24h | 7d | 30d

Overview

  • MariaDB
  • server

20 Mar 2026
Published
27 Mar 2026
Updated

CVSS v3.1
HIGH (8.6)
EPSS
0.10%

KEV

Description

MariaDB server is a community developed fork of MySQL server. An authenticated user can crash MariaDB versions 11.4 before 11.4.10 and 11.8 before 11.8.6 via a bug in JSON_SCHEMA_VALID() function. Under certain conditions it might be possible to turn the crash into a remote code execution. These conditions require tight control over memory layout which is generally only attainable in a lab environment. This issue is fixed in MariaDB 11.4.10, MariaDB 11.8.6, and MariaDB 12.2.2.

Statistics

  • 1 Post

Last activity: Last hour

Fediverse

Profile picture fallback

If you run MariaDB in production, take action now. Any user who can open a SQL session — whether through stolen credentials, SQL injection, or lateral movement — can reach this code path with a single function SQL statement: From our work with @wiz_io as part of zeroday.cloud looking into MariaDB, one of the most widely deployed open-source relational databases, powering production workloads across cloud providers, managed services, and on-prem infrastructure
zeroday.cloud/blog/mariadb-cve

  • 0
  • 0
  • 0
  • Last hour

Overview

  • Google
  • Chrome

28 Apr 2026
Published
30 Apr 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Use after free in Views in Google Chrome on Mac prior to 147.0.7727.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture fallback
【脆弱性情報】 CVE-2026-7334 Google Chrome for Macの脆弱性について Google Chrome for Mac の 147.0.7727.138 より前のバージョンにおいて、Views に Use after free の脆弱性が存在します。
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • fast-uri
  • fast-uri

05 May 2026
Published
05 May 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.03%

KEV

Description

fast-uri normalize() decoded percent-encoded authority delimiters inside the host component and then re-emitted them as raw delimiters during serialization. A host that combined an allowed domain, an encoded at-sign, and a different domain was re-emitted with the at-sign as a raw userinfo separator, changing the URI's authority to the second domain. Applications that normalize untrusted URLs before host allowlist checks, redirect validation, or outbound request routing can be steered to a different authority than the input appeared to specify. Versions <= 3.1.1 are affected. Update to 3.1.2 or later.

Statistics

  • 2 Posts

Last activity: 10 hours ago

Bluesky

Profile picture fallback
🚨 High-severity security fix in fast-uri@3.1.2 just released! Patches CVE-2026-6322 — fast-uri vulnerable to host confusion via percent-encoded authority delimiters github.com/fastify/fast...
  • 0
  • 0
  • 1
  • 10h ago

Overview

  • ahmadgb
  • GeekyBot — AI Copilot, Chatbot, WooCommerce Lead Gen & Zero-Prompt Content

05 May 2026
Published
05 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.19%

KEV

Description

The Geeky Bot plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 1.2.2. This is due to a nopriv AJAX route allowing attacker-controlled model/function dispatch and reaching a plugin installer helper that downloads and unzips attacker-supplied ZIP files into wp-content/plugins/. This makes it possible for unauthenticated attackers to perform arbitrary plugin installation and achieve remote code execution.

Statistics

  • 1 Post

Last activity: 16 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL: CVE-2026-5294 in Geeky Bot WP plugin (≤1.2.2) allows unauthenticated RCE by installing arbitrary plugins via an exposed AJAX endpoint. Disable or remove plugin & monitor for patches. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Shenzhen Yipu Commercial and Trading Co., Ltd
  • WDR201A WiFi Extender

04 May 2026
Published
04 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.45%

KEV

Description

WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) contains an OS command injection vulnerability in the adm.cgi binary's reboot_time function that allows unauthenticated remote attackers to execute arbitrary shell commands by injecting malicious input into the reboot_time POST parameter. Attackers can send a crafted request with shell metacharacters in the reboot_time parameter when reboot_enabled=1 to achieve remote code execution.

Statistics

  • 1 Post

Last activity: 12 hours ago

Fediverse

Profile picture fallback

🛑 CRITICAL: CVE-2026-41925 in WDR201A WiFi Extender (HW V2.1, FW LFMZX28040922V1.02) enables unauth OS command injection via reboot_time param. No patch yet — disable remote mgmt or isolate device. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Progress Software
  • MOVEit Automation

30 Apr 2026
Published
01 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.19%

KEV

Description

Authentication bypass by primary weakness vulnerability in Progress Software MOVEit Automation allows Authentication Bypass. This issue affects MOVEit Automation: from 2025.0.0 before 2025.0.9, from 2024.0.0 before 2024.1.8, versions prior to 2024.0.0.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 5 hours ago

Bluesky

Profile picture fallback
Linux kernel flaw CVE-2026-31431 exploited for root access; MOVEit CVE-2026-4670 enables remote breaches; DigiCert revokes 60 certificates after Zhong Stealer exposure; Pentagon advances AI security partnerships. #LinuxSecurity #DataCenter #USA
  • 0
  • 1
  • 0
  • 5h ago

Overview

  • Pending

08 Apr 2011
Published
06 Aug 2024
Updated

CVSS
Pending
EPSS
73.50%

KEV

Description

dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.

Statistics

  • 1 Post

Last activity: 22 hours ago

Fediverse

Profile picture fallback

Not sure if it was a good idea to look this closely: CVE-2026-42511 (#freebsd ) looks awfully similar to CVE-2011-0997 (isc-dhcp).

  • 0
  • 0
  • 0
  • 22h ago

Overview

  • redis
  • redis

05 May 2026
Published
05 May 2026
Updated

CVSS v4.0
HIGH (7.7)
EPSS
Pending

KEV

Description

Redis is an in-memory data structure store. In versions of redis-server up to 8.6.3, the RESTORE command does not properly validate serialized values. An authenticated attacker with permission to execute RESTORE can supply a crafted serialized payload that triggers invalid memory access and may lead to remote code execution. A workaround is to restrict access to the RESTORE command with ACL rules. This is patched in version 8.6.3.

Statistics

  • 1 Post

Last activity: 5 hours ago

Fediverse

Profile picture fallback

RE: mastodon.kodesumber.com/@redis

Yang punya redis, ada security patch buat CVE-2026-25243 dan CVE-2026-23479.

#redis #cve #infosec

  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Ollama
  • Ollama

29 Apr 2026
Published
29 Apr 2026
Updated

CVSS v4.0
HIGH (7.7)
EPSS
0.04%

KEV

Description

Ollama for Windows contains a Remote Code Execution vulnerability in its update mechanism due to improper handling of attacker‑controlled HTTP response headers. When downloading updates, the application constructs local file paths using values derived from HTTP headers without validation. These values are passed directly to filepath.Join, allowing path traversal sequences (../) to be resolved and enabling files to be written outside the intended update staging directory. An attacker who can influence update responses can exploit this flaw to write arbitrary executables to attacker‑chosen locations accessible to the current user, including the Windows Startup directory. This allows execution of arbitrary executables. Critically, when chained with CVE‑2026‑42248 (Missing Signature Verification for Updates), an attacker can deliver malicious payloads that are written to sensitive locations and executed automatically. Because Ollama for Windows performs silent automatic updates and executes staged binaries without user interaction, this results in automatic and persistent code execution without user awareness. Maintainers of this project were notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Versions from 0.12.10 to 0.17.5 were tested and confirmed as vulnerable, other versions were not tested but might also be vulnerable.

Statistics

  • 1 Post

Last activity: 3 hours ago

Overview

  • redis
  • redis

05 May 2026
Published
05 May 2026
Updated

CVSS v4.0
HIGH (7.7)
EPSS
Pending

KEV

Description

Redis is an in-memory data structure store. In redis-server from 7.2.0 until 8.6.3, the unblock client flow does not handle an error return from `processCommandAndResetClient` when re-executing a blocked command. If a blocked client is evicted during this flow, an authenticated attacker can trigger a use-after-free that may lead to remote code execution. This has been patched in version 8.6.3.

Statistics

  • 1 Post

Last activity: 5 hours ago

Fediverse

Profile picture fallback

RE: mastodon.kodesumber.com/@redis

Yang punya redis, ada security patch buat CVE-2026-25243 dan CVE-2026-23479.

#redis #cve #infosec

  • 0
  • 0
  • 0
  • 5h ago
Showing 31 to 40 of 43 CVEs