SingCERT Security Bulletin: Critical Vulnerabilities Week of 8 April 2026
Summary
The Cyber Security Agency of Singapore (CSA) through SingCERT issued its weekly Security Bulletin for 8 April 2026, summarizing critical and high-severity vulnerabilities from NIST's National Vulnerability Database (NVD). The bulletin catalogs multiple CVEs with CVSS scores of 10.0, affecting Microsoft Azure services, ChurchCRM, Dgraph, SandboxJS, Juju, and Samsung Exynos processors. Organizations are advised to review affected products and apply available patches.
What changed
SingCERT's weekly security bulletin aggregates newly published critical-severity CVEs from NIST NVD. The most severe vulnerabilities include multiple CVSS 10.0 flaws: Microsoft Bing SSRF allowing privilege escalation, Azure Databricks SSRF, Azure Kubernetes Service improper authorization, Azure AI Foundry privilege escalation, ChurchCRM pre-authentication RCE (incomplete fix for CVE-2025-62521), Dgraph unauthenticated restoreTenant mutation exposing databases and filesystem, SandboxJS bypass for global object protection, and Juju Dqlite TLS client certificate validation failure enabling database cluster compromise. Samsung Exynos processors also contain vulnerabilities in SMS components.
Organizations using Microsoft Azure cloud services, ChurchCRM church management systems, Dgraph GraphQL databases, applications incorporating SandboxJS, Juju DevOps/Charm orchestration, or Samsung Exynos-based mobile/wearable/modem devices should prioritize patching. The SSRF vulnerabilities in Microsoft services and improper authorization flaws in Azure products present particular risk for cloud-native architectures. ChurchCRM's remote code execution vulnerability is actively exploitable during installation on unpatched versions prior to 7.1.0. Dgraph database users should verify their installations are version 25.3.1 or later to prevent unauthenticated database compromise via attacker-controlled backup sources.
What to do next
- Review the listed CVEs and identify affected Microsoft Azure, ChurchCRM, Dgraph, SandboxJS, Juju, and Samsung products in your environment
- Apply available security patches for CVE-2026-39337 (ChurchCRM 7.1.0), CVE-2026-34976 (Dgraph 25.3.1), CVE-2026-34208 (SandboxJS 0.8.36), and CVE-2026-34370 (Juju versions 3.6.20 and 4.0.5)
- Implement network segmentation and monitoring controls to detect exploitation attempts targeting server-side request forgery and improper authorization vulnerabilities
Archived snapshot
Apr 8, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
SecurityBulletin08April2026
Generatedon08April2026
SingCERT'sSecurityBulletinsummarisesthelistofvulnerabilitiescollatedfromtheNationalInstituteofStandardsandTechnology(NIST)'sNationalVulnerability Database(NVD)inthepastweek. Thevulnerabilitiesaretabledbasedonseverity,inaccordancetotheirCVSSv3basescores: vulnerabilitieswithabasescoreof9.0toCritical 10.0 vulnerabilitieswithabasescoreof7.0toHigh 8.9 vulnerabilitieswithabasescoreof4.0toMedium 6.9 vulnerabilitieswithabasescoreof0.1toLow 3.9 None vulnerabilitieswithabasescoreof0.0 ForthosevulnerabilitieswithoutassignedCVSSscores,pleasevisitNVDfortheupdatedCVSSvulnerabilityentries.
CRITICALVULNERABILITIES
BaseCVENumber Description ReferenceScore
CVE-2026- Server-siderequestforgery(ssrf)inMicrosoftBingallowsanunauthorizedattackertoelevateprivilegesoveranetwork. 10.0 MoreDetails32186 CVE-2026- Server-siderequestforgery(ssrf)inAzureDatabricksallowsanunauthorizedattackertoelevateprivilegesoveranetwork. 10.0 MoreDetails33107 CVE-2026- ImproperauthorizationinMicrosoftAzureKubernetesServiceallowsanunauthorizedattackertoelevateprivilegesovera 10.0 MoreDetails33105 network. ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,criticalpre-authenticationremotecodeexecution CVE-2026- vulnerabilityinChurchCRM'ssetupwizardallowsunauthenticatedattackerstoinjectarbitraryPHPcodeduringtheinitial 10.0 MoreDetails39337 installationprocess,leadingtocompleteservercompromise.The"$dbPassword"variableisnotsanitized.Thisvulnerability existsduetoanincompletefixforCVE-2025-62521.Thisvulnerabilityisfixedin7.1.0. CVE-2026- ImproperauthorizationinAzureAIFoundryallowsanunauthorizedattackertoelevateprivilegesoveranetwork. 10.0 MoreDetails32213 DgraphisanopensourcedistributedGraphQLdatabase.Priorto25.3.1,therestoreTenantadminmutationismissingfromthe authorizationmiddlewareconfig(admin.go),makingitcompletelyunauthenticated.Unlikethesimilarrestoremutationwhich CVE-2026- requiresGuardian-of-Galaxyauthentication,restoreTenantexecuteswithzeromiddleware.Thismutationacceptsattacker- 10.0 MoreDetails34976 controlledbackupsourceURLs(includingfile://forlocalfilesystemaccess),S3/MinIOcredentials,encryptionkeyfilepaths,and Vaultcredentialfilepaths.Anunauthenticatedattackercanoverwritetheentiredatabase,readserver-sidefiles,andperform SSRF.Thisvulnerabilityisfixedin25.3.1. SandboxJSisaJavaScriptsandboxinglibrary.Priorto0.8.36,SandboxJSblocksdirectassignmenttoglobalobjects(forexample Math.random=...),butthisprotectioncanbebypassedthroughanexposedcallableconstructorpath:CVE-2026- this.constructor.call(target,attackerObject).Becausethis.constructorresolvestotheinternalSandboxGlobalfunctionand 10.0 MoreDetails34208 Function.prototype.callisallowed,attackercodecanwritearbitrarypropertiesintohostglobalobjectsandpersistthose mutationsacrosssandboxinstancesinthesameprocess.Thisvulnerabilityisfixedin0.8.36. AvulnerabilitywasidentifiedinJujufromversion3.2.0until3.6.19andfromversion4.0until4.0.4,wheretheinternalDqlite databaseclusterfailstoperformproperTLSclientandserverauthentication.Specifically,theJujucontroller'sdatabaseCVE-2026- endpointdoesnotvalidateclientcertificateswhenanewnodeattemptstojointhecluster.Anunauthenticatedattackerwith 10.0 MoreDetails4370 networkreachabilitytotheJujucontroller'sDqliteportcanexploitthisflawtojointhedatabasecluster.Oncejoined,the attackergainsfullreadandwriteaccesstotheunderlyingdatabase,allowingfortotaldatacompromise. AnissuewasdiscoveredinSMSinSamsungMobileProcessor,WearableProcessor,andModemExynos980,990,850,1080,CVE-2025- 2100,1280,2200,1330,1380,1480,2400,1580,2500,9110,W920,W930,W1000,Modem5123,Modem5300,andModem 10.0 MoreDetails54328 5400.AStack-basedBufferOverflowoccurswhileparsingSMSRP-DATAmessages. PraisonAIisamulti-agentteamssystem.Priortoversion1.5.90,executecode()inpraisonai-agentsrunsattacker-controlled CVE-2026- Pythoninsideathree-layersandboxthatcanbefullybypassedbypassingastrsubclasswithanoverriddenstartswith()method 10.0 MoreDetails34938 tothesafe_getattrwrapper,achievingarbitraryOScommandexecutiononthehost.Thisissuehasbeenpatchedinversion 1.5.90. Kestraisanopen-source,event-drivenorchestrationplatform.Priortoversion1.3.7,Kestra(defaultdocker-compose deployment)containsaSQLInjectionvulnerabilitythatleadstoRemoteCodeExecution(RCE)inthefollowingendpoint"GETCVE-2026- /api/v1/main/flows/search".Onceauserisauthenticated,simplyvisitingacraftedlinkisenoughtotriggerthevulnerability.The 9.9 MoreDetails34612 injectedpayloadisexecutedbyPostgreSQLusingCOPY...TOPROGRAM...,whichinturnrunsarbitraryOScommandsonthe host.Thisissuehasbeenpatchedinversion1.3.7.
CVE-2026- 9.9 MoreDetails editingblogcategories.AnattackercaninjectamaliciousJavaScriptpayloadintothecategorytitlefield,whichisthenstored34569 server-side.Thisstoredpayloadislaterrenderedunsafelyacrosspublic-facingblogcategorypages,administrativeinterfaces, andblogpostviewswithoutproperoutputencoding,leadingtostoredcross-sitescripting(XSS).Thisissuehasbeenpatchedin version0.31.0.0. WindmillCEandEEversions1.276.0through1.603.2containanSQLinjectionvulnerabilityinthefolderownership CVE-2026- managementfunctionalitythatallowsauthenticatedattackerstoinjectSQLthroughtheownerparameter.Anattackercanuse 9.9 MoreDetails23696 theinjectiontoreadsensitivedatasuchastheJWTsigningsecretandadministrativeuseridentifiers,forgeanadministrative token,andthenexecutearbitrarycodeviatheworkflowexecutionendpoints.
andthemesupport.Priortoversion0.31.0.0,aStoredCross-SiteScripting(StoredXSS)vulnerabilityexistsinthebackenduser CVE-2026-managementfunctionality.Theapplicationfailstoproperlysanitizeuser-controlledinputbeforerenderingitinthe 9.9 MoreDetails34571administrativeinterface,allowingattackerstoinjectpersistentJavaScriptcode.Thisresultsinautomaticexecutionwhenever backendusersaccesstheaffectedpage,enablingsessionhijacking,privilegeescalation,andfulladministrativeaccount compromise.Thisissuehasbeenpatchedinversion0.31.0.0. Group-Officeisanenterprisecustomerrelationshipmanagementandgroupwaretool.Priortoversions6.8.156,25.0.90,and 26.0.12,avulnerabilityintheAbstractSettingsCollectionmodelleadstoinsecuredeserializationwhenthesesettingsareCVE-2026-loaded.ByinjectingaserializedFileCookieJarobjectintoasettingstring,anauthenticatedattackercanachieveArbitraryFile 9.9 MoreDetails34838Write,leadingdirectlytoRemoteCodeExecution(RCE)ontheserver.Thisissuehasbeenpatchedinversions6.8.156,25.0.90, and26.0.12. GenealogyisafamilytreePHPapplication.Priorto5.9.1,acriticalbrokenaccesscontrolvulnerabilityinthegenealogy CVE-2026-applicationallowsanyauthenticatedusertotransferownershipofarbitrarynon-personalteamstothemselves.Thisenables 9.9 MoreDetails39355completetakeoverofotherusers'teamworkspacesandunrestrictedaccesstoallgenealogydataassociatedwiththe compromisedteam.Thisvulnerabilityisfixedin5.9.1. OpenProjectisanopen-source,web-basedprojectmanagementsoftware.Priortoversion17.2.3,the=noperatorinCVE-2026-modules/reporting/lib/report/operator.rb:177embedsuserinputdirectlyintoSQLWHEREclauseswithoutparameterization.This 9.9 MoreDetails34717issuehasbeenpatchedinversion17.2.3. AnissuewasdiscoveredinPerconaPMMbefore3.7.Becauseaninternaldatabaseuserretainsspecificsuperuserprivileges,anCVE-2026-attackerwithpmm-adminrightscanabusethe"Adddatasource"featuretobreakoutofthedatabasecontextandexecute 9.9 MoreDetails25212shellcommandsontheunderlyingoperatingsystem. CVE-2025-XenForobefore2.3.7containsasecurityissueaffectingPasskeysthathavebeenaddedtouseraccounts.Anattackermaybe 71279abletocompromisethesecurityofPasskey-basedauthentication. Kedroisatoolboxforproduction-readydatascience.Priorto1.3.0,Kedroallowstheloggingconfigurationfilepathtobesetvia theKEDROLOGGINGCONFIGenvironmentvariableandloadsitwithoutvalidation.TheloggingconfigurationschemasupportsCVE-2026-thespecial()key,whichenablesarbitrarycallableinstantiation.Anattackercanexploitthistoexecutearbitrarysystem35171commandsduringapplicationstartup.Thisisacriticalremotecodeexecution(RCE)vulnerabilitycausedbyunsafeuseof logging.config.dictConfig()withuser-controlledinput.Thisvulnerabilityisfixedin1.3.0. HirschmannHiEOSdevicesversionspriorto01.1.00containanauthenticationbypassvulnerabilityintheHTTP(S)management CVE-2024-modulethatallowsunauthenticatedremoteattackerstogainadministrativeaccessbysendingspeciallycraftedHTTP(S) 14034requests.Attackerscanexploitimproperauthenticationhandlingtoobtainelevatedprivilegesandperformunauthorized actionsincludingconfigurationdownloadoruploadandfirmwaremodification. HirschmannIndustrialHiVisionversionspriorto06.0.07and07.0.03containsanauthenticationbypassvulnerabilityinthe CVE-2017-masterservicethatallowsunauthenticatedremoteattackerstoexecutearbitrarycommandswithadministrativeprivileges. 20237Attackerscaninvokeexposedinterfacemethodsovertheremoteservicetobypassauthenticationandachieveremotecode executionontheunderlyingoperatingsystem. BrunoisanopensourceIDEforexploringandtestingAPIs.Priorto3.2.1,Brunowasaffectedbyasupplychainattackinvolving CVE-2026-compromisedversionsoftheaxiosnpmpackage,whichintroducedahiddendependencydeployingacross-platformRemote 34841AccessTrojan(RAT).Usersof@usebruno/cliwhorannpminstallbetween00:21UTCand~03:30UTConMarch31,2026may havebeenimpacted.Upgradeto3.2.1 CVE-2026-AnissueintheloginmechanismofKalerisYMSv7.2.2.1allowsattackerstobypassloginverificationtoaccesstheapplication's 31151resources. HirschmannHiSecOSdevicesversionspriorto05.3.03containabufferoverflowvulnerabilityintheHTTPSlogininterfacewhen CVE-2018-RADIUSauthenticationisenabledthatallowsremoteattackerstocrashthedeviceorexecutearbitrarycodebysubmittinga 25237passwordlongerthan128characters.Attackerscanexploitimproperboundscheckinginpasswordhandlingtooverflowafixed- sizebufferandachievedenialofserviceorremotecodeexecution. GarrettComMagnum6Kand10KmanagedswitchescontainanauthenticationbypassvulnerabilitythatallowsunauthenticatedCVE-2017-attackerstogainunauthorizedaccessbyexploitingahardcodedstringintheauthenticationmechanism.Attackerscanbypass20234logincontrolstoaccessadministrativefunctionsandsensitiveswitchconfigurationwithoutvalidcredentials. CVE-2026-Aremotecommandexecution(RCE)vulnerabilityinthe/goform/formDiacomponentofUTTAggressiveHiPER520Wv3v1.7.7- 31059180627allowsattackerstoexecutearbitrarycommandsviaacraftedstring. ProSoftTechnologyICX35-HWCversions1.3andpriorcellulargatewayscontainaninputvalidationvulnerabilityinthewebuser CVE-2017-interfacethatallowsremoteattackerstoinjectandexecutesystemcommandsbysubmittingmaliciousinputthrough 20236unvalidatedfields.Attackerscanexploitthisvulnerabilitytogainrootprivilegesandexecutearbitrarycommandsonthedevice throughtheaccessiblewebinterface. HirschmannHiOSandHiSecOSproductsRSP,RSPE,RSPS,RSPL,MSP,EES,EESX,GRS,OS,RED,EAGLEcontainan CVE-2018-authenticationbypassvulnerabilityintheHTTP(S)managementmodulethatallowsunauthenticatedremoteattackerstogain 25236administrativeaccessbycraftingspeciallyformedHTTPrequests.Attackerscanexploitimproperauthenticationhandlingto obtaintheauthenticationstatusandprivilegesofapreviouslyauthenticateduserwithoutprovidingvalidcredentials. PegasusCMS1.0containsaremotecodeexecutionvulnerabilityintheextra_fields.phppluginthatallowsunauthenticatedCVE-2019-
attackerstoexecutearbitrarycommandsbyexploitingunsafeevalfunctionality.AttackerscansendPOSTrequeststothe25687 submit.phpendpointwithmaliciousPHPcodeintheactionparametertoachievecodeexecutionandobtainaninteractiveshell. PraisonAIisamulti-agentteamssystem.Priortoversion4.5.90,thegetalluserthreadsfunctionconstructsrawSQLqueries CVE-2026-usingf-stringswithunescapedthreadIDsfetchedfromthedatabase.AnattackerstoresamaliciousthreadIDvia MoreDetails34934 9.8updatethread.Whentheapplicationloadsthethreadlist,theinjectedpayloadexecutesandgrantsfulldatabaseaccess.This issuehasbeenpatchedinversion4.5.90. PraisonAIisamulti-agentteamssystem.Fromversion4.5.15tobeforeversion4.5.69,the--mcpCLIargumentispassed CVE-2026-directlytoshlex.split()andforwardedthroughthecallchaintoanyio.openprocess()withnovalidation,allowlistcheck,or 34935sanitizationatanyhop,allowingarbitraryOScommandexecutionastheprocessuser.Thisissuehasbeenpatchedinversion 4.5.69. NICO-FTP3.0.1.19containsastructuredexceptionhandlerbufferoverflowvulnerabilitythatallowsremoteattackerstoexecuteCVE-2018-arbitrarycodebysendingcraftedFTPcommands.AttackerscanconnecttotheFTPserviceandsendoversizeddatainresponse25254handlerstooverwriteSEHpointersandredirectexecutiontoinjectedshellcode. AnissuewasdiscoveredinMbedTLSversionsfrom2.19.0upto3.6.5,MbedTLS4.0.0.InsufficientprotectionofserializedSSLCVE-2026-contextorsessionstructuresallowsanattackerwhocanmodifytheserializedstructurestoinducememorycorruption,leading34877toarbitrarycodeexecution.ThisiscausedbyIncorrectUseofPrivilegedAPIs. ConvoyisaKVMservermanagementpanelforhostingbusinesses.Fromversion3.9.0-betatobeforeversion4.5.1,the JWTService::decode()methoddidnotverifythecryptographicsignatureofJWTtokens.Whilethemethodconfigureda symmetricHMAC-SHA256signervialcobucci/jwt,itonlyvalidatedtime-basedclaims(exp,nbf,iat)usingtheStrictValidAt CVE-2026-constraint.TheSignedWithconstraintwasnotincludedinthevalidationstep.Thismeansanattackercouldforgeortamper 33746withJWTtokenpayloads--suchasmodifyingtheuseruuidclaim--andthetokenwouldbeacceptedasvalid,aslongasthe time-basedclaimsweresatisfied.ThisdirectlyimpactstheSSOauthenticationflow(LoginController::authorizeToken),allowing anattackertoauthenticateasanyuserbycraftingatokenwithanarbitraryuseruuid.Thisissuehasbeenpatchedinversion 4.5.1. CVE-2026-AimproperaccesscontrolvulnerabilityinFortinetFortiClientEMS7.4.5through7.4.6mayallowanunauthenticatedattackerto 35616executeunauthorizedcodeorcommandsviacraftedrequests. Aheap-basedbufferoverflowvulnerabilityexistsintheHuffTable::initvalfunctionalityofLibRawCommit0b56545andCommitCVE-2026-d20315b.Aspeciallycraftedmaliciousfilecanleadtoaheapbufferoverflow.Anattackercanprovideamaliciousfiletotrigger20911thisvulnerability. MetInfoCMSversions7.9,8.0,and8.1containanunauthenticatedPHPcodeinjectionvulnerabilitythatallowsremoteattackersCVE-2026-toexecutearbitrarycodebysendingcraftedrequestswithmaliciousPHPcode.Attackerscanexploitinsufficientinput29014neutralizationintheexecutionpathtoachieveremotecodeexecutionandgainfullcontrolovertheaffectedserver. TOTOlinkA3600Rv5.9c.4959containsabufferoverflowvulnerabilityinthesetAppEasyWizardConfiginterfaceofCVE-2026-/lib/cstemodules/app.so.ThevulnerabilityoccursbecausetherootSsidparameterisnotproperlyvalidatedforlength,allowing31027remoteattackerstotriggerabufferoverflow,potentiallyleadingtoarbitrarycodeexecutionordenialofservice. CVE-2024-Thereisaninjectionvulnerabilityinjeecgbootversions3.0.0to3.5.3duetolaxcharacterfiltering,whichallowsattackersto 40489executearbitrarycodeoncomponentsthroughspeciallycraftedHTTPrequests. CVE-2024-Acommandinjectionvulnerabilityinthecomponent/jmreport/showofjeecgbootv3.0.0tov3.5.3allowsattackerstoexecute 43028arbitrarycodeviaacraftedHTTPrequest. AvulnerabilityinthechangepasswordfunctionalityofCiscoIntegratedManagementController(IMC)couldallowan unauthenticated,remoteattackertobypassauthenticationandgainaccesstothesystemas Admin.ThisvulnerabilityisCVE-2026-duetoincorrecthandlingofpasswordchangerequests.AnattackercouldexploitthisvulnerabilitybysendingacraftedHTTP20093requesttoanaffecteddevice.Asuccessfulexploitcouldallowtheattackertobypassauthentication,alterthepasswordsofany useronthesystem,includingan Adminuser,andgainaccesstothesystemasthatuser. AvulnerabilityinCiscoSmartSoftwareManagerOn-Prem(SSMOn-Prem)couldallowanunauthenticated,remoteattackerto executearbitrarycommandsontheunderlyingoperatingsystemofanaffectedSSMOn-Premhost.ThisvulnerabilityisduetoCVE-2026-theunintentionalexposureofan internalservice.Anattackercouldexploitthisvulnerabilitybysendingacraftedrequest20160totheAPIoftheexposedservice.Asuccessfulexploitcouldallowtheattackertoexecutecommandsontheunderlying operatingsystemwithroot-levelprivileges. CVE-2026-AnissuewasdiscoveredinDedeCMS5.7.118allowingattackerstoexecutecodeviacraftedsetuptagvaluesinamodule 30643upload. llama.cppisaninferenceofseveralLLMmodelsinC/C++.Priortoversionb8492,theRPCbackend'sdeserializetensor()skips allboundsvalidationwhenatensor'sbufferfieldis0.AnunauthenticatedattackercanreadandwritearbitraryprocessmemoryCVE-2026-viacraftedGRAPHCOMPUTEmessages.CombinedwithpointerleaksfromALLOCBUFFER/BUFFERGETBASE,thisgivesfull34159ASLRbypassandremotecodeexecution.Noauthenticationrequired,justTCPaccesstotheRPCserverport.Thisissuehas beenpatchedinversionb8492. CVE-2026-AnissuewasdiscoveredinMbedTLSthrough3.6.5andTF-PSA-Crypto1.0.0.Abufferoverflowcanoccurinpublickeyexport 34875forFFDHkeys. Cockpit'sremoteloginfeaturepassesuser-suppliedhostnamesandusernamesfromthewebinterfacetotheSSHclientwithout validationorsanitization.AnattackerwithnetworkaccesstotheCockpitwebservicecancraftasingleHTTPrequesttotheCVE-2026-loginendpointthatinjectsmaliciousSSHoptionsorshellcommands,achievingcodeexecutionontheCockpithostwithoutvalid4631credentials.Theinjectionoccursduringtheauthenticationflowbeforeanycredentialverificationtakesplace,meaningnologin isrequiredtoexploitthevulnerability. changedetection.ioisafreeopensourcewebpagechangedetectiontool.Priorto0.54.8,the@loginoptionallyrequired decoratorisplacedbefore(outerto)@blueprint.route()insteadofafterit.InFlask,@route()mustbetheoutermostdecoratorCVE-2026-becauseitregistersthefunctionitreceives.Whentheorderisreversed,@route()registerstheoriginalundecoratedfunction,35490andtheauthwrapperisneverinthecallchain.Thissilentlydisablesauthenticationontheseroutes.Thisvulnerabilityisfixedin 0.54.8. Aheap-basedbufferoverflowvulnerabilityexistsinthelosslessjpegloadrawfunctionalityofLibRawCommit0b56545and
Commitd20315b.Aspeciallycraftedmaliciousfilecanleadtoaheapbufferoverflow.AnattackercanprovideamaliciousfileCVE-2026- 21413totriggerthisvulnerability. Weaver(Fanwei)E-cology10.0versionspriorto20260312containanunauthenticatedremotecodeexecutionvulnerabilityin the/papi/esearch/data/devops/dubboApi/debug/methodendpointthatallowsattackerstoexecutearbitrarycommandsbyCVE-2026-invokingexposeddebugfunctionality.AttackerscancraftPOSTrequestswithattacker-controlledinterfaceNameand22679methodNameparameterstoreachcommand-executionhelpersandachievearbitrarycommandexecutiononthe system.ExploitationevidencewasfirstobservedbytheShadowserverFoundationon2026-03-31(UTC). MemorysafetybugspresentinFirefoxESR115.34.0,FirefoxESR140.9.0,ThunderbirdESR140.9.0,Firefox149.0.1and CVE-2026-Thunderbird149.0.1.Someofthesebugsshowedevidenceofmemorycorruptionandwepresumethatwithenougheffort 5731someofthesecouldhavebeenexploitedtorunarbitrarycode.ThisvulnerabilityaffectsFirefox<149.0.2,FirefoxESR< 115.34.1,FirefoxESR<140.9.1,Thunderbird<149.0.2,andThunderbird<140.9.1. AnthropicClaudeCodeCLIandClaudeAgentSDKcontainanOScommandinjectionvulnerabilityinauthenticationhelper executionwherehelperconfigurationvaluesareexecutedusingshell=truewithoutinputvalidation.AttackerswhocanCVE-2026-influenceauthenticationsettingscaninjectshellmetacharactersthroughparameterslikeapiKeyHelper,awsAuthRefresh,35022awsCredentialExport,andgcpAuthRefreshtoexecutearbitrarycommandswiththeprivilegesoftheuserorautomation environment,enablingcredentialtheftandenvironmentvariableexfiltration. CVE-2026-CustomerManagedShareFileStorageZonesController(SZC)allowsanunauthenticatedattackertoaccessrestricted 2699configurationpages.Thisleadstochangingsystemconfigurationandpotentialremotecodeexecution. CVE-2026-EcclesiaCRMisCRMSoftwareforchurchmanagement.Priorto8.0.0,thereisaSQLinjectionvulnerabilityin 35184v2/templates/query/queryview.phpviathecustomandvalueparameters.Thisvulnerabilityisfixedin8.0.0. TheNinjaForms-FileUploadspluginforWordPressisvulnerabletoarbitraryfileuploadsduetomissingfiletypevalidationin CVE-2026-the'NFFUAJAXControllersUploads::handleupload'functioninallversionsupto,andincluding,3.3.26.Thismakesitpossible MoreDetails 9.80740forunauthenticatedattackerstouploadarbitraryfilesontheaffectedsite'sserverwhichmaymakeremotecodeexecution possible.Note:Thevulnerabilitywaspartiallypatchedinversion3.3.25andfullypatchedinversion3.3.27. TianxinInternetBehaviorManagementSystemcontainsacommandinjectionvulnerabilityintheReportercomponentendpoint thatallowsunauthenticatedattackerstoexecutearbitrarycommandsbysupplyingacraftedobjClassparametercontaining CVE-2021-shellmetacharactersandoutputredirection.AttackerscanexploitthisvulnerabilitytowritemaliciousPHPfilesintotheweb 4473rootandachieveremotecodeexecutionwiththeprivilegesofthewebserverprocess.Thisvulnerabilityhasbeenfixedin versionNACFirmware4.0.0.720210716.180815topsec0basic.bin.Exploitationevidencewasfirstobservedbythe ShadowserverFoundationon2024-06-01(UTC). SnewsCMS1.7containsanunrestrictedfileuploadvulnerabilitythatallowsunauthenticatedattackerstouploadarbitraryfilesCVE-2016-includingPHPexecutablestothesnewsfilesdirectory.AttackerscanuploadmaliciousPHPfilesthroughthemultipartform-data20052uploadendpointandexecutethembyaccessingtheuploadedfilepathtoachieveremotecodeexecution. MemorysafetybugspresentinFirefoxESR140.9.0,ThunderbirdESR140.9.0,Firefox149.0.1andThunderbird149.0.1.Some CVE-2026-ofthesebugsshowedevidenceofmemorycorruptionandwepresumethatwithenougheffortsomeofthesecouldhavebeen 5734exploitedtorunarbitrarycode.ThisvulnerabilityaffectsFirefox<149.0.2,FirefoxESR<140.9.1,Thunderbird<149.0.2,and Thunderbird<140.9.1. MemorysafetybugspresentinFirefox149.0.1andThunderbird149.0.1.SomeofthesebugsshowedevidenceofmemoryCVE-2026-corruptionandwepresumethatwithenougheffortsomeofthesecouldhavebeenexploitedtorunarbitrarycode.This5735vulnerabilityaffectsFirefox<149.0.2andThunderbird<149.0.2. CVE-2026-Aheap-basedbufferoverflowvulnerabilityexistsinthex3fthumbloaderfunctionalityofLibRawCommitd20315b.Aspecially 20889craftedmaliciousfilecanleadtoaheapbufferoverflow.Anattackercanprovideamaliciousfiletotriggerthisvulnerability. CVE-2026-Server-siderequestforgery(ssrf)inAzureCustomLocationsResourceProvider(RP)allowsanauthorizedattackertoelevate 9.6 MoreDetails26135privilegesoveranetwork. TheStackfieldDesktopAppbefore1.10.2formacOSandWindowscontainsapathtraversalvulnerabilityincertaindecryptionCVE-2026-functionalitywhenprocessingthefilePathproperty.Amaliciousexportcanwritearbitrarycontenttoanypathonthevictim's 9.6 MoreDetails28373filesystem. UseafterfreeinWebViewinGoogleChromeonAndroidpriorto146.0.7680.178allowedaremoteattackerwhohadCVE-2026-compromisedtherendererprocesstopotentiallyperformasandboxescapeviaacraftedHTMLpage.(Chromiumsecurity 9.6 MoreDetails5288severity:High) CVE-2026-UseafterfreeinCompositinginGoogleChromepriorto146.0.7680.178allowedaremoteattackerwhohadcompromisedthe 9.6 MoreDetails5290rendererprocesstopotentiallyperformasandboxescapeviaacraftedHTMLpage.(Chromiumsecurityseverity:High) CVE-2026-UseafterfreeinNavigationinGoogleChromepriorto146.0.7680.178allowedaremoteattackerwhohadcompromisedthe 9.6 MoreDetails5289rendererprocesstopotentiallyperformasandboxescapeviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Budibaseisanopen-sourcelow-codeplatform.Priortoversion3.33.4,aserver-siderequestforgery(SSRF)vulnerabilityexists inBudibase'sRESTdatasourceconnector.Theplatform'sSSRFprotectionmechanism(IPblacklist)isrenderedcompletelyCVE-2026-ineffectivebecausetheBLACKLISTIPSenvironmentvariableisnotsetbydefaultinanyoftheofficialdeployment 9.6 MoreDetails31818configurations.Whenthisvariableisempty,theblacklistfunctionunconditionallyreturnsfalse,allowingallrequeststhrough withoutrestriction.Thisissuehasbeenpatchedinversion3.33.4. SignalKServerisaserverapplicationthatrunsonacentralhubinaboat.Priortoversion2.24.0-beta.4,thereisaprivilege CVE-2026-escalationvulnerabilitybyAdminRoleInjectionvia/enableSecurity.AnunauthenticatedattackercangainfullAdministrator 9.4 MoreDetails33950accesstotheSignalKserveratanytime,allowingthemtomodifysensitivevesselroutingdata,alterserverconfigurations,and accessrestrictedendpoints.Thisissuehasbeenpatchedinversion2.24.0-beta.4. @delmaredigital/payload-puckisaPayloadCMSpluginforintegratingPuckvisualpagebuilder.Priorto0.6.23,all/api/puck/* CRUDendpointhandlersregisteredbycreatePuckPlugin()calledPayload'slocalAPIwiththedefaultoverrideAccess:true,CVE-2026- 9.4 MoreDetailsbypassingallcollection-levelaccesscontrol.TheaccessoptionpassedtocreatePuckPlugin()andanyaccessrulesdefinedon39397 Puck-registeredcollectionsweresilentlyignoredontheseendpoints.Thisvulnerabilityisfixedin0.6.23.
CVE-2026- AspecificendpointexposesalluseraccountinformationforregisteredGardynuserswithoutrequiringauthentication. 9.3 MoreDetails 28766 PraisonAIisamulti-agentteamssystem.Priortoversion4.5.97,OAuthManager.validate_token()returnsTrueforanytokennot CVE-2026- foundinitsinternalstore,whichisemptybydefault.AnyHTTPrequesttotheMCPserverwithanarbitraryBearertokenis 34953 treatedasauthenticated,grantingfullaccesstoallregisteredtoolsandagentcapabilities.Thisissuehasbeenpatchedin version4.5.97. AIOHTTPisanasynchronousHTTPclient/serverframeworkforasyncioandPython.Priortoversion3.13.4,theCparser(theCVE-2026- defaultformostinstalls)acceptednullbytesandcontrolcharactersinresponseheaders.Thisissuehasbeenpatchedinversion34520 3.13.4.
andthemesupport.Priortoversion0.31.0.0,theapplicationfailstoproperlysanitizeuser-controlledinputwithinthePage CVE-2026-Managementfunctionalitywhencreatingoreditingpages.Multipleinputfieldsacceptattacker-controlledJavaScriptpayloads 34566thatarestoredserver-side.Thesestoredvaluesarelaterrenderedwithoutproperoutputencodingacrossadministrativepage listsandpublic-facingpageviews,leadingtostoredDOM-basedcross-sitescripting(XSS).Thisissuehasbeenpatchedin version0.31.0.0.
andthemesupport.Priortoversion0.31.0.0,theapplicationfailstoproperlysanitizeuser-controlledinputwhenaddingPoststo CVE-2026-navigationmenusthroughtheMenuManagementfunctionality.Post-relateddataselectedviathePostssectionisstoredserver- 34565sideandrenderedwithoutproperoutputencoding.Thesestoredvaluesarelaterrenderedunsafelywithinadministrative dashboardsandpublic-facingnavigationmenus,resultinginstoredDOM-basedcross-sitescripting(XSS).Thisissuehasbeen patchedinversion0.31.0.0.
andthemesupport.Priortoversion0.31.0.0,theapplicationfailstoproperlysanitizeuser-controlledinputwhenaddingPages CVE-2026-tonavigationmenusthroughtheMenuManagementfunctionality.Page-relateddataselectedviathePagessectionisstored 34564server-sideandrenderedwithoutproperoutputencoding.Thisstoredpayloadislaterrenderedunsafelywithinadministrative interfacesandpublic-facingnavigationmenus,leadingtostoredDOM-basedcross-sitescripting(XSS).Thisissuehasbeen patchedinversion0.31.0.0.
andthemesupport.Priortoversion0.31.0.0,theapplicationfailstoproperlysanitizeuser-controlledinputwhenhandling CVE-2026-backupuploadsandprocessingbackupmetadata.AnattackercaninjectamaliciousJavaScriptpayloadintothebackup 34563filenameviatheuploadedxss.sql,whichusesSQLfunctionalitytoinserttheXSSpayloadserver-side.Thisstoredpayloadis laterrenderedunsafelyinmultiplebackupmanagementviewswithoutproperoutputencoding,leadingtostoredblindcross- sitescripting(BlindXSS).Thisissuehasbeenpatchedinversion0.31.0.0.
andthemesupport.Priortoversion0.31.0.0,theapplicationrendersuser-controlledinputunsafelywithinthelogsinterface.IfCVE-2026-anystoredXSSpayloadexistswithinloggeddata,itisrenderedwithoutproperoutputencoding.ThisissuebecomesaBlind34560XSSscenariobecausetheattackerdoesnotseeimmediateexecution.Instead,thepayloadisstoredwithinapplicationlogsand onlyexecuteslaterwhenanadministratorviewsthelogspage.Thisissuehasbeenpatchedinversion0.31.0.0.
CVE-2026- editingblogtags.AnattackercaninjectamaliciousJavaScriptpayloadintothetagnamefield,whichisthenstoredserver-side.34559 Thisstoredpayloadislaterrenderedunsafelyacrosspublictagpagesandadministrativeinterfaceswithoutproperoutput encoding,leadingtostoredcross-sitescripting(XSS).Thisissuehasbeenpatchedinversion0.31.0.0. CVE-2026- AnissuewasdiscoveredinMbedTLS3.5.0through4.0.0.ClientimpersonationcanoccurwhileresumingaTLS1.3session. 9.1 MoreDetails34873 AnissuewasdiscoveredinMbedTLS3.5.xand3.6.xthrough3.6.5andTF-PSA-Crypto1.0.Thereisalackofcontributory behaviorinFFDHduetoimproperinputvalidation.Usingfinite-fieldDiffie-Hellman,theotherpartycanforcethesharedsecretCVE-2026- intoasmallsetofvalues(lackofcontributorybehavior).Thisisaproblemforprotocolsthatdependoncontributorybehavior34872 (whichisnotthecaseforTLS).Theattackcanbecarriedbythepeer,ordependingontheprotocolbyanactivenetwork attacker(personinthemiddle). PraisonAIisamulti-agentteamssystem.Priortoversion4.5.97,thePraisonAIGatewayserveracceptsWebSocketconnectionsCVE-2026- at/wsandservesagenttopologyat/infowithnoauthentication.Anynetworkclientcanconnect,enumerateregisteredagents,34952 andsendarbitrarymessagestoagentsandtheirtoolsets.Thisissuehasbeenpatchedinversion4.5.97. EmissaryisaP2Pbaseddata-drivenworkflowengine.Priorto8.39.0,GitHubActionsworkflowfilescontainedshellinjection CVE-2026- pointswhereuser-controlledworkflowdispatchinputswereinterpolateddirectlyintoshellcommandsvia${{}}expression 35580 syntax.Anattackerwithrepositorywriteaccesscouldinjectarbitraryshellcommands,leadingtorepositorypoisoningand supplychaincompromiseaffectingalldownstreamusers.Thisvulnerabilityisfixedin8.39.0. Reviactylisanopen-sourcegameservermanagementpanelbuiltusingLaravel,React,FilamentPHP,Vite,andGo.Fromversion 26.2.0-beta.1tobeforeversion26.2.0-beta.5,avulnerabilityintheOAuthauthenticationflowallowedautomaticlinkingof CVE-2026- socialaccountsbasedsolelyonmatchingemailaddresses.Anattackercouldcreateorcontrolasocialaccount(e.g.,Google, 34456 GitHub,Discord)usingavictim'semailaddressandgainfullaccesstothevictim'saccountwithoutknowingtheirpassword. Thisresultsinafullaccounttakeoverwithnopriorauthenticationrequired.Thisissuehasbeenpatchedinversion26.2.0- beta.5. ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto6.5.3,apathtraversalvulnerabilityinChurchCRM'sbackup restorefunctionalityallowsauthenticatedadministratorstouploadarbitraryfilesandachieveremotecodeexecutionbyCVE-2026- overwritingApache.htaccessconfigurationfiles.Thevulnerabilityexistsinsrc/ChurchCRM/Backup/RestoreJob.php.The35573 $rawUploadedFile['name']parameterisuser-controlledandallowsuploadingfileswitharbitrarynamesto /var/www/html/tmpattach/ChurchCRMBackups/.Thisvulnerabilityisfixedin6.5.3. Payloadisafreeandopensourceheadlesscontentmanagementsystem.Priortoversion3.79.1in@payloadcms/graphqlandCVE-2026- payload,avulnerabilityinthepasswordrecoveryflowcouldallowanunauthenticatedattackertoperformactionsonbehalfofa34751 userwhoinitiatesapasswordreset.Thisissuehasbeenpatchedinversion3.79.1for@payloadcms/graphqlandpayload. ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,acriticalauthenticationbypassvulnerabilityin
CVE-2026- ChurchCRM'sAPImiddleware(ChurchCRM/Slim/Middleware/AuthMiddleware.php)allowsunauthenticatedattackerstoaccessall 39339 protectedAPIendpointsbyincluding"api/public"anywhereintherequestURL,leadingtocompleteexposureofchurchmember dataandsysteminformation.Thisvulnerabilityisfixedin7.1.0. DockerModelRunner(DMR)issoftwareusedtomanage,run,anddeployAImodelsusingDocker.Priortoversion1.1.25, DockerModelRunnercontainsanSSRFvulnerabilityinitsOCIregistrytokenexchangeflow.Whenpullingamodel,Model RunnerfollowstherealmURLfromtheregistry'sWWW-Authenticateheaderwithoutvalidatingthescheme,hostname,orIP range.AmaliciousOCIregistrycansettherealmtoaninternalURL(e.g.,http://127.0.0.1:3000/),causingModelRunnerCVE-2026- runningonthehosttomakearbitraryGETrequeststointernalservicesandreflectthefullresponsebodybacktothecaller.33990 Additionally,thetokenexchangemechanismcanrelaydatafrominternalservicesbacktotheattacker-controlledregistryvia theAuthorization:Bearerheader.Thisissuehasbeenpatchedinversion1.1.25.ForDockerDesktopusers,enablingEnhanced ContainerIsolation(ECI)blockscontaineraccesstoModelRunner,preventingexploitation.However,iftheDockerModel RunnerisexposedtolocalhostoverTCPinspecificconfigurations,thevulnerabilityisstillexploitable. TheOrderNotificationforWooCommerceWordPresspluginbefore3.6.3overridesWooCommerce'spermissioncheckstograntCVE-2025- fullaccesstoallunauthenticatedrequests,enablingcompleteread/writeaccesstostoreresourceslikeproducts,coupons,and15484 customers.
CVE-2026- editingblogpostswithintheCategoriessection.AnattackercaninjectamaliciousJavaScriptpayloadintotheCategories 34567 content,whichisthenstoredserver-side.ThisstoredpayloadislaterrenderedunsafelywhentheCategoriesareviewedvia blogposts,withoutproperoutputencoding,leadingtostoredcross-sitescripting(XSS).Thisissuehasbeenpatchedinversion 0.31.0.0.
CVE-2026- editingblogposts.AnattackercaninjectamaliciousJavaScriptpayloadintoblogpostcontent,whichisthenstoredserver-side.34568 Thisstoredpayloadislaterrenderedunsafelyinmultipleapplicationviewswithoutproperoutputencoding,leadingtostored cross-sitescripting(XSS).Thisissuehasbeenpatchedinversion0.31.0.0. pyLoadisafreeandopen-sourcedownloadmanagerwritteninPython.In0.5.0b3.dev96andearlier,pyLoadhasaserver-side requestforgery(SSRF)vulnerability.ThefixforCVE-2026-33992addedIPvalidationtoBaseDownloader.download()thatchecksCVE-2026- thehostnameoftheinitialdownloadURL.However,pycurlisconfiguredwithFOLLOWLOCATION=1andMAXREDIRS=10,35459 causingittoautomaticallyfollowHTTPredirects.RedirecttargetsarenevervalidatedagainsttheSSRFfilter.Anauthenticated userwithADDpermissioncanbypasstheSSRFfixbysubmittingaURLthatredirectstoaninternaladdress. LiteLLMisaproxyserver(AIGateway)tocallLLMAPIsinOpenAI(ornative)format.Priorto1.83.0,whenJWTauthenticationis enabled(enablejwtauth:true),theOIDCuserinfocacheusestoken[:20]asthecachekey.JWTheadersproducedbythesame CVE-2026- signingalgorithmgenerateidenticalfirst20characters.Thisconfigurationoptionisnotenabledbydefault.Mostinstancesare 35030 notaffected.Anunauthenticatedattackercancraftatokenwhosefirst20charactersmatchalegitimateuser'scachedtoken. Oncachehit,theattackerinheritsthelegitimateuser'sidentityandpermissions.ThisaffectsdeploymentswithJWT/OIDC authenticationenabled.Fixedinv1.83.0. HirschmannHiLCOSOpenBATandBAT450productscontainafirewallbypassvulnerabilityinIPv6IPsecdeploymentsthatallows CVE-2021- trafficfromVPNconnectionstobypassconfiguredfirewallrules.AttackerscanexploitthisvulnerabilitybyestablishingIPv6 4477 IPsecconnections(IKEv1orIKEv2)whilesimultaneouslyusinganIPv6Internetconnectiontocircumventfirewallpolicy enforcement. CVE-2026- GLPIisafreeassetandITmanagementsoftwarepackage.From11.0.0tobefore11.0.6,templateinjectionbyanadministrator 26026 leadtoRCE.Thisvulnerabilityisfixedin11.0.6. ProSoftTechnologyICX35-HWCversion1.3andpriorcellulargatewayscontainanauthenticationbypassvulnerabilityinthe CVE-2017- webuserinterfacethatallowsunauthenticatedattackerstogainaccesstoadministrativefunctionswithoutvalidcredentials. 20235 Attackerscanbypasstheauthenticationmechanisminaffectedfirmwareversionstoobtainfulladministrativeaccesstodevice configurationandsettings. CVE-2026- AspecificendpointallowsauthenticateduserstopivottootheruserprofilesbymodifyingtheidnumberintheAPIcall. 9.1 MoreDetails25197 fast-jwtprovidesfastJSONWebToken(JWT)implementation.In6.1.0andearlier,thepublicKeyPemMatcherregexinfast-CVE-2026- jwt/src/crypto.jsusesa^anchorthatisdefeatedbyanyleadingwhitespaceinthekeystring,re-enablingtheexactsameJWT34950 algorithmconfusionattackthatCVE-2023-48223patched. AnunauthenticatedremoteattackercanexploitanunauthenticatedSQLInjectionvulnerabilityinthesetinfoendpointduetoCVE-2026- improperneutralizationofspecialelementsinaSQLUPDATEcommand.Thiscanresultinatotallossofintegrityand33615 availability. CVE-2026- MissingauthenticationforcriticalfunctioninAzureMCPServerallowsanunauthorizedattackertodiscloseinformationovera 32211 network. fast-jwtprovidesfastJSONWebToken(JWT)implementation.From0.0.1tobefore6.1.0,settingupacustomcacheKeyBuilder CVE-2026- methodwhichdoesnotproperlycreateuniquekeysfordifferenttokenscanleadtocachecollisions.Thiscouldcausetokensto 35039 bemis-identifiedduringtheverificationprocessleadingtovalidtokensreturningclaimsfromdifferentvalidtokensandusers beingmis-identifiedasotherusersbasedonthewrongtoken. text-generation-webuiisanopen-sourcewebinterfaceforrunningLargeLanguageModels.Priorto4.1.1,userscansave CVE-2026- extentionsettingsin"py"formatandintheapprootdirectory.Thisallowstooverwritepythonfiles,forinstancethe"download- 35050 model.py"filecouldbeoverwritten.Then,thispythonfilecanbetriggeredtogetexecutedfrom"Model"menuwhenrequesting todownloadanewmodel.Thisvulnerabilityisfixedin4.1.1. OneUptimeisanopen-sourcemonitoringandobservabilityplatform.Priortoversion10.0.42,unauthenticatedaccesstoCVE-2026- NotificationtestandPhoneNumbermanagementendpointsallowsSMS/Call/Email/WhatsAppabuseandphonenumber34758 purchase.Thisissuehasbeenpatchedinversion10.0.42. ChyrpLiteisanultra-lightweightbloggingengine.Priorto2026.01,apathtraversalvulnerabilityexistsintheadministration CVE-2026- consolethatallowsanadministratororauserwithChangeSettingspermissiontochangetheuploadspathtoanyfolder.This 35174 vulnerabilityallowstheusertodownloadanyfileontheserver,includingconfig.json.phpwithdatabasecredentialsand
overwritecriticalsystemfiles,leadingtoremotecodeexecution.Thisvulnerabilityisfixedin2026.01. AnissuewasdiscoveredinL2inSamsungMobileProcessor,WearableProcessor,andModemExynos980,990,850,1080,CVE-2025-2100,1280,2200,1330,1380,1480,2400,1580,2500,9110,W920,W930,W1000,Modem5123,Modem5300,andModem583495400.IncorrecthandlingofLTEMACpacketscontainingmanyMACControlElements(CEs)leadstobasebandcrashes. Firesharefacilitatesself-hostedmediaandlinksharing.Priortoversion1.5.3,thefixforCVE-2026-33645wasappliedtothe CVE-2026-authenticated/api/uploadChunkedendpointbutwasnotappliedtotheunauthenticated/api/uploadChunked/publicendpointin 34745thesamefile(app/server/fireshare/api.py).AnunauthenticatedattackercanexploitthecheckSumparametertowritearbitrary fileswithattacker-controlledcontenttoanywritablepathontheserverfilesystem.Thisissuehasbeenpatchedinversion1.5.3. CVE-2026-Authenticatedusercanuploadamaliciousfiletotheserverandexecuteit,whichleadstoremotecodeexecution. 9.1 MoreDetails2701 Emmettisafull-stackPythonwebframeworkdesignedwithsimplicity.From2.5.0tobefore2.8.1,theRSGIstatichandlerforCVE-2026-Emmett'sinternalassets(/emmettpaths)isvulnerabletopathtraversalattacks.Anattackercanuse../sequences(eg39847/emmett/../rsgi/handlers.py)toreadarbitraryfilesoutsidetheassetsdirectory.Thisvulnerabilityisfixedin2.8.1. Budibaseisanopen-sourcelow-codeplatform.Priortoversion3.33.4,anunauthenticatedattackercanachieveRemoteCode CVE-2026-Execution(RCE)ontheBudibaseserverbytriggeringanautomationthatcontainsaBashstepviathepublicwebhookendpoint. 9.0 MoreDetails35216Noauthenticationisrequiredtotriggertheexploit.Theprocessexecutesasrootinsidethecontainer.Thisissuehasbeen patchedinversion3.33.4. PraisonAIisamulti-agentteamssystem.Priorto1.5.113,theActionOrchestratorfeaturecontainsaPathTraversalvulnerability CVE-2026-thatallowsanattacker(orcompromisedagent)towritetoarbitraryfilesoutsideoftheconfiguredworkspacedirectory.By 9.0 MoreDetails39305supplyingrelativepathsegments(../)inthetargetpath,maliciousactionscanoverwritesensitivesystemfilesordrop executablepayloadsonthehost.Thisvulnerabilityisfixedin1.5.113. ZimaOSisaforkofCasaOS,anoperatingsystemforZimadevicesandx86-64systemswithUEFI.Priortoversion1.5.3,aproxy endpoint(/v1/sys/proxy)exposedbyZimaOS'swebinterfacecanbeabused(viaanexternallyreachabledomainusingaCVE-2026-CloudflareTunnel)tomakerequeststointernallocalhostservices.Thisresultsinunauthenticatedaccesstointernal-only 9.0 MoreDetails28798endpointsandsensitivelocalserviceswhentheproductisreachablefromtheInternetthroughaCloudflareTunnel.Thisissue hasbeenpatchedinversion1.5.3. SiYuanisapersonalknowledgemanagementsystem.Priorto3.6.4,amaliciousnotesyncedtoanotherusercantriggerremote codeexecutionintheSiYuanElectrondesktopclient.Therootcauseisthattablecaptioncontentisstoredwithoutsafe escapingandlaterunescapedintorenderedHTML,creatingastoredXSSsink.BecausethedesktoprendererrunswithCVE-2026- 9.0 MoreDetailsnodeIntegrationenabledandcontextIsolationdisabled,attacker-controlledJavaScriptexecuteswithaccesstoNode.jsAPIs.In39846practice,anattackercanimportacraftednoteintoasyncedworkspace,waitforthevictimtosync,andachievecode executionwhenthevictimopensthenote.Thisvulnerabilityisfixedin3.6.4.
OTHERVULNERABILITIES
CVE DescriptionNumber
CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,astoredcross-sitescriptingvulnerabilityexistsinChurchCRM'spersonprofileeditingfunctionality.Non-administrativeuserswhohavetheEditSelfpermissioncaninject 2026- maliciousJavaScriptintotheirFacebook,LinkedIn,andXprofilefields.Duetoa50-characterfieldlimit,thepayloadisdistributedacrossallthreefieldsandchainstheironfocuseventhandlerstoexecuteinsequence.Whenanyuser,including 39328 administrators,viewstheattacker'sprofile,theirsessioncookiesareexfiltratedtoaremoteserver.Thisvulnerabilityisfixedin7.1.0. CVE- pyLoadisafreeandopen-sourcedownloadmanagerwritteninPython.In0.5.0b3.dev96andearlier,theADMINONLYOPTIONSprotectionmechanismrestrictssecurity-criticalconfigurationvalues(reconnectscripts,SSLcerts,proxycredentials)to 2026- admin-onlyaccess.However,thisprotectionisonlyappliedtocoreconfigoptions,nottopluginconfigoptions.TheAntiViruspluginstoresanexecutablepath(avfile)initsconfig,whichispasseddirectlytosubprocess.Popen().Anon-adminuserwith 35463 SETTINGSpermissioncanchangethispathtoachieveremotecodeexecution. CVE- 2025- Theissuewasaddressedwithimprovedmemoryhandling.ThisissueisfixedinmacOSSequoia15.6.Processingamaliciouslycraftedimagemaycorruptprocessmemory. 43219 CVE- AvulnerabilityhasbeenfoundinBelkinF9K10151.00.10.AffectedbythisissueisthefunctionformWISP5Gofthefile/goform/formWISP5G.Suchmanipulationoftheargumentwebpageleadstostack-basedbufferoverflow.Itispossibletolaunch2026- theattackremotely.Theexploithasbeendisclosedtothepublicandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5610 CI4MSisaCodeIgniter4-basedCMSskeletonthatdeliversaproduction-ready,modulararchitecturewithRBACauthorizationandthemesupport.Priortoversion0.31.0.0,theapplicationfailstoimmediatelyrevokeactiveusersessionswhenanCVE- accountisdeactivated.Duetoalogicflawinthebackenddesign,accountstatechangesareenforcedonlyduringauthentication(login),notforalready-establishedsessions.Thesystemimplicitlyassumesthatauthenticatedusersremaintrustedfor2026- thelifetimeoftheirsession.Thereisnosessionexpirationoraccountexpirationmechanisminplace,causingdeactivatedaccountstoretainindefiniteaccessuntiltheusermanuallylogsout.Thisbehaviorbreakstheintendedaccesscontrolpolicy34572 andresultsinpersistentunauthorizedaccess,representingacriticalsecurityflaw.Thisissuehasbeenpatchedinversion0.31.0.0. CVE- 2025- Thisissuewasaddressedwithimprovedmemoryhandling.ThisissueisfixediniOS18.6andiPadOS18.6,macOSSequoia15.6.Processingafilemayleadtomemorycorruption. 43202 CVE- UnsanitizedinputintheFileBrowserAPIinAWSResearchandEngineeringStudio(RES)version2024.10through2025.12.01mightallowaremoteauthenticatedactortoexecutearbitrarycommandsonthecluster-managerEC2instanceviacrafted2026- inputwhenusingtheFileBrowserfunctionality.Toremediatethisissue,usersareadvisedtoupgradetoRESversion2026.03orapplythecorrespondingmitigationpatchtotheirexistingenvironment.5709 CVE- Unsanitizedcontrolofuser-modifiableattributesinthesessioncreationcomponentinAWSResearchandEngineeringStudio(RES)priortoversion2026.03couldallowanauthenticatedremoteusertoescalateprivileges,assumethevirtualdesktop 2026- hostinstanceprofilepermissions,andinteractwithAWSresourcesandservicesviaacraftedAPIrequest.Toremediatethisissue,usersareadvisedtoupgradetoRESversion2026.03orapplythecorrespondingmitigationpatchtotheirexisting 5708 environment. CVE- UnsanitizedinputinanOScommandinthevirtualdesktopsessionnamehandlinginAWSResearchandEngineeringStudio(RES)version2025.03through2025.12.01mightallowaremoteauthenticatedactortoexecutearbitrarycommandsasroot2026- onthevirtualdesktophostviaacraftedsessionname.Toremediatethisissue,usersareadvisedtoupgradetoRESversion2026.03orapplythecorrespondingmitigationpatchtotheirexistingenvironment. CVE- AweaknesshasbeenidentifiedinTendaCX12L16.03.53.12.ThisissueaffectsthefunctionfromNatStaticSettingofthefile/goform/NatStaticSetting.Thismanipulationoftheargumentpagecausesstack-basedbufferoverflow.Theattackmaybe initiatedremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks.
CVE- AsecurityflawhasbeendiscoveredinTendaCX12L16.03.53.12.ThisvulnerabilityaffectsthefunctionfromRouteStaticofthefile/goform/RouteStatic.Themanipulationoftheargumentpageresultsinstack-basedbufferoverflow.Theattackcanbe launchedremotely.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks. CVE- AvulnerabilitywasidentifiedinTendaCX12L16.03.53.12.ThisaffectsthefunctionfromAddressNatofthefile/goform/addressNat.Themanipulationoftheargumentpageleadstostack-basedbufferoverflow.Theattackcanbeinitiatedremotely. Theexploitispubliclyavailableandmightbeused.5685 CVE- HiSecOSwebserverversions03.4.00priorto04.1.00containsaprivilegeescalationvulnerabilitythatallowsauthenticateduserswithoperatororauditorrolestoescalateprivilegestotheadministratorrolebysendingspeciallycraftedpacketstothe2023- webserver.Attackerscanexploitthisflawtogainfulladministrativeaccesstotheaffecteddevice.7342 CI4MSisaCodeIgniter4-basedCMSskeletonthatdeliversaproduction-ready,modulararchitecturewithRBACauthorizationandthemesupport.Priortoversion0.31.0.0,theapplicationfailstoimmediatelyrevokeactiveusersessionswhenanCVE- accountisdeleted.Duetoalogicflawinthebackenddesign,accountstatechangesareenforcedonlyduringauthentication(login),notforalready-establishedsessions.Thesystemimplicitlyassumesthatauthenticatedusersremaintrustedforthe2026- lifetimeoftheirsession.Thereisnosessionexpirationoraccountexpirationmechanisminplace,causingdeletedaccountstoretainindefiniteaccessuntiltheusermanuallylogsout.Thisbehaviorbreakstheintendedaccesscontrolpolicyand34570 resultsinpersistentunauthorizedaccess.Thisissuehasbeenpatchedinversion0.31.0.0. CVE- ByteDanceDeer-Flowversionspriortocommit92c7a20containasandboxescapevulnerabilityinbashtoolhandlingthatallowsattackerstoexecutearbitrarycommandsonthehostsystembybypassingregex-basedvalidationusingshellfeatures 2026- suchasdirectorychangesandrelativepaths.Attackerscanexploittheincompleteshellsemanticsmodelingtoreadandmodifyfilesoutsidethesandboxboundaryandachievearbitrarycommandexecutionthroughsubprocessinvocationwithshell 34430 interpretationenabled. CVE- Alocalfileinclusionvulnerabilityintheupload/downloadflowoftheVertiGISFMapplicationallowsauthenticatedattackerstoreadarbitraryfilesfromtheserverbymanipulatingafile'spathduringitsupload.Whenthefileissubsequently 2026- downloaded,thefileintheattackercontrolledpathisreturned.Duetotheapplication'sASP.NETarchitecture,thiscouldpotentiallyleadtoremotecodeexecutionwhenthe"web.config"fileisobtained.Furthermore,theapplicationresolvesUNC 0522 pathswhichmayenableNTLM-relayingattacks.ThisissueaffectsVertiGISFM:10.5.00119(0d29d428). CVE- AsecurityvulnerabilityhasbeendetectedinBelkinF9K10151.00.10.ImpactedisthefunctionformSetSystemSettingsofthefile/goform/formSetSystemSettingsofthecomponentSettingHandler.Themanipulationoftheargumentwebpageleadsto2026- stack-basedbufferoverflow.Remoteexploitationoftheattackispossible.Theexploithasbeendisclosedpubliclyandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5628 CVE- AvulnerabilitywasdeterminedinBelkinF9K10151.00.10.ThisvulnerabilityaffectsthefunctionformWlEncryptofthefile/goform/formWlEncrypt.Executingamanipulationoftheargumentwebpagecanleadtostack-basedbufferoverflow.The2026- attackcanbelaunchedremotely.Theexploithasbeenpubliclydisclosedandmaybeutilized.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5612 CVE- ThewpForoForumpluginforWordPressisvulnerabletoarbitraryfiledeletioninallversionsupto,andincluding,2.4.16.Thisisduetoamissingfilename/pathvalidationagainstpathtraversalsequences.Thismakesitpossibleforauthenticated2026- attackers,withsubscriberlevelaccessandabove,todeletearbitraryfilesontheserverbyembeddingacraftedpathtraversalstringinaforumpostbodyandthendeletingthepost.3666 CVE- InsufficientpermissionvalidationonmultipleRESTAPIQuickSetupendpointsinCheckmk2.5.0(beta)beforeversion2.5.0b2and2.4.0beforeversion2.4.0p25allowslow-privilegeduserstoperformunauthorizedactionsorobtainsensitive2026- information24096 CVE- WeGIAisaWebmanagerforcharitableinstitutions.Priorto3.6.9,WeGIA(Webgerenciadorparainstituiçõesassistenciais)containsaSQLinjectionvulnerabilityindao/memorando/DespachoDAO.php.Theidmemorandoparameterisextractedfrom2026- $REQUESTwithoutvalidationanddirectlyinterpolatedintoSQLqueries,allowinganyauthenticatedusertoexecutearbitrarySQLcommandsagainstthedatabase.Thisvulnerabilityisfixedin3.6.9.35395 CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,aSQLinjectionvulnerabilityexistsinChurchCRM'sSettingsIndividual.phpwhereuser-controlledarraykeysfromthetypePOSTparameterareuseddirectlyinSQLqueries2026- withoutsanitization.Thisallowsanyauthenticatedusertoextractsensitivedatafromthedatabase.Thisvulnerabilityisfixedin7.1.0.39317 CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,theGroupPropsFormRowOps.phpfilecontainsaSQLinjectionvulnerability.UserinputintheFieldparameterisdirectlyinsertedintoSQLquerieswithoutpropersanitization.2026- Themysqlirealescapestring()functiondoesnotescapebacktickcharacters,allowingattackerstobreakoutofSQLidentifiercontextandexecutearbitrarySQLstatements.Thisvulnerabilityisfixedin7.1.0.39318 CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,asecondorderSQLinjectionvulnerabilitywasfoundintheendpoint/FundRaiserEditor.phpinChurchCRM.Auserhastobeauthenticatedbutdoesn'tneedanyprivileges.2026- TheseuserscaninjectarbitrarySQLstatementsthroughtheiCurrentFundraiserPHPsessionparameterandthusextractandmodifyinformationfromthedatabase.Thisvulnerabilityisfixedin7.1.0.39319 CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,acriticalSQLinjectionvulnerabilityexistsinChurchCRM'sPropertyTypeEditor.phpwheretheNameandDescriptionPOSTparametersaresanitizedonlywithstriptags()before 2026- directconcatenationintoSQLqueries.Thisallowsauthenticateduserswith"ManageProperties"permissiontoexecutearbitrarySQLcommandsincludingdataexfiltration,modification,anddeletion.Injecteddatapersistsinthedatabaseandis 39323 reflectedacrossmultipleapplicationpageswithoutoutputencoding.Thisvulnerabilityisfixedin7.1.0. CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,anSQLinjectionvulnerabilitywasfoundintheendpoint/PropertyTypeEditor.phpinChurchCRM.AuthenticateduserswiththeroleisMenuOptionsEnabledcaninjectarbitrary2026- SQLstatementsthroughtheNameandDescriptionparametersandthusextractandmodifyinformationfromthedatabase.Thisvulnerabilityisfixedin7.1.0.39326 CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,anSQLinjectionvulnerabilitywasfoundintheendpoint/MemberRoleChange.phpinChurchCRM7.0.5.AuthenticateduserswiththeroleManageGroups&Roles2026- (ManageGroups)caninjectarbitrarySQLstatementsthroughtheNewRoleparameterandthusextractandmodifyinformationfromthedatabase.Thisvulnerabilityisfixedin7.1.0.39327 CVE- PraisonAIisamulti-agentteamssystem.Priortoversion4.5.97,SubprocessSandboxinallmodes(BASIC,STRICT,NETWORK_ISOLATED)callssubprocess.run()withshell=Trueandreliessolelyonstring-patternmatchingtoblockdangerous2026- commands.Theblocklistdoesnotincludeshorbashasstandaloneexecutables,allowingtrivialsandboxescapeinSTRICTmodeviash-c' '.Thisissuehasbeenpatchedinversion4.5.97.34955 CVE- AvulnerabilitywasidentifiedinBelkinF9K10151.00.10.ThisissueaffectsthefunctionformRebootofthefile/goform/formReboot.Themanipulationoftheargumentwebpageleadstostack-basedbufferoverflow.Theattackmaybeinitiated2026- remotely.Theexploitispubliclyavailableandmightbeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5613 CVE- AsecurityflawhasbeendiscoveredinBelkinF9K10151.00.10.ImpactedisthefunctionformSetPasswordofthefile/goform/formSetPassword.Themanipulationoftheargumentwebpageresultsinstack-basedbufferoverflow.Theattackmaybe2026- launchedremotely.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5614 CVE- AsecurityflawhasbeendiscoveredinUTTHiPER1250GWupto3.2.7-210907-180535.Theimpactedelementisanunknownfunctionofthefile/goform/formRemoteControl.ThemanipulationoftheargumentProfileresultsinstack-basedbuffer2026- overflow.Theattackcanbeexecutedremotely.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks. CVE- Aflawwasfoundinlibinput.AlocalattackerwhocanplaceaspeciallycraftedLuabytecodefileincertainsystemoruserconfigurationdirectoriescanbypasssecurityrestrictions.Thisallowstheattackertorununauthorizedcodewiththesame permissionsastheprogramusinglibinput,suchasagraphicalcompositor.Thiscouldleadtotheattackermonitoringkeyboardinputandsendingthatinformationtoanexternallocation.35093
CVE- PolarLearnisafreeandopen-sourcelearningprogram.In0-PRERELEASE-14andearlier,setCustomPassword(userId,password)anddeleteUser(userId)intheaccount-managementmoduleusedaninvertedadmincheck.Becauseoftheinverted condition,authenticatednon-adminuserswereallowedtoexecutebothactions,whilerealadminswererejected.Thisisadirectprivilege-escalationissueintheapplication. 35610 CVE- AflawhasbeenfoundinTendai121.0.0.11(3862).AffectedbythisvulnerabilityisthefunctionformwrlSSIDsetofthefile/goform/wifiSSIDsetofthecomponentParameterHandler.Thismanipulationoftheargumentindex/wlradiocausesstack- basedbufferoverflow.Itispossibletoinitiatetheattackremotely.Theexploithasbeenpublishedandmaybeused.5609 CVE- phpBBcontainsanarbitraryfileuploadvulnerabilitythatallowsauthenticatedattackerstouploadmaliciousfilesbyexploitingthepluploadfunctionalityandphar://streamwrapper.AttackerscanuploadacraftedzipfilecontainingserializedPHP2019- objectsthatexecutearbitrarycodewhendeserializedthroughtheimagickparameterinattachmentsettings.25685 CVE- 2026- IncorrectboundaryconditionsintheGraphics:WebGPUcomponent.ThisvulnerabilityaffectsFirefox<149.0.2andThunderbird<149.0.2. 5733 CVE- 2026- Incorrectboundaryconditions,integeroverflowintheGraphics:Textcomponent.ThisvulnerabilityaffectsFirefox<149.0.2,FirefoxESR<140.9.1,Thunderbird<149.0.2,andThunderbird<140.9.1. 5732 CVE- Avulnerabilityhasbeenidentifiedinthegraphicaluserinterface(GUI)ofHPEArubaNetworkingPrivate5GCoreOn-PremthatcouldallowanattackertoabuseanopenredirectvulnerabilityintheloginflowusingacraftedURL.Successful 2026- exploitationmayredirectanauthenticatedusertoanattacker-controlledserverhostingaspoofedloginpagepromptingtheunsuspectingvictimtogiveawaytheircredentials,whichcouldthenbecapturedbytheattacker,beforebeingredirected 23818 backtothelegitimateloginpage. CVE- FTLDNS(pihole-FTL)providesaninteractiveAPIandalsogeneratesstatisticsforPi-hole'sWebinterface.From6.0tobefore6.6,thePi-holeFTLenginecontainsaRemoteCodeExecution(RCE)vulnerabilityintheupstreamDNSserversconfiguration 2026- parameter(dns.upstreams).Thisvulnerabilityallowsanauthenticatedattackertoinjectarbitrarydnsmasqconfigurationdirectivesthroughnewlinecharacters,ultimatelyachievingcommandexecutionontheunderlyingsystem.Thisvulnerabilityis 35517 fixedin6.6. CVE- FTLDNS(pihole-FTL)providesaninteractiveAPIandalsogeneratesstatisticsforPi-hole'sWebinterface.From6.0tobefore6.6,thePi-holeFTLenginecontainsaRemoteCodeExecution(RCE)vulnerabilityintheDNSCNAMErecordsconfiguration 2026- parameter(dns.cnameRecords).Thisvulnerabilityallowsanauthenticatedattackertoinjectarbitrarydnsmasqconfigurationdirectivesthroughnewlinecharacters,ultimatelyachievingcommandexecutionontheunderlyingsystem.Thisvulnerability 35518 isfixedin6.6. CVE- AsecurityflawhasbeendiscoveredinTendaCH221.0.0.1.TheimpactedelementisthefunctionformCertLocalPrecreateofthefile/goform/CertLocalPrecreateofthecomponentParameterHandler.Performingamanipulationoftheargument2026- standardresultsinstack-basedbufferoverflow.Remoteexploitationoftheattackispossible.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks.5604 CVE- FTLDNS(pihole-FTL)providesaninteractiveAPIandalsogeneratesstatisticsforPi-hole'sWebinterface.From6.0tobefore6.6,thePi-holeFTLenginecontainsaRemoteCodeExecution(RCE)vulnerabilityintheDNShostrecordconfiguration 2026- parameter(dns.hostRecord).Thisvulnerabilityallowsanauthenticatedattackertoinjectarbitrarydnsmasqconfigurationdirectivesthroughnewlinecharacters,ultimatelyachievingcommandexecutionontheunderlyingsystem.Thisvulnerabilityis 35519 fixedin6.6. CVE- FTLDNS(pihole-FTL)providesaninteractiveAPIandalsogeneratesstatisticsforPi-hole'sWebinterface.From6.0tobefore6.6,thePi-holeFTLenginecontainsaRemoteCodeExecution(RCE)vulnerabilityintheDHCPleasetimeconfiguration 2026- parameter(dhcp.leaseTime).Thisvulnerabilityallowsanauthenticatedattackertoinjectarbitrarydnsmasqconfigurationdirectivesthroughnewlinecharacters,ultimatelyachievingcommandexecutionontheunderlyingsystem.Thisvulnerabilityis 35520 fixedin6.6. CVE- FTLDNS(pihole-FTL)providesaninteractiveAPIandalsogeneratesstatisticsforPi-hole'sWebinterface.From6.0tobefore6.6,thePi-holeFTLenginecontainsaRemoteCodeExecution(RCE)vulnerabilityintheDHCPhostsconfigurationparameter2026- (dhcp.hosts).Thisvulnerabilityallowsanauthenticatedattackertoinjectarbitrarydnsmasqconfigurationdirectivesthroughnewlinecharacters,ultimatelyachievingcommandexecutionontheunderlyingsystem.Thisvulnerabilityisfixedin6.6.35521 CVE- UniSharpLaravelFileManagerv2.0.0-alpha7andv2.0containanarbitraryfileuploadvulnerabilitythatallowsauthenticatedattackerstouploadmaliciousfilesbysendingmultipartformdatatotheuploadendpoint.AttackerscanuploadPHPfiles2019- withthetypeparametersettoFilesandexecutearbitrarycodebyaccessingtheuploadedfilethroughtheworkingdirectorypath.25673 ImproperInputValidation,ImproperControlofGenerationofCode('CodeInjection')vulnerabilityinApacheActiveMQBroker,ApacheActiveMQ.ApacheActiveMQClassicexposestheJolokiaJMX-HTTPbridgeat/api/jolokia/onthewebconsole.The CVE- defaultJolokiaaccesspolicypermitsexecoperationsonallActiveMQMBeans(org.apache.activemq:*),includingBrokerService.addNetworkConnector(String)andBrokerService.addConnector(String). 2026- operationswithacrafteddiscoveryURIthattriggerstheVMtransport'sbrokerConfigparametertoloadaremoteSpringXMLapplicationcontextusingResourceXmlApplicationContext. 34197 singletonbeansbeforetheBrokerServicevalidatestheconfiguration,arbitrarycodeexecutionoccursonthebroker'sJVMthroughbeanfactorymethodssuchasRuntime.exec().ThisissueaffectsApacheActiveMQBroker:before5.19.4,from6.0.0 before6.2.3;ApacheActiveMQ:.Usersarerecommendedtoupgradetoversion5.19.5or6.2.3,whichfixestheissue. CVE- TheBookingforAppointmentsandEventsCalendar-AmeliapluginforWordPressisvulnerabletoInsecureDirectObjectReferenceinallversionsupto,andincluding,2.1.3.ThisisduetotheUpdateProviderCommandHandlerfailingtovalidate 2026- changestotheexternalIdfieldwhenaProvider(Employee)userupdatestheirownprofile.TheexternalIdmapsdirectlytoaWordPressuserIDandispassedto`wpsetpassword()andwpupdateuser()withoutauthorizationchecks.This 5465 makesitpossibleforauthenticatedattackers,withProvider-level(Employee)accessandabove,totakeoveranyWordPressaccount--includingAdministrator--byinjectinganarbitraryexternalId`valuewhenupdatingtheirownproviderprofile. CVE- 2026- HCLBigFixPlatformisaffectedbyinsecurepermissionsonprivatecryptographickeys.TheprivatecryptographickeyslocatedonaWindowshostmachinemightbesubjecttooverlypermissivefilesystempermissions. 21765 CVE- AweaknesshasbeenidentifiedinTendaCH221.0.0.1.ThisaffectsthefunctionformWrlExtraSetofthefile/goform/WrlExtraSet.ExecutingamanipulationoftheargumentGOcanleadtostack-basedbufferoverflow.Theattackcanbeexecuted2026- remotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks.5605 CVE- VAMAX8.3.4containsaremotecodeexecutionvulnerabilitythatallowsauthenticatedattackerstoexecutearbitrarycommandsbyinjectingshellmetacharactersintothemtueth0parameter.AttackerscansendPOSTrequeststothechangeip.php2019- endpointwithmaliciouspayloadinthemtu_eth0fieldtoexecutecommandsastheapacheuser.25671 CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,theNewRolePOSTparameterinsrc/MemberRoleChange.phpisusedinanSQLquerywithoutproperintegervalidation,allowingauthenticateduserstoinjectarbitrarySQL.2026- TheattackrequiresanauthenticatedsessionwithManageGroupsrole,knowledgeofavalidGroupIDandPersonID(obtainablefromGroupVieworPersonViewpages)Thisvulnerabilityisfixedin7.1.0.35567 RemoteCodeExecutionVulnerabilityinJP1/ITDesktopManagement2-ManageronWindows,JP1/ITDesktopManagement2-OperationsDirectoronWindows,JobManagementPartner1/ITDesktopManagement2-ManageronWindows,JP1/IT DesktopManagement-ManageronWindows,JobManagementPartner1/ITDesktopManagement-ManageronWindows,JP1/NETM/DMManageronWindows,JP1/NETM/DMClientonWindows,JobManagementPartner1/SoftwareDistribution CVE- ManageronWindows,JobManagementPartner1/SoftwareDistributionClientonWindows.ThisissueaffectsJP1/ITDesktopManagement2-Manager:from13-50before13-50-02,from13-11before13-11-04,from13-10before13-10-07,from13-01 2025- before13-01-07,from13-00before13-00-05,from12-60before12-60-12,from10-50through12-50-11;JP1/ITDesktopManagement2-OperationsDirector:from13-50before13-50-02,from13-11before13-11-04,from13-10before13-10-07, 65115 from13-01before13-01-07,from13-00before13-00-05,from12-60before12-60-12,from10-50through12-50-11;JobManagementPartner1/ITDesktopManagement2-Manager:from10-50through10-50-11;JP1/ITDesktopManagement- Manager:from09-50through10-10-16;JobManagementPartner1/ITDesktopManagement-Manager:from09-50through10-10-16;JP1/NETM/DMManager:from09-00through10-20-02;JP1/NETM/DMClient:from09-00through10-20-02;Job ManagementPartner1/SoftwareDistributionManager:from09-00through09-51-13;JobManagementPartner1/SoftwareDistributionClient:from09-00through09-51-13. CVE- InModem,thereisapossibleoutofboundswriteduetoamissingboundscheck.Thiscouldleadtoremoteescalationofprivilege,ifaUEhasconnectedtoaroguebasestationcontrolledbytheattacker,withnoadditionalexecutionprivileges needed.Userinteractionisneededforexploitation.PatchID:MOLY01088681;IssueID:MSV-4460.
20433 CVE- Theissuewasaddressedwithimprovedmemoryhandling.ThisissueisfixedinmacOSSequoia15.6.Processingamaliciouslycraftedimagemaycorruptprocessmemory. 43264 CVE- Avulnerabilityintheweb-basedmanagementinterfaceofCiscoIMCcouldallowanauthenticated,remoteattackerwithread-onlyprivilegestoperformcommandinjectionattacksonanaffectedsystemandexecutearbitrarycommandsastheroot 2026- user.Thisvulnerabilityisduetoimpropervalidationofuser-suppliedinput.Anattackercouldexploitthisvulnerabilitybysendingcraftedcommandstotheweb-basedmanagementinterfaceoftheaffectedsoftware.Asuccessfulexploitcouldallow 20094 theattackertoexecutearbitrarycommandsontheunderlyingoperatingsystemastherootuser. CVE- Windmillversions1.56.0through1.614.0containamissingauthorizationvulnerabilitythatallowsuserswiththeOperatorroletoperformprohibitedentitycreationandmodificationactionsviathebackendAPI.AlthoughOperatorsaredocumented 2026- andpricedasunabletocreateormodifyentities,theAPIdoesnotenforcetheOperatorrestrictiononworkspaceendpoints,allowinganOperatortocreateandupdatescripts,flows,apps,andrawapps.SinceOperatorscanalsoexecutescriptsvia 22683 thejobsAPI,thisallowsdirectprivilegeescalationtoremotecodeexecutionwithintheWindmilldeployment.ThisvulnerabilityhasexistedsincetheintroductionoftheOperatorroleinversion1.56.0. CVE- PrivilegeescalationinApacheCassandra5.0onanmTLSenvironmentusingMutualTlsAuthenticatorallowsauserwithonlyCREATEpermissiontoassociatetheirowncertificateidentitywithanarbitraryrole,includingasuperuserrole,and2026- authenticateasthatroleviaADDIDENTITY.Usersarerecommendedtoupgradetoversion5.0.7+,whichfixesthisissue.27314 CVE- AflawhasbeenfoundinTendaM31.0.0.10.ThisvulnerabilityaffectsthefunctionsetAdvPolicyDataofthefile/goform/setAdvPolicyDataofthecomponentDestinationHandler.ExecutingamanipulationoftheargumentpolicyTypecanleadtobuffer2026- overflow.Theattackcanbeexecutedremotely.Theexploithasbeenpublishedandmaybeused.5567 CVE- AvulnerabilitywasdetectedinUTTHiPER1250GWupto3.2.7-210907-180535.Thisaffectsthefunctionstrcpyofthefile/goform/formNatStaticMap.PerformingamanipulationoftheargumentNatBindresultsinbufferoverflow.Remoteexploitation2026- oftheattackispossible.Theexploitisnowpublicandmaybeused.5566 CVE- AvulnerabilitywasdetectedinBelkinF9K11221.00.33.AffectedisthefunctionformWlanSetupofthefile/goform/formWlanSetup.Themanipulationoftheargumentwebpageresultsinstack-basedbufferoverflow.Theattackmaybeperformedfrom2026- remote.Theexploitisnowpublicandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5608 CVE- AvulnerabilitywasidentifiedinTendaAC1016.03.10.10multiTDE01.ThisaffectsthefunctionfromSysToolChangePwdofthefile/bin/httpd.Themanipulationleadstostack-basedbufferoverflow.Theattackmaybeinitiatedremotely.Multiple2026- endpointsmightbeaffected.5550 CVE- AvulnerabilitywasfoundinTendaAC1016.03.10.10multiTDE01.AffectedbythisvulnerabilityisthefunctionfromSysToolChangePwdofthefile/bin/httpd.Performingamanipulationoftheargumentsys.userpassresultsinstack-basedbuffer2026- overflow.Theattackcanbeinitiatedremotely.5548 CVE- AvulnerabilitywasfoundinBelkinF9K10151.00.10.ThisaffectsthefunctionformCrossBandSwitchofthefile/goform/formCrossBandSwitch.Performingamanipulationoftheargumentwebpageresultsinstack-basedbufferoverflow.Theattackcan2026- beinitiatedremotely.Theexploithasbeenmadepublicandcouldbeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5611 CVE- AvulnerabilitywasdetectedinBelkinF9K10151.00.10.TheaffectedelementisthefunctionformSetFirewallofthefile/goform/formSetFirewall.Themanipulationoftheargumentwebpageresultsinstack-basedbufferoverflow.Theattackcanbe2026- executedremotely.Theexploitisnowpublicandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5629 CVE- 2025- Memorycorruptionwhendecodingcorruptedsatellitedatafileswithinvalidsignatureoffsets. 47392 CVE- 2026- UseafterfreeinDawninGoogleChromepriorto146.0.7680.178allowedaremoteattackerwhohadcompromisedtherendererprocesstoexecutearbitrarycodeviaacraftedHTMLpage.(Chromiumsecurityseverity:High) 5281 CVE- 2026- UseafterfreeinWebCodecsinGoogleChromepriorto146.0.7680.178allowedaremoteattackertoexecutearbitrarycodeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) 5280 CVE- 2026- ObjectcorruptioninV8inGoogleChromepriorto146.0.7680.178allowedaremoteattackertoexecutearbitrarycodeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) 5279 CVE- 2026- UseafterfreeinWebMIDIinGoogleChromeonAndroidpriorto146.0.7680.178allowedaremoteattackertoexecutearbitrarycodeviaacraftedHTMLpage.(Chromiumsecurityseverity:High) 5278 CVE- OAuthenticatorissoftwarethatallowsOAuth2identityproviderstobepluggedinandusedwithJupyterHub.Priortoversion17.4.0,anauthenticationbypassvulnerabilityinoauthenticatorallowsanattackerwithanunverifiedemailaddressonan2026- Auth0tenanttologintoJupyterHub.Whenemailisusedastheusrnameclaim,thisgivesuserscontrolovertheirusernameandthepossibilityofaccounttakeover.Thisissuehasbeenpatchedinversion17.4.0.33175 CVE- RAGFlowisanopen-sourceRAG(Retrieval-AugmentedGeneration)engine.Inversions0.24.0andprior,aServer-SideTemplateInjection(SSTI)vulnerabilityexistsinRAGFlow'sAgentworkflowTextProcessing(StringTransform)andMessage 2026- components.ThesecomponentsusePython'sjinja2.Template(unsandboxed)torenderuser-suppliedtemplates,allowinganyauthenticatedusertoexecutearbitraryoperatingsystemcommandsontheserver.Attimeofpublication,thereareno 28797 publiclyavailablepatches. CVE- 2026- HeapbufferoverflowinANGLEinGoogleChromeonMacpriorto146.0.7680.178allowedaremoteattackertoexecutearbitrarycodeviaacraftedHTMLpage.(Chromiumsecurityseverity:High) 5275 CVE- 2026- IntegeroverflowinCodecsinGoogleChromepriorto146.0.7680.178allowedaremoteattackertoperformarbitraryread/writeviaacraftedHTMLpage.(Chromiumsecurityseverity:High) 5274 CVE- OpenSTAManagerisanopensourcemanagementsoftwarefortechnicalassistanceandinvoicing.Priorto2.10.2,confrontarighe.phpfilesacrossdifferentmodulesinOpenSTAManagercontainanSQLInjectionvulnerability.Therigheparameter receivedvia$GET['righe']isdirectlyconcatenatedintoanSQLquerywithoutanysanitization,parameterizationorvalidation.AnauthenticatedattackercaninjectarbitrarySQLstatementstoextractsensitivedatafromthedatabase,includinguser 35470 credentials,customerinformation,invoicedataandanyotherstoreddata.Thisvulnerabilityisfixedin2.10.2. CVE- HeapbufferoverflowinGPUinGoogleChromepriorto146.0.7680.178allowedaremoteattackertoexecutearbitrarycodeviaacraftedHTMLpage.(Chromiumsecurityseverity:High)
OpenSTAManagerisanopensourcemanagementsoftwarefortechnicalassistanceandinvoicing.Priortoversion2.10.2,theAggiornamenti(Updates)moduleinOpenSTAManagercontainsadatabaseconflictresolutionfeature(op=risolvi-conflitti-CVE-database)thatacceptsaJSONarrayofSQLstatementsviaPOSTandexecutesthemdirectlyagainstthedatabasewithoutanyvalidation,allowlist,orsanitization.AnauthenticatedattackerwithaccesstotheAggiornamentimodulecanexecute arbitrarySQLstatementsincludingCREATE,DROP,ALTER,INSERT,UPDATE,DELETE,SELECTINTOOUTFILE,andanyotherSQLcommandsupportedbytheMySQLserver.Foreignkeychecksareexplicitlydisabledbeforeexecution(SET35168FOREIGNKEYCHECKS=0),furtherreducingdatabaseintegrityprotections.Thisissuehasbeenpatchedinversion2.10.2. CVE- 2026-InProgressFlowmonversionspriorto12.5.8,avulnerabilityexistswherebyanauthenticatedlow-privilegedusermaycraftarequestduringthereportgenerationprocessthatresultsinunintendedcommandsbeingexecutedontheserver. 3692 CVE-BraveCMSisanopen-sourceCMS.Priorto2.0.6,anunrestrictedfileuploadvulnerabilityexistsintheCKEditoruploadfunctionality.Itisfoundinapp/Http/Controllers/Dashboard/CkEditorController.phpwithintheckuploadmethod.Themethodfailsto2026-validateuploadedfiletypesandreliesentirelyonuserinput.ThisallowsanauthenticatedusertouploadexecutablePHPscriptsandgainRemoteCodeExecution.Thisvulnerabilityisfixedin2.0.6.35164 CVE-Homarrisanopen-sourcedashboard.Priorto1.57.0,aDOM-basedCross-SiteScripting(XSS)vulnerabilityhasbeendiscoveredinHomarr's/auth/loginpage.TheapplicationimproperlytrustsaURLparameter(callbackUrl),whichispassedtoredirect 2026-androuter.push.Anattackercancraftamaliciouslinkthat,whenopenedbyanauthenticateduser,performsaclient-sideredirectandexecutesarbitraryJavaScriptinthecontextoftheirbrowser.Thiscouldleadtocredentialtheft,internalnetwork 33510pivoting,andunauthorizedactionsperformedonbehalfofthevictim.Thisvulnerabilityisfixedin1.57.0. AvulnerabilitywasidentifiedinTrendnetTEW-657BRM1.00.1.Theaffectedelementisthefunctionaddapcdbofthefile/setup.cgi.Themanipulationoftheargumentmacpcdbaleadstostack-basedbufferoverflow.TheattackcanbeinitiatedCVE-remotely.Theexploitispubliclyavailableandmightbeused.Thevendorconfirms,that"[t]heproductinquestion(...)hasbeendiscontinuedandendoflifesinceJune23,2011,thatismorethan14yearsago.Wenolongerprovidesupportforthis2026-product,sowearenotabletoconfirmthevulnerabilities.Wewillmakeanannouncementonourwebsite'sproductsupportpageandnotifycustomerswhoregisteredtheirproductswithus."Thisvulnerabilityonlyaffectsproductsthatarenolonger5349supportedbythemaintainer. CVE-EndianFirewallversion3.3.25andpriorallowauthenticateduserstoexecutearbitraryOScommandsviatheDATEparameterto/cgi-bin/logsproxy.cgi.TheDATEparametervalueisusedtoconstructafilepaththatispassedtoaPerlopen()call,2026-whichallowscommandinjectionduetoanincompleteregularexpressionvalidation.34791 CVE-EndianFirewallversion3.3.25andpriorallowauthenticateduserstoexecutearbitraryOScommandsviatheDATEparameterto/cgi-bin/logsclamav.cgi.TheDATEparametervalueisusedtoconstructafilepaththatispassedtoaPerlopen()call,2026-whichallowscommandinjectionduetoanincompleteregularexpressionvalidation.34792 CVE-EndianFirewallversion3.3.25andpriorallowauthenticateduserstoexecutearbitraryOScommandsviatheDATEparameterto/cgi-bin/logsfirewall.cgi.TheDATEparametervalueisusedtoconstructafilepaththatispassedtoaPerlopen()call,2026-whichallowscommandinjectionduetoanincompleteregularexpressionvalidation.34793 CVE-EndianFirewallversion3.3.25andpriorallowauthenticateduserstoexecutearbitraryOScommandsviatheDATEparameterto/cgi-bin/logsids.cgi.TheDATEparametervalueisusedtoconstructafilepaththatispassedtoaPerlopen()call,which2026-allowscommandinjectionduetoanincompleteregularexpressionvalidation.34794 CVE-EndianFirewallversion3.3.25andpriorallowauthenticateduserstoexecutearbitraryOScommandsviatheDATEparameterto/cgi-bin/logslog.cgi.TheDATEparametervalueisusedtoconstructafilepaththatispassedtoaPerlopen()call,which2026-allowscommandinjectionduetoanincompleteregularexpressionvalidation.34795 CVE-EndianFirewallversion3.3.25andpriorallowauthenticateduserstoexecutearbitraryOScommandsviatheDATEparameterto/cgi-bin/logsopenvpn.cgi.TheDATEparametervalueisusedtoconstructafilepaththatispassedtoaPerlopen()call,2026-whichallowscommandinjectionduetoanincompleteregularexpressionvalidation.34796 CVE-EndianFirewallversion3.3.25andpriorallowauthenticateduserstoexecutearbitraryOScommandsviatheDATEparameterto/cgi-bin/logssmtp.cgi.TheDATEparametervalueisusedtoconstructafilepaththatispassedtoaPerlopen()call,2026-whichallowscommandinjectionduetoanincompleteregularexpressionvalidation.34797 CVE-BentoMLisaPythonlibraryforbuildingonlineservingsystemsoptimizedforAIappsandmodelinference.Priorto1.4.38,theDockerfilegenerationfunctiongeneratecontainerfile()insrc/bentoml/internal/container/generate.pyusesan 2026-unsandboxedjinja2.Environmentwiththejinja2.ext.doextensiontorenderuser-provideddockerfiletemplatefiles.Whenavictimimportsamaliciousbentoarchiveandrunsbentomlcontainerize,attacker-controlledJinja2templatecodeexecutes 35044arbitraryPythondirectlyonthehostmachine,bypassingallcontainerisolation.Thisvulnerabilityisfixedin1.4.38. CVE-LiteLLMisaproxyserver(AIGateway)tocallLLMAPIsinOpenAI(ornative)format.Priorto1.83.0,the/config/updateendpointdoesnotenforceadminroleauthorization.Auserwhoisalreadyauthenticatedintotheplatformcanthenusethis 2026-endpointtomodifyproxyconfigurationandenvironmentvariables,registercustompass-throughendpointhandlerspointingtoattacker-controlledPythoncode,achievingremotecodeexecution,readarbitraryserverfilesbysettingUILOGOPATH 35029andfetchingvia/getimage,andtakeoverotherprivilegedaccountsbyoverwritingUIUSERNAMEandUIPASSWORDenvironmentvariables.Fixedinv1.83.0. CVE-XenForobefore2.3.7doesnotproperlyrestrictmethodscallablefromwithintemplates.Alooseprefixmatchwasusedinsteadofastricterfirst-wordmatchformethodsaccessiblethroughcallbacksandvariablemethodcallsintemplates,potentially2025-allowingunauthorizedmethodinvocations.71281 CVE-XenForobefore2.3.5allowsOAuth2clientapplicationstorequestunauthorizedscopes.ThisaffectsanycustomerusingOAuth2clientsonanyversionofXenForo2.3priorto2.3.5,potentiallyallowingclientapplicationstogainaccessbeyondtheir2025-intendedauthorizationlevel.71278 CVE-OpenSTAManagerisanopensourcemanagementsoftwarefortechnicalassistanceandinvoicing.Priortoversion2.10.2,multipleAJAXselecthandlersinOpenSTAManagerarevulnerabletoTime-BasedBlindSQLInjectionthroughtheoptions[stato] 2026-GETparameter.Theuser-suppliedvalueisreadfrom$superselect['stato']andconcatenateddirectlyintoSQLWHEREclausesasabareexpression,withoutanysanitization,parameterization,orallowlistvalidation.Anauthenticatedattackercan 28805injectarbitrarySQLstatementstoextractsensitivedatafromthedatabase,includingusernames,passwordhashes,financialrecords,andanyotherinformationstoredintheMySQLdatabase.Thisissuehasbeenpatchedinversion2.10.2. AsecurityflawhasbeendiscoveredinTrendnetTEW-657BRM1.00.1.Theimpactedelementisthefunctionupdatepcdbofthefile/setup.cgi.Themanipulationoftheargumentmacpc_dbaresultsinstack-basedbufferoverflow.TheattackcanbeCVE-launchedremotely.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks.Thevendorconfirms,that"[t]heproductinquestion(...)hasbeendiscontinuedandendoflifesinceJune23,2011,thatismorethan14yearsago.Weno2026-longerprovidesupportforthisproduct,sowearenotabletoconfirmthevulnerabilities.Wewillmakeanannouncementonourwebsite'sproductsupportpageandnotifycustomerswhoregisteredtheirproductswithus."Thisvulnerabilityonly5350affectsproductsthatarenolongersupportedbythemaintainer. CVE-ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,anSQLinjectionvulnerabilitywasidentifiedin/EventNames.phpinChurchCRM.AuthenticateduserswithAddEventprivilegescaninjectSQLviathenewEvtTypeCntLst2026-parameterduringeventtypecreation.ThevulnerableflowreachesanONDUPLICATEKEYUPDATEclausewhereunescapeduserinputisinterpolateddirectly.Thisvulnerabilityisfixedin7.1.0.39329 CVE-BraveCMSisanopen-sourceCMS.Priorto2.0.6,thisvulnerabilityisamissingauthorizationcheckfoundintheupdateroleendpointatroutes/web.php.ThePOSTroutefor/rights/update-role/{id}lacksthecheckUserPermissions:assign-user-roles2026-middleware.ThisallowsanyauthenticatedusertochangeaccountrolesandpromotethemselvestoSuperAdmin.Thisvulnerabilityisfixedin2.0.6.35182 CVE-AnauthenticationbypassvulnerabilitywithintheHTTPhandlingoftheDSconfigurationserviceinTP-LinkTapoC520WSv2.6wasidentified,duetoinconsistentparsingandauthorizationlogicinJSONrequestsduringauthenticationcheck. unauthenticatedattackercanappendanauthentication-exemptactiontoarequestcontainingprivilegedDSdoactions,bypassingauthorizationchecks.Successfulexploitationallowsunauthenticatedexecutionofrestrictedconfigurationactions, 34121whichmayresultinunauthorizedmodificationofdevicestate.
CVE- MattermostPluginLegalHoldversions<=1.1.4failtohaltrequestprocessingafterafailedauthorizationcheckinServeHTTPwhichallowsanauthenticatedattackertoaccess,create,download,anddeletelegalholddataviacraftedAPIrequeststo theplugin'sendpoints.MattermostAdvisoryID:MMSA-2026-00621
CVE- OutofboundsreadinWebCodecsinGoogleChromepriorto146.0.7680.178allowedaremoteattackertoperformanoutofboundsmemoryreadviaacraftedHTMLpage.(Chromiumsecurityseverity:Medium) 5292 CVE- 2026- UseafterfreeinPDFinGoogleChromepriorto146.0.7680.178allowedaremoteattackertoexecutearbitrarycodeinsideasandboxviaacraftedPDFfile.(Chromiumsecurityseverity:High) 5287 CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,anSQLinjectionvulnerabilitywasfoundintheendpoint/PropertyAssign.phpinChurchCRM.AuthenticateduserswiththeroleManageGroups&Roles(ManageGroups)and2026- EditRecords(isEditRecordsEnabled)caninjectarbitrarySQLstatementsthroughtheValueparameterandthusextractandmodifyinformationfromthedatabase.Thisvulnerabilityisfixedin7.1.0.39330 CVE- 2026- UseafterfreeinDawninGoogleChromepriorto146.0.7680.178allowedaremoteattackertoexecutearbitrarycodeviaacraftedHTMLpage.(Chromiumsecurityseverity:High) 5286 CVE- 2026- UseafterfreeinWebGLinGoogleChromepriorto146.0.7680.178allowedaremoteattackertoexecutearbitrarycodeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) 5285 CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,anSQLinjectionvulnerabilitywasfoundintheendpoint/SettingsIndividual.phpinChurchCRM7.0.5.Authenticateduserswithoutanyspecificprivilegescaninjectarbitrary2026- SQLstatementsthroughthetypearrayparameterviatheindexandthusextractandmodifyinformationfromthedatabase.Thisvulnerabilityisfixedin7.1.0.39334 CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,areflectedCross-SiteScripting(XSS)vulnerabilityinGeoPage.phpallowsanyauthenticatedusertoinjectarbitraryJavaScriptintothebrowserofanotherauthenticateduser. 2026- Becausethepayloadfiresautomaticallyviaautofocuswithnouserinteractionrequired,anattackercanstealsessioncookiesandfullytakeoveranyvictimaccount,includingadministratoraccounts,bytrickingthemintosubmittingacraftedform. 39332 Thisvulnerabilityisfixedin7.1.0. CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.0.0,astoredcross-sitescripting(XSS)vulnerabilityexistsinChurchCRMwithinthePersonPropertyManagementsubsystem.ThisissuepersistsinversionspatchedforCVE-2023- 2026- 38766andallowsanauthenticatedusertoinjectarbitraryJavaScriptcodeviadynamicallyassignedpersonproperties.Themaliciouspayloadispersistentlystoredandexecutedwhenotherusersviewtheaffectedpersonprofileoraccessthe 35576 printableview,potentiallyleadingtosessionhijackingorfullaccountcompromise.Thisvulnerabilityisfixedin7.0.0. CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,heFindFundRaiser.phpendpointreflectsuser-suppliedinput(DateStartandDateEnd)intoHTMLinputfieldattributeswithoutproperoutputencodingfortheHTMLattribute2026- context.AnauthenticatedattackercancraftamaliciousURLthatexecutesarbitraryJavaScriptwhenvisitedbyanotherauthenticateduser.ThisconstitutesareflectedXSSvulnerability.Thisvulnerabilityisfixedin7.1.0.39333 CVE- Directusisareal-timeAPIandAppdashboardformanagingSQLdatabasecontent.Priorto11.17.0,Directus'sSingleSign-On(SSO)loginpageslackedaCross-Origin-Opener-Policy(COOP)HTTPresponseheader.Withoutthisheader,amalicious 2026- cross-originwindowthatopenstheDirectusloginpageretainstheabilitytoaccessandmanipulatethewindowobjectofthatpage.AnattackercanexploitthistointerceptandredirecttheOAuthauthorizationflowtoanattacker-controlledOAuth 35408 client,causingthevictimtounknowinglygrantaccesstotheirauthenticationprovideraccount(e.g.Google,Discord).Thisvulnerabilityisfixedin11.17.0. AraceconditionintheApacheKafkaJavaproducerclient'sbufferpoolmanagementcancausemessagestobesilentlydeliveredtoincorrecttopics.Whenaproducebatchexpiresduetodelivery.timeout.mswhileanetworkrequestcontainingthat CVE- batchisstillinflight,thebatch'sByteBufferisprematurelydeallocatedandreturnedtothebufferpool.Ifasubsequentproducerbatch--potentiallydestinedforadifferenttopic--reusesthisfreedbufferbeforetheoriginalnetworkrequestcompletes, 2026- thebuffercontentsmaybecomecorrupted.Thiscanresultinmessagesbeingdeliveredtounintendedtopicswithoutanyerrorbeingreportedtotheproducer.DataConfidentiality:Messagesintendedforonetopicmaybedeliveredtoadifferent 35554 topic,potentiallyexposingsensitivedatatoconsumerswhohaveaccesstothedestinationtopicbutnottheintendedsourcetopic.DataIntegrity:Consumersonthereceivingtopicmayencounterunexpectedorincompatiblemessages,leadingto deserializationfailures,processingerrors,andcorrupteddownstreamdata.ThisissueaffectsApacheKafkaversions≤3.9.1,≤4.0.1,and≤4.1.1.Kafkausersareadvisedtoupgradeto3.9.2,4.0.2,4.1.2,4.2.0,orlatertoaddressthisvulnerability. CVE- Budibaseisanopen-sourcelow-codeplatform.Priortoversion3.32.5,Budibase'sBuilderCommandPaletterendersentitynames(tables,views,queries,automations)usingSvelte's{@html}directivewithoutanysanitization.Anauthenticateduser 2026- withBuilderaccesscancreateatable,automation,view,orquerywhosenamecontainsanHTMLpayload(e.g.
).WhenanyBuilder-roleuserinthesameworkspaceopenstheCommandPalette 35218 (Ctrl+K),thepayloadexecutesintheirbrowser,stealingtheirsessioncookieandenablingfullaccounttakeover.Thisissuehasbeenpatchedinversion3.32.5. CVE- Budibaseisanopen-sourcelow-codeplatform.Priortoversion3.33.4,thepluginfileuploadendpoint(POST/api/plugin/upload)passestheuser-suppliedfilenamedirectlytocreateTempFolder()withoutsanitizingpathtraversalsequences.Anattacker 2026- withGlobalBuilderprivilegescancraftamultipartuploadwithafilenamecontaining../todeletearbitrarydirectoriesviarmSyncandwritearbitraryfilesviatarballextractiontoanyfilesystempaththeNode.jsprocesscanaccess.Thisissuehasbeen 35214 patchedinversion3.33.4. CVE- Payloadisafreeandopensourceheadlesscontentmanagementsystem.Priortoversion3.78.0in@payloadcms/next,astoredCross-SiteScripting(XSS)vulnerabilityexistedintheadminpanel.Anauthenticateduserwithwriteaccesstoa2026- collectioncouldsavecontentthat,whenviewedbyanotheruser,wouldexecuteintheirbrowser.Thisissuehasbeenpatchedinversion3.78.0.34748 CVE- phpMyFAQisanopensourceFAQwebapplication.Priortoversion4.1.1,theMediaBrowserController::index()methodhandlesfiledeletionforthemediabrowser.WhenthefileRemoveactionistriggered,theuser-suppliednameparameteris 2026- concatenatedwiththebaseuploaddirectorypathwithoutanypathtraversalvalidation.TheFILTERSANITIZESPECIALCHARSfilteronlyencodesHTMLspecialcharacters(&,',",<,>)andcharacterswithASCIIvalue<32,anddoesnotprevent 34728 directorytraversalsequenceslike../.Additionally,theendpointdoesnotvalidateCSRFtokens,makingitexploitableviaCSRFattacks.Thisissuehasbeenpatchedinversion4.1.1. CVE- 2025- Thisissuewasaddressedwithimprovedhandlingofsymlinks.ThisissueisfixedinmacOSSequoia15.6.Anappmaybeabletobreakoutofitssandbox. 43257 CVE- HiOSSwitchPlatformversions09.1.00priorto09.4.05and10.3.01containsadenial-of-servicevulnerabilityinthewebinterfacethatallowsremoteattackerstoreboottheaffecteddevicebysendingamaliciousHTTPGETrequesttoaspecific2025- endpoint.AttackerscantriggeranuncontrolledrebootconditionthroughcraftedHTTPrequeststocauseservicedisruptionandunavailabilityoftheswitch.15620 CVE- Storagecredentialsarehardcodedinthemobileappanddevicefirmware.Thesecredentialsdonotadequatelylimitenduserpermissionsanddonotexpirewithinareasonableamountoftime.Thisvulnerabilitymaygrantunauthorizedaccessto2025- productionstoragecontainers.10681 CVE- OpenNeuralNetworkExchange(ONNX)isanopenstandardformachinelearninginteroperability.Priortoversion1.21.0,theExternalDataInfoclassinONNXwasusingPython'ssetattr()functiontoloadmetadata(likefilepathsordatalengths)2026- directlyfromanONNXmodelfile.Itdidn'tcheckifthe"keys"inthefilewerevalid.Duetothis,anattackercouldcraftamaliciousmodelthatoverwritesinternalobjectproperties.Thisissuehasbeenpatchedinversion1.21.0.34445 CVE- PostizisanAIsocialmediaschedulingtool.Priortoversion2.21.3,theGET/public/streamendpointinPublicControlleracceptsauser-suppliedurlqueryparameterandproxiesthefullHTTPresponsebacktothecaller.Theonlyvalidationis url.endsWith('mp4'),whichistriviallybypassablebyappending.mp4asaqueryparametervalueorURLfragment.TheendpointrequiresnoauthenticationandhasnoSSRFprotections,allowinganunauthenticatedattackertoreadresponsesfrom 34577 internalservices,cloudmetadataendpoints,andothernetwork-internalresources.Thisissuehasbeenpatchedinversion2.21.3. CVE- PraisonAIisamulti-agentteamssystem.Priortoversion1.5.95,FileTools.downloadfile()inpraisonaiagentsvalidatesthedestinationpathbutperformsnovalidationontheurlparameter,passingitdirectlytohttpx.stream()with follow_redirects=True.AnattackerwhocontrolstheURLcanreachanyhostaccessiblefromtheserverincludingcloudmetadataservicesandinternalnetworkservices.Thisissuehasbeenpatchedinversion1.5.95.34954
CVE- ImproperauthenticationinAzureSREAgentallowsanunauthorizedattackertodiscloseinformationoveranetwork. 32173 CVE- Commandinjectionvulnerabilityinconsole.runmodulewithoutput()inpymetasploit3throughversion1.0.6allowsattackerstoinjectnewlinecharactersintomoduleoptionssuchasRHOSTS.Thisbreakstheintendedcommandstructureandcauses2026- theMetasploitconsoletoexecuteadditionalunintendedcommands,potentiallyleadingtoarbitrarycommandexecutionandmanipulationofMetasploitsessions.5463 CVE- curlcffiistheaPythonbindingforcurl.Priorto0.15.0,curlcffidoesnotrestrictrequeststointernalIPranges,andfollowsredirectsautomaticallyviatheunderlyinglibcurl.Becauseofthis,anattacker-controlledURLcanredirectrequeststointernal2026- servicessuchascloudmetadataendpoints.Inaddition,curlcffi'sTLSimpersonationfeaturecanmaketheserequestsappearaslegitimatebrowsertraffic,whichmaybypasscertainnetworkcontrols.Thisvulnerabilityisfixedin0.15.0.33752 Plunkisanopen-sourceemailplatformbuiltontopofAWSSES.Priorto0.8.0,aCRLFheaderinjectionvulnerabilitywasdiscoveredinSESService.ts,whereuser-suppliedvaluesforfrom.name,subject,customheaderkeys/values,andattachmentCVE- filenameswereinterpolateddirectlyintorawMIMEmessageswithoutsanitization.AnauthenticatedAPIusercouldinjectarbitraryemailheaders(e.g.Bcc,Reply-To)byembeddingcarriagereturn/linefeedcharactersinthesefields,enablingsilent2026- emailforwarding,replyredirection,orsenderspoofing.Thefixaddsinputvalidationattheschemaleveltorejectanyofthesefieldscontaining\ror\ncharacters,consistentwiththeexistingvalidationalreadyappliedtothecontentIdfield.This34975 vulnerabilityisfixedin0.8.0. CVE- Payloadisafreeandopensourceheadlesscontentmanagementsystem.Priortoversion3.79.1,certainrequestinputswerenotproperlyvalidated.AnattackercouldcraftrequeststhatinfluenceSQLqueryexecution,potentiallyexposingor2026- modifyingdataincollections.Thisissuehasbeenpatchedinversion3.79.1.34747 CVE- 2026- ImproperNeutralizationofSpecialElementsusedinanSQLCommand('SQLInjection')vulnerabilityinDavidLingrenMediaLIbraryAssistantallowsSQLInjection.ThisissueaffectsMediaLIbraryAssistant:fromn/athrough3.34. 34885 CVE- 2026- AnarbitraryfileoverwritevulnerabilityinTinybeansPrivateFamilyAlbumAppv5.9.5-prodallowsattackerstooverwritecriticalinternalfilesviathefileimportprocess,leadingtoarbitrarycodeexecutionorinformationexposure. 30289 CVE- XlightFTPServer3.9.1containsastructuredexceptionhandler(SEH)overwritevulnerabilitythatallowslocalattackerstocrashtheapplicationandoverwriteSEHpointersbysupplyingacraftedbufferstring.Attackerscaninjecta428-bytepayload2019- throughtheprogramexecutionfieldinvirtualserverconfigurationtotriggerabufferoverflowthatcorruptstheSEHchainandenablespotentialcodeexecution.25681 CVE- Ri3863.5.0containsalocalbufferoverflowvulnerabilityintheGUIPreferencesdialogthatallowslocalattackerstotriggerastructuredexceptionhandler(SEH)overwritebysupplyingmaliciousinput.Attackerscancraftapayloadstringinthe2019- 'Languageformenusandmessages'fieldtooverwriteSEHrecordsandachievecodeexecutionwithcalculatororarbitraryshellcode.25656 CVE- 2026- AnarbitraryfileoverwritevulnerabilityinDeepThoughtIndustriesACEScannerPDFScannerv1.4.5allowsattackerstooverwritecriticalinternalfilesviathefileimportprocess,leadingtoarbitrarycodeexecutionorinformationexposure. 30287 CVE- RiverPastVideoCleaner7.6.3containsastructuredexceptionhandlerbufferoverflowvulnerabilitythatallowslocalattackerstoexecutearbitrarycodebysupplyingamaliciousstringintheLameenc.dllfield.Attackerscancraftapayloadwith2802019- bytesofpadding,anextstructuredexceptionhandleroverride,andshellcodetotriggercodeexecutionwhentheapplicationprocessestheinput.25670 CVE- AnthropicClaudeCodeCLIandClaudeAgentSDKcontainanOScommandinjectionvulnerabilityinthecommandlookuphelperanddeep-linkterminallauncherthatallowslocalattackerstoexecutearbitrarycommandsbymanipulatingthe 2026- TERMINALenvironmentvariable.AttackerscaninjectshellmetacharactersintotheTERMINALvariablewhichareinterpretedby/bin/shwhenthecommandlookuphelperconstructsandexecutesshellcommandswithshell=true.Thevulnerabilitycan 35020 betriggeredduringnormalCLIexecutionaswellasviathedeep-linkhandlerpath,resultinginarbitrarycommandexecutionwiththeprivilegesoftheuserrunningtheCLI. CVE- Snes9K0.0.9zcontainsabufferoverflowvulnerabilityintheNetplaySocketPortNumberfieldthatallowslocalattackerstotriggerastructuredexceptionhandler(SEH)overwrite.AttackerscancraftamaliciouspayloadandpasteitintotheSocket2018- PortNumberfieldviatheNetplayOptionsmenutoachievecodeexecutionthroughSEHchainexploitation.25251 CVE- 2026- AnarbitraryfileoverwritevulnerabilityinDocudepotPDFReader:PDFViewerAPPv1.0.34allowsattackerstooverwritecriticalinternalfilesviathefileimportprocess,leadingtoarbitrarycodeexecutionorinformationexposure. 30292 CVE- 2026- AnarbitraryfileoverwritevulnerabilityinOraToolsPDFReader'Reader&EditorAPPv4.3.5allowsattackerstooverwritecriticalinternalfilesviathefileimportprocess,leadingtoarbitrarycodeexecutionorinformationexposure. 30291 CVE- 10-StrikeLANState8.8containsalocalbufferoverflowvulnerabilityinstructuredexceptionhandlingthatallowslocalattackerstoexecutearbitrarycodebycraftingmaliciousLSMmapfiles.AttackerscancreateaspeciallyformattedLSMfilewitha2018- payloadintheObjCaptionparameterthatoverflowsthebuffer,overwritestheSEHchain,andexecutesshellcodewhenthefileisopenedintheapplication.25255 Electronisaframeworkforwritingcross-platformdesktopapplicationsusingJavaScript,HTMLandCSS.Fromversions39.0.0-alpha.1tobefore39.8.0,40.0.0-alpha.1tobefore40.7.0,and41.0.0-alpha.1tobefore41.0.0-beta.8,appsthatpassCVE- VideoFrameobjects(fromtheWebCodecsAPI)acrossthecontextBridgearevulnerabletoacontextisolationbypass.AnattackerwhocanexecuteJavaScriptinthemainworld(forexample,viaXSS)canuseabridgedVideoFrametogainaccessto2026- theisolatedworld,includinganyNode.jsAPIsexposedtothepreloadscript.Appsareonlyaffectedifapreloadscriptreturns,resolves,orpassesaVideoFrameobjecttothemainworldviacontextBridge.exposeInMainWorld().Appsthatdonotbridge34780 VideoFrameobjectsarenotaffected.Thisissuehasbeenpatchedinversions39.8.0,40.7.0,and41.0.0-beta.8. CVE- Cr*nMaster(cronmaster)isaCronjobmanagementUIwithhumanreadablesyntax,liveloggingandloghistoryforcronjobs.Priortoversion2.2.0,anauthenticationbypassinmiddlewareallowsunauthenticatedrequestswithaninvalidsession 2026- cookietobetreatedasauthenticatedwhenthemiddleware'ssession-validationfetchfails.ThiscanresultinunauthorizedaccesstoprotectedpagesandunauthorizedexecutionofprivilegedNext.jsServerActions.Thisissuehasbeenpatchedin 34072 version2.2.0. CVE- MobileNextisanMCPserverformobiledevelopmentandautomation.Priorto0.0.50,themobileopenurltoolinmobile-mcppassesuser-suppliedURLsdirectlytoAndroid'sintentsystemwithoutanyschemevalidation,allowingexecutionof2026- arbitraryAndroidintents,includingUSSDcodes,phonecalls,SMSmessages,andcontentprovideraccess.Thisvulnerabilityisfixedin0.0.50.35394 CVE- SillyTavernisalocallyinstalleduserinterfacethatallowsuserstointeractwithtextgenerationlargelanguagemodels,imagegenerationengines,andtext-to-speechvoicemodels.Priortoversion1.17.0,apathtraversalvulnerabilityinchat2026- endpointsallowsanauthenticatedattackertoreadanddeletearbitraryfilesundertheiruserdataroot(forexamplesecrets.jsonandsettings.json)bysupplyingavatarurl="..".Thisissuehasbeenpatchedinversion1.17.0.34524 CVE- AnissuewasdiscoveredinBiztalk360before11.5.Becauseofmishandlingofuser-providedinputinanuploadmechanism,anauthenticatedattackerisabletowritefilesoutsideofthedestinationdirectoryand/orcoerceanauthenticationfromthe service,akaDirectoryTraversal.59711
CVE- PilusCart1.4.1containsaSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughthe'send'parameter.AttackerscansubmitPOSTrequeststothecommentsubmission
endpointwithRLIKE-basedbooleanSQLinjectionpayloadstoextractsensitivedatabaseinformation. 25672 CVE-KadosR10GreenBeecontainsanSQLinjectionvulnerabilitythatallowsattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughtheidprojectparameter.AttackerscansendcraftedrequestswithmaliciousSQLstatementsinthe idprojectparametertoextractsensitivedatabaseinformationormodifydata.25702 CVE-C4GBasicLaboratoryInformationSystem3.4containsmultipleSQLinjectionvulnerabilitiesthatallowunauthenticatedattackerstoexecutearbitrarySQLcommandsbyinjectingmaliciouscodethroughthesiteparameter.AttackerscansendGET2019-requeststotheusersselect.phpendpointwithcraftedSQLpayloadstoextractsensitivedatabaseinformationincludingpatientrecordsandsystemcredentials.25678 CVE-KadosR10GreenBeecontainsanSQLinjectionvulnerabilitythatallowsattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughthefilterusermailparameter.AttackerscansendcraftedrequestswithmaliciousSQLstatementsto2019-extractsensitivedatabaseinformationormodifydata.25704 CVE-AdvanceGiftShopProScript2.0.3containsanSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstoexecutearbitrarySQLqueriesbyinjectingmaliciouscodethroughthesearchparameter.AttackerscansubmitcraftedSQLpayloadsin2019-the's'parameterofsearchrequeststoextractsensitivedatabaseinformationincludingversiondetailsandotherdata.25680 CVE-KadosR10GreenBeecontainsanSQLinjectionvulnerabilitythatallowsattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughthelanguagetagparameter.AttackerscansubmitmaliciousSQLstatementsinthelanguagetag2019-parametertoextractsensitivedatabaseinformationormodifydata.25696 CVE-OpenDocMan1.3.4containsanSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughthe'where'parameter.AttackerscansendGETrequeststosearch.phpwithmalicious2019-SQLpayloadsinthe'where'parametertoextractsensitivedatabaseinformation.25684 CVE-Vimisanopensource,commandlinetexteditor.Priortoversion9.2.0276,amodelinesandboxbypassinVimallowsarbitraryOScommandexecutionwhenauseropensacraftedfile.Thecomplete,guitabtooltipandprintheaderoptionsare2026-missingthe`PMLEflag,allowingamodelinetobeexecuted.Additionally,themapset()functionlacksachecksecure()`call,allowingittobeabusedfromsandboxedexpressions.Commit9.2.0276fixestheissue.34982 CVE-Improperauthenticationinthetwo-factorauthentication(2FA)featureinDevolutionsServer2026.1.11andearlierallowsaremoteattackerwithvalidcredentialstobypassmultifactorauthenticationandgainunauthorized2026-accountviareuseofapartiallyauthenticatedsessiontoken.4924 CVE-PodmanDesktopisagraphicaltoolfordevelopingoncontainersandKubernetes.Priorto1.26.2,anunauthenticatedHTTPserverexposedbyPodmanDesktopallowsanynetworkattackertoremotelytriggerdenial-of-serviceconditionsandextract 2026-sensitiveinformation.Byabusingmissingconnectionlimitsandtimeouts,anattackercanexhaustfiledescriptorsandkernelmemory,leadingtoapplicationcrashorfullhostfreeze.Additionally,verboseerrorresponsesdiscloseinternalpathsand 34045systemdetails(includingusernamesonWindows),aidingfurtherexploitation.Theissuerequiresnoauthenticationoruserinteractionandisexploitableoverthenetwork.Thisvulnerabilityisfixedin1.26.2. CVE- 2024-Apermissionsissuewasaddressedwithadditionalrestrictions.ThisissueisfixedinmacOSSequoia15.1.Anappmaybeabletoexecutearbitrarycodeoutofitssandboxorwithcertainelevatedprivileges. 44250 CVE-AflawwasfoundinOpenClusterManagement(OCM),thetechnologyunderlyingRedHatAdvancedClusterManagement(ACM).ImpropervalidationofKubernetesclientcertificaterenewalallowsamanagedclusteradministratortoforgeaclient2026-certificatethatcanbeapprovedbytheOCMcontroller.Thisenablescross-clusterprivilegeescalationandmayallowanattackertogaincontroloverothermanagedclusters,includingthehubcluster.4740 CVE-AflawwasfoundinCorosync.AremoteunauthenticatedattackercanexploitawrongreturnvaluevulnerabilityintheCorosyncmembershipcommittokensanitycheckbysendingaspeciallycraftedUserDatagramProtocol(UDP)packet.Thiscan2026-leadtoanout-of-boundsread,causingadenialofservice(DoS)andpotentiallydisclosinglimitedmemorycontents.ThisvulnerabilityaffectsCorosyncwhenrunningintotemudp/totemudpumode,whichisthedefaultconfiguration.35091 CVE-KadosR10GreenBeecontainsanSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughthemenulev1parameter.AttackerscansendcraftedrequestswithmaliciousSQL2019-payloadsinthemenulev1parametertoextractsensitivedatabaseinformationormodifydatabasecontents.25688 CVE-KadosR10GreenBeecontainsanSQLinjectionvulnerabilitythatallowsattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughthemngprofileidparameter.AttackerscansendcraftedrequestswithmaliciousSQLpayloadsinthe2019-mngprofileidparametertoextractsensitivedatabaseinformation.25690 CVE- 2026-ImproperauthenticationintheOAuthloginfunctionalityinDevolutionsServer2026.1.11andearlierallowsaremoteattackerwithvalidcredentialstobypassmulti-factorauthenticationviaacraftedloginrequest. 4828 CVE-libp2p-rustistheofficialrustlanguageImplementationofthelibp2pnetworkingstack.Priorto0.17.1,therendezvousserverstorespaginationcookieswithoutbounds.AnunauthenticatedpeercanrepeatedlyissueDISCOVERrequestsandforce2026-unboundedmemorygrowth.Thisvulnerabilityisfixedin0.17.1.35457 CVE-KadosR10GreenBeecontainsanSQLinjectionvulnerabilitythatallowsattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughthesortdirectionparameter.AttackerscansubmitmaliciousSQLstatementsinthesortdirection2019-parametertoextractsensitivedatabaseinformationormodifydata.25700 CVE-DbGateiscross-platformdatabasemanager.Fromversion7.0.0tobeforeversion7.1.5,astoredXSSvulnerabilityexistsinDbGatebecauseattacker-controlledSVGiconstringsarerenderedasrawHTMLwithoutsanitization.InthewebUIthisallows2026-scriptexecutioninanotheruser'sbrowser;intheElectrondesktopappthiscanescalatetolocalcodeexecutionbecauseElectronisconfiguredwithnodeIntegration:trueandcontextIsolation:false.Thisissuehasbeenpatchedinversion7.1.5.34725 CVE-AskExpertScript3.0.5containscross-sitescriptingandSQLinjectionvulnerabilitiesthatallowunauthenticatedattackerstoinjectmaliciouscodebymanipulatingURLparameters.Attackerscaninjectscripttagsthroughthecateidparameterin2019-categorysearch.phporSQLcodethroughtheviewparameterinlist-details.phptoexecutearbitrarycodeorextractdatabaseinformation.25676 CVE-HirschmannHiLCOSdevicesOpenBAT,WLC,BAT300,BAT54priorto8.80andOpenBATpriorto9.10areshippedwithidenticaldefaultSSHandSSLkeysthatcannotbechanged,allowingunauthenticatedremoteattackerstodecryptorintercept2015-encryptedmanagementcommunications.Attackerscanperformman-in-the-middleattacks,impersonatedevices,andexposesensitiveinformationbyleveragingtheshareddefaultcryptographickeysacrossmultipledevices.10148 CVE- KadosR10GreenBeecontainsanSQLinjectionvulnerabilitythatallowsattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughtheidtodeleteparameter.AttackerscansendcraftedrequestswithmaliciousSQLstatementsinthe idto_deletefieldtoextractormodifysensitivedatabaseinformation.25698 CVE-KadosR10GreenBeecontainsanSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughtheuser2resetparameter.AttackerscansendcraftedrequestswithmaliciousSQL
payloadstoextractsensitivedatabaseinformationormodifydata. 25694 CVE-eDirectorycontainsmultipleSQLinjectionvulnerabilitiesthatallowunauthenticatedattackerstobypassadministratorauthenticationanddisclosesensitivefilesbyinjectingSQLcodeintoparameters.Attackerscanexploitthekeyparameterinthe loginendpointwithunion-basedSQLinjectiontoauthenticateasadministrator,thenleverageauthenticatedfiledisclosurevulnerabilitiesinlanguagefile.phptoreadarbitraryPHPfilesfromtheserver.25675 CVE-ResourceSpace8.6containsanSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstoexecutearbitrarySQLqueriesbyinjectingmaliciouscodethroughthe'ref'parameter.AttackerscansendGETrequeststothewatchedsearches.php2019-endpointwithcraftedSQLpayloadstoextractsensitivedatabaseinformationincludingusernamesandcredentials.25662 CVE-NewsWebsiteScript2.0.5containsanSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughthenewsIDparameter.AttackerscansendGETrequeststoindex.php/show/news/2019-withmaliciousSQLstatementstoextractsensitivedatabaseinformation.25668 CVE-qdPM9.1containsanSQLinjectionvulnerabilitythatallowsattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughthesearchbyextrafields[]parameter.AttackerscansendPOSTrequeststotheusersendpointwithmalicious2019-searchbyextrafields[]valuestotriggerSQLsyntaxerrorsandextractdatabaseinformation.25669 CVE-CMSsite1.0containsanSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughthe'post'parameter.AttackerscansendGETrequeststopost.phpwithmalicious'post'valuesto2019-extractsensitivedatabaseinformationorperformtime-basedblindSQLinjectionattacks.25674 CVE-Auth0-PHPisaPHPSDKforAuth0AuthenticationandManagementAPIs.Fromversion8.0.0tobeforeversion8.19.0,inapplicationsbuiltwiththeAuth0PHPSDK,cookiesareencryptedwithinsufficiententropy,whichmayresultinthreatactors2026-brute-forcingtheencryptionkeyandforgingsessioncookies.Thisissuehasbeenpatchedinversion8.19.0.34236 CVE-KadosR10GreenBeecontainsanSQLinjectionvulnerabilitythatallowsattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughthe'idtomodify'parameter.AttackerscansendcraftedrequestswithmaliciousSQLstatementsinthe2019-idtomodifyfieldtoextractsensitivedatabaseinformationormodifydata.25692 CVE-AnintegeroverflowvulnerabilityexistsintheuncompressedfpdngloadrawfunctionalityofLibRawCommit8dc68e2.Aspeciallycraftedmaliciousfilecanleadtoaheapbufferoverflow.Anattackercanprovideamaliciousfiletotriggerthis2026-vulnerability.24450 CVE-Aheap-basedbufferoverflowvulnerabilityexistsinthex3floadhuffmanfunctionalityofLibRawCommitd20315b.Aspeciallycraftedmaliciousfilecanleadtoaheapbufferoverflow.Anattackercanprovideamaliciousfiletotriggerthis2026-vulnerability.24660 CVE- 2026-AnintegeroverflowvulnerabilityexistsinthedeflatedngloadrawfunctionalityofLibRawCommit8dc68e2.Aspeciallycraftedmaliciousfilecanleadtoaheapbufferoverflow.Anattackercanprovideamaliciousfiletotriggerthisvulnerability. 20884 CVE-TandoorRecipesisanapplicationformanagingrecipes,planningmeals,andbuildingshoppinglists.Priorto2.6.4,thePUT/api/recipe/batchupdate/endpointinTandoorRecipesallowsanyauthenticateduserwithinaSpacetomodifyanyrecipein 2026-thatSpace,includingrecipesmarkedasprivatebyotherusers.Thisbypassesallobject-levelauthorizationchecksenforcedonstandardsingle-recipeendpoints(PUT/api/recipe/{id}/),enablingforcedexposureofprivaterecipes,unauthorizedself- 35045grantofaccessviathesharedlist,andmetadatatampering.Thisvulnerabilityisfixedin2.6.4. MissingAuthenticationforCriticalFunctionvulnerabilityinHoneywellHandheldScannersallowsAuthenticationAbuse.ThisissueaffectsHandheldScanners:fromC1Base(Ingenicx1000)beforeGK000432BAA,fromD1Base(Ingenicx1600)beforeCVE-HE000085BAA,fromA1/B1Base(IMX25)beforeBK000763BAABK000765BAACU000101BAA.ThisvulnerabilitycouldallowaremoteattackerwithinBluetoothrangeofthescanner'sbasestationhasthecapabilitytoremotelyexecutesystem2026-commandsonthehostconnectedtothebasestationwithoutauthentication.ThisissuehasbeenassignedCVE-2026-4272https://nvd.nist.gov/vuln/detail/CVE-2026-42724272upgradetothelatestversionidentifiedtoresolvethevulnerability. CVE-goshsisaSimpleHTTPServerwritteninGo.Fromversion1.1.0tobeforeversion2.0.0-beta.2,whenusingtheShareTokenitispossibletobypassthelimitedselectedfiledownloadwithallthegoshfunctionalities,includingcodeexec.Thisissuehas2026-beenpatchedinversion2.0.0-beta.2.34581 CVE-TheMWWPFormpluginforWordPressisvulnerabletoarbitraryfilemovingduetoinsufficientfilepathvalidationviathe'generateuserfilepath'functionandthe'movetempfiletouploaddir'functioninallversionsupto,andincluding,5.1.0.This 2026-makesitpossibleforunauthenticatedattackerstomovearbitraryfilesontheserver,whichcaneasilyleadtoremotecodeexecutionwhentherightfileismoved(suchaswp-config.php).Thevulnerabilityisonlyexploitableifafileuploadfieldis 4347addedtotheformandthe"Savinginquirydataindatabase"optionisenabled. CVE-Directusisareal-timeAPIandAppdashboardformanagingSQLdatabasecontent.Priorto11.17.0,aggregatefunctions(min,max)appliedtofieldswiththeconcealspecialtypeincorrectlyreturnrawdatabasevaluesinsteadofthemasked 2026-placeholder.WhencombinedwithgroupBy,anyauthenticateduserwithreadaccesstotheaffectedcollectioncanextractconcealedfieldvalues,includingstaticAPItokensandtwo-factorauthenticationsecretsfromdirectususers.Thisvulnerability 35442isfixedin11.17.0. CVE-SillyTavernisalocallyinstalleduserinterfacethatallowsuserstointeractwithtextgenerationlargelanguagemodels,imagegenerationengines,andtext-to-speechvoicemodels.Priortoversion1.17.0,apathtraversalvulnerabilityin2026-/api/chats/importallowsanauthenticatedattackertowriteattacker-controlledfilesoutsidetheintendedchatsdirectorybyinjectingtraversalsequencesintocharactername.Thisissuehasbeenpatchedinversion1.17.0.34522 CVE- 2026-GLPIisafreeassetandITmanagementsoftwarepackage.From11.0.0tobefore11.0.6,anunauthenticatedtime-basedblindSQLinjectionexistsinGLPI'sSearchengine.Thisvulnerabilityisfixedin11.0.6. 26263 CVE-AflawwasfoundinKeycloak.AnauthenticateduserwiththeumaprotectionrolecanbypassUser-ManagedAccess(UMA)policyvalidation.Thisallowstheattackertoincluderesourceidentifiersownedbyotherusersinapolicycreationrequest, 2026-eveniftheURLpathspecifiesanattacker-ownedresource.Consequently,theattackergainsunauthorizedpermissionstovictim-ownedresources,enablingthemtoobtainaRequestingPartyToken(RPT)andaccesssensitiveinformationorperform 4636unauthorizedactions. Cloudreveisaself-hostedfilemanagementandsharingsystem.Priortoversion4.13.0,theapplicationusestheweakpseudo-randomnumbergeneratormath/randseededwithtime.Now().UnixNano()togeneratecriticalsecuritysecrets,includingCVE-thesecretkey,andhashidsalt.Thesesecretsaregenerateduponfirststartupandpersistedinthedatabase.Anattackercanexploitthisbyobtainingtheadministrator'saccountcreationtime(viapublicAPIendpoints)tonarrowthesearchwindow2026-forthePRNGseed,anduseknownhashidtovalidatetheseed.Bybrute-forcingtheseed(demonstratedtotake<3hoursongeneralconsumerPC),anattackercanpredictthesecretkey.ThisallowsthemtoforgevalidJSONWebTokens(JWTs)for25726anyuser,includingadministrators,leadingtofullaccounttakeoverandprivilegeescalation.Thisissuehasbeenpatchedinversion4.13.0. CVE-Ferretisadeclarativesystemforworkingwithwebdata.Priorto2.0.0-alpha.4,apathtraversalvulnerabilityinFerret'sIO::FS::WRITEstandardlibraryfunctionallowsamaliciouswebsitetowritearbitraryfilestothefilesystemofthemachinerunning 2026-Ferret.Whenanoperatorscrapesawebsitethatreturnsfilenamescontaining../sequences,andusesthosefilenamestoconstructoutputpaths(astandardscrapingpattern),theattackercontrolsboththedestinationpathandthefilecontent.This 34783canleadtoremotecodeexecutionviacronjobs,SSHauthorized_keys,shellprofiles,orwebshells.Thisvulnerabilityisfixedin2.0.0-alpha.4. CVE-TheGoMCPSDKusedGo'sstandardencoding/json.Priortoversion1.4.0,theModelContextProtocol(MCP)GoSDKdoesnotenableDNSrebindingprotectionbydefaultforHTTP-basedservers.WhenanHTTP-basedMCPserverisrunonlocalhost withoutauthenticationwithStreamableHTTPHandlerorSSEHandler,amaliciouswebsitecouldexploitDNSrebindingtobypasssame-originpolicyrestrictionsandsendrequeststothelocalMCPserver.Thiscouldallowanattackertoinvoketoolsor 34742accessresourcesexposedbytheMCPserveronbehalfoftheuserinthoselimitedcircumstances.Thisissuehasbeenpatchedinversion1.4.0.
CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,authenticateduserswithEditRecordsorManageGroupspermissionscanexploitatime-basedblindSQLinjectionvulnerabilityinthePropertyAssign.phpendpointtoexfiltrate ormodifyanydatabasecontent,includingusercredentials,personalidentifiableinformation(PII),andconfigurationsecrets.Thisvulnerabilityisfixedin7.1.0. 34402 CVE- IBMVerifyIdentityAccessContainer11.0through11.0.2andIBMSecurityVerifyAccessContainer10.0through10.0.9.1andIBMVerifyIdentityAccess11.0through11.0.2andIBMSecurityVerifyAccess10.0through10.0.9.1undercertainload conditionscouldallowanattackertobypassauthenticationmechanismsandgainunauthorizedaccesstotheapplication.4101 CVE- Tinaisaheadlesscontentmanagementsystem.Priortoversion2.2.2,apathtraversalvulnerabilityin@tinacms/graphqlallowsunauthenticateduserstowriteandoverwritearbitraryfileswithintheprojectroot.Thisisachievedbymanipulatingthe2026- relativePathparameterinGraphQLmutations.Theimpactincludestheabilitytoreplacecriticalserverconfigurationfilesandpotentiallyexecutearbitrarycommandsbysabotagingbuildscript.Thisissuehasbeenpatchedinversion2.2.2.33949 CVE- prompts.chatpriortocommit0f8d4c3containsapathtraversalvulnerabilityinskillfilehandlingthatallowsattackerstowritearbitraryfilestotheclientsystembycraftingmaliciousZIParchiveswithunsanitizedfilenamescontainingpathtraversal 2026- sequences.Attackerscanexploitmissingserver-sidefilenamevalidationtoinjectpathtraversalsequences../intoskillfilearchives,whichwhenextractedbyvulnerabletoolswritefilesoutsidetheintendeddirectoryandoverwriteshellinitialization 22661 filestoachievecodeexecution. CVE- prompts.chatpriortocommit1464475containsanidentityconfusionvulnerabilityduetoinconsistentcase-sensitiveandcase-insensitivehandlingofusernamesacrosswriteandreadpaths,allowingattackerstocreatecase-variantusernamesthat2026- bypassuniquenesschecks.Attackerscanexploitnon-deterministicusernameresolutiontoimpersonatevictimaccounts,replaceprofilecontentoncanonicalURLs,andinjectattacker-controlledmetadataandcontentacrosstheplatform.22665 CVE- RedwoodSDKisaserver-firstReactframework.From1.0.0-beta.50to1.0.5,erverfunctionsexportedfrom"useserver"filescouldbeinvokedviaGETrequests,bypassingtheirintendedHTTPmethod.Incookie-authenticatedapplications,thisallowed 2026- cross-siteGETnavigationstotriggerstate-changingfunctions,becausebrowserssendSameSite=Laxcookiesontop-levelGETrequests.Thisaffectedallserverfunctions--bothserverAction()handlersandbareexportedfunctionsin"useserver" 39371 files.Thisvulnerabilityisfixedin1.0.6. CVE- HirschmannHiLCOSClassicPlatformswitchesClassicL2E,L2P,L3E,L3Pversionspriorto09.0.06andClassicL2Bpriorto05.3.07containacredentialexposurevulnerabilitywhereuserpasswordsaresynchronizedwithSNMPv1/v2communitystrings2016- andtransmittedinplaintextwhenthefeatureisenabled.AttackerswithlocalnetworkaccesscansniffSNMPtrafficorextractconfigurationdatatorecoverplaintextcredentialsandgainunauthorizedadministrativeaccesstotheswitches.15058 CVE- 2026- OutofboundsreadinWebCodecsinGoogleChromepriorto146.0.7680.178allowedaremoteattackertoperformanoutofboundsmemoryreadviaacraftedHTMLpage.(Chromiumsecurityseverity:High) 5282 Electronisaframeworkforwritingcross-platformdesktopapplicationsusingJavaScript,HTMLandCSS.Priortoversions39.8.1,40.7.0,and41.0.0,appsthatuseoffscreenrenderingandallowchildwindowsviawindow.open()maybevulnerabletoaCVE- use-after-free.IftheparentoffscreenWebContentsisdestroyedwhileachildwindowremainsopen,subsequentpaintframesonthechilddereferencefreedmemory,whichmayleadtoacrashormemorycorruption.Appsareonlyaffectedifthey2026- useoffscreenrendering(webPreferences.offscreen:true)andtheirsetWindowOpenHandlerpermitschildwindows.Appsthatdonotuseoffscreenrendering,orthatdenychildwindows,arenotaffected.Thisissuehasbeenpatchedinversions39.8.1,34774 40.7.0,and41.0.0. CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,Theapplicationisvulnerabletotime-basedSQLinjectionduetoanimproperinputvalidation.EndpointReports/ConfirmReportEmail.php?familyId=isnotcorrectlysanitising2026- userinput,specifically,thesanitisedinputisnotusedtocreatetheSQLquery.Thisvulnerabilityisfixedin7.1.0.39341 CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,anauthenticatedAPIusercanmodifyanyfamilyrecord'sstatewithoutproperauthorizationbysimplychangingthe{familyId}parameterinrequests,regardlessofwhether 2026- theypossesstherequiredEditRecordsprivilege./family/{familyId}/verify,/family/{familyId}/verify/url,/family/{familyId}/verify/now,/family/{familyId}/activate/{status},and/family/{familyId}/geocodelackrole-basedaccesscontrol,allowingusers 39331 todeactivate/reactivatearbitraryfamilies,spamverificationemails,andmarkfamiliesasverifiedandtriggergeocoding.Thisvulnerabilityisfixedin7.1.0. CVE- TheWCFM-FrontendManagerforWooCommercealongwithBookingsSubscriptionListingsCompatiblepluginforWordPressisvulnerabletoInsecureDirectObjectReferenceinallversionsupto,andincluding,6.7.25viamultipleAJAXactions 2026- includingwcfm_modify_order_status,delete_wcfm_article,delete_wcfm_product,andthearticlemanagementcontrollerduetomissingvalidationonuser-suppliedobjectIDs.Thismakesitpossibleforauthenticatedattackers,withVendor-level 4896 accessandabove,tomodifythestatusofanyorder,deleteormodifyanypost/product/page,regardlessofownership. CVE- PraisonAIisamulti-agentteamssystem.Priorto1.5.113,ThePraisonAItemplatesinstallationfeatureisvulnerabletoa"ZipSlip"ArbitraryFileWriteattack.Whendownloadingandextractingtemplatearchivesfromexternalsources(e.g.,GitHub),2026- theapplicationusesPython'szipfile.extractall()withoutverifyingifthefileswithinthearchiveresolveoutsideoftheintendedextractiondirectory.Thisvulnerabilityisfixedin1.5.113.39307 CVE- UNSUPPORTEDWHENASSIGNEDFocalboardversion8.0failstosanitizecategoryIDsbeforeincorporatingthemintodynamicSQLstatementswhenreorderingcategories.AnattackercaninjectamaliciousSQLpayloadintothecategoryidfield, 2026- whichisstoredinthedatabaseandlaterexecutedunsanitizedwhenthecategoryreorderAPIprocessesthestoredvalue.ThisSecond-OrderSQLInjection(Time-BasedBlind)allowsanauthenticatedattackertoexfiltratesensitivedataincluding 25773 passwordhashesofotherusers.NOTE:Focalboardasastandaloneproductisnotmaintainedandnofixwillbeissued. CVE- FileBrowserisafilemanaginginterfaceforuploading,deleting,previewing,renaming,andeditingfileswithinaspecifieddirectory.Priorto2.63.1,thefixincommitb6a4fb1("self-registeredusersdon'tgetexecuteperms")strippedExecute 2026- permissionandCommandsfromuserscreatedviathesignuphandler.Thesamefixwasnotappliedtotheproxyauthhandler.Usersauto-createdonfirstsuccessfulproxy-authloginaregrantedexecutioncapabilitiesfromglobaldefaults,even 35607 thoughthesignuppathwasexplicitlychangedtopreventexecutionrightsfrombeinginheritedbyautomaticallyprovisionedaccounts.Thisvulnerabilityisfixedin2.63.1. CVE- ThePerfmatterspluginforWordPressisvulnerabletoarbitraryfiledeletionviapathtraversalinallversionsupto,andincluding,2.5.9.1.ThisisduetothePMCS::action_handler()methodprocessingthe$_GET['delete']parameterwithoutany 2026- sanitization,authorizationcheck,ornonceverification.Theunsanitizedfilenameisconcatenatedwiththestoragedirectorypathandpassedtounlink().Thismakesitpossibleforauthenticatedattackers,withSubscriber-levelaccessandabove,to 4350 deletearbitraryfilesontheserverbyusing../pathtraversalsequences,includingwp-config.phpwhichwouldforceWordPressintotheinstallationwizardandallowfullsitetakeover. ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,aSQLinjectionvulnerabilityexistsinPropertyTypeEditor.php,partoftheadministrationfunctionalityformanagingpropertytypecategories(People→PersonProperties/CVE- FamilyProperties).ThevulnerabilitywasintroducedwhenlegacyFilterInput()whichbothstripsHTMLandescapesSQL--wasreplacedwithsanitizeText(),whichstripsHTMLonly.User-suppliedvaluesfromtheNameandDescriptionfieldsare2026- concatenateddirectlyintorawINSERTandUPDATEquerieswithnoSQLescaping.ThisallowsanyauthenticateduserwiththeMenuOptionsrole(anon-adminstaffpermission)toperformtime-basedblindinjectionandexfiltrateanydatafromthe39340 database,includingpasswordhashesofallusers.Thisvulnerabilityisfixedin7.1.0. CVE- TandoorRecipesisanapplicationformanagingrecipes,planningmeals,andbuildingshoppinglists.Priorto2.6.4,RecipeBookViewSetandRecipeBookEntryViewSetuseCustomIsSharedasanalternativepermissionclass,but 2026- CustomIsShared.hasobjectpermission()returnsTrueforallHTTPmethods--includingDELETE,PUT,andPATCH--withoutcheckingrequest.methodinSAFE_METHODS.AnyuserwhoisinthesharedlistofaRecipeBookcandeleteoroverwriteit, 35488 eventhoughsharedaccessissemanticallyread-only.Thisvulnerabilityisfixedin2.6.4. CVE- OneUptimeisanopen-sourcemonitoringandobservabilityplatform.Priortoversion10.0.42,OneUptime'sSAMLSSOimplementation(App/FeatureSet/Identity/Utils/SSO.ts)hasdecoupledsignatureverificationandidentityextraction. 2026- isSignatureValid()verifiesthefirst elementintheXMLDOMusingxml-crypto,whilegetEmail()alwaysreadsfromassertion[0]viaxml2js.Anattackercanprependanunsignedassertioncontaininganarbitraryidentitybeforea 34840 legitimatelysignedassertion,resultinginauthenticationbypass.Thisissuehasbeenpatchedinversion10.0.42. CVE- Anissuethatallowedall-organizationadministratorstopromoteaccountstosuperuserstatushasbeenresolved.ThisisaninstanceofCWE-269:ImproperPrivilegeManagement,andhasanestimatedCVSSscoreof2026- CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N(8.1High).Thisissuewasfixedinversion4.0.260202.0oftherunZeroPlatform.5373 CVE- FileBrowserisafilemanaginginterfaceforuploading,deleting,previewing,renaming,andeditingfileswithinaspecifieddirectory.Priortoversion2.62.2,thesignupHandlerinFileBrowserappliesdefaultuserpermissionsvia d.settings.Defaults.Apply(user),thenstripsonlyAdmin.TheExecutepermissionandCommandslistfromthedefaultusertemplatearenotstripped.Whenanadministratorhasenabledsignup,server-sideexecution,andsetExecute=trueinthe 34528 defaultusertemplate,anyunauthenticateduserwhoself-registersinheritsshellexecutioncapabilitiesandcanrunarbitrarycommandsontheserver.Thisissuehasbeenpatchedinversion2.62.2.
CVE- InModem,thereisapossibleoutofboundswriteduetoamissingboundscheck.Thiscouldleadtoremoteescalationofprivilege,ifaUEhasconnectedtoaroguebasestationcontrolledbytheattacker,withnoadditionalexecutionprivileges needed.Userinteractionisneededforexploitation.PatchID:MOLY01406170;IssueID:MSV-4461.
20432 CVE- NokiaMantaRayNMisvulnerabletoanOScommandinjectionvulnerabilityduetoimproperneutralizationofspecialelementsusedinanOScommandinLogSearchapplication. 24818 CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto6.5.3,aStoredCross-SiteScripting(StoredXSS)vulnerabilityintheadminpanel'sgroup-creationfeatureallowsanyuserwithgroup-creationprivilegestoinjectmaliciousJavaScript2026- thatexecutesautomaticallywhenanadministratorviewsthepage.Thisenablesattackerstostealtheadministrator'ssessioncookies,potentiallyleadingtofulladministrativeaccounttakeover.Thisvulnerabilityisfixedin6.5.3.35575 CVE- Avulnerabilityintheweb-basedmanagementinterfaceofCiscoEvolvedProgrammableNetworkManager(EPNM)couldallowanauthenticated,remoteattackerwithlowprivilegestoaccesssensitiveinformationthattheyarenotauthorizedto 2026- access.ThisvulnerabilityisduetoimproperauthorizationchecksonaRESTAPIendpointofanaffecteddevice. Anattackercouldexploitthisvulnerabilitybyqueryingtheaffectedendpoint.Asuccessfulexploitcouldallowtheattackertoview 20155 sessioninformationofactiveCiscoEPNMusers,includinguserswithadministrativeprivileges,whichcouldresultintheaffecteddevicebeingcompromised. CVE- AvulnerabilitywasdeterminedinTendaCX12L16.03.53.12.AffectedbythisissueisthefunctionfromwebExcptypemanFilterofthefile/goform/webExcptypemanFilter.Executingamanipulationoftheargumentpagecanleadtostack-basedbuffer2026- overflow.Theattackrequiresaccesstothelocalnetwork.Theexploithasbeenpubliclydisclosedandmaybeutilized.5684 CVE- TwitchStudioversion0.114.8andpriorcontainaprivilegeescalationvulnerabilityinitsprivilegedhelpertoolthatallowslocalattackerstoexecutearbitrarycodeasrootbyexploitinganunprotectedXPCservice.Attackerscaninvokethe2024- installFromPath:toPath:withReply:methodtooverwritesystemfilesandprivilegedbinaries,achievingfullsystemcompromise.TwitchStudiowasdiscontinuedinMay2024.14032 CVE- Thereisamemorycorruptionvulnerabilityduetoanout-of-boundswritewhenloadingacorruptedLVCLASSfileinNILabVIEW.Thisvulnerabilitymayresultininformationdisclosureorarbitrarycodeexecution.Successfulexploitationrequiresan2026- attackertogetausertoopenaspeciallycrafted.lvclassfile.ThisvulnerabilityaffectsNILabVIEW2026Q1(26.1.0)andpriorversions.32861 CVE- Thereisamemorycorruptionvulnerabilityduetoanout-of-boundswritewhenloadingacorruptedLVLIBfileinNILabVIEW.Thisvulnerabilitymayresultininformationdisclosureorarbitrarycodeexecution.Successfulexploitationrequiresan2026- attackertogetausertoopenaspeciallycrafted.lvlibfile.ThisvulnerabilityaffectsNILabVIEW2026Q1(26.1.0)andpriorversions.32860 CVE- 2025- Memorycorruptionwhileprocessingaframerequestfromuser. 47391 CVE- 2025- MemorycorruptionwhilepreprocessingIOCTLrequestinJPEGdriver. 47390 CVE- 2025- Memorycorruptionwhenbuffercopyoperationfailsduetointegeroverflowduringattestationreportgeneration. 47389 CVE- 2026- V-SFTversions6.2.10.0andpriorcontainanout-of-boundsreadvulnerabilityinVS6ComFile!loadlinkinf.OpeningacraftedV7filemayleadtoinformationdisclosurefromtheaffectedproduct. 32926 OpenPrintingCUPSisanopensourceprintingsystemforLinuxandotherUnix-likeoperatingsystems.Inversions2.4.16andprior,alocalunprivilegedusercancoercecupsdintoauthenticatingtoanattacker-controlledlocalhostIPPservicewithaCVE- reusableAuthorization:Local...token.Thattokenisenoughtodrive/admin/requestsonlocalhost,andtheattackercancombineCUPS-Create-Local-Printerwithprinter-is-shared=truetopersistafile:///...queueeventhoughthenormalFileDevice2026- policyrejectssuchURIs.Printingtothatqueuegivesanarbitraryrootfileoverwrite;thePoCbelowusesthatprimitivetodropasudoersfragmentanddemonstraterootcommandexecution.Attimeofpublication,therearenopubliclyavailable34990 patches. CVE- 2026- MemoryCorruptionwhenretrievingoutputbufferwithinsufficientsizevalidation. 21371 CVE- 2026- V-SFTversions6.2.10.0andpriorcontainanout-of-boundsreadvulnerabilityinVS6MemInIF!settemptypedefault.OpeningacraftedV7filemayleadtoinformationdisclosurefromtheaffectedproduct. 32927 CVE- PraisonAIisamulti-agentteamssystem.Priortoversion1.5.90,runpython()inpraisonaiconstructsashellcommandstringbyinterpolatinguser-controlledcodeintopython3-c" "andpassingittosubprocess.run(...,shell=True).The2026- escapinglogiconlyhandles\and",leaving$()andbackticksubstitutionsunescaped,allowingarbitraryOScommandexecutionbeforePythonisinvoked.Thisissuehasbeenpatchedinversion1.5.90.34937 CVE- AnthropicClaudeCodeCLIandClaudeAgentSDKcontainanOScommandinjectionvulnerabilityintheprompteditorinvocationutilitythatallowsattackerstoexecutearbitrarycommandsbycraftingmaliciousfilepaths.Attackerscaninjectshell 2026- metacharacterssuchas$()orbacktickexpressionsintofilepathsthatareinterpolatedintoshellcommandsexecutedviaexecSync.Althoughthefilepathiswrappedindoublequotes,POSIXshellsemantics(POSIX§2.2.3)donotpreventcommand 35021 substitutionwithindoublequotes,allowinginjectedexpressionstobeevaluatedandresultinginarbitrarycommandexecutionwiththeprivilegesoftheuserrunningtheCLI. IntheLinuxkernel,thefollowingvulnerabilityhasbeenresolved:apparmor:fixside-effectbuginmatch_char()macrousageThematch_char()macroevaluatesitscharacterparametermultipletimeswhentraversingdifferentialencodingchains. Wheninvokedwith*str++,thestringpointeradvancesoneachiterationoftheinnerdo-whileloop,causingtheDFAtocheckdifferentcharactersateachiterationandthereforeskipinputcharacters.Thisresultsinout-of-boundsreadswhenthe pointeradvancespasttheinputbufferboundary.[94.984676]==================================================================[ aa_dfa_match+0x5ae/0x760[94.985655]Readofsize1ataddrffff888100342000bytaskfile/976[94.986319]CPU:7UID:1000PID:976Comm:fileNottainted6.19.0-rc7-next-20260127#1PREEMPT(lazy)[ StandardPC(Q35+ICH9,2009),BIOS1.16.3-debian-1.16.3-204/01/2014[94.986329]CallTrace:[94.986341][94.986347]dump_stack_lvl+0x5e/0x80[CVE- 94.986388]kasan_report+0x118/0x150[94.986401]?aa_dfa_match+0x5ae/0x760[94.986405]aa_dfa_match+0x5ae/0x760[94.986408]__aa_path_perm+0x131/0x400[2026- apparmor_file_open+0x345/0x570[94.986431]security_file_open+0x5c/0x140[94.986442]do_dentry_open+0x2f6/0x1120[94.986450]vfs_open+0x38/0x2b0[23406 94.986469]?__x64_sys_openat+0xf8/0x130[94.986477]do_file_open+0x19d/0x360[94.986487]do_sys_openat2+0x98/0x100[94.986491]__x64_sys_openat+0xf8/0x130[ count_memcg_events+0x15f/0x3c0[94.986526]?srso_alias_return_thunk+0x5/0xfbef5[94.986540]?handle_mm_fault+0x1639/0x1ef0[94.986551]?vma_start_read+0xf0/0x320[ ?srso_alias_return_thunk+0x5/0xfbef5[94.986563]?fpregs_assert_state_consistent+0x50/0xe0[94.986572]?srso_alias_return_thunk+0x5/0xfbef5[94.986574] srso_alias_return_thunk+0x5/0xfbef5[94.986588]?irqentry_exit+0x3c/0x590[94.986595]entry_SYSCALL_64_after_hwframe+0x76/0x7e[94.986597]RIP:0033:0x7fda4a79c3ea ensuringsingleevaluationperouterloop. CVE- Thereisamemorycorruptionvulnerabilityduetoanout-of-boundswriteinResFileFactory::InitResourceMgr()inNILabVIEW.Thisvulnerabilitymayresultininformationdisclosureorarbitrarycodeexecution.Successfulexploitationrequiresan 2026- attackertogetausertoopenaspeciallycraftedVIfile.ThisvulnerabilityaffectsNILabVIEW2026Q1(26.1.0)andpriorversions. 32862 CVE- MemoryCorruptionwhenaccessinganoutputbufferwithoutvalidatingitssizeduringIOCTLprocessing. 21373
CVE- MemoryCorruptionwhensendingIOCTLrequestswithinvalidbuffersizesduringmemcpyoperations. 21372 CVE- IntheLinuxkernel,thefollowingvulnerabilityhasbeenresolved:apparmor:Fixdoublefreeofnsnameinaareplaceprofiles()ifnsnameisNULLafter1071error=aaunpack(udata,&lh,&nsname); 1089}elseif(ent->nsname){thennsnameisassignedtheent->nsname1095nsname=ent->nsname;howeverent->nsnameisfreedat1262aaloadentfree(ent); 23408 NULLingoutent->nsnameafteritistransferredtonsname") CVE- OpenEXRprovidesthespecificationandreferenceimplementationoftheEXRfileformat,animagestorageformatforthemotionpictureindustry.From3.1.0tobefore3.2.7,3.3.9,and3.4.9,internalexrundopiz()advancestheworkingwavelet 2026- pointerwithsigned32-bitarithmetic.Becausenx,ny,andwcountareint,acraftedEXRfilecanmakethisproductoverflowandwrap.Thenextchannelthendecodesfromanincorrectaddress.Thewaveletdecodepathoperatesinplace,sothis 34588 yieldsbothout-of-boundsreadsandout-of-boundswrites.Thisvulnerabilityisfixedin3.2.7,3.3.9,and3.4.9. CVE- 2026- MemoryCorruptionwhenhandlingpowermanagementrequestswithimproperlysizedinput/outputbuffers. 21382 CVE- UnsanitizedinputduringwebpagegenerationintheKiroAgentwebviewinKiroIDEbeforeversion0.8.140allowsaremoteunauthenticatedthreatactortoexecutearbitrarycodeviaapotentiallydamagingcraftedcolorthemenamewhenalocal2026- useropenstheworkspace.Thisissuerequirestheusertotrusttheworkspacewhenprompted.Toremediatethisissue,usersshouldupgradetoversion0.8.140.5429 CVE- 2026- MemoryCorruptionwhenusingdeprecatedDMABUFIOCTLcallstomanagevideomemory. 21380 CVE- 2026- MemoryCorruptionwhenaccessinganoutputbufferwithoutvalidatingitssizeduringIOCTLprocessinginacamerasensordriver. 21378 CVE- 2026- MemoryCorruptionwhenaccessinganoutputbufferwithoutvalidatingitssizeduringIOCTLprocessinginacamerasensordriver. 21376 CVE- 2026- MemoryCorruptionwhenaccessinganoutputbufferwithoutvalidatingitssizeduringIOCTLprocessing. 21375 CVE- 2026- MemoryCorruptionwhenprocessingauxiliarysensorinput/outputcontrolcommandswithinsufficientbuffersizevalidation. 21374 CVE- BentoMLisaPythonlibraryforbuildingonlineservingsystemsoptimizedforAIappsandmodelinference.Priorto1.4.38,theclouddeploymentpathinsrc/bentoml/internal/cloud/deployment.pywasnotincludedinthefixforCVE-2026-33744.Line 2026- 1648interpolatessystempackagesdirectlyintoashellcommandusinganf-stringwithoutanyquoting.ThegeneratedscriptisuploadedtoBentoCloudassetup.shandexecutedonthecloudbuildinfrastructureduringdeployment,makingthisa 35043 remotecodeexecutionontheCI/CDtier.Thisvulnerabilityisfixedin1.4.38. CVE- HiSecOSwebserverversions05.0.00to08.3.01priorto08.3.02containsaprivilegeescalationvulnerabilitythatallowsauthenticateduserswithoperatororauditorrolestoescalateprivilegestotheadministratorrolebysendingspeciallycrafted2023- packetstothewebserver.Attackerscanexploitthisflawtogainfulladministrativeaccesstotheaffecteddevice.7343 CVE- Theapplication'supdateservice,whencheckingforupdates,loadscertainsystemlibrariesfromasearchpaththatincludesdirectorieswritablebylow‑privilegedusersandisnotstrictlyrestrictedtotrustedsystemlocations.Becausetheselibraries2026- mayberesolvedandloadedfromuser‑writablelocations,alocalattackercanplaceamaliciouslibrarythereandhaveitloadedwithSYSTEMprivileges,resultinginlocalprivilegeescalationandarbitrarycodeexecution.3775 CVE- ImproperneutralizationofspecialelementsintheauthenticationcomponentsinAmazonAthenaODBCdriverbefore2.1.0.0mightallowathreatactortoexecutearbitrarycodeorredirectauthenticationflowsbyusingspeciallycraftedconnection2026- parametersthatareprocessedbythedriverduringuser-initiatedauthentication.Toremediatethisissue,usersshouldupgradetoversion2.1.0.0.35558 CVE- Theapplication'slistboxcalculatearraylogickeepsstalereferencestopageorformobjectsaftertheyaredeletedorre-created,whichallowscrafteddocumentstotriggerause-after-freewhenthecalculationrunsandcanpotentiallyleadto2026- arbitrarycodeexecution.3779 CVE- OScommandinjectioninthebrowser-basedauthenticationcomponentinAmazonAthenaODBCdriverbefore2.0.5.1onLinuxmightallowathreatactortoexecutearbitrarycodebyusingspeciallycraftedconnectionparametersthatareloadedby2026- thedriverduringalocaluser-initiatedconnection.Toremediatethisissue,usersshouldupgradetoversion2.0.5.1orlater.5485 CVE- Glancesisanopen-sourcesystemcross-platformmonitoringtool.Priortoversion4.5.3,Glancessupportsdynamicconfigurationvaluesinwhichsubstringsenclosedinbackticksareexecutedassystemcommandsduringconfigurationparsing.This 2026- behavioroccursinConfig.getvalue()andisimplementedwithoutvalidationorrestrictionoftheexecutedcommands.Ifanattackercanmodifyorinfluenceconfigurationfiles,arbitrarycommandswillexecuteautomaticallywiththeprivilegesofthe 33641 Glancesprocessduringstartuporconfigurationreload.IndeploymentswhereGlancesrunswithelevatedprivileges(e.g.,asasystemservice),thismayleadtoprivilegeescalation.Thisissuehasbeenpatchedinversion4.5.3. CVE- Thereisamemorycorruptionvulnerabilityduetoanout-of-boundsreadinmgcoreSH253!alignedfree()inNILabVIEW.Thisvulnerabilitymayresultininformationdisclosureorarbitrarycodeexecution.Successfulexploitationrequiresanattacker2026- togetausertoopenaspeciallycraftedVIfile.ThisvulnerabilityaffectsNILabVIEW2026Q1(26.1.0)andpriorversions.32864 CVE- Thereisamemorycorruptionvulnerabilityduetoanout-of-boundsreadinsentrytransactioncontextsetoperation()inNILabVIEW.Thisvulnerabilitymayresultininformationdisclosureorarbitrarycodeexecution.Successfulexploitationrequires2026- anattackertogetausertoopenaspeciallycraftedVIfile.ThisvulnerabilityaffectsNILabVIEW2026Q1(26.1.0)andpriorversions.32863 IntheLinuxkernel,thefollowingvulnerabilityhasbeenresolved:apparmor:fixmissingboundscheckonDEFAULTtableinverifydfa()Theverifydfa()functiononlychecksDEFAULTTABLEboundswhenthestateisnotdifferentiallyencoded. theverificationlooptraversesthedifferentialencodingchain,itreadsk=DEFAULTTABLE[j]anduseskasanarrayindexwithoutvalidation.AmalformedDFAwithDEFAULTTABLE[j]>=statecount,therefore,causesbothout-of-boundsreadsand writes.[57.179855]==================================================================[57.180549]BUG:KASAN:slab-out-of-boundsinverifydfa+0x59a/0x660[ ffff888100eadec4bytasksu/993[57.181554]CPU:1UID:0PID:993Comm:suNottainted6.19.0-rc7-next-20260127#1PREEMPT(lazy)[57.181558]Hardwarename:QEMUStandardPC(Q35+ICH9,2009),BIOS1.16.3-debian-1.16.3-204/01/2014 [57.181563]CallTrace:[57.181572] [57.181577]dumpstacklvl+0x5e/0x80[57.181596]printreport+0xc8/0x270[57.181605]?verifydfa+0x59a/0x660[ CVE- verifydfa+0x59a/0x660[57.181623]verifydfa+0x59a/0x660[57.181627]aadfaunpack+0x1610/0x1740[57.181629]?kmalloccachenoprof+0x1d0/0x470[ 2026- srsoaliasreturnthunk+0x5/0xfbef5[57.181653]?srsoaliasreturnthunk+0x5/0xfbef5[57.181656]?aaunpacknameX+0x1a8/0x300[57.181659]aaunpack+0x20b0/0x4c30[ 23407 stackdepotsaveflags+0x33/0x700[57.181681]?kasansavetrack+0x4f/0x80[57.181683]?kasansavetrack+0x3e/0x80[57.181686]?kasankmalloc+0x93/0xb0[ aasimplewritetobuffer+0x54/0x130[57.181697]?policyupdate+0x154/0x330[57.181704]aareplaceprofiles+0x15a/0x1dd0[57.181707]?srsoaliasreturnthunk+0x5/0xfbef5[ 57.181712]?aaloaddataalloc+0x77/0x140[57.181715]?srsoaliasreturnthunk+0x5/0xfbef5[57.181717]?copyfromuser+0x2a/0x70[57.181730]policyupdate+0x17a/0x330[ rwverifyarea+0x93/0x2d0[57.181740]vfswrite+0x235/0xab0[57.181745]ksyswrite+0xb0/0x170[57.181748]dosyscall64+0x8e/0x660[57.181762]entrySYSCALL64afterhwframe+0x76/0x7e[ RemovetheMATCHFLAGDIFFENCODEconditiontovalidateallDEFAULTTABLEentriesunconditionally.
CVE- RealTermSerialTerminal2.0.0.70containsastructuredexceptionhandling(SEH)bufferoverflowvulnerabilityintheEchoPorttabthatallowslocalattackerstoexecutearbitrarycodebysupplyingamaliciouspayload.Attackerscancraftabuffer overflowpayloadwithaPOPPOPRETgadgetchainandshellcodethattriggerscodeexecutionwhenpastedintothePortfieldandtheChangebuttonisclicked.25679 CVE- HotspotShield6.0.3containsanunquotedservicepathvulnerabilityinthehshldservicebinarythatallowslocalattackerstoescalateprivilegesbyinjectingmaliciousexecutables.Attackerscanplaceexecutablefilesintheservicepathandupon2016- servicerestartorsystemreboot,themaliciouscodeexecuteswithLocalSystemprivileges.20060 CVE- SpyEmergencybuild23.0.205containsanunquotedservicepathvulnerabilityintheSpyEmrgHealthandSpyEmrgSrvservicesthatallowslocalattackerstoescalateprivilegesbyinsertingmaliciousexecutables.Attackerscanplaceexecutablefiles2016- intheunquotedservicepathandtriggerservicerestartorsystemreboottoexecutecodewithLocalSystemprivileges.20056 CVE- Aflawwasfoundinlibssh.Thisvulnerabilityallowslocalman-in-the-middleattacks,securitydowngradesofSSH(SecureShell)connections,andmanipulationoftrustedhostinformation,posingasignificantrisktotheconfidentiality,integrity,and2025- availabilityofSSHcommunicationsviaaninsecuredefaultconfigurationonWindowssystemswherethelibraryautomaticallyloadsconfigurationfilesfromtheC:\etcdirectory,whichcanbecreatedandmodifiedbyunprivilegedlocalusers.14821 CVE- 2026- CodeexecutioninAssistFeedbackServiceofTECNOPova7Pro5GonAndroidallowslocalappstoexecutearbitrarycodeassystemviacommandinjection. 0634 CVE- 2026- V-SFTversions6.2.10.0andpriorcontainastack-basedbufferoverflowinVS6ComFile!CV7BaseMap::WriteV7DataToRom.OpeningacraftedV7filemayleadtoarbitrarycodeexecutionontheaffectedproduct. 32925 CVE- sheedAntiVirus2.3containsanunquotedservicepathvulnerabilityintheShavProtservicethatallowslocalattackerstoescalateprivilegesbyexploitingtheservicebinarypath.Attackerscaninsertamaliciousexecutableintheunquotedpathand2016- triggerservicerestartorsystemreboottoexecutecodewithLocalSystemprivileges.20061 CVE- pymanagerincludedthecurrentworkingdirectoryinsys.pathmeaningmodulescouldbeshadowedbymodulesinthecurrentworkingdirectory.Asaresult,ifauserexecutesapymanager-generatedcommand(e.g.,pip,pytest)2026- controlleddirectory,amaliciousmoduleinthatdirectorycanbeimportedandexecutedinsteadoftheintendedpackage.5271 CVE- IObitMalwareFighter4.3.1containsanunquotedservicepathvulnerabilityintheIMFserviceandLiveUpdateSvcservicesthatallowslocalattackerstoescalateprivileges.Attackerscaninsertamaliciousexecutablefileintheunquotedservicepath2016- andtriggerprivilegeescalationwhentheservicerestartsorthesystemreboots,executingcodewithLocalSystemprivileges.20059 CVE- NetgateAMITIAntivirusbuild23.0.305containsanunquotedservicepathvulnerabilityintheAmitiAvSrvandAmitiAntivirusHealthservicesthatallowslocalattackerstoescalateprivileges.Attackerscanplaceamaliciousexecutableintheunquoted2016- servicepathandtriggerservicerestartorsystemreboottoexecutecodewithLocalSystemprivileges.20058 CVE- 2026- V-SFTversions6.2.10.0andpriorcontainanout-of-boundsreadinVS6ComFile!getmacromemCOM.OpeningacraftedV7filemayleadtoinformationdisclosurefromtheaffectedproduct. 32929 CVE- NETGATERegistryCleanerbuild16.0.205containsanunquotedservicepathvulnerabilityintheNGRegClnSrvservicethatallowslocalattackerstoescalateprivilegesbyexploitingtheservicebinarypath.Attackerscanplaceamaliciousexecutable2016- intheunquotedpathandtriggerservicerestartorsystemreboottoexecutecodewithLocalSystemprivileges.20057 IntheLinuxkernel,thefollowingvulnerabilityhasbeenresolved:apparmor:fixraceonrawdatadereferenceThereisaraceconditionthatleadstoause-after-freesituation:becausetherawdatainodesarenotrefcounted,anattackercanstart CVE- open()ingoneoftherawdatafiles,andatthesametimeremovethelastreferencetothisrawdata(byremovingthecorrespondingprofile,forexample),whichfreesitsstructaaloaddata;asaresult,whenseqrawdataopen()isreached,iprivateis 2026- adanglingpointerandfreedmemoryisaccessed.Therawdatainodesweren'trefcountedtoavoidacircularrefcountandweresupposedtobeheldbytheprofilerawdatareference. 23410 andprofiledestructionrace,resultingintheuseafterfree.Fixthisbymovingtoadoublerefcountscheme.Wheretheprofilerefcountonrawdataisusedtobreakthecirculardependency.Allowingforfreeingoftherawdataonceallinodereferences totherawdataareput. CVE- 2026- V-SFTversions6.2.10.0andpriorcontainastack-basedbufferoverflowinVS6ComFile!CSaveData::convAnimationItem.OpeningacraftedV7filemayleadtoarbitrarycodeexecutionontheaffectedproduct. 32928 CVE- IObitAdvancedSystemCare10.0.2containsanunquotedservicepathvulnerabilityintheAdvancedSystemCareService10servicethatallowslocalattackerstoescalateprivileges.Attackerscanplaceamaliciousexecutableintheservicepathand2016- triggerprivilegeescalationwhentheservicerestartsorthesystemreboots,executingcodewithLocalSystemprivileges.20055 IntheLinuxkernel,thefollowingvulnerabilityhasbeenresolved:apparmor:fixracebetweenfreeingdataandfsaccessingitAppArmorwasputtingthereferencetoiprivatedataonitsendafterremovingtheoriginalentryfromthefilesystem.CVE- Howevertheinodecanaanddoeslivebeyondthatpointanditispossiblethatsomeofthefscallbackfunctionswillbeinvokedafterthereferencehasbeenput,whichresultsinaracebetweenfreeingthedataandaccessingitthroughthefs.2026- therawdata/loaddataisthemostlikelycandidatetofailtherace,asithasthefewestreferences.Ifproperlycrafteditmightbepossibletotriggeraracefortheothertypesstorediniprivate.23411 thecorrectplacewhichisduringinodeeviction. CVE- prompts.chatpriortocommit30a8f04containsaserver-siderequestforgeryvulnerabilityinFal.aimediastatuspollingthatallowsauthenticateduserstoperformarbitraryoutboundrequestsbysupplyingattacker-controlledURLsinthetoken2026- parameter.AttackerscanexploitthelackofURLvalidationtodisclosetheFALAPIKEYintheAuthorizationheader,enablingcredentialtheft,internalnetworkprobing,andabuseofthevictim'sFal.aiaccount.22664 CVE- OpenObserveisacloud-nativeobservabilityplatform.In0.70.3andearlier,thevalidateenrichmenturlfunctioninsrc/handler/http/request/enrichmenttable/mod.rsfailstoblockIPv6addressesbecauseRust'surlcratereturnsthemwithsurrounding 2026- brackets(e.g."[::1]"not"::1").Anauthenticatedattackercanreachinternalservicesblockedfromexternalaccess.OnclouddeploymentsthisenablesretrievalofIAMcredentialsviaAWSIMDSv1(169.254.169.254),GCPmetadata,orAzureIMDS.On 39361 self-hosteddeploymentsitallowsprobinginternalnetworkservices. CVE- PostizisanAIsocialmediaschedulingtool.Priortoversion2.21.3,thePOST/public/v1/upload-from-urlendpointacceptsauser-suppliedURLandfetchesitserver-sideusingaxios.get()withnoSSRFprotections.Theonlyvalidationisafileextension 2026- check(.png,.jpg,etc.)whichistriviallybypassedbyappendinganimageextensiontoanyURLpath.AnauthenticatedAPIusercanfetchinternalnetworkresources,cloudinstancemetadata,andotherinternalservices,withtheresponsedata 34576 uploadedtostorageandreturnedtotheattacker.Thisissuehasbeenpatchedinversion2.21.3. CVE- Tinyauthisanauthenticationandauthorizationserver.Priortoversion5.0.5,allthreeOAuthserviceimplementations(GenericOAuthService,GithubOAuthService,GoogleOAuthService)storePKCEverifiersandaccesstokensasmutablestructfields 2026- onsingletoninstancessharedacrossallconcurrentrequests.WhentwousersinitiateOAuthloginforthesameproviderconcurrently,araceconditionbetweenVerifyCode()andUserinfo()causesoneusertoreceiveasessionwiththeotheruser's 33544 identity.Thisissuehasbeenpatchedinversion5.0.5.
CVE- MbedTLSbefore3.6.6andTF-PSA-Cryptobefore1.1.0misuseseedsinaPseudo-RandomNumberGenerator(PRNG). 25835
CVE- Payloadisafreeandopensourceheadlesscontentmanagementsystem.Priortoversion3.79.1,anauthenticatedServer-SideRequestForgery(SSRF)vulnerabilityexistsintheuploadfunctionality.Authenticateduserswithcreateorupdateaccess toanupload-enabledcollectioncouldcausetheservertomakeoutboundHTTPrequeststoarbitraryURLs.Thisissuehasbeenpatchedinversion3.79.1. 34746 Electronisaframeworkforwritingcross-platformdesktopapplicationsusingJavaScript,HTMLandCSS.Priortoversions38.8.6,39.8.0,40.7.0,and41.0.0-beta.8,anundocumentedcommandLineSwitcheswebPreferenceallowedarbitraryswitchestoCVE- beappendedtotherendererprocesscommandline.AppsthatconstructwebPreferencesbyspreadinguntrustedconfigurationobjectsmayinadvertentlyallowanattackertoinjectswitchesthatdisablerenderersandboxingorwebsecuritycontrols. AppsareonlyaffectediftheyconstructwebPreferencesfromexternaloruntrustedinputwithoutanallowlist.Appsthatuseafixed,hardcodedwebPreferencesobjectarenotaffected.Thisissuehasbeenpatchedinversions38.8.6,39.8.0,40.7.0,34769 and41.0.0-beta.8. CVE- Directusisareal-timeAPIandAppdashboardformanagingSQLdatabasecontent.Priorto11.16.0,aServer-SideRequestForgery(SSRF)protectionbypasshasbeenidentifiedandfixedinDirectus.TheIPaddressvalidationmechanismusedtoblock2026- requeststolocalandprivatenetworkscouldbecircumventedusingIPv4-MappedIPv6addressnotation.Thisvulnerabilityisfixedin11.16.0.35409 CVE- pyLoadisafreeandopen-sourcedownloadmanagerwritteninPython.In0.5.0b3.dev96andearlier,theparseurlsAPIfunctioninsrc/pyload/core/api/init.pyfetchesarbitraryURLsserver-sideviageturl(url)(pycurl)withoutanyURLvalidation, 2026- protocolrestriction,orIPblacklist.AnauthenticateduserwithADDpermissioncanmakeHTTP/HTTPSrequeststointernalnetworkresourcesandcloudmetadataendpoints,readlocalfilesviafile://protocol(pycurlreadsthefileserver-side),interact 35187 withinternalservicesviagopher://anddict://protocols,andenumeratefileexistenceviaerror-basedoracle(error37vsemptyresponse). CVE- 2026- OpenWebUIisaself-hostedartificialintelligenceplatformdesignedtooperateentirelyoffline.Priortoversion0.8.11,thereisabrokenaccesscontrolvulnerabilityintoolvalues.Thisissuehasbeenpatchedinversion0.8.11. 34222 CVE- PraisonAIisamulti-agentteamssystem.Priortoversion4.5.90,passthrough()andapassthrough()inpraisonaiacceptacaller-controlledapibaseparameterthatisconcatenatedwithendpointandpasseddirectlytohttpx.Client.request()whenthe2026- litellmprimarypathraisesAttributeError.NoURLschemevalidation,privateIPfiltering,ordomainallowlistisapplied,allowingrequeststoanyhostreachablefromtheserver.Thisissuehasbeenpatchedinversion4.5.90.34936 CVE- misemanagesdevtoolslikenode,python,cmake,andterraform.From2026.2.18through2026.4.5,miseloadstrust-controlsettingsfromalocalproject.mise.tomlbeforethetrustcheckruns.Anattackerwhocanplaceamalicious.mise.tomlina2026- repositorycanmakethatsamefileappeartrustedandthenreachdangerousdirectivessuchas[env].source,templates,hooks,ortasks.35533 CVE- 2026- TransientDOSwhenprocessingnonstandardFILSDiscoveryFrameswithout-of-rangeactionsizesduringinitialscans. 21367 CVE- 2026- FreeScoutisafreehelpdeskandsharedinboxbuiltwithPHP'sLaravelframework.Priorto1.8.212,FreeScoutdoesnottakethelimitusercustomervisibilityparameterintoaccountwhenmergingcustomers.Thisvulnerabilityisfixedin1.8.212. 39384 CVE- OpenClawversionspriortocommitb57b680containanapprovalbypassvulnerabilityduetoinconsistentenvironmentvariablenormalizationbetweenapprovalandexecutionpaths,allowingattackerstoinjectattacker-controlledenvironment 2026- variablesintoexecutionwithoutapprovalsystemvalidation.Attackerscanexploitdifferingnormalizationlogictodiscardnon-portablekeysduringapprovalprocessingwhileacceptingthematexecutiontime,bypassingoperatorreviewand 34426 potentiallyinfluencingruntimebehaviorincludingexecutionofattacker-controlledbinaries. CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,astoredcross-sitescriptingvulnerabilityexistsinPersonView.phpduetoincorrectuseofsanitizeText()asanoutputsanitizerforHTMLattributecontext.Thefunctiononly 2026- stripsHTMLtags,itdoesnotescapequotecharactersallowinganattackertobreakoutofthehrefattributeandinjectarbitraryJavaScripteventhandlers.AnyauthenticateduserwiththeEditRecordsrolecanstorethepayloadinaperson'sFacebook 35534 field.TheXSSfiresagainstanyuserwhoviewsthatperson'sprofilepage,includingadministrators,enablingsessionhijackingandfullaccounttakeover.Thisvulnerabilityisfixedin7.1.0. CVE- IBMStorageProtectServer8.2.0IBMStorageProtectPlusServerisvulnerabletoSQLinjection.AremoteattackercouldsendspeciallycraftedSQLstatements,whichcouldallowtheattackertoview,add,modify,ordeleteinformationintheback-end2025- database.13855 CVE- WWBNAVideoisanopensourcevideoplatform.Inversions26.0andprior,objects/aVideoEncoderReceiveImage.json.phpallowedanauthenticateduploadertofetchattacker-controlledsame-origin/videos/...URLs,bypasstraversalscrubbing,and2026- exposeserver-localfilesthroughtheGIFposterstoragepath.ThevulnerableGIFbranchcouldbeabusedtoreadlocalfilessuchas/etc/passwdorapplicationsourcefilesandrepublishthosebytesthroughanormalpublicGIFmediaURL.39369 CVE- FileBrowserisafilemanaginginterfaceforuploading,deleting,previewing,renaming,andeditingfileswithinaspecifieddirectory.Priortoversion2.62.2,theEPUBpreviewfunctioninFileBrowserisvulnerabletoStoredCross-SiteScripting(XSS).2026- JavaScriptembeddedinacraftedEPUBfileexecutesinthevictim'sbrowserwhentheypreviewthefile.Thisissuehasbeenpatchedinversion2.62.2.34529 CVE- 2026- TransientDOSwhenreceivingaservicedataframewithexcessivelengthduringdevicematchingoveraneighborhoodawarenessnetworkprotocolconnection. 21381 CVE- 2026- Aspecificadministrativeendpointisaccessiblewithoutproperauthentication,exposingdevicemanagementfunctions. 32646 CVE- HirschmannIndustrialITproducts(BAT-R,BAT-F,BAT450-F,BAT867-R,BAT867-F,WLC,BATControllerVirtual)containaheapoverflowvulnerabilityintheHiLCOSwebinterfacethatallowsunauthenticatedremoteattackerstotriggeradenial-of- 2024- serviceconditionbysendingspeciallycraftedrequeststothewebinterface.Attackerscanexploitthisheapoverflowtocrashtheaffecteddeviceandcauseservicedisruption,particularlyinconfigurationswherethePublicSpotfunctionalityis 14033 enabled. RackisamodularRubywebserverinterface.Fromversions3.0.0.beta1tobefore3.1.21,and3.2.0tobefore3.2.6,Rack::Multipart::Parser#handlemimeheadparsesquotedmultipartparameterssuchasContent-Disposition:form-data;name="..."CVE- usingrepeatedString#indexsearchescombinedwithString#slice!prefixdeletion.Forescape-heavyquotedvalues,thiscausessuper-linearprocessing.Anunauthenticatedattackercansendacraftedmultipart/form-datarequestcontainingmany2026- partswithlongbackslash-escapedparametervaluestotriggerexcessiveCPUusageduringmultipartparsing.ThisresultsinadenialofserviceconditioninRackapplicationsthatacceptmultipartformdata.Thisissuehasbeenpatchedinversions34827 3.1.21and3.2.6. CVE- AremoteattackercansupplyashortX-WingHPKEencapsulatedkeyandtriggeranout-of-boundsreadintheCdecapsulationpath,potentiallycausingacrashormemorydisclosuredependingonruntimeprotections.Thisissueisfixedinswift-crypto2026- version4.3.1.28815 AnissuewasdiscoveredinMbedTLS3.xbefore3.6.6.Anout-of-boundsreadvulnerabilityinmbedtlsccmfinish()inlibrary/ccm.callowsattackerstoobtainadjacentCCMcontextdataviainvocationofthemultipartCCMAPIwithanoversizedtaglenCVE- parameter.Thisiscausedbymissingvalidationofthetaglenparameteragainstthesizeoftheinternal16-byteauthenticationbuffer.TheissueaffectsthepublicmultipartCCMAPIinMbedTLS3.x,wherembedtlsccm_finish()canbeinvoked2026- directlybyapplications.InMbedTLS4.xversionspriortothefix,thesamemissingvalidationexistsintheinternalimplementation;however,thefunctionisnotexposedaspartofthepublicAPI.Exploitationrequiresapplication-levelinvocationofthe34876 multipartCCMAPI. CVE- ATime-of-ChecktoTime-of-Use(TOCTOU)raceconditionvulnerabilityinBalenaEtcherforWindowspriortov2.1.4allowsattackerstoescalateprivilegesandexecutearbitrarycodeviareplacingalegitimatescriptwithacraftedpayloadduringthe flashingprocess.30332 CVE- HirschmannEagleSDVversion05.4.01priorto05.4.02containsadenial-of-servicevulnerabilitythatcausesthedevicetocrashduringsessionestablishmentwhenusingTLS1.0orTLS1.1.AttackerscantriggeracrashbyinitiatingTLSconnections
withtheseprotocolversionstodisruptserviceavailability. CVE- ThestoredAPIkeysintemporarybrowserclientisnotmarkedasprotectedallowingforJavScriptconsoleorothererrorstoallowforextractionoftheencryptioncredentials. 35467 CVE-prompts.chatpriortocommit7b81836containsmultipleauthorizationbypassvulnerabilitiesduetomissingisPrivatechecksacrossAPIendpointsandpagemetadatagenerationthatallowunauthorizeduserstoaccesssensitivedataassociatedwith2026-privateprompts.Attackerscanexploitthesemissingauthorizationcheckstoretrieveprivatepromptversionhistory,changerequests,examples,currentcontent,andmetadataincludingtitlesanddescriptionsexposedviaHTMLmetatags.22663 CVE-FedifyisaTypeScriptlibraryforbuildingfederatedserverappspoweredbyActivityPub.Priorto1.9.6,1.10.5,2.0.8,and2.1.1,@fedify/fedifyfollowsHTTPredirectsrecursivelyinitsremotedocumentloaderandauthenticateddocumentloader 2026-withoutenforcingamaximumredirectcountorvisited-URLloopdetection.AnattackerwhocontrolsaremoteActivityPubkeyoractorURLcanforceaserverusingFedifytomakerepeatedoutboundrequestsfromasingleinboundrequest,leadingto 34148resourceconsumptionanddenialofservice.Thisvulnerabilityisfixedin1.9.6,1.10.5,2.0.8,and2.1.1. CVE-AllocationofresourceswithoutlimitsintheparsingcomponentsinAmazonAthenaODBCdriverbefore2.1.0.0mightallowathreatactortocauseadenialofservicebydeliveringcraftedinputthattriggersexcessiveresourceconsumptionduringthe2026-driver'sparsingoperations.Toremediatethisissue,usersshouldupgradetoversion2.1.0.0.35562 CVE-ApacheTrafficServerallowsrequestsmugglingifchunkedmessagesaremalformed.ThisissueaffectsApacheTrafficServer:from9.0.0through9.2.12,from10.0.0through10.1.1.2025-whichfixtheissue.65114 CVE-Wikipedia12.0containsadenialofservicevulnerabilitythatallowsunauthenticatedattackerstocrashtheapplicationbysubmittingoversizedinputthroughthesearchfunctionality.Attackerscanpastealargebufferofrepeatedcharactersintothe2018-searchbartotriggeranapplicationcrash.25246 RackisamodularRubywebserverinterface.Priortoversions2.2.23,3.1.21,and3.2.6,Rack::Multipart::ParseronlywrapstherequestbodyinaBoundedIOwhenCONTENTLENGTHispresent.Whenamultipart/form-datarequestissentwithoutaCVE-Content-Lengthheader,suchaswithHTTPchunkedtransferencoding,multipartparsingcontinuesuntilend-of-streamwithnototalsizelimit.Forfileparts,theuploadedbodyiswrittendirectlytoatemporaryfileondiskratherthanbeingconstrained2026-bythebufferedin-memoryuploadlimit.Anunauthenticatedattackercanthereforestreamanarbitrarilylargemultipartfileuploadandconsumeunboundeddiskspace.ThisresultsinadenialofserviceconditionforRackapplicationsthataccept34829multipartformdata.Thisissuehasbeenpatchedinversions2.2.23,3.1.21,and3.2.6. xmldomisapureJavaScriptW3Cstandard-based(XMLDOMLevel2Core)DOMParserandXMLSerializermodule.Inxmldomversions0.6.0andpriorand@xmldom/xmldompriortoversions0.8.12and0.9.9,xmldom/xmldomallowsattacker-CVE-controlledstringscontainingtheCDATAterminator]]>tobeinsertedintoaCDATASectionnode.Duringserialization,XMLSerializeremittedtheCDATAcontentverbatimwithoutrejectingorsafelysplittingtheterminator.Asaresult,dataintendedto2026-remaintext-onlybecameactiveXMLmarkupintheserializedoutput,enablingXMLstructureinjectionanddownstreambusiness-logicmanipulation.Thisissuehasbeenpatchedinxmldomversion0.6.0and@xmldom/xmldomversions0.8.12and346010.9.9. CVE- 2026-HarakaisaNode.jsmailserver.Priortoversion3.1.4,sendinganemailwithproto:asaheadernamecrashestheHarakaworkerprocess.Thisissuehasbeenpatchedinversion3.1.4. 34752 CVE-TheTexttoSpeechforWP(AIVoicesbyMementor)pluginforWordPressisvulnerabletosensitiveinformationexposureinallversionsupto,andincluding,1.9.8.ThisisduetotheplugincontaininghardcodedMySQLdatabasecredentialsforthe2026-vendor'sexternaltelemetryserverinthe`MementorTTSRemoteTelemetry`class.Thismakesitpossibleforunauthenticatedattackerstoextractanddecodethesecredentials,gainingunauthorizedwriteaccesstothevendor'stelemetrydatabase.1233 Electronisaframeworkforwritingcross-platformdesktopapplicationsusingJavaScript,HTMLandCSS.Priortoversions38.8.6,39.8.0,40.7.0,and41.0.0-beta.8,appsthatregisteranasynchronoussession.setPermissionRequestHandler()maybeCVE-vulnerabletoause-after-freewhenhandlingfullscreen,pointer-lock,orkeyboard-lockpermissionrequests.Iftherequestingframenavigatesorthewindowcloseswhilethepermissionhandlerispending,invokingthestoredcallbackdereferences2026-freedmemory,whichmayleadtoacrashormemorycorruption.Appsthatdonotsetapermissionrequesthandler,orwhosehandlerrespondssynchronously,arenotaffected.Thisissuehasbeenpatchedinversions38.8.6,39.8.0,40.7.0,and3477141.0.0-beta.8. CVE- 2026-GLPIisafreeassetandITmanagementsoftwarepackage.From11.0.0tobefore11.0.6,anunauthenticatedusercanstoreanXSSpayloadthroughtheinventoryendpoint.Thisvulnerabilityisfixedin11.0.6. 26027 CVE-MesopisaPython-basedUIframeworkthatallowsuserstobuildwebapplications.Fromversion1.2.3tobeforeversion1.2.5,anuncontrolledresourceconsumptionvulnerabilityexistsintheWebSocketimplementationoftheMesopframework.An 2026-unauthenticatedattackercansendarapidsuccessionofWebSocketmessages,forcingtheservertospawnanunboundednumberofoperatingsystemthreads.ThisleadstothreadexhaustionandOutofMemory(OOM)errors,causingacomplete 34824DenialofService(DoS)foranyapplicationbuiltontheframework.Thisissuehasbeenpatchedinversion1.2.5. CVE-nimiq/core-rs-albatrossisaRustimplementationoftheNimiqProof-of-StakeprotocolbasedontheAlbatrossconsensusalgorithm.Priortoversion1.3.0,thediscoveryhandleracceptsapeer-controlledlimitduringhandshakeandstoresitunchanged. 2026-TheimmediateHandshakeAckpaththenhonorslimit=0andreturnszerocontacts,whichmakesthesessionlookbenign.Later,afterthesamesessionreachesEstablished,theperiodicupdatepathcomputesself.peerlistlimit.unwrap()asusize-1. 33184Withlimit=0,thatwrapstousize::MAXandtheninrand0.9.2,choosemultiple()immediatelyattemptsVec::withcapacity(amount),whichdeterministicallypanicswithcapacityoverflow.Thisissuehasbeenpatchedinversion1.3.0. CVE-Distributionisatoolkittopack,ship,store,anddelivercontainercontent.Priorto3.1.0,inpull-throughcachemode,distributiondiscoverstokenauthendpointsbyparsingWWW-Authenticatechallengesreturnedbytheconfiguredupstreamregistry. 2026-TherealmURLfromabearerchallengeisusedwithoutvalidatingthatitmatchestheupstreamregistryhost.Asaresult,anattacker-controlledupstream(oranattackerwithMitMpositiontotheupstream)cancausedistributiontosendthe 33540configuredupstreamcredentialsviabasicauthtoanattacker-controlledrealmURL.Thisvulnerabilityisfixedin3.1.0. CVE- 2026-InOpenSSHbefore10.3,afiledownloadedbyscpmaybeinstalledsetuidorsetgid,anoutcomecontrarytosomeusers'expectations,ifthedownloadisperformedasrootwith-O(legacyscpprotocol)andwithout-p(preservemode). 35385 CVE-CoreFTP2.0build653containsadenialofservicevulnerabilityinthePBSZcommandthatallowsunauthenticatedattackerstocrashtheservicebysendingamalformedcommandwithanoversizedbuffer.AttackerscansendaPBSZcommandwith2019-apayloadexceeding211bytestotriggeranaccessviolationandcrashtheFTPserverprocess.25686 CVE-Piwigoisanopensourcephotogalleryapplicationfortheweb.Priortoversion16.3.0,thepwg.history.searchAPImethodinPiwigoisregisteredwithouttheadmin_onlyoption,allowingunauthenticateduserstoaccessthefullbrowsinghistoryofall2026-galleryvisitors.Thisissuehasbeenpatchedinversion16.3.0.27833 CVE-SandboxJSisaJavaScriptsandboxinglibrary.Priorto0.8.36,the@nyariv/sandboxjsparsercontainsunboundedrecursionintherestOfExpfunctionandthelispify/lispifyExprcallchain.AnattackercancrashanyNode.jsprocessthatparsesuntrusted2026-inputbysupplyingdeeplynestedexpressions(e.g.,~2000nestedparentheses),causingaRangeError:Maximumcallstacksizeexceededthatterminatestheprocess.Thisvulnerabilityisfixedin0.8.36.34211 CVE-RackisamodularRubywebserverinterface.Priortoversions2.2.23,3.1.21,and3.2.6,Rack::Staticdetermineswhetherarequestshouldbeservedasastaticfileusingasimplestringprefixcheck.WhenconfiguredwithURLprefixessuchas"/css", itmatchesanyrequestpaththatbeginswiththatstring,includingunrelatedpathssuchas"/css-config.env"or"/css-backup.sql".Asaresult,filesunderthestaticrootwhosenamesmerelysharetheconfiguredprefixmaybeservedunintentionally, 34785leadingtoinformationdisclosure.Thisissuehasbeenpatchedinversions2.2.23,3.1.21,and3.2.6. CVE-VPNBrowser+1.1.0.0containsadenialofservicevulnerabilitythatallowsunauthenticatedattackerstocrashtheapplicationbysubmittingoversizedinputthroughthesearchfunctionality.Attackerscanpastealargebufferofcharactersintothe searchbartotriggeranunhandledexceptionthatterminatestheapplication.25241
CVE- Araceconditionwasaddressedwithadditionalvalidation.ThisissueisfixedinmacOSSequoia15.1.Anappmaybeabletobreakoutofitssandbox. 40849 CVE- SignalKServerisaserverapplicationthatrunsonacentralhubinaboat.Priortoversion2.24.0-beta.1,theSignalKServerexposesanunauthenticatedHTTPendpointthatallowsremoteattackerstomodifynavigationdatasourcepriorities.This endpoint,accessibleviaPUT/signalk/v1/api/sourcePriorities,doesnotenforceauthenticationorauthorizationchecksanddirectlyassignsuser-controlledinputtotheserverconfiguration.Asaresult,attackerscaninfluencewhichGPS,AIS,orother 33951 sensordatasourcesaretrustedbythesystem.Thechangesareimmediatelyappliedandpersistedtodisk,allowingthemanipulationtosurviveserverrestarts.Thisissuehasbeenpatchedinversion2.24.0-beta.1. CVE- 2024- Apermissionsissuewasaddressedwithadditionalrestrictions.ThisissueisfixedinmacOSSequoia15.1.Amaliciousapplicationwithrootprivilegesmaybeabletoaccessprivateinformation. 44219 CVE- 7Tik1.0.1.0containsadenialofservicevulnerabilitythatallowsattackerstocrashtheapplicationbysubmittingexcessivelylonginputstringstothesearchfunctionality.Attackerscanpasteabufferof7700charactersintothesearchbartotrigger2018- anapplicationcrash.25245 CVE- AbuginPOSTrequesthandlingcausesacrashunderacertaincondition.ThisissueaffectsApacheTrafficServer:from10.0.0through10.1.1,from9.0.0through9.2.12.2025- issue.Aworkaroundforolderversionsistosetproxy.config.http.requestbufferenabledto0(thedefaultvalueis0).58136 CVE- 2024- Thisissuewasaddressedthroughimprovedstatemanagement.ThisissueisfixedinmacOSSequoia15.1.Anattackerwithphysicalaccesscaninputkeyboardeventstoappsrunningonalockeddevice. 44286 CVE- 2024- Theissuewasaddressedwithimprovedchecks.ThisissueisfixedinmacOSSequoia15.1.Amaliciousapplicationmaybeabletomodifyprotectedpartsofthefilesystem. 44303 CVE- 2026- AnissueinDokuwikiv.2025-05-14b'Librarian'allowsaremoteattackertocauseadenialofserviceviathemediauploadxhr()functioninthemedia.phpfile 26477 CVE- 2026- OpenAirInterfaceV2.2.0AMFcrasheswhenitreceivesanNGAPmessagewithinvalidprocedurecodeorinvalidPDU-type.ForexamplewhenthemessagespecificationrequiresInitiatingMessagebutsentwithsuccessfulOutcome. 30078 CVE- HirschmannHiOSdevicesversionspriorto08.1.00and07.1.01containadenialofservicevulnerabilityintheEtherNet/IPstackwhereimproperhandlingofpacketlengthfieldsallowsremoteattackerstocrashorhangthedevice.Attackerscansend2020- speciallycraftedUDPEtherNet/IPpacketswithalengthvaluelargerthantheactualpacketsizetorenderthedeviceinoperable.37216 CVE- OpenNeuralNetworkExchange(ONNX)isanopenstandardformachinelearninginteroperability.Priortoversion1.21.0,apathtraversalvulnerabilityviasymlinkallowstoreadarbitraryfilesoutsidemodeloruser-provideddirectory.Thisissuehas2026- beenpatchedinversion1.21.0.27489 CVE- 2026- SuricataisanetworkIDS,IPSandNSMengine.Priortoversions7.0.15and8.0.4,speciallycraftedtrafficcancauseSuricatatoslowdown,affectingperformanceinIDSmode.Thisissuehasbeenpatchedinversions7.0.15and8.0.4. 31933 CVE- 2026- SuricataisanetworkIDS,IPSandNSMengine.Fromversion8.0.0tobeforeversion8.0.4,useofthe"tls.alpn"rulekeywordcancauseSuricatatocrashwithaNULLdereference.Thisissuehasbeenpatchedinversion8.0.4. 31931 CVE- pyLoadisafreeandopen-sourcedownloadmanagerwritteninPython.ThefixforCVE-2026-33509addedanADMINONLYOPTIONSsettoblocknon-adminusersfrommodifyingsecurity-criticalconfigoptions.Thestoragefolderoptionisnotinthis 2026- setandpassestheexistingpathrestrictionbecausetheFlasksessiondirectoryisoutsidebothPKGDIRanduserdir.AuserwithSETTINGSandADDpermissionscanredirectdownloadstotheFlaskfilesystemsessionstore,plantamaliciouspickle 35464 payloadasapredictablesessionfile,andtriggerarbitrarycodeexecutionwhenanyHTTPrequestarriveswiththecorrespondingsessioncookie.Thisvulnerabilityisfixedwithcommitc4cf995a2803bdbe388addfc2b0f323277efc0e1. CVE- AIOHTTPisanasynchronousHTTPclient/serverframeworkforasyncioandPython.Priortoversion3.13.4,aresponsewithanexcessivenumberofmultipartheadersmaybeallowedtousemorememorythanintended,potentiallyallowingaDoS2026- vulnerability.Thisissuehasbeenpatchedinversion3.13.4.34516 CVE- text-generation-webuiisanopen-sourcewebinterfaceforrunningLargeLanguageModels.Priorto4.3,anunauthenticatedpathtraversalvulnerabilityinloadgrammar()allowsreadinganyfileontheserverfilesystemwithnoextensionrestriction.2026- Gradiodoesnotserver-sidevalidatedropdownvalues,soanattackercanPOSTdirectorytraversalpayloads(e.g.,../../../etc/passwd)viatheAPIandreceivethefullfilecontentsintheresponse.Thisvulnerabilityisfixedin4.3.35485 CVE- AnissuewasdiscoveredinNASinSamsungMobileProcessor,WearableProcessor,andModemExynos980,990,850,1080,2100,1280,2200,1330,1380,1480,2400,1580,2500,9110,W920,W930,W1000,Modem5123,Modem5300,and2025- Modem5400.IncorrectHandlingofaDLNASTransportpacketleadstoaDenialofService.54324 CVE- Anissuewasdiscoveredin6.0before6.0.4,5.2before5.2.13,and4.2before4.2.30.ASGIRequestallowsaremoteattackertospoofheadersbyexploitinganambiguousmappingoftwoheadervariants(withhyphensorwithunderscores)toa2026- singleversionwithunderscores.Earlier,unsupportedDjangoseries(suchas5.0.x,4.1.x,and3.2.x)werenotevaluatedandmayalsobeaffected.DjangowouldliketothankTarekNakkouchforreportingthisissue.3902 AddressableisanalternativeimplementationtotheURIimplementationthatispartofRuby'sstandardlibrary.From2.3.0tobefore2.9.0,withintheURItemplateimplementationinAddressable,twoclassesofURItemplategenerateregular CVE- expressionsvulnerabletocatastrophicbacktracking.Templatesusingthe(explode)modifierwithanyexpansionoperator(e.g.,{foo},{+var},{#var},{/var},{.var},{;var},{?var},{&var*})generatepatternswithnestedunbounded 2026- quantifiersthatareO(2^n)whenmatchedagainstamaliciouslycraftedURI.Templatesusingmultiplevariableswiththe+or#operators(e.g.,{+v1,v2,v3})generatepatternswithO(n^k)complexityduetothecommaseparatorbeingwithinthe 35611 matchedcharacterclass,causingambiguousbacktrackingacrosskvariables.WhenmatchedagainstamaliciouslycraftedURI,thiscanresultincatastrophicbacktrackinganduncontrolledresourceconsumption,leadingtodenialofservice.This vulnerabilityisfixedin2.9.0. CVE- Aregressioninthewayhasheswerecalculatedcausedrulescontainingtheaddressrangesyntax(x.x.x.x-y.y.y.y)thatonlydifferintheaddressrange(s)involvedtobesilentlydroppedasduplicates. 2026- pf.Rangesexpressedusingtheaddress[/mask-bits]syntaxwerenotaffected.Somekeywordsrepresentingactionstakenonapacket-matchingrule,suchas'log','returntll',or'dnpipe',maysufferfromthesameissue. 4748 suchconfigurations,astheseruleswouldalwaysberedundant.Affectedrulesaresilentlyignored,whichcanleadtounexpectedbehaviourincludingover-andunderblocking. CVE- AIOHTTPisanasynchronousHTTPclient/serverframeworkforasyncioandPython.Priortoversion3.13.4,insufficientrestrictionsinheader/trailerhandlingcouldcauseuncappedmemoryusage.Thisissuehasbeenpatchedinversion3.13.4. 22815 CVE- text-generation-webuiisanopen-sourcewebinterfaceforrunningLargeLanguageModels.Priorto4.3,hesuperboogaandsuperboogav2RAGextensionsfetchuser-suppliedURLsviarequests.get()withzerovalidation--noschemecheck,noIP filtering,nohostnameallowlist.Anattackercanaccesscloudmetadataendpoints,stealIAMcredentials,andprobeinternalservices.ThefetchedcontentisexfiltratedthroughtheRAGpipeline.Thisvulnerabilityisfixedin4.3.
35486 CVE- TheW3TotalCachepluginforWordPressisvulnerabletoinformationexposureinallversionsupto,andincluding,2.9.3.Thisisduetothepluginbypassingitsentireoutputbufferingandprocessingpipelinewhentherequest'sUser-Agentheader contains"W3TotalCache",whichcausesrawmfunc/mcludedynamicfragmentHTMLcomments--includingtheW3TCDYNAMICSECURITYsecuritytoken--toberenderedinthepagesource.Thismakesitpossibleforunauthenticatedattackersto discoverthevalueoftheW3TCDYNAMICSECURITYconstantbysendingacraftedUser-Agentheadertoanypagethatcontainsdeveloper-placeddynamicfragmenttags,grantedthesitehasthefragmentcachingfeatureenabled. CVE- AflawwasfoundinKeycloak.AnunauthenticatedattackercanexploitthisvulnerabilitybysendingaspeciallycraftedPOSTrequestwithanexcessivelylongscopeparametertotheOpenIDConnect(OIDC)tokenendpoint.Thisleadstohighresource2026- consumptionandprolongedprocessingtimes,ultimatelyresultinginaDenialofService(DoS)fortheKeycloakserver.4634 CVE- 2026- UseafterfreeinDawninGoogleChromepriorto146.0.7680.178allowedaremoteattackerwhohadcompromisedtherendererprocesstoexecutearbitrarycodeviaacraftedHTMLpage.(Chromiumsecurityseverity:High) 5284 CVE- 2026- AnissuewasdiscoveredinMbedTLSthrough3.6.5and4.xthrough4.0.0.ThereisaNULLpointerdereferenceindistinguishednameparsingthatallowsanattackertowritetoaddress0. 34874 CVE- 2026- MbedTLS3.5.0to3.6.5fixedin3.6.6and4.1.0hasabufferoverflowinthex509inetptonipv6()function 25833 CVE- DrizzleisamodernTypeScriptORM.Priorto0.45.2and1.0.0-beta.20,DrizzleORMimproperlyescapedquotedSQLidentifiersinitsdialect-specificescapeName()implementations.Inaffectedversions,embeddedidentifierdelimiterswerenot 2026- escapedbeforetheidentifierwaswrappedinquotesorbackticks.Asaresult,applicationsthatpassattacker-controlledinputtoAPIsthatconstructSQLidentifiersoraliases,suchassql.identifier(),.as(),mayallowanattackertoterminatethequoted 39356 identifierandinjectSQL.Thisvulnerabilityisfixedin0.45.2and1.0.0-beta.20. CVE- Anissuewasdiscoveredin6.0before6.0.4,5.2before5.2.13,and4.2before4.2.30.ASGIrequestswithamissingorunderstatedContent-Lengthheadercouldbypassthe`DATAUPLOADMAXMEMORYSIZElimitwhenreading 2026-HttpRequest.body`,allowingremoteattackerstoloadanunboundedrequestbodyintomemory.Earlier,unsupportedDjangoseries(suchas5.0.x,4.1.x,and3.2.x)werenotevaluatedandmayalsobeaffected.DjangowouldliketothankSuperior 33034 forreportingthisissue. StrawberryGraphQLisalibraryforcreatingGraphQLAPIs.Priorto0.312.3,StrawberryGraphQL'sWebSocketsubscriptionhandlersforboththegraphql-transport-wsandlegacygraphql-wsprotocolsallocateanasyncio.TaskandassociatedOperationCVE- objectforeveryincomingsubscribemessagewithoutenforcinganylimitonthenumberofactivesubscriptionsperconnection.AnunauthenticatedattackercanopenasingleWebSocketconnection,sendconnectioninit,andthenfloodsubscribe2026- messageswithuniqueIDs.Eachmessageunconditionallyspawnsanewasyncio.Taskandasyncgenerator,causinglinearmemorygrowthandeventloopsaturation.ThisleadstoserverdegradationoranOOMcrash.Thisvulnerabilityisfixedin35526 0.312.3. CVE- PdfDingisaselfhostedPDFmanager,viewerandeditorofferingaseamlessuserexperienceonmultipledevices.Priortoversion1.7.0,anaccess-controlvulnerabilityallowsunauthenticateduserstoretrievepassword-protectedsharedPDFsby 2026- directlycallingthefile-servingendpointwithoutcompletingthepasswordverificationflow.Thisresultsinunauthorizedaccesstoconfidentialdocumentsthatusersexpectedtobeprotectedbyashared-linkpassword.Thisissuehasbeenpatchedin 34376 version1.7.0. CVE- AnissuewasdiscoveredinSamsungMobileProcessor,WearableProcessor,andModem(Exynos980,850,990,1080,2100,1280,2200,1330,1380,1480,2400,1580,2500,1680,9110,W920,W930,W1000,Modem5123,Modem5300,Modem2025- 5400,andModem5410).TheabsenceofproperinputvalidationleadstoaDenialofService.57834 CVE- 2026- AnunauthenticatedremoteattackercanexploitanunauthenticatedSQLInjectionvulnerabilityinthegetinfoendpointduetoimproperneutralizationofspecialelementsinaSQLSELECTcommand.Thiscanresultinatotallossofconfidentiality. 33614 CVE- Distributionisatoolkittopack,ship,store,anddelivercontainercontent.Priorto3.1.0,distributioncanrestorereadaccessinrepoaafteranexplicitdeletewhenstorage.cache.blobdescriptor:redisandstorage.delete.enabled:trueareboth 2026- enabled.Thedeletepathclearstheshareddigestdescriptorbutleavesstalerepo-scopedmembershipbehind,soalaterStatorGetfromrepobrepopulatestheshareddescriptorandmakesthedeletedblobreadablefromrepoaagain.This 35172 vulnerabilityisfixedin3.1.0. CVE- AnunauthenticatedremoteattackercanexploitanunauthenticatedblindSQLInjectionvulnerabilityinthemb24apiendpointduetoimproperneutralizationofspecialelementsinaSQLSELECTcommand.Thiscanresultinatotallossof2026- confidentiality.33616 CVE- StrawberryGraphQLisalibraryforcreatingGraphQLAPIs.Strawberryupuntilversion0.312.3isvulnerabletoanauthenticationbypassonWebSocketsubscriptionendpoints.Thelegacygraphql-wssubprotocolhandlerdoesnotverifythata 2026- connectioninithandshakehasbeencompletedbeforeprocessingstart(subscription)messages.Thisallowsaremoteattackertoskiptheonwsconnectauthenticationhookentirelybyconnectingwiththegraphql-wssubprotocolandsendingastart 35523 messagedirectly,withouteversendingconnectioninit.Thisvulnerabilityisfixedin0.312.3. CVE- ZLMediaKitisastreamingmediaserviceframework.theVP9RTPpayloadparserinext-codec/VP9Rtp.cppreadsmultiplefieldsfromtheRTPpayloadbasedonflagbitsinthefirstbyte,withoutverifyingthatsufficientdataexistsinthebuffer.A 2026- craftedVP9RTPpacketwitha1-bytepayload(0xFF,allflagsset)causestheparsertoreadpasttheendoftheallocatedbuffer,resultinginaheap-buffer-overflow.Thisvulnerabilityisfixedwithcommit 35203 435dcbcbbf700fd63b2ca9eac6cef3b5ea75169d. CVE- 2026- SuricataisanetworkIDS,IPSandNSMengine.Priortoversions7.0.15and8.0.4,inefficiencyinKRB5bufferingcanleadtoperformancedegradation.Thisissuehasbeenpatchedinversions7.0.15and8.0.4. 31932 CVE- FastFeedParserisahighperformanceRSS,AtomandRDFparser.Priorto0.5.10,whenparse()fetchesaURLthatreturnsanHTMLpagecontaininga tag,itrecursivelycallsitselfwiththeredirectURL--withnodepth 2026- limit,novisited-URLdeduplication,andnoredirectcountcap.Anattacker-controlledserverthatreturnsaninfinitechainofHTMLmeta-refreshresponsescausesunboundedrecursion,exhaustingthePythoncallstackandcrashingtheprocess.This 39376 vulnerabilitycanalsobechainedwiththecompanionSSRFissuetoreachinternalnetworktargetsafterbypassingtheinitialURLcheck.Thisvulnerabilityisfixedin0.5.10. defuissoftwarethatallowsuerstoassigndefaultpropertiesrecursively.Priortoversion6.1.5,applicationsthatpassunsanitizeduserinput(e.g.parsedJSONrequestbodies,databaserecords,orconfigfilesfromuntrustedsources)asthefirstCVE- argumenttodefu()arevulnerabletoprototypepollution.Acraftedpayloadcontaininga__proto__keycanoverrideintendeddefaultvaluesinthemergedresul.Theinternal_defufunctionusedObject.assign({},defaults)tocopythedefaults2026- object.Object.assigninvokesthe__proto__setter,whichreplacestheresultingobject's[[Prototype]]withattacker-controlledvalues.Propertiesinheritedfromthepollutedprototypethenbypasstheexisting__proto__keyguardinthe35209 for...inloopandlandinthefinalresult.Version6.1.5replacesObject.assign({},defaults)withobjectspread({...defaults}),whichuses[[DefineOwnProperty]]anddoesnotinvokethe__proto__setter. CVE- AnissuewasdiscoveredinUSIMinSamsungMobileProcessor,WearableProcessor,andModemExynos980,990,850,1080,2100,1280,2200,1330,1380,1480,2400,1580,2500,9110,W920,W930,W1000,Modem5123,Modem5300,and2025- Modem5400.ImproperhandlingofSIMcardproactivecommandsleadstoaDenialofService.59440 Tinyproxythrough1.11.3isvulnerabletoHTTPrequestparsingdesynchronizationduetoacase-sensitivecomparisonoftheTransfer-Encodingheaderinsrc/reqs.c.Theischunkedtransfer()functionusesstrcmp()tocomparetheheadervalue against"chunked",eventhoughRFC7230specifiesthattransfer-codingnamesarecase-insensitive.BysendingarequestwithTransfer-Encoding:Chunked,anunauthenticatedremoteattackercancauseTinyproxytomisinterprettherequestas CVE- havingnobody.Inthisstate,Tinyproxysetscontentlength.clientto-1,skipspullclientdatachunked(),forwardsrequestheadersupstream,andtransitionsintorelay_connection()rawTCPforwardingwhileunreadbodydataremainsbuffered.This leadstoinconsistentrequeststatebetweenTinyproxyandbackendservers.RFC-compliantbackends(e.g.,Node.js,Nginx)willcontinuewaitingforchunkedbodydata,causingconnectionstohangindefinitely.Thisbehaviorenablesapplication-level 31842 denialofservicethroughbackendworkerexhaustion.Additionally,indeploymentswhereTinyproxyisusedforrequest-bodyinspection,filtering,orsecurityenforcement,theunreadbodymaybeforwardedwithoutproperinspection,resultingin potentialsecuritycontrolbypass. CVE- OpenTelemetry-GoistheGoimplementationofOpenTelemetry.From1.36.0to1.40.0,multi-valuebaggage:headerextractionparseseachheaderfield-valueindependentlyandaggregatesmembersacrossvalues.Thisallowsanattackertoamplify
cpuandallocationsbysendingmanybaggage:headerlines,evenwheneachindividualvalueiswithinthe8192-byteper-valueparselimit.Thisvulnerabilityisfixedin1.41.0. 29181 CVE- XenForobefore2.3.7disclosesfilesystempathsthroughexceptionmessagestriggeredbyopenbasedirrestrictions.Thisallowsanattackertoobtaininformationabouttheserver'sdirectorystructure. 71282 CVE- 2026-Cross-SiteRequestForgery(CSRF)vulnerabilityinAnalytifySimpleSocialMediaShareButtonsallowsCrossSiteRequestForgery.ThisissueaffectsSimpleSocialMediaShareButtons:fromn/athrough6.2.0. 34904 GoJOSEprovidesanimplementationoftheJavascriptObjectSigningandEncryptionsetofstandardsinGo,includingsupportforJSONWebEncryption(JWE),JSONWebSignature(JWS),andJSONWebToken(JWT)standards.Priorto4.1.4and3.0.5, decryptingaJSONWebEncryption(JWE)objectwillpanicifthealgfieldindicatesakeywrappingalgorithm(oneendinginKW,withtheexceptionofA128GCMKW,A192GCMKW,andA256GCMKW)andtheencryptedkeyfieldisempty.ThepanicCVE-happenswhencipher.KeyUnwrap()inkeywrap.goattemptstoallocateaslicewithazeroornegativelengthbasedonthelengthoftheencryptedkey.ThiscodepathisreachablefromParseEncrypted()/ParseEncryptedJSON()/2026-ParseEncryptedCompact()followedbyDecrypt()ontheresultingobject.Notethattheparsefunctionstakealistofacceptedkeyalgorithms.Iftheacceptedkeyalgorithmsdonotincludeanykeywrappingalgorithms,parsingwillfailandthe34986applicationwillbeunaffected.Thispanicisalsoreachablebycallingcipher.KeyUnwrap()directlywithanyciphertextparameterlessthan16byteslong,butcallingthisfunctiondirectlyislesscommon.Panicscanleadtodenialofservice.This vulnerabilityisfixedin4.1.4and3.0.5. CVE- 2026-Cross-SiteRequestForgery(CSRF)vulnerabilityinAnalytifyUnderConstruction,ComingSoon&MaintenanceModeallowsCrossSiteRequestForgery.ThisissueaffectsUnderConstruction,ComingSoon&MaintenanceMode:fromn/athrough2.1.1. 34896 CVE-Ech0isanopen-source,self-hostedpublishingplatformforpersonalideasharing.Priorto4.2.8,Ech0implementslinkpreview(editorfetchesapagetitle)throughGET/api/website/title.Thatislegitimateproductbehavior,buttheimplementationis 2026-unsafe:therouteisunauthenticated,acceptsafullyattacker-controlledURL,performsaserver-sideGET,readstheentireresponsebodyintomemory(io.ReadAll).Thereisnohostallowlist,noSSRFfilter,andInsecureSkipVerify:trueontheoutbound 35036client.AnyonewhocanreachtheinstancecanforcetheEch0servertoopenHTTP/HTTPSURLsoftheirchoiceasseenfromtheserver'snetworkposition(Dockerbridge,VPC,localhostfromtheprocessview).Thisvulnerabilityisfixedin4.2.8. CVE-OpenEXRprovidesthespecificationandreferenceimplementationoftheEXRfileformat,animagestorageformatforthemotionpictureindustry.Fromversion3.4.0tobeforeversion3.4.8,sensitiveinformationfromheapmemorymaybeleaked2026-throughthedecodedpixeldata(informationdisclosure).Thisoccursunderdefaultsettings;simplyreadingamaliciousEXRfileissufficienttotriggertheissue,withoutanyuserinteraction.Thisissuehasbeenpatchedinversion3.4.8.34543 CVE-fast-jwtprovidesfastJSONWebToken(JWT)implementation.In6.1.0andearlier,fast-jwtdoesnotvalidatethecrit(Critical)HeaderParameterdefinedinRFC7515§4.1.11.WhenaJWStokencontainsacritarraylistingextensionsthatfast-jwtdoes2026-notunderstand,thelibraryacceptsthetokeninsteadofrejectingit.ThisviolatestheMUSTrequirementintheRFC.35042 CVE- 2026-NVIDIATritonInferenceServercontainsavulnerabilitywhereanattackercouldcauseaservercrashbysendingamalformedrequestheadertotheserver.Asuccessfulexploitofthisvulnerabilitymightleadtodenialofservice. 24175 CVE-libp2p-rustistheofficialrustlanguageImplementationofthelibp2pnetworkingstack.Priorto0.17.1,libp2p-rendezvousserverhasnolimitonhowmanynamespacesasinglepeercanregister. 2026-namespacesinaloopandtheserverhappilyacceptseverysingleoneallocatingmemoryforeachregistrationwithnopushback.Keepdoingthislongenough(orwithmultiplesybilpeers)andtheserverprocessgetsOOMkilled.Thisvulnerabilityis 35405fixedin0.17.1. CVE-AnissuewasdiscoveredinRRCinSamsungMobileProcessor,WearableProcessor,andModemExynos980,990,850,1080,2100,1280,2200,1330,1380,1480,2400,1580,2500,9110,W920,W930,W1000,Modem5123,Modem5300,and2025-Modem5400.Impropermemoryinitializationresultsinanillegalmemoryaccess,causingasystemcrashviaamalformedRRCReconfigurationmessage.57835 CVE- 2026-NVIDIATritonInferenceServercontainsavulnerabilitywhereanattackercouldcauseaservercrashbysendingamalformedrequesttotheserver.Asuccessfulexploitofthisvulnerabilitymightleadtodenialofservice. 24174 CVE-AflawwasfoundinCorosync.AnintegeroverflowvulnerabilityinCorosync'sjoinmessagesanityvalidationallowsaremote,unauthenticatedattackertosendcraftedUserDatagramProtocol(UDP)packets.Thiscancausetheservicetocrash,2026-leadingtoadenialofservice.ThisvulnerabilityspecificallyaffectsCorosyncdeploymentsconfiguredtousetotemudp/totemudpumode.35092 CVE- 2026-NVIDIATritonInferenceServercontainsavulnerabilitywhereanattackercouldcauseaservercrashbysendingamalformedrequesttotheserver.Asuccessfulexploitofthisvulnerabilitymightleadtodenialofservice. 24173 CVE-SuricataisanetworkIDS,IPSandNSMengine.Fromversion8.0.0tobeforeversion8.0.4,thereisaquadraticcomplexityissuewhensearchingforURLsinmimeencodedmessagesoverSMTPleadingtoaperformanceimpact.Thisissuehasbeen2026-patchedinversion8.0.4.31934 CVE-IntegeroverflowinANGLEinGoogleChromeonWindowspriorto146.0.7680.178allowedaremoteattackerwhohadcompromisedtherendererprocesstoperformanoutofboundsmemorywriteviaacraftedHTMLpage.(Chromiumsecurity2026-severity:High)5277 CVE- 2026-NVIDIATritonInferenceServercontainsavulnerabilitywhereinsufficientinputvalidationandalargenumberofoutputscouldcauseaservercrash.Asuccessfulexploitofthisvulnerabilitymightleadtodenialofservice. 24146 CVE-SoftEtherVPNisaanopen-sourcecross-platformmulti-protocolVPNProgram.In5.2.5188andearlier,apre-authenticationdenial-of-servicevulnerabilityexistsinSoftEtherVPNDeveloperEdition5.2.5188(andlikelyearlierversionsofDeveloper2026-Edition).AnunauthenticatedremoteattackercancrashthevpnserverprocessbysendingasinglemalformedEAP-TLSpacketoverrawL2TP(UDP/1701),terminatingallactiveVPNsessions.39312 CVE-ABusinessLogicvulnerabilityexistsinSourceCodesterPharmacyProductManagementSystem1.0.Thevulnerabilityislocatedintheadd-sales.phpfile.Theapplicationfailstovalidatethe"txtprice"and"txttotalcost"parameters,allowingattackers2026-tosubmitnegativevaluesforsalestransactions.Thisleadstoincorrectfinancialcalculations,corruptionofsalesreports,andpotentialfinancialloss.30573 CVE- 2026-SuricataisanetworkIDS,IPSandNSMengine.Priortoversion7.0.15,inefficiencyinDCERPCbufferingcanleadtoaperformancedegradation.Thisissuehasbeenpatchedinversion7.0.15. 31937 CVE-SuricataisanetworkIDS,IPSandNSMengine.Priortoversions7.0.15and8.0.4,floodingofcraftHTTP2continuationframescanleadtomemoryexhaustion,usuallyresultingintheSuricataprocessbeingshutdownbytheoperatingsystem.This issuehasbeenpatchedinversions7.0.15and8.0.4.31935 CVE- LakesideSysTrackAgent11before11.5.0.15hasaraceconditionwithresultantlocalprivilegeescalationtoSYSTEM.Thefixedversionsare11.2.1.28,11.3.0.38,11.4.0.24,and11.5.0.15. 35099
CVE- InSudothrough1.9.17p2before3e474c2,afailureofasetuid,setgid,orsetgroupscall,duringaprivilegedropbeforerunningthemailer,isnotafatalerrorandcanleadtoprivilegeescalation. 35535 CVE- ClerkJavaScriptistheofficialJavaScriptrepositoryforClerkauthentication.In@clerk/honofromversions0.1.0tobefore0.1.5,@clerk/expressfromversions2.0.0tobefore2.0.7,@clerk/backendfromversions3.0.0tobefore3.2.3,and@clerk/fastify 2026- fromversions3.1.0tobefore3.1.5,theclerkFrontendApiProxyfunctionin@clerk/backendisvulnerabletoServer-SideRequestForgery(SSRF).Anunauthenticatedattackercancraftarequestpaththatcausestheproxytosendtheapplication's 34076 Clerk-Secret-Keytoanattacker-controlledserver.Thisissuehasbeenpatchedin@clerk/honoversion0.1.5,@clerk/expressversion2.0.7,@clerk/backendversion3.2.3,and@clerk/fastifyversion3.1.5. CVE- Insufficientauthenticationsecuritycontrolsinthebrowser-basedauthenticationcomponentsinAmazonAthenaODBCdriverbefore2.1.0.0mightallowathreatactortointerceptorhijackauthenticationsessionsduetoinsufficientprotectionsinthe2026- browser-basedauthenticationflows.Toremediatethisissue,usersshouldupgradetoversion2.1.0.0.35561 CVE- ImpropercertificatevalidationintheidentityproviderconnectioncomponentsinAmazonAthenaODBCdriverbefore2.1.0.0mightallowaman-in-the-middlethreatactortointerceptauthenticationcredentialsduetoinsufficientdefaulttransport2026- securitywhenconnectingtoidentityproviders.ThisonlyappliestoconnectionswithexternalidentityprovidersanddoesnotapplytoconnectionswithAthena.Toremediatethisissue,usersshouldupgradetoversion2.1.0.0.35560 CVE- AflawwasfoundinKeycloak.TheSingleUseObjectProvider,aglobalkey-valuestore,lackspropertypeandnamespaceisolation.Thisvulnerabilityallowsanunauthenticatedattackertoforgeauthorizationcodes.Successfulexploitationcanleadto2026- thecreationofadmin-capableaccesstokens,resultinginprivilegeescalation.4282 CVE- TandoorRecipesisanapplicationformanagingrecipes,planningmeals,andbuildingshoppinglists.Priorto2.6.4,thePOST/api/food/{id}/shopping/endpointreadsamountandunitdirectlyfromrequest.dataandpassesthemwithoutvalidationto 2026- ShoppingListEntry.objects.create().Invalidamountvalues(non-numericstrings)causeanunhandledexceptionandHTTP500.AunitIDfromadifferentSpacecanbeassociatedcross-space,leakingforeign-keyreferencesacrosstenantboundaries. 35489 AllotherendpointscreatingShoppingListEntryuseShoppingListEntrySerializer,whichvalidatesandsanitizesthesefields.Thisvulnerabilityisfixedin2.6.4. CVE- 2026- pandas-aiv3.0.0wasdiscoveredtocontainaSQLinjectionvulnerabilityviathepandasai.agent.base.executesqlquerycomponent. 30273 CVE- IBMVerifyIdentityAccessContainer11.0through11.0.2andIBMSecurityVerifyAccessContainer10.0through10.0.9.1andIBMVerifyIdentityAccess11.0through11.0.2andIBMSecurityVerifyAccess10.0through10.0.9.1couldallowan2026- unauthenticatedusertoexecutearbitrarycommandsasloweruserprivilegesonthesystemduetoimpropervalidationofusersuppliedinput.1345 CVE- AvulnerabilitywasdetectedinSourceCodester/jkevRecordManagementSystem1.0.Affectedbythisvulnerabilityisanunknownfunctionalityofthefileindex.phpofthecomponentLogin.ThemanipulationoftheargumentUsernameresultsinsql2026- injection.Theattackmaybelaunchedremotely.Theexploitisnowpublicandmaybeused.5575 AvulnerabilityinthewebinterfaceofCiscoSmartSoftwareManagerOn-Prem(SSMOn-Prem)couldallowanauthenticated,remoteattackertoelevateprivilegesonanaffectedsystem.CVE- sensitiveuserinformation.AnattackercouldexploitthisvulnerabilitybysendingacraftedmessagetoanaffectedCiscoSSMOn-Premhostandretrievingsessioncredentialsfromsubsequentstatusmessages.Asuccessfulexploitcouldallowthe2026- attackertoelevateprivilegesontheaffectedsystemfromlowtoadministrative.Toexploitthisvulnerability,theattackermusthavevalidcredentialsforauseraccountwithatleasttheroleofSystemUser.Note:Thisvulnerabilityexposes20151 informationonlyaboutuserswhologgedintotheCiscoSSMOn-Premhostusingthewebinterfaceandwhoarecurrentlyloggedin.SSHsessionsarenotaffected. CVE- Avulnerabilitywasidentifiedinappsmithorgappsmithupto1.97.ImpactedisthefunctioncomputeDisallowedHostsofthefileapp/server/appsmith-interfaces/src/main/java/com/appsmith/util/WebClientUtils.javaofthecomponentDashboard.Such 2026- manipulationleadstoserver-siderequestforgery.Theattackmaybelaunchedremotely.Theexploitispubliclyavailableandmightbeused.Upgradingtoversion1.99isrecommendedtoaddressthisissue.Theaffectedcomponentshouldbe 5418 upgraded.Thevendorwascontactedearly,respondedinaveryprofessionalmannerandquicklyreleasedafixedversionoftheaffectedproduct. CVE- AvulnerabilityhasbeenfoundinFosowlagenticSeek0.1.0.ImpactedisthefunctionPyInterpreter.executeofthefilesources/tools/PyInterpreter.pyofthecomponentqueryEndpoint.Suchmanipulationleadstocodeinjection.Theattackcanbe2026- launchedremotely.Theexploithasbeendisclosedtothepublicandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5584 CVE- AvulnerabilityhasbeenfoundinSong-Licrossbrowseruptoca690f0fe6954fd9bcda36d071b68ed8682a786a.Thisaffectsanunknownpartofthefileflask/uniquemachine_app.pyofthecomponentdetailsEndpoint.Suchmanipulationofthe 2026- argumentIDleadstosqlinjection.Theattackcanbeexecutedremotely.Theexploithasbeendisclosedtothepublicandmaybeused.Thisproductimplementsarollingreleaseforongoingdelivery,whichmeansversioninformationforaffectedor 5577 updatedreleasesisunavailable.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway. CVE- 2026- ZohocorpManageEngineExchangeReporterPlusversionsbefore5802arevulnerabletoStoredXSSinEquipmentMailboxDetailsreport. 3879 CVE- Aflawhasbeenfoundincode-projectsSimpleLaundrySystem1.0.Thisvulnerabilityaffectsunknowncodeofthefile/modify.phpofthecomponentParameterHandler.ThismanipulationoftheargumentfirstNamecausessqlinjection.Remote2026- exploitationoftheattackispossible.Theexploithasbeenpublishedandmaybeused.5256 CVE- Avulnerabilityhasbeenfoundincode-projectsSimpleLaundrySystem1.0.Thisissueaffectssomeunknownprocessingofthefile/delstaffinfo.phpofthecomponentParameterHandler.Suchmanipulationoftheargumentuseridleadstosql2026- injection.Theattackcanbeexecutedremotely.Theexploithasbeendisclosedtothepublicandmaybeused.5257 CVE- 2026- Blindserver-siderequestforgery(SSRF)vulnerabilityinlegacyconnectionmethodsofdocumentco-authoringfeaturesinM-FilesServerbefore26.3allowanunauthenticatedattackertocausetheservertosendHTTPGETrequeststoarbitraryURLs. 0932 CVE- AvulnerabilitywasidentifiedinShandongHoteamInforCenterPLMupto8.3.8.TheimpactedelementisthefunctionuploadFileToIISofthefile/Base/BaseHandler.ashx.ThemanipulationoftheargumentFileleadstounrestrictedupload.Itispossible2026- toinitiatetheattackremotely.Theexploitispubliclyavailableandmightbeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5261 CVE- 2026- DellAppSync,version(s)4.6.0,contain(s)anUNIXSymbolicLink(Symlink)Followingvulnerability.Alowprivilegedattackerwithlocalaccesscouldpotentiallyexploitthisvulnerability,leadingtoInformationtampering. 22767 CVE- 2026- DellAppSync,version(s)4.6.0,contain(s)anIncorrectPermissionAssignmentforCriticalResourcevulnerability.Alowprivilegedattackerwithlocalaccesscouldpotentiallyexploitthisvulnerability,leadingtoElevationofprivileges. 22768 CVE- NVIDIADALIcontainsavulnerabilitywhereanattackercouldcauseadeserializationofuntrusteddata.Asuccessfulexploitofthisvulnerabilitymightleadtoarbitrarycodeexecution. 24156 CVE- AsecurityflawhasbeendiscoveredinTenda4G03Proupto1.0/1.1/04.03.01.53/192.168.0.1.Affectedbythisvulnerabilityisanunknownfunctionalityofthefile/bin/httpd.Themanipulationresultsinimproperaccesscontrols.Theattackmaybe performedfromremote.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks.
CVE- AvulnerabilitywasidentifiedinitsourcecodeOnlineEnrollmentSystem1.0.Thisaffectsanunknownfunctionofthefile/sms/user/index.php?view=edit&id=10ofthecomponentParameterHandler.SuchmanipulationoftheargumentUSERIDleadsto sqlinjection.Theattackcanbeexecutedremotely.Theexploitispubliclyavailableandmightbeused. CVE- AweaknesshasbeenidentifiedinFedML-AIFedMLupto0.8.9.AffectedisthefunctionsendMessageofthefilegrpcserver.pyofthecomponentgRPCserver.Executingamanipulationcanleadtodeserialization.Theattackmaybeperformedfrom2026- remote.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5536 PraisonAIisamulti-agentteamssystem.Priorto1.5.113,PraisonAI'sreciperegistrypullflowextractsattacker-controlled.praisontararchiveswithtar.extractall()anddoesnotvalidatearchivememberpathsbeforeextraction.AmaliciouspublisherCVE- canuploadarecipebundlethatcontains../traversalentriesandanyuserwholaterpullsthatrecipewillwritefilesoutsidetheoutputdirectorytheyselected.Thisisapathtraversal/arbitraryfilewritevulnerabilityontheclientsideoftherecipe2026- registryworkflow.ItaffectsboththelocalregistrypullpathandtheHTTPregistrypullpath.Thechecksumverificationdoesnotpreventexploitationbecausethemalicioustraversalpayloadispartofthesignedbundleitself.Thisvulnerabilityisfixed39306 in1.5.113. CVE- AvulnerabilitywasfoundinSansterIOPaint1.5.3.Impactedisthefunctiongetfileofthefileiopaint/filemanager/filemanager.pyofthecomponentFileManager.Performingamanipulationoftheargumentfilenameresultsinpathtraversal.The2026- attackispossibletobecarriedoutremotely.Theexploithasbeenmadepublicandcouldbeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5258 CVE- Avulnerabilityhasbeenfoundincode-projectsSimpleLaundrySystem1.0.Thisvulnerabilityaffectsunknowncodeofthefile/modifymember.phpofthecomponentParameterHandler.SuchmanipulationoftheargumentfirstNameleadstosql2026- injection.Theattackcanbelaunchedremotely.Theexploithasbeendisclosedtothepublicandmaybeused.5540 CVE- AsecurityflawhasbeendiscoveredinitsourcecodeFreeHotelReservationSystem1.0.Thisvulnerabilityaffectsunknowncodeofthefile/hotel/admin/login.phpofthecomponentParameterHandler.Themanipulationoftheargumentemailresults2026- insqlinjection.Theattackmaybelaunchedremotely.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks.5551 CVE- Asecurityflawhasbeendiscoveredincode-projectsConcertTicketReservationSystem1.0.Affectedbythisissueissomeunknownfunctionalityofthefile/ConcertTicketReservationSystem-master/processsearch.phpofthecomponentParameter2026- Handler.Performingamanipulationoftheargumentsearchingresultsinsqlinjection.Theattackmaybeinitiatedremotely.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks.5554 CVE- Aweaknesshasbeenidentifiedincode-projectsConcertTicketReservationSystem1.0.Thisaffectsanunknownpartofthefile/ConcertTicketReservationSystem-master/login.phpofthecomponentParameterHandler.Executingamanipulationof2026- theargumentEmailcanleadtosqlinjection.Theattackmaybelaunchedremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks.5555 CVE- Avulnerabilitywasidentifiedinprovectuskafka-uiupto0.7.2.ThisimpactsthefunctionvalidateAccessofthefile/api/smartfilters/testexecutionsofthecomponentEndpoint.Themanipulationleadstocodeinjection.Theattackcanbeinitiated2026- remotely.Theexploitispubliclyavailableandmightbeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5562 CVE- 2026- ZohocorpManageEngineExchangeReporterPlusversionsbefore5802arevulnerabletoStoredXSSinPermissionsBasedonMailboxesreport. 27655 CVE- Aweaknesshasbeenidentifiedincode-projectsSimpleLaundrySystem1.0.Affectedbythisvulnerabilityisanunknownfunctionalityofthefile/searchguest.phpofthecomponentParameterHandler.Thismanipulationoftheargument2026- searchServiceIdcausessqlinjection.Theattackmaybeinitiatedremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks.5564 CVE- 2026- ZohocorpManageEngineExchangeReporterPlusversionsbefore5802arevulnerabletoStoredXSSinNon-OwnerMailboxPermissionreport. 4108 CVE- 2026- ZohocorpManageEngineExchangeReporterPlusversionsbefore5802arevulnerabletoStoredXSSinFolderMessageCountandSizereport. 4107 CVE- 2026- ZohocorpManageEngineExchangeReporterPlusversionsbefore5802arevulnerabletoStoredXSSinPublicFolderClientPermissionsreport. 3880 CVE- 2026- ZohocorpManageEngineExchangeReporterPlusversionsbefore5802arevulnerabletoStoredXSSinMailsExchangedBetweenUsersreport. 28703 CVE- 2026- ZohocorpManageEngineExchangeReporterPlusversionsbefore5802arevulnerabletoStoredXSSinPermissionsbasedonDistributionGroupsreport. 28756 CVE- 2026- ZohocorpManageEngineExchangeReporterPlusversionsbefore5802arevulnerabletoStoredXSSinDistributionListsreport. 28754 CVE- Asecurityvulnerabilityhasbeendetectedincode-projectsSimpleLaundrySystem1.0.Affectedbythisissueissomeunknownfunctionalityofthefile/delmemberinfo.phpofthecomponentParameterHandler.Suchmanipulationoftheargument2026- useridleadstosqlinjection.Theattackmaybelaunchedremotely.Theexploithasbeendisclosedpubliclyandmaybeused.5565 CVE- IncorrectDefaultPermissionsvulnerabilityinAIRBUSPSSTETRAConnectivityServeronWindowsServerOSallowsPrivilegeAbuse.AnattackermayexecutearbitrarycodewithSYSTEMprivilegesifauseristrickedordirectedtoplaceacraftedfile2025- intothevulnerabledirectory.ThisissueaffectsTETRAconnectivityServer:7.0.Vulnerabilityfixisavailableanddeliveredtoimpactedcustomers.7024 CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto6.5.3,astoredCross-SiteScripting(XSS)vulnerabilityinChurchCRM'sNoteEditorallowsauthenticateduserswithnote-addingpermissionstoexecutearbitraryJavaScriptcodeinthe2026- contextofotherusers'browsers,includingadministrators.Thiscanleadtosessionhijacking,privilegeescalation,andunauthorizedaccesstosensitivechurchmemberdata.Thisvulnerabilityisfixedin6.5.3.35574 CVE- AvulnerabilitywasfoundinTechnostrobeHI-LED-WR120-G25.5.0.1R6.03.30.Impactedisanunknownfunctionofthefile/Technostrobe/ofthecomponentEndpoint.Themanipulationresultsinimproperaccesscontrols.Theattackmaybeperformed fromremote.Theexploithasbeenmadepublicandcouldbeused.Multipleendpointsareaffected.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway. CVE- AvulnerabilitywasdeterminedinTechnostrobeHI-LED-WR120-G25.5.0.1R6.03.30.Theaffectedelementisthefunctionindex_configofthefile/LoginCB.Thismanipulationcausesimproperauthentication.Itispossibletoinitiatetheattackremotely. Theexploithasbeenpubliclydisclosedandmaybeutilized.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.
CVE- AweaknesshasbeenidentifiedinTechnostrobeHI-LED-WR120-G25.5.0.1R6.03.30.Thisimpactsanunknownfunctionofthefile/fs.Executingamanipulationoftheargumentcwdcanleadtounrestrictedupload.Theattackcanbelaunched remotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway. CVE- OpenEXRprovidesthespecificationandreferenceimplementationoftheEXRfileformat,animagestorageformatforthemotionpictureindustry.Fromversion3.4.0tobeforeversion3.4.8,acraftedB44orB44AEXRfilecancauseanout-of-bounds2026- writeinanyapplicationthatdecodesitviaexrdecodingrun().Consequencesrangefromimmediatecrash(mostlikely)tocorruptionofadjacentheapallocations(layout-dependent).Thisissuehasbeenpatchedinversion3.4.8.34544 CVE- OpenEXRprovidesthespecificationandreferenceimplementationoftheEXRfileformat,animagestorageformatforthemotionpictureindustry.Fromversion3.4.0tobeforeversion3.4.7,anattackerprovidingacrafted.exrfilewithHTJ2K 2026- compressionandachannelwidthof32768canwritecontrolleddatabeyondtheoutputheapbufferinanyapplicationthatdecodesEXRimages.Thewriteprimitiveis2bytesperoverflowiterationor4bytes(byanotherpath),repeatingforeach 34545 additionalpixelpasttheoverflowpoint.Inthiscontext,aheapwriteoverflowcanleadtoremotecodeexecutiononsystems.Thisissuehasbeenpatchedinversion3.4.7. CVE- AweaknesshasbeenidentifiedinitsourcecodePayrollManagementSystem1.0.Affectedbythisissueissomeunknownfunctionalityofthefile/viewemployee.phpofthecomponentParameterHandler.ExecutingamanipulationoftheargumentID2026- canleadtosqlinjection.Theattackmaybeperformedfromremote.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks.5238 CVE- Asecurityvulnerabilityhasbeendetectedincode-projectsOnlineFIRSystem1.0.Affectedbythisvulnerabilityisanunknownfunctionalityofthefile/Login/checklogin.phpofthecomponentLogin.Themanipulationoftheargumentemail/password2026- leadstosqlinjection.Theattackispossibletobecarriedoutremotely.Theexploithasbeendisclosedpubliclyandmaybeused.5665 CVE- AvulnerabilityhasbeenfoundinCesantaMongooseupto7.20.Thisaffectsthefunctionmgtlsrecvcertofthefilemongoose.cofthecomponentTLS1.3Handler.Suchmanipulationoftheargumentpubkeyleadstoheap-basedbufferoverflow.The 2026- attackmaybelaunchedremotely.Theexploithasbeendisclosedtothepublicandmaybeused.Upgradingtoversion7.21mitigatesthisissue.Thenameofthepatchis0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1.Itisadvisabletoupgradethe 5244 affectedcomponent.Thevendorwascontactedearly,respondedinaveryprofessionalmannerandquicklyreleasedafixedversionoftheaffectedproduct. CVE- AvulnerabilityhasbeenfoundinCyber-IIIStudent-Management-Systemupto1a938fa61e9f735078e9b291d2e6215b4942af3f.Thisvulnerabilityaffectsunknowncodeofthefile/login.phpofthecomponentParameterHandler.Suchmanipulationof 2026- theargumentPasswordleadstosqlinjection.Itispossibletolaunchtheattackremotely.Theexploithasbeendisclosedtothepublicandmaybeused.Thisproducttakestheapproachofrollingreleasestoprovidecontiniousdelivery.Therefore, 5669 versiondetailsforaffectedandupdatedreleasesarenotavailable.Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet. CVE- Avulnerabilitywasdeterminedinhuimeicloudhmeditorupto2.2.3.Impactedisthefunctionclient.getofthefilesrc/mcp-server.jsofthecomponentimage-to-base64Endpoint.Executingamanipulationoftheargumenturlcanleadtoserver-side2026- requestforgery.Itispossibletolaunchtheattackremotely.Theexploithasbeenpubliclydisclosedandmaybeutilized.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5346 CVE- AvulnerabilitywasdeterminedinCyber-IIIStudent-Management-Systemupto1a938fa61e9f735078e9b291d2e6215b4942af3f.Thisaffectsanunknownfunctionofthefile/viva/update.phpofthecomponentHTTPPOSTRequestHandler.This 2026- manipulationoftheargumentNamecausesimproperauthorization.Itispossibletoinitiatetheattackremotely.Theexploithasbeenpubliclydisclosedandmaybeutilized.Thisproductisusingarollingreleasetoprovidecontiniousdelivery. 5642 Therefore,noversiondetailsforaffectednorupdatedreleasesareavailable.Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet. CVE- AsecurityvulnerabilityhasbeendetectedinprojectworldsCarRentalSystem1.0.Thisvulnerabilityaffectsunknowncodeofthefile/messageadmin.phpofthecomponentParameterHandler.SuchmanipulationoftheargumentMessageleadsto2026- sqlinjection.Theattackmaybelaunchedremotely.Theexploithasbeendisclosedpubliclyandmaybeused.5637 CVE- AvulnerabilitywasdeterminedinprojectworldsCarRentalProject1.0.Theaffectedelementisanunknownfunctionofthefile/login.phpofthecomponentParameterHandler.Thismanipulationoftheargumentunamecausessqlinjection.Remote2026- exploitationoftheattackispossible.Theexploithasbeenpubliclydisclosedandmaybeutilized.5368 CVE- Aweaknesshasbeenidentifiedinsuvarchaldocker-mcp-serverupto0.1.0.Theimpactedelementisthefunctionstopcontainer/removecontainer/pullimageofthefilesrc/index.tsofthecomponentHTTPInterface.Thismanipulationcausesos2026- commandinjection.Theattackispossibletobecarriedoutremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks.Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet.5741 CVE- AvulnerabilitywasidentifiedinprojectworldsCarRentalProject1.0.Affectedbythisvulnerabilityisanunknownfunctionalityofthefile/bookcar.phpofthecomponentParameterHandler.Themanipulationoftheargumentfnameleadstosql2026- injection.Theattackcanbeinitiatedremotely.Theexploitispubliclyavailableandmightbeused.5634 CVE- Avulnerabilitywasdeterminedinassafelovicgpt-researcherupto3.4.3.AffectedisanunknownfunctionofthecomponentwsEndpoint.Executingamanipulationoftheargumentsourceurlscanleadtoserver-siderequestforgery.Itispossibleto2026- launchtheattackremotely.Theexploithasbeenpubliclydisclosedandmaybeutilized.Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet.5633 CVE- AsecurityvulnerabilityhasbeendetectedinJeecgBoot3.9.0/3.9.1.Theimpactedelementisanunknownfunctionofthefilejeecg-boot/jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/airag/JeecgBizToolsProvider.javaofthe 2026- componentAIChatModule.Suchmanipulationleadstomissingauthentication.Theattackcanbeexecutedremotely.Thenameofthepatchisb7c9aeba7aefda9e008ea8fe4fc3daf08d0c5b39/2c1cc88b8d983868df8c520a343d6ff4369d9e59.Itisbest 5616 practicetoapplyapatchtoresolvethisissue.Theprojectfixedtheissuewithacommitwhichshallbepartofthenextofficialrelease. CVE- Avulnerabilitywasfoundinassafelovicgpt-researcherupto3.4.3.ThisimpactsanunknownfunctionofthecomponentHTTPRESTAPIEndpoint.Performingamanipulationresultsinmissingauthentication.Itispossibletoinitiatetheattackremotely.2026- Theexploithasbeenmadepublicandcouldbeused.Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet.5632 CVE- Avulnerabilityhasbeenfoundinassafelovicgpt-researcherupto3.4.3.Thisaffectsthefunctionextractcommanddataofthefilebackend/server/serverutils.pyofthecomponentwsEndpoint.Suchmanipulationoftheargumentargsleadstocode2026- injection.Theattackmaybeperformedfromremote.Theexploithasbeendisclosedtothepublicandmaybeused.Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet.5631 CVE- AsecurityflawhasbeendiscoveredinPowerJob5.1.0/5.1.1/5.1.2.TheaffectedelementisthefunctionGroovyEvaluator.evaluateofthefile/openApi/addWorkflowNodeofthecomponentOpenAPIEndpoint.Themanipulationoftheargument2026- nodeParamsresultsincodeinjection.Theattackcanbeexecutedremotely.Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet.5739 CVE- AweaknesshasbeenidentifiedinitsourcecodeOnlineEnrollmentSystem1.0.Impactedisanunknownfunctionofthefile/enrollment/index.php?view=edit&id=3ofthecomponentParameterHandler.Thismanipulationoftheargumentdeptid2026- causessqlinjection.Theattackispossibletobecarriedoutremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks.5334 CVE- AsecurityflawhasbeendiscoveredinDefaultFuctionContent-Management-System1.0.Thisissueaffectssomeunknownprocessingofthefile/admin/tools.php.Themanipulationoftheargumenthostresultsincommandinjection.Theattackcanbe2026- executedremotely.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks.5333 CVE- AweaknesshasbeenidentifiedinprojectworldsCarRentalSystem1.0.Affectedbythisvulnerabilityisanunknownfunctionalityofthefile/pay.phpofthecomponentParameterHandler.Executingamanipulationoftheargumentmpesacanleadto2026- sqlinjection.Theattackcanbelaunchedremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks. CVE- Avulnerabilityhasbeenfoundincode-projectsSimpleITDiscussionForum1.0.Affectedbythisissueissomeunknownfunctionalityofthefile/edit-category.phpofthecomponentParameterHandler.Themanipulationoftheargumentcat_idleadsto sqlinjection.Itispossibletoinitiatetheattackremotely.Theexploithasbeendisclosedtothepublicandmaybeused.
CVE- Asecurityvulnerabilityhasbeendetectedincode-projectsEasyBlogSite1.0.Affectedbythisissueissomeunknownfunctionalityofthefilelogin.php.Themanipulationoftheargumentusername/passwordleadstosqlinjection.Theattackmaybe initiatedremotely.Theexploithasbeendisclosedpubliclyandmaybeused.
CVE- Avulnerabilitywasdetectedinvanna-aivannaupto2.0.2.Affectedbythisvulnerabilityisanunknownfunctionalityofthefile/api/vanna/v2/ofthecomponentChatAPIEndpoint.Performingamanipulationresultsinmissingauthentication.The attackcanbeinitiatedremotely.Theexploitisnowpublicandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5320 CVE- AflawwasfoundinKeycloak.Thisissueallowsanattacker,whocontrolsanotherpathonthesamewebserver,tobypasstheallowedpathinredirectUniformResourceIdentifiers(URIs)thatuseawildcard.Asuccessfulattackmayleadtothetheftof2026- anaccesstoken,resultingininformationdisclosure.3872 CVE- AweaknesshasbeenidentifiedinTotolinkA7100RU7.4cu.2313b20191024.TheaffectedelementisthefunctionsetScheduleCfgofthefile/cgi-bin/cstecgi.cgi.Executingamanipulationoftheargumentmodecanleadtooscommandinjection.The2026- attackmaybelaunchedremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks.5678 CVE- AsecurityflawhasbeendiscoveredinTotolinkA7100RU7.4cu.2313b20191024.ImpactedisthefunctionCsteSystemofthefile/cgi-bin/cstecgi.cgi.PerformingamanipulationoftheargumentresetFlagsresultsinoscommandinjection.Theattack2026- maybeinitiatedremotely.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks.5677 CVE- AvulnerabilitywasidentifiedinPowerJob5.1.0/5.1.1/5.1.2.Impactedisanunknownfunctionofthefilepowerjob-server/powerjob-server-starter/src/main/java/tech/powerjob/server/web/controller/InstanceController.javaofthecomponentdetailPlus2026- Endpoint.ThemanipulationoftheargumentcustomQueryleadstosqlinjection.Remoteexploitationoftheattackispossible.Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet.5736 CVE- Theapplication'sinstallerrunswithelevatedprivilegesbutresolvessystemexecutablesandDLLsusinguntrustedsearchpathsthatcanincludeuser-writabledirectories,allowingalocalattackertoplacemaliciousbinarieswiththesamenamesand2026- havethemloadedorexecutedinsteadofthelegitimatesystemfiles,resultinginlocalprivilegeescalation.3780 CVE- Aflawhasbeenfoundincode-projectsSimpleLaundrySystem1.0.Thisvulnerabilityaffectsunknowncodeofthefile/userfinishregister.phpofthecomponentParameterHandler.ThismanipulationoftheargumentfirstNamecausessqlinjection.2026- Remoteexploitationoftheattackispossible.Theexploithasbeenpublishedandmaybeused.5648 CVE- AvulnerabilitywasfoundinTotolinkA7100RU7.4cu.2313b20191024.ThisimpactsthefunctionsetGameSpeedCfgofthefile/cgi-bin/cstecgi.cgi.Themanipulationoftheargumentenableresultsinoscommandinjection.Theattackmaybe2026- performedfromremote.Theexploithasbeenmadepublicandcouldbeused.5692 CVE- AvulnerabilityhasbeenfoundinTotolinkA7100RU7.4cu.2313b20191024.ThisaffectsthefunctionsetFirewallTypeofthefile/cgi-bin/cstecgi.cgi.ThemanipulationoftheargumentfirewallTypeleadstooscommandinjection.Theattackispossible2026- tobecarriedoutremotely.Theexploithasbeendisclosedtothepublicandmaybeused.5691 CVE- AflawhasbeenfoundinTotolinkA7100RU7.4cu.2313b20191024.TheimpactedelementisthefunctionsetRemoteCfgofthefile/cgi-bin/cstecgi.cgi.Executingamanipulationoftheargumentenablecanleadtooscommandinjection.Theattack2026- canbeexecutedremotely.Theexploithasbeenpublishedandmaybeused.5690 CVE- HirschmannIndustrialHiVisionversion08.1.03priorto08.1.04and08.2.00containsavulnerabilityintheexecutionofuser-configuredexternalapplicationsthatallowsalocalattackertoexecutearbitrarybinaries.Duetoinsufficientpath 2022- sanitization,anattackercanplaceamaliciousbinaryintheexecutionpathofaconfiguredexternalapplication,causingittobeexecutedinsteadoftheintendedapplication.Thiscanresultinexecutionwithelevatedprivilegesdependingonthe 4987 contextoftheexternalapplication. CVE- AsecurityflawhasbeendiscoveredinOFFISDCMTKupto3.7.0.ThisimpactsthefunctionexecuteOnReception/executeOnEndOfStudyofthefiledcmnet/apps/storescp.ccofthecomponentstorescp.Performingamanipulationresultsinoscommand2026- injection.Remoteexploitationoftheattackispossible.Thepatchisnamededbb085e45788dccaf0e64d71534cfca925784b8.Applyingapatchistherecommendedactiontofixthisissue.5663 CVE- AvulnerabilitywasidentifiedinTotolinkA8000R5.9c.681B20180413.ThisissueaffectsthefunctionsetLanguageCfgofthefile/cgi-bin/cstecgi.cgi.SuchmanipulationoftheargumentlangTypeleadstomissingauthentication.Theattackcanbe2026- launchedremotely.Theexploitispubliclyavailableandmightbeused.5676 CVE- AvulnerabilityhasbeenfoundinAlejandroArciniegasmcp-data-visbc597e391f184d2187062fd567599a3cb72adf51/de5a51525a69822290eaee569a1ab447b490746d.ThisaffectsthefunctionRequestofthefilesrc/servers/database/server.jsofthe 2026- componentMCPHandler.Themanipulationleadstosqlinjection.Theattackmaybeinitiatedremotely.Theexploithasbeendisclosedtothepublicandmaybeused.Thisproductusesarollingreleasemodeltodelivercontinuousupdates.Asa 5322 result,specificversioninformationforaffectedorupdatedreleasesisnotavailable.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway. CVE- AvulnerabilitywasdetectedinTotolinkA7100RU7.4cu.2313b20191024.TheaffectedelementisthefunctionsetNtpCfgofthefile/cgi-bin/cstecgi.cgi.Performingamanipulationoftheargumenttzresultsinoscommandinjection.Remote2026- exploitationoftheattackispossible.Theexploitisnowpublicandmaybeused.5689 CVE- AsecurityvulnerabilityhasbeendetectedinTotolinkA7100RU7.4cu.2313b20191024.ImpactedisthefunctionsetDdnsCfgofthefile/cgi-bin/cstecgi.cgi.Suchmanipulationoftheargumentproviderleadstooscommandinjection.Theattackmay2026- belaunchedremotely.Theexploithasbeendisclosedpubliclyandmaybeused.5688 CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,aSQLinjectionvulnerabilityexistsintheEditEventTypes.phpfile,whichisonlyaccessibletoadministrators.TheENtyidPOSTparameterisnotsanitizedbeforebeingusedin2026- aSQLquery,allowinganadministratortoexecutearbitrarySQLcommandsdirectlyagainstthedatabase.Thisvulnerabilityisfixedin7.1.0.39343 CVE- 2026- XenForobefore2.3.9andbefore2.2.18allowsremotecodeexecution(RCE)byauthenticated,butmalicious,adminusers.Anattackerwithadminpanelaccesscanexecutearbitrarycodeontheserver. 35056 CVE- OpenSTAManagerisanopensourcemanagementsoftwarefortechnicalassistanceandinvoicing.Priortoversion2.10.2,theoauth2.phpfileinOpenSTAManagerisanunauthenticatedendpoint($skippermissions=true).Itloadsarecordfromthe2026- zzoauth2tableusingtheattacker-controlledGETparameterstate,andduringtheOAuth2configurationflowcallsunserialize()ontheaccesstokenfieldwithoutanyclassrestriction.Thisissuehasbeenpatchedinversion2.10.2.29782 CVE- Piwigoisanopensourcephotogalleryapplicationfortheweb.Priortoversion16.3.0,aSQLInjectionvulnerabilitywasdiscoveredinPiwigoaffectingtheActivityListAPIendpoint.Thisvulnerabilityallowsanauthenticatedadministratortoextract2026- sensitivedatafromthedatabase,includingusercredentials,emailaddresses,andallstoredcontent.Thisissuehasbeenpatchedinversion16.3.0.27885 CVE- EmissaryisaP2Pbaseddata-drivenworkflowengine.Priorto8.39.0,theExecutrixutilityclassconstructedshellcommandsbyconcatenatingconfiguration-derivedvalues--includingthePLACE_NAMEparameter--withinsufficientsanitization.Only spaceswerereplacedwithunderscores,allowingshellmetacharacters(;,|,$,`,(,),etc.)topassthroughinto/bin/sh-ccommandexecution.Thisvulnerabilityisfixedin8.39.0.35581 CVE-
MyBBLastUser'sThreadsinProfilePlugin1.2containsapersistentcross-sitescriptingvulnerabilitythatallowsattackerstoinjectmaliciousscriptsbycraftingthreadsubjectswithscripttags.Attackerscancreatethreadswithscriptpayloadsinthe 25250subjectfieldthatexecutewhenusersvisittheattacker'sprofilepage. CVE-CI4MSisaCodeIgniter4-basedCMSskeletonthatdeliversaproduction-ready,modulararchitecturewithRBACauthorizationandthemesupport.Priorto0.31.2.0,theapplicationfailstoproperlysanitizeuser-controlledinputwithinSystemSettings- CompanyInformation.Severaladministrativeconfigurationfieldsacceptattacker-controlledinputthatisstoredserver-sideandlaterrenderedwithoutproperoutputencoding.Thesevaluesarepersistedinthedatabaseandrenderedunsafelyon 35035public-facingpagesonly,suchasthemainlandingpage.Thereisnoexecutionintheadministrativedashboard--thevulnerabilityonlyimpactsthepublicfrontend.Thisvulnerabilityisfixedin0.31.2.0. CVE-Emlogisanopensourcewebsitebuildingsystem.Inversions2.6.2andprior,apathtraversalvulnerabilityexistsintheemUnZip()function(include/lib/common.php:793).WhenextractingZIParchives(plugin/templateuploads,backupimports),the 2026-functioncalls$zip->extractTo($path)withoutsanitizingZIPentrynames.AnauthenticatedadmincanuploadacraftedZIPcontainingentrieswith../sequencestowritearbitraryfilestotheserverfilesystem,includingPHPwebshells,achieving 34607RemoteCodeExecution(RCE).Attimeofpublication,therearenopubliclyavailablepatches. CVE-ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,anSQLinjectionvulnerabilitywasfoundintheendpoint/SettingsUser.phpinChurchCRM7.0.5.AuthenticatedadministrativeuserscaninjectarbitrarySQLstatementsthrough2026-thetypearrayparameterviatheindexandthusextractandmodifyinformationfromthedatabase.Thisvulnerabilityisfixedin7.1.0.39325 CVE-DolibarrERP/CRMversionspriorto23.0.2containanauthenticatedremotecodeexecutionvulnerabilityinthedolevalstandard()functionthatfailstoapplyforbiddenstringchecksinwhitelistmodeanddoesnotdetectPHPdynamiccallablesyntax.2026-AttackerswithadministratorprivilegescaninjectmaliciouspayloadsthroughcomputedextrafieldsorotherevaluationpathsusingPHPdynamiccallablesyntaxtobypassvalidationandachievearbitrarycommandexecutionviaeval().22666 CVE-Piwigoisanopensourcephotogalleryapplicationfortheweb.Priortoversion16.3.0,aSQLInjectionvulnerabilityexistsinthepwg.users.getListWebServiceAPImethod.ThefilterparameterisdirectlyconcatenatedintoaSQLquerywithoutproper2026-sanitization,allowingauthenticatedadministratorstoexecutearbitrarySQLcommands.Thisissuehasbeenpatchedinversion16.3.0.27834 CVE-TheWidgetsforSocialPhotoFeedpluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathe'feeddata'parameterkeysinallversionsupto,andincluding,1.7.9duetoinsufficientinputsanitizationandoutputescaping.Thismakesit2026-possibleforunauthenticatedattackerstoinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauseraccessesaninjectedpage.5425 CVE- 2026-TheSpamProtectforContactForm7WordPresspluginbefore1.2.10allowsloggingtoaPHPfile,whichcouldallowanattackerwitheditoraccesstoachieveRemoteCodeExecutionbyusingacraftedheader 1540 CVE-TheVisitorTrafficRealTimeStatisticspluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathe'pagetitle'parameterinallversionsupto,andincluding,8.4duetoinsufficientinputsanitizationandoutputescaping.Thismakesit2026-possibleforunauthenticatedattackerstoinjectarbitrarywebscriptsinpagesthatwillexecutewheneveranadminuseraccessestheTrafficbyTitlesection.2936 CVE-TheWebmentionpluginforWordPressisvulnerabletoServer-SideRequestForgeryinallversionsupto,andincluding,5.6.2inthe'MF2::parseauthorpage'functionviathe'Receiver::post'function.Thismakesitpossibleforunauthenticated2026-attackerstomakewebrequeststoarbitrarylocationsoriginatingfromthewebapplicationandcanbeusedtoqueryandmodifyinformationfrominternalservices.0686 CVE- 2026-GLPIisaFreeAssetandITManagementSoftwarepackage.From0.60tobefore10.0.24,anauthenticatedtechnicianusercanstoreanXSSpayloadinasupplierfields.Thisvulnerabilityisfixedin10.0.24. 25932 CVE-Ech0isanopen-source,self-hostedpublishingplatformforpersonalideasharing.Priorto4.2.8,theGET/api/website/titleendpointacceptsanarbitraryURLviathewebsiteurlqueryparameterandmakesaserver-sideHTTPrequesttoitwithoutany 2026-validationofthetargethostorIPaddress.Theendpointrequiresnoauthentication.Anattackercanusethistoreachinternalnetworkservices,cloudmetadataendpoints(169.254.169.254),andlocalhost-boundservices,withpartialresponsedata 35037exfiltratedviatheHTML
tagextractionThisvulnerabilityisfixedin4.2.8. CVE-DuetotheimproperneutralisationofspecialelementsusedinanOScommand,aremoteattackercanexploitanRCEvulnerabilityinthegenerateSrpArrayfunction,resultinginfullsystemcompromise.Thisvulnerabilitycanonlybeattackedifthe2026-attackerhassomeotherwaytowritearbitrarydatatotheusertable.33613 CVE-MyBBDownloadsPlugin2.0.3containsapersistentcross-sitescriptingvulnerabilitythatallowsregularmemberstoinjectmaliciousscriptsthroughthedownloadtitlefield.AttackerscansubmitanewdownloadwithHTML/JavaScriptcodeinthetitle2018-parameter,whichexecuteswhenadministratorsvalidatethedownloadindownloads.php.25248 CVE- 2026-GLPIisafreeassetandITmanagementsoftwarepackage.From10.0.0tobefore10.0.24and11.0.6,anauthenticatedusercanperformaSQLinjectionviathelogsexportfeature.Thisvulnerabilityisfixedin10.0.24and11.0.6. 29047 CVE- 2026-InTornadobefore6.5.5,cookieattributeinjectioncouldoccurbecausethedomain,path,andsamesiteargumentsto.RequestHandler.setcookiewerenotcheckedforcraftedcharacters. 35536 PraisonAIisamulti-agentteamssystem.Priorto1.5.113,PraisonAI'sreciperegistrypublishendpointwritesuploadedrecipebundlestoafilesystempathderivedfromthebundle'sinternalmanifest.jsonbeforeitverifiesthatthemanifestnameandCVE-versionmatchtheHTTProute.Amaliciouspublishercanplace../traversalsequencesinthebundlemanifestandcausetheregistryservertocreatefilesoutsidetheconfiguredregistryrooteventhoughtherequestisultimatelyrejectedwithHTTP2026-400.Thisisanarbitraryfilewrite/pathtraversalissueontheregistryhost.Itaffectsdeploymentsthatexposethereciperegistrypublishflow.Iftheregistryisintentionallyrunwithoutatoken,anynetworkclientthatcanreachtheservicecan39308triggerit.Ifatokenisconfigured,anyuserwithpublishaccesscanstillexploitit.Thisvulnerabilityisfixedin1.5.113. CVE-EndianFirewallversion3.3.25andpriorallowauthenticateduserstodeletearbitraryfilesviadirectorytraversalintheremoveARCHIVEparameterto/cgi-bin/backup.cgi.TheremoveARCHIVEparametervalueisusedtoconstructafilepathwithout2026-sanitizationofdirectorytraversalsequences,whichisthenpassedtoanunlink()call.34790 Kedroisatoolboxforproduction-readydatascience.Priorto1.3.0,thegetversionedpath()methodinkedro/io/core.pyconstructsfilesystempathsbydirectlyinterpolatinguser-suppliedversionstringswithoutsanitization.Becauseversionstrings CVE-areusedaspathcomponents,traversalsequencessuchas../arepreservedandcanescapetheintendedversioneddatasetdirectory.Thisisreachablethroughmultipleentrypoints:catalog.load(...,version=...),DataCatalog.fromconfig(..., 2026-loadversions=...),andtheCLIviakedrorun--load-versions=dataset:../../../secrets.AnattackerwhocaninfluencetheversionstringcanforceKedrotoloadfilesfromoutsidetheintendedversiondirectory,enablingunauthorizedfilereads,data 35167poisoning,orcross-tenantdataaccessinsharedenvironments.Thisvulnerabilityisfixedin1.3.0.
CVE- ThePaidMembershipPlugin,Ecommerce,UserRegistrationForm,LoginForm,UserProfile&RestrictContent-ProfilePresspluginforWordPressisvulnerabletounauthorizedmembershippaymentbypassinallversionsupto,andincluding,4.16.11. 2026- Thisisduetoamissingownershipverificationonthechange_plan_sub_idparameterintheprocess_checkout()function.Thismakesitpossibleforauthenticatedattackers,withsubscriberlevelaccessandabove,toreferenceanotheruser'sactive 3445 subscriptionduringcheckouttomanipulateprorationcalculations,allowingthemtoobtainpaidlifetimemembershipplanswithoutpaymentviatheppress_process_checkoutAJAXaction. CVE- WWBNAVideoisanopensourcevideoplatform.Inversions26.0andprior,objects/aVideoEncoder.json.phpstillallowsattacker-controlleddownloadURLvalueswithcommonmediaorarchiveextensionssuchas.mp4,.mp3,.zip,.jpg,.png,.gif,and .webmtobypassSSRFvalidation.Theserverthenfetchestheresponseandstoresitasmediacontent.Thisallowsanauthenticateduploadertoturntheupload-by-URLflowintoareliableSSRFresponse-exfiltrationprimitive.Thevulnerabilityis 39370 causedbyanincompletefixforCVE-2026-27732. CVE- OpenHarnesspriortocommit166fcfecontainsanimproperaccesscontrolvulnerabilityinbuilt-infiletoolsduetoinconsistentparameterhandlinginpermissionenforcement,allowingattackerswhocaninfluenceagenttoolexecutiontoreadarbitrary localfilesoutsidetheintendedrepositoryscope.AttackerscanexploitthepathparameternotbeingpassedtothePermissionCheckerinreadfile,writefile,editfile,andnotebookedittoolstobypassdenyrulesandaccesssensitivefilessuchas
22682 configurationfiles,credentials,andSSHmaterial,orcreateandoverwritefilesinrestrictedhostpathsinfullautomode. CVE- Cryptographicissuewhilecopyingdatatoadestinationbufferwithoutvalidatingitssize. 47400 CVE- openFPGALoaderisautilityforprogrammingFPGAs.In1.1.1andearlier,aheap-buffer-overflowreadvulnerabilityexistsinPOFParser::parseSection()thatallowsout-of-boundsheapmemoryaccesswhenparsingacrafted.poffile.NoFPGAhardware2026- isrequiredtotriggerthisvulnerability.35176 CVE- Tinaisaheadlesscontentmanagementsystem.Priortoversion2.2.2,@tinacms/clirecentlyaddedlexicalpath-traversalcheckstothedevmediaroutes,buttheimplementationstillvalidatesonlythepathstringanddoesnotresolvesymlinkor 2026- junctiontargets.Ifalinkalreadyexistsunderthemediaroot,Tinaacceptsapathlikepivot/written-from-media.txtas"inside"themediadirectoryandthenperformsrealfilesystemoperationsthroughthatlinktarget.Thisallowsout-of-rootmedia 34603 listingandwriteaccess,andthesamerootcausealsoaffectsdelete.Thisissuehasbeenpatchedinversion2.2.2. CVE- Addressedapotentialinsecuredirectobjectreference(IDOR)vulnerabilityinthesigninginvitationacceptanceprocess.Undercertainconditions,thisissuecouldhaveallowedanattackertoaccessormodifyunauthorizedresourcesbymanipulating 2026- user-suppliedobjectidentifiers,potentiallyleadingtoforgedsignaturesandcompromisingtheintegrityandauthenticityofdocumentsundergoingthesigningprocess.Theissuewascausedbyinsufficientauthorizationvalidationonreferenced 4947 resourcesduringrequestprocessing. CVE- HirschmannIndustrialHiVisionversions06.0.00and07.0.00priorto06.0.06and07.0.01containsanimproperauthorizationvulnerabilitythatallowsread-onlyuserstogainwriteaccesstomanageddevicesbybypassingaccesscontrolmechanisms.2017- AttackerscanexploitalternativeinterfacessuchasthewebinterfaceorSNMPbrowsertomodifydeviceconfigurationsdespitehavingrestrictedpermissions.20238 CVE- 2024- Apermissionsissuewasaddressedwithadditionalrestrictions.ThisissueisfixedinmacOSSequoia15.1.AnappmaybeabletoaccessContactswithoutuserconsent. 40858 CVE- SDLimageisalibrarytoloadimagesofvariousformatsasSDLsurfaces.Indolayersurface()insrc/IMGxcf.c,pixelindexvaluesfromdecodedXCFtiledataareuseddirectlyascolormapindiceswithoutvalidatingthemagainstthecolormapsize 2026- (cmnum).Acrafted.xcffilewithasmallcolormapandout-of-rangepixelindicescausesheapout-of-boundsreadsofupto762bytespastthecolormapallocation.BothIMAGEINDEXEDcodepathsareaffected(bpp=1andbpp=2).Theleakedheap 35444 bytesarewrittenintotheoutputsurfacepixeldata,makingthempotentiallyobservableintherenderedimage.Thisvulnerabilityisfixedwithcommit996bf12888925932daace576e09c3053410896f8. CVE- Directusisareal-timeAPIandAppdashboardformanagingSQLdatabasecontent.Priorto11.16.1,Directus'TUSresumableuploadendpoint(/files/tus)allowsanyauthenticateduserwithbasicfileuploadpermissionstooverwritearbitraryexisting 2026- filesbyUUID.TheTUScontrollerperformsonlycollection-levelauthorizationchecks,verifyingtheuserhassomepermissionondirectusfiles,butnevervalidatesitem-levelaccesstothespecificfilebeingreplaced.Asaresult,row-levelpermission 35412 rules(e.g.,"userscanonlyupdatetheirownfiles")arecompletelybypassedviatheTUSpathwhilebeingcorrectlyenforcedonthestandardRESTuploadpath.Thisvulnerabilityisfixedin11.16.1. CVE- openFPGALoaderisautilityforprogrammingFPGAs.In1.1.1andearlier,aheap-buffer-overflowreadvulnerabilityexistsinBitParser::parseHeader()thatallowsout-of-boundsheapmemoryaccesswhenparsingacrafted.bitfile.NoFPGAhardwareis2026- requiredtotriggerthisvulnerability.35170 OpenEXRprovidesthespecificationandreferenceimplementationoftheEXRfileformat,animagestorageformatforthemotionpictureindustry.From3.2.0tobefore3.2.7,3.3.9,and3.4.9,amisalignedmemorywritevulnerabilityexistsinCVE- LossyDctDecoderexecute()insrc/lib/OpenEXRCore/internaldwadecoder.h:749.WhendecodingaDWAorDWAB-compressedEXRfilecontainingaFLOAT-typechannel,thedecoderperformsanin-placeHALF→FLOATconversionbycastingan2026- unaligneduint8trowpointertofloatandwritingthroughit.Becausetherowbuffermaynotbe4-bytealigned,thisconstitutesundefinedbehaviorundertheCstandardandcrashesimmediatelyonarchitecturesthatenforcealignment(ARM,34379 RISC-V,etc.).Onx86itissilentlytoleratedatruntimebutremainsexploitableviacompileroptimizationsthatassumealignedaccess.Thisvulnerabilityisfixedin3.2.7,3.3.9,and3.4.9. CVE- BraveCMSisanopen-sourceCMS.Priorto2.0.6,anInsecureDirectObjectReference(IDOR)vulnerabilityexistsinthearticleimagedeletionfeature.Itislocatedinapp/Http/Controllers/Dashboard/ArticleController.phpwithinthedeleteImage2026- method.TheendpointacceptsafilenamefromtheURLbutdoesnotverifyownership.Thisallowsanauthenticateduserwitheditpermissionstodeleteimagesattachedtoarticlesownedbyotherusers.Thisvulnerabilityisfixedin2.0.6.35183 CVE- Tinaisaheadlesscontentmanagementsystem.Priortoversion2.2.2,@tinacms/graphqlusesstring-basedpathcontainmentchecksinFilesystemBridge.Thatblocksplain../traversal,butitdoesnotresolvesymlinkorjunctiontargets.Ifa 2026- symlink/junctionalreadyexistsundertheallowedcontentroot,apathlikecontent/posts/pivot/owned.mdisstillconsidered"inside"thebaseeventhoughtherealfilesystemtargetcanbeoutsideit.Asaresult,FilesystemBridge.get(),put(),delete(), 34604 andglob()canoperateonfilesoutsidetheintendedroot.Thisissuehasbeenpatchedinversion2.2.2. CVE- listmonkisastandalone,self-hosted,newsletterandmailinglistmanager.Fromversion4.1.0tobeforeversion6.1.0,asessionmanagementvulnerabilityallowspreviouslyissuedauthenticatedsessionstoremainvalidaftersensitiveaccount 2026- securitychanges,specificallypasswordresetandpasswordchange.Asaresult,anattackerwhohasalreadyobtainedavalidsessioncookiecanretainaccesstotheaccountevenafterthevictimchangesorresetstheirpassword.Thisweakens 34828 accountrecoveryandsessionsecurityguarantees.Thisissuehasbeenpatchedinversion6.1.0. CVE- SuiteCRM7.10.7containsaSQLinjectionvulnerabilitythatallowsauthenticatedattackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughtheparentTabparameter.AttackerscansendGETrequeststotheemailmodulewithmalicious2019- parentTabvaluesusingboolean-basedSQLinjectiontechniquestoextractsensitivedatabaseinformation.25663 CVE- SuiteCRM7.10.7containsatime-basedSQLinjectionvulnerabilityintherecordparameteroftheUsersmoduleDetailViewactionthatallowsauthenticatedattackerstomanipulatedatabasequeries.AttackerscanappendSQLcodetotherecord2019- parameterinGETrequeststotheindex.phpendpointtoextractsensitivedatabaseinformationthroughtime-basedblindSQLinjectiontechniques.25664 CVE- AnissuewasdiscoveredintheWi-FidriverinSamsungMobileProcessoramdWearableProcessorExynos980,850,1080,1280,1330,1380,1480,1580,W920,W930,andW1000.Impropersynchronizationonaglobalvariableleadstoadoublefree.2025- Anattackercantriggeraraceconditionbyinvokinganioctlfunctionconcurrentlyfrommultiplethreads.54601 CVE- AnissuewasdiscoveredintheWi-FidriverinSamsungMobileProcessorandWearableProcessorExynos980,850,1080,1280,1330,1380,1480,1580,W920,W930,andW1000.Impropersynchronizationonaglobalvariableleadstoause-after-2025- free.Anattackercantriggeraraceconditionbyinvokinganioctlfunctionconcurrentlyfrommultiplethreads.54602 Electronisaframeworkforwritingcross-platformdesktopapplicationsusingJavaScript,HTMLandCSS.Priortoversions38.8.6,39.8.1,40.8.0,and41.0.0-beta.8,appsthatusethepowerMonitormodulemaybevulnerabletoause-after-free.AfterCVE- thenativePowerMonitorobjectisgarbage-collected,theassociatedOS-levelresources(amessagewindowonWindows,ashutdownhandleronmacOS)retaindanglingreferences.Asubsequentsession-changeevent(Windows)orsystemshutdown2026- (macOS)dereferencesfreedmemory,whichmayleadtoacrashormemorycorruption.AllappsthataccesspowerMonitorevents(suspend,resume,lock-screen,etc.)arepotentiallyaffected.Theissueisnotdirectlyrenderer-controllable.Thisissue34770 hasbeenpatchedinversions38.8.6,39.8.1,40.8.0,and41.0.0-beta.8. CVE- FileBrowserisafilemanaginginterfaceforuploading,deleting,previewing,renaming,andeditingfileswithinaspecifieddirectory.Priortoversion2.62.2,theSPAindexpageinFileBrowserisvulnerabletoStoredCross-SiteScripting(XSS)via2026- admin-controlledbrandingfields.Anadminwhosetsbranding.nametoamaliciouspayloadinjectspersistentJavaScriptthatexecutesforALLvisitors,includingunauthenticatedusers.Thisissuehasbeenpatchedinversion2.62.2.34530
CVE- TheOWASPcoreruleset(CRS)isasetofgenericattackdetectionrulesforusewithcompatiblewebapplicationfirewalls.Priortoversions3.3.9and4.25.0,abypasswasidentifiedinOWASPCRSthatallowsuploadingfileswithdangerousextensions 2026- (.php,.phar,.jsp,.jspx)byinsertingwhitespacepaddinginthefilename(e.g.photo.phporshell.jsp).Theaffectedrulesdonotnormalizewhitespacebeforeevaluatingthefileextensionregex,sothedot-extensioncheckfailstomatch.Thisissuehas 33691 beenpatchedinversions3.3.9and4.25.0. CVE- Aremotecommandexecution(RCE)vulnerabilityinthe/goform/formReleaseConnectcomponentofUTTAggressive520Wv3v1.7.7-180627allowsattackerstoexecutearbitrarycommandsviaacraftedstring. 31067
CVE- Electronisaframeworkforwritingcross-platformdesktopapplicationsusingJavaScript,HTMLandCSS.Priortoversions38.8.6,39.8.4,40.8.4,and41.0.0,thenodeIntegrationInWorkerwebPreferencewasnotcorrectlyscopedinallconfigurations.In certainprocess-sharingscenarios,workersspawnedinframesconfiguredwithnodeIntegrationInWorker:falsecouldstillreceiveNode.jsintegration.AppsareonlyaffectediftheyenablenodeIntegrationInWorker.Appsthatdonotuse 34775 nodeIntegrationInWorkerarenotaffected.Thisissuehasbeenpatchedinversions38.8.6,39.8.4,40.8.4,and41.0.0. CVE- AnissueinthefirmwareupdatemechanismofQianniaoQN-L23PA0904v20250721.1640allowsattackerstogainrootaccess,installbackdoors,andexfiltratedataviasupplyingacraftediu.shscriptcontainedinanSDcard. 30603 CVE- pyLoadisafreeandopen-sourcedownloadmanagerwritteninPython.Priorto0.5.0b3.dev97,theADMINONLYCOREOPTIONSauthorizationsetinsetconfigvalue()usesincorrectoptionnamessslcertandsslkey,whiletheactualconfiguration 2026- optionnamesaresslcertfileandsslkeyfile.Thisnamemismatchcausestheadmin-onlychecktoalwaysevaluatetoFalse,allowinganyuserwithSETTINGSpermissiontooverwritetheSSLcertificateandkeyfilepaths.Additionally,thesslcertchain 35586 optionwasneveraddedtotheadmin-onlysetatall.Thisvulnerabilityisfixedin0.5.0b3.dev97. CVE- FastMCPisthestandardframeworkforbuildingMCPapplications.Priortoversion3.2.0,servernamescontainingshellmetacharacters(e.g.,&)cancausecommandinjectiononWindowswhenpassedtofastmcpinstallclaude-codeorfastmcpinstall 2025- gemini-cli.Theseinstallpathsusesubprocess.run()withalistargument,butonWindowsthetargetCLIsoftenresolveto.cmdwrappersthatareexecutedthroughcmd.exe,whichinterpretsmetacharactersintheflattenedcommandstring.Thisissue 64340 hasbeenpatchedinversion3.2.0. CVE- 2026- AnissuewasdiscoveredinMbedTLSbefore3.6.6and4.xbefore4.1.0andTF-PSA-Cryptobefore1.1.0.ThereisaPredictableSeedinaPseudo-RandomNumberGenerator(PRNG). 34871 CVE- dyeisaportableandrespectfulcolorlibraryforshellscripts.Priorto1.1.1,certaindyetemplateexpressionswouldresultinexecutionofarbitrarycode.Thisissuewasdiscoveredandfixedbydye'sauthor,andisnotknowntobeexploited.This2026- vulnerabilityisfixedin1.1.1.35197 CVE- WWBNAVideoisanopensourcevideoplatform.Inversions26.0andprior,thePayPalIPNv1handleratplugin/PayPalYPT/ipn.phplackstransactiondeduplication,allowinganattackertoreplayasinglelegitimateIPNnotificationtorepeatedlyinflate2026- theirwalletbalanceandrenewsubscriptions.TheneweripnV2.phpandwebhook.phphandlerscorrectlydeduplicateviaPayPalYPTlogentries,butthev1handlerwasneverupdatedandremainsactivelyreferencedasthenotifyurlforbillingplans.39366 CVE- WWBNAVideoisanopensourcevideoplatform.Inversions26.0andprior,theLiverestreamlogcallbackflowacceptedanattacker-controlledrestreamerURLandlaterfetchedthatstoredURLserver-side,enablingstoredSSRFforauthenticated2026- streamers.Thevulnerableflowallowedalow-privilegeuserwithstreamingpermissiontostoreanarbitrarycallbackURLandtriggerserver-siderequeststoloopbackorinternalHTTPservicesthroughtherestreamlogfeature.39368 CVE- ThePieRegister-UserRegistration,Profiles&ContentRestrictionpluginforWordPressisvulnerabletounauthorizedmodificationofdataduetoamissingcapabilitycheckonthepiemain()functioninallversionsupto,andincluding,3.8.4.8.This2026- makesitpossibleforunauthenticatedattackerstochangeregistrationformstatus.3571 CVE- OpenPrintingCUPSisanopensourceprintingsystemforLinuxandotherUnix-likeoperatingsystems.Inversions2.4.16andprior,theRSSnotifierallows..pathtraversalinnotify-recipient-uri(e.g.,rss:///../job.cache),lettingaremoteIPPclientwrite 2026- RSSXMLbytesoutsideCacheDir/rss(anywherethatislp-writable).Inparticular,becauseCacheDirisgroup-writablebydefault(typicallyroot:lpandmode0770),thenotifier(runningaslp)canreplaceroot-managedstatefilesviatemp-file+ 34978 rename().ThisPoCclobbersCacheDir/job.cachewithRSSXML,andafterrestartingcupsdtheschedulerfailstoparsethejobcacheandpreviouslyqueuedjobsdisappear.Attimeofpublication,therearenopubliclyavailablepatches. CVE- 2026- InappropriateimplementationinANGLEinGoogleChromepriorto146.0.7680.178allowedaremoteattackertoleakcross-origindataviaacraftedHTMLpage.(Chromiumsecurityseverity:High) 5283 CVE- Out-of-boundswriteinthequeryprocessingcomponentsinAmazonAthenaODBCdriverbefore2.1.0.0mightallowathreatactortocrashthedriverbyusingspeciallycrafteddatathatisprocessedbythedriverduringqueryoperations.2026- remediatethisissue,usersshouldupgradetoversion2.1.0.0.35559 CVE- ScooldisaQ&Aandaknowledgesharingplatformforteams.Priorto1.66.2,anauthenticatedauthorizationflawinScooldallowsanylogged-in,low-privilegeusertooverwriteanotheruser'sexistingquestionbysupplyingthatquestion'spublicIDas 2026- thepostIdparametertoPOST/questions/ask.BecausequestionIDsareexposedinnormalquestionURLs,alow-privilegeattackercantakeavictimquestionIDfromapublicpageandcauseattacker-controlledcontenttobestoredunderthatexisting 39354 questionobject.Thiscausesdirectintegritylossofuser-generatedcontentandcorruptstheintegrityoftheexistingdiscussionthread.Thisvulnerabilityisfixedin1.66.2. CVE- Emlogisanopensourcewebsitebuildingsystem.Inversions2.6.2andprior,aLocalFileInclusion(LFI)vulnerabilityexistsinadmin/plugin.phpatline80.The$pluginparameterfromtheGETrequestisdirectlyusedinarequireoncepathwithout 2026- propersanitization.IftheCSRFtokencheckcanbebypassed(seepotentialbypassconditions),anattackercanincludearbitraryPHPfilesfromtheserverfilesystem,leadingtocodeexecution.Attimeofpublication,therearenopubliclyavailable 34787 patches. CVE- ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinBrainstormForceUltimateAddonsforWPBakeryPageBuilderallowsDOM-BasedXSS.ThisissueaffectsUltimateAddonsforWPBakeryPageBuilder:2026- fromn/abefore3.21.4.34889 CVE- Planeisananopen-sourceprojectmanagementtool.Priorto1.3.0,theIssueBulkUpdateDateEndpointallowsaprojectmember(ADMINorMEMBER)tomodifythestartdateandtargetdateofANYissueacrosstheentirePlaneinstance,regardlessof2026- workspaceorprojectmembership.TheendpointfetchesissuesbyIDwithoutfilteringbyworkspaceorproject,enablingcross-boundarydatamodification.Thisvulnerabilityisfixedin1.3.0.39374 CVE- Emlogisanopensourcewebsitebuildingsystem.Inversions2.6.2andprior,aSQLinjectionvulnerabilityexistsininclude/model/tagmodel.phpatline168.TheupdateTagName()functiondirectlyinterpolatesuserinputintotheSQLquerystring2026- withoutusingparameterizedqueriesorproperescaping($this->db->escapestring()),makingitvulnerabletoSQLinjectionattacks.Attimeofpublication,therearenopubliclyavailablepatches.34788 CVE- Electronisaframeworkforwritingcross-platformdesktopapplicationsusingJavaScript,HTMLandCSS.Priortoversions38.8.6,39.8.1,40.8.0,and41.0.0-beta.8,onmacOS,app.moveToApplicationsFolder()usedanAppleScriptfallbackpaththatdid 2026- notproperlyhandlecertaincharactersintheapplicationbundlepath.Underspecificconditions,acraftedlaunchpathcouldleadtoarbitraryAppleScriptexecutionwhentheuseracceptedthemove-to-Applicationsprompt.Appsareonlyaffectedif 34779 theycallapp.moveToApplicationsFolder().AppsthatdonotusethisAPIarenotaffected.Thisissuehasbeenpatchedinversions38.8.6,39.8.1,40.8.0,and41.0.0-beta.8. CVE- PraisonAIisamulti-agentteamssystem.Priortoversion4.5.90,MCPToolIndex.searchtools()compilesacaller-suppliedstringdirectlyasaPythonregularexpressionwithnovalidation,sanitization,ortimeout.Acraftedregexcausescatastrophic2026- backtrackinginthereengine,blockingthePythonthreadforhundredsofsecondsandcausingacompleteserviceoutage.Thisissuehasbeenpatchedinversion4.5.90.34939 CVE- 2026- InappropriateimplementationinWebGLinGoogleChromepriorto146.0.7680.178allowedaremoteattackertoobtainpotentiallysensitiveinformationfromprocessmemoryviaacraftedHTMLpage.(Chromiumsecurityseverity:Medium) 5291 CVE- 2026- InsufficientpolicyenforcementinWebUSBinGoogleChromepriorto146.0.7680.178allowedaremoteattackertoobtainpotentiallysensitiveinformationfromprocessmemoryviaacraftedHTMLpage.(Chromiumsecurityseverity:High) 5276 CVE- OpenEXRprovidesthespecificationandreferenceimplementationoftheEXRfileformat,animagestorageformatforthemotionpictureindustry.From3.4.0tobefore3.4.9,amissingboundscheckonthedataWindowattributeinEXRfileheaders allowsanattackertotriggerasignedintegeroverflowingenericunpack().BysettingdataWindow.min.xtoalargenegativevalue,OpenEXRCorecomputesanenormousimagewidth,whichislaterusedinasignedintegermultiplicationthat 34378 overflows,causingtheprocesstoterminatewithSIGILLviaUBSan.Thisvulnerabilityisfixedin3.4.9. CVE- Kedro-DatasetsisaKendopluginprovidingdataconnectors.Priorto9.3.0,PartitionedDatasetinkedro-datasetswasvulnerabletopathtraversal.PartitionIDswereconcatenateddirectlywiththedatasetbasepathwithoutvalidation.Anattackeror
maliciousinputcontaining..componentsinapartitionIDcouldcausefilestobewrittenoutsidetheconfigureddatasetdirectory,potentiallyoverwritingarbitraryfilesonthefilesystem.UsersofPartitionedDatasetwithanystoragebackend(local 35492filesystem,S3,GCS,etc.)areaffected.Thisvulnerabilityisfixedin9.3.0. CVE- ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinMarkO'DonnellMSTWLeagueManagerallowsDOM-BasedXSS.ThisissueaffectsMSTWLeagueManager:fromn/athrough2.10. 34890 CVE-ScooldisaQ&Aandaknowledgesharingplatformforteams.Priortoversion1.66.1,Scooldcontainsanauthenticatedauthorizationflawinfeedbackdeletionthatallowsanylogged-in,low-privilegeusertodeleteanotheruser'sfeedbackpostby 2026-submittingitsIDtoPOST/feedback/{id}/delete.Thehandlerenforcesauthenticationbutdoesnotenforceobjectownership(ormoderator/adminauthorization)beforedeletion.Inverification,asecondnon-privilegedaccountsuccessfullydeleteda 34832victimaccount'sfeedbackitem,andtheitemimmediatelydisappearedfromthefeedbacklisting/detailviews.Thisissuehasbeenpatchedinversion1.66.1. CVE-Flask-HTTPAuthprovidesBasic,DigestandTokenHTTPauthenticationforFlaskroutes.Priortoversion4.8.1,inasituationwheretheclientmakesarequesttoatokenprotectedresourcewithoutpassingatoken,orpassinganemptytoken,Flask- 2026-HTTPAuthwouldinvoketheapplication'stokenverificationcallbackfunctionwiththetokenargumentsettoanemptystring.Iftheapplicationhadanyusersinitsdatabasewithanemptystringsetastheirtoken,thenitcouldpotentiallyauthenticate 34531theclientrequestagainstanyofthoseusers.Thisissuehasbeenpatchedinversion4.8.1. CVE-Anissuewasdiscoveredin6.0before6.0.4,5.2before5.2.13,and4.2before4.2.30.MultiPartParserallowsremoteattackerstodegradeperformancebysubmittingmultipartuploadswithContent-Transfer-Encoding:base64includingexcessive2026-whitespace.Earlier,unsupportedDjangoseries(suchas5.0.x,4.1.x,and3.2.x)werenotevaluatedandmayalsobeaffected.DjangowouldliketothankSeokchanYoonforreportingthisissue.33033 CVE-IBMDataPowerGateway10.6CD10.6.1.0through10.6.5.0andIBMDataPowerGateway10.5.010.5.0.0through10.5.0.20andIBMDataPowerGateway10.6.010.6.0.0through10.6.0.8IBMDataPowerGatewayisvulnerabletocross-siterequest2025-forgerywhichcouldallowanattackertoexecutemaliciousandunauthorizedactionstransmittedfromauserthatthewebsitetrusts.36375 CVE- 2026-TheSQLChartBuilderWordPresspluginbefore2.3.8doesnotproperlyescapeuserinputasitisconcatenedtoSQLqueries,makingitpossibleforattackerstoconductSQLInjectionattacksagainstthedynamicfilterfunctionality. 4079 CVE- 2026-TheLinkWhisperFreeWordPresspluginbefore0.9.1hasapubliclyaccessibleRESTendpointthatallowsunauthenticatedsettingsupdates. 1900 CVE-InModem,thereisapossiblesystemcrashduetoalogicerror.Thiscouldleadtoremotedenialofservice,ifaUEhasconnectedtoaroguebasestationcontrolledbytheattacker,withnoadditionalexecutionprivilegesneeded.Userinteractionis2026-notneededforexploitation.PatchID:MOLY01106496;IssueID:MSV-4467.20431 Directusisareal-timeAPIandAppdashboardformanagingSQLdatabasecontent.Priorto11.17.0,Directus'GraphQLendpoints(/graphqland/graphql/system)didnotdeduplicateresolverinvocationswithinasinglerequest.Anauthenticateduser CVE-couldexploitGraphQLaliasingtorepeatanexpensiverelationalquerymanytimesinasinglerequest,forcingtheservertoexecutealargenumberofindependentcomplexdatabasequeriesconcurrently,multiplyingdatabaseloadlinearlywiththe 2026-numberofaliases.TheexistingtokenlimitonGraphQLqueriesstillpermittedenoughaliasesforsignificantresourceexhaustion,whiletherelationaldepthlimitappliedperaliaswithoutreducingthetotalnumberexecuted.Ratelimitingisdisabledby 35441default,meaningnobuilt-inthrottlepreventedthisfromcausingCPU,memory,andI/Oexhaustionthatcoulddegradeorcrashtheservice.Anyauthenticateduser,includingthosewithminimalread-onlypermissions,couldtriggerthiscondition.This vulnerabilityisfixedin11.17.0. CVE-Adenial-of-servicevulnerabilitywasidentifiedinTP-LinkTapoC520WSv2.6withintheHTTPrequestpathparsinglogic.Theimplementationenforceslengthrestrictionsontherawrequestpathbutdoesnotaccountforpathexpansionperformed2026-duringnormalization.AnattackerontheadjacentnetworkmaysendacraftedHTTPrequesttocausebufferoverflowandmemorycorruption,leadingtosysteminterruptionordevicereboot.34124 CVE-Astack-basedbufferoverflowvulnerabilitywasidentifiedinTP-LinkTapoC520WSv2.6withinaconfigurationhandlingcomponentduetoinsufficientinputvalidation.2026-avulnerableconfigurationparameter,resultinginastackoverflow.SuccessfulexploitationresultsinDenial-of-Service(DoS)condition,leadingtoaservicecrashordevicereboot,impactingavailability.34122 CVE-Aheap-basedbufferoverflowvulnerabilitywasidentifiedinTP-LinkTapoC520WSv2.6withintheasynchronousparsingoflocalvideostreamcontentduetoinsufficientalignmentandvalidationofbufferboundarieswhenprocessingstreaming 2026-inputs.Anattackeronthesamenetworksegmentcouldtriggerheapmemorycorruptionconditionsbysendingcraftedpayloadsthatcausewriteoperationsbeyondallocatedbufferboundaries.SuccessfulexploitationcausesaDenial-of-Service(DoS) 34120condition,causingthedevice'sprocesstocrashorbecomeunresponsive. CVE-BentleySystemsiTwinPlatformexposedaCesiumionaccesstokeninthesourceofsomewebpages.Anunauthenticatedattackercouldusethistokentoenumerateordeletecertainassets.Asof2026-03-27,thetokenisnolongerpresentinthe2026-webpagesandcannotbeusedtoenumerateordeleteassets.35383 CVE-Aheap-basedbufferoverflowvulnerabilitywasidentifiedinTP-LinkTapoC520WSv2.6withintheHTTPparsingloopwhenappendingsegmentedrequestbodieswithoutcontinuouswrite‑boundaryverification,duetoinsufficientboundaryvalidation 2026-whenhandlingexternallysuppliedHTTPinput.Anattackeronthesamenetworksegmentcouldtriggerheapmemorycorruptionconditionsbysendingcraftedpayloadsthatcausewriteoperationsbeyondallocatedbufferboundaries.Successful 34119exploitationcausesaDenial-of-Service(DoS)condition,causingthedevice'sprocesstocrashorbecomeunresponsive. CVE-Aheap-basedbufferoverflowvulnerabilitywasidentifiedinTP-LinkTapoC520WSv2.6intheHTTPPOSTbodyparsinglogicduetomissingvalidationofremainingbuffercapacityafterdynamicallocation,duetoinsufficientboundaryvalidationwhen 2026-handlingexternallysuppliedHTTPinput.Anattackeronthesamenetworksegmentcouldtriggerheapmemorycorruptionconditionsbysendingcraftedpayloadsthatcausewriteoperationsbeyondallocatedbufferboundaries.Successful 34118exploitationcausesaDenial-of-Service(DoS)condition,causingthedevice'sprocesstocrashorbecomeunresponsive. CVE-AvulnerabilitywasfoundinSourceCodester/mayurikBestCourierManagementSystem1.0.Affectedbythisissueissomeunknownfunctionalityofthefile/ajax.php?action=deleteuserofthecomponentUserDeleteHandler.Performinga2026-manipulationoftheargumentIDresultsinimproperaccesscontrols.Theattackmaybeinitiatedremotely.Theexploithasbeenmadepublicandcouldbeused.5330 CVE- 2026-ImproperNeutralizationofInputDuringWebPageGeneration('Cross-siteScripting')vulnerabilityinDavidLingrenMediaLIbraryAssistantallowsStoredXSS.ThisissueaffectsMediaLIbraryAssistant:fromn/athrough3.34. 34897 CVE- 2026-SignalKServerisaserverapplicationthatrunsonacentralhubinaboat.Priortoversion2.24.0,thereisanarbitraryprototypereadvulnerabilityviafromfieldbypass.Thisvulnerabilityallowsalow-privilegedauthenticatedusertobypass 35038prototypeboundaryfilteringtoextractinternalfunctionsandpropertiesfromtheglobalprototypeobjectthisviolatesdataisolationandletsauserreadmorethantheyshould.Thisissuehasbeenpatchedinversion2.24.0.
CVE- 2025- MemoryCorruptionwhenaccessingfreedmemoryduetoconcurrentfencederegistrationandsignalhandling. 47374 CVE- ChyrpLiteisanultra-lightweightbloggingengine.Priorto2026.01,anIDOR/MassAssignmentissueexistsinthePostmodelthatallowsauthenticateduserswithposteditingpermissions(EditPost,EditDraft,EditOwnPost,EditOwnDraft)tomodify poststheydonotownanddonothavepermissiontoedit.Bypassinginternalclasspropertiessuchasidintothepostattributespayload,anattackercanaltertheobjectbeinginstantiated.Asaresult,furtheractionsareperformedonanotheruser's 35173 postratherthantheattacker'sownpost,effectivelyenablingposttakeover.Thisvulnerabilityisfixedin2026.01. Glancesisanopen-sourcesystemcross-platformmonitoringtool.Priortoversion4.5.3,theGlancesXML-RPCserver(activatedwithglances-sorglances--server)sendsAccess-Control-Allow-Origin:*oneveryHTTPresponse.BecausetheXML-RPCCVE- handlerdoesnotvalidatetheContent-Typeheader,anattacker-controlledwebpagecanissueaCORS"simplerequest"(POSTwithContent-Type:text/plain)containingavalidXML-RPCpayload.Thebrowsersendstherequestwithoutapreflight
check,theserverprocessestheXMLbodyandreturnsthefullsystemmonitoringdataset,andthewildcardCORSheaderletstheattacker'sJavaScriptreadtheresponse.Theresultiscompleteexfiltrationofhostname,OSversion,IPaddresses,33533 CPU/memory/disk/networkstats,andthefullprocesslistincludingcommandlines(whichoftencontaintokens,passwords,orinternalpaths).Thisissuehasbeenpatchedinversion4.5.3. CVE-vLLMisaninferenceandservingengineforlargelanguagemodels(LLMs).From0.1.0tobefore0.19.0,aDenialofServicevulnerabilityexistsinthevLLMOpenAI-compatibleAPIserver.Duetothelackofanupperboundvalidationonthen parameterintheChatCompletionRequestandCompletionRequestPydanticmodels,anunauthenticatedattackercansendasingleHTTPrequestwithanastronomicallylargenvalue.ThiscompletelyblocksthePythonasyncioeventloopandcauses 34756immediateOut-Of-Memorycrashesbyallocatingmillionsofrequestobjectcopiesintheheapbeforetherequestevenreachestheschedulingqueue.Thisvulnerabilityisfixedin0.19.0. CVE-vLLMisaninferenceandservingengineforlargelanguagemodels(LLMs).From0.7.0tobefore0.19.0,theVideoMediaIO.loadbase64()methodatvllm/multimodal/media/video.pysplitsvideo/jpegdataURLsbycommatoextractindividualJPEG 2026-frames,butdoesnotenforceaframecountlimit.Thenumframesparameter(default:32),whichisenforcedbytheloadbytes()codepath,iscompletelybypassedinthevideo/jpegbase64path.AnattackercansendasingleAPIrequestcontaining 34755thousandsofcomma-separatedbase64-encodedJPEGframes,causingtheservertodecodeallframesintomemoryandcrashwithOOM.Thisvulnerabilityisfixedin0.19.0. CVE-Payloadisafreeandopensourceheadlesscontentmanagementsystem.Priortoversion3.78.0in@payloadcms/storage-azure,@payloadcms/storage-gcs,@payloadcms/storage-r2,and@payloadcms/storage-s3,theclient-uploadsigned-URL 2026-endpointsforS3,GCS,Azure,andR2didnotproperlysanitizefilenames.Anattackercouldcraftfilenamestoescapetheintendedstoragelocation.Thisissuehasbeenpatchedinversion3.78.0for@payloadcms/storage-azure, 34750@payloadcms/storage-gcs,@payloadcms/storage-r2,and@payloadcms/storage-s3. TheBookingforAppointmentsandEventsCalendar-AmeliapluginforWordPressisvulnerabletoSQLInjectionviathesortparameterinthepaymentslistingendpointinallversionsupto,andincluding,2.1.2.ThisisduetoinsufficientescapingonCVE-theuser-suppliedsortparameterandlackofsufficientpreparationontheexistingSQLqueryinPaymentRepository.php,wherethesortfieldisinterpolateddirectlyintoanORDERBYclausewithoutsanitizationorwhitelistvalidation.PDO2026-preparedstatementsdonotprotectORDERBYcolumnnames.GETrequestsalsoskipAmelia'snoncevalidationentirely.Thismakesitpossibleforauthenticatedattackers,withManager-level(wpamelia-manager)accessandabove,toappend4668additionalSQLqueriesintoalreadyexistingqueriesthatcanbeusedtoextractsensitiveinformationfromthedatabaseviatime-basedblindSQLinjection. CVE-AvulnerabilityintheconfigurationbackupfeatureofCiscoNexusDashboardcouldallowanattackerwhohastheencryptionpasswordandaccesstoFullorConfig-onlybackupfilestoaccesssensitiveinformation. 2026-authenticationdetailsareincludedintheencryptedbackupfiles.Anattackerwithavalidbackupfileandencryptionpasswordfromanaffecteddevicecoulddecryptthebackupfile.Theattackercouldthenusetheauthenticationdetailsinthebackup 20042filetoaccessinternal-onlyAPIsontheaffecteddevice.Asuccessfulexploitcouldallowtheattackertoexecutearbitrarycommandsontheunderlyingoperatingsystemastherootuser. CVE-ABusinessLogicvulnerabilityexistsinSourceCodesterLoanManagementSystemv1.0duetoimproperserver-sidevalidation.Theapplicationallowsadministratorstocreate"LoanPlans"withspecificpenaltyratesforoverduepayments.Whilethe 2026-frontendinterfacepreventsusersfromenteringnegativenumbersinthe"MonthlyOverduePenalty"field,thisconstraintisnotenforcedonthebackend.Anauthenticatedattackercanbypasstheclient-siderestrictionbymanipulatingtheHTTPPOST 30522requesttosubmitanegativevalueforthepenaltyrate. CVE- 2026-MbedTLSv3.3.0upto3.6.5and4.0.0allowsAlgorithmDowngrade. 25834 CVE- 2026-Anunauthenticatedremotecodeexecution(RCE)vulnerabilityexistsinapplicationsthatusetheReplicatornodepackagemanager(npm)version1.0.5todeserializeuntrusteduserinputandexecutetheresultingobject. 2265 CVE-Avulnerabilityintheweb-basedmanagementinterfaceofCiscoIMCcouldallowanauthenticated,remoteattackerwithadmin-levelprivilegestoexecutearbitrarycodeastherootuser. Thisvulnerabilityisduetoimpropervalidationofuser- 2026-suppliedinputtotheweb-basedmanagementinterface.AnattackercouldexploitthisvulnerabilitybysendingcraftedHTTPrequeststoanaffecteddevice.Asuccessfulexploitcouldallowtheattackertoexecutearbitrarycodeontheunderlying 20097operatingsystemastherootuser.CiscohasassignedthisvulnerabilityaSIRofHighratherthanMediumasthescoreindicatesbecauseadditionalsecurityimplicationscouldoccurwhentheattackerbecomesroot. Avulnerabilityintheweb-basedmanagementinterfaceofCiscoIMCcouldallowanauthenticated,remoteattackerwithadmin-levelprivilegestoperformcommandinjectionattacksonanaffectedsystemand executearbitrarycommandsasCVE-therootuser.Thisvulnerabilityisduetoimpropervalidationofuser-suppliedinput.Anattackercouldexploitthisvulnerabilitybysendingcraftedcommandstotheweb-basedmanagementinterfaceoftheaffectedsoftware.Asuccessfulexploitcould2026-allowtheattackertoexecutearbitrarycommandsontheunderlyingoperatingsystemastherootuser.CiscohasassignedthisvulnerabilityaSecurityImpactRating(SIR)ofHigh,ratherthanMediumasthescoreindicates,becauseadditional20096securityimplicationscouldoccuroncetheattackerhasbecomeroot. Avulnerabilityintheweb-basedmanagementinterfaceofCiscoIMCcouldallowanauthenticated,remoteattackerwithadmin-levelprivilegestoperformcommandinjectionattacksonanaffectedsystemand executearbitrarycommandsasCVE-therootuser.Thisvulnerabilityisduetoimpropervalidationofuser-suppliedinput.Anattackercouldexploitthisvulnerabilitybysendingcraftedcommandstotheweb-basedmanagementinterfaceoftheaffectedsoftware.Asuccessfulexploitcould2026-allowtheattackertoexecutearbitrarycommandsontheunderlyingoperatingsystemastherootuser.CiscohasassignedthisvulnerabilityaSecurityImpactRating(SIR)ofHigh,ratherthanMediumasthescoreindicates,becauseadditional20095securityimplicationscouldoccuroncetheattackerhasbecomeroot. CVE-AnissuewasdiscoveredinMariaDBServerbefore11.4.10,11.5.xthrough11.8.xbefore11.8.6,and12.xbefore12.2.2.Ifthecachingsha2passwordauthenticationpluginisinstalled,andsomeuseraccountsareconfiguredtouseit,alargepacket2026-cancrashtheserverbecausesha256cryptrusesalloca.35549 CVE-AsecurityvulnerabilityhasbeendetectedinTechnostrobeHI-LED-WR120-G25.5.0.1R6.03.30.AffectedisthefunctiondeletefileofthecomponentFsBrowseClean.Themanipulationoftheargumentdir/pathleadstomissingauthorization.Theattack2026-maybeinitiatedremotely.Theexploithasbeendisclosedpubliclyandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5574 CVE-ExposureofsensitiveinformationintheusersMFAfeatureinDevolutionsServerallowsuserswithusermanagementprivilegestoobtainotherusersOTPkeysviaanauthenticatedAPIrequest.2026-2026.1.11.4927 CVE-ThePaidMembershipPlugin,Ecommerce,UserRegistrationForm,LoginForm,UserProfile&RestrictContent-ProfilePresspluginforWordPressisvulnerabletoarbitraryshortcodeexecutioninallversionsupto,andincluding,4.16.11.Thisisdueto 2026-thepluginallowinguser-suppliedbillingfieldvaluesfromthecheckoutprocesstobeinterpolatedintoshortcodetemplatestringsthataresubsequentlyprocessedwithoutpropersanitizationofshortcodesyntax.Thismakesitpossiblefor 3309unauthenticatedattackerstoexecutearbitraryshortcodesbysubmittingcraftedbillingfieldvaluesduringthecheckoutprocess. CVE-ChangeDetection.ioversionspriorto0.54.7containaprotectionbypassvulnerabilityintheSafeXPath3ParserimplementationthatallowsattackerstoreadarbitrarylocalfilesbyusingunblockedXPath3.0/3.1functionssuchasjson-doc()andsimilar2026-file-accessprimitives.AttackerscanexploittheincompleteblocklistofdangerousXPathfunctionstoaccesssensitivedatafromthelocalfilesystem.35000 CVE-ABusinessLogicvulnerabilityexistsinSourceCodesterLoanManagementSystemv1.0duetothelackofproperinputvalidation.Theapplicationallowsadministratorstodefine"LoanPlans"whichdeterminethedurationofaloan(inmonths).2026-However,thebackendfailstovalidatethatthedurationmustbeapositiveinteger.Anattackercansubmitanegativevalueforthemonthsparameter.Thesystemacceptsthisinvaliddataandcreatesaloanplanwithanegativeduration.30523 CVE-TheSimpleShoppingCartpluginforWordPressisvulnerabletoStoredCross-SiteScriptingviatheplugin's'wpscdisplayproduct'shortcodeinallversionsupto,andincluding,5.2.4duetoinsufficientinputsanitizationandoutputescapingonuser2026-suppliedattributes.Thismakesitpossibleforauthenticatedattackers,withcontributor-levelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauseraccessesaninjectedpage.0552
CVE- Pi-holeisaLinuxnetwork-leveladvertisementandInternettrackerblockingapplication.Version6.4hasalocalprivilege-escalationvulnerabilityallowscodeexecutionasrootfromthelow-privilegepiholeaccount.Importantcontext:thepihole 2026- accountusesnologin,sothisisnotadirectinteractive-loginissue.However,nologindoesnotpreventcodefromrunningasUIDpiholeifaPi-holecomponentiscompromised.Inthatrealisticpost-compromisescenario,attacker-controlledcontentin 33727 /etc/pihole/versionsissourcedbyroot-runPi-holescripts,leadingtorootcodeexecution.Thisvulnerabilityisfixedin6.4.1. CVE- TheWPShortcodesPlugin-ShortcodesUltimatepluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathesucarouselshortcodeinallversionsupto,andincluding,7.4.8.Thisisduetoinsufficientinputsanitizationandoutputescaping inthe'suslidelink'attachmentmetafield.Thismakesitpossibleforauthenticatedattackers,withauthorlevelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauseraccessesaninjectedpage. CVE- TheRoyalAddonsforElementorpluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathe'buttontext'parameterinallversionsupto,andincluding,1.7.1049duetoinsufficientinputsanitizationandoutputescaping.Thismakesit
possibleforauthenticatedattackers,withcontributorlevelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauseraccessesaninjectedpage. CVE-TheXproAddons--140+WidgetsforElementorpluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathePricingWidget's'onClickEvent'settinginallversionsupto,andincluding,1.4.20duetoinsufficientinputsanitizationand outputescaping.Thismakesitpossibleforauthenticatedattackers,withcontributorlevelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauseraccessesaninjectedpage.13368 CVE-TheWPShortcodesPlugin-ShortcodesUltimatepluginforWordPressisvulnerabletoStoredCross-SiteScriptinginallversionsupto,andincluding,7.4.7.Thisisduetoinsufficientinputsanitizationandoutputescapinginthe'src'attributeofthe2026-sulightboxshortcode.Thismakesitpossibleforauthenticatedattackers,withcontributorlevelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauseraccessesaninjectedpage.0737 CVE-TheUltimateMember-UserProfile,Registration,Login,MemberDirectory,ContentRestriction&MembershipPluginpluginforWordPressisvulnerabletoStoredCross-SiteScriptingviatheuserdescriptionfieldinallversionsupto,andincluding, 2025-2.11.1duetoinsufficientinputsanitizationandoutputescaping.Thismakesitpossibleforauthenticatedattackers,withsubscriberlevelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauseraccessesan 15064injectedpage.Thevulnerabilityisonlyexploitablewhen"HTMLsupportforuserdescription"isenabledinUltimateMembersettings. CVE-MyBBMyArcadePlugin1.3containsapersistentcross-sitescriptingvulnerabilitythatallowsauthenticateduserstoinjectmaliciousscriptsthrougharcadegamescorecomments.AttackerscanaddcraftedHTMLandJavaScriptpayloadsinthe2018-commentfieldthatexecutewhenotherusersvieworeditthecomment.25249 CVE-TheWPTravelEngine-TourBookingPlugin-TourOperatorSoftwarepluginforWordPressisvulnerabletoStoredCross-SiteScriptingviatheplugin's'wtetriptax'shortcodeinallversionsupto,andincluding,6.7.5duetoinsufficientinput 2026-sanitizationandoutputescapingonusersuppliedattributes.Thismakesitpossibleforauthenticatedattackers,withcontributorlevelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauseraccessesaninjected 2437page. CVE-TheGutenverse-UltimateWordPressFSEBlocksAddons&EcosystempluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathe'imageLoad'parameterinversionsupto,andincluding,3.4.6duetoinsufficientinputsanitizationand2026-outputescaping.Thismakesitpossibleforauthenticatedattackers,withcontributor-levelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauseraccessesaninjectedpage.2924 CVE-TheWPFunnels-EasyFunnelBuilderToOptimizeBuyerJourneysAndGetMoreLeads&SalespluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathe'wpfoptinform'shortcodeinallversionsupto,andincluding,3.7.9dueto 2026-insufficientinputsanitizationandoutputescapingofthe'buttonicon'parameter.Thismakesitpossibleforauthenticatedattackers,withcontributorlevelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauser 0626accessesaninjectedpage. CVE-AraceconditionduringTCPconnectionteardowncancausetcprecv()tooperateonaconnectionthathasalreadybeenreleased.Iftcpconnsearch()returnsNULLwhileprocessingaSYNpacket,aNULLpointerderivedfromstalecontextdatais2026-passedtotcpbacklogisfull()anddereferencedwithoutvalidation,leadingtoacrash.5590 CVE-AnissuethatallowedaSQLinjectionattackvectorrelatedtosavedqueries(introducedinversion4.0.260123.0).ThisisaninstanceofCWE-89:ImproperNeutralizationofSpecialElementsusedinanSQLCommand('SQLInjection'),andhasan2026-estimatedCVSSscoreofCVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H(6.4Medium).Thisissuewasfixedinversion4.0.260123.1oftherunZeroPlatform.5372 CVE-TheElementsKitElementorAddonsandTemplatespluginforWordPressisvulnerabletoStoredCross-SiteScriptingviathe'ekittabtitle'parameterintheSimpleTabwidgetinallversionsupto,andincluding,3.7.9duetoinsufficientinput 2026-sanitizationandoutputescapingonusersuppliedattributes.Thismakesitpossibleforauthenticatedattackers,withcontributor-levelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauseraccessesaninjected 2600page. CVE-TheXproAddons--140+WidgetsforElementorpluginforWordPressisvulnerabletoStoredCross-SiteScriptingviatheIconBoxwidgetinversionsupto,andincluding,1.4.24duetoinsufficientinputsanitizationandoutputescaping.Thismakesit2026-possibleforauthenticatedattackers,withcontributor-levelaccessandabove,toinjectarbitrarywebscriptsinpagesthatwillexecutewheneverauseraccessesaninjectedpage.2949 CVE-EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkparameterto/cgi-bin/zonefw.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewtheaffected2026-page.34809 CVE-XenForobefore2.3.10andbefore2.2.19isvulnerabletostoredcross-sitescripting(XSS)instructuredtextmentions,primarilyaffectinglegacyprofilepostcontent.Anattackercaninjectmaliciousscriptsthroughcraftedmentionsthatarestoredand2026-executedwhenotherusersviewthecontent.35057 CVE-EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viathemimetypesparameterto/cgi-bin/proxypolicy.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewthe2026-affectedpage.34812 CVE-EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkparameterto/cgi-bin/xtaccess.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewtheaffected2026-page.34811 CVE-EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkparameterto/cgi-bin/vpnfw.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewtheaffected2026-page.34810 CVE-EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkparameterto/cgi-bin/outgoingfw.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewthe2026-affectedpage.34808 CVE-EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkparameterto/cgi-bin/incoming.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewtheaffected2026-page.34807 CVE-EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkparameterto/cgi-bin/snat.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewtheaffected 2026-page. 34806 CVE-EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkparameterto/cgi-bin/dnat.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewtheaffected2026-page.34805 CVE-EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viathedscpparameterto/manage/qos/rules/.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewtheaffected page.34804 CVE-EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viathenameparameterto/manage/qos/classes/.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewtheaffected page.
34803 CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkuserhamspamparameterto/cgi-bin/salearn.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusers viewtheaffectedpage.34802 CVE- AvulnerabilitywasidentifiedinMEPISRM,anindustrialsoftwareproductdevelopedbyMetronik.TheapplicationcontainedahardcodedcryptographickeywithintheMx.Web.ComponentModel.dllcomponent.Whentheoptiontostoredomain 2026- passwordswasenabled,thiskeywasusedtoencryptuserpasswordsbeforestoringthemintheapplication'sdatabase.Anattackerwithsufficientprivilegestoaccessthedatabasecouldextracttheencryptedpasswords,decryptthemusingthe 25601 embeddedkey,andgainunauthorizedaccesstotheassociatedICS/OTenvironment. CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheNAMEparameterto/cgi-bin/uplinkeditor.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewthe2026- affectedpage.34800 TheKingAddonsforElementorpluginforWordPressisvulnerabletomultipleContributor+DOM-BasedStoredCross-SiteScriptingvulnerabilitiesinallversionsupto,andincluding,51.1.38.Thisisduetoinsufficientinputsanitizationandoutput CVE- escapingacrossmultiplewidgetsandfeatures.Thepluginusesescattr()andescurl()withinJavaScriptinlineeventhandlers(onclickattributes),whichallowsHTMLentitiestobedecodedbytheDOM,enablingattackerstobreakoutoftheJavaScript 2025- context.Additionally,severalJavaScriptfilesuseunsafeDOMmanipulationmethods(templateliterals,.html(),andwindow.location.hrefwithunvalidatedURLs)withuser-controlleddata.Thismakesitpossibleforauthenticatedattackers,with 13535 Contributor-levelaccessandabove,toinjectarbitrarywebscriptsviaElementorwidgetsettingsthatexecutewhenauseraccessestheinjectedpageorwhenanadministratorpreviewsthepageinElementor'seditor.Thevulnerabilitywaspartially patchedinversion5.1.51. CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkparameterto/manage/dnsmasq/hosts/.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewthe2026- affectedpage.34799 CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkparameterto/cgi-bin/routing.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewtheaffected2026- page.34798 CVE- 2026- Shynetbefore0.14.0allowsHostheaderinjectioninthepasswordresetflow. 35507 CVE- TheWebmentionpluginforWordPressisvulnerabletoServer-SideRequestForgeryinallversionsupto,andincluding,5.6.2viathe'Tools::read'function.Thismakesitpossibleforauthenticatedattackers,withSubscriber-levelaccessandabove,to2026- makewebrequeststoarbitrarylocationsoriginatingfromthewebapplicationandcanbeusedtoqueryandmodifyinformationfrominternalservices.0688 CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheuserparameterto/cgi-bin/proxyuser.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewtheaffected2026- page.34813 CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkparameterto/manage/dhcp/fixedleases/.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewthe2026- affectedpage.34801 CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkparameterto/manage/ipsec/.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewtheaffected2026- page.34820 CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkparameterto/manage/password/web/.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewthe2026- affectedpage.34823 CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viathenewcertnameparameterto/manage/ca/certificate/.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersview2026- theaffectedpage.34822 CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkparameterto/manage/vpnauthentication/user/.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersview2026- theaffectedpage.34821 CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheREMARKparameterto/cgi-bin/openvpnclient.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewthe2026- affectedpage.34819 CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheremarkparameterto/manage/dnsmasq/localdomains/.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersview2026- theaffectedpage.34818 CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheADDRESSBCCparameterto/cgi-bin/smtprouting.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersview2026- theaffectedpage.34817 CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viathedomainparameterto/manage/smtpscan/domainrouting/.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusers2026- viewtheaffectedpage.34816
CVE- 2026- XenForobefore2.3.9isvulnerabletostoredcross-sitescripting(XSS)relatedtoBBcoderendering.AnattackercaninjectmaliciousscriptsthroughBBcodethatarestoredandexecutedwhenotherusersviewthecontent. 35054 CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viatheDOMAINparameterto/cgi-bin/smtpdomains.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewthe2026- affectedpage.34815 CVE- EndianFirewallversion3.3.25andpriorallowstoredcross-sitescripting(XSS)viathegroupparameterto/cgi-bin/proxygroup.cgi.AnauthenticatedattackercaninjectarbitraryJavaScriptthatisstoredandexecutedwhenotherusersviewthe affectedpage.34814
CVE- AsecurityflawhasbeendiscoveredinAutohomeCorpfrostmourneupto1.0.AffectedisthefunctionhttpTestofthefile/api/monitor-api/alarm/previewDataofthecomponentAlarmPreview.Themanipulationresultsinsqlinjection.Theattackcanbe launchedremotely.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks.
CVE- AsecurityvulnerabilityhasbeendetectedinTextpatternupto4.9.1.AffectedbythisvulnerabilityisthefunctionmtuploadImageofthefilerpc/TXPRPCServer.phpofthecomponentXML-RPCHandler.Themanipulationoftheargumentfile.name leadstopathtraversal.Remoteexploitationoftheattackispossible.Theexploithasbeendisclosedpubliclyandmaybeused.Thevendorconfirmedtheissueandwillprovideafixintheupcomingrelease.5344 CVE- Asecurityvulnerabilityhasbeendetectedinbadlogicpi-monoupto0.58.4.ThisvulnerabilityaffectsthefunctiondiscoverAndLoadExtensionsofthefilepackages/coding-agent/src/core/extensions/loader.ts.Themanipulationleadstocodeinjection.2026- Remoteexploitationoftheattackispossible.Theexploithasbeendisclosedpubliclyandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5556 CVE- AvulnerabilitywasdeterminedinCampcodesCompletePOSManagementandInventorySystemupto4.0.6.Thisaffectsanunknownfunctionofthefileapp/Http/Controllers/SettingsController.phpofthecomponentEnvironmentVariableHandler.2026- Executingamanipulationcanleadtoinjection.Itispossibletolaunchtheattackremotely.Theexploithasbeenpubliclydisclosedandmaybeutilized.5561 CVE- Aflawhasbeenfoundinitsourcecodesanitizeorvalidatethisinput1.0.Thisimpactsanunknownfunctionofthefile/borrowedequip.phpofthecomponentParameterHandler.Thismanipulationoftheargumentempidcausessqlinjection.The2026- attackispossibletobecarriedoutremotely.Theexploithasbeenpublishedandmaybeused.5681 CVE- AvulnerabilitywasfoundinPHPGurukulOnlineShoppingPortalProject2.1.Theimpactedelementisanunknownfunctionofthefile/payment-method.phpofthecomponentParameterHandler.Performingamanipulationoftheargumentpaymethod2026- resultsinsqlinjection.Itispossibletoinitiatetheattackremotely.Theexploithasbeenmadepublicandcouldbeused.5560 CVE- AvulnerabilitywasfoundinCodeAstroOnlineClassroom1.0.Thisvulnerabilityaffectsunknowncodeofthefile/OnlineClassroom/addassessment.phpofthecomponentParameterHandler.Performingamanipulationoftheargumentdeleteidresults2026- insqlinjection.Theattackispossibletobecarriedoutremotely.Theexploithasbeenmadepublicandcouldbeused.5578 CVE- AvulnerabilitywasdeterminedinCodeAstroOnlineClassroom1.0.Thisissueaffectssomeunknownprocessingofthefile/OnlineClassroom/updatedetailsfromfaculty.php?myfid=108ofthecomponentParameterHandler.Executingamanipulationof2026- theargumentfnamecanleadtosqlinjection.Theattackmaybeperformedfromremote.Theexploithasbeenpubliclydisclosedandmaybeutilized.5579 CVE- AvulnerabilityhasbeenfoundinAntaresMugishoPyBlade0.1.8-alpha/0.1.9-alpha.Theaffectedelementisthefunctionissafeastofthefilesandbox.pyofthecomponentASTValidation.Suchmanipulationleadstoimproperneutralizationofspecial2026- elementsusedinatemplateengine.Theattackmaybeperformedfromremote.Theexploithasbeendisclosedtothepublicandmaybeused.Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet.5559 CVE- AflawhasbeenfoundinPHPGurukulPHPGurukulOnlineShoppingPortalProjectupto2.1.Impactedisanunknownfunctionofthefile/pending-orders.phpofthecomponentParameterHandler.ThismanipulationoftheargumentIDcausessql2026- injection.Theattackispossibletobecarriedoutremotely.Theexploithasbeenpublishedandmaybeused.5558 CVE- AvulnerabilitywasidentifiedinCodeAstroOnlineClassroom1.0.Impactedisanunknownfunctionofthefile/OnlineClassroom/addvideos.phpofthecomponentParameterHandler.Themanipulationoftheargumentvideotitleleadstosqlinjection.It2026- ispossibletoinitiatetheattackremotely.Theexploitispubliclyavailableandmightbeused.5580 CVE- Avulnerabilitywasdetectedinbadlogicpi-monoupto0.58.4.Thisissueaffectssomeunknownprocessingofthefilepackages/mom/src/slack.tsofthecomponentpi-momSlackBot.Themanipulationresultsinauthenticationbypassusingalternate2026- channel.Theattackcanbeexecutedremotely.Theexploitisnowpublicandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5557 CVE- AvulnerabilitywasfoundinPHPGurukulOnlineShoppingPortalProject2.1.Theimpactedelementisanunknownfunctionofthefile/admin/update-image1.phpofthecomponentParameterHandler.Themanipulationoftheargumentfilenameresults2026- insqlinjection.Theattackmaybeperformedfromremote.Theexploithasbeenmadepublicandcouldbeused.5641 CVE- AvulnerabilitywasidentifiedinitsourcecodeOnlineCellphoneSystem1.0.Affectedbythisvulnerabilityisanunknownfunctionalityofthefile/cp/available.phpofthecomponentParameterHandler.SuchmanipulationoftheargumentNameleadsto2026- sqlinjection.Theattackcanbelaunchedremotely.Theexploitispubliclyavailableandmightbeused.5553 CVE- AweaknesshasbeenidentifiedinPHPGurukulOnlineShoppingPortalProject2.1.Thisissueaffectssomeunknownprocessingofthefile/sub-category.phpofthecomponentParameterHandler.Thismanipulationoftheargumentpidcausessql2026- injection.Remoteexploitationoftheattackispossible.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks.5552 CVE- AvulnerabilityhasbeenfoundinTendaAC1016.03.10.10multiTDE01.AffectedisthefunctionformAddMacfilterRuleofthefile/bin/httpd.Suchmanipulationleadstooscommandinjection.Itispossibletolaunchtheattackremotely.Multiple2026- endpointsmightbeaffected.5547 CVE- Avulnerabilitywasdeterminedinzhongyu09openchatbiupto0.2.1.TheimpactedelementisanunknownfunctionofthecomponentMulti-stageText2SQLWorkflow.Executingamanipulationoftheargumentkeywordscanleadtosqlinjection.The2026- attackmaybelaunchedremotely.Theexploithasbeenpubliclydisclosedandmaybeutilized.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5586 CVE- AflawhasbeenfoundinCampcodesCompleteOnlineLearningManagementSystem1.0.Thisimpactsthefunctionaddlessonofthefile/application/models/Crudmodel.php.Thismanipulationcausesunrestrictedupload.Itispossibletoinitiatethe2026- attackremotely.Theexploithasbeenpublishedandmaybeused.5546 CVE- AvulnerabilitywasidentifiedinPHPGurukulUserRegistration&LoginandUserManagementSystem3.3.Theaffectedelementisanunknownfunctionofthefile/admin/yesterday-reg-users.php.ThemanipulationoftheargumentIDleadstosql2026- injection.Remoteexploitationoftheattackispossible.Theexploitispubliclyavailableandmightbeused.5543
CVE- AflawhasbeenfoundinitsourcecodeConstructionManagementSystem1.0.Thisaffectsanunknownfunctionofthefile/borrowedtool.php.Executingamanipulationoftheargumentcodecanleadtosqlinjection.Itispossibletolaunchtheattack2026- remotely.Theexploithasbeenpublishedandmaybeused.5719 CVE- AvulnerabilitywasdetectedinQingdaoUOnlineJudgeupto1.6.1.AffectedbythisissueisthefunctionserviceurlofthefileJudgeServer.serviceurlofthecomponentjudgeserverheartbeatEndpoint.Themanipulationresultsinserver-siderequest2026- forgery.Itispossibletolaunchtheattackremotely.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway. CVE- AsecurityvulnerabilityhasbeendetectedinhalexCourseSELupto1.1.0.AffectedbythisvulnerabilityisthefunctioncheckselofthefileApps/Index/Controller/IndexController.class.phpofthecomponentHTTPGETParameterHandler.The manipulationoftheargumentseidleadstosqlinjection.Itispossibletoinitiatetheattackremotely.Theexploithasbeendisclosedpubliclyandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.
CVE- AsecurityflawhasbeendiscoveredinNothingsstbupto1.22.Thisaffectsthefunctionstartdecoderofthefilestbvorbis.c.Themanipulationresultsinout-of-boundswrite.Theattackmaybeperformedfromremote.Theexploithasbeenreleased tothepublicandmaybeusedforattacks.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.
CVE- AvulnerabilitywasfoundinScrapeGraphAIscrapegraph-aiupto1.74.0.Theaffectedelementisthefunctioncreatesandboxandexecuteofthefilescrapegraphai/nodes/generatecodenode.pyofthecomponentGenerateCodeNodeComponent. Themanipulationresultsinoscommandinjection.Theattackmaybelaunchedremotely.Theexploithasbeenmadepublicandcouldbeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5532 CVE- AflawhasbeenfoundinOllamaupto18.1.Thisissueaffectssomeunknownprocessingofthefileserver/download.goofthecomponentModelPullAPI.Executingamanipulationcanleadtoserver-siderequestforgery.Theattackcanbelaunched2026- remotely.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5530 CVE- AsecurityvulnerabilityhasbeendetectedinPHPGurukulOnlineShoppingPortalProject2.1.Thisaffectsanunknownpartofthefile/my-profile.phpofthecomponentParameterHandler.Themanipulationoftheargumentfullnameleadstosql2026- injection.Itispossibletoinitiatetheattackremotely.Theexploithasbeendisclosedpubliclyandmaybeused.5583 AsecurityvulnerabilityhasbeendetectedinTrendnetTEW-657BRM1.00.1.ThisimpactsthefunctionEditofthefile/setup.cgi.Suchmanipulationoftheargumentpcdblistleadstooscommandinjection.Theattackmaybelaunchedremotely.TheCVE- exploithasbeendisclosedpubliclyandmaybeused.Thevendorconfirms,that"[t]heproductinquestion(...)hasbeendiscontinuedandendoflifesinceJune23,2011,thatismorethan14yearsago.Wenolongerprovidesupportforthisproduct,2026- sowearenotabletoconfirmthevulnerabilities.Wewillmakeanannouncementonourwebsite'sproductsupportpageandnotifycustomerswhoregisteredtheirproductswithus."Thisvulnerabilityonlyaffectsproductsthatarenolongersupported5352 bythemaintainer. CVE- AvulnerabilitywasidentifiedinwbbeyourselfMAC-SQLupto31a9df5e0d520be4769be57a4b9022e5e34a14f4.Thisaffectsthefunctionexecutesqlofthefilecore/agents.pyofthecomponentRefinerAgent.Themanipulationleadstosqlinjection. 2026- Remoteexploitationoftheattackispossible.Theexploitispubliclyavailableandmightbeused.Thisproductfollowsarollingreleaseapproachforcontinuousdelivery,soversiondetailsforaffectedorupdatedreleasesarenotprovided.Thevendor 5587 wascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway. CVE- 2025- IBMAsperaShares1.9.9through1.11.0doesnotinvalidatesessionafterapasswordresetwhichcouldallowanauthenticatedusertoimpersonateanotheruseronthesystem. 66483 CVE- AflawhasbeenfoundinPHPGurukulOnlineShoppingPortalProject2.1.Impactedisanunknownfunctionofthefile/admin/update-image3.phpofthecomponentParameterHandler.Executingamanipulationoftheargumentfilenamecanleadtosql2026- injection.Theattackcanbeexecutedremotely.Theexploithasbeenpublishedandmaybeused.5639 CVE- AweaknesshasbeenidentifiedinPHPGurukulOnlineShoppingPortalProject2.1.Thisaffectsanunknownpartofthefile/cancelorder.phpofthecomponentParameterHandler.Thismanipulationoftheargumentoidcausessqlinjection.Theattack2026- maybeinitiatedremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks.5636 CVE- AsecurityflawhasbeendiscoveredinPHPGurukulOnlineShoppingPortalProject2.1.Affectedbythisissueissomeunknownfunctionalityofthefile/categorywise-products.phpofthecomponentParameterHandler.Themanipulationofthe2026- argumentcidresultsinsqlinjection.Theattackcanbelaunchedremotely.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks.5635 CVE- Avulnerabilityhasbeenfoundincode-projectsOnlineApplicationSystemforAdmission1.0.Thisissueaffectssomeunknownprocessingofthefile/enrollment/admsnform.phpofthecomponentEndpoint.Suchmanipulationleadstosqlinjection.The2026- attackcanbeexecutedremotely.Theexploithasbeendisclosedtothepublicandmaybeused.5649 CVE- Avulnerabilitywasfoundinpytriesdatrieupto0.8.3.TheaffectedelementisthefunctionTrie.load/Trie.read/Trie.setstateofthefilesrc/datrie.pyxofthecomponenttrieFileHandler.Themanipulationresultsindeserialization.Theattackcanbe2026- launchedremotely.Theexploithasbeenmadepublicandcouldbeused.Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet.5659 CVE- AvulnerabilitywasfoundinNASAcFSupto7.0.0.ThisaffectsthefunctionCFEMSGGetSizeofthefileapps/tolab/fsw/src/tolabpassthruencode.cofthecomponentCCSDSPacketHeaderHandler.Performingamanipulationresultsinheap-based2026- bufferoverflow.Theattackermusthaveaccesstothelocalnetworktoexecutetheattack.Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet.5474 CVE- AvulnerabilitywasdeterminedinitsourcecodeConstructionManagementSystem1.0.Theimpactedelementisanunknownfunctionofthefile/borrowedequip.phpofthecomponentParameterHandler.Thismanipulationoftheargumentemp2026- causessqlinjection.Theattackmaybeinitiatedremotely.Theexploithasbeenpubliclydisclosedandmaybeutilized.5660 CVE- AvulnerabilitywasidentifiedinhcengineeringHulyPlatform0.7.382.Thisaffectsanunknownpartofthefileserver/front/src/index.tsofthecomponentImportEndpoint.Suchmanipulationleadstoserver-siderequestforgery.Theattackcanbe2026- launchedremotely.Theexploitispubliclyavailableandmightbeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5623 CVE- AvulnerabilityhasbeenfoundinitsourcecodeConstructionManagementSystem1.0.Affectedisanunknownfunctionofthefile/borrowedequipreport.phpofthecomponentParameterHandler.ThemanipulationoftheargumentHomeleadstosql2026- injection.Itispossibletoinitiatetheattackremotely.Theexploithasbeendisclosedtothepublicandmaybeused.5620 CVE- AvulnerabilitywasfoundinCyber-IIIStudent-Management-Systemupto1a938fa61e9f735078e9b291d2e6215b4942af3f.Thisissueaffectsthefunctionmoveuploadedfileofthefile/AssignmentSection/submission/upload.php.Performinga 2026- manipulationoftheargumentFileresultsinunrestrictedupload.Theattackcanbeinitiatedremotely.Theexploithasbeenmadepublicandcouldbeused.Continiousdeliverywithrollingreleasesisusedbythisproduct.Therefore,noversiondetails 5670 ofaffectednorupdatedreleasesareavailable.Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet. CVE- Anout-of-boundsaccessissuewasaddressedwithimprovedboundschecking.ThisissueisfixediniOS18.6andiPadOS18.6,iPadOS17.7.9,macOSSequoia15.6,macOSSonoma14.7.7,macOSVentura13.7.7,tvOS18.6,visionOS2.6,watchOS2025- 11.6.Processingamaliciouslycraftedmediafilemayleadtounexpectedappterminationorcorruptprocessmemory.43210 CVE- Asecurityvulnerabilityhasbeendetectedinimprvhubmcp-browser-agentupto0.8.0.ThisimpactsthefunctionCallToolRequestSchemaofthefilesrc/handlers.tsofthecomponentURLParameterHandler.Themanipulationoftheargument 2026- request.params.name/request.params.argumentsleadstoserver-siderequestforgery.Theattackispossibletobecarriedoutremotely.Theexploithasbeendisclosedpubliclyandmaybeused.Thevendorwascontactedearlyaboutthisdisclosure 5607 butdidnotrespondinanyway. CVE- AweaknesshasbeenidentifiedinpremAI-iopremsqlupto0.2.1.Affectedisthefunctionevalofthefilepremsql/agents/baseline/workers/followup.py.Thismanipulationoftheargumentresultcausescodeinjection.Theattackispossibletobecarried2026- outremotely.Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5594 CVE- AsecurityflawhasbeendiscoveredinPHPGurukulOnlineShoppingPortalProject2.1.Theaffectedelementisanunknownfunctionofthefile/order-details.phpofthecomponentParameterHandler.Themanipulationoftheargumentorderidresults2026- insqlinjection.Itispossibletolaunchtheattackremotely. AvulnerabilityhasbeenfoundinTrendnetTEW-657BRM1.00.1.Affectedbythisissueisthefunctionvpndropofthefile/setup.cgi.Themanipulationoftheargumentpolicynameleadstooscommandinjection.TheattackispossibletobecarriedCVE- outremotely.Theexploithasbeendisclosedtothepublicandmaybeused.Thevendorconfirms,that"[t]heproductinquestion(...)hasbeendiscontinuedandendoflifesinceJune23,2011,thatismorethan14yearsago.Wenolongerprovide supportforthisproduct,sowearenotabletoconfirmthevulnerabilities.Wewillmakeanannouncementonourwebsite'sproductsupportpageandnotifycustomerswhoregisteredtheirproductswithus."Thisvulnerabilityonlyaffectsproductsthat
arenolongersupportedbythemaintainer. CVE-Aflawhasbeenfoundingriptape-aigriptape0.19.4.Thisaffectsanunknownpartofthefilegriptape\tools\computer\tool.pyofthecomponentComputerTool.Executingamanipulationoftheargumentfilenamecanleadtopathtraversal.Itis possibletolaunchtheattackremotely.Theexploithasbeenpublishedandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway. CVE-Avulnerabilitywasdetectedingriptape-aigriptape0.19.4.Affectedbythisissueissomeunknownfunctionalityofthefilegriptape/tools/sql/tool.pyofthecomponentSqlTool.Performingamanipulationresultsinsqlinjection.Itispossibletoinitiate2026-theattackremotely.Theexploitisnowpublicandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5596 AflawhasbeenfoundinTrendnetTEW-657BRM1.00.1.Affectedbythisvulnerabilityisthefunctionvpnconnectofthefile/setup.cgi.Executingamanipulationoftheargumentpolicynamecanleadtooscommandinjection.TheattackcanbeCVE-executedremotely.Theexploithasbeenpublishedandmaybeused.Thevendorconfirms,that"[t]heproductinquestion(...)hasbeendiscontinuedandendoflifesinceJune23,2011,thatismorethan14yearsago.Wenolongerprovidesupport2026-forthisproduct,sowearenotabletoconfirmthevulnerabilities.Wewillmakeanannouncementonourwebsite'sproductsupportpageandnotifycustomerswhoregisteredtheirproductswithus."Thisvulnerabilityonlyaffectsproductsthatareno5354longersupportedbythemaintainer. AvulnerabilitywasdetectedinTrendnetTEW-657BRM1.00.1.Affectedisthefunctionpingtestofthefile/setup.cgi.Performingamanipulationoftheargumentc4IPAddrresultsinoscommandinjection.Remoteexploitationoftheattackispossible.CVE-Theexploitisnowpublicandmaybeused.Thevendorconfirms,that"[t]heproductinquestion(...)hasbeendiscontinuedandendoflifesinceJune23,2011,thatismorethan14yearsago.Wenolongerprovidesupportforthisproduct,soweare2026-notabletoconfirmthevulnerabilities.Wewillmakeanannouncementonourwebsite'sproductsupportpageandnotifycustomerswhoregisteredtheirproductswithus."Thisvulnerabilityonlyaffectsproductsthatarenolongersupportedbythe5353maintainer. CVE-AvulnerabilitywasfoundinitsourcecodeConstructionManagementSystem1.0.Thisaffectsanunknownpartofthefile/borrowedtool.phpofthecomponentParameterHandler.Themanipulationoftheargumentempresultsinsqlinjection.Itis2026-possibletolaunchtheattackremotely.Theexploithasbeenmadepublicandcouldbeused.5675 CVE-AvulnerabilityhasbeenfoundinPHPGurukulOnlineShoppingPortalProject2.1.Theaffectedelementisanunknownfunctionofthefile/admin/update-image2.phpofthecomponentParameterHandler.Themanipulationoftheargumentfilename2026-leadstosqlinjection.Theattackispossibletobecarriedoutremotely.Theexploithasbeendisclosedtothepublicandmaybeused.5640 Aweaknesshasbeenidentifiedinshsuishangmodulithshopupto829bac71f507e84684c782b9b062b8bf3b5585d6.TheimpactedelementisthefunctionlistItemofthefileCVE-src/main/java/com/suisung/shopsuite/pt/service/impl/ProductIndexServiceImpl.javaofthecomponentProductItemDaoInterface.Executingamanipulationoftheargumentsidx/sortcanleadtosqlinjection.Theattackmaybeperformedfromremote.2026-Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks.Thisproductutilizesarollingreleasesystemforcontinuousdelivery,andassuch,versioninformationforaffectedorupdatedreleasesisnotdisclosed.Thispatchis5328called42bcb9463425d1be906c3b290cf29885eb5a2324.Apatchshouldbeappliedtoremediatethisissue. CVE-Asecurityflawhasbeendiscoveredinefforthyefast-filesystem-mcpupto3.5.1.TheaffectedelementisthefunctionhandleGetDiskUsageofthefilesrc/index.ts.Performingamanipulationresultsincommandinjection.Theattackispossibletobe2026-carriedoutremotely.Theexploithasbeenreleasedtothepublicandmaybeusedforattacks.Theprojectwasinformedoftheproblemearlythroughanissuereportbuthasnotrespondedyet.5327 CVE-Asecurityvulnerabilityhasbeendetectedingriptape-aigriptape0.19.4.Affectedbythisvulnerabilityisthefunctionloadfilesfromdisk/listfilesfromdisk/savecontenttofile/savememoryartifactstodiskofthecomponentFileManagerTool.2026-Suchmanipulationleadstopathtraversal.Theattackmaybeperformedfromremote.Theexploithasbeendisclosedpubliclyandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5595 CVE-AsecurityvulnerabilityhasbeendetectedinMoussaabBadlacode-screenshot-mcpupto0.1.0.ThisaffectsanunknownpartofthecomponentHTTPInterface.Suchmanipulationleadstooscommandinjection.Itispossibletolaunchtheattack2026-remotely.Theexploithasbeendisclosedpubliclyandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5528 AweaknesshasbeenidentifiedinTrendnetTEW-657BRM1.00.1.Thisaffectsthefunctionaddwpsclientofthefile/setup.cgi.Thismanipulationoftheargumentwlenroleepincausesoscommandinjection.Theattackmaybeinitiatedremotely.CVE-Theexploithasbeenmadeavailabletothepublicandcouldbeusedforattacks.Thevendorconfirms,that"[t]heproductinquestion(...)hasbeendiscontinuedandendoflifesinceJune23,2011,thatismorethan14yearsago.Wenolonger2026-providesupportforthisproduct,sowearenotabletoconfirmthevulnerabilities.Wewillmakeanannouncementonourwebsite'sproductsupportpageandnotifycustomerswhoregisteredtheirproductswithus."Thisvulnerabilityonlyaffects5351productsthatarenolongersupportedbythemaintainer. CVE-HimmelblauisaninteroperabilitysuiteforMicrosoftAzureEntraIDandIntune.Fromversions2.0.0-alphatobefore2.3.9and3.0.0-alphatobefore3.1.1,thereisaconditionallocalprivilegeescalationvulnerabilityinanedge-casenamingcollision. 2026-OnlyauthenticatedhimmelblauuserswhosemappedCN/shortnameexactlymatchesaprivilegedlocalgroupname(e.g.,"sudo","wheel","docker","adm")cancausetheNSSmoduletoresolvethatgroupnametotheirfakeprimarygroup.Ifthe 34397systemusesNSSresultsforgroup-basedauthorizationdecisions(sudo,polkit,etc.),thiscangranttheattackertheprivilegesofthatgroup.Thisissuehasbeenpatchedinversions2.3.9and3.1.1. CVE-Avulnerabilityhasbeenfoundingougucms4.08.18.Thisaffectsthefunctionregsubmitofthefilegougucms-master\app\home\controller\Login.phpofthecomponentUserRegistrationHandler.Suchmanipulationoftheargumentlevelleadsto2026-dynamically-determinedobjectattributes.Theattackmaybeperformedfromremote.Theexploithasbeendisclosedtothepublicandmaybeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway.5248 CVE-AvulnerabilitywasdeterminedinAutohomeCorpfrostmourneupto1.0.Theaffectedelementisanunknownfunctionofthefilefrostmourne-monitor/src/main/java/com/autohome/frostmourne/monitor/controller/AlarmController.javaofthecomponent2026-AlarmPreview.Executingamanipulationcanleadtoserver-siderequestforgery.Theattackmaybeperformedfromremote.Theexploithasbeenpubliclydisclosedandmaybeutilized.5259 CVE- 2026-UseafterfreeinCSSinGoogleChromepriorto146.0.7680.178allowedaremoteattackertoexecutearbitrarycodeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) 5273 CVE-AflawhasbeenfoundinProjectsAndProgramsSchoolManagementSystemupto6b6fae5426044f89c08d0dd101c7fa71f9042a59.Theaffectedelementisanunknownfunctionofthefile/adminpanel/settings.phpofthecomponentProfilePicture 2026-Handler.ThismanipulationoftheargumentFilecausesunrestrictedupload.Remoteexploitationoftheattackispossible.Theexploithasbeenpublishedandmaybeused.Thisproductfollowsarollingreleaseapproachforcontinuousdelivery,so 5472versiondetailsforaffectedorupdatedreleasesarenotprovided. CVE-LibreChatisaChatGPTclonewithadditionalfeatures.Priorto0.8.4,LibreChattruststhenamefieldreturnedbytheexecutecodesandboxwhenpersistingcode-generatedartifacts.Ondeploymentsusingthedefaultlocalfilestrategy,amalicious 2026-artifactfilenamecontainingtraversalsequences(forexample,../../../../../app/client/dist/poc.txt)isconcatenatedintotheserver-sidedestinationpathandwrittenwithfs.writeFileSync()withoutsanitization.Thisgivesanyuserwhocantrigger 34371executecodeanarbitraryfilewriteprimitiveastheLibreChatserveruser.Thisvulnerabilityisfixedin0.8.4. AsecurityvulnerabilityhasbeendetectedinmixelpixxGoogle-Research-MCP1e062d7bd887bfe5f6e582b6cc288bb897b35cf2/ca613b736ab787bc926932f59cddc69457185a83.ThisissueaffectsthefunctionextractContentofthefileCVE-src/services/content-extractor.service.tsofthecomponentModelContextProtocolHandler.ThemanipulationoftheargumentURLleadstoserver-siderequestforgery.Theattackmaybeinitiatedremotely.Theexploithasbeendisclosedpubliclyand2026-maybeused.Thisproductusesarollingreleasemodeltodelivercontinuousupdates.Asaresult,specificversioninformationforaffectedorupdatedreleasesisnotavailable.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespond5470inanyway. CVE-XenForobefore2.2.17and2.3.1allowsopenredirectviaaspeciallycraftedURL.ThegetDynamicRedirect()functiondoesnotadequatelyvalidatetheredirecttarget,allowingattackerstoredirectuserstoarbitraryexternalsitesusingcraftedURLs2024-containingnewlines,usercredentials,orhostmismatches.58342 CVE-Avulnerabilitywasidentifiedinz-9527admin1.0/2.0.Thisimpactsanunknownfunctionofthefile/server/routes/user.jsofthecomponentUserUpdateEndpoint.SuchmanipulationoftheargumentisAdminwiththeinput1leadstodynamically- determinedobjectattributes.Itispossibletolaunchtheattackremotely.Theexploitispubliclyavailableandmightbeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway. CVE-AvulnerabilitywasdetectedinHarvardUniversityIQSSDataverseupto6.8.Thisaffectsanunknownfunctionofthefile/ThemeAndWidgets.xhtmlofthecomponentThemeCustomization.PerformingamanipulationoftheargumentuploadLogo resultsinunrestrictedupload.Remoteexploitationoftheattackispossible.Theexploitisnowpublicandmaybeused.Upgradingtoversion6.10mitigatesthisissue.Youshouldupgradetheaffectedcomponent.Thevendorwascontactedearly,
1879 respondedinaveryprofessionalmannerandquicklyreleasedafixedversionoftheaffectedproduct. CVE- Watchr1.1.0.0containsadenialofservicevulnerabilitythatallowslocalattackerstocrashtheapplicationbysubmittinganexcessivelylongstringtothesearchfunctionality.Attackerscanpasteabufferof8145charactersintothesearchbarand triggerasearchoperationtocausetheapplicationtocrash.25240 CVE- OneSearch1.1.0.0containsadenialofservicevulnerabilitythatallowslocalattackerstocrashtheapplicationbysubmittingexcessivelylonginputstringstothesearchfunctionality.Attackerscanpasteabufferof950ormorecharactersintothe2018- searchbartotriggeranunhandledexceptionthatcrashestheapplication.25242 CVE- FastTube1.0.1.0containsadenialofservicevulnerabilitythatallowslocalattackerstocrashtheapplicationbysubmittinganexcessivelylongstringtothesearchfunctionality.Attackerscanpasteabufferof1900charactersintothesearchbarand2018- triggeracrashwhenthesearchoperationisexecuted.25243 CVE- SpotAuditor3.6.7containsalocalbufferoverflowvulnerabilityintheBase64PasswordDecodercomponentthatallowsattackerstocrashtheapplication.AttackerscansupplyanoversizedBase64stringthroughthedecoderinterfacetotriggera2019- denialofservicecondition.25666 CVE- EcoSearch1.0.2.0containsadenialofservicevulnerabilitythatallowslocalattackerstocrashtheapplicationbysubmittinganexcessivelylongstringtothesearchfunctionality.Attackerscanpasteabufferof950ormorecharactersintothesearch2018- barandtriggeracrashbyinitiatingasearchoperation.25244 CVE- 2025- Anintegeroverflowwasaddressedwithimprovedinputvalidation.ThisissueisfixedinmacOSSequoia15.6,macOSSonoma14.7.7,macOSVentura13.7.7.Anappmaybeabletocauseunexpectedsystemtermination. 43238 CVE- VSCO1.1.1.0containsadenialofservicevulnerabilitythatallowslocalattackerstocrashtheapplicationbysubmittinganexcessivelylongstringthroughthesearchfunctionality.Attackerscanpasteabufferof5000charactersintothesearchbar2018- andnavigatebacktotriggeranapplicationcrash.25238 CVE- TaskInfo8.2.0.280containsalocalbufferoverflowvulnerabilitythatallowsattackerstocrashtheapplicationbysupplyingoversizedinputtoregistrationfields.AttackerscanpasteexcessivelylongstringsintotheNewUserNameorNewSerial2019- NumbertextboxesintheHelpmenu'sregistrationdialogtotriggeradenialofservicecondition.25667 CVE- FTPVoyager16.2.0containsadenialofservicevulnerabilitythatallowslocalattackerstocrashtheapplicationbyinjectingoversizedbufferdataintothesiteprofileIPfield.Attackerscancreateamalicioussiteprofilecontaining500bytesof2018- repeatedcharactersandpasteitintotheIPfieldtotriggerabufferoverflowthatcrashestheFTPVoyagerprocess.25252 CVE- Termite3.4containsabufferoverflowvulnerabilityintheUserinterfacelanguagesettingsfieldthatallowslocalattackerstocauseadenialofservicebysupplyinganexcessivelylongstring.Attackerscanpastea2000-bytepayloadintotheSettings2018- Userinterfacelanguagefieldtocrashtheapplication.25253 CVE- FileZilla3.40.0containsadenialofservicevulnerabilityinthelocalsearchfunctionalitythatallowslocalattackerstocrashtheapplicationbysupplyingamalformedpathstring.Attackerscantriggerthecrashbyenteringacraftedpathcontaining2019- 384'A'charactersfollowedby'BBBB'and'CCCC'sequencesinthesearchdirectoryfieldandinitiatingalocalsearchoperation.25683 CVE- InonHeaderDecodedofLocalImageResolver.java,thereisapossiblepersistentdenialofserviceduetoresourceexhaustion.Thiscouldleadtolocaldenialofservicewithnoadditionalexecutionprivilegesneeded.Userinteractionisnotneededfor2026- exploitation.0049 CVE- SmartVPN1.1.3.0containsadenialofservicevulnerabilitythatallowslocalattackerstocrashtheapplicationbysubmittingoversizedinputthroughthesearchinterface.Attackerscanpasteabufferof2100charactersintothetoprightsearchbarto2018- triggeranunhandledexceptionthatcrashestheapplication.25239 CVE- 2026- Indexout-of-rangewhenencounteringabranchpagewithzeroelementsingo.etcd.io/bbolt 33817 CVE- RiverPastRingtoneConverter2.7.6.1601containsalocalbufferoverflowvulnerabilitythatallowsattackerstocrashtheapplicationbysupplyingoversizedinputtoactivationfields.Attackerscanpaste300bytesofdataintotheEmailtextboxand2019- ActivationcodetextareaviatheHelpmenu'sActivatedialogtotriggeradenialofservicecondition.25665 CVE- ASPRunnerProfessional6.0.766containsalocalbufferoverflowvulnerabilitythatallowsattackerstocauseadenialofservicebysupplyinganexcessivelylongprojectname.Attackerscanpaste180ormorecharactersintotheProjectnamefield2019- duringprojectcreationtotriggeranapplicationcrash.25659 CVE- Aardvark-dnsisanauthoritativednsserverforA/AAAAcontainerrecords.From1.16.0to1.17.0,atruncatedTCPDNSqueryfollowedbyaconnectionresetcausesaardvark-dnstoenteranunrecoverableinfiniteerrorloopat100%CPU.This2026- vulnerabilityisfixedin1.17.1.35406 CVE- 2025- IBMConcert1.0.0through2.2.0createstemporaryfileswithpredictablenames,whichallowslocaluserstooverwritearbitraryfilesviaasymlinkattack. 13044 CVE- Adoublefreevulnerabilityexistsinlibrz/bin/format/le/le.cinthefunctionleloadfixuprecord().WhenprocessingmalformedorcircularLEfixupchains,relocationentriesmaybefreedmultipletimesduringerrorhandling.AspeciallycraftedLE2026- binarycantriggerheapcorruptionandcausetheapplicationtocrash,resultinginadenial-of-servicecondition.Anattackerwithacraftedbinarycouldcauseadenialofservicewhenthetoolisintegratedonaservicepipeline.31053 CVE- WinRAR5.61containsadenialofservicevulnerabilitythatallowslocalattackerstocrashtheapplicationbyplacingamalformedwinrar.lnglanguagefileintheinstallationdirectory.Attackerscantriggerthecrashbyopeninganarchiveandpressing2019- thetestbutton,causinganaccessviolationatmemoryaddress004F1DB8whentheapplicationattemptstoreadinvaliddata.25677 CVE- XenForobefore2.3.7allowsinformationdisclosurevialocalaccountpagecachingonsharedsystems.Onsystemswheremultipleusersshareabrowserormachine,cachedaccountpagescouldexposesensitiveuserinformationtootherlocalusers. 71280 CVE- NetSchedScan1.0containsabufferoverflowvulnerabilityinthescanHostname/IPfieldthatallowslocalattackerstocrashtheapplicationbysupplyinganoversizedinputstring.Attackerscanpasteacraftedpayloadcontaining388bytesofdata followedby4bytesofEIPoverwriteintotheHostname/IPfieldtotriggeradenialofservicecondition.
20050 CVE- LanHelper1.74containsalocalbufferoverflowvulnerabilitythatallowsattackerstocrashtheapplicationbysendingexcessivelylonginputstrings.AttackerscanexploittheFormSendMessagefeaturebypasting6000bytesofdataintothe Messagetextfieldtotriggeradenialofservicecondition.25660 CVE- TheapplicationdoesnotdetectorguardagainstcyclicPDFobjectreferenceswhilehandlingJavaScriptinPDF.Whenpagesandannotationsarecraftedthatreferenceeachotherinaloop,passingthedocumenttoAPIs(e.g.,SOAP)thatperformdeep2026- traversalcancauseuncontrolledrecursion,stackexhaustion,andapplicationcrashes.3778 CVE- RemoteProcessExplorer1.0.0.16containsalocalbufferoverflowvulnerabilitythatallowsattackerstocauseadenialofservicebysendingacraftedpayloadtotheAddComputerdialog.Attackerscanpasteamaliciousstringintothecomputername2019- textboxandtriggeracrashbyconnectingtotheaddedcomputer,overwritingtheSEHchainandcorruptingexceptionhandlers.25661 CVE- go-ipld-primeisanimplementationoftheInterPlanetaryLinkedData(IPLD)specinterfaces,abatteries-includedcodecimplementationsofIPLDforCBORandJSON,andtoolingforbasicoperationsonIPLDobjects.Priorto0.22.0,theDAG-CBOR 2026- decoderusescollectionsizesdeclaredinCBORheadersasGopreallocationhintsformapsandlists.Thedecoderdoesnotcapthesesizehintsoraccountfortheircostinitsallocationbudget,allowingsmallpayloadstocauseexcessivememory 35480 allocation.Thisvulnerabilityisfixedin0.22.0. SymCryptisthecorecryptographicfunctionlibrarycurrentlyusedbyWindows.From103.5.0tobefore103.11.0,TheSymCryptXmssSignfunctionpassesa64-bitleafcountvaluetoahelperfunctionthatacceptsa32-bitparameter.ForXMSS^MT parametersetswithtotaltreeheight>=32(whichincludesstandardpredefinedparameters),thiscausessilenttruncationtozero,resultinginadrasticallyundersizedscratchbufferallocationfollowedbyaheapbufferoverflowduringsignatureCVE- computation.ExploitingthisissuewouldrequireanapplicationusingSymCrypttoperformanXMSS^MTsignatureusinganattacker-controlledparameterset.Itisuncommonforapplicationstoallowtheuseofattacker-controlledparametersetsfor2026- signing,sincesigningisaprivatekeyoperation,andprivatekeysmustbetrustedbydefinition.Additionally,XMSS(^MT)signingshouldonlybeperformedinaHardwareSecurityModule(HSM).XMSS(^MT)signingisprovidedinSymCryptonlyfor35199 testingpurposes.ThisisageneralruleirrespectiveofthisCVE;XMSS(^MT)andotherstatefulsignatureschemesareonlycryptographicallysecurewhenitisguaranteedthatthesamestatecannotbereusedfortwodifferentsignatures,which cannotbeguaranteedbysoftwarealone.Forthisreason,XMSS(^MT)signingisalsonotFIPSapprovedwhenperformedoutsideofanHSM.Fixedinversion103.11.0. CVE- AReflectedCross-SiteScripting(XSS)vulnerabilityexistsinSourceCodesterZooManagementSystemv1.0.Thevulnerabilityislocatedintheloginpage,specificallywithinthemsgparameter.Theapplicationreflectsthecontentofthemsg2026- parameterbacktotheuserwithoutproperHTMLencodingorsanitization.ThisallowsremoteattackerstoinjectarbitrarywebscriptorHTMLviaacraftedURL.30526 CVE- Multiplereflectedcross-sitescripting(XSS)vulnerabilitiesinthelogin.phpendpointofInterzenConsultingS.r.lZenShareSuitev17.0allowsattackerstoexecutearbitraryJavascriptinthecontextoftheuser'sbrowserviaacraftedURLinjectedinto2026- thecodiceaziendaandredurlparameters.30252 CVE- Areflectedcross-sitescripting(XSS)vulnerabilityintheloginnewpwd.phpendpointofInterzenConsultingS.r.lZenShareSuitev17.0allowsattackerstoexecutearbitraryJavascriptinthecontextoftheuser'sbrowserviaacraftedURLinjectedinto2026- thecodiceaziendaparameter.30251 CVE- AvulnerabilityinCiscoNexusDashboardandCiscoNexusDashboardInsightscouldallowanunauthenticated,remoteattackertoconductaserver-siderequestforgery(SSRF)attackthroughanaffecteddevice. 2026- inputvalidationforspecificHTTPrequests.Anattackercouldexploitthisvulnerabilitybypersuadinganauthenticateduserofthedevicemanagementinterfacetoclickacraftedlink.Asuccessfulexploitcouldallowtheattackertosendarbitrary 20041 networkrequeststhataresourcedfromtheaffecteddevicetoanattacker-controlledserver.Theattackercouldthenexecutearbitraryscriptcodeinthecontextoftheaffectedinterfaceoraccesssensitivebrowser-basedinformation. CVE- 2026- AnissuewasdiscoveredinRoundcubeWebmailbefore1.5.14and1.6.14.XSSexistsbecauseofinsufficientHTMLattachmentsanitizationinpreviewmode.Avictimmustpreviewatext/htmlattachment. 35539 CVE- 2026- XSSvulnerabilityincveInterface.jsallowsforinjectHTMLtobepassedtodisplay,ascveInterfacetrustsinputfromCVEAPIservices 35466 CVE- 2026- Emlogisanopensourcewebsitebuildingsystem.Priortoversion2.6.8,thereisastoredcross-sitescripting(XSS)vulnerabilityinemlogcommentmoduleviaURIschemevalidationbypass.Thisissuehasbeenpatchedinversion2.6.8. 34229 CVE- phpMyFAQisanopensourceFAQwebapplication.Priortoversion4.1.1,anunauthenticatedattackercansubmitaguestFAQwithanemailaddressthatissyntacticallyvalidperRFC5321(quotedlocalpart)yetcontainsrawHTML--forexample" 2026- "@evil.com.PHP'sFILTERVALIDATEEMAILacceptsthisemailasvalid.TheemailisstoredinthedatabasewithoutHTMLsanitizationandlaterrenderedintheadminFAQeditortemplateusingTwig's|rawfilter,which 32629 bypassesauto-escapingentirely.Thisissuehasbeenpatchedinversion4.1.1. CVE- 2026- phpMyFAQisanopensourceFAQwebapplication.Priortoversion4.1.1,thereisastoredXSSvulnerabilityviaRegexBypassinFilter::removeAttributes().Thisissuehasbeenpatchedinversion4.1.1. 34729 CVE- 2025- AnopenredirectinAscertiaSigningHubUserv10.0allowsattackerstoredirectuserstoamalicioussiteviaacraftedURL. 61166 CVE- Areflectedcross-sitescripting(XSS)vulnerabilityinthedashboardsearchfunctionalityoftheVertiGISFMsolutionallowsattackerstocraftamaliciousURL,thatifvisitedbyanauthenticatedvictim,willexecutearbitraryJavaScriptinthevictim's2026- context.SuchaURLcouldbedeliveredthroughvariousmeans,forinstance,bysendingalinkorbytrickingvictimstovisitapagecraftedbytheattacker.3877 CVE- Directusisareal-timeAPIandAppdashboardformanagingSQLdatabasecontent.Priorto11.16.1,anopenredirectvulnerabilityexistsintheloginredirectionlogic.TheisLoginRedirectAllowedfunctionfailstocorrectlyidentifycertainmalformed2026- URLsasexternal,allowingattackerstobypassredirectallow-listvalidationandredirectuserstoarbitraryexternaldomainsuponsuccessfulauthentication.Thisvulnerabilityisfixedin11.16.1.35410
CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.1,thereisStoredXSSingroupremovecontrolandfamilyeditorstate/country.Thisisprimarilyanadmin-to-adminstoredXSSpathwhenwritableentityfieldsareabused.This2026- vulnerabilityisfixedin7.1.1.39335 CVE- ChurchCRMisanopen-sourcechurchmanagementsystem.Priorto7.1.0,astoredcross-sitescriptingissueaffectstheDirectoryReportsformfieldssetfromconfig,Personeditordefaultsrenderedintoaddressfields,andexternalself-registration2026- formdefaults.Thisisprimarilyanadmin-to-adminstoredXSSpathwherewritableconfigurationfieldsareabused.Thisvulnerabilityisfixedin7.1.0.39336 CVE- FrappeLearningManagementSystem(LMS)isalearningsystemthathelpsusersstructuretheircontent.Fromversion2.27.0tobeforeversion2.48.0,FrappeLMSwasvulnerabletostoredXSS.Thisissuehasbeenpatchedinversion2.48.0. 34606 CVE- WorkbenchisasuiteoftoolsforadministratorsanddeveloperstointeractwithSalesforce.comorganizationsviatheForce.comAPIs.Priorto65.0.0,Workbenchcontainsareflectedcross-sitescriptingvulnerabilityviathefooterScriptsparameter, whichdoesnotsanitizeuser-suppliedinputbeforerenderingitinthepageresponse.Improperneutralizationofinputduringwebpagegeneration('cross-sitescripting')vulnerabilityinWorkbenchallowsXSSTargetingErrorPages.Thisvulnerabilityis 34951 fixedin65.0.0.
CVE- Zulipisanopen-sourceteamcollaborationtool.Fromversion1.4.0tobeforeversion11.6,./manage.pyimportreadsarbitraryfilesfromtheserverfilesystemviapathtraversalinuploads/records.json.Acraftedexporttarballcausestheserverto copyanyfilethezulipusercanreadintotheuploadsdirectoryduringimport.Thisissuehasbeenpatchedinversion11.6.26058 CVE- XenForobefore2.3.9andbefore2.2.18isvulnerabletocross-sitescripting(XSS)relatedtolightboxusageinposts.Anattackercaninjectmaliciousscriptsthatexecutewhenusersinteractwithpostcontentdisplayedinthelightbox. 35055 CVE- Pi-holeAdminInterfaceisawebinterfaceformanagingPi-hole,anetwork-leveladandinternettrackerblockingapplication.From6.0tobefore6.5,areflectedDOM-basedXSSvulnerabilityintaillog.jsallowsanunauthenticatedattackertoinject 2026- arbitraryHTMLintothePi-holeadmininterfacebycraftingamaliciousURL.ThefilequeryparameterisinterpolatedintoaninnerHTMLassignmentwithoutescaping.BecausetheContent-Security-Policyismissingtheform-actiondirective,injected 33403
Related changes
Get daily alerts for CSA Alerts & Advisories (Singapore)
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CSA.
The plain-English summary, classification, and "what to do next" steps are AI-generated from the original text. Cite the source document, not the AI analysis.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CSA Alerts & Advisories (Singapore) publishes new changes.