24h | 7d | 30d

Overview

  • Microsoft
  • Windows 10 Version 1607

14 Apr 2026
Published
30 Apr 2026
Updated

CVSS v3.1
MEDIUM (4.3)
EPSS
7.19%

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture fallback
Windows shell spoofing vulnerability puts sensitive data at risk (CVE-2026-32202) #patchmanagement
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • wordpresschef
  • Salon Booking System – Free Version

02 May 2026
Published
02 May 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.10%

KEV

Description

The Salon Booking System – Free Version plugin for WordPress is vulnerable to Arbitrary File Read in versions up to, and including, 10.30.25. This is due to the public booking flow accepting attacker-controlled file-field values and later using those stored values as trusted paths for email attachments. This makes it possible for unauthenticated attackers to read arbitrary local files and exfiltrate them via booking confirmation email attachments.

Statistics

  • 1 Post

Last activity: 13 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-6320 (HIGH): Path traversal in Salon Booking System – Free (WordPress, ≤10.30.25) enables unauthenticated file reads via booking emails. No patch out yet — disable or restrict plugin use to reduce risk. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 13h ago

Overview

  • InternLM
  • lmdeploy

20 Apr 2026
Published
21 Apr 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
2.92%

KEV

Description

LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal networks, and sensitive resources. Version 0.12.3 patches the issue.

Statistics

  • 1 Post

Last activity: 5 hours ago

Bluesky

Profile picture fallback
AI INFRA UNDER FIRE: CVE-2026-33626 SSRF Exploited in the Wild Within 13 Hours—Is Your LLM Inference Engine the Next Target? + Video Introduction The integration of vision-language models into production workflows has introduced a dangerous Server-Side Request Forgery (SSRF) vulnerability in…
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Shenzhen Libituo Technology
  • LBT-T300-HW1

03 May 2026
Published
03 May 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A vulnerability has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. Impacted is the function start_lan of the file /apply.cgi. The manipulation of the argument Channel/ApCliSsid leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 10 hours ago

Fediverse

Profile picture fallback

🚨 HIGH-severity buffer overflow in Shenzhen Libituo LBT-T300-HW1 (v1.2.0 – 1.2.8). CVE-2026-7675 enables remote code execution — no patch yet. Limit network access & monitor for vendor updates. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 10h ago

Overview

  • unitecms
  • Unlimited Elements For Elementor

17 Apr 2026
Published
17 Apr 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.04%

KEV

Description

The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbitrary File Read via the Repeater JSON/CSV URL parameter in versions up to, and including, 2.0.6. This is due to insufficient path traversal sanitization in the URLtoRelative() and urlToPath() functions, combined with the ability to enable debug output in widget settings. The URLtoRelative() function only performs a simple string replacement to remove the site's base URL without sanitizing path traversal sequences (../), and the cleanPath() function only normalizes directory separators without removing traversal components. This allows an attacker to provide a URL like http://site.com/../../../../etc/passwd which, after URLtoRelative() strips the domain, results in /../../../../etc/passwd being concatenated with the base path and ultimately resolved to /etc/passwd. This makes it possible for authenticated attackers with Author-level access and above to read arbitrary local files from the WordPress host, including sensitive files such as wp-config.

Statistics

  • 1 Post

Last activity: 18 hours ago

Fediverse

Profile picture fallback

CVE-2026-4659: Unlimited Elements plugin <=2.0.6 allows any Author to read arbitrary files via path traversal in URLtoRelative(). No patch exists. Fix your own damn code or pull the plugin. #InfoSec #WordPress

valtersit.com/cve/2026/04/cve-

  • 0
  • 0
  • 0
  • 18h ago

Overview

  • MIT
  • Kerberos 5

28 Apr 2026
Published
28 Apr 2026
Updated

CVSS v3.1
MEDIUM (5.9)
EPSS
0.08%

KEV

Description

In MIT Kerberos 5 (aka krb5) before 1.22.3, there is a NULL pointer dereference if an application calls gss_accept_sec_context() on a system with a NegoEx mechanism registered in /etc/gss/mech. An unauthenticated remote attacker can trigger this, causing the process to terminate in parse_nego_message.

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture fallback
Fedora sysadmins: Two Kerberos flaws (CVE-2026-40355/40356) can crash your authentication services. I've posted the complete guide – includes a fix script and firewall workarounds. Read more-> tinyurl.com/3jz38jwz #Fedora
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Shenzhen Libituo Technology
  • LBT-T300-HW1

03 May 2026
Published
03 May 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A flaw has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. This issue affects the function start_single_service of the component Web Management Interface. Executing a manipulation of the argument vpn_pptp_server/vpn_l2tp_server can lead to buffer overflow. The attack can be executed remotely. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 11 hours ago

Fediverse

Profile picture fallback

🔎 HIGH-severity (CVSS 8.7) buffer overflow in Shenzhen Libituo LBT-T300-HW1 (v1.2.0 – 1.2.8), CVE-2026-7674. Web Management Interface at risk, remote exploit possible. No patch yet — restrict access & stay alert. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Linux
  • Linux

01 May 2026
Published
03 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.01%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption When decrypting data that is not in-place (src != dst), there is no need to save the high-order sequence bits in dst as it could simply be re-copied from the source. However, the data to be hashed need to be rearranged accordingly. Thanks,

Statistics

  • 1 Post

Last activity: 19 hours ago

Bluesky

Profile picture fallback
Linux kernel LPE & DoS vulnerabilities (CVE-2026-31431 / CVE-2026-43033) affect #Debian 11 Bullseye. Detection commands, full fix script, and temporary mitigations inside. Update to kernel 5.10.251-3. 🛡️ Full guide & script Read more- > tinyurl.com/yfpvfpa8 #Security
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • VetCoders
  • mcp-server-semgrep

30 Apr 2026
Published
30 Apr 2026
Updated

CVSS v4.0
MEDIUM (6.9)
EPSS
1.07%

KEV

Description

A vulnerability was detected in VetCoders mcp-server-semgrep 1.0.0. This affects the function analyze_results/filter_results/export_results/compare_results/scan_directory/create_rule of the file src/index.ts of the component MCP Interface. The manipulation of the argument ID results in os command injection. The attack can be executed remotely. The exploit is now public and may be used. Upgrading to version 1.0.1 is able to mitigate this issue. The patch is identified as 141335da044e53c3f5b315e0386e01238405b771. It is advisable to upgrade the affected component.

Statistics

  • 1 Post

Last activity: 17 hours ago

Fediverse

Profile picture fallback

Command injection in MCP servers. Not surprised. CVE-2026-7446 hits mcp-server-semgrep, and CVE-2026-7416 hits xcode-mcp-server.

Both let remote attackers inject OS commands with no auth needed. The attack surface on MCP servers keeps growing, and most of these community-built tools were never designed with security in mind. mcp-server-semgrep has a fix in v1.0.1, but who's checking their MCP server versions? Nobody. That's the problem.

nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 0
  • 0
  • 17h ago

Overview

  • PolarVista
  • xcode-mcp-server

29 Apr 2026
Published
30 Apr 2026
Updated

CVSS v4.0
MEDIUM (6.9)
EPSS
0.25%

KEV

Description

A vulnerability was found in PolarVista xcode-mcp-server 1.0.0. This issue affects the function build_project/run_tests of the file src/index.ts of the component MCP Interface. The manipulation of the argument Request results in os command injection. The attack may be launched remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Statistics

  • 1 Post

Last activity: 17 hours ago

Fediverse

Profile picture fallback

Command injection in MCP servers. Not surprised. CVE-2026-7446 hits mcp-server-semgrep, and CVE-2026-7416 hits xcode-mcp-server.

Both let remote attackers inject OS commands with no auth needed. The attack surface on MCP servers keeps growing, and most of these community-built tools were never designed with security in mind. mcp-server-semgrep has a fix in v1.0.1, but who's checking their MCP server versions? Nobody. That's the problem.

nvd.nist.gov/vuln/detail/CVE-2

  • 0
  • 0
  • 0
  • 17h ago
Showing 11 to 20 of 20 CVEs