vulnerability (CVE-2026-6163) exists in code-projects Lost and Found Thing Management 1.0 via manipulation of the 'cat' parameter in /catageory.php, potentially allowing attackers to read, modify, or delete database information.

sql-injection web-application vulnerability
2r 1t 1c
medium advisory

Huawei Communication Module Use-After-Free Vulnerability (CVE-2026-34856)

A use-after-free vulnerability, tracked as CVE-2026-34856, exists in Huawei's communication module due to improper synchronization in concurrent execution, potentially leading to a denial-of-service condition.

vulnerability uaf dos
2r 1t 1c
high advisory

Mesa WebGPU Out-of-Bounds Write Vulnerability (CVE-2026-40393)

An out-of-bounds write vulnerability exists in Mesa versions before 25.3.6 and 26 before 26.0.1 due to an untrusted allocation size in WebGPU, potentially leading to code execution.

cve vulnerability webgpu
2r 1c
critical advisory

Unauthenticated Arbitrary File Write in Saltcorn

Unauthenticated attackers can exploit a vulnerability in Saltcorn versions prior to 1.4.5, 1.5.5, and 1.6.0-beta.4 to write arbitrary files and list directory contents on the server.

saltcorn file-write vulnerability
2r 1t 1c
high advisory

Helm Plugin Path Traversal Vulnerability

A path traversal vulnerability in Helm versions 4.0.0 to 4.1.3 allows a malicious plugin to write files to arbitrary locations on the filesystem, leading to potential system compromise.

helm path-traversal vulnerability plugin kubernetes
2r 1t 1c
high advisory

@sveltejs/adapter-node BODY_SIZE_LIMIT Bypass Vulnerability

A vulnerability exists in @sveltejs/adapter-node where requests could bypass the `BODY_SIZE_LIMIT` on SvelteKit applications, potentially leading to denial of service.

sveltekit denial-of-service vulnerability
2r 1t 1c
high advisory

OpenClaw Path Traversal Vulnerability (CVE-2026-35668)

OpenClaw before 2026.3.24 is vulnerable to path traversal, allowing sandboxed agents to read arbitrary files from other agents' workspaces via manipulated URL parameters.

path-traversal vulnerability openclaw
2r 1t 1c
critical advisory

Juju CloudSpec API Authorization Bypass (CVE-2026-5412)

CVE-2026-5412 describes an authorization issue in Juju versions prior to 2.9.57 and 3.6.21, where a low-privileged authenticated user can call the CloudSpec API method to extract cloud credentials used to bootstrap the controller, leading to sensitive credential exposure.

vulnerability authorization cloud
2r 1t 1c 1i
critical advisory

IBM Semeru Runtime Code Execution Vulnerability

A remote, anonymous attacker can exploit a vulnerability in IBM Semeru Runtime and IBM DB2 to execute arbitrary program code.

code-execution vulnerability ibm
2r 1t
high advisory

OpenClaw Improper Access Control Vulnerability (CVE-2026-34512)

OpenClaw before 2026.3.25 contains an improper access control vulnerability (CVE-2026-34512) in the HTTP /sessions/:sessionKey/kill route, allowing any authenticated user to terminate arbitrary subagent sessions.

access-control vulnerability webserver
2r 1t 1c
high advisory

FoundationAgents MetaGPT Code Injection Vulnerability (CVE-2026-5971)

A code injection vulnerability exists in FoundationAgents MetaGPT <= 0.8.1 within the ActionNode.xml_fill function, allowing remote attackers to inject code due to improper neutralization of directives in dynamically evaluated code.

code-injection vulnerability metagpt CVE-2026-5971
2r 1t 1c
high advisory

BSV Ruby SDK Improper ARC Response Handling

BSV Ruby SDK versions before 0.8.2 improperly handle ARC responses, treating certain failure statuses as successful broadcasts, potentially tricking applications into trusting unaccepted transactions; version 0.8.2 resolves this vulnerability.

bsv ruby blockchain vulnerability
2r 1t 1c
high advisory

Tmds.DBus Vulnerability Allows Signal Spoofing and Resource Exhaustion

Tmds.DBus and Tmds.DBus.Protocol are vulnerable to signal spoofing, resource exhaustion, and application crashes due to malformed messages from malicious D-Bus peers on the same bus.

dbus vulnerability dotnet
2r 1t 1c
high advisory

OPNsense LDAP Injection Vulnerability (CVE-2026-34578)

OPNsense versions prior to 26.1.6 are vulnerable to LDAP injection, allowing unauthenticated attackers to enumerate valid LDAP usernames and bypass group membership restrictions via the WebGUI login page.

ldap-injection vulnerability opnsense
2r 1t 1c
critical advisory

Nix Package Manager Arbitrary File Overwrite Vulnerability

A flaw in Nix package manager allows arbitrary file overwrites via symlink following during fixed-output derivation registration, potentially leading to root privilege escalation on multi-user Linux systems.

nix privilege-escalation linux vulnerability
2r 1t 2c
critical advisory

Multiple Vulnerabilities in Zammad

Multiple vulnerabilities in Zammad allow a remote attacker to execute arbitrary code, bypass security measures, disclose sensitive information, and perform cross-site scripting attacks.

zammad vulnerability code execution xss
2r 3t
high advisory

UAC (Unix-like Artifacts Collector) Command Injection Vulnerability

UAC before 3.3.0-rc1 is vulnerable to command injection in the _run_command() function, allowing attackers to execute arbitrary commands with the privileges of the UAC process through manipulated input values.

command-injection vulnerability uac
2r 1t 1c
high advisory

parseusbs OS Command Injection Vulnerability (CVE-2026-40030)

parseusbs before 1.9 is vulnerable to OS command injection (CVE-2026-40030) due to improper sanitization of the volume listing path argument, potentially allowing arbitrary command execution via crafted volume paths.

command-injection vulnerability linux
2r 1t 1c 1i
medium advisory

Red Hat Quay Image Upload Interference Vulnerability (CVE-2026-32589)

CVE-2026-32589 describes a vulnerability in Red Hat Quay's container image upload process where an authenticated user can interfere with other users' uploads, potentially leading to unauthorized access and modification.

quay image upload vulnerability
2r 2t 1c
high advisory

D-LINK Router M60 and DIR-3040 'Airsnitch' Vulnerability

The 'Airsnitch' vulnerability in D-LINK Router M60 and DIR-3040 allows an attacker from an adjacent network to bypass security measures, disclose confidential information, and manipulate network traffic.

d-link router airsnitch vulnerability network-traffic-manipulation
2r 5t
high advisory

OpenObserve SSRF via Improper IPv6 Validation

OpenObserve versions 0.70.3 and earlier are vulnerable to a server-side request forgery (SSRF) attack due to improper validation of IPv6 addresses in the validate_enrichment_url function, potentially allowing authenticated attackers to access internal services and retrieve sensitive cloud metadata.

ssrf openobserve cloud vulnerability
2r 1t 1c 1i
high advisory

Mise Trust Bypass Vulnerability via Malicious .mise.toml

A vulnerability in mise allows an attacker who can place a malicious .mise.toml file in a repository to bypass trust checks and execute arbitrary code via `[env] _.source` due to improper loading of trust settings.

mise trust-bypass code-execution vulnerability
2r 2t
high advisory

PowerJob SQL Injection Vulnerability (CVE-2026-5736)

A remote SQL injection vulnerability, CVE-2026-5736, exists in PowerJob versions 5.1.0 through 5.1.2 within the detailPlus Endpoint, potentially allowing unauthenticated attackers to execute arbitrary SQL queries.

sql-injection vulnerability powerjob
2r 1t 1c
medium advisory

CSRF Vulnerability in WordPress Under Construction Plugin (CVE-2026-34896)

A cross-site request forgery (CSRF) vulnerability exists in the Analytify Under Construction, Coming Soon & Maintenance Mode WordPress plugin (versions n/a through 2.1.1), potentially allowing attackers to execute unauthorized actions on behalf of legitimate users.

wordpress csrf vulnerability
2r 2t 1c
critical threat

Critical Vulnerability CVE-2026-35616 Exploited in FortiClient EMS

CVE-2026-35616, a critical vulnerability in FortiClient EMS, allows unauthenticated remote attackers to execute arbitrary code or commands via crafted API requests due to improper access control, with Fortinet confirming active exploitation.

exploited fortinet forticlient ems cve-2026-35616 vulnerability
2r 1t 1c
medium advisory

Brave CMS Insecure Direct Object Reference Vulnerability (CVE-2026-35183)

Brave CMS versions prior to 2.0.6 are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability allowing authenticated users with edit permissions to delete images attached to articles owned by other users due to missing ownership verification in the deleteImage method.

idor brave-cms vulnerability
1r 1t 1c
high advisory

GPT Researcher Code Injection Vulnerability (CVE-2026-5631)

A remote code injection vulnerability exists in assafelovic gpt-researcher versions up to 3.4.3 due to improper handling of the 'args' argument in the extract_command_data function, potentially allowing attackers to execute arbitrary code.

code-injection vulnerability gpt-researcher
2r 1t 1c
high advisory

OpenDocMan 1.3.4 SQL Injection Vulnerability

OpenDocMan version 1.3.4 is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries via the 'where' parameter in search.php to extract sensitive information.

sqli vulnerability opendocman
2r 1t 1c
critical advisory

Advance Gift Shop Pro Script 2.0.3 SQL Injection Vulnerability

Advance Gift Shop Pro Script 2.0.3 is vulnerable to SQL injection via the 's' search parameter, allowing unauthenticated attackers to execute arbitrary SQL queries and extract sensitive database information.

sqli vulnerability webapp
2r 1t 1c
high advisory

PilusCart 1.4.1 SQL Injection Vulnerability

PilusCart 1.4.1 is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the 'send' parameter to extract sensitive database information.

sqli vulnerability web-application
2r 1t 1c
critical threat

Fosowl agenticSeek 0.1.0 Code Injection Vulnerability (CVE-2026-5584)

A code injection vulnerability (CVE-2026-5584) exists in Fosowl agenticSeek 0.1.0, allowing remote attackers to execute arbitrary code by manipulating the query endpoint through the PyInterpreter.execute function.

exploited code-injection vulnerability fosowl cve-2026-5584
2r 1t 1c
high advisory

code-projects Simple Laundry System 1.0 SQL Injection Vulnerability

A remote SQL Injection vulnerability exists in code-projects Simple Laundry System 1.0 within the /delmemberinfo.php file's userid parameter, potentially allowing attackers to execute arbitrary SQL commands.

sql-injection web-application vulnerability
2r 1t 1c
high advisory

Provectus Kafka UI Code Injection Vulnerability (CVE-2026-5562)

A code injection vulnerability exists in provectus kafka-ui up to version 0.7.2, specifically affecting the validateAccess function within the /api/smartfilters/testexecutions endpoint, allowing remote attackers to inject code.

code-injection kafka-ui vulnerability
2r 2t 1c
high threat

SQL Injection Vulnerability in Concert Ticket Reservation System

A remote attacker can exploit CVE-2026-5554 in code-projects Concert Ticket Reservation System 1.0 to perform SQL injection by manipulating the searching argument in the process_search.php file.

exploited sql-injection web-application vulnerability
2r 1t 1c
high advisory

SQL Injection Vulnerability in Free Hotel Reservation System 1.0 (CVE-2026-5551)

A SQL injection vulnerability (CVE-2026-5551) exists in itsourcecode Free Hotel Reservation System 1.0, specifically affecting the `email` parameter within the `/hotel/admin/login.php` file, allowing remote attackers to execute arbitrary SQL queries.

sql-injection web-application vulnerability
2r 1t 1c 1i
critical advisory

Signal K Server Privilege Escalation via Unprotected /enableSecurity Endpoint

The Signal K server is vulnerable to privilege escalation due to the /skServer/enableSecurity endpoint remaining active after initial setup, allowing unauthenticated users to inject a new admin account and gain full server control; this affects versions prior to 2.24.0-beta.4.

privilege-escalation web-application vulnerability
2r 1t 1c
critical advisory

Budibase REST Connector SSRF via Empty Blacklist

A critical Server-Side Request Forgery (SSRF) vulnerability in Budibase's REST datasource connector allows attackers with Builder privileges to exfiltrate sensitive data from internal network services due to a missing default IP blacklist.

ssrf budibase vulnerability
2r 7t
high advisory

ProfilePress WordPress Plugin Membership Payment Bypass Vulnerability

The ProfilePress WordPress plugin before 4.16.12 is vulnerable to an unauthorized membership payment bypass, allowing authenticated attackers to obtain paid memberships without payment by manipulating subscription IDs during checkout.

wordpress plugin vulnerability membership
2r 1t 1c
critical advisory

Directus Aggregate Query Vulnerability Allows Disclosure of Concealed Data

A vulnerability in Directus versions prior to 11.17.0 allows authenticated users to extract concealed field values, including static API tokens and two-factor authentication secrets from directus_users, via aggregate queries.

directus vulnerability credential-access api-token 2fa-bypass
2r 1t
critical advisory

PraisonAI Gateway Unauthenticated Access Vulnerability

PraisonAI Gateway server versions prior to 4.5.97 allow unauthenticated access to WebSocket connections and agent topology, enabling unauthorized message sending and agent enumeration.

vulnerability authentication bypass websocket
2r 1t 1c
medium advisory

Piwigo Unauthenticated History Search Access

Piwigo versions prior to 16.3.0 expose the full browsing history of gallery visitors to unauthenticated users via the pwg.history.search API method due to a missing authorization check.

piwigo vulnerability information-disclosure
2r 1t 1c 1i
high advisory

fast-jwt Library Vulnerability Allows crit Header Validation Bypass

The fast-jwt library fails to validate the 'crit' header, allowing attackers to bypass security policies and potentially achieve split-brain verification in mixed-library environments.

jwt vulnerability authentication authorization
2r 1t 1c
critical advisory

SandboxJS Integrity Escape Vulnerability

A sandbox integrity escape vulnerability exists in SandboxJS versions prior to 0.8.36, allowing untrusted code to bypass global write protections and mutate host shared global objects, potentially leading to cross-context persistence and broader compromise.

sandbox-escape javascript vulnerability
2r 2t
critical advisory

Budibase Path Traversal Vulnerability in Plugin Upload

A path traversal vulnerability exists in Budibase versions prior to 3.33.4, allowing attackers with Global Builder privileges to delete arbitrary directories and write arbitrary files via crafted plugin uploads.

path-traversal vulnerability budibase
2r 1t 1c
critical advisory

fast-jwt Library JWT Algorithm Confusion Vulnerability

The fast-jwt library is vulnerable to JWT Algorithm Confusion via Whitespace-Prefixed RSA Public Key due to an incomplete fix for CVE-2023-48223, allowing attackers to bypass intended security measures by exploiting leading whitespace in the RSA public key, enabling attackers to sign arbitrary payloads that will be accepted by the verifier, potentially leading to privilege escalation.

jwt algorithm-confusion vulnerability fast-jwt nodejs
2r 1t 1c
medium advisory

ManageEngine Exchange Reporter Plus Stored XSS Vulnerability

Zohocorp ManageEngine Exchange Reporter Plus versions before 5802 are vulnerable to Stored XSS in the Distribution Lists report, allowing attackers to inject malicious scripts.

xss vulnerability manageengine
2r 2t 1c
high advisory

Swift Crypto X-Wing HPKE Decapsulation Vulnerability

The X-Wing decapsulation path in swift-crypto accepts attacker-controlled encapsulated ciphertext bytes without enforcing the required fixed ciphertext length of 1120 bytes, leading to a potential out-of-bounds read.

vulnerability memory-safety swift-crypto
2r 1t
high advisory

Electron Use-After-Free Vulnerability in Offscreen Rendering with Child Windows

A use-after-free vulnerability (CVE-2026-34774) exists in Electron applications using offscreen rendering and allowing child windows, potentially leading to crashes or memory corruption if the parent WebContents is destroyed before the child window.

electron use-after-free vulnerability cve-2026-34774
2r 1i
high advisory

Electron Use-After-Free Vulnerability in PowerMonitor Module

A use-after-free vulnerability exists in the `powerMonitor` module of Electron applications on Windows and macOS. When the native `PowerMonitor` object is garbage-collected, dangling references are retained by OS-level resources. Subsequent session-change events on Windows or system shutdowns on macOS may dereference freed memory, potentially leading to a crash or memory corruption.

electron use-after-free vulnerability powermonitor windows macos
2r 1t 1i
critical advisory

Azure MCP Server Missing Authentication Vulnerability (CVE-2026-32211)

CVE-2026-32211 is a critical vulnerability in Azure MCP Server due to missing authentication for a critical function, allowing an unauthorized attacker to disclose information over the network.

azure information-disclosure vulnerability
2r 1t 1c 1i
critical advisory

OneUptime Unauthenticated Endpoint Access Vulnerability (CVE-2026-34758)

OneUptime versions prior to 10.0.42 are vulnerable to unauthenticated access to Notification test and Phone Number management endpoints, leading to potential abuse of SMS, Call, Email, and WhatsApp functionalities, and unauthorized phone number purchases, fixed in version 10.0.42.

cve vulnerability oneuptime unauthenticated-access
2r 1t 1c 1i
critical advisory

Endian Firewall Command Injection Vulnerability (CVE-2026-34791)

Endian Firewall version 3.3.25 and prior allows authenticated users to execute arbitrary OS commands due to an OS command injection vulnerability in the DATE parameter of the /cgi-bin/logs_proxy.cgi endpoint.

command-injection rce vulnerability
2r 1t 1c
medium advisory

Suricata DCERPC Buffering Inefficiency Vulnerability (CVE-2026-31937)

Suricata versions prior to 7.0.15 are vulnerable to CVE-2026-31937, where inefficient DCERPC buffering can lead to a denial-of-service condition through performance degradation.

vulnerability dos suricata
2r 1t 1c 1i
critical advisory

Unauthenticated SQL Injection Vulnerability in setinfo Endpoint

An unauthenticated remote attacker can exploit a SQL Injection vulnerability (CVE-2026-33615) in the setinfo endpoint by injecting malicious code into a SQL UPDATE command, leading to a total loss of integrity and availability.

sql-injection vulnerability web-application
2r 1t 1c 3i
critical advisory

Unauthenticated SQL Injection Vulnerability in getinfo Endpoint (CVE-2026-33614)

An unauthenticated SQL Injection vulnerability (CVE-2026-33614) in the getinfo endpoint allows a remote attacker to execute arbitrary SQL commands due to improper neutralization of special elements, potentially leading to a total loss of confidentiality.

sql-injection vulnerability web-application
2r 1t 1c
critical advisory

Juju Controller Vulnerable to Unauthorized Database Access Due to Improper TLS Configuration

Juju controller versions 3.2.0 up to 3.6.20 and 4.0.5 are vulnerable to unauthorized database access due to improper TLS client/server authentication and certificate verification, allowing an attacker with network access to modify all information, escalate privileges, and open firewall ports.

juju dqlite tls vulnerability
2r 3t
critical advisory

Payload CMS Password Reset Vulnerability (CVE-2026-34751)

An unauthenticated attacker can perform actions on behalf of a user initiating a password reset in Payload CMS versions prior to 3.79.1 due to a flaw in the password recovery flow, potentially leading to account takeover or privilege escalation.

cve-2026-34751 payload-cms password-reset vulnerability
2r 1t 1c 1i
high advisory

pandas-ai SQL Injection Vulnerability (CVE-2026-30273)

pandas-ai v3.0.0 is vulnerable to SQL injection via the pandasai.agent.base._execute_sql_query component, potentially allowing unauthorized database access and modification.

sql-injection vulnerability pandas-ai
2r 1t 1c
critical advisory

Critical Vulnerability in FastGPT Allows API Key Exfiltration and Internal Network Access

CVE-2026-34162 in FastGPT allows unauthenticated attackers to exfiltrate API keys and gain complete access to internal services managed by Docker Compose by sending arbitrary HTTP requests, leading to potential compromise of the internal network.

fastgpt vulnerability information-disclosure
2r 3t 1c 1i
critical threat

F5 BIG-IP APM CVE-2025-53521 Reclassified as Actively Exploited Unauthenticated RCE

F5 has reclassified CVE-2025-53521, a vulnerability in BIG-IP APM, as a critical unauthenticated remote code execution vulnerability and reports it is being actively exploited in the wild.

exploited f5 big-ip apm cve-2025-53521 rce vulnerability
2r 1t 1c
high advisory

7-Zip Multiple Vulnerabilities Allow Remote Code Execution

Multiple vulnerabilities in 7-Zip allow an attacker to execute arbitrary program code with the privileges of the service, potentially leading to system compromise.

7-zip code-execution vulnerability windows
2r 1t
high advisory

Multiple Vulnerabilities in PowerDNS

Multiple vulnerabilities in PowerDNS could be exploited by an attacker to disclose information, bypass security measures, cause a denial of service, and potentially execute code.

powerdns vulnerability dos information-disclosure code-execution
1r
critical advisory

Multiple Vulnerabilities in libpng Allow Remote Code Execution and Denial of Service

A remote, anonymous attacker can exploit multiple vulnerabilities in libpng to execute arbitrary program code or cause a denial of service.

libpng vulnerability remote-code-execution denial-of-service
2r 2t
medium advisory

7-Zip Vulnerability Allows File Manipulation

A remote, anonymous attacker can exploit a vulnerability in 7-Zip to manipulate files, leading to potential data integrity issues.

7-zip file-manipulation vulnerability
2r 2t
high advisory

IBM App Connect Enterprise Multiple Vulnerabilities

A remote, anonymous attacker can exploit multiple vulnerabilities in IBM App Connect Enterprise to cause a denial-of-service condition or bypass security measures, enabling cross-site scripting attacks.

vulnerability dos xss ibm
2r 2t
critical advisory

Red Hat Enterprise Linux libxslt Vulnerability Allows DoS and Code Execution

A local attacker can exploit a vulnerability in libxslt on Red Hat Enterprise Linux to cause a denial of service or execute arbitrary program code.

libxslt rhel vulnerability code-execution denial-of-service linux
2r 2t
medium advisory

MPPX TypeScript Interface Vulnerability (CVE-2026-34209)

A vulnerability exists in mppx TypeScript interface before version 0.4.11, allowing attackers to close or grief channels for free by submitting close vouchers equal to the settled amount due to incorrect validation.

vulnerability payment-channel typescript
1r 1t 1c 2i
high advisory

SQL Injection Vulnerability in Student Membership System 1.0

CVE-2026-5198 is a SQL injection vulnerability in the Admin Login component of code-projects Student Membership System 1.0, affecting the /admin/index.php file, enabling remote exploitation through manipulation of username/password parameters.

sql-injection vulnerability web-application
2r 1t 1c
medium advisory

OpenClaw Information Disclosure via Telegram Bot Token Exposure

OpenClaw before version 2026.3.13 exposes Telegram bot tokens in error messages due to the fetchRemoteMedia function embedding these tokens in MediaFetchError strings when media downloads fail.

information-disclosure vulnerability telegram
2r 1c
high advisory

DELMIA Factory Resource Manager Stored XSS Vulnerability (CVE-2025-10553)

A stored cross-site scripting (XSS) vulnerability in DELMIA Factory Resource Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x (CVE-2025-10553) allows attackers to execute arbitrary script code within a user's browser session.

xss vulnerability web-application
2r 1t 1c
high advisory

DELMIA Factory Resource Manager Path Traversal Vulnerability (CVE-2025-10559)

CVE-2025-10559 is a path traversal vulnerability in DELMIA Factory Resource Manager, affecting versions 3DEXPERIENCE R2023x through R2025x, which allows an attacker with low privileges to read or write files in specific directories on the server, potentially leading to information disclosure or code execution.

path-traversal vulnerability delmia cve-2025-10559
2r 1t 1c 1i
critical advisory

ImageMagick Multiple Vulnerabilities Leading to DoS, Code Execution, or Data Manipulation

Multiple vulnerabilities in ImageMagick could allow an attacker to perform a denial of service attack, execute arbitrary code, or manipulate data.

imagemagick vulnerability dos code_execution data_manipulation
2r 1t
high advisory

SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5180)

A SQL Injection vulnerability (CVE-2026-5180) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'email' parameter in the /admin/ajax.php?action=login2 endpoint.

sql-injection vulnerability web-application
2r 1t 1c 5i
high advisory

SQL Injection Vulnerability in SourceCodester Simple Doctors Appointment System 1.0 (CVE-2026-5179)

A SQL injection vulnerability (CVE-2026-5179) exists in SourceCodester Simple Doctors Appointment System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the Username argument in the /admin/login.php file, with a public exploit available.

sql-injection web-application vulnerability
2r 1t 1c
high advisory

vcpkg OpenSSL Windows Build Path Vulnerability (CVE-2026-34054)

A vulnerability exists in vcpkg versions prior to 3.6.1#3, where Windows builds of OpenSSL set openssldir to a path on the build machine, making that path vulnerable to attack on customer machines.

vulnerability openssl vcpkg cwe-427 windows
2r 2t 1c
high advisory

SciTokens Library Path Traversal Vulnerability (CVE-2026-32727)

A path traversal vulnerability (CVE-2026-32727) in SciTokens library versions prior to 1.9.7 allows attackers to bypass intended directory restrictions using dot-dot sequences in the scope claim of a token due to improper path normalization.

scitokens path-traversal cve-2026-32727 vulnerability
2r 1t 1c
medium advisory

baserCMS DOM-Based Cross-Site Scripting Vulnerability (CVE-2026-32734)

baserCMS versions prior to 5.2.3 are vulnerable to DOM-based Cross-Site Scripting (XSS) due to improper neutralization of input during web page generation, potentially allowing a remote attacker to execute arbitrary JavaScript in a user's browser.

xss vulnerability basercms
2r 1t 1c
high advisory

Botan SM2 Decryption Heap Over-read Vulnerability (CVE-2026-32877)

Botan C++ cryptography library versions 2.3.0 before 3.11.0 are vulnerable to a heap over-read during SM2 decryption due to insufficient validation of the authentication code length, potentially leading to crashes or undefined behavior.

cve vulnerability heap-overread botan
2r 1t 1c 2i
medium advisory

Symantec DLP Windows Endpoint Elevation of Privilege Vulnerability (CVE-2026-3991)

CVE-2026-3991 is an elevation of privilege vulnerability in Symantec Data Loss Prevention (DLP) Windows Endpoint that could allow a local attacker to gain elevated access to resources.

vulnerability privilege-escalation symantec dlp windows
2r 1t
high advisory

Glances XML-RPC Server Cross-Origin Information Disclosure

The Glances XML-RPC server exposes sensitive system information due to a permissive CORS policy and missing Content-Type validation, enabling attackers to bypass CORS restrictions and steal data like hostnames, OS details, IP addresses, and process lists.

glances cors information-disclosure vulnerability
2r 3t 2i
high advisory

Gotenberg Chromium Deny-List Bypass via Case-Insensitive URL Scheme

Gotenberg versions before 8.29.0 are vulnerable to unauthenticated arbitrary file read, where a case-insensitive URL scheme bypasses the Chromium deny-list, allowing attackers to read sensitive files such as /etc/passwd by using mixed-case or uppercase URL schemes like FILE:///etc/passwd, leading to the leakage of sensitive data from the Gotenberg container and bypassing the fix for CVE-2024-21527.

gotenberg file-read vulnerability chromium
2r 1t
critical advisory

Multiple Vulnerabilities in Wazuh Leading to Code Execution and Data Manipulation

Multiple vulnerabilities in Wazuh allow an attacker to perform denial-of-service attacks, execute arbitrary code, manipulate data, and disclose sensitive information, potentially leading to significant data breaches and system compromise.

wazuh vulnerability code-execution data-manipulation
2r 6t
critical advisory

Multiple Vulnerabilities in Fleet

Multiple vulnerabilities in Fleet allow an attacker to perform SQL injection, denial of service, bypass security measures, disclose information, and execute arbitrary program code with administrator privileges.

fleet vulnerability sql-injection denial-of-service
2r 8t
critical advisory

Multiple Vulnerabilities in Grafana

Multiple vulnerabilities in Grafana allow a remote attacker to conduct a denial-of-service attack, execute code, or disclose information.

grafana vulnerability dos code-execution information-disclosure
2r 4t
high advisory

Langflow Vulnerability Allows File Manipulation

An authenticated, remote attacker can exploit a vulnerability in Langflow to manipulate files, potentially leading to unauthorized data modification or application compromise.

langflow file-manipulation vulnerability
2r 1t
high advisory

OpenBao Multiple Vulnerabilities Allow Security Bypass and XSS

An anonymous, remote attacker can exploit multiple vulnerabilities in OpenBao to bypass security measures or conduct cross-site scripting attacks.

openbao vulnerability security-bypass xss
2r 4t
high advisory

Multiple Vulnerabilities in Dovecot Mail Server

Multiple vulnerabilities in Dovecot can be exploited by an attacker to perform SQL injection attacks, bypass authentication, disclose sensitive information, or cause a denial-of-service condition.

dovecot vulnerability sql-injection authentication-bypass dos
2r 2t
critical advisory

Multiple Vulnerabilities in NGINX and NGINX Plus

Multiple vulnerabilities in NGINX Plus and NGINX can be exploited by an attacker to perform a denial of service attack, manipulate data, bypass security measures, and potentially execute arbitrary program code, leading to significant impact.

nginx vulnerability denial-of-service code-execution webserver linux
2r 1t
critical advisory

Multiple Vulnerabilities in F5 BIG-IP and F5OS

Multiple vulnerabilities in F5 BIG-IP and F5OS allow an attacker to bypass security mechanisms, escalate privileges, cause a denial-of-service condition, perform a cross-site scripting attack, and disclose or manipulate information.

f5 big-ip f5os vulnerability
2r 5t
high advisory

CVE-2026-2328 Unauthenticated Path Traversal Vulnerability

CVE-2026-2328 describes a vulnerability where an unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, leading to the exposure of sensitive information.

path-traversal vulnerability webserver
2r 1t 2i
high advisory

OpenClaw Gateway Plugin Subagent Admin Scope Vulnerability

The openclaw package versions 2026.3.24 and earlier are vulnerable due to the gateway plugin subagent fallback `deleteSession` function dispatching `sessions.delete` with a synthetic `operator.admin` runtime scope, potentially leading to unauthorized session deletion.

openclaw vulnerability authorization
2r 1t
high advisory

OpenClaw Credential Exposure via Leaked Pairing Codes

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials in pairing setup codes, allowing attackers with access to leaked codes to reuse credentials and gain unauthorized access.

credential-access vulnerability openclaw
2r 1t
high advisory

SQL Injection Vulnerability in Simple Food Order System 1.0

A SQL injection vulnerability exists in code-projects Simple Food Order System 1.0 within the register-router.php file, where manipulation of the Name argument can lead to remote code execution.

sql-injection web-application vulnerability
2r 1t
high advisory

code-projects Simple Food Order System SQL Injection Vulnerability (CVE-2026-5017)

CVE-2026-5017 is a SQL injection vulnerability in code-projects Simple Food Order System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'Status' parameter in the `/all-tickets.php` file.

sql-injection web-application vulnerability
2r 1t
high advisory

SQL Injection Vulnerability in Sinaptik AI PandasAI lancedb Extension

A SQL injection vulnerability exists in Sinaptik AI PandasAI up to version 0.1.4 within the pandasai-lancedb Extension, allowing remote exploitation through manipulation of multiple functions in the lancedb.py file.

sql-injection vulnerability pandasai
2r 1t
high advisory

Clerk SSRF Vulnerability in frontendApiProxy Allows Secret Key Leakage

A server-side request forgery (SSRF) vulnerability exists in the `clerkFrontendApiProxy` function of the `@clerk/backend` package, allowing an unauthenticated attacker to send the application's `Clerk-Secret-Key` to an attacker-controlled server.

ssrf vulnerability clerk cloud
2r 1t
high advisory

LangChain Core Path Traversal Vulnerability in Legacy APIs

A path traversal vulnerability in LangChain Core's legacy `load_prompt` functions allows attackers to read arbitrary files by injecting malicious paths into prompt configurations.

langchain path-traversal vulnerability
1r 1t
high advisory

OpenClaw Gateway Plugin Grants Unrestricted operator.admin Runtime Scope

The openclaw gateway plugin versions 2026.3.24 and earlier incorrectly grants operator.admin runtime scope to all callers, regardless of their granted scopes, potentially allowing unauthorized actions.

openclaw privilege-escalation vulnerability
2r 1t
critical advisory

Giskard-agents ChatWorkflow.chat() Server-Side Template Injection

Giskard-agents versions 0.3.3 and earlier, and versions 1.0.1a1 through 1.0.2a1 are vulnerable to remote code execution via server-side template injection where the ChatWorkflow.chat() method passes user-supplied strings directly to a non-sandboxed Jinja2 Environment, allowing attackers to execute arbitrary code on the server.

ssti jinja2 rce giskard-agents vulnerability
2r 1t
high advisory

LinkAce Server-Side Request Forgery Vulnerability (CVE-2026-33953)

LinkAce versions prior to 2.5.3 are vulnerable to server-side request forgery (SSRF), allowing an authenticated user to trigger server-side requests to internal services by referencing internal hostnames.

ssrf linkace vulnerability
2r 1t
high advisory

Langflow IDOR Vulnerability Allows Cross-User Flow Manipulation

Langflow versions 1.5.0 and earlier contain an IDOR vulnerability (CVE-2026-34046) that allows authenticated users to read, modify, and delete flows belonging to other users due to a missing ownership check, potentially exposing sensitive information and enabling unauthorized control over AI agent logic.

idor langflow vulnerability
2r 3t
high advisory

Postiz App SSRF Vulnerability via Next.js

A high-severity SSRF vulnerability exists in the Postiz application via Next.js, allowing attackers to bypass firewalls, scan internal networks, access sensitive cloud metadata (AWS IMDS), potentially leak instance credentials, and pivot within the internal network.

ssrf vulnerability cloud
2r 1t 1i
critical advisory

Multiple Vulnerabilities in Canva Affinity, TP-Link, and HikVision Devices

Cisco Talos disclosed multiple vulnerabilities in Canva Affinity, TP-Link Archer AX53, and HikVision Ultra Face Recognition Terminal products which could lead to sensitive information disclosure, arbitrary code execution, or credentials leak if exploited.

vulnerability code-execution information-disclosure
3r 6t
high advisory

OpenClaw Symlink Traversal via IDENTITY.md appendFile in agents.create/update

OpenClaw is vulnerable to symlink traversal via IDENTITY.md appendFile in agents.create/update. An attacker who can place a symlink in the agent workspace can hijack the IDENTITY.md path to append attacker-controlled content to arbitrary files on the system leading to remote code execution, persistent code execution, unauthorized SSH access, or service disruption.

openclaw symlink-traversal vulnerability npm rce persistence
2r 2t
high advisory

LIBPNG Out-of-Bounds Read/Write Vulnerability in Neon Optimization (CVE-2026-33636)

An out-of-bounds read and write vulnerability in LIBPNG's ARM/AArch64 Neon-optimized palette expansion path (CVE-2026-33636) allows attackers to potentially achieve denial-of-service or arbitrary code execution by crafting malicious PNG images.

libpng png oob CVE-2026-33636 vulnerability defense-evasion privilege-escalation
2r 2t
critical advisory

Critical Vulnerabilities in n8n Workflow Automation Tool

Multiple critical vulnerabilities in n8n, including prototype pollution, code injection, and SQL injection, allow authenticated users to achieve remote code execution, read sensitive files, and perform unauthorized database operations.

n8n vulnerability rce sqli code-injection
3r 2t
high advisory

Doveadm Credentials Vulnerable to Timing Oracle Attack (CVE-2026-27856)

Doveadm credentials are verified using direct comparison, making it susceptible to timing oracle attacks, allowing attackers to determine credentials and gain full access.

vulnerability timing oracle credential access doveadm
2r 1t
high advisory

OpenClaw ACP Chat Command Injection Vulnerability

A vulnerability in the openclaw npm package before version 2026.3.22 allowed mutating internal ACP chat commands without requiring operator.admin scope enforcement, potentially allowing unauthorized control-plane actions.

openclaw acp chat-command-injection vulnerability
2r
high advisory

OpenClaw Nostr DM Unauthorized Crypto Computation Vulnerability

The openclaw npm package before version 2026.3.22 allows unauthorized pre-authentication computation due to improper handling of inbound Nostr DMs, where crypto and dispatch work are performed before enforcing sender and pairing policies.

supply-chain vulnerability npm
2r
high advisory

KomSeo Cart 1.3 SQL Injection Vulnerability

KomSeo Cart 1.3 is vulnerable to SQL injection via the 'my_item_search' parameter in edit.php, allowing attackers to inject SQL commands and extract sensitive database information.

sqli vulnerability web-application
2r 1t
high advisory

ASP.NET jVideo Kit 1.0 SQL Injection Vulnerability

ASP.NET jVideo Kit 1.0 is vulnerable to SQL injection via the 'query' parameter in the search functionality, allowing unauthenticated attackers to inject malicious SQL payloads to extract sensitive database information.

sql-injection vulnerability asp.net
2r 1t
critical advisory

School Management System CMS 1.0 SQL Injection Vulnerability

School Management System CMS 1.0 is vulnerable to SQL injection in the admin login functionality, allowing attackers to bypass authentication by injecting SQL code through the username parameter.

sql-injection web-application vulnerability
2r 1t
high advisory

SQL Injection Vulnerability in Simple Laundry System 1.0

A remote SQL Injection vulnerability exists in code-projects Simple Laundry System 1.0 within the Parameter Handler component's /checkregisitem.php file, where manipulating the Long-arm-shirtVol argument can trigger the injection, with a publicly available exploit.

sqli web-application vulnerability
2r 1t 6i
high advisory

SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0

A remote SQL injection vulnerability exists in itsourcecode Online Enrollment System 1.0 within the Parameter Handler component affecting the `/sms/grades/index.php` file, allowing unauthorized database access and has been publicly disclosed.

sqli vulnerability web-application
2r 1t
critical advisory

Netcore Power 15AX Remote Command Execution Vulnerability

CVE-2026-4840 is a critical command injection vulnerability in the Netcore Power 15AX router that allows remote attackers to execute arbitrary OS commands by manipulating the IpAddr argument in the setTools function of the /bin/netis.cgi file.

command-injection rce vulnerability netcore router
2r 1t
high advisory

OpenEMR Blind SQL Injection Vulnerability in Patient Search (CVE-2026-29187)

OpenEMR versions prior to 8.0.0.3 are susceptible to a blind SQL injection vulnerability in the Patient Search functionality, allowing authenticated attackers to execute arbitrary SQL commands by manipulating HTTP parameter keys.

sqli openemr vulnerability
2r 1t
critical advisory

SiYuan Arbitrary Document Reading Vulnerability in Publishing Service

SiYuan is vulnerable to arbitrary document reading via the publishing service, allowing attackers to retrieve document IDs and view the content of all documents, including encrypted or prohibited ones, by exploiting the `/api/file/readDir` and `/api/block/getChildBlocks` interfaces.

siyuan arbitrary-document-access vulnerability webserver
2r 1t
high advisory

Kiteworks Core Access Control Vulnerability (CVE-2026-23514)

Kiteworks Core versions 9.2.0 and 9.2.1 contain an access control vulnerability (CVE-2026-23514) due to improper ownership management, allowing authenticated users to access unauthorized content, which can be mitigated by upgrading to version 9.2.2 or later.

access-control vulnerability kiteworks
2r 1t 1i
critical advisory

Multiple Vulnerabilities in GnuPG and Gpg4win Allow for Arbitrary Code Execution and Denial of Service

Multiple vulnerabilities exist in GnuPG and Gpg4win that could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.

gnupg gpg4win vulnerability code-execution denial-of-service
2r 2t
high advisory

Langflow Path Traversal Vulnerability (CVE-2026-33497)

A path traversal vulnerability in Langflow versions before 1.7.1 allows unauthenticated attackers to read sensitive files via the download_profile_picture endpoint due to insufficient filtering of the folder_name and file_name parameters.

path-traversal vulnerability web-application
2r 1t
critical advisory

GoHarbor Harbor v2.15.0 and Below Vulnerable to Hardcoded Credentials

GoHarbor Harbor version 2.15.0 and below is vulnerable to the use of hard-coded credentials, allowing an attacker to use the default password and gain unauthorized access to the web UI.

vulnerability hardcoded-credentials goharbor
2r 1t
medium advisory

CPython Zipfile Module Vulnerability Allows File Manipulation

A remote, anonymous attacker can exploit a vulnerability in the zipfile module of CPython to manipulate files on affected systems.

cpython zipfile file-manipulation vulnerability
2r 1t
high advisory

IBM WebSphere Application Server Liberty Multiple Vulnerabilities

A remote, authenticated attacker can exploit multiple vulnerabilities in IBM WebSphere Application Server Liberty to escalate privileges, bypass security measures, and disclose information.

websphere vulnerability privilege-escalation defense-evasion information-disclosure
2r 3t
high advisory

TIBCO ActiveMatrix Vulnerability Allows Information Disclosure and Data Manipulation

A remote, authenticated attacker can exploit a vulnerability in TIBCO ActiveMatrix and TIBCO Administrator to disclose information and manipulate data, potentially leading to unauthorized access and control.

tibco vulnerability information-disclosure data-manipulation
2r 2t
critical advisory

Langflow Vulnerability Allows Arbitrary Code Execution

A vulnerability in Langflow allows an attacker to execute arbitrary code, potentially leading to system compromise.

langflow code-execution vulnerability
2r 1t
critical advisory

Multiple Vulnerabilities in Redis

Multiple vulnerabilities in Redis allow an attacker to execute arbitrary program code and perform a denial-of-service attack.

redis vulnerability code execution denial of service
2r 2t
critical advisory

Multiple Vulnerabilities in Red Hat Developer Hub

Multiple vulnerabilities in Red Hat Developer Hub allow a remote attacker to perform denial of service, execute arbitrary code, bypass security measures, and manipulate data.

redhat developer hub vulnerability denial of service code execution
2r 8t
high advisory

Multiple Vulnerabilities in Grub Bootloader

Multiple vulnerabilities in the Grub bootloader allow attackers to execute arbitrary code and cause denial-of-service conditions.

bootloader grub2 vulnerability denial-of-service arbitrary-code-execution
2r 2t
critical advisory

Multiple Vulnerabilities in Apache Tomcat Allow for Remote Code Execution and Data Manipulation

Multiple vulnerabilities in Apache Tomcat can be exploited by a remote, authenticated or anonymous attacker to execute arbitrary code, bypass security measures, manipulate data, and cause a denial of service.

apache-tomcat vulnerability remote-code-execution data-manipulation denial-of-service
2r 3t
medium advisory

Red Hat OpenShift GitOps Multiple Vulnerabilities

An anonymous remote attacker can exploit multiple vulnerabilities in Red Hat OpenShift GitOps to manipulate data, misrepresent information, or cause a denial of service.

openshift gitops vulnerability cloud
2r 1t
critical advisory

IBM Tivoli Netcool/OMNIbus Multiple Vulnerabilities

An anonymous remote attacker can exploit multiple vulnerabilities in IBM Tivoli Netcool/OMNIbus to achieve arbitrary code execution, information disclosure, file manipulation, or denial of service.

ibm tivoli netcool omnibus vulnerability code-execution dos
2r 3t
high advisory

Checkmk Vulnerability Allows Session Hijacking

An authenticated remote attacker can exploit a vulnerability in Checkmk to bypass security measures, leading to session hijacking.

checkmk session-hijacking vulnerability
2r 1t
high advisory

Multiple Vulnerabilities in Vim Allow Local Code Execution and DoS

Multiple vulnerabilities in vim allow a local attacker to execute arbitrary code, cause a denial-of-service condition, or manipulate data.

vim vulnerability code execution denial of service
2r 2t
critical advisory

Multiple Vulnerabilities in Langflow Allow for Arbitrary Code Execution and Information Disclosure

Multiple vulnerabilities in Langflow could be exploited by an attacker to execute arbitrary program code, disclose information, and potentially manipulate data, leading to potential system compromise.

langflow vulnerability code-execution information-disclosure
2r 4t
high advisory

Froxlor Vulnerability Allows File Manipulation and Information Disclosure

A vulnerability in Froxlor allows an attacker to manipulate files and disclose sensitive information, potentially leading to data breaches or system compromise.

froxlor vulnerability file-manipulation information-disclosure
2r 1t
critical advisory

CODESYS Multiple Vulnerabilities Allow Arbitrary Code Execution and DoS

Multiple vulnerabilities in CODESYS allow a remote attacker to execute arbitrary program code and conduct a denial-of-service attack.

codesys vulnerability arbitrary-code-execution denial-of-service ics
2r 2t
critical advisory

Multiple Vulnerabilities in GStreamer

Multiple vulnerabilities in GStreamer allow a remote, anonymous attacker to cause a denial-of-service condition, memory corruption, and potentially execute arbitrary code.

gstreamer vulnerability denial-of-service memory-corruption code-execution
3r 2t
critical advisory

Critical Unauthenticated RCE Vulnerability Exploited in Microsoft SharePoint

A remote code execution vulnerability in Microsoft SharePoint (CVE not specified) is being actively exploited by unauthenticated attackers, prompting urgent patching recommendations for internet-facing servers.

sharepoint rce vulnerability
2r 2t
high advisory

Out-of-Cancel Vulnerability Class in Linux Workqueue Cancellation APIs

The 'Out-of-Cancel' vulnerability class stems from flaws in Linux workqueue cancellation APIs, potentially leading to exploitable conditions within the kernel.

linux kernel vulnerability workqueue
2r 1t
high advisory

Craft CMS Authenticated Remote Code Execution via Malicious Attached Behavior

A remote code execution vulnerability exists in Craft CMS versions 5.6.0 through 5.9.12, where any authenticated user with control panel access can exploit the vulnerability by injecting malicious behavior via the `fieldLayouts` parameter in `ElementIndexesController::actionFilterHud()` due to the unsanitized parameter being passed to `FieldLayout::createFromConfig()`.

craftcms rce vulnerability webserver
2r 1t
critical advisory

Vikunja Account Reactivation Vulnerability (CVE-2026-33316)

A critical vulnerability in Vikunja versions prior to 2.2.0 allows disabled users to bypass administrator controls and reactivate their accounts by exploiting a flaw in the password reset logic.

vikunja account-reactivation vulnerability
3r 1t
critical advisory

Uninitialized Memory Vulnerability in Firefox Canvas2D (CVE-2026-4715)

CVE-2026-4715 is a critical vulnerability involving uninitialized memory in the Graphics: Canvas2D component of Firefox, Firefox ESR, and Thunderbird, potentially leading to information disclosure or arbitrary code execution.

cve-2026-4715 firefox thunderbird uninitialized-memory vulnerability
2r
medium advisory

Mozilla Firefox and Thunderbird Graphics Text Component Vulnerability (CVE-2026-4719)

CVE-2026-4719 describes an incorrect boundary condition in the Graphics: Text component of Mozilla Firefox and Thunderbird, potentially leading to a denial-of-service condition in vulnerable versions.

cve vulnerability firefox thunderbird
2r 2t
critical advisory

Multiple Vulnerabilities in Cpython Allow Remote Code Execution

A remote, authenticated attacker can exploit multiple vulnerabilities in Cpython to manipulate files or execute arbitrary code.

cpython vulnerability code execution
2r 1t
critical advisory

Oracle MySQL Multiple Vulnerabilities

A remote attacker, either anonymous or authenticated, can exploit multiple vulnerabilities in Oracle MySQL to compromise confidentiality, integrity, and availability.

mysql vulnerability database
2r 1t
high advisory

libpng Vulnerability Allows Code Execution

A vulnerability in libpng allows a remote, anonymous attacker to potentially execute arbitrary code, disclose sensitive information, or cause a denial-of-service condition.

libpng code-execution vulnerability
2r 4t
critical advisory

Citrix Systems NetScaler Vulnerabilities Allow Information Disclosure and Session Hijacking

An anonymous or authenticated remote attacker can exploit multiple vulnerabilities in Citrix Systems NetScaler to disclose information and take over a user session.

citrix netscaler vulnerability session-hijacking information-disclosure
2r 2t
critical advisory

PhreeBooks ERP 5.2.3 Remote Code Execution Vulnerability

PhreeBooks ERP 5.2.3 is vulnerable to remote code execution, allowing authenticated attackers to upload and execute arbitrary PHP files via the image manager, leading to reverse shell connections and system command execution.

rce vulnerability php
2r 3t
critical advisory

Netartmedia Vlog System SQL Injection Vulnerability

Netartmedia Vlog System is vulnerable to SQL injection, allowing unauthenticated attackers to manipulate database queries by injecting SQL code through the email parameter in the forgotten_password module.

sqli vulnerability web-application
2r 1t 3i
critical advisory

Bootstrapy CMS Unauthenticated SQL Injection Vulnerabilities

Bootstrapy CMS contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through POST parameters to extract sensitive database information or cause denial of service.

sql-injection bootstrapy-cms vulnerability
3r 1t 3i
high advisory

AIDA64 Extreme 5.99.4900 Structured Exception Handler Buffer Overflow

AIDA64 Extreme 5.99.4900 is vulnerable to a structured exception handler buffer overflow, allowing local attackers to execute arbitrary code by supplying a malicious CSV log file path through the Hardware Monitoring logging preferences.

aida64 buffer-overflow vulnerability
2r 1t 4i
high advisory

Multiple Vulnerabilities in cPanel/WHM

An anonymous remote attacker can exploit multiple vulnerabilities in cPanel/WHM to bypass security measures, perform XSS and SSRF attacks, disclose information, and potentially execute code.

cPanel WHM XSS SSRF vulnerability
2r 2t
critical advisory

ReviewX WordPress Plugin Arbitrary Method Call Vulnerability

The ReviewX WordPress plugin is vulnerable to arbitrary method calls, allowing unauthenticated attackers to potentially achieve remote code execution.

wordpress woocommerce reviewx rce vulnerability
2r 1t
critical advisory

Oracle Fusion Middleware RCE Vulnerability (CVE-2026-21992)

CVE-2026-21992 allows an unauthenticated attacker to gain network access via HTTP and execute code remotely on Oracle Identity Manager and Oracle Web Services Manager.

vulnerability rce oracle
2r 2t
medium advisory

cURL Vulnerability Allows File Manipulation

A remote, anonymous attacker can exploit a vulnerability in cURL to manipulate files on a vulnerable system.

curl vulnerability file-manipulation
2r 2t
critical advisory

Multiple Vulnerabilities in libpng Allow Remote Code Execution and Denial of Service

Multiple vulnerabilities in libpng allow a remote, anonymous attacker to perform denial of service attacks and execute arbitrary code.

libpng vulnerability denial-of-service code execution
2r 2t
critical advisory

GIMP Vulnerability Allows Remote Code Execution

A remote, anonymous attacker can exploit a vulnerability in GIMP to execute arbitrary code on a targeted system.

gimp code-execution vulnerability
2r 1t
high advisory

Multiple Vulnerabilities in FreeRDP Allow for DoS and Potential Code Execution

A remote, anonymous attacker can exploit multiple vulnerabilities in FreeRDP to cause a denial of service or potentially execute arbitrary program code.

freerdp rdp vulnerability denial-of-service code-execution
2r 2t
medium advisory

Apache Commons FileUpload Denial of Service Vulnerability

A remote, anonymous attacker can exploit a vulnerability in Apache Commons FileUpload to perform a denial of service attack.

apache commons-fileupload denial-of-service vulnerability
2r 1t
medium advisory

Apache Commons BeanUtils Security Bypass Vulnerability

An authenticated remote attacker can exploit a vulnerability in Apache Commons BeanUtils to bypass security measures, potentially leading to unauthorized access or privilege escalation.

apache-commons-beanutils vulnerability security-bypass
1r 1t
high advisory

Out-of-bounds Write Vulnerability in DualSenseY-v2

CVE-2026-33850 is an out-of-bounds write vulnerability in WujekFoliarz DualSenseY-v2 before version 54, potentially allowing an attacker to execute arbitrary code or cause a denial-of-service by writing data outside the allocated buffer.

cve vulnerability oob-write dualsensey-v2
2r 3t
high advisory

SourceCodester Online Admission System 1.0 SQL Injection Vulnerability

A SQL injection vulnerability in SourceCodester Online Admission System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the 'program' argument in the /programmes.php file.

sql-injection web-application vulnerability
2r 1t 6i
medium advisory

Citrix NetScaler ADC and Gateway Vulnerabilities

Citrix has released a security advisory addressing multiple vulnerabilities in NetScaler ADC and NetScaler Gateway that could lead to sensitive information disclosure and user session mix-up under specific configurations.

citrix netscaler vulnerability information-disclosure
2r
high advisory

Erupt Framework SQL Injection Vulnerability (CVE-2026-4594)

A SQL injection vulnerability (CVE-2026-4594) exists in erupts erupt up to version 1.13.3, allowing remote attackers to execute arbitrary SQL commands by manipulating the sort.field argument in the geneEruptHqlOrderBy function.

sql-injection vulnerability erupt
2r 1t
high advisory

WWBN AVideo Unauthorized File Access and Deletion Vulnerability

WWBN AVideo platform versions up to 26.0 are vulnerable to unauthorized file access and deletion, where an authenticated user with upload permissions can exploit the `objects/import.json.php` endpoint by manipulating the `fileURI` parameter to steal private video files, read adjacent text files, and delete `.mp4` and other writable files on the filesystem.

avideo file-access vulnerability
2r 2t
high advisory

Xenstore Crash Vulnerability via Malicious Node Path Access (CVE-2026-23555)

A guest VM issuing a Xenstore command with the node path '/local/domain/' can crash xenstored (CVE-2026-23555), or, if NDEBUG is defined, cause denial of service by consuming all CPU resources.

xen xenstore denial-of-service CVE-2026-23555 hypervisor vulnerability linux
2r 1t
high advisory

Jsrsasign < 11.1.1 Incorrect Conversion Vulnerability (CVE-2026-4602)

Jsrsasign versions before 11.1.1 are vulnerable to an incorrect conversion between numeric types vulnerability, where an attacker can force the computation of incorrect modular inverses and break signature verification by calling modPow with a negative exponent.

jsrsasign vulnerability signature-bypass
2r 1t
high advisory

Jsrsasign Infinite Loop Vulnerability (CVE-2026-4598)

Jsrsasign versions before 11.1.1 are vulnerable to an infinite loop via the bnModInverse function when processing zero or negative inputs, potentially leading to a denial of service.

denial-of-service javascript node.js jsrsasign vulnerability
2r 1t
critical advisory

Critical Vulnerabilities in Quest KACE SMA Allow System Takeover

Multiple critical vulnerabilities in Quest KACE Systems Management Appliance (SMA), including authentication bypass and 2FA bypass, allow unauthenticated attackers to achieve system takeover and cause denial of service; active exploitation is reported.

quest-kace vulnerability authentication-bypass 2fa-bypass denial-of-service sma
2r 4t
high advisory

Vulnerabilities in Paxton Net2 Access Control Units

Vulnerabilities in Paxton Net2 Access Control Units (ACUs) could allow unauthorized remote access and control of secured doors, potentially affecting prisons and other high-security facilities.

access-control physical-security vulnerability
2r 8t 1i
high advisory

Memory Exhaustion Vulnerability in Widely Used Python Library

A memory exhaustion vulnerability (CVE-2026-33155) exists in a widely used Python library, affecting services like SageMaker, DataHub, and acryl-datahub due to an incomplete patch for CVE-2025-58367, requiring pinning to version 8.6.2.

memory-exhaustion vulnerability denial-of-service python supply-chain
2r 1t
high advisory

Vulnerabilities Disclosed in IP KVM Devices from Multiple Vendors

Researchers have disclosed unspecified vulnerabilities in IP KVM devices from four manufacturers, potentially allowing attackers to gain unauthorized access to connected systems.

ip-kvm vulnerability remote-access
2r 2t
critical advisory

Critical XSS Vulnerabilities in AFFiNE

Two critical XSS vulnerabilities, Reflected XSS in the /image-proxy endpoint and Stored XSS in bookmark cards, were discovered in AFFiNE, a self-hosted alternative to Notion, with the vendor being unresponsive.

xss vulnerability affine
2r 1t 2i
high advisory

ScreenConnect 26.1 Cryptographic Material Protection Vulnerability

ScreenConnect version 26.1 has a vulnerability related to the insufficient protection of server-level cryptographic material, potentially allowing unauthorized access and data compromise.

screenconnect vulnerability cryptographic-material
2r 1t
high advisory

Angular Cross-Site Scripting (XSS) Vulnerability

A cross-site scripting (XSS) vulnerability exists in Angular versions prior to 22.0.0-next.3, 21.2.4, 20.3.18, and 19.2.20, allowing attackers to execute arbitrary code within the context of the vulnerable application, potentially leading to session hijacking, data exfiltration, and unauthorized actions.

angular xss vulnerability
2r 5t
critical advisory

Multiple Critical Vulnerabilities in Veeam Backup & Replication Allow Remote Code Execution

Multiple critical vulnerabilities in Veeam Backup & Replication, including CVE-2026-21666, CVE-2026-21668, CVE-2026-21669, CVE-2026-21670, CVE-2026-21671, CVE-2026-21672, and CVE-2026-21708, allow for remote code execution, privilege escalation, and arbitrary file manipulation by authenticated users, potentially leading to a complete compromise of the backup infrastructure.

veeam rce vulnerability privilege-escalation
2r 3t
high threat

CISA Adds Google Skia and Chromium V8 Vulnerabilities to KEV Catalog

CISA added CVE-2026-3909, an out-of-bounds write vulnerability in Google Skia, and CVE-2026-3910, an unspecified vulnerability in Google Chromium V8 to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation, highlighting the need for timely remediation.

vulnerability chrome skia cve-2026-3909 cve-2026-3910
2r 3t
critical advisory

Critical Unauthenticated RCE Vulnerability in Junos OS Evolved

A critical unauthenticated remote code execution vulnerability, CVE-2026-21902, exists in Juniper Networks Junos OS Evolved PTX Series, allowing a network-based attacker to execute code as root, requiring immediate patching and increased monitoring.

junos rce vulnerability
2r 3t
critical advisory

Critical Vulnerabilities in n8n Workflow Automation Platform

Multiple critical vulnerabilities in n8n versions prior to 2.10.1, 2.9.3, and 1.123.22 enable authenticated users to execute arbitrary code and system commands, potentially leading to full system compromise.

n8n code-injection sql-injection vulnerability
3r 3t
critical advisory

Mobility46 Charging Station Vulnerabilities Allow Unauthorized Control and Disruption

Multiple vulnerabilities in Mobility46 charging stations allow attackers to gain unauthorized administrative control or disrupt charging services through missing authentication, improper authentication restrictions, insufficient session expiration, and exposed credentials.

mobility46 charging-station vulnerability ics
2r 3t 1i
critical advisory

EV2GO Charging Station Vulnerabilities Allow Impersonation and Denial of Service

Multiple vulnerabilities in EV2GO charging stations, including missing authentication and session management flaws, could allow attackers to impersonate stations, hijack sessions, and cause denial-of-service conditions.

ev2go charging-station vulnerability denial-of-service
2r 3t 1i
critical advisory

Critical RCE Vulnerability in Cisco Catalyst SD-WAN Controller

A critical remote code execution vulnerability exists in Cisco Catalyst SD-WAN Controllers (CVE-2026-20127) due to improper authentication, allowing unauthenticated remote attackers to bypass authentication and gain administrative privileges, potentially leading to network configuration manipulation.

cisco sd-wan rce vulnerability
2r 2t 4i
critical advisory

Multiple Vulnerabilities in EV Energy ev.energy Charging Stations

Multiple vulnerabilities exist in EV Energy ev.energy that could allow an attacker to gain unauthorized administrative control over vulnerable charging stations or disrupt charging services through denial-of-service attacks.

ev.energy charging-station ics vulnerability dos
2r
critical advisory

Multiple Vulnerabilities in Chargemap Charging Stations

Unauthenticated attackers can exploit multiple vulnerabilities in Chargemap's charging stations, including missing authentication, improper authentication attempt restrictions, insufficient session expiration, and unprotected credentials, potentially leading to unauthorized control and denial-of-service.

ics ot vulnerability denial-of-service
2r 5t 1i
critical advisory

Johnson Controls Frick Controls Quantum HD Multiple Vulnerabilities

Multiple vulnerabilities in Johnson Controls, Inc. Frick Controls Quantum HD versions <=10.22 can lead to pre-authentication remote code execution, information leak, or denial of service.

ics ot vulnerability
2r 4t
critical advisory

Critical Vulnerabilities in SolarWinds Serv-U Allow Remote Code Execution

Multiple critical vulnerabilities in SolarWinds Serv-U MFT and FTP Server allow remote code execution, potentially leading to system compromise.

solarwinds serv-u rce vulnerability
2r 3t
critical advisory

Copeland XWEB and XWEB Pro Multiple Vulnerabilities

Multiple vulnerabilities in Copeland XWEB and XWEB Pro versions 1.12.1 and earlier could allow attackers to bypass authentication, inject commands, and execute arbitrary code, leading to complete system compromise.

copeland xweb vulnerability ics
2r 6t
critical advisory

Critical Vulnerabilities in FreeScout Help Desk Allow Remote Code Execution

Critical vulnerabilities, CVE-2026-27636 and CVE-2026-27637, exist in FreeScout Help Desk that could be exploited to achieve remote code execution, potentially leading to data exfiltration and system compromise.

freescout rce vulnerability apache
2r 2t
critical advisory

Ongoing Exploitation of Cisco SD-WAN Systems

Malicious actors are actively exploiting CVE-2026-20127 for initial access and CVE-2022-20775 for privilege escalation and persistence on Cisco SD-WAN systems globally.

cisco-sdwan vulnerability exploitation network
3r 4t
critical advisory

Grafana Vulnerability Allows Remote Code Execution

An authenticated remote attacker can exploit a vulnerability in Grafana to execute arbitrary code, potentially leading to system compromise and data exfiltration.

Grafana code-execution vulnerability
2r 1t
medium advisory

Roundcube Vulnerabilities Leading to Cross-Site Scripting and Information Disclosure

Multiple vulnerabilities in Roundcube allow an attacker to perform a cross-site scripting attack and disclose confidential information.

Roundcube xss vulnerability
2r 1t 3c
high advisory

Argo Workflows ConfigMap Sync Service Missing Authorization Vulnerability

The Sync Service's ConfigMap-backed provider in Argo Workflows performs zero authorization checks on all CRUD operations, allowing any authenticated user to create, read, update, and delete Kubernetes ConfigMaps containing synchronization limits, potentially leading to denial of service, workflow disruption, information disclosure, or arbitrary ConfigMap manipulation in Argo Workflows versions v4.0.0 to v4.0.4.

argo-workflows/v4 argo-workflows kubernetes configmap authorization vulnerability
2r 1t
critical advisory

GStreamer Multiple Vulnerabilities Allow for Remote Code Execution and Denial of Service

Multiple vulnerabilities in GStreamer allow a remote, anonymous attacker to cause a denial-of-service condition or execute arbitrary code.

GStreamer vulnerability denial-of-service remote-code-execution
2r 2t 5c
high advisory

changedetection.io XXE Vulnerability

A vulnerability in changedetection.io versions 0.54.9 and earlier allows a remote attacker to perform XML External Entity (XXE) attacks, potentially exposing sensitive local files.

changedetection.io XXE vulnerability
2r 1t
high advisory

Acrel EEMS Enterprise Power Operation and Maintenance Cloud Platform SQL Injection Vulnerability

A SQL injection vulnerability exists in Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform 1.3.0 when manipulating the 'fCircuitids' argument in the '/SubstationWEBV2/main/elecMaxMinAvgValue' file, potentially allowing for remote code execution or data exfiltration.

EEMS Enterprise Power Operation and Maintenance Cloud Platform sql-injection web-application vulnerability
2r 1t 1c
high advisory

xmldom XML Node Injection via Comment Serialization

The xmldom library is vulnerable to XML node injection, allowing attackers to inject arbitrary XML nodes into serialized output by manipulating comment content; this is mitigated by using the `requireWellFormed` option in `serializeToString` after upgrading to version 0.8.13 or 0.9.10.

xmldom xml injection deserialization vulnerability
2r 1t
critical advisory

MindsDB Unrestricted File Upload Vulnerability (CVE-2026-7711)

CVE-2026-7711 allows for remote, unrestricted file uploads in MindsDB up to version 26.01 due to insufficient validation in the `exec` function of `proc_wrapper.py`, potentially leading to code execution or data exfiltration.

MindsDB cve vulnerability file-upload
2r 1t 1c
medium advisory

Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability

A cross-site scripting (XSS) vulnerability in Synacor Zimbra Collaboration Suite (ZCS) could allow attackers to execute arbitrary JavaScript within a user's session, potentially leading to unauthorized access to sensitive information.

Zimbra Collaboration Suite xss vulnerability zimbra
2r 1t 1c
high advisory

CVE-2026-31611: ksmbd Sub-Authority Validation Vulnerability

CVE-2026-31611 is a vulnerability in ksmbd, requiring at least three sub-authorities before reading sub_auth[2], potentially leading to unauthorized access or code execution.

cve-2026-31611 ksmbd smb vulnerability
2r 1t 1c
high advisory

BigSweetPotatoStudio HyperChat AI Proxy Middleware Server-Side Request Forgery

A server-side request forgery (SSRF) vulnerability exists in BigSweetPotatoStudio HyperChat up to version 2.0.0-alpha.63, allowing a remote attacker to manipulate the 'baseurl' argument in the 'fetch' function of the AI Proxy Middleware component to make arbitrary HTTP requests.

HyperChat ssrf vulnerability webserver
2r 1t 1c
medium advisory

CVE-2026-34293: Unspecified Vulnerability in Microsoft Product

CVE-2026-34293 is an unspecified vulnerability affecting a Microsoft product, for which details are currently unavailable, posing a potential risk to affected systems.

cve vulnerability microsoft
2r 1c
medium advisory

CVE-2026-31613 SMB Client Out-of-Bounds Read Vulnerability

CVE-2026-31613 is an out-of-bounds read vulnerability in the SMB client when parsing symlink error responses, requiring patching to prevent potential information disclosure or denial-of-service.

cve-2026-31613 smb out-of-bounds read vulnerability
2r 1t 1c
high advisory

Cisco Catalyst SD-WAN Manager Information Disclosure Vulnerability (CVE-2026-20133)

Cisco Catalyst SD-WAN Manager contains an information disclosure vulnerability (CVE-2026-20133) that could allow remote attackers to view sensitive information on affected systems, requiring immediate patching or mitigation.

Catalyst SD-WAN Manager cve vulnerability cisco sd-wan
2r 1t 1c
high advisory

OpenClaw MCP Loopback Token Spoofing Vulnerability

A vulnerability in OpenClaw versions 2026.4.21 and earlier allows a non-owner loopback client to spoof the owner context by manipulating request headers, potentially gaining unauthorized access to owner-gated operations.

openclaw vulnerability npm token spoofing
2r 1t
high advisory

GitPython Command Injection Vulnerability

GitPython versions 3.1.30 through 3.1.46 are vulnerable to command injection by passing attacker-controlled kwargs into `Repo.clone_from()`, `Remote.fetch()`, `Remote.pull()`, or `Remote.push()`, leading to arbitrary command execution due to bypassed safety checks.

GitPython command-injection vulnerability
2r 1t
high advisory

itsourcecode Electronic Judging System SQL Injection Vulnerability (CVE-2026-7555)

A remote SQL injection vulnerability (CVE-2026-7555) exists in itsourcecode Electronic Judging System 1.0 via manipulation of the Username argument in the /intrams/login.php file, potentially leading to unauthorized data access and modification.

Electronic Judging System 1.0 sql-injection vulnerability web-application
2r 1t 1c
high advisory

SourceCodester Hotel Management System SQL Injection Vulnerability

A SQL injection vulnerability exists in SourceCodester Hotel Management System 1.0 in the /index.php/reservation/check component due to improper sanitization of the room_type parameter, allowing a remote attacker to execute arbitrary SQL commands.

Hotel Management System 1.0 sqli vulnerability web application
2r 1t 1c
critical threat

Weaver E-cology Arbitrary File Read Vulnerability (CVE-2022-50992)

Unauthenticated remote attackers can exploit an arbitrary file read vulnerability (CVE-2022-50992) in Weaver E-cology 9.5 versions prior to 10.52 via the XML-RPC endpoint to access sensitive files.

exploited E-cology 9.5 cve-2022-50992 file-read vulnerability webserver
2r 1t 1c
high advisory

Server-Side Request Forgery in mcp-data-vis

A server-side request forgery (SSRF) vulnerability exists in AlejandroArciniegas' mcp-data-vis due to improper handling of HTTP requests, potentially allowing remote attackers to make arbitrary requests through the vulnerable server.

mcp-data-vis ssrf vulnerability
2r 1t 1c
high advisory

rust-openssl Stack Buffer Overflow Vulnerability

The rust-openssl crate is vulnerable to a stack-based buffer overflow (CVE-2026-41681) where the `EVP_DigestFinal()` function writes beyond the allocated buffer, potentially corrupting the stack, affecting versions >= 0.10.39 and < 0.10.78.

openssl buffer overflow rust vulnerability
2r
high advisory

pygeoapi Unauthenticated SSRF Vulnerability in OGC API - Processes Subscriber

pygeoapi versions 0.23.0 to 0.23.2 contain an unauthenticated server-side request forgery (SSRF) vulnerability where OGC API process execution requests can use the subscriber object to make requests to internal HTTP services, which is resolved in version 0.23.3 by disabling internal requests by default.

pygeoapi ssrf ogc api cve-2026-42352 vulnerability cloud
2r 1t
high advisory

pygeoapi Path Traversal Vulnerability in STAC FileSystemProvider

A path traversal vulnerability exists in pygeoapi versions 0.23.0 to 0.23.2 within the STAC FileSystemProvider plugin, allowing unauthenticated access to directories when deployed without a URL-normalizing proxy.

pygeoapi path-traversal vulnerability webserver
2r 1t
critical advisory

Patreon OAuth Provider ID Collision Vulnerability in go-pkgz/auth

The Patreon OAuth provider in go-pkgz/auth and go-pkgz/auth/v2 maps every authenticated Patreon account to the same local user ID, leading to cross-account access, privilege confusion, and subscription-state leakage.

auth +1 authentication oauth id_collision vulnerability
2r 1t
high advisory

MiroFish Command Injection Vulnerability (CVE-2026-7058)

A command injection vulnerability exists in 666ghj MiroFish version 0.1.2 via the SimulationIPCClient.send_command function, allowing remote attackers to execute arbitrary commands.

MiroFish command-injection vulnerability ipc
2r 1t 1c
medium advisory

Microsoft CVE-2017-3736 Vulnerability

CVE-2017-3736 is a vulnerability tracked by Microsoft, potentially leading to exploitation of affected systems.

vulnerability microsoft
2r
high advisory

mcp-dnstwist OS Command Injection Vulnerability (CVE-2026-7443)

An OS command injection vulnerability exists in BurtTheCoder's mcp-dnstwist version 1.0.4 and earlier due to improper handling of the Request argument in the fuzz_domain function within src/index.ts, potentially allowing remote attackers to execute arbitrary commands.

mcp-dnstwist command-injection vulnerability
2r 1t 1c
critical advisory

Dgraph Pre-Auth Full Database Exfiltration via DQL Injection

A pre-authentication DQL injection vulnerability in Dgraph's default configuration allows attackers to exfiltrate the entire database by crafting malicious JSON mutations to the `/mutate` endpoint, exploiting unsanitized language tags in predicates.

Dgraph dql-injection vulnerability
2r 6t
medium advisory

Denial of Service Vulnerability in marked via Infinite Recursion

A denial of service vulnerability exists in marked version 18.0.0 due to infinite recursion when processing a specific 3-byte sequence (tab, vertical tab, and newline), leading to unbounded memory allocation and application crash.

marked denial-of-service javascript vulnerability
2r 1t
medium advisory

CVE-2026-28390 NULL Dereference in CMS KeyTransportRecipientInfo Processing

CVE-2026-28390 is a vulnerability related to a possible NULL pointer dereference when processing CMS KeyTransportRecipientInfo, potentially leading to a denial-of-service condition.

vulnerability denial-of-service
2r 1c
high advisory

CKAN Unauthenticated SQL Injection in datastore_search_sql

An unauthenticated SQL injection vulnerability in CKAN's `datastore_search_sql` function allows attackers to access private resources and PostgreSQL system information, affecting versions prior to 2.10.10 and versions 2.11.0 through 2.11.4.

ckan sql-injection vulnerability
2r 1t
high threat

ChatGPTNextWeb NextChat SSRF Vulnerability (CVE-2026-7178)

ChatGPTNextWeb NextChat versions up to 2.16.1 are vulnerable to server-side request forgery (SSRF) due to improper input validation in the storeUrl function, allowing remote attackers to potentially access internal resources or conduct other malicious activities.

exploited NextChat ssrf cve vulnerability web-application
2r 1t 1c
high advisory

Arcane Unauthenticated Compose Template Content Disclosure

Arcane versions before 1.18.0 are vulnerable to an unauthenticated information disclosure on four GET endpoints under `/api/templates*`, allowing unauthorized access to Compose YAML and `.env` content including sensitive secrets.

Arcane information-disclosure vulnerability
2r 1t
high advisory

Aider-MCP Command Injection Vulnerability (CVE-2026-7316)

A command injection vulnerability (CVE-2026-7316) exists in eiliyaabedini aider-mcp, allowing remote attackers to execute arbitrary commands by manipulating the working_dir/editable_files argument in the aider_mcp.py file.

aider-mcp command-injection vulnerability
2r 1t 1c
medium advisory

n8n Unauthenticated Denial of Service via MCP Client Registration

n8n is vulnerable to an unauthenticated denial of service (DoS) attack due to missing resource controls in the MCP OAuth client registration endpoint, allowing an attacker to exhaust server memory by sending large registration payloads, leading to service unavailability; this is resolved in versions 1.123.32, 2.17.4, and 2.18.1 and tracked as CVE-2026-42236.

n8n denial-of-service vulnerability
2r 1t
critical advisory

Gotenberg ExifTool Argument Injection via Metadata Values

Gotenberg version 8.30.1 and earlier is vulnerable to argument injection, where an unauthenticated attacker can inject arbitrary ExifTool pseudo-tags via newline characters in metadata values, leading to arbitrary file manipulation within the container filesystem.

Gotenberg <= 8.30.1 argument-injection vulnerability container
2r 1t
high advisory

Detect-It-Easy Path Traversal Vulnerability (CVE-2026-43616)

Detect-It-Easy versions prior to 3.21 are vulnerable to path traversal, allowing attackers to write arbitrary files to the filesystem and potentially achieve code execution by crafting malicious archive entries.

Detect-It-Easy path-traversal vulnerability archive-extraction
2r 1t 1c
medium advisory

CVE-2017-3735 Vulnerability Targeting Microsoft Products

CVE-2017-3735 is a vulnerability impacting Microsoft products, potentially allowing unauthorized access or code execution.

vulnerability microsoft cve-2017-3735
2r 1t 1c
critical advisory

CI4MS Theme Upload Zip Slip Vulnerability

A critical vulnerability exists in ci4ms Theme::upload, where improper validation of ZIP archive entry names allows authenticated users with theme creation permissions to write files to arbitrary locations, leading to remote code execution.

ci4-cms-erp/ci4ms zip-slip rce codeigniter vulnerability
2r 2t
high advisory

choieastsea simple-openstack-mcp OS Command Injection Vulnerability (CVE-2026-7066)

The choieastsea simple-openstack-mcp application is vulnerable to OS command injection via the exec_openstack function in server.py, allowing remote attackers to execute arbitrary commands.

simple-openstack-mcp command-injection vulnerability openstack
3r 1t 1c