24h | 7d | 30d

Overview

  • Linux
  • Linux

14 Feb 2026
Published
03 Apr 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.02%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access at PCM trigger The PCM trigger callback of aloop driver tries to check the PCM state and stop the stream of the tied substream in the corresponding cable. Since both check and stop operations are performed outside the cable lock, this may result in UAF when a program attempts to trigger frequently while opening/closing the tied stream, as spotted by fuzzers. For addressing the UAF, this patch changes two things: - It covers the most of code in loopback_check_format() with cable->lock spinlock, and add the proper NULL checks. This avoids already some racy accesses. - In addition, now we try to check the state of the capture PCM stream that may be stopped in this function, which was the major pain point leading to UAF.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture fallback
Stop chasing kernel CVEs like it's 2026. CVE-2026-23191 (ALSA race) and CVE-2026-23268 (AppArmor bypass) are already patched. But the NEXT one? Read more -> tinyurl.com/2hm6nwnt #SUSE
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

10 Feb 2026
Published
10 Apr 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
3.35%

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to bypass a security feature over a network.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
An incomplete Windows patch for SmartScreen and Shell prompts enabled zero-click attacks using malicious LNK and HTML files, exploited by Russia-linked APT28 via CVE-2026-21513 and CVE-2026-21510. #APT28 #WindowsPatch #Russia
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • netty
  • netty

27 Mar 2026
Published
31 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.01%

KEV

Description

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer encoding extension values, enabling request smuggling attacks. Versions 4.1.132.Final and 4.2.10.Final fix the issue.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-33871 CVE-2026-33870 N/A Security fixes for apigee-open-telemetry-collector
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Moxa
  • EDR-8010 Series

27 Apr 2026
Published
27 Apr 2026
Updated

CVSS v4.0
MEDIUM (6.0)
EPSS
0.04%

KEV

Description

An improper ownership management vulnerability has been identified in Moxa’s Secure Router. Because of improper ownership management, a low-privileged authenticated user may access a configuration file containing the hashed password of the administrative account. Successful exploitation of this vulnerability could allow an attacker to obtain sensitive information. Exploitation is only possible under a specific condition — when the configuration file has been exported. This vulnerability does not impact the integrity or availability of the affected product, and no confidentiality, integrity, or availability impact to the subsequent system has been identified.

Statistics

  • 1 Post

Last activity: 5 hours ago

Bluesky

Profile picture fallback
~Cybergcca~ CCCS issued 9 advisories, highlighting critical flaws in IBM, VMware, and Notepad++. - IOCs: CVE-2026-3867, CVE-2026-3868 - #PatchManagement #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • netty
  • netty

27 Mar 2026
Published
31 Mar 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.02%

KEV

Description

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, a remote user can trigger a Denial of Service (DoS) against a Netty HTTP/2 server by sending a flood of `CONTINUATION` frames. The server's lack of a limit on the number of `CONTINUATION` frames, combined with a bypass of existing size-based mitigations using zero-byte frames, allows an user to cause excessive CPU consumption with minimal bandwidth, rendering the server unresponsive. Versions 4.1.132.Final and 4.2.10.Final fix the issue.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-33871 CVE-2026-33870 N/A Security fixes for apigee-open-telemetry-collector
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Pending

22 Dec 2022
Published
04 Nov 2025
Updated

CVSS
Pending
EPSS
0.51%

KEV

Description

Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
This addresses the following vulnerabilities: CVE-2022-40897 CVE-2023-2976 CVE-2025-47273 451224723, 451224123 Security fixes for apigee-fluent-bit
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • grpc
  • grpc-go

20 Mar 2026
Published
24 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.02%

KEV

Description

gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully routed these requests to the correct handler, authorization interceptors (including the official `grpc/authz` package) evaluated the raw, non-canonical path string. Consequently, "deny" rules defined using canonical paths (starting with `/`) failed to match the incoming request, allowing it to bypass the policy if a fallback "allow" rule was present. This affects gRPC-Go servers that use path-based authorization interceptors, such as the official RBAC implementation in `google.golang.org/grpc/authz` or custom interceptors relying on `info.FullMethod` or `grpc.Method(ctx)`; AND that have a security policy contains specific "deny" rules for canonical paths but allows other requests by default (a fallback "allow" rule). The vulnerability is exploitable by an attacker who can send raw HTTP/2 frames with malformed `:path` headers directly to the gRPC server. The fix in version 1.79.3 ensures that any request with a `:path` that does not start with a leading slash is immediately rejected with a `codes.Unimplemented` error, preventing it from reaching authorization interceptors or handlers with a non-canonical path string. While upgrading is the most secure and recommended path, users can mitigate the vulnerability using one of the following methods: Use a validating interceptor (recommended mitigation); infrastructure-level normalization; and/or policy hardening.

Statistics

  • 5 Posts

Last activity: 2 hours ago

Bluesky

Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-34040 CVE-2026-33186 CVE-2026-24051 N/A Security fixes for apigee-prometheus-adapter. This addresses the following vulnerabilities: CVE-2026-33186 CVE-2026-24051 N/A Security fixes for apigee-redis
  • 0
  • 0
  • 1
  • 2h ago
Profile picture fallback
CVE-2015-0244 CVE-2015-0243 CVE-2015-0241 N/A Security fixes for apigee-udca. This addresses the following vulnerability: CVE-2026-33186 Sidecar authentication for Workload Identity Federation on non-GKE platforms Starting in version v1.14.4, you can now use a sidecar along
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-24051 CVE-2025-61729 CVE-2025-61723 CVE-2025-58188 CVE-2025-58187 CVE-2026-33186 N/A Security fixes for apigee-mint-task-scheduler
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
apigee-asm-ingress. This addresses the following vulnerabilities: CVE-2026-34040 CVE-2026-33186 CVE-2026-24051 CVE-2025-15558 N/A Security fixes for apigee-connect-agent. This addresses the following vulnerabilities: CVE-2026-33186 CVE-2025-68121 CVE-2025-68119
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • pypa
  • setuptools

17 May 2025
Published
28 May 2025
Updated

CVSS v4.0
HIGH (7.7)
EPSS
0.49%

KEV

Description

setuptools is a package that allows users to download, build, install, upgrade, and uninstall Python packages. A path traversal vulnerability in `PackageIndex` is present in setuptools prior to version 78.1.1. An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to remote code execution depending on the context. Version 78.1.1 fixes the issue.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
This addresses the following vulnerabilities: CVE-2022-40897 CVE-2023-2976 CVE-2025-47273 451224723, 451224123 Security fixes for apigee-fluent-bit
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • open-telemetry
  • opentelemetry-go

02 Feb 2026
Published
03 Feb 2026
Updated

CVSS v3.1
HIGH (7.0)
EPSS
0.01%

KEV

Description

OpenTelemetry-Go is the Go implementation of OpenTelemetry. The OpenTelemetry Go SDK in version v1.20.0-1.39.0 is vulnerable to Path Hijacking (Untrusted Search Paths) on macOS/Darwin systems. The resource detection code in sdk/resource/host_id.go executes the ioreg system command using a search path. An attacker with the ability to locally modify the PATH environment variable can achieve Arbitrary Code Execution (ACE) within the context of the application. A fix was released with v1.40.0.

Statistics

  • 4 Posts

Last activity: 2 hours ago

Bluesky

Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-34040 CVE-2026-33186 CVE-2026-24051 N/A Security fixes for apigee-prometheus-adapter. This addresses the following vulnerabilities: CVE-2026-33186 CVE-2026-24051 N/A Security fixes for apigee-redis
  • 0
  • 0
  • 1
  • 2h ago
Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-24051 CVE-2025-61729 CVE-2025-61723 CVE-2025-58188 CVE-2025-58187 CVE-2026-33186 N/A Security fixes for apigee-mint-task-scheduler
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
apigee-asm-ingress. This addresses the following vulnerabilities: CVE-2026-34040 CVE-2026-33186 CVE-2026-24051 CVE-2025-15558 N/A Security fixes for apigee-connect-agent. This addresses the following vulnerabilities: CVE-2026-33186 CVE-2025-68121 CVE-2025-68119
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • moby
  • moby

31 Mar 2026
Published
02 Apr 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.01%

KEV

Description

Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows attackers to bypass authorization plugins (AuthZ). This issue has been patched in version 29.3.1.

Statistics

  • 3 Posts

Last activity: 2 hours ago

Bluesky

Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-34040 CVE-2026-33186 CVE-2026-24051 N/A Security fixes for apigee-prometheus-adapter. This addresses the following vulnerabilities: CVE-2026-33186 CVE-2026-24051 N/A Security fixes for apigee-redis
  • 0
  • 0
  • 1
  • 2h ago
Profile picture fallback
apigee-asm-ingress. This addresses the following vulnerabilities: CVE-2026-34040 CVE-2026-33186 CVE-2026-24051 CVE-2025-15558 N/A Security fixes for apigee-connect-agent. This addresses the following vulnerabilities: CVE-2026-33186 CVE-2025-68121 CVE-2025-68119
  • 0
  • 0
  • 0
  • 2h ago
Showing 31 to 40 of 130 CVEs