Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,261
Critical855
High2,811
Medium10,399
Reset
Showing 1361-1380 of 14261 records
Threat Entry Updated 2026-01-20

CVE-2026-22853 - FreeRDP Plugin

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, RDPEAR’s NDR array reader does not perform bounds checking on the on‑wire element count and can write past the heap buffer allocated from hints, causing a heap buffer overflow in ndr_read_uint8Array. This vulnerability is fixed in 3.20.1.

PLUGIN FreeRDP

CVE-2026-22853

MEDIUM CVSS 6.8 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22852 - FreeRDP Plugin

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a malicious RDP server can trigger a heap-buffer-overflow write in the FreeRDP client when processing Audio Input (AUDIN) format lists. audin_process_formats reuses callback->formats_count across multiple MSG_SNDIN_FORMATS PDUs and writes past the newly allocated formats array, causing memory corruption and a crash. This vulnerability is fixed in 3.20.1.

PLUGIN FreeRDP

CVE-2026-22852

MEDIUM CVSS 6.8 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22819 - Outray Plugin

Outray openSource ngrok alternative. Prior to 0.1.5, this vulnerability allows a user i.e a free plan user to get more than the desired subdomains due to lack of db transaction lock mechanisms in main/apps/web/src/routes/api/$orgSlug/subdomains/index.ts. This vulnerability is fixed in 0.1.5.

PLUGIN Outray

CVE-2026-22819

MEDIUM CVSS 5.9 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22787 - html2pdf.js Plugin

html2pdf.js converts any webpage or element into a printable PDF entirely client-side. Prior to 0.14.0, html2pdf.js contains a cross-site scripting (XSS) vulnerability when given a text source rather than an element. This text is not sufficiently sanitized before being attached to the DOM, allowing malicious scripts to be run on the client browser and risking the confidentiality, integrity, and availability of the page's data. This vulnerability has been fixed in html2pdf.js@0.14.0.

PLUGIN html2pdf.js

CVE-2026-22787

HIGH CVSS 8.7 2026-01-14
Threat Entry Updated 2026-01-22

CVE-2026-22779 - BlackSheep Plugin

BlackSheep is an asynchronous web framework to build event based web applications with Python. Prior to 2.4.6, the HTTP Client implementation in BlackSheep is vulnerable to CRLF injection. Missing headers validation makes it possible for an attacker to modify the HTTP requests (e.g. insert a new header) or even create a new HTTP request. Exploitation requires developers to pass unsanitized user input directly into headers.The server part is not affected because BlackSheep delegates to an underlying ASGI server handling of response headers. This vulnerability is fixed in 2.4.6.

PLUGIN BlackSheep

CVE-2026-22779

MEDIUM CVSS 6.3 2026-01-14
Threat Entry Updated 2026-02-03

CVE-2026-22708 - Cursor Plugin

Cursor is a code editor built for programming with AI. Prior to 2.3, hen the Cursor Agent is running in Auto-Run Mode with Allowlist mode enabled, certain shell built-ins can still be executed without appearing in the allowlist and without requiring user approval. This allows an attacker via indirect or direct prompt injection to poison the shell environment by setting, modifying, or removing environment variables that influence trusted commands. This vulnerability is fixed in 2.3.

PLUGIN Cursor

CVE-2026-22708

HIGH CVSS 7.2 2026-01-14
Threat Entry Updated 2026-01-16

CVE-2026-22694 - Aliasvault Plugin

AliasVault is a privacy-first password manager with built-in email aliasing. AliasVault Android versions 0.24.0 through 0.25.2 contained an issue in how passkey requests from Android apps were validated. Under certain local conditions, a malicious app could attempt to obtain a passkey response for a site it was not authorized to access. The issue involved incomplete validation of calling app identity, origin, and RP ID in the Android credential provider. This issue was fixed in AliasVault Android 0.25.3.

PLUGIN Aliasvault

CVE-2026-22694

MEDIUM CVSS 6.1 2026-01-14
Threat Entry Updated 2026-01-23

CVE-2026-21889 - Weblate Plugin

Weblate is a web based localization tool. Prior to 5.15.2, the screenshot images were served directly by the HTTP server without proper access control. This could allow an unauthenticated user to access screenshots after guessing their filename. This vulnerability is fixed in 5.15.2.

PLUGIN Weblate

CVE-2026-21889

LOW CVSS 2.3 2026-01-14
Threat Entry Updated 2026-01-14

CVE-2026-22211 - TinyOS Plugin

TinyOS versions up to and including 2.1.2 contain a global buffer overflow vulnerability in the printfUART formatted output implementation used within the ZigBee / IEEE 802.15.4 networking stack. The implementation formats output into a fixed-size global buffer and concatenates strings for %s format specifiers using strcat() without verifying remaining buffer capacity. When printfUART is invoked with a caller-controlled string longer than the available space, the unbounded sprintf/strcat sequence writes past the end of debugbuf, resulting in global memory corruption. This can cause denial of service, unintended behavior, or information disclosure…

PLUGIN TinyOS

CVE-2026-22211

MEDIUM CVSS 5.1 2026-01-14
Threat Entry Updated 2026-02-02

CVE-2026-22240 - BLUVOYIX Plugin

The vulnerability exists in BLUVOYIX due to an improper password storage implementation and subsequent exposure via unauthenticated APIs. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable users API to retrieve the plaintext passwords of all user users. Successful exploitation of this vulnerability could allow the attacker to gain full access to customers' data and completely compromise the targeted platform by logging in using an exposed admin email address and password.

PLUGIN BLUVOYIX

CVE-2026-22240

CRITICAL CVSS 10.0 2026-01-14
Threat Entry Updated 2026-02-02

CVE-2026-22239 - BLUVOYIX Plugin

The vulnerability exists in BLUVOYIX due to design flaws in the email sending API. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable email sending API. Successful exploitation of this vulnerability could allow the attacker to send unsolicited emails to anyone on behalf of the company.

PLUGIN BLUVOYIX

CVE-2026-22239

CRITICAL CVSS 10.0 2026-01-14
Threat Entry Updated 2026-02-02

CVE-2026-22238 - BLUVOYIX Plugin

The vulnerability exists in BLUVOYIX due to improper authentication in the BLUVOYIX admin APIs. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable admin API to create a new user with admin privileges. Successful exploitation of this vulnerability could allow the attacker to gain full access to customers' data and completely compromise the targeted platform by logging in to the newly-created admin user.

PLUGIN BLUVOYIX

CVE-2026-22238

CRITICAL CVSS 10.0 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22820 - Outray Plugin

Outray openSource ngrok alternative. Prior to 0.1.5, a TOCTOU race condition vulnerability allows a user to exceed the set number of active tunnels in their subscription plan. This vulnerability is fixed in 0.1.5.

PLUGIN Outray

CVE-2026-22820

MEDIUM CVSS 6.3 2026-01-14
Threat Entry Updated 2026-02-02

CVE-2026-22237 - BLUVOYIX Plugin

The vulnerability exists in BLUVOYIX due to the exposure of sensitive internal API documentation. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the APIs exposed by the documentation. Successful exploitation of this vulnerability could allow the attacker to cause damage to the targeted platform by abusing internal functionality.

PLUGIN BLUVOYIX

CVE-2026-22237

CRITICAL CVSS 10.0 2026-01-14
Threat Entry Updated 2026-02-02

CVE-2026-22236 - BLUVOYIX Plugin

The vulnerability exists in BLUVOYIX due to improper authentication in the BLUVOYIX backend APIs. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable APIs. Successful exploitation of this vulnerability could allow the attacker to gain full access to customers' data and completely compromise the targeted platform.

PLUGIN BLUVOYIX

CVE-2026-22236

CRITICAL CVSS 10.0 2026-01-14
Threat Entry Updated 2026-01-14

CVE-2026-0532 - Kibana Plugin

External Control of File Name or Path (CWE-73) combined with Server-Side Request Forgery (CWE-918) can allow an attacker to cause arbitrary file disclosure through a specially crafted credentials JSON payload in the Google Gemini connector configuration. This requires an attacker to have authenticated access with privileges sufficient to create or modify connectors (Alerts & Connectors: All). The server processes a configuration without proper validation, allowing for arbitrary network requests and for arbitrary file reads.

PLUGIN Kibana

CVE-2026-0532

HIGH CVSS 8.6 2026-01-14
Threat Entry Updated 2026-01-14

CVE-2026-0529 - Packetbeat Plugin

Improper Validation of Array Index (CWE-129) in Packetbeat’s MongoDB protocol parser can allow an attacker to cause Overflow Buffers (CAPEC-100) through specially crafted network traffic. This requires an attacker to send a malformed payload to a monitored network interface where MongoDB protocol parsing is enabled.

PLUGIN Packetbeat

CVE-2026-0529

MEDIUM CVSS 6.5 2026-01-14
Threat Entry Updated 2026-04-15

CVE-2026-0813 - Short Link Plugin

The Short Link plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'short_link_post_title' and 'short_link_page_title' parameters in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected page.

PLUGIN Short Link

CVE-2026-0813

MEDIUM CVSS 4.4 2026-01-14
Threat Entry Updated 2026-04-15

CVE-2026-0812 - Linkedin Sc Plugin

The LinkedIn SC plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'linkedin_sc_date_format', 'linkedin_sc_api_key', and 'linkedin_sc_secret_key' parameters in all versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected page.

PLUGIN Linkedin Sc

CVE-2026-0812

MEDIUM CVSS 4.4 2026-01-14
Scroll to top