Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,261
Critical855
High2,811
Medium10,399
Reset
Showing 1821-1840 of 14261 records
Threat Entry Updated 2026-01-15

CVE-2026-0671 - MediaWiki - UploadWizard extension Plugin

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation MediaWiki - UploadWizard extension allows Cross-Site Scripting (XSS).This issue affects MediaWiki - UploadWizard extension: 1.45, 1.44, 1.43, 1.39.

PLUGIN MediaWiki - UploadWizard extension

CVE-2026-0671

MEDIUM CVSS 6.1 2026-01-08
Threat Entry Updated 2026-01-14

CVE-2026-21639 - airFiber AF60 Plugin

A malicious actor in Wi-Fi range of the affected product could leverage a vulnerability in the airMAX Wireless Protocol to achieve a remote code execution (RCE) within the affected product. Affected Products: airMAX AC (Version 8.7.20 and earlier) airMAX M (Version 6.3.22 and earlier) airFiber AF60-XG (Version 1.2.2 and earlier) airFiber AF60 (Version 2.6.7 and earlier) Mitigation: Update your airMAX AC to Version 8.7.21 or later. Update your airMAX M to Version 6.3.24 or later. Update your airFiber AF60-XG to Version 1.2.3 or later. Update your airFiber AF60 to Version…

PLUGIN airFiber AF60

CVE-2026-21639

MEDIUM CVSS 5.4 2026-01-08
Threat Entry Updated 2026-01-08

CVE-2026-22486 - Re Gallery & Responsive Photo Gallery Plugin

Missing Authorization vulnerability in Hakob Re Gallery & Responsive Photo Gallery Plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Re Gallery & Responsive Photo Gallery Plugin: from n/a through 1.17.18.

PLUGIN Re Gallery & Responsive Photo Gallery Plugin

CVE-2026-22486

MEDIUM CVSS 5.3 2026-01-08
Threat Entry Updated 2026-01-08

CVE-2026-22487 - Speed Kit Plugin

Missing Authorization vulnerability in baqend Speed Kit allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Speed Kit: from n/a through 2.0.2.

PLUGIN Speed Kit

CVE-2026-22487

MEDIUM CVSS 4.3 2026-01-08
Threat Entry Updated 2026-01-14

CVE-2026-22255 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a heap-buffer-overflow vulnerability in `CIccCLUT::Init()` at `IccProfLib/IccTagLut.cpp`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-22255

HIGH CVSS 8.8 2026-01-08
Threat Entry Updated 2026-01-15

CVE-2026-22244 - OpenMetadata Plugin

OpenMetadata is a unified metadata platform. Versions prior to 1.11.4 are vulnerable to remote code execution via Server-Side Template Injection (SSTI) in FreeMarker email templates. An attacker must have administrative privileges to exploit the vulnerability. Version 1.11.4 contains a patch.

PLUGIN OpenMetadata

CVE-2026-22244

HIGH CVSS 8.5 2026-01-08
Threat Entry Updated 2026-01-15

CVE-2026-22245 - Mastodon Plugin

Mastodon is a free, open-source social network server based on ActivityPub. By nature, Mastodon performs a lot of outbound requests to user-provided domains. Mastodon, however, has some protection mechanism to disallow requests to local IP addresses (unless specified in `ALLOWED_PRIVATE_ADDRESSES`) to avoid the "confused deputy" problem. The list of disallowed IP address ranges was lacking some IP address ranges that can be used to reach local IP addresses. An attacker can use an IP address in the affected ranges to make Mastodon perform HTTP requests against loopback or local network…

PLUGIN Mastodon

CVE-2026-22245

HIGH CVSS 7.1 2026-01-08
Threat Entry Updated 2026-01-22

CVE-2026-22246 - Mastodon Plugin

Mastodon is a free, open-source social network server based on ActivityPub. Mastodon 4.3 added notifications of severed relationships, allowing end-users to inspect the relationships they lost as the result of a moderation action. The code allowing users to download lists of severed relationships for a particular event fails to check the owner of the list before returning the lost relationships. Any registered local user can access the list of lost followers and followed users caused by any severance event, and go through all severance events this way. The leaked information…

PLUGIN Mastodon

CVE-2026-22246

MEDIUM CVSS 6.5 2026-01-08
Threat Entry Updated 2026-01-08

CVE-2026-22034 - Snuffleupagus Plugin

Snuffleupagus is a module that raises the cost of attacks against website by killing bug classes and providing a virtual patching system. On deployments of Snuffleupagus prior to version 0.13.0 with the non-default upload validation feature enabled and configured to use one of the upstream validation scripts based on Vulcan Logic Disassembler (VLD) while the VLD extension is not available to the CLI SAPI, all files from multipart POST requests are evaluated as PHP code. The issue was fixed in version 0.13.0.

PLUGIN Snuffleupagus

CVE-2026-22034

CRITICAL CVSS 9.2 2026-01-08
Threat Entry Updated 2026-01-23

CVE-2026-22241 - Openeclass Plugin

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an arbitrary file upload vulnerability in the theme import functionality enables an attacker with administrative privileges to upload arbitrary files on the server's file system. The main cause of the issue is that no validation or sanitization of the file's present inside the zip archive. This leads to remote code execution on the web server. Version 4.2 patches the issue.

PLUGIN Openeclass

CVE-2026-22241

HIGH CVSS 7.3 2026-01-08
Threat Entry Updated 2026-01-15

CVE-2026-22043 - Rustfs Plugin

RustFS is a distributed object storage system built in Rust. In versions 1.0.0-alpha.13 through 1.0.0-alpha.78, a flawed `deny_only` short-circuit in RustFS IAM allows a restricted service account or STS credential to self-issue an unrestricted service account, inheriting the parent’s full privileges. This enables privilege escalation and bypass of session/inline policy restrictions. Version 1.0.0-alpha.79 fixes the issue.

PLUGIN Rustfs

CVE-2026-22043

MEDIUM CVSS 5.7 2026-01-08
Threat Entry Updated 2026-01-15

CVE-2026-22042 - Rustfs Plugin

RustFS is a distributed object storage system built in Rust. Prior to version 1.0.0-alpha.79, he `ImportIam` admin API validates permissions using `ExportIAMAction` instead of `ImportIAMAction`, allowing a principal with export-only IAM permissions to perform import operations. Since importing IAM data performs privileged write actions (creating/updating users, groups, policies, and service accounts), this can lead to unauthorized IAM modification and privilege escalation. Version 1.0.0-alpha.79 fixes the issue.

PLUGIN Rustfs

CVE-2026-22042

MEDIUM CVSS 5.7 2026-01-08
Threat Entry Updated 2026-01-20

CVE-2026-22032 - Directus Plugin

Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 11.14.0, an open redirect vulnerability exists in the Directus SAML authentication callback endpoint. During SAML authentication, the `RelayState` parameter is intended to preserve the user's original destination. However, while the login initiation flow validates redirect targets against allowed domains, this validation is not applied to the callback endpoint. This allows an attacker to craft a malicious authentication request that redirects users to an arbitrary external URL upon completion. The vulnerability is present in both…

PLUGIN Directus

CVE-2026-22032

MEDIUM CVSS 4.3 2026-01-08
Threat Entry Updated 2026-01-12

CVE-2026-22041 - Loggingredactor Plugin

Logging Redactor is a Python library designed to redact sensitive data in logs based on regex patterns and / or dictionary keys. Prior to version 0.0.6, non-string types are converted into string types, leading to type errors in %d conversions. The problem has been patched in version 0.0.6. No known workarounds are available.

PLUGIN Loggingredactor

CVE-2026-22041

LOW CVSS 2.0 2026-01-08
Threat Entry Updated 2026-01-12

CVE-2026-22028 - Preact Plugin

Preact, a lightweight web development framework, JSON serialization protection to prevent Virtual DOM elements from being constructed from arbitrary JSON. A regression introduced in Preact 10.26.5 caused this protection to be softened. In applications where values from JSON payloads are assumed to be strings and passed unmodified to Preact as children, a specially-crafted JSON payload could be constructed that would be incorrectly treated as a valid VNode. When this chain of failures occurs it can result in HTML injection, which can allow arbitrary script execution if not mitigated by CSP…

PLUGIN Preact

CVE-2026-22028

HIGH CVSS 7.2 2026-01-08
Threat Entry Updated 2026-01-12

CVE-2026-21891 - ZimaOS Plugin

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In versions up to and including 1.5.0, the application checks the validity of the username but appears to skip, misinterpret, or incorrectly validate the password when the provided username matches a known system service account. The application's login function fails to properly handle the password validation result for these users, effectively granting authenticated access to anyone who knows one of these common usernames and provides any password. As of time of publication, no…

PLUGIN ZimaOS

CVE-2026-21891

CRITICAL CVSS 9.4 2026-01-08
Threat Entry Updated 2026-02-23

CVE-2026-21876 - Coreruleset Plugin

The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 4.22.0 and 3.3.8, the current rule 922110 has a bug when processing multipart requests with multiple parts. When the first rule in a chain iterates over a collection (like `MULTIPART_PART_HEADERS`), the capture variables (`TX:0`, `TX:1`) get overwritten with each iteration. Only the last captured value is available to the chained rule, which means malicious charsets in earlier parts can be missed if a later part has…

PLUGIN Coreruleset

CVE-2026-21876

CRITICAL CVSS 9.3 2026-01-08
Threat Entry Updated 2026-01-12

CVE-2026-21885 - V2 Plugin

Miniflux 2 is an open source feed reader. Prior to version 2.2.16, Miniflux's media proxy endpoint (`GET /proxy/{encodedDigest}/{encodedURL}`) can be abused to perform Server-Side Request Forgery (SSRF). An authenticated user can cause Miniflux to generate a signed proxy URL for attacker-chosen media URLs embedded in feed entry content, including internal addresses (e.g., localhost, private RFC1918 ranges, or link-local metadata endpoints). Requesting the resulting `/proxy/...` URL makes Miniflux fetch and return the internal response. Version 2.2.16 fixes the issue.

PLUGIN V2

CVE-2026-21885

MEDIUM CVSS 6.5 2026-01-08
Threat Entry Updated 2026-01-20

CVE-2026-21892 - Parsl Plugin

Parsl is a Python parallel scripting library. A SQL Injection vulnerability exists in the parsl-visualize component of versions prior to 2026.01.05. The application constructs SQL queries using unsafe string formatting (Python % operator) with user-supplied input (workflow_id) directly from URL routes. This allows an unauthenticated attacker with access to the visualization dashboard to inject arbitrary SQL commands, potentially leading to data exfiltration or denial of service against the monitoring database. Version 2026.01.05 fixes the issue.

PLUGIN Parsl

CVE-2026-21892

MEDIUM CVSS 5.3 2026-01-08
Threat Entry Updated 2026-01-08

CVE-2026-21895 - RSA Plugin

The `rsa` crate is an RSA implementation written in rust. Prior to version 0.9.10, when creating a RSA private key from its components, the construction panics instead of returning an error when one of the primes is `1`. Version 0.9.10 fixes the issue.

PLUGIN RSA

CVE-2026-21895

LOW CVSS 2.7 2026-01-08
Scroll to top