24h | 7d | 30d

Overview

  • anthropics
  • claude-code

03 Oct 2025
Published
03 Oct 2025
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.10%

KEV

Description

Claude Code is an agentic coding tool. Versions before 1.0.111 were vulnerable to Code Injection due to a bug in the startup trust dialog implementation. Claude Code could be tricked to execute code contained in a project before the user accepted the startup trust dialog. Exploiting this requires a user to start Claude Code in an untrusted directory. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to the latest version. This issue is fixed in version 1.0.111.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 19 hours ago

Bluesky

Profile picture fallback
Caught in the Hook: RCE and API Token Exfiltration Through Claude Code Project Files | CVE-2025-59536 #machinelearning #ai
  • 0
  • 1
  • 0
  • 19h ago

Overview

  • langflow-ai
  • langflow

26 Feb 2026
Published
28 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.29%

KEV

Description

Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.8.0, the CSV Agent node in Langflow hardcodes `allow_dangerous_code=True`, which automatically exposes LangChain’s Python REPL tool (`python_repl_ast`). As a result, an attacker can execute arbitrary Python and OS commands on the server via prompt injection, leading to full Remote Code Execution (RCE). Version 1.8.0 fixes the issue.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 9 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-27966 - Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.8.0, the CSV Agent node in Langflow hardcodes `allow... https://www.cyberhub.blog/cves/CVE-2026-27966
  • 0
  • 1
  • 0
  • 9h ago

Overview

  • openemr
  • openemr

25 Feb 2026
Published
26 Feb 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.03%

KEV

Description

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the session expiration check in `library/auth.inc.php` runs only when `skip_timeout_reset` is not present in the request. When `skip_timeout_reset=1` is sent, the entire block that calls `SessionTracker::isSessionExpired()` and forces logout on timeout is skipped. As a result, any request that includes this parameter (e.g. from auto-refresh pages like the Patient Flow Board) never runs the expiration check: expired sessions can continue to access data indefinitely, abandoned workstations stay active, and an attacker with a stolen session cookie can keep sending `skip_timeout_reset=1` to avoid being logged out. Version 8.0.0 fixes the issue.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 6 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-25476 - OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the session expiratio... https://www.cyberhub.blog/cves/CVE-2026-25476
  • 0
  • 1
  • 0
  • 6h ago

Overview

  • hoppscotch
  • hoppscotch

26 Feb 2026
Published
27 Feb 2026
Updated

CVSS v3.1
HIGH (8.3)
EPSS
0.04%

KEV

Description

hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, any logged-in user can read, modify or delete another user's personal environment by ID. `user-environments.resolver.ts:82-109`, `updateUserEnvironment` mutation uses `@UseGuards(GqlAuthGuard)` but is missing the `@GqlUser()` decorator entirely. The user's identity is never extracted, so the service receives only the environment ID and performs a `prisma.userEnvironment.update({ where: { id } })` without any ownership filter. `deleteUserEnvironment` does extract the user but the service only uses the UID to check if the target is a global environment. Actual delete query uses WHERE { id } without AND userUid. hoppscotch environments store API keys, auth tokens and secrets used in API requests. An authenticated attacker who obtains another user's environment ID can read their secrets, replace them with malicious values or delete them entirely. The environment ID format is CUID, which limits mass exploitation but insider threat and combined info leak scenarios are realistic. Version 2026.2.0 fixes the issue.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 16 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-28216 - hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, any logged-in user can read, modify or delete another user's person... https://www.cyberhub.blog/cves/CVE-2026-28216
  • 0
  • 1
  • 0
  • 16h ago

Overview

  • openemr
  • openemr

25 Feb 2026
Published
26 Feb 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.03%

KEV

Description

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the REST API route table in `apis/routes/_rest_routes_standard.inc.php` does not call `RestConfig::request_authorization_check()` for the document and insurance routes. Other patient routes in the same file (e.g. encounters, patients/med) call it with the appropriate ACL. As a result, any valid API bearer token can access or modify every patient's documents and insurance data, regardless of the token’s OpenEMR ACLs—effectively exposing all document and insurance PHI to any authenticated API client. Version 8.0.0 patches the issue.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 13 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-25164 - OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, the REST API route ta... https://www.cyberhub.blog/cves/CVE-2026-25164
  • 0
  • 1
  • 0
  • 13h ago

Overview

  • pyasn1
  • pyasn1

16 Jan 2026
Published
01 Feb 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.02%

KEV

Description

pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.2, a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets. This vulnerability is fixed in 0.6.2.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 15 hours ago

Bluesky

Profile picture fallback
Heads up, #SUSE Linux community! A new security advisory (2026-20482-1) drops for python-pyasn1. We're looking at CVE-2026-23490, a classic but nasty DoS issue with a 7.5 CVSS score—memory exhaustion via malformed OIDs. Read more: 👉 tinyurl.com/3usjhrdd #Security
  • 0
  • 1
  • 0
  • 15h ago

Overview

  • coturn
  • coturn

25 Feb 2026
Published
25 Feb 2026
Updated

CVSS v3.1
HIGH (7.2)
EPSS
0.03%

KEV

Description

Coturn is a free open source implementation of TURN and STUN Server. Coturn is commonly configured to block loopback and internal ranges using "denied-peer-ip" and/or default loopback restrictions. CVE-2020-26262 addressed bypasses involving "0.0.0.0", "[::1]" and "[::]", but IPv4-mapped IPv6 is not covered. When sending a "CreatePermission" or "ChannelBind" request with the "XOR-PEER-ADDRESS" value of "::ffff:127.0.0.1", a successful response is received, even though "127.0.0.0/8" is blocked via "denied-peer-ip". The root cause is that, prior to the updated fix implemented in version 4.9.0, three functions in "src/client/ns_turn_ioaddr.c" do not check "IN6_IS_ADDR_V4MAPPED". "ioa_addr_is_loopback()" checks "127.x.x.x" (AF_INET) and "::1" (AF_INET6), but not "::ffff:127.0.0.1." "ioa_addr_is_zero()" checks "0.0.0.0" and "::", but not "::ffff:0.0.0.0." "addr_less_eq()" used by "ioa_addr_in_range()" for "denied-peer-ip" matching: when the range is AF_INET and the peer is AF_INET6, the comparison returns 0 without extracting the embedded IPv4. Version 4.9.0 contains an updated fix to address the bypass of the fix for CVE-2020-26262.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 4 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-27624 - Coturn is a free open source implementation of TURN and STUN Server. Coturn is commonly configured to block loopback and internal ranges using "denied... https://www.cyberhub.blog/cves/CVE-2026-27624
  • 0
  • 1
  • 0
  • 4h ago

Overview

  • NaturalIntelligence
  • fast-xml-parser

26 Feb 2026
Published
26 Feb 2026
Updated

CVSS v4.0
LOW (2.7)
EPSS
0.04%

KEV

Description

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. Prior to version 5.3.8, the application crashes with stack overflow when user use XML builder with `preserveOrder:true`. Version 5.3.8 fixes the issue. As a workaround, use XML builder with `preserveOrder:false` or check the input data before passing to builder.

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture fallback
🚨 New LOW CVE detected in AWS Lambda 🚨 CVE-2026-27942 impacts fast-xml-parser in 4 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/430 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • rucio
  • rucio

25 Feb 2026
Published
26 Feb 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.03%

KEV

Description

Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. A reflected Cross-site Scripting vulnerability was located in versions prior to 35.8.3, 38.5.4, and 39.3.1 in the rendering of the ExceptionMessage of the WebUI 500 error which could allow attackers to steal login session tokens of users who navigate to a specially crafted URL. Versions 35.8.3, 38.5.4, and 39.3.1 fix the issue.

Statistics

  • 1 Post

Last activity: 13 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-25136 - Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies... https://www.cyberhub.blog/cves/CVE-2026-25136
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • GNU
  • libopts

09 Aug 2025
Published
11 Aug 2025
Updated

CVSS v4.0
MEDIUM (4.8)
EPSS
0.03%

KEV

Description

A vulnerability, which was classified as problematic, was found in GNU libopts up to 27.6. Affected is the function __strstr_sse2. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. This issue was initially reported to the tcpreplay project, but the code maintainer explains, that this "bug appears to be in libopts which is an external library." This vulnerability only affects products that are no longer supported by the maintainer.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture fallback
Heads up, self-hosters and enterprise sysadmins! 🛡️ A new patch for #openSUSE Leap 16.0 is out addressing CVE-2025-8746 in Autogen. Read more: 👉 tinyurl.com/mtrvh4va #Security
  • 0
  • 0
  • 0
  • 20h ago
Showing 11 to 20 of 86 CVEs