24h | 7d | 30d

Overview

  • TigerVNC
  • TigerVNC

26 Mar 2026
Published
27 Mar 2026
Updated

CVSS v3.1
HIGH (8.5)
EPSS
0.03%

KEV

Description

In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions.

Statistics

  • 4 Posts

Last activity: 17 hours ago

Bluesky

Profile picture fallback
That TigerVNC permission bug (CVE-2026-34352) lets other users watch your screen. Fix it today with a script + iptables. But to *really* stop this class of flaw forever? Read more: 👉 tinyurl.com/3cz3vwrk #SUSE #Security
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
TigerVNC just fixed a nasty bug: other users on the same server could watch your screen or inject fake keystrokes (CVE-2026-34352). Here's how to check if YOU are vulnerable on Ubuntu, Rocky, or #SUSE Read more: 👉 tinyurl.com/8c5j6dkf #Security
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
🚨 TigerVNC permission flaw (CVE-2026-34352) – patch today. But patches expire. Evergreen fixes: ✅ Check commands (Ubuntu/Rocky Linux/SUSE) ✅ Bash automation script ✅ iptables fallback Read more: 👉 tinyurl.com/2f7csd6 #SUSE #Securtity
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
Someone on your server could be watching your screen right now. That's CVE-2026-34352. Here's how to check, patch, and block it on any Linux distro – Ubuntu, Rocky, or SUSE. Bash script + AppArmor included. Read more: 👉 tinyurl.com/3fecmhhk #SUSE
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • OpenSSL
  • OpenSSL

07 Apr 2026
Published
10 Apr 2026
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

Issue summary: When a delta CRL that contains a Delta CRL Indicator extension is processed a NULL pointer dereference might happen if the required CRL Number extension is missing. Impact summary: A NULL pointer dereference can trigger a crash which leads to a Denial of Service for an application. When CRL processing and delta CRL processing is enabled during X.509 certificate verification, the delta CRL processing does not check whether the CRL Number extension is NULL before dereferencing it. When a malformed delta CRL file is being processed, this parameter can be NULL, causing a NULL pointer dereference. Exploiting this issue requires the X509_V_FLAG_USE_DELTAS flag to be enabled in the verification context, the certificate being verified to contain a freshestCRL extension or the base CRL to have the EXFLAG_FRESHEST flag set, and an attacker to provide a malformed CRL to an application that processes it. The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the affected code is outside the OpenSSL FIPS module boundary.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
🚨 New HIGH CVE detected in AWS Lambda 🚨 CVE-2026-28388 impacts openssl-fips-provider-latest in 20 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/469 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • MervinPraison
  • PraisonAI

14 Apr 2026
Published
14 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.06%

KEV

Description

PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the browser bridge (praisonai browser start) is vulnerable to unauthenticated remote session hijacking due to missing authentication and a bypassable origin check on its /ws WebSocket endpoint. The server binds to 0.0.0.0 by default and only validates the Origin header when one is present, meaning any non-browser client that omits the header is accepted without restriction. An unauthenticated network attacker can connect, send a start_session message, and the server will route it to the first idle browser-extension WebSocket (effectively hijacking that session) and then broadcast all resulting automation actions and outputs back to the attacker. This enables unauthorized remote control of connected browser automation sessions, leakage of sensitive page context and automation results, and misuse of model-backed browser actions in any environment where the bridge is network-reachable. This issue has been fixed in versions 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents.

Statistics

  • 1 Post

Last activity: 23 hours ago

Fediverse

Profile picture fallback

⚠️ CVE-2026-40289: PraisonAI <4.5.139 & praisonaiagents <1.5.140 have a critical missing auth vuln on /ws. Remote attackers can hijack browser automation sessions. Patch ASAP or restrict access! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Tinyproxy Project
  • Tinyproxy

07 Apr 2026
Published
07 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.06%

KEV

Description

Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against "chunked", even though RFC 7230 specifies that transfer-coding names are case-insensitive. By sending a request with Transfer-Encoding: Chunked, an unauthenticated remote attacker can cause Tinyproxy to misinterpret the request as having no body. In this state, Tinyproxy sets content_length.client to -1, skips pull_client_data_chunked(), forwards request headers upstream, and transitions into relay_connection() raw TCP forwarding while unread body data remains buffered. This leads to inconsistent request state between Tinyproxy and backend servers. RFC-compliant backends (e.g., Node.js, Nginx) will continue waiting for chunked body data, causing connections to hang indefinitely. This behavior enables application-level denial of service through backend worker exhaustion. Additionally, in deployments where Tinyproxy is used for request-body inspection, filtering, or security enforcement, the unread body may be forwarded without proper inspection, resulting in potential security control bypass.

Statistics

  • 1 Post

Last activity: 14 hours ago

Bluesky

Profile picture fallback
tinyproxy: 1.11.2 -> 1.11.3, tinyproxy: add patch for CVE-2026-31842 https://github.com/NixOS/nixpkgs/pull/509511 https://tracker.security.nixos.org/issues/NIXPKGS-2026-0995 #security
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • OpenSSL
  • OpenSSL

07 Apr 2026
Published
08 Apr 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Issue summary: Applications using RSASVE key encapsulation to establish a secret encryption key can send contents of an uninitialized memory buffer to a malicious peer. Impact summary: The uninitialized buffer might contain sensitive data from the previous execution of the application process which leads to sensitive data leakage to an attacker. RSA_public_encrypt() returns the number of bytes written on success and -1 on error. The affected code tests only whether the return value is non-zero. As a result, if RSA encryption fails, encapsulation can still return success to the caller, set the output lengths, and leave the caller to use the contents of the ciphertext buffer as if a valid KEM ciphertext had been produced. If applications use EVP_PKEY_encapsulate() with RSA/RSASVE on an attacker-supplied invalid RSA public key without first validating that key, then this may cause stale or uninitialized contents of the caller-provided ciphertext buffer to be disclosed to the attacker in place of the KEM ciphertext. As a workaround calling EVP_PKEY_public_check() or EVP_PKEY_public_check_quick() before EVP_PKEY_encapsulate() will mitigate the issue. The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.1 and 3.0 are affected by this issue.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
🚨 New HIGH CVE detected in AWS Lambda 🚨 CVE-2026-31790 impacts openssl-fips-provider-latest in 20 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/472 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • n8n-io
  • n8n

25 Feb 2026
Published
26 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.5)
EPSS
0.26%

KEV

Description

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, a second-order expression injection vulnerability existed in n8n's Form nodes that could allow an unauthenticated attacker to inject and evaluate arbitrary n8n expressions by submitting crafted form data. When chained with an expression sandbox escape, this could escalate to remote code execution on the n8n host. The vulnerability requires a specific workflow configuration to be exploitable. First, a form node with a field interpolating a value provided by an unauthenticated user, e.g. a form submitted value. Second, the field value must begin with an `=` character, which caused n8n to treat it as an expression and triggered a double-evaluation of the field content. There is no practical reason for a workflow designer to prefix a field with `=` intentionally — the character is not rendered in the output, so the result would not match the designer's expectations. If added accidentally, it would be noticeable and very unlikely to persist. An unauthenticated attacker would need to either know about this specific circumstance on a target instance or discover a matching form by chance. Even when the preconditions are met, the expression injection alone is limited to data accessible within the n8n expression context. Escalation to remote code execution requires chaining with a separate sandbox escape vulnerability. The issue has been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Review usage of form nodes manually for above mentioned preconditions, disable the Form node by adding `n8n-nodes-base.form` to the `NODES_EXCLUDE` environment variable, and/or disable the Form Trigger node by adding `n8n-nodes-base.formTrigger` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture fallback
Zero-Click Nightmare: How a Simple {{77}} in n8n Grants Unauthenticated RCE (CVE-2026-27493) + Video Introduction Server-Side Template Injection (SSTI) remains one of the most overlooked yet devastating vulnerabilities in modern web applications. When combined with n8n – a popular workflow…
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Ubiquiti Inc
  • UniFi Play PowerAmp

13 Apr 2026
Published
14 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.11%

KEV

Description

A malicious actor with access to the UniFi Play network could exploit a Path Traversal vulnerability found in the device firmware to write files on the system that could be used for a remote code execution (RCE). Affected Products: UniFi Play PowerAmp (Version 1.0.35 and earlier)
UniFi Play Audio Port  (Version 1.0.24 and earlier)
 Mitigation: Update UniFi Play PowerAmp to Version 1.0.38 or later
Update UniFi Play Audio Port  to Version 1.1.9 or later

Statistics

  • 1 Post

Last activity: 19 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-22562: CRITICAL path traversal (CWE-22) in Ubiquiti UniFi Play PowerAmp ≤1.0.35 & Audio Port ≤1.0.24 enables unauth RCE via arbitrary file write. Patch to 1.0.38+/1.1.9+ ASAP! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 19h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture fallback
Compute Engine update on April 14, 2026 https://docs.cloud.google.com/compute/docs/release-notes#April_14_2026 #googlecloud A vulnerability (CVE-2025-54510) about AMD SEV-SNP guest memory integrity has been addressed
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • MervinPraison
  • PraisonAI

14 Apr 2026
Published
14 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.07%

KEV

Description

PraisonAI is a multi-agent teams system. In versions below 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents, the workflow engine is vulnerable to arbitrary command and code execution through untrusted YAML files. When praisonai workflow run <file.yaml> loads a YAML file with type: job, the JobWorkflowExecutor in job_workflow.py processes steps that support run: (shell commands via subprocess.run()), script: (inline Python via exec()), and python: (arbitrary Python script execution)—all without any validation, sandboxing, or user confirmation. The affected code paths include action_run() in workflow.py and _exec_shell(), _exec_inline_python(), and _exec_python_script() in job_workflow.py. An attacker who can supply or influence a workflow YAML file (particularly in CI pipelines, shared repositories, or multi-tenant deployment environments) can achieve full arbitrary command execution on the host system, compromising the machine and any accessible data or credentials. This issue has been fixed in versions 4.5.139 of PraisonAI and 1.5.140 of praisonaiagents.

Statistics

  • 1 Post

Last activity: 22 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-40288 (CRITICAL, CVSS 9.8): PraisonAI <4.5.139 vulnerable to OS command injection via untrusted YAML files. Attackers can achieve full system compromise. Upgrade ASAP! More: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 22h ago

Overview

  • wpeverest
  • User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder

03 Mar 2026
Published
08 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
38.99%

KEV

Description

The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to improper privilege management in all versions up to, and including, 5.1.2. This is due to the plugin accepting a user-supplied role during membership registration without properly enforcing a server-side allowlist. This makes it possible for unauthenticated attackers to create administrator accounts by supplying a role value during membership registration.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture fallback
CVE-2026-1492: Unauthenticated Admin Takeover in 200k+ WordPress Sites – Patch NOW! + Video Introduction: A newly disclosed critical vulnerability, CVE-2026-1492, strikes the User Registration & Membership plugin for WordPress, a tool deployed on over 200,000 sites to manage user registrations,…
  • 0
  • 0
  • 0
  • 10h ago
Showing 31 to 40 of 48 CVEs