24h | 7d | 30d

Overview

  • Apache Software Foundation
  • Apache Log4j2

10 Dec 2021
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
94.36%

Description

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

Statistics

  • 1 Post

Last activity: 21 hours ago

Bluesky

Profile picture fallback
Log4Shell Exploit Analysis: How to Detect and Mitigate the Critical Log4j Vulnerability + Video Introduction The Log4Shell vulnerability (CVE-2021-44228) in Apache Log4j2 sent shockwaves through the cybersecurity community, allowing unauthenticated remote code execution on millions of servers.…
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • milvus-io
  • milvus

13 Feb 2026
Published
13 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.11%

KEV

Description

Milvus is an open-source vector database built for generative AI applications. Prior to 2.5.27 and 2.6.10, Milvus exposes TCP port 9091 by default, which enables authentication bypasses. The /expr debug endpoint uses a weak, predictable default authentication token derived from etcd.rootPath (default: by-dev), enabling arbitrary expression evaluation. The full REST API (/api/v1/*) is registered on the metrics/management port without any authentication, allowing unauthenticated access to all business operations including data manipulation and credential management. This vulnerability is fixed in 2.5.27 and 2.6.10.

Statistics

  • 1 Post

Last activity: 10 hours ago

Fediverse

Profile picture fallback

🔴 CVE-2026-26190: CRITICAL auth bypass in Milvus (<2.5.27, 2.6.0-2.6.9). REST API & /expr debug endpoint exposed via port 9091, enabling unauth access to data & creds. Patch to 2.5.27/2.6.10 ASAP! Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 10h ago

Overview

  • idno
  • known

13 Feb 2026
Published
13 Feb 2026
Updated

CVSS v3.0
CRITICAL (9.8)
EPSS
0.08%

KEV

Description

Known is a social publishing platform. Prior to 1.6.3, a Critical Broken Authentication vulnerability exists in Known 1.6.2 and earlier. The application leaks the password reset token within a hidden HTML input field on the password reset page. This allows any unauthenticated attacker to retrieve the reset token for any user by simply querying the user's email, leading to full Account Takeover (ATO) without requiring access to the victim's email inbox. This vulnerability is fixed in 1.6.3.

Statistics

  • 1 Post

Last activity: 15 hours ago

Fediverse

Profile picture fallback

🔴 CRITICAL: CVE-2026-26273 in Known <1.6.3 leaks password reset tokens in HTML — full account takeover possible without email access. Upgrade to 1.6.3+ & audit reset flows. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 15h ago

Overview

  • nodejs
  • node

20 Jan 2026
Published
22 Jan 2026
Updated

CVSS v3.0
HIGH (7.1)
EPSS
0.01%

KEV

Description

A flaw in Node.js’s Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture fallback
Breaking the Box: bypassing Node.js Filesystem Permissions via Symlinks (CVE-2025–55130) https://xalgord.medium.com/breaking-the-box-bypassing-node-js-filesystem-permissions-via-symlinks-cve-2025-55130-0b9ad44920f9?source=rss------bug_bounty-5
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • HubSpot
  • jinjava

04 Feb 2026
Published
05 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.10%

KEV

Description

JinJava is a Java-based template engine based on django template syntax, adapted to render jinja templates. Prior to versions 2.7.6 and 2.8.3, JinJava is vulnerable to arbitrary Java execution via bypass through ForTag. This allows arbitrary Java class instantiation and file access bypassing built-in sandbox restrictions. This issue has been patched in versions 2.7.6 and 2.8.3.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
Reversing CVE-2026-25526: How a Patch Diff in HubSpot’s Jinjava Led to Pre-Auth File Read + Video Introduction: In the rapidly evolving landscape of web application security, server-side template injection (SSTI) vulnerabilities remain a critical threat, often leading to remote code execution or…
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Pending

24 Oct 2024
Published
25 Oct 2024
Updated

CVSS
Pending
EPSS
0.25%

KEV

Description

HTMLDOC v1.9.18 contains a buffer overflow in parse_pre function,ps-pdf.cxx:5681.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
Critical #openSUSE Security Patch! 🔒 Update htmldoc now to fix CVE-2024-46478, a dangerous buffer overflow in the parse_pre function. Affects Backports SLE-15-SP6. Read more: 👉 tinyurl.com/3rzda27m #Security
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Linux
  • Linux

12 Nov 2025
Published
01 Dec 2025
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix null pointer dereference on zero-length checksum In xdr_stream_decode_opaque_auth(), zero-length checksum.len causes checksum.data to be set to NULL. This triggers a NPD when accessing checksum.data in gss_krb5_verify_mic_v2(). This patch ensures that the value of checksum.len is not less than XDR_UNIT.

Statistics

  • 2 Posts

Last activity: 20 hours ago

Bluesky

Profile picture fallback
🚨 Critical #SUSE Linux Kernel RT Update! 🚨 SUSE-SU-2026:0490-1 patches 3 high-severity CVEs (including a nasty SUNRPC flaw CVE-2025-40129 with CVSS 8.7). Read more: 👉 tinyurl.com/bw3c8s9x #Security
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
🚨 URGENT: #SUSE Kernel RT Live Patch 2 (SUSE-SU-2026:0489-1) 🚨 Four critical CVEs fixed including CVE-2025-38352 (Race Condition) & CVE-2025-40129 (Unauthenticated NFS DoS). Read more: 👉 tinyurl.com/33fw5wb5 #Security
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Calero
  • VeraSMART

13 Feb 2026
Published
13 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.08%

KEV

Description

Calero VeraSMART versions prior to 2022 R1 use static ASP.NET/IIS machineKey values configured for the VeraSMART web application and stored in C:\\Program Files (x86)\\Veramark\\VeraSMART\\WebRoot\\web.config. An attacker who obtains these keys can craft a valid ASP.NET ViewState payload that passes integrity validation and is accepted by the application, resulting in server-side deserialization and remote code execution in the context of the IIS application.

Statistics

  • 1 Post

Last activity: 12 hours ago

Fediverse

Profile picture fallback

CVE-2026-26335 (CRITICAL, CVSS 9.3): Calero VeraSMART <2022 R1 uses hard-coded crypto keys, enabling unauth RCE via crafted ViewState in ASP.NET. No exploits yet, but immediate upgrade or key rotation essential! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

11 Nov 2025
Published
13 Feb 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.05%

KEV

Description

Missing cryptographic step in Windows Kerberos allows an unauthorized attacker to elevate privileges over a network.

Statistics

  • 1 Post

Last activity: 19 hours ago

Bluesky

Profile picture fallback
CVE-2025-60704: Validation Flaws in Windows Kerberos S4U: From Protocol Transition to Privilege Escalation www.silverfort.com/resources/cv...
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • Calero
  • VeraSMART

13 Feb 2026
Published
13 Feb 2026
Updated

CVSS v4.0
CRITICAL (10.0)
EPSS
0.10%

KEV

Description

Calero VeraSMART versions prior to 2022 R1 expose an unauthenticated .NET Remoting HTTP service on TCP port 8001. The service publishes default ObjectURIs (including EndeavorServer.rem and RemoteFileReceiver.rem) and permits the use of SOAP and binary formatters with TypeFilterLevel set to Full. An unauthenticated remote attacker can invoke the exposed remoting endpoints to perform arbitrary file read and write operations via the WebClient class. This allows retrieval of sensitive files such as WebRoot\\web.config, which may disclose IIS machineKey validation and decryption keys. An attacker can use these keys to generate a malicious ASP.NET ViewState payload and achieve remote code execution within the IIS application context. Additionally, supplying a UNC path can trigger outbound SMB authentication from the service account, potentially exposing NTLMv2 hashes for relay or offline cracking.

Statistics

  • 1 Post

Last activity: 13 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL: CVE-2026-26333 in Calero VeraSMART (pre-2022 R1) allows unauth RCE via exposed .NET Remoting on port 8001. Attackers can read configs, steal machineKeys, and capture NTLMv2 hashes. Restrict access & patch! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 13h ago
Showing 11 to 20 of 38 CVEs