24h | 7d | 30d

Overview

  • Go toolchain
  • cmd/go
  • cmd/go

28 Jan 2026
Published
26 Feb 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a "--log-file" argument to this directive, causing pkg-config to write to an attacker-controlled location.

Statistics

  • 3 Posts

Last activity: 17 hours ago

Bluesky

Profile picture fallback
This addresses the following vulnerabilities: CVE-2025-68119 CVE-2025-61731 CVE-2025-61726 N/A Security fixes for apigee-operators
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-32283 CVE-2026-32281 CVE-2026-32280 CVE-2026-27144 CVE-2026-27143 CVE-2026-27140 CVE-2026-25679 CVE-2025-68119 CVE-2025-61732 CVE-2025-61731 CVE-2025-61726 CVE-2025-47907 CVE-2025-4674 N/A Security fixes for
  • 0
  • 0
  • 1
  • 17h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

10 Feb 2026
Published
10 Apr 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
20.20%

Description

Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture fallback
~Kaspersky~ Q1 2026 exploit volumes surged due to AI discovery, with APTs heavily targeting MS Office, web apps, and AI frameworks. - IOCs: CVE-2026-21514, CVE-2026-25253, CVE-2026-21533 - #APT #ThreatIntel #Vulnerabilities
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • sporkmonger
  • addressable

07 Apr 2026
Published
09 Apr 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.06%

KEV

Description

Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. From 2.3.0 to before 2.9.0, within the URI template implementation in Addressable, two classes of URI template generate regular expressions vulnerable to catastrophic backtracking. Templates using the * (explode) modifier with any expansion operator (e.g., {foo*}, {+var*}, {#var*}, {/var*}, {.var*}, {;var*}, {?var*}, {&var*}) generate patterns with nested unbounded quantifiers that are O(2^n) when matched against a maliciously crafted URI. Templates using multiple variables with the + or # operators (e.g., {+v1,v2,v3}) generate patterns with O(n^k) complexity due to the comma separator being within the matched character class, causing ambiguous backtracking across k variables. When matched against a maliciously crafted URI, this can result in catastrophic backtracking and uncontrolled resource consumption, leading to denial of service. This vulnerability is fixed in 2.9.0.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
apigee-runtime. This addresses the following vulnerabilities: CVE-2026-41316 CVE-2026-35611 CVE-2026-33210 CVE-2026-33176 N/A Security fixes for apigee-synchronizer
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Apache Software Foundation
  • Apache Log4j JSON Template Layout
  • org.apache.logging.log4j:log4j-layout-template-json

10 Apr 2026
Published
10 Apr 2026
Updated

CVSS v4.0
MEDIUM (6.3)
EPSS
0.15%

KEV

Description

Apache Log4j's JsonTemplateLayout https://logging.apache.org/log4j/2.x/manual/json-template-layout.html , in versions up to and including 2.25.3, produces invalid JSON output when log events contain non-finite floating-point values (NaN, Infinity, or -Infinity), which are prohibited by RFC 8259. This may cause downstream log processing systems to reject or fail to index affected records. An attacker can exploit this issue only if both of the following conditions are met: * The application uses JsonTemplateLayout. * The application logs a MapMessage containing an attacker-controlled floating-point value. Users are advised to upgrade to Apache Log4j JSON Template Layout 2.25.4, which corrects this issue.

Statistics

  • 3 Posts

Last activity: 17 hours ago

Bluesky

Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-34481 CVE-2026-34480 CVE-2026-34478 CVE-2026-21932 N/A Security fixes for apigee-open-telemetry-collector
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-34481 CVE-2026-34480 CVE-2026-34478 CVE-2026-21932 CVE-2025-48913 N/A Security fixes for apigee-udca
  • 0
  • 0
  • 1
  • 17h ago

Overview

  • ruby
  • json

20 Mar 2026
Published
23 Mar 2026
Updated

CVSS v4.0
HIGH (8.3)
EPSS
0.04%

KEV

Description

Ruby JSON is a JSON implementation for Ruby. From version 2.14.0 to before versions 2.15.2.1, 2.17.1.2, and 2.19.2, a format string injection vulnerability can lead to denial of service attacks or information disclosure, when the allow_duplicate_key: false parsing option is used to parse user supplied documents. This issue has been patched in versions 2.15.2.1, 2.17.1.2, and 2.19.2.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
apigee-runtime. This addresses the following vulnerabilities: CVE-2026-41316 CVE-2026-35611 CVE-2026-33210 CVE-2026-33176 N/A Security fixes for apigee-synchronizer
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Apache Software Foundation
  • Apache Log4j Core
  • org.apache.logging.log4j:log4j-core

10 Apr 2026
Published
10 Apr 2026
Updated

CVSS v4.0
MEDIUM (6.9)
EPSS
0.15%

KEV

Description

Apache Log4j Core's XmlLayout https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout , in versions up to and including 2.25.3, fails to sanitize characters forbidden by the XML 1.0 specification https://www.w3.org/TR/xml/#charsets producing invalid XML output whenever a log message or MDC value contains such characters. The impact depends on the StAX implementation in use: * JRE built-in StAX: Forbidden characters are silently written to the output, producing malformed XML. Conforming parsers must reject such documents with a fatal error, which may cause downstream log-processing systems to drop the affected records. * Alternative StAX implementations (e.g., Woodstox https://github.com/FasterXML/woodstox , a transitive dependency of the Jackson XML Dataformat module): An exception is thrown during the logging call, and the log event is never delivered to its intended appender, only to Log4j's internal status logger. Users are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue by sanitizing forbidden characters before XML output.

Statistics

  • 3 Posts

Last activity: 17 hours ago

Bluesky

Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-34481 CVE-2026-34480 CVE-2026-34478 CVE-2026-21932 N/A Security fixes for apigee-open-telemetry-collector
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-34481 CVE-2026-34480 CVE-2026-34478 CVE-2026-21932 CVE-2025-48913 N/A Security fixes for apigee-udca
  • 0
  • 0
  • 1
  • 17h ago

Overview

  • rails
  • activesupport

23 Mar 2026
Published
24 Mar 2026
Updated

CVSS v4.0
MEDIUM (6.6)
EPSS
0.02%

KEV

Description

Active Support is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Support number helpers accept strings containing scientific notation (e.g. `1e10000`), which `BigDecimal` expands into extremely large decimal representations. This can cause excessive memory allocation and CPU consumption when the expanded number is formatted, possibly resulting in a DoS vulnerability. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
apigee-runtime. This addresses the following vulnerabilities: CVE-2026-41316 CVE-2026-35611 CVE-2026-33210 CVE-2026-33176 N/A Security fixes for apigee-synchronizer
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Apache Software Foundation
  • Apache Log4j Core
  • org.apache.logging.log4j:log4j-core

10 Apr 2026
Published
10 Apr 2026
Updated

CVSS v4.0
MEDIUM (6.9)
EPSS
0.15%

KEV

Description

Apache Log4j Core's Rfc5424Layout https://logging.apache.org/log4j/2.x/manual/layouts.html#RFC5424Layout , in versions 2.21.0 through 2.25.3, is vulnerable to log injection via CRLF sequences due to undocumented renames of security-relevant configuration attributes. Two distinct issues affect users of stream-based syslog services who configure Rfc5424Layout directly: * The newLineEscape attribute was silently renamed, causing newline escaping to stop working for users of TCP framing (RFC 6587), exposing them to CRLF injection in log output. * The useTlsMessageFormat attribute was silently renamed, causing users of TLS framing (RFC 5425) to be silently downgraded to unframed TCP (RFC 6587), without newline escaping. Users of the SyslogAppender are not affected, as its configuration attributes were not modified. Users are advised to upgrade to Apache Log4j Core 2.25.4, which corrects this issue.

Statistics

  • 3 Posts

Last activity: 17 hours ago

Bluesky

Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-34481 CVE-2026-34480 CVE-2026-34478 CVE-2026-21932 N/A Security fixes for apigee-open-telemetry-collector
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-34481 CVE-2026-34480 CVE-2026-34478 CVE-2026-21932 CVE-2025-48913 N/A Security fixes for apigee-udca
  • 0
  • 0
  • 1
  • 17h ago

Overview

  • Oracle Corporation
  • Oracle Java SE

20 Jan 2026
Published
21 Jan 2026
Updated

CVSS v3.1
HIGH (7.4)
EPSS
0.03%

KEV

Description

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: AWT, JavaFX). Supported versions that are affected are Oracle Java SE: 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK: 17.0.17 and 21.0.9; Oracle GraalVM Enterprise Edition: 21.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 7.4 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N).

Statistics

  • 3 Posts

Last activity: 17 hours ago

Bluesky

Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-34481 CVE-2026-34480 CVE-2026-34478 CVE-2026-21932 N/A Security fixes for apigee-open-telemetry-collector
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
This addresses the following vulnerabilities: CVE-2026-34481 CVE-2026-34480 CVE-2026-34478 CVE-2026-21932 CVE-2025-48913 N/A Security fixes for apigee-udca
  • 0
  • 0
  • 1
  • 17h ago

Overview

  • ruby
  • erb

24 Apr 2026
Published
25 Apr 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.11%

KEV

Description

ERB is a templating system for Ruby. Ruby 2.7.0 (before ERB 2.2.0 was published on rubygems.org) introduced an `@_init` instance variable guard in `ERB#result` and `ERB#run` to prevent code execution when an ERB object is reconstructed via `Marshal.load` (deserialization). However, three other public methods that also evaluate `@src` via `eval()` were not given the same guard: `ERB#def_method`, `ERB#def_module`, and `ERB#def_class`. An attacker who can trigger `Marshal.load` on untrusted data in a Ruby application that has `erb` loaded can use `ERB#def_module` (zero-arg, default parameters) as a code execution sink, bypassing the `@_init` protection entirely. ERB 4.0.3.1, 4.0.4.1, 6.0.1.1, and 6.0.4 patch the issue.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
apigee-runtime. This addresses the following vulnerabilities: CVE-2026-41316 CVE-2026-35611 CVE-2026-33210 CVE-2026-33176 N/A Security fixes for apigee-synchronizer
  • 0
  • 0
  • 0
  • 17h ago
Showing 71 to 80 of 112 CVEs