24h | 7d | 30d

Overview

  • PHPOffice
  • PhpSpreadsheet

05 May 2026
Published
05 May 2026
Updated

CVSS v4.0
CRITICAL (9.2)
EPSS
0.10%

KEV

Description

PhpSpreadsheet is a library for reading and writing spreadsheet files. In versions 1.30.2 and earlier, 2.0.0 through 2.1.14, 2.2.0 through 2.4.3, 3.3.0 through 3.10.3, and 4.0.0 through 5.5.0, when the filename argument to IOFactory::load() is user-controlled, an attacker can supply a PHP stream wrapper path (such as phar://, ftp://, or ssh2.sftp://) that passes the is_file() check in File::assertFile(). The phar:// wrapper triggers deserialization of the PHAR metadata, which can lead to remote code execution if a suitable gadget chain is available in the application. The ftp:// and ssh2.sftp:// wrappers can be used for server-side request forgery. This issue has been fixed in versions 1.30.3, 2.1.15, 2.4.4, 3.10.4, and 5.6.0.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 23 hours ago

Fediverse

Profile picture fallback

🚨 PHPOffice PhpSpreadsheet CRITICAL vuln (CVE-2026-34084): RCE & SSRF possible via user input to IOFactory::load() (phar://, ftp://, ssh2.sftp://). Affected: v1.x – 5.5.0. Upgrade to a fixed version now! radar.offseq.com/threat/cve-20

  • 0
  • 1
  • 0
  • 23h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post

Last activity: 5 hours ago

Bluesky

Profile picture fallback
📢 GLPI 11.0.7 & 10.0.25 : 13 vulnérabilités corrigées dont 4 critiques (XSS, suppression arbitraire) 📝 📅 **Source** : IT-Connect, publié … https://cyberveille.ch/posts/2026-05-06-glpi-11-0-7-10-0-25-13-vulnerabilites-corrigees-dont-4-critiques-xss-suppression-arbitraire/ #CVE_2026_40108 #Cyberveille
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • redis
  • redis

05 May 2026
Published
06 May 2026
Updated

CVSS v4.0
HIGH (7.7)
EPSS
0.10%

KEV

Description

Redis is an in-memory data structure store. In versions of redis-server up to 8.6.3, the RESTORE command does not properly validate serialized values. An authenticated attacker with permission to execute RESTORE can supply a crafted serialized payload that triggers invalid memory access and may lead to remote code execution. A workaround is to restrict access to the RESTORE command with ACL rules. This is patched in version 8.6.3.

Statistics

  • 1 Post

Last activity: 11 hours ago

Fediverse

Profile picture fallback

📰 High-Severity Redis Flaw (CVE-2026-25243) Allows for Potential RCE

⚠️ High-Severity Redis Flaw: A heap buffer overflow (CVE-2026-25243) in the RESTORE command could allow for RCE on Redis servers. Affects versions up to 8.6.3. Upgrade now or restrict access via ACLs! #Redis #CyberSecurity #Vulnerability

🔗 cyber.netsecops.io

  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture fallback
magic-wormhole: 0.23.0 -> 0.24.0 (fixes CVE-2026-42448) https://github.com/NixOS/nixpkgs/pull/517222 #security
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • D-Link
  • DI-8100

05 May 2026
Published
06 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.06%

KEV

Description

A security vulnerability has been detected in D-Link DI-8100 16.07.26A1. Affected by this vulnerability is the function url_rule_asp of the file /url_rule.asp of the component POST Parameter Handler. Such manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

Statistics

  • 1 Post

Last activity: 19 hours ago

Fediverse

Profile picture fallback

⚠️ CRITICAL: Buffer overflow in D-Link DI-8100 (16.07.26A1) via /url_rule.asp POST handler. Remote, unauthenticated RCE possible. Public exploit available. No official patch yet. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 19h ago

Overview

  • libssh2

01 May 2026
Published
04 May 2026
Updated

CVSS v4.0
MEDIUM (6.9)
EPSS
0.05%

KEV

Description

A security vulnerability has been detected in libssh2 up to 1.11.1. The impacted element is the function userauth_password of the file src/userauth.c. Such manipulation of the argument username_len/password_len leads to integer overflow. The attack may be launched remotely. The name of the patch is 256d04b60d80bf1190e96b0ad1e91b2174d744b1. A patch should be applied to remediate this issue.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture fallback
libssh2: apply patch for CVE-2026-7598 https://github.com/NixOS/nixpkgs/pull/516098 #security
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • OpenCTI-Platform
  • opencti

05 May 2026
Published
06 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.06%

KEV

Description

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. In versions 6.6.0 through 6.9.12, there is a privilege escalation vulnerability that can be exploited by unauthenticated attackers to query the API as any existing user, including the default admin account. This issue has been fixed in version 6.9.13. As a workaround, the default admin can be disabled using the `APP__ADMIN__EXTERNALLY_MANAGED` configuration.

Statistics

  • 1 Post

Last activity: 20 hours ago

Fediverse

Profile picture fallback

🚩 CRITICAL: OpenCTI-Platform opencti (6.6.0 – 6.9.12) hit by CVE-2026-27960 (improper authentication). Unauthenticated attackers can impersonate any user, even admin. Upgrade to 6.9.13 or disable default admin ASAP. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Acronis
  • Acronis DeviceLock DLP

29 Apr 2026
Published
29 Apr 2026
Updated

CVSS v3.0
HIGH (7.8)
EPSS
0.02%

KEV

Description

Local privilege escalation due to improper input validation. The following products are affected: Acronis DeviceLock DLP (Windows) before build 9.0.93212, Acronis Cyber Protect Cloud Agent (Windows) before build 42183.

Statistics

  • 1 Post

Last activity: 14 hours ago

Bluesky

Profile picture fallback
【脆弱性情報】 CVE-2026-41220 Acronis DeviceLock DLP (Windows), Acronis Cyber Protect Cloud Agent (Windows)の脆弱性について 不適切な入力検証により、ローカルでの権限昇格が発生する脆弱性です。Acronis DeviceLock DLP (Windows) の build 9.0.93212 未満、
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • D-Link
  • DI-8100

05 May 2026
Published
05 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.06%

KEV

Description

A weakness has been identified in D-Link DI-8100 16.07.26A1. Affected is the function sprintf of the file /auto_reboot.asp of the component HTTP Handler. This manipulation of the argument enable/time causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.

Statistics

  • 1 Post

Last activity: 16 hours ago

Fediverse

Profile picture fallback

CVE-2026-7853: CRITICAL buffer overflow in D-Link DI-8100 (16.07.26A1) via /auto_reboot.asp. Remote attackers can execute code or DoS; public exploit available. Restrict access & monitor! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 16h ago

Overview

  • dataease
  • SQLBot

05 May 2026
Published
05 May 2026
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
0.30%

KEV

Description

SQLBot is an intelligent Text-to-SQL system based on large language models and RAG. In versions 1.7.0 and earlier, the Text2SQL chat interface is vulnerable to prompt injection. The user-provided question parameter is directly concatenated into the LLM prompt without filtering or escaping, and the SQL extracted from the LLM response is executed against the database without validation or sanitization. An authenticated attacker can craft a malicious question to manipulate the LLM into generating and executing arbitrary SQL statements. When connected to a PostgreSQL data source, this can lead to remote code execution via COPY FROM PROGRAM. This issue has been fixed in version 1.7.1.

Statistics

  • 1 Post

Last activity: 22 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL: dataease SQLBot <1.7.1 (CVE-2026-33324) is vulnerable to SQL injection via prompt injection. Authenticated users can trigger RCE on PostgreSQL. Upgrade to 1.7.1+ now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 22h ago
Showing 11 to 20 of 39 CVEs