24h | 7d | 30d

Overview

  • GitHub
  • Enterprise Server

10 Mar 2026
Published
29 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.30%

KEV

Description

An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7 and 3.19.4.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 5 hours ago

Bluesky

Profile picture fallback
Critical GitHub RCE Vulnerability CVE-2026-3854 Allows Arbitrary Commands URL: nvd.nist.gov/vuln/detail/... Classification: Critical, Solution: Official Fix, Exploit Maturity: Proof-of-Concept, CVSSv3.1: 8.8
  • 0
  • 2
  • 0
  • 5h ago

Overview

  • Oracle Corporation
  • Oracle MCP Server Helper Tool product of Oracle Open Source Projects

05 May 2026
Published
05 May 2026
Updated

CVSS v3.1
HIGH (8.7)
EPSS
Pending

KEV

Description

Vulnerability in the Oracle MCP Server Helper Tool product of Oracle Open Source Projects (component: helper tool). The supported versions that is affected is 1.0.1-1.0.156. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle MCP Server Helper Tool. Successful attacks of this vulnerability can result in Oracle MCP Server Helper Tool executing malicious SQL.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 1 hour ago

Bluesky

Profile picture fallback
⚠️ A high-severity flaw in CVE-2026-35228 affects Oracle MCP Server Helper Tool (CVSS 8.7). Unauthenticated attackers can execute malicious SQL via HTTP. 🔗 basefortify.eu/cve_reports/... #CVE #CyberSecurity #Oracle
  • 0
  • 1
  • 0
  • 1h ago

Overview

  • @fastify/accepts-serializer
  • @fastify/accepts-serializer

04 May 2026
Published
04 May 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
Pending

KEV

Description

@fastify/accepts-serializer cached serializer-selection results keyed by the request Accept header without a size limit or eviction policy. A remote unauthenticated client could send many distinct but matching Accept header variants to make the cache grow unbounded, eventually exhausting the Node.js heap and crashing the process. Versions <= 6.0.3 are affected. Update to 6.0.4 or later, which bounds the cache via an LRU with a default size of 100 entries, configurable through the new cacheSize plugin option.

Statistics

  • 2 Posts

Last activity: 16 hours ago

Bluesky

Profile picture fallback
🚨 High-severity security fix in @fastify/accepts-serializer@6.0.4 just released! Patches CVE-2026-7768 — vulnerable to Denial of Service via Unbounded Accept Header Cache Growth github.com/fastify/fast...
  • 0
  • 0
  • 1
  • 16h ago

Overview

  • Splunk
  • Splunk Enterprise

15 Apr 2026
Published
16 Apr 2026
Updated

CVSS v3.1
MEDIUM (6.6)
EPSS
0.05%

KEV

Description

In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.10, and 9.3.11, and Splunk Cloud Platform versions below 10.4.2603.0, 10.3.2512.6, 10.2.2510.10, 10.1.2507.20, 10.0.2503.13, and 9.3.2411.127, a user who holds a role that contains the high-privilege capability `edit_user`could create a specially crafted username that includes a null byte or a non-UTF-8 percent-encoded byte due to improper input validation.<br><br>This could lead to inconsistent conversion of usernames into a proper format for storage and account management inconsistencies, such as being unable to edit or delete affected users.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture fallback
CVE-2026-20202 Exploit Exposed: How Bug Bounty Hunters Are Leveraging This Zero-Day – Full Technical Deep Dive + Video Introduction: A newly disclosed zero-day vulnerability, CVE-2026-20202, has emerged as a critical remote code execution (RCE) flaw affecting popular web application frameworks.…
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Shenzhen Yipu Commercial and Trading Co., Ltd
  • WDR201A WiFi Extender

04 May 2026
Published
04 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the makeRequest.cgi binary that allows unauthenticated remote attackers to execute arbitrary shell commands by injecting malicious input into the set_time or StartSniffer functions. Attackers can craft a POST request with specially crafted ampersand-delimited parameters to bypass input sanitization and execute commands with a maximum length of 31 bytes through the date command or channel parameter processing.

Statistics

  • 1 Post

Last activity: 1 hour ago

Fediverse

Profile picture fallback

🚨 CVE-2026-41924 (CRITICAL): OS command injection in WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) enables unauthenticated remote shell command execution. No patch yet — immediate isolation & monitoring advised. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 1h ago

Overview

  • 0xJacky
  • nginx-ui

04 May 2026
Published
04 May 2026
Updated

CVSS v4.0
CRITICAL (9.0)
EPSS
Pending

KEV

Description

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.8, nginx-ui exposes a backup restore endpoint (POST /api/restore) that is completely unauthenticated during the first 10 minutes after process startup on any fresh installation. An unauthenticated remote attacker can upload a crafted backup archive that overwrites the application's configuration file (app.ini) and SQLite database. Because the attacker controls the restored app.ini, they can inject an arbitrary OS command into the TestConfigCmd setting. After the application automatically restarts to apply the restored config, a single follow-up request triggers that command as the user running nginx-ui — typically root in Docker deployments. This issue has been patched in version 2.3.8.

Statistics

  • 1 Post

Last activity: 11 hours ago

Fediverse

Profile picture fallback

🔥 CRITICAL: CVE-2026-42238 in 0xJacky nginx-ui (<2.3.8) lets remote attackers gain root by exploiting an unauthenticated backup restore endpoint in the first 10 min. Patch to 2.3.8 now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Microsoft
  • Microsoft 365 Copilot

19 Mar 2026
Published
14 Apr 2026
Updated

CVSS v3.1
MEDIUM (5.3)
EPSS
0.04%

KEV

Description

Improper neutralization of special elements used in a command ('command injection') in M365 Copilot allows an unauthorized attacker to disclose information over a network.

Statistics

  • 1 Post

Last activity: 20 hours ago

Fediverse

Profile picture fallback

Copirate 365 at DEF CON: Plundering in the Depths of Microsoft Copilot (CVE-2026-24299) embracethered.com/blog/posts/2

  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Totolink
  • A8000RU

05 May 2026
Published
05 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function setAppFilterCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument enable results in os command injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.

Statistics

  • 1 Post

Last activity: 5 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL: OS command injection (CVE-2026-7823) in Totolink A8000RU v7.1cu.643_b20200521. Remote attackers can execute OS cmds — no auth needed. No patch yet; restrict access & monitor updates. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Shenzhen Yipu Commercial and Trading Co., Ltd
  • WDR201A WiFi Extender

04 May 2026
Published
04 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the firewall.cgi binary across five request handlers that apply insufficient input validation. Attackers can inject arbitrary shell commands through vulnerable parameters like websURLFilter, websHostFilter, portForward, singlePortForward, and ipportFilter using subshell syntax or unfiltered parameters, with payloads persisting in NVRAM and re-executing on every subsequent firewall.cgi request.

Statistics

  • 1 Post

Last activity: 10 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-41926 (CRITICAL, CVSS 9.3): OS command injection in Shenzhen Yipu WDR201A WiFi Extender allows unauthenticated remote code execution via firewall.cgi. Persistent payloads survive reboots. Restrict access, monitor for fixes. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 10h ago

Overview

  • MoreConvert
  • MoreConvert Pro

05 May 2026
Published
05 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
Pending

KEV

Description

The MoreConvert Pro plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.9.14. This is due to the guest waitlist verification flow not invalidating or regenerating verification tokens when the customer email address is changed. This makes it possible for unauthenticated attackers to authenticate as existing users, including administrators, by obtaining a valid guest verification token for an attacker-controlled email, changing the same guest customer email to the target account email through the public waitlist flow, and then using the original verification link.

Statistics

  • 1 Post

Last activity: 8 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-5722 | CRITICAL auth bypass in MoreConvert Pro (≤1.9.14, WordPress). Attackers can use flawed guest waitlist token logic to hijack accounts — even admin! Disable plugin or restrict access until patch. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 8h ago
Showing 11 to 20 of 37 CVEs