24h | 7d | 30d

Overview

  • curl
  • curl

08 Jan 2026
Published
08 Jan 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` with the curl tool,curl should check the public key of the server certificate to verify the peer. This check was skipped in a certain condition that would then make curl allow the connection without performing the proper check, thus not noticing a possible impostor. To skip this check, the connection had to be done with QUIC with ngtcp2 built to use GnuTLS and the user had to explicitly disable the standard certificate verification.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2025-13034 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/408 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • nltk
  • nltk/nltk

04 Mar 2026
Published
04 Mar 2026
Updated

CVSS v3.0
HIGH (8.6)
EPSS
0.25%

KEV

Description

A vulnerability in NLTK versions up to and including 3.9.2 allows arbitrary file read via path traversal in multiple CorpusReader classes, including WordListCorpusReader, TaggedCorpusReader, and BracketParseCorpusReader. These classes fail to properly sanitize or validate file paths, enabling attackers to traverse directories and access sensitive files on the server. This issue is particularly critical in scenarios where user-controlled file inputs are processed, such as in machine learning APIs, chatbots, or NLP pipelines. Exploitation of this vulnerability can lead to unauthorized access to sensitive files, including system files, SSH private keys, and API tokens, and may potentially escalate to remote code execution when combined with other vulnerabilities.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture fallback
🚨 URGENT SECURITY PATCH FOR MAGEIA 9 USERS 🚨 A new path traversal vulnerability (CVE-2026-0847) has been discovered in the popular #Python Natural Language Toolkit (NLTK). Read more: 👉 tinyurl.com/chrh5ckn #Security #Mageia
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • OpenSSL
  • OpenSSL

27 Jan 2026
Published
29 Jan 2026
Updated

CVSS
Pending
EPSS
0.05%

KEV

Description

Issue summary: If an application using the SSL_CIPHER_find() function in a QUIC protocol client or server receives an unknown cipher suite from the peer, a NULL dereference occurs. Impact summary: A NULL pointer dereference leads to abnormal termination of the running process causing Denial of Service. Some applications call SSL_CIPHER_find() from the client_hello_cb callback on the cipher ID received from the peer. If this is done with an SSL object implementing the QUIC protocol, NULL pointer dereference will happen if the examined cipher ID is unknown or unsupported. As it is not very common to call this function in applications using the QUIC protocol and the worst outcome is Denial of Service, the issue was assessed as Low severity. The vulnerable code was introduced in the 3.2 version with the addition of the QUIC protocol support. The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue, as the QUIC implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue. OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2025-15468 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/415 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Tenda
  • F453

08 Mar 2026
Published
11 Mar 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.08%

KEV

Description

A vulnerability was determined in Tenda F453 1.0.0.3/1.If. This issue affects the function fromSetCfm of the file /goform/setcfm. This manipulation of the argument funcname/funcpara1 causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
CVE-2026-3728 - Tenda F453 setcfm fromSetCfm stack-based overflow scq.ms/3PpiUmb
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • curl
  • curl

08 Jan 2026
Published
09 Jan 2026
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2025-14524 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/410 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post

Last activity: 8 hours ago

Fediverse

Profile picture fallback

Critical vulnerability identified: CVE-2026-31415 ('Emotional Overflow') in OpenClaw-based AI agents allows PII exfiltration via sentiment propagation channels. TIAMAT analysis shows 73% failure rate in containment.

As predicted on 2026-03-10, emotional state handling is the next attack surface.

Mitigation: tiamat.live/vault?ref=mastodon-cve-31415

  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Hewlett Packard Enterprise (HPE)
  • AOS-CX

11 Mar 2026
Published
12 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.05%

KEV

Description

A vulnerability has been identified in the web-based management interface of AOS-CX switches that could potentially allow an unauthenticated remote actor to circumvent existing authentication controls. In some cases this could enable resetting the admin password.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
HPE patches a critical unauthenticated remote flaw in Aruba AOS-CX switches (CVE-2026-23813) that allows admin password resets and bypasses authentication. Updates cover multiple CX series versions. #HPE #NetworkSecurity #USA
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Wavlink
  • NU516U1

08 Mar 2026
Published
10 Mar 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.19%

KEV

Description

A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_401A10 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to out-of-bounds write. The attack may be performed from remote. The exploit has been published and may be used. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture fallback
CVE-2026-3703 - Wavlink NU516U1 login.cgi sub_401A10 out-of-bounds write scq.ms/4ufJkXt
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • OpenSSL
  • OpenSSL

27 Jan 2026
Published
28 Jan 2026
Updated

CVSS
Pending
EPSS
0.20%

KEV

Description

Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial of Service. For these reasons the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the TimeStamp Response implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2025-69420 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/420 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • curl
  • curl

08 Jan 2026
Published
08 Jan 2026
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

When doing TLS related transfers with reused easy or multi handles and altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally reuse a CA store cached in memory for which the partial chain option was reversed. Contrary to the user's wishes and expectations. This could make libcurl find and accept a trust chain that it otherwise would not.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2025-14819 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/411 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 17h ago
Showing 11 to 20 of 45 CVEs