24h | 7d | 30d

Overview

  • OneUptime
  • oneuptime

10 Mar 2026
Published
10 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
Pending

KEV

Description

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, a low‑privileged user can bypass authorization and tenant isolation in OneUptime v10.0.20 and earlier by sending a forged is-multi-tenant-query header together with a controlled projectid header. Because the server trusts this client-supplied header, internal permission checks in BasePermission are skipped and tenant scoping is disabled. This allows attackers to access project data belonging to other tenants, read sensitive User fields via nested relations, leak plaintext resetPasswordToken, and reset the victim’s password and fully take over the account. This results in cross‑tenant data exposure and full account takeover. This vulnerability is fixed in 10.0.21.

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-30956 - OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, a low‑privileged user can bypass authorization and tenant isola... https://www.cyberhub.blog/cves/CVE-2026-30956
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • parse-community
  • parse-server

07 Mar 2026
Published
09 Mar 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.07%

KEV

Description

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.10 and 9.5.0-alpha.11, the Google, Apple, and Facebook authentication adapters use JWT verification to validate identity tokens. When the adapter's audience configuration option is not set (clientId for Google/Apple, appIds for Facebook), JWT verification silently skips audience claim validation. This allows an attacker to use a validly signed JWT issued for a different application to authenticate as any user on the target Parse Server. This issue has been patched in versions 8.6.10 and 9.5.0-alpha.11.

Statistics

  • 1 Post

Last activity: 14 hours ago

Bluesky

Profile picture fallback
CVE-2026-30863 - Parse Server: JWT audience validation bypass in Google, Apple, and Facebook authentication adapters scq.ms/4cA5zRU
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • grafana
  • grafana

07 Dec 2021
Published
21 Oct 2025
Updated

CVSS v3.1
HIGH (7.5)
EPSS
97.50%

Description

Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture fallback
[Kubernetes for Everyone] — Exploiting Grafana (CVE-2021-43798) To Gain SSH Access and Extract… https://meetcyber.net/kubernetes-for-everyone-exploiting-grafana-cve-2021-43798-to-gain-ssh-access-and-extract-c3f02bb2ff8b?source=rss------bug_bounty-5
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • undici
  • undici
  • undici

12 Mar 2026
Published
12 Mar 2026
Updated

CVSS v3.1
MEDIUM (6.5)
EPSS
Pending

KEV

Description

Undici allows duplicate HTTP Content-Length headers when they are provided in an array with case-variant names (e.g., Content-Length and content-length). This produces malformed HTTP/1.1 requests with multiple conflicting Content-Length values on the wire. Who is impacted: * Applications using undici.request(), undici.Client, or similar low-level APIs with headers passed as flat arrays * Applications that accept user-controlled header names without case-normalization Potential consequences: * Denial of Service: Strict HTTP parsers (proxies, servers) will reject requests with duplicate Content-Length headers (400 Bad Request) * HTTP Request Smuggling: In deployments where an intermediary and backend interpret duplicate headers inconsistently (e.g., one uses the first value, the other uses the last), this can enable request smuggling attacks leading to ACL bypass, cache poisoning, or credential hijacking

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
🚨 Medium-severity security fix in undici@7.24.0 just released! Patches CVE-2026-1525 — vulnerable to Inconsistent interpretation of HTTP requests (request/response smuggling class issue). github.com/nodejs/undic...
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • undici
  • undici
  • undici

12 Mar 2026
Published
12 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
Pending

KEV

Description

The undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consumption during permessage-deflate decompression. When a WebSocket connection negotiates the permessage-deflate extension, the client decompresses incoming compressed frames without enforcing any limit on the decompressed data size. A malicious WebSocket server can send a small compressed frame (a "decompression bomb") that expands to an extremely large size in memory, causing the Node.js process to exhaust available memory and crash or become unresponsive. The vulnerability exists in the PerMessageDeflate.decompress() method, which accumulates all decompressed chunks in memory and concatenates them into a single Buffer without checking whether the total size exceeds a safe threshold.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
🚨 High-severity security fix in undici@7.24.0 just released! Patches CVE-2026-1526 — vulnerable to Unbounded memory consumption in WebSocket permessage-deflate decompression. github.com/nodejs/undic...
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • ellite
  • Wallos

07 Mar 2026
Published
09 Mar 2026
Updated

CVSS v3.0
HIGH (8.8)
EPSS
0.04%

KEV

Description

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, there is a server-side request forgery vulnerability in notification testers. This issue has been patched in version 4.6.2.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture fallback
CVE-2026-30840 - Wallos: Server-Side Request Forgery (SSRF) in Notification Testers scq.ms/4sxoKAl
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

10 Mar 2026
Published
12 Mar 2026
Updated

CVSS v3.1
HIGH (7.0)
EPSS
Pending

KEV

Description

Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-23668 - Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attac... https://www.cyberhub.blog/cves/CVE-2026-23668
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Cisco
  • Cisco IOS XR Software

11 Mar 2026
Published
12 Mar 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
Pending

KEV

Description

A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker with a low-privileged account could exploit this vulnerability by using crafted commands at the prompt. A successful exploit could allow the attacker to elevate privileges to root and execute arbitrary commands on the underlying operating system.

Statistics

  • 2 Posts

Last activity: 12 hours ago

Bluesky

Profile picture fallback
The most severe of these issues are CVE-2026-20040 and CVE-2026-20046 (CVSS score of 8.8), two bugs that could be exploited to execute arbitrary commands as root or gain administrative control of a device. www.securityweek.com/cisco-patche...
  • 0
  • 0
  • 1
  • 12h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 6
  • busybox

11 Feb 2026
Published
26 Feb 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A flaw was found in BusyBox. This vulnerability allows an attacker to modify files outside of the intended extraction directory by crafting a malicious tar archive containing unvalidated hardlink or symlink entries. If the tar archive is extracted with elevated privileges, this flaw can lead to privilege escalation, enabling an attacker to gain unauthorized access to critical system files.

Statistics

  • 1 Post

Last activity: 12 hours ago

Bluesky

Profile picture fallback
Critical #SUSE BusyBox update out now! Eight vulnerabilities patched including two severe TAR flaws (CVE-2026-26157, CVE-2026-26158) allowing code execution and privilege escalation. Read more: 👉 tinyurl.com/53bppetc #Security #openSUSE
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Cisco
  • Cisco IOS XR Software

11 Mar 2026
Published
12 Mar 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
Pending

KEV

Description

A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local attacker to elevate privileges and gain full administrative control of an affected device. This vulnerability is due to incorrect mapping of a command to task groups within the source code. An attacker with a low-privileged account could exploit this vulnerability by using the CLI command to bypass the task group&ndash;based checks. A successful exploit could allow the attacker to elevate privileges and perform actions on an affected device without authorization checks.

Statistics

  • 2 Posts

Last activity: 12 hours ago

Bluesky

Profile picture fallback
The most severe of these issues are CVE-2026-20040 and CVE-2026-20046 (CVSS score of 8.8), two bugs that could be exploited to execute arbitrary commands as root or gain administrative control of a device. www.securityweek.com/cisco-patche...
  • 0
  • 0
  • 1
  • 12h ago
Showing 71 to 80 of 86 CVEs