Overview
Description
A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.
Statistics
- 1 Post
Last activity: 7 hours ago
Overview
- code-projects
- Accounting System
29 Mar 2026
Published
29 Mar 2026
Updated
CVSS v4.0
MEDIUM (6.9)
EPSS
0.03%
KEV
Description
A vulnerability was detected in code-projects Accounting System 1.0. Affected by this vulnerability is an unknown functionality of the file /view_costumer.php of the component Parameter Handler. The manipulation of the argument cos_id results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.
Statistics
- 1 Post
Last activity: 22 hours ago
Fediverse
🚨 CVE-2026-5033 (MEDIUM): SQL injection in code-projects Accounting System 1.0 (/view_costumer.php, cos_id) is being actively exploited. Remote risk — monitor and patch as soon as fixes arrive. More: https://radar.offseq.com/threat/cve-2026-5033-sql-injection-in-code-projects-accou-9e1a8bbd #OffSeq #SQLInjection #VulnResearch
Overview
- strongSwan
- strongSwan
23 Mar 2026
Published
27 Mar 2026
Updated
CVSS v4.0
HIGH (8.7)
EPSS
0.15%
KEV
Description
strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication. Attackers can exploit the failure to validate AVP length fields before subtraction to trigger excessive memory allocation or NULL pointer dereference, crashing the charon IKE daemon.
Statistics
- 1 Post
Last activity: 9 hours ago
Overview
- ultrajson
- ultrajson
20 Mar 2026
Published
20 Mar 2026
Updated
CVSS v3.1
HIGH (7.5)
EPSS
0.07%
KEV
Description
UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Versions 5.4.0 through 5.11.0 contain an accumulating memory leak in JSON parsing large (outside of the range [-2^63, 2^64 - 1]) integers. The leaked memory is a copy of the string form of the integer plus an additional NULL byte. The leak occurs irrespective of whether the integer parses successfully or is rejected due to having more than sys.get_int_max_str_digits() digits, meaning that any sized leak per malicious JSON can be achieved provided that there is no limit on the overall size of the payload. Any service that calls ujson.load()/ujson.loads()/ujson.decode() on untrusted inputs is affected and vulnerable to denial of service attacks. This issue has been fixed in version 5.12.0.
Statistics
- 1 Post
Last activity: 9 hours ago
Overview
- parisneo
- parisneo/lollms
29 Mar 2026
Published
29 Mar 2026
Updated
CVSS v3.0
HIGH (7.5)
EPSS
Pending
KEV
Description
A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms versions prior to 2.2.0, specifically in the `/api/files/export-content` endpoint. The `_download_image_to_temp()` function in `backend/routers/files.py` fails to validate user-controlled URLs, allowing attackers to make arbitrary HTTP requests to internal services and cloud metadata endpoints. This vulnerability can lead to internal network access, cloud metadata access, information disclosure, port scanning, and potentially remote code execution.
Statistics
- 1 Post
Last activity: 4 hours ago
Fediverse
⚠️ CVE-2026-0560: HIGH-severity SSRF in parisneo/lollms (<2.2.0) allows remote attackers to access internal network/cloud endpoints via /api/files/export-content. Patch to 2.2.0+ or block unsafe URLs now! https://radar.offseq.com/threat/cve-2026-0560-cwe-918-server-side-request-forgery--5103940b #OffSeq #SSRF #Vuln #AppSec
Overview
Description
WSO2 Management Console through 5.10 allows XSS via the carbon/admin/login.jsp msgId parameter.
Statistics
- 1 Post
Last activity: 14 hours ago
Overview
- Canonical
- lxd
- lxd
12 Mar 2026
Published
13 Mar 2026
Updated
CVSS v4.0
CRITICAL (9.4)
EPSS
0.13%
KEV
Description
An improper sanitization of the compression_algorithm parameter in Canonical LXD allows an authenticated, unprivileged user to execute commands as the LXD daemon on the LXD server via API calls to the image and backup endpoints. This issue affected LXD from 4.12 through 6.6 and was fixed in the snap versions 5.0.6-e49d9f4 (channel 5.0/stable), 5.21.4-1374f39 (channel 5.21/stable), and 6.7-1f11451 (channel 6.0 stable). The channel 4.0/stable is not affected as it contains version 4.0.10.
Statistics
- 1 Post
Last activity: 7 hours ago
Overview
- Python Software Foundation
- CPython
20 Mar 2026
Published
25 Mar 2026
Updated
CVSS v4.0
HIGH (7.0)
EPSS
0.03%
KEV
Description
The webbrowser.open() API would accept leading dashes in the URL which
could be handled as command line options for certain web browsers. New
behavior rejects leading dashes. Users are recommended to sanitize URLs
prior to passing to webbrowser.open().
Statistics
- 2 Posts
Last activity: 10 hours ago
Bluesky
Essential reading for platform engineers: Our comprehensive guide to CVE-2026-4519 covers technical mitigation, business ROI analysis, and compliance mapping. Includes free enterprise security checklist. Read more: 👉 tinyurl.com/yx2btjt7 #Fedora #Security