24h | 7d | 30d

Overview

  • curl
  • curl

11 Mar 2026
Published
11 Mar 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.

Statistics

  • 1 Post
  • 121 Interactions

Last activity: 10 hours ago

Fediverse

Profile picture fallback

CVE-2026-3784 beat a new #curl record. This flaw existed in curl source code for 24.97 years before it was discovered.

Illustrated in the slightly hard-to-read graph below. The average age of a curl vulnerability when reported is eight years.

curl.se/docs/CVE-2026-3784.html

  • 43
  • 78
  • 0
  • 10h ago

Overview

  • n8n-io
  • n8n

19 Dec 2025
Published
12 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
78.98%

Description

n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.

Statistics

  • 6 Posts
  • 1 Interaction

Last activity: 4 hours ago

Bluesky

Profile picture fallback
CISA mandates immediate patching of CVE-2025-68613, a critical 9.9-severity remote code execution vulnerability in n8n workflow automation platform affecting over 103,000 users.
  • 0
  • 1
  • 0
  • 4h ago
Profile picture fallback
CISA、既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Mar 11) CVE-2025-68613 n8n 動的に管理されるコードリソースの不適切な制御の脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
~Cisa~ CISA added CVE-2025-68613, an actively exploited n8n code execution flaw, to its KEV catalog. - IOCs: CVE-2025-68613 - #CVE202568613 #ThreatIntel #n8n
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
CISA added a critical n8n vulnerability (CVE-2025-68613) with a 9.9 CVSS score to its Known Exploited Vulnerabilities catalog due to active exploitation, enabling remote code execution through expression injection in authenticated users.
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
🚨 La #CISA signale une faille critique n8n (CVE-2025-68613, score 9.9) exploitée activement, exposant 24 700 instances à une exécution de code à distance. Correctif déjà disponible. #CyberSecurity #Automatisation
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
CVE-2025-68613 n8n Improper Control of Dynamically-Managed Code Resources Vulnerability
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • elemntor
  • Ally – Web Accessibility & Usability

11 Mar 2026
Published
11 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
Pending

KEV

Description

The Ally – Web Accessibility & Usability plugin for WordPress is vulnerable to SQL Injection via the URL path in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user-supplied URL parameter in the `get_global_remediations()` method, where it is directly concatenated into an SQL JOIN clause without proper sanitization for SQL context. While `esc_url_raw()` is applied for URL safety, it does not prevent SQL metacharacters (single quotes, parentheses) from being injected. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database via time-based blind SQL injection techniques. The Remediation module must be active, which requires the plugin to be connected to an Elementor account.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Vulnerability alert.
A high-severity SQL injection flaw (CVE-2026-2413) in the Ally WordPress Plugin from Elementor could expose data from 250K+ sites.
Patch available in v4.1.0.

Source: bleepingcomputer.com/news/secu

Follow @technadu for security updates.

  • 0
  • 1
  • 0
  • 4h ago
Profile picture fallback

Critical SQL Injection Vulnerability Found in Ally WordPress Plugin Threatens 400,000+ Sites

Introduction: Rising Risks in WordPress Accessibility Tools A serious security flaw has been discovered in Ally, a popular WordPress plugin designed to improve website accessibility. The vulnerability, identified as CVE-2026-2413 and carrying a CVSS score of 7.5, could allow attackers to steal sensitive data from thousands of websites. With over 400,000 active installations,…

undercodenews.com/critical-sql

  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
Security alert. A SQL injection vulnerability (CVE-2026-2413) in the Ally WordPress Plugin from Elementor could affect 250K+ WordPress sites. Admins are urged to update to v4.1.0. Follow TechNadu for cybersecurity updates. #CyberSecurity #WordPress
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
A SQL injection flaw (CVE-2026-2413) in the Ally WordPress plugin exposed over 200,000 sites to data extraction via time-based blind SQL attacks. Ally 4.1.0 patch adds sanitization, but 60% remain vulnerable. #WordPress #SQLInjection #USA
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Microsoft
  • Microsoft SQL Server 2016 Service Pack 3 (GDR)

10 Mar 2026
Published
12 Mar 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.08%

KEV

Description

Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.

Statistics

  • 4 Posts

Last activity: 3 hours ago

Bluesky

Profile picture fallback
Microsoft SQL Server Zero-Day Exploit: The 88 Critical Privilege Escalation Threat You Must Patch Now + Video Introduction A critical zero-day vulnerability tracked as CVE-2026-21262 has been disclosed in Microsoft SQL Server, carrying a CVSS score of 8.8 and allowing authenticated attackers to…
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
Microsoft corrige Zero-Day crítico en SQL Server que permite a atacantes tomar el control total como admin | CVE-2026-21262 www.newstecnicas.info.ve/2026/03/micr...
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Microsoft 2026年3月の定例パッチで-公開済みゼロデイ2件とOffice・Excelの脆弱性が修正(CVE-2026-21262,CVE-2026-26127) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • sveltejs
  • devalue

11 Mar 2026
Published
12 Mar 2026
Updated

CVSS v4.0
MEDIUM (6.3)
EPSS
Pending

KEV

Description

Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. In devalue v5.6.3 and earlier, devalue.parse and devalue.unflatten were susceptible to prototype pollution via maliciously crafted payloads. Successful exploitation could lead to Denial of Service (DoS) or type confusion. This vulnerability is fixed in 5.6.4.

Statistics

  • 2 Posts
  • 16 Interactions

Last activity: 21 hours ago

Fediverse

Profile picture fallback

Okay, so it turns out that this is really, really slow.

Which led to CVE-2026-30226: github.com/sveltejs/devalue/se

  • 0
  • 0
  • 0
  • 21h ago

Bluesky

Profile picture fallback
Okay, so it turns this is really, really slow. Which led to CVE-2026-30226: github.com/sveltejs/dev... Thanks to @ell.iott.dev and the rest of the @svelte.dev team for a well-handled vuln process, a pleasure as always 🫡
  • 0
  • 16
  • 0
  • 21h ago

Overview

  • Apple
  • iOS and iPadOS

12 Mar 2026
Published
12 Mar 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

The issue was addressed with improved memory handling. This issue is fixed in iOS 17.2 and iPadOS 17.2, macOS Sonoma 14.2, Safari 17.2, iOS 16.7.15 and iPadOS 16.7.15, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to memory corruption.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 7 hours ago

Bluesky

Profile picture fallback
Apple backported security fixes for CVE-2023-43010 and three additional Coruna exploit vulnerabilities to older iOS, iPadOS, and macOS Sonoma versions to protect devices unable to update to the latest software.
  • 0
  • 1
  • 0
  • 7h ago
Profile picture fallback
Apple publie des correctifs pour une faille WebKit (CVE-2023-43010) ciblant iOS, iPadOS et macOS Sonoma via l’exploit Coruna. Mise à jour urgente pour anciens appareils ! 🔐 #Apple #CyberSecurity #calimeg
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Microsoft
  • .NET 10.0

10 Mar 2026
Published
12 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.04%

KEV

Description

Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.

Statistics

  • 3 Posts

Last activity: 4 hours ago

Bluesky

Profile picture fallback
🚨 New HIGH CVE detected in AWS Lambda 🚨 CVE-2026-26127 impacts Microsoft.NETCore.App.Runtime.linux-x64 in 2 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/449 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback
Microsoft 2026年3月の定例パッチで-公開済みゼロデイ2件とOffice・Excelの脆弱性が修正(CVE-2026-21262,CVE-2026-26127) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • steveukx
  • simple-git

10 Mar 2026
Published
11 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
Pending

KEV

Description

`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code execution on the host machine. Version 3.23.0 contains an updated fix for the vulnerability.

Statistics

  • 2 Posts

Last activity: Last hour

Bluesky

Profile picture fallback
📌 CVE-2026-28292 - `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker... https://www.cyberhub.blog/cves/CVE-2026-28292
  • 0
  • 0
  • 0
  • Last hour

Overview

  • charmbracelet
  • soft-serve

07 Mar 2026
Published
09 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.04%

KEV

Description

Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.4, an authenticated SSH user can force the server to make HTTP requests to internal/private IP addresses by running repo import with a crafted --lfs-endpoint URL. The initial batch request is blind (the response from a metadata endpoint won't parse as valid LFS JSON), but an attacker hosting a fake LFS server can chain this into full read access to internal services by returning download URLs that point at internal targets. This issue has been patched in version 0.11.4.

Statistics

  • 2 Posts

Last activity: 11 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-30832 - Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.4, an authenticated SSH user can force the se... https://www.cyberhub.blog/cves/CVE-2026-30832
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
CVE-2026-30832 - Soft Serve: SSRF via unvalidated LFS endpoint in repo import scq.ms/4lgv50v
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Palo Alto Networks
  • Cortex XDR Agent

11 Mar 2026
Published
11 Mar 2026
Updated

CVSS v4.0
MEDIUM (4.0)
EPSS
Pending

KEV

Description

A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on macOS allows a local administrator to disable the agent. This issue could be leveraged by malware to perform malicious activity without detection.

Statistics

  • 2 Posts

Last activity: 23 hours ago

Bluesky

Profile picture fallback
Paloaltoの脆弱性情報 「CVE-2026-0230 Cortex XDR Agent: Local Administrator can disable the agent on macOS (Severity: MEDIUM)」が公開されました。 → https://security.paloaltonetworks.com/CVE-2026-0230
  • 0
  • 0
  • 0
  • 23h ago
Showing 1 to 10 of 91 CVEs