24h | 7d | 30d

Overview

  • Python Software Foundation
  • CPython

16 Mar 2026
Published
16 Mar 2026
Updated

CVSS v4.0
MEDIUM (6.0)
EPSS
0.11%

KEV

Description

The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture fallback
🚨 New MEDIUM CVE detected in AWS Lambda 🚨 CVE-2026-3644 impacts python in 7 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/455 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Intermesh
  • groupoffice

02 Apr 2026
Published
02 Apr 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
Pending

KEV

Description

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.156, 25.0.90, and 26.0.12, a vulnerability in the AbstractSettingsCollection model leads to insecure deserialization when these settings are loaded. By injecting a serialized FileCookieJar object into a setting string, an authenticated attacker can achieve Arbitrary File Write, leading directly to Remote Code Execution (RCE) on the server. This issue has been patched in versions 6.8.156, 25.0.90, and 26.0.12.

Statistics

  • 1 Post

Last activity: 2 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-34838 (CRITICAL, CVSS 10): Group-Office <6.8.156, <25.0.90, <26.0.12 vulnerable to insecure deserialization (CWE-502). Authenticated attackers can achieve RCE by injecting malicious serialized objects. Patch now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 2h ago

Overview

  • pygments

22 Mar 2026
Published
23 Mar 2026
Updated

CVSS v4.0
MEDIUM (4.8)
EPSS
0.01%

KEV

Description

A security flaw has been discovered in pygments up to 2.19.2. The impacted element is the function AdlLexer of the file pygments/lexers/archetype.py. The manipulation results in inefficient regular expression complexity. The attack is only possible with local access. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Statistics

  • 1 Post

Last activity: 13 hours ago

Bluesky

Profile picture fallback
#openSUSE Tumbleweed advisory 10476-1: python311-Pygments updated to 2.20.0-2.1 resolving CVE-2026-4539. Read more: 👉 tinyurl.com/2kpdk72m
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Dan McInerney
  • pymetasploit3
  • pymetasploit3

03 Apr 2026
Published
03 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the Metasploit console to execute additional unintended commands, potentially leading to arbitrary command execution and manipulation of Metasploit sessions.

Statistics

  • 1 Post

Last activity: 5 hours ago

Fediverse

Profile picture fallback

⚠️ CRITICAL vuln: pymetasploit3 ≤1.0.6 (CVE-2026-5463) lets attackers inject commands via newline chars in console.run_module_with_output(), risking full session compromise. Avoid untrusted input, watch for patches. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Omnissa
  • Omnissa Workspace ONE UEM

11 Aug 2025
Published
11 Aug 2025
Updated

CVSS v3.1
HIGH (7.5)
EPSS
3.95%

KEV

Description

Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability. A malicious actor may be able to gain access to sensitive information by sending crafted GET requests (read-only) to restricted API endpoints.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
Omnissa Workspace ONE UEM存在敏感信息洩漏漏洞(CVE-2025-25231) 附POC
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Apple
  • iOS and iPadOS

21 Aug 2025
Published
02 Apr 2026
Updated

CVSS
Pending
EPSS
0.55%

Description

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 15.8.5 and iPadOS 15.8.5, iOS 16.7.12 and iPadOS 16.7.12, iOS 18.6.2 and iPadOS 18.6.2, iPadOS 17.7.10, macOS Sequoia 15.6.1, macOS Sonoma 14.7.8, macOS Ventura 13.7.8. Processing a malicious image file may result in memory corruption. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals.

Statistics

  • 1 Post

Last activity: 18 hours ago

Bluesky

Profile picture fallback
Reverse Engineering a WhatsApp 0-Click Vulnerability: A Deep Dive into CVE-2025–43300 https://infosecwriteups.com/reverse-engineering-a-whatsapp-0-click-vulnerability-a-deep-dive-into-cve-2025-43300-d8d425644fe9?source=rss------bug_bounty-5
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • ShaneIsrael
  • fireshare

02 Apr 2026
Published
02 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
Pending

KEV

Description

Fireshare facilitates self-hosted media and link sharing. Prior to version 1.5.3, the fix for CVE-2026-33645 was applied to the authenticated /api/uploadChunked endpoint but was not applied to the unauthenticated /api/uploadChunked/public endpoint in the same file (app/server/fireshare/api.py). An unauthenticated attacker can exploit the checkSum parameter to write arbitrary files with attacker-controlled content to any writable path on the server filesystem. This issue has been patched in version 1.5.3.

Statistics

  • 1 Post

Last activity: Last hour

Fediverse

Profile picture fallback

🚨 CRITICAL: CVE-2026-34745 in ShaneIsrael fireshare (<1.5.3) enables unauth’d file writes to any server path via /api/uploadChunked/public. Upgrade to 1.5.3 ASAP or restrict access. Full details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • Last hour

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post

Last activity: 19 hours ago

Bluesky

Profile picture fallback
KillChain Exploit: New CVE-2026-0828 Lets Attackers Terminate ANY Windows Process – Including Protected Services! + Video Introduction: A newly disclosed vulnerability, CVE-2026-0828, resides in ProcessMonitorDriver.sys and exposes a dangerously unrestricted IOCTL (Input/Output Control) interface.…
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • langflow-ai
  • langflow

20 Mar 2026
Published
26 Mar 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
5.65%

Description

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored flow data from the database. This code is passed to exec() with zero sandboxing, resulting in unauthenticated remote code execution. This is distinct from CVE-2025-3248, which fixed /api/v1/validate/code by adding authentication. The build_public_tmp endpoint is designed to be unauthenticated (for public flows) but incorrectly accepts attacker-supplied flow data containing arbitrary executable code. This issue has been fixed in version 1.9.0.

Statistics

  • 1 Post

Last activity: 13 hours ago

Bluesky

Profile picture fallback
#LastWeekInAppSec wasn't just about #Axios. It also included: 🔨 rapid exploitation of a code injection + RCE in #Langflow (#CVE-2026-33017) 🕵️‍♂️ clever malware in #Telnyx package that used a valid .wav audio file to hide its payload. ▷ Read the details: buff.ly/pxbX0c0 #AppSec #DevSecOps
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • FreeBSD
  • FreeBSD

26 Mar 2026
Published
02 Apr 2026
Updated

CVSS
Pending
EPSS
0.18%

KEV

Description

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel. In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system.

Statistics

  • 1 Post

Last activity: Last hour

Bluesky

Profile picture fallback
MAD Bugs: Claude Wrote a Full FreeBSD Remote Kernel RCE with Root Shell (CVE-2026-4747)
  • 0
  • 0
  • 0
  • Last hour
Showing 11 to 20 of 35 CVEs