24h | 7d | 30d

Overview

  • ChurchCRM
  • CRM

30 Jan 2026
Published
30 Jan 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.02%

KEV

Description

ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in endpoint `/PaddleNumEditor.php` in ChurchCRM prior to version 6.7.2. Any authenticated user, including one with zero assigned permissions, can exploit SQL injection through the `PerID` parameter. Version 6.7.2 contains a patch for the issue.

Statistics

  • 1 Post

Last activity: 22 hours ago

Fediverse

Profile picture

🟠 CVE-2026-24854 - High (8.8)

ChurchCRM is an open-source church management system. A SQL Injection vulnerability exists in endpoint `/PaddleNumEditor.php` in ChurchCRM prior to version 6.7.2. Any authenticated user, including one with zero assigned permissions, can exploit SQ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 22h ago

Overview

  • discourse
  • discourse

28 Jan 2026
Published
28 Jan 2026
Updated

CVSS v4.0
MEDIUM (6.9)
EPSS
0.03%

KEV

Description

Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, permalinks pointing to access-restricted resources (private topics, categories, posts, or hidden tags) were redirecting users to URLs containing the resource slug, even when the user didn't have access to view the resource. This leaked potentially sensitive information (e.g., private topic titles) via the redirect Location header and the 404 page's search box. This issue is patched in versions 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0. No known workarounds are available.

Statistics

  • 1 Post

Last activity: 16 hours ago

Fediverse

Profile picture

🟠 CVE-2026-23743 - High (7.5)

Discourse is an open source discussion platform. In versions prior to 3.5.4, 2025.11.2, 2025.12.1, and 2026.1.0, permalinks pointing to access-restricted resources (private topics, categories, posts, or hidden tags) were redirecting users to URLs ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

  • 0
  • 0
  • 0
  • 16h ago

Overview

  • curl
  • curl

12 Sep 2025
Published
08 Jan 2026
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path=\"/\",`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.

Statistics

  • 2 Posts

Last activity: 2 hours ago

Bluesky

Profile picture
📌 Security Alert for IT Professionals Rocky Linux has released an important security update for curl (RLSA-2026:1350). This addresses vulnerability CVE-2025-9086 with CVSS score 5.3. Read more: 👉 tinyurl.com/3aun86tk #Security #RockyLinux
  • 0
  • 0
  • 1
  • 2h ago

Overview

  • The GNU C Library
  • glibc

14 Jan 2026
Published
16 Jan 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.

Statistics

  • 1 Post

Last activity: Last hour

Bluesky

Profile picture
🔒 URGENT SYSTEM ADMIN ALERT: Critical glibc security update for Rocky Linux 10 patches two dangerous vulnerabilities (CVE-2026-0861 & CVE-2026-0915). Read more:👉 tinyurl.com/2p8ycrey #Rocky_Linux #Security
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Xen
  • Xen

28 Jan 2026
Published
28 Jan 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

Shadow mode tracing code uses a set of per-CPU variables to avoid cumbersome parameter passing. Some of these variables are written to with guest controlled data, of guest controllable size. That size can be larger than the variable, and bounding of the writes was missing.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture
🚨 Attention System Administrators & DevOps Teams! 🚨 #Mageia has released a critical security update, MGASA-2026-0026, patching two high-severity Xen hypervisor vulnerabilities (CVE-2025-58150 & CVE-2026-23553). Read more: 👉 tinyurl.com/4uc6es63 #Security
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • n8n

18 Jan 2026
Published
23 Jan 2026
Updated

CVSS v3.1
HIGH (8.5)
EPSS
0.06%

KEV

Description

Using string formatting and exception handling, an attacker may bypass n8n's python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system. The vulnerability can be exploited via the Code block by an authenticated user with basic permissions and can lead to a full n8n instance takeover on instances operating under "Internal" execution mode. If the instance is operating under the "External" execution mode (ex. n8n's official Docker image) - arbitrary code execution occurs inside a Sidecar container and not the main node, which significantly reduces the vulnerability impact.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture
Researchers at JFrog who discovered the vulnerabilities assigned a critical severity score of 9.9 for one of them (CVE-2026-1470), and a high severity score of 8.5 to the second (CVE-2026-0863). www.darkreading.com/vulnerab...
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Xen
  • Xen

28 Jan 2026
Published
28 Jan 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

In the context switch logic Xen attempts to skip an IBPB in the case of a vCPU returning to a CPU on which it was the previous vCPU to run. While safe for Xen's isolation between vCPUs, this prevents the guest kernel correctly isolating between tasks. Consider: 1) vCPU runs on CPU A, running task 1. 2) vCPU moves to CPU B, idle gets scheduled on A. Xen skips IBPB. 3) On CPU B, guest kernel switches from task 1 to 2, issuing IBPB. 4) vCPU moves back to CPU A. Xen skips IBPB again. Now, task 2 is running on CPU A with task 1's training still in the BTB.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture
🚨 Attention System Administrators & DevOps Teams! 🚨 #Mageia has released a critical security update, MGASA-2026-0026, patching two high-severity Xen hypervisor vulnerabilities (CVE-2025-58150 & CVE-2026-23553). Read more: 👉 tinyurl.com/4uc6es63 #Security
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • The GNU C Library
  • glibc

15 Jan 2026
Published
20 Jan 2026
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.

Statistics

  • 1 Post

Last activity: Last hour

Bluesky

Profile picture
🔒 URGENT SYSTEM ADMIN ALERT: Critical glibc security update for Rocky Linux 10 patches two dangerous vulnerabilities (CVE-2026-0861 & CVE-2026-0915). Read more:👉 tinyurl.com/2p8ycrey #Rocky_Linux #Security
  • 0
  • 0
  • 0
  • Last hour

Overview

  • n8n

27 Jan 2026
Published
27 Jan 2026
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
0.31%

KEV

Description

n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture
Researchers at JFrog who discovered the vulnerabilities assigned a critical severity score of 9.9 for one of them (CVE-2026-1470), and a high severity score of 8.5 to the second (CVE-2026-0863). www.darkreading.com/vulnerab...
  • 0
  • 0
  • 0
  • 22h ago
Showing 21 to 29 of 29 CVEs