24h | 7d | 30d

Overview

  • Microsoft
  • Windows 10 Version 1607

14 Apr 2026
Published
30 Apr 2026
Updated

CVSS v3.1
MEDIUM (4.3)
EPSS
7.19%

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 1 Post

Last activity: 13 hours ago

Bluesky

Profile picture fallback
Windows shell spoofing vulnerability puts sensitive data at risk (CVE-2026-32202) #patchmanagement
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • wordpresschef
  • Salon Booking System – Free Version

02 May 2026
Published
02 May 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.10%

KEV

Description

The Salon Booking System – Free Version plugin for WordPress is vulnerable to Arbitrary File Read in versions up to, and including, 10.30.25. This is due to the public booking flow accepting attacker-controlled file-field values and later using those stored values as trusted paths for email attachments. This makes it possible for unauthenticated attackers to read arbitrary local files and exfiltrate them via booking confirmation email attachments.

Statistics

  • 1 Post

Last activity: 16 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-6320 (HIGH): Path traversal in Salon Booking System – Free (WordPress, ≤10.30.25) enables unauthenticated file reads via booking emails. No patch out yet — disable or restrict plugin use to reduce risk. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 16h ago

Overview

  • InternLM
  • lmdeploy

20 Apr 2026
Published
21 Apr 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
2.92%

KEV

Description

LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal networks, and sensitive resources. Version 0.12.3 patches the issue.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture fallback
AI INFRA UNDER FIRE: CVE-2026-33626 SSRF Exploited in the Wild Within 13 Hours—Is Your LLM Inference Engine the Next Target? + Video Introduction The integration of vision-language models into production workflows has introduced a dangerous Server-Side Request Forgery (SSRF) vulnerability in…
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Shenzhen Libituo Technology
  • LBT-T300-HW1

03 May 2026
Published
03 May 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A vulnerability has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. Impacted is the function start_lan of the file /apply.cgi. The manipulation of the argument Channel/ApCliSsid leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 13 hours ago

Fediverse

Profile picture fallback

🚨 HIGH-severity buffer overflow in Shenzhen Libituo LBT-T300-HW1 (v1.2.0 – 1.2.8). CVE-2026-7675 enables remote code execution — no patch yet. Limit network access & monitor for vendor updates. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 13h ago

Overview

  • unitecms
  • Unlimited Elements For Elementor

17 Apr 2026
Published
17 Apr 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.04%

KEV

Description

The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbitrary File Read via the Repeater JSON/CSV URL parameter in versions up to, and including, 2.0.6. This is due to insufficient path traversal sanitization in the URLtoRelative() and urlToPath() functions, combined with the ability to enable debug output in widget settings. The URLtoRelative() function only performs a simple string replacement to remove the site's base URL without sanitizing path traversal sequences (../), and the cleanPath() function only normalizes directory separators without removing traversal components. This allows an attacker to provide a URL like http://site.com/../../../../etc/passwd which, after URLtoRelative() strips the domain, results in /../../../../etc/passwd being concatenated with the base path and ultimately resolved to /etc/passwd. This makes it possible for authenticated attackers with Author-level access and above to read arbitrary local files from the WordPress host, including sensitive files such as wp-config.

Statistics

  • 1 Post

Last activity: 22 hours ago

Fediverse

Profile picture fallback

CVE-2026-4659: Unlimited Elements plugin <=2.0.6 allows any Author to read arbitrary files via path traversal in URLtoRelative(). No patch exists. Fix your own damn code or pull the plugin. #InfoSec #WordPress

valtersit.com/cve/2026/04/cve-

  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 10
  • binutils

22 Apr 2026
Published
23 Apr 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

A flaw was found in binutils. A heap-buffer-overflow vulnerability exists when processing a specially crafted XCOFF (Extended Common Object File Format) object file during linking. A local attacker could trick a user into processing this malicious file, which could lead to arbitrary code execution, allowing the attacker to run unauthorized commands, or cause a denial of service, making the system unavailable.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
Fedora sysadmins: A code execution flaw (CVE-2026-6846) affects the Insight debugger. Read more-> tinyurl.com/yeymucyb #Fedora #Security
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • FreeBSD
  • FreeBSD

26 Mar 2026
Published
02 Apr 2026
Updated

CVSS
Pending
EPSS
0.09%

KEV

Description

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel. In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system.

Statistics

  • 1 Post

Last activity: Last hour

Bluesky

Profile picture fallback
📢 CVE-2026-4747 : CHERI neutralise un stack buffer overflow dans FreeBSD découvert par LLM 📝 📅 **Source et contexte** : Article publié le 28 avril 2026… https://cyberveille.ch/posts/2026-05-03-cve-2026-4747-cheri-neutralise-un-stack-buffer-overflow-dans-freebsd-decouvert-par-llm/ #CHERI #Cyberveille
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Shenzhen Libituo Technology
  • LBT-T300-HW1

03 May 2026
Published
03 May 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A flaw has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. This issue affects the function start_single_service of the component Web Management Interface. Executing a manipulation of the argument vpn_pptp_server/vpn_l2tp_server can lead to buffer overflow. The attack can be executed remotely. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 15 hours ago

Fediverse

Profile picture fallback

🔎 HIGH-severity (CVSS 8.7) buffer overflow in Shenzhen Libituo LBT-T300-HW1 (v1.2.0 – 1.2.8), CVE-2026-7674. Web Management Interface at risk, remote exploit possible. No patch yet — restrict access & stay alert. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 15h ago

Overview

  • ruby
  • erb

24 Apr 2026
Published
25 Apr 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.11%

KEV

Description

ERB is a templating system for Ruby. Ruby 2.7.0 (before ERB 2.2.0 was published on rubygems.org) introduced an `@_init` instance variable guard in `ERB#result` and `ERB#run` to prevent code execution when an ERB object is reconstructed via `Marshal.load` (deserialization). However, three other public methods that also evaluate `@src` via `eval()` were not given the same guard: `ERB#def_method`, `ERB#def_module`, and `ERB#def_class`. An attacker who can trigger `Marshal.load` on untrusted data in a Ruby application that has `erb` loaded can use `ERB#def_module` (zero-arg, default parameters) as a code execution sink, bypassing the `@_init` protection entirely. ERB 4.0.3.1, 4.0.4.1, 6.0.1.1, and 6.0.4 patch the issue.

Statistics

  • 1 Post

Last activity: 2 hours ago

Fediverse

Profile picture fallback

Ruby 4.0.3 shipped with a single change: CVE-2026-41316 in ERB. Code injection via untrusted template input. Most Rails shops are still on 3.4 while the 4.0 series gets bimonthly patches. 3.2 went EOL in March. - ruby-lang.org/en/news/2026/04/

  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Linux
  • Linux

01 May 2026
Published
03 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.01%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption When decrypting data that is not in-place (src != dst), there is no need to save the high-order sequence bits in dst as it could simply be re-copied from the source. However, the data to be hashed need to be rearranged accordingly. Thanks,

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture fallback
Linux kernel LPE & DoS vulnerabilities (CVE-2026-31431 / CVE-2026-43033) affect #Debian 11 Bullseye. Detection commands, full fix script, and temporary mitigations inside. Update to kernel 5.10.251-3. 🛡️ Full guide & script Read more- > tinyurl.com/yfpvfpa8 #Security
  • 0
  • 0
  • 0
  • 23h ago
Showing 11 to 20 of 22 CVEs