24h | 7d | 30d

Overview

  • curl
  • curl

11 Mar 2026
Published
11 Mar 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.

Statistics

  • 1 Post
  • 96 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture fallback

CVE-2026-3784 beat a new #curl record. This flaw existed in curl source code for 24.97 years before it was discovered.

Illustrated in the slightly hard-to-read graph below. The average age of a curl vulnerability when reported is eight years.

curl.se/docs/CVE-2026-3784.html

  • 37
  • 59
  • 0
  • 3h ago

Overview

  • n8n-io
  • n8n

19 Dec 2025
Published
12 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
78.98%

Description

n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.

Statistics

  • 5 Posts

Last activity: 3 hours ago

Bluesky

Profile picture fallback
CISA、既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Mar 11) CVE-2025-68613 n8n 動的に管理されるコードリソースの不適切な制御の脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
~Cisa~ CISA added CVE-2025-68613, an actively exploited n8n code execution flaw, to its KEV catalog. - IOCs: CVE-2025-68613 - #CVE202568613 #ThreatIntel #n8n
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
CISA added a critical n8n vulnerability (CVE-2025-68613) with a 9.9 CVSS score to its Known Exploited Vulnerabilities catalog due to active exploitation, enabling remote code execution through expression injection in authenticated users.
  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback
🚨 La #CISA signale une faille critique n8n (CVE-2025-68613, score 9.9) exploitée activement, exposant 24 700 instances à une exécution de code à distance. Correctif déjà disponible. #CyberSecurity #Automatisation
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
CVE-2025-68613 n8n Improper Control of Dynamically-Managed Code Resources Vulnerability
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • sveltejs
  • devalue

11 Mar 2026
Published
11 Mar 2026
Updated

CVSS v4.0
MEDIUM (6.3)
EPSS
Pending

KEV

Description

Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. In devalue v5.6.3 and earlier, devalue.parse and devalue.unflatten were susceptible to prototype pollution via maliciously crafted payloads. Successful exploitation could lead to Denial of Service (DoS) or type confusion. This vulnerability is fixed in 5.6.4.

Statistics

  • 2 Posts
  • 16 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

Okay, so it turns out that this is really, really slow.

Which led to CVE-2026-30226: github.com/sveltejs/devalue/se

  • 0
  • 0
  • 0
  • 15h ago

Bluesky

Profile picture fallback
Okay, so it turns this is really, really slow. Which led to CVE-2026-30226: github.com/sveltejs/dev... Thanks to @ell.iott.dev and the rest of the @svelte.dev team for a well-handled vuln process, a pleasure as always 🫡
  • 0
  • 16
  • 0
  • 15h ago

Overview

  • Apple
  • iOS and iPadOS

12 Mar 2026
Published
12 Mar 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

The issue was addressed with improved memory handling. This issue is fixed in iOS 17.2 and iPadOS 17.2, macOS Sonoma 14.2, Safari 17.2, iOS 16.7.15 and iPadOS 16.7.15, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to memory corruption.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: Last hour

Bluesky

Profile picture fallback
Apple backported security fixes for CVE-2023-43010 and three additional Coruna exploit vulnerabilities to older iOS, iPadOS, and macOS Sonoma versions to protect devices unable to update to the latest software.
  • 0
  • 1
  • 0
  • Last hour
Profile picture fallback
Apple publie des correctifs pour une faille WebKit (CVE-2023-43010) ciblant iOS, iPadOS et macOS Sonoma via l’exploit Coruna. Mise à jour urgente pour anciens appareils ! 🔐 #Apple #CyberSecurity #calimeg
  • 0
  • 0
  • 0
  • Last hour

Overview

  • charmbracelet
  • soft-serve

07 Mar 2026
Published
09 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.04%

KEV

Description

Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.4, an authenticated SSH user can force the server to make HTTP requests to internal/private IP addresses by running repo import with a crafted --lfs-endpoint URL. The initial batch request is blind (the response from a metadata endpoint won't parse as valid LFS JSON), but an attacker hosting a fake LFS server can chain this into full read access to internal services by returning download URLs that point at internal targets. This issue has been patched in version 0.11.4.

Statistics

  • 2 Posts

Last activity: 5 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-30832 - Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.4, an authenticated SSH user can force the se... https://www.cyberhub.blog/cves/CVE-2026-30832
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
CVE-2026-30832 - Soft Serve: SSRF via unvalidated LFS endpoint in repo import scq.ms/4lgv50v
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Palo Alto Networks
  • Cortex XDR Agent

11 Mar 2026
Published
11 Mar 2026
Updated

CVSS v4.0
MEDIUM (4.0)
EPSS
Pending

KEV

Description

A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on macOS allows a local administrator to disable the agent. This issue could be leveraged by malware to perform malicious activity without detection.

Statistics

  • 2 Posts

Last activity: 16 hours ago

Bluesky

Profile picture fallback
Paloaltoの脆弱性情報 「CVE-2026-0230 Cortex XDR Agent: Local Administrator can disable the agent on macOS (Severity: MEDIUM)」が公開されました。 → https://security.paloaltonetworks.com/CVE-2026-0230
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Microsoft
  • Microsoft SQL Server 2016 Service Pack 3 (GDR)

10 Mar 2026
Published
11 Mar 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.08%

KEV

Description

Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.

Statistics

  • 2 Posts

Last activity: 9 hours ago

Bluesky

Profile picture fallback
Microsoft SQL Server Zero-Day Exploit: The 88 Critical Privilege Escalation Threat You Must Patch Now + Video Introduction A critical zero-day vulnerability tracked as CVE-2026-21262 has been disclosed in Microsoft SQL Server, carrying a CVSS score of 8.8 and allowing authenticated attackers to…
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
Microsoft 2026年3月の定例パッチで-公開済みゼロデイ2件とOffice・Excelの脆弱性が修正(CVE-2026-21262,CVE-2026-26127) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Dayneks Software Industry and Trade Inc.
  • E-Commerce Platform

27 Feb 2026
Published
27 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.01%

KEV

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Dayneks Software Industry and Trade Inc. E-Commerce Platform allows SQL Injection.This issue affects E-Commerce Platform: through 27022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 12 hours ago

Fediverse

Profile picture fallback

The OpenClaw autonomous AI agent has achieved explosive growth, but its rapid rise has triggered a major security crisis. China's MIIT and CNCERT have issued urgent warnings following the discovery of over 40,000 exposed instances of the software online. The highest density of these exposed instances was located in China, followed by the US and Singapore.

Read More: security.land/china-openclaw-a

#SecurityLand #GeoSphere #China #OpenClaw #AI #SecurityVulnerability #CVE

  • 1
  • 2
  • 0
  • 12h ago

Overview

  • Cisco
  • Cisco Catalyst SD-WAN Manager

25 Feb 2026
Published
26 Feb 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
2.60%

Description

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric. 

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 19 hours ago

Bluesky

Profile picture fallback
Check out the analysis by @cryptocat.me for CVE-2026-20127 in Cisco SD WAN. That other PoC posted last week exploits a totally different bug that doesn't match the reported IOCs (some kind of file upload due to path traversal in vManage maybe). We asses with high confidence this is CVE-2026-20127 🔥
  • 1
  • 2
  • 0
  • 19h ago

Overview

  • OpenClaw
  • OpenClaw

05 Mar 2026
Published
09 Mar 2026
Updated

CVSS v4.0
CRITICAL (9.2)
EPSS
0.09%

KEV

Description

OpenClaw versions prior to 2026.2.2 contain an exec approvals (must be enabled) allowlist bypass vulnerability that allows attackers to execute arbitrary commands by injecting command substitution syntax. Attackers can bypass the allowlist protection by embedding unescaped $() or backticks inside double-quoted strings to execute unauthorized commands.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 18 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-28470 - OpenClaw versions prior to 2026.2.2 contain an exec approvals (must be enabled) allowlist bypass vulnerability that allows attackers to execute arbitr... https://www.cyberhub.blog/cves/CVE-2026-28470
  • 1
  • 1
  • 0
  • 18h ago
Showing 1 to 10 of 76 CVEs