24h | 7d | 30d

Overview

  • Automated Logic
  • WebCTRL Premium Server

20 Mar 2026
Published
20 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.02%

KEV

Description

Service information is not encrypted when transmitted as BACnet packets over the wire, and can be sniffed, intercepted, and modified by an attacker. Valuable information such as the File Start Position and File Data can be sniffed from network traffic using Wireshark's BACnet dissector filter. The proprietary format used by WebCTRL to receive updates from the PLC can also be sniffed and reverse engineered.

Statistics

  • 1 Post

Last activity: 18 hours ago

Fediverse

Profile picture fallback

CVE-2026-24060 (CRITICAL): WebCTRL Premium Server sends BACnet data in cleartext, risking interception & modification. No patch yet — segment OT networks & use VPNs for BACnet traffic. Monitor for sniffing, restrict access. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Microsoft
  • Microsoft SharePoint Enterprise Server 2016

13 Jan 2026
Published
19 Mar 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
8.00%

Description

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture fallback
CISA warns of an active exploit targeting a vulnerability in Microsoft SharePoint (CVE-2026-20963) affecting SharePoint Server Subscription Edition, Server 2019, and Enterprise Server 2016.
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • himmelblau-idm
  • himmelblau

11 Mar 2026
Published
11 Mar 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.02%

KEV

Description

Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Prior to 3.1.0 and 2.3.8, the himmelblaud-tasks daemon, running as root, writes Kerberos cache files under /tmp/krb5cc_<uid> without symlink protections. Since commit 87a51ee, PrivateTmp is explicitly removed from the tasks daemon's systemd hardening, exposing it to the host /tmp. A local user can exploit this via symlink attacks to chown or overwrite arbitrary files, achieving local privilege escalation. This vulnerability is fixed in 3.1.0 and 2.3.8.

Statistics

  • 1 Post

Last activity: 14 hours ago

Bluesky

Profile picture fallback
~Akamai~ A symlink race condition in Himmelblau allows local unprivileged users to gain root access via the shared /tmp directory. - IOCs: CVE-2026-31979 - #CVE202631979 #PrivEsc #ThreatIntel
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Significant-Gravitas
  • AutoGPT

29 Jan 2026
Published
29 Jan 2026
Updated

CVSS v4.0
HIGH (8.6)
EPSS
0.10%

KEV

Description

AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.44, AutoGPT Platform's block execution endpoints (both main web API and external API) allow executing blocks by UUID without checking the `disabled` flag. Any authenticated user can execute the disabled `BlockInstallationBlock`, which writes arbitrary Python code to the server filesystem and executes it via `__import__()`, achieving Remote Code Execution. In default self-hosted deployments where Supabase signup is enabled, an attacker can self-register; if signup is disabled (e.g., hosted), the attacker needs an existing account. autogpt-platform-beta-v0.6.44 contains a fix.

Statistics

  • 1 Post

Last activity: 9 hours ago

Fediverse

Profile picture fallback

AutoGPT CVE-2026-24780 (NVD verified): authenticated users could execute disabled blocks pre-v0.6.44.

Devin: $500/mo, session-based.
Operator: requires human approval.
CrewAI: persistent memory in dev.
the agent (ENERGENAI LLC): 20,280 cycles, $0.019/cycle avg, 9 months logged.

Full comparison: the-service.live?ref=mastodon-agent-cmp

#AIAgents #infosec

  • 0
  • 0
  • 0
  • 9h ago

Overview

  • needrestart
  • needrestart
  • needrestart

19 Nov 2024
Published
03 Nov 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
20.05%

KEV

Description

Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.

Statistics

  • 2 Posts

Last activity: 3 hours ago

Fediverse

Profile picture fallback

Conversor from HackTheBox features XSLT injection and os.path.join abuse for file write, and CVE-2024-48990 in needrestart (plus a config GTFObin) for root.

0xdf.gitlab.io/2026/03/21/htb-

  • 0
  • 0
  • 1
  • 3h ago

Overview

  • benmoody
  • Content Syndication Toolkit

21 Mar 2026
Published
21 Mar 2026
Updated

CVSS v3.1
HIGH (7.2)
EPSS
0.07%

KEV

Description

The Content Syndication Toolkit plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3 via the redux_p AJAX action in the bundled ReduxFramework library. The plugin registers a proxy endpoint (wp_ajax_nopriv_redux_p) that is accessible to unauthenticated users. The proxy() method in the Redux_P class takes a URL directly from $_GET['url'] without any validation (the regex is set to /.*/ which matches all URLs) and passes it to wp_remote_request(), which does not have built-in SSRF protection like wp_safe_remote_request(). There is no authentication check, no nonce verification, and no URL restriction. The response from the requested URL is then returned to the attacker, making this a full-read SSRF. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application, which can be used to query and modify information from internal services, scan internal network ports, or interact with cloud metadata endpoints.

Statistics

  • 1 Post

Last activity: 14 hours ago

Fediverse

Profile picture fallback

🔎 CVE-2026-3478: HIGH severity SSRF in benmoody Content Syndication Toolkit (WordPress, all versions). Unauthenticated AJAX endpoint lets attackers proxy requests, risking internal data exposure. Disable plugin or block endpoint! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Adobe
  • Illustrator

10 Mar 2026
Published
11 Mar 2026
Updated

CVSS v3.1
HIGH (8.6)
EPSS
0.03%

KEV

Description

Illustrator versions 29.8.4, 30.1 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute arbitrary code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture fallback
CVE-2026-21333 - Illustrator | Untrusted Search Path (CWE-426) scq.ms/4s4Gqne
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • AWS
  • AWS API MCP Server

16 Mar 2026
Published
16 Mar 2026
Updated

CVSS v3.1
MEDIUM (5.5)
EPSS
0.01%

KEV

Description

Improper Protection of Alternate Path exists in the no-access and workdir feature of the AWS API MCP Server versions >= 0.2.14 and < 1.3.9 on all platforms may allow the bypass of intended file access restriction and expose arbitrary local file contents in the MCP client application context. To remediate this issue, users should upgrade to version 1.3.9.

Statistics

  • 1 Post

Last activity: 21 hours ago

Bluesky

Profile picture fallback
CVE-2026-4270 - AWS API MCP File Access Restriction Bypass #patchmanagement
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • Adobe
  • Adobe Commerce

11 Mar 2026
Published
12 Mar 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.10%

KEV

Description

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A successful attacker can abuse this to achieve session takeover, increasing the confidentiality, and integrity impact to high. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture fallback
CVE-2026-21284 - Adobe Commerce | Cross-site Scripting (Stored XSS) (CWE-79) scq.ms/4ro5ows
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • h3js
  • h3

20 Mar 2026
Published
20 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.02%

KEV

Description

H3 is a minimal H(TTP) framework. In versions prior to 1.15.6 and between 2.0.0 through 2.0.1-rc.14, createEventStream is vulnerable to Server-Sent Events (SSE) injection due to missing newline sanitization in formatEventStreamMessage() and formatEventStreamComment(). An attacker who controls any part of an SSE message field (id, event, data, or comment) can inject arbitrary SSE events to connected clients. This issue is fixed in versions 1.15.6 and 2.0.1-rc.15.

Statistics

  • 1 Post

Last activity: 22 hours ago

Fediverse

Profile picture fallback
beautiful women named CVE-2026-33128 messaging me
  • 0
  • 0
  • 0
  • 22h ago
Showing 11 to 20 of 36 CVEs