24h | 7d | 30d

Overview

  • D-Link
  • DI-8100

05 May 2026
Published
05 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

A weakness has been identified in D-Link DI-8100 16.07.26A1. Affected is the function sprintf of the file /auto_reboot.asp of the component HTTP Handler. This manipulation of the argument enable/time causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.

Statistics

  • 1 Post

Last activity: 1 hour ago

Fediverse

Profile picture fallback

CVE-2026-7853: CRITICAL buffer overflow in D-Link DI-8100 (16.07.26A1) via /auto_reboot.asp. Remote attackers can execute code or DoS; public exploit available. Restrict access & monitor! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 1h ago

Overview

  • dataease
  • SQLBot

05 May 2026
Published
05 May 2026
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
Pending

KEV

Description

SQLBot is an intelligent Text-to-SQL system based on large language models and RAG. In versions 1.7.0 and earlier, the Text2SQL chat interface is vulnerable to prompt injection. The user-provided question parameter is directly concatenated into the LLM prompt without filtering or escaping, and the SQL extracted from the LLM response is executed against the database without validation or sanitization. An authenticated attacker can craft a malicious question to manipulate the LLM into generating and executing arbitrary SQL statements. When connected to a PostgreSQL data source, this can lead to remote code execution via COPY FROM PROGRAM. This issue has been fixed in version 1.7.1.

Statistics

  • 1 Post

Last activity: 7 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL: dataease SQLBot <1.7.1 (CVE-2026-33324) is vulnerable to SQL injection via prompt injection. Authenticated users can trigger RCE on PostgreSQL. Upgrade to 1.7.1+ now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 7h ago

Overview

  • redis
  • redis

05 May 2026
Published
06 May 2026
Updated

CVSS v4.0
HIGH (7.7)
EPSS
Pending

KEV

Description

Redis is an in-memory data structure store. In versions of redis-server up to 8.6.3, the RESTORE command does not properly validate serialized values. An authenticated attacker with permission to execute RESTORE can supply a crafted serialized payload that triggers invalid memory access and may lead to remote code execution. A workaround is to restrict access to the RESTORE command with ACL rules. This is patched in version 8.6.3.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 18 hours ago

Fediverse

Profile picture fallback

RE: mastodon.kodesumber.com/@redis

Yang punya redis, ada security patch buat CVE-2026-25243 dan CVE-2026-23479.

#redis #cve #infosec

  • 1
  • 1
  • 0
  • 18h ago

Overview

  • redis
  • redis

05 May 2026
Published
06 May 2026
Updated

CVSS v4.0
HIGH (7.7)
EPSS
Pending

KEV

Description

Redis is an in-memory data structure store. In redis-server from 7.2.0 until 8.6.3, the unblock client flow does not handle an error return from `processCommandAndResetClient` when re-executing a blocked command. If a blocked client is evicted during this flow, an authenticated attacker can trigger a use-after-free that may lead to remote code execution. This has been patched in version 8.6.3.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 18 hours ago

Fediverse

Profile picture fallback

RE: mastodon.kodesumber.com/@redis

Yang punya redis, ada security patch buat CVE-2026-25243 dan CVE-2026-23479.

#redis #cve #infosec

  • 1
  • 1
  • 0
  • 18h ago

Overview

  • Progress Software
  • MOVEit Automation

30 Apr 2026
Published
01 May 2026
Updated

CVSS v3.1
HIGH (7.7)
EPSS
0.10%

KEV

Description

Improper input validation vulnerability in Progress Software MOVEit Automation allows Privilege Escalation. This issue affects MOVEit Automation: from 2025.1.0 before 2025.1.5, from 2025.0.0 before 2025.0.9, from 2024.0.0 before 2024.1.8, versions prior to 2024.0.0.

Statistics

  • 1 Post

Last activity: 5 hours ago

Bluesky

Profile picture fallback
Critical 98 MOVEit Automation Flaw Opens Enterprise File Transfer Systems to Unauthenticated Takeover + Video Introduction: A critical authentication bypass vulnerability (CVE-2026-4670, CVSS 9.8) and a high-severity privilege escalation flaw (CVE-2026-5174, CVSS 7.7) have been disclosed in…
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Ollama
  • Ollama

29 Apr 2026
Published
29 Apr 2026
Updated

CVSS v4.0
HIGH (7.7)
EPSS
0.04%

KEV

Description

Ollama for Windows contains a Remote Code Execution vulnerability in its update mechanism due to improper handling of attacker‑controlled HTTP response headers. When downloading updates, the application constructs local file paths using values derived from HTTP headers without validation. These values are passed directly to filepath.Join, allowing path traversal sequences (../) to be resolved and enabling files to be written outside the intended update staging directory. An attacker who can influence update responses can exploit this flaw to write arbitrary executables to attacker‑chosen locations accessible to the current user, including the Windows Startup directory. This allows execution of arbitrary executables. Critically, when chained with CVE‑2026‑42248 (Missing Signature Verification for Updates), an attacker can deliver malicious payloads that are written to sensitive locations and executed automatically. Because Ollama for Windows performs silent automatic updates and executes staged binaries without user interaction, this results in automatic and persistent code execution without user awareness. Maintainers of this project were notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Versions from 0.12.10 to 0.17.5 were tested and confirmed as vulnerable, other versions were not tested but might also be vulnerable.

Statistics

  • 1 Post

Last activity: 17 hours ago

Overview

  • Progress
  • ShareFile Storage Zones Controller

02 Apr 2026
Published
03 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.72%

KEV

Description

Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture fallback
~Watchtowr~ A pre-auth RCE chain in Progress ShareFile Storage Zone Controller allows full system compromise. - IOCs: CVE-2026-2699, CVE-2026-2701 - #RCE #ShareFile #ThreatIntel
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Ollama
  • Ollama

29 Apr 2026
Published
29 Apr 2026
Updated

CVSS v4.0
HIGH (7.7)
EPSS
0.01%

KEV

Description

Ollama for Windows does not perform integrity or authenticity verification of downloaded update executables. Unlike other platforms, the Windows implementation of the update verification routine unconditionally returns success so no digital signature or trust validation is performed before staging or executing update payloads, enabling attacker‑supplied executables to be accepted and later executed by the application. Critically, Ollama for Windows performs silent automatic updates, so the malicious payload may be installed automatically without user awareness. Maintainers of this project were notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Versions from 0.12.10 to 0.17.5 were tested and confirmed as vulnerable, other versions were not tested but might also be vulnerable.

Statistics

  • 1 Post

Last activity: 17 hours ago

Overview

  • Progress
  • ShareFile Storage Zones Controller

02 Apr 2026
Published
08 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
25.26%

KEV

Description

Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture fallback
~Watchtowr~ A pre-auth RCE chain in Progress ShareFile Storage Zone Controller allows full system compromise. - IOCs: CVE-2026-2699, CVE-2026-2701 - #RCE #ShareFile #ThreatIntel
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • CODESYS
  • Control RTE (SL)

04 Aug 2025
Published
04 Aug 2025
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.15%

KEV

Description

An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition.

Statistics

  • 1 Post

Last activity: 1 hour ago

Fediverse

Profile picture fallback

VDE-2026-005
ifm: Multiple Vulnerabilities in CR3171

The Firmware installed on the CR3171 is impacted by various CODESYS vulnerabilities.
CVE-2025-41659, CVE-2025-41691, CVE-2025-41658

certvde.com/en/advisories/vde-

ifm.csaf-tp.certvde.com/.well-

  • 0
  • 0
  • 0
  • 1h ago
Showing 31 to 40 of 51 CVEs