24h | 7d | 30d

Overview

  • ConnectWise
  • ScreenConnect

17 Mar 2026
Published
18 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.0)
EPSS
0.05%

KEV

Description

A condition in ScreenConnect may allow an actor with access to server-level cryptographic material used for authentication to obtain unauthorized access, including elevated privileges, in certain scenarios.

Statistics

  • 2 Posts

Last activity: Last hour

Bluesky

Profile picture fallback
ConnectWise patched a critical flaw (CVE-2026-3564) in ScreenConnect before version 26.1 allowing attackers to extract ASP.NET machine keys, enabling session hijacking and privilege escalation. #ScreenConnect #Cryptography #USA
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
ConnectWise patches new flaw allowing ScreenConnect hijacking (CVE-2026-3564) #patchmanagement
  • 0
  • 0
  • 0
  • Last hour

Overview

  • VMware
  • Spring AI
  • Spring AI

18 Mar 2026
Published
18 Mar 2026
Updated

CVSS v3.1
HIGH (8.6)
EPSS
0.05%

KEV

Description

A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConverter allows authenticated users to bypass metadata-based access controls through crafted filter expressions. User-controlled input passed to FilterExpressionBuilder is concatenated into JSONPath queries without proper escaping, enabling attackers to inject arbitrary JSONPath logic and access unauthorized documents. This vulnerability affects applications using vector stores that extend AbstractFilterExpressionConverter for multi-tenant isolation, role-based access control, or document filtering based on metadata. The vulnerability occurs when user-supplied values in filter expressions are not escaped before being inserted into JSONPath queries. Special characters like ", ||, and && are passed through unescaped, allowing injection of arbitrary JSONPath logic that can alter the intended query semantics.

Statistics

  • 3 Posts

Last activity: 4 hours ago

Bluesky

Profile picture fallback
CVE-2026-22729: JSONPath Injection in Spring AI’s PgVectorStore
  • 0
  • 0
  • 1
  • 4h ago
Profile picture fallback
Java Spring AIにSQLインジェクションとJSONPathインジェクションの脆弱性(CVE-2026-22730、CVE-2026-22729) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • VMware
  • Spring AI
  • Spring AI

18 Mar 2026
Published
19 Mar 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.04%

KEV

Description

A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attackers to bypass metadata-based access controls and execute arbitrary SQL commands. The vulnerability exists due to missing input sanitization.

Statistics

  • 5 Posts

Last activity: 7 hours ago

Bluesky

Profile picture fallback
CVE-2026-22730: SQL Injection in Spring AI’s MariaDB Vector Store
  • 0
  • 0
  • 3
  • 7h ago
Profile picture fallback
Java Spring AIにSQLインジェクションとJSONPathインジェクションの脆弱性(CVE-2026-22730、CVE-2026-22729) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Apple
  • macOS

12 Dec 2025
Published
19 Mar 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.

Statistics

  • 2 Posts
  • 5 Interactions

Last activity: 14 hours ago

Fediverse

Profile picture fallback
wen eta KFD for iOS 26.0.1???????

Seriously, any iOS experts looked into if CVE-2025-43520 from the DarkSword vulns could be used for KFD/MacDirtyCow-style file modding?

https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
  • 2
  • 1
  • 0
  • 15h ago
Profile picture fallback

According to TAG’s analysis, DarkSword “uses CVE-2025-43520, a kernel-mode race condition in XNU’s virtual filesystem (VFS) implementation” I’m guessing it’s https://github.com/apple-oss-distributions/xnu/blob/bbb1b6f9e71b8cdde6e5cd6f4841f207dee3d828/bsd/vfs/vfs_cluster.c#L3700 ? There’s several VFS changes; not sure if this is the right one.

If it is this one, I guess you’d somehow

  • Make a contiguous memory region,
  • start reading a file into it,
  • then switch it to a non-contiguous region after it’s validated the region, but before it actually starts reading the file,
  • so it ends up writing what it thinks is your contiguous area, but actually is the first part of your area followed by some other memory?
  • 1
  • 1
  • 0
  • 14h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 19 hours ago

Bluesky

Profile picture fallback
A critical unauthenticated #RCE vulnerability (CVE-2026-33017) has been identified in #Langflow. The /api/v1/build_public_tmp/{flow_id}/flow endpoint allows attackers to supply malicious flow data containing arbitrary Python code, which is executed via exec() without sandboxing.
  • 1
  • 1
  • 0
  • 19h ago

Overview

  • apostrophecms
  • import-export

18 Mar 2026
Published
19 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.06%

KEV

Description

ApostropheCMS is an open-source content management framework. Prior to version 3.5.3 of `@apostrophecms/import-export`, The `extract()` function in `gzip.js` constructs file-write paths using `fs.createWriteStream(path.join(exportPath, header.name))`. `path.join()` does not resolve or sanitise traversal segments such as `../`. It concatenates them as-is, meaning a tar entry named `../../evil.js` resolves to a path outside the intended extraction directory. No canonical-path check is performed before the write stream is opened. This is a textbook Zip Slip vulnerability. Any user who has been granted the Global Content Modify permission — a role routinely assigned to content editors and site managers — can upload a crafted `.tar.gz` file through the standard CMS import UI and write attacker-controlled content to any path the Node.js process can reach on the host filesystem. Version 3.5.3 of `@apostrophecms/import-export` fixes the issue.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 16 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL: CVE-2026-32731 in ApostropheCMS import-export (<3.5.3) allows path traversal via crafted .tar.gz uploads — attackers can write files anywhere the Node.js process can. Upgrade to 3.5.3+ ASAP! radar.offseq.com/threat/cve-20

  • 1
  • 1
  • 1
  • 16h ago

Overview

  • opf
  • openproject

18 Mar 2026
Published
19 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.03%

KEV

Description

OpenProject is an open-source, web-based project management software. Versions prior to 16.6.9, 17.0.6, 17.1.3, and 17.2.1 are vulnerable to an SQL injection attack via a custom field's name. When that custom field was used in a Cost Report, the custom field's name was injected into the SQL query without proper sanitation. This allowed an attacker to execute arbitrary SQL commands during the generation of a Cost Report. As custom fields can only be generated by users with full administrator privileges, the attack surface is somewhat reduced. Together with another bug in the Repositories_module, that used the project identifier without sanitation to generate the checkout path for a git repository in the filesystem, this allowed an attacker to checkout a git repository to an arbitrarily chosen path on the server. If the checkout is done within certain paths within the OpenProject application, upon the next restart of the application, this allows the attacker to inject ruby code into the application. As the project identifier cannot be manually edited to any string containing special characters like dots or slashes, this needs to be changed via the SQL injection described above. Versions 16.6.9, 17.0.6, 17.1.3, and 17.2.1 fix the issue.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 11 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL: CVE-2026-32698 in OpenProject (CVSS 9.1) enables SQL injection via admin-created custom fields, leading to potential RCE if chained with repo module bug. Patch to 16.6.9/17.0.6/17.1.3/17.2.1+ now! radar.offseq.com/threat/cve-20

  • 0
  • 1
  • 0
  • 11h ago

Overview

  • INW
  • Krbyyyzo

27 Jan 2025
Published
12 Feb 2025
Updated

CVSS v4.0
MEDIUM (6.7)
EPSS
0.05%

KEV

Description

A vulnerability classified as problematic was found in INW Krbyyyzo 25.2002. Affected by this vulnerability is an unknown functionality of the file /gbo.aspx of the component Daily Huddle Site. The manipulation of the argument s leads to resource consumption. It is possible to launch the attack on the local host. Other endpoints might be affected as well.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 8 hours ago

Bluesky

Profile picture fallback
Critical RCE Flaw in Windows Print Spooler (CVE-2024-12345) – Full Mitigation and Detection Guide + Video Introduction: A newly disclosed critical vulnerability in the Windows Print Spooler service (CVE-2024-12345) allows unauthenticated remote attackers to execute arbitrary code with SYSTEM…
  • 0
  • 1
  • 0
  • 8h ago

Overview

  • isaacs
  • brace-expansion

04 Feb 2026
Published
05 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.2)
EPSS
0.02%

KEV

Description

@isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process. This issue has been patched in version 5.0.1.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 4 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2026-25547 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/395 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 1
  • 0
  • 4h ago

Overview

  • isaacs
  • node-tar

30 Oct 2025
Published
30 Oct 2025
Updated

CVSS v4.0
MEDIUM (6.1)
EPSS
0.01%

KEV

Description

node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read. This vulnerability is fixed in 7.5.2.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 4 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2025-64118 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/348 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 1
  • 0
  • 4h ago
Showing 11 to 20 of 55 CVEs