Overview
- nolimits4web
- swiper
21 Feb 2026
Published
24 Feb 2026
Updated
CVSS v4.0
CRITICAL (9.4)
EPSS
0.03%
KEV
Description
Swiper is a free and mobile touch slider with hardware accelerated transitions and native behavior. Versions 6.5.1 through 12.1.1 have a Prototype pollution vulnerability. The vulnerability resides in line 94 of shared/utils.mjs, where the indexOf() function is used to check whether user provided input contain forbidden strings. Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute Object.prototype via a crafted input using Array.prototype. The exploit works across Windows and Linux and on Node and Bun runtimes. Any application that processes attacker-controlled input using this package may be affected by the following: Authentication Bypass, Denial of Service and RCE. This issue is fixed in version 12.1.2.
Statistics
- 1 Post
- 1 Interaction
Last activity: 3 hours ago
Overview
Description
A weakness has been identified in Tenda HG9 300001138. Affected by this vulnerability is an unknown functionality of the file /boaform/formgponConf of the component GPON Configuration Endpoint. This manipulation of the argument fmgpon_loid/fmgpon_loid_password causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Statistics
- 1 Post
- 1 Interaction
Last activity: 23 hours ago
Overview
- ZoneMinder
- zoneminder
21 Feb 2026
Published
24 Feb 2026
Updated
CVSS v3.1
HIGH (8.8)
EPSS
0.03%
KEV
Description
ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvents() function. Event field values (specifically Name and Cause) are stored safely via parameterized queries but are later retrieved and concatenated directly into SQL WHERE clauses without escaping. An authenticated user with Events edit and view permissions can exploit this to execute arbitrary SQL queries.
Statistics
- 1 Post
Last activity: 8 hours ago
Overview
- openclaw
- openclaw
21 Feb 2026
Published
24 Feb 2026
Updated
CVSS v3.1
HIGH (7.6)
EPSS
0.05%
KEV
Description
OpenClaw is a personal AI assistant. In versions 2026.2.13 and below, when using macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via security add-generic-password -w .... Because OAuth tokens are user-controlled data, this created an OS command injection risk. This issue has been fixed in version 2026.2.14.
Statistics
- 1 Post
Last activity: 18 hours ago
Overview
- fabricjs
- fabric.js
19 Feb 2026
Published
19 Feb 2026
Updated
CVSS v3.1
HIGH (7.6)
EPSS
0.03%
KEV
Description
Fabric.js is a Javascript HTML5 canvas library. Prior to version 7.2.0, Fabric.js applies `escapeXml()` to text content during SVG export (`src/shapes/Text/TextSVGExportMixin.ts:186`) but fails to apply it to other user-controlled string values that are interpolated into SVG attribute markup. When attacker-controlled JSON is loaded via `loadFromJSON()` and later exported via `toSVG()`, the unescaped values break out of XML attributes and inject arbitrary SVG elements including event handlers. Any application that accepts user-supplied JSON (via `loadFromJSON()`, collaborative sharing, import features, CMS plugins) and renders the `toSVG()` output in a browser context (SVG preview, export download rendered in-page, email template, embed) is vulnerable to stored XSS. An attacker can execute arbitrary JavaScript in the victim's browser session. Version 7.2.0 contains a fix.
Statistics
- 1 Post
Last activity: 12 hours ago
Overview
Description
curl's code for managing SSH connections when SFTP was done using the wolfSSH
powered backend was flawed and missed host verification mechanisms.
This prevents curl from detecting MITM attackers and more.
Statistics
- 1 Post
Last activity: 12 hours ago
Overview
Description
A weakness has been identified in funadmin up to 7.1.0-rc4. This affects the function setConfig of the file app/backend/controller/Ajax.php of the component Configuration Handler. Executing a manipulation can lead to improper authorization. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Statistics
- 1 Post
Last activity: 5 hours ago
Overview
Description
SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior access or another vulnerability) can trigger arbitrary object instantiation and potentially achieve code execution. The use of serialized data in these components has been deprecated and will be removed in SPIP 5. This vulnerability is not mitigated by the SPIP security screen.
Statistics
- 1 Post
Last activity: 2 hours ago
Overview
- InSAT
- MasterSCADA BUK-TS
24 Feb 2026
Published
24 Feb 2026
Updated
CVSS v3.1
CRITICAL (9.8)
EPSS
Pending
KEV
Description
All versions of InSAT MasterSCADA BUK-TS are susceptible to OS command injection through a field in its MMadmServ web interface. Malicious users that use the vulnerable endpoint are potentially able to cause remote code execution.
Statistics
- 1 Post
Last activity: 2 hours ago
Fediverse
🚨 CVE-2026-22553: CRITICAL OS command injection in InSAT MasterSCADA BUK-TS (all versions) via MMadmServ web interface. Unauthenticated RCE risk — no patch yet. Isolate, monitor, and apply WAF mitigations. https://radar.offseq.com/threat/cve-2026-22553-cwe-78-in-insat-masterscada-buk-ts-da2080e7 #OffSeq #ICS #SCADA #Infosec
Overview
- OpenSift
- OpenSift
20 Feb 2026
Published
20 Feb 2026
Updated
CVSS v3.1
HIGH (7.1)
EPSS
0.04%
KEV
Description
OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. In versions 1.1.2-alpha and below, URL ingest allows overly permissive server-side fetch behavior and can be coerced into requesting unsafe targets. Potential access/probing of private/local network resources from the OpenSift host process when ingesting attacker-controlled URLs. This issue has been fixed in version 1.1.3-alpha. To workaround when using trusted local-only exceptions, use OPENSIFT_ALLOW_PRIVATE_URLS=true with caution.
Statistics
- 1 Post
Last activity: 16 hours ago