Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3,037
Critical0
High3,037
Medium0
Reset
Showing 361-380 of 3037 records
Threat Entry Updated 2026-01-23

CVE-2026-21905 - Junos OS Plugin

A Loop with Unreachable Exit Condition ('Infinite Loop') vulnerability in the SIP application layer gateway (ALG) of Juniper Networks Junos OS on SRX Series and MX Series with MX-SPC3 or MS-MPC allows an unauthenticated network-based attacker sending specific SIP messages over TCP to crash the flow management process, leading to a Denial of Service (DoS). On SRX Series, and MX Series with MX-SPC3 or MS-MPC service cards, receipt of multiple SIP messages causes the SIP headers to be parsed incorrectly, eventually causing a continuous loop and leading to a watchdog…

PLUGIN Junos OS

CVE-2026-21905

HIGH CVSS 8.7 2026-01-15
Threat Entry Updated 2026-01-23

CVE-2026-21903 - Junos OS Plugin

A Stack-based Buffer Overflow vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS allows a network-based attacker, authenticated with low privileges to cause a Denial-of-Service (DoS). Subscribing to telemetry sensors at scale causes all FPC connections to drop, resulting in an FPC crash and restart. The issue was not seen when YANG packages for the specific sensors were installed. This issue affects Junos OS:  * all versions before 22.4R3-S7, * 23.2 version before 23.2R2-S4, * 23.4 versions before 23.4R2.

PLUGIN Junos OS

CVE-2026-21903

HIGH CVSS 7.1 2026-01-15
Threat Entry Updated 2026-01-23

CVE-2026-0203 - Junos OS Plugin

An Improper Handling of Exceptional Conditions vulnerability in packet processing of Juniper Networks Junos OS allows an unauthenticated, network-adjacent attacker sending a specifically malformed ICMP packet to cause an FPC to crash and restart, resulting in a Denial of Service (DoS). When an ICMP packet is received with a specifically malformed IP header value, the FPC receiving the packet crashes and restarts. Due to the specific type of malformed packet, adjacent upstream routers would not forward the packet, limiting the attack surface to adjacent networks. This issue only affects ICMPv4.…

PLUGIN Junos OS

CVE-2026-0203

HIGH CVSS 7.1 2026-01-15
Threat Entry Updated 2026-01-23

CVE-2026-23527 - H3 Plugin

H3 is a minimal H(TTP) framework built for high performance and portability. Prior to 1.15.5, there is a critical HTTP Request Smuggling vulnerability. readRawBody is doing a strict case-sensitive check for the Transfer-Encoding header. It explicitly looks for "chunked", but per the RFC, this header should be case-insensitive. This vulnerability is fixed in 1.15.5.

PLUGIN H3

CVE-2026-23527

HIGH CVSS 8.9 2026-01-15
Threat Entry Updated 2026-01-23

CVE-2026-23519 - Utils Plugin

RustCrypto CMOV provides conditional move CPU intrinsics which are guaranteed on major platforms to execute in constant-time and not be rewritten as branches by the compiler. Prior to 0.4.4, the thumbv6m-none-eabi (Cortex M0, M0+ and M1) compiler emits non-constant time assembly when using cmovnz (portable version). This vulnerability is fixed in 0.4.4.

PLUGIN Utils

CVE-2026-23519

HIGH CVSS 8.9 2026-01-15
Threat Entry Updated 2026-01-28

CVE-2026-23622 - Easyappointments Plugin

Easy!Appointments is a self hosted appointment scheduler. In 1.5.2 and earlier, application/core/EA_Security.php::csrf_verify() only enforces CSRF for POST requests and returns early for non-POST methods. Several application endpoints perform state-changing operations while accepting parameters from GET (or $_REQUEST), so an attacker can perform CSRF by forcing a victim's browser to issue a crafted GET request. Impact: creation of admin accounts, modification of admin email/password, and full admin account takeover.

PLUGIN Easyappointments

CVE-2026-23622

HIGH CVSS 8.7 2026-01-15
Threat Entry Updated 2026-01-21

CVE-2026-22803 - Kit Plugin

SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. From 2.49.0 to 2.49.4, the experimental form remote function uses a binary data format containing a representation of submitted form data. A specially-crafted payload can cause the server to allocate a large amount of memory, causing DoS via memory exhaustion. This vulnerability is fixed in 2.49.5.

PLUGIN Kit

CVE-2026-22803

HIGH CVSS 8.2 2026-01-15
Threat Entry Updated 2026-01-20

CVE-2026-22775 - Devalue Plugin

Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. From 5.1.0 to 5.6.1, certain inputs can cause devalue.parse to consume excessive CPU time and/or memory, potentially leading to denial of service in systems that parse input from untrusted sources. This affects applications using devalue.parse on externally-supplied data. The root cause is the ArrayBuffer hydration expecting base64 encoded strings as input, but not checking the assumption before decoding the input. This vulnerability is fixed in 5.6.2.

PLUGIN Devalue

CVE-2026-22775

HIGH CVSS 7.5 2026-01-15
Threat Entry Updated 2026-01-20

CVE-2026-22774 - Devalue Plugin

Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. From 5.3.0 to 5.6.1, certain inputs can cause devalue.parse to consume excessive CPU time and/or memory, potentially leading to denial of service in systems that parse input from untrusted sources. This affects applications using devalue.parse on externally-supplied data. The root cause is the typed array hydration expecting an ArrayBuffer as input, but not checking the assumption before creating the typed array. This vulnerability is fixed in 5.6.2.

PLUGIN Devalue

CVE-2026-22774

HIGH CVSS 7.5 2026-01-15
Threat Entry Updated 2026-01-22

CVE-2026-22249 - Docmost Plugin

Docmost is an open-source collaborative wiki and documentation software. From 0.21.0 to before 0.24.0, Docmost is vulnerable to Arbitrary File Write via Zip Import Feature (ZipSlip). In apps/server/src/integrations/import/utils/file.utils.ts, there are no validation on filename. This vulnerability is fixed in 0.24.0.

PLUGIN Docmost

CVE-2026-22249

HIGH CVSS 7.1 2026-01-15
Threat Entry Updated 2026-01-20

CVE-2026-23493 - Pimcore Plugin

Pimcore is an Open Source Data & Experience Management Platform. Prior to 12.3.1 and 11.5.14, the http_error_log file stores the $_COOKIE and $_SERVER variables, which means sensitive information such as database passwords, cookie session data, and other details can be accessed or recovered through the Pimcore backend. This vulnerability is fixed in 12.3.1 and 11.5.14.

PLUGIN Pimcore

CVE-2026-23493

HIGH CVSS 8.6 2026-01-15
Threat Entry Updated 2026-01-16

CVE-2026-22867 - Docs Plugin

LaSuite Doc is a collaborative note taking, wiki and documentation platform. From 3.8.0 to 4.3.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Interlinking feature. When a user creates a link to another document within the editor, the URL of that link is not validated. An attacker with document editing privileges can inject a malicious javascript: URL that executes arbitrary code when other users click on the link. This vulnerability is fixed in 4.4.0.

PLUGIN Docs

CVE-2026-22867

HIGH CVSS 8.7 2026-01-15
Threat Entry Updated 2026-02-18

CVE-2026-22265 - Roxy Wi Plugin

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to 8.2.8.2, command injection vulnerability exists in the log viewing functionality that allows authenticated users to execute arbitrary system commands. The vulnerability is in app/modules/roxywi/logs.py line 87, where the grep parameter is used twice - once sanitized and once raw. This vulnerability is fixed in 8.2.8.2.

PLUGIN Roxy Wi

CVE-2026-22265

HIGH CVSS 7.5 2026-01-15
Threat Entry Updated 2026-01-23

CVE-2026-0897 - Keras Plugin

Allocation of Resources Without Limits or Throttling in the HDF5 weight loading component in Google Keras 3.0.0 through 3.13.0 on all platforms allows a remote attacker to cause a Denial of Service (DoS) through memory exhaustion and a crash of the Python interpreter via a crafted .keras archive containing a valid model.weights.h5 file whose dataset declares an extremely large shape.

PLUGIN Keras

CVE-2026-0897

HIGH CVSS 7.1 2026-01-15
Threat Entry Updated 2026-01-16

CVE-2025-13062 - Supreme Modules Lite Plugin

The Supreme Modules Lite plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 2.5.62. This is due to insufficient file type validation detecting JSON files, allowing double extension files to bypass sanitization while being accepted as a valid JSON file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Supreme Modules Lite

CVE-2025-13062

HIGH CVSS 8.8 2026-01-15
Threat Entry Updated 2026-01-23

CVE-2026-22910 - TDC-X401GL Plugin

The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This represents a high risk to the integrity of the system.

PLUGIN TDC-X401GL

CVE-2026-22910

HIGH CVSS 7.5 2026-01-15
Threat Entry Updated 2026-01-23

CVE-2026-22909 - TDC-X401GL Plugin

Certain system functions may be accessed without proper authorization, allowing attackers to start, stop, or delete installed applications, potentially disrupting system operations.

PLUGIN TDC-X401GL

CVE-2026-22909

HIGH CVSS 7.5 2026-01-15
Threat Entry Updated 2026-01-16

CVE-2026-0421 - ThinkPad L13 Gen 6 2 in 1 BIOS Plugin

A potential vulnerability was reported in the BIOS of L13 Gen 6, L13 Gen 6 2-in-1, L14 Gen 6, and L16 Gen 2 ThinkPads which could result in Secure Boot being disabled even when configured as “On” in the BIOS setup menu. This issue only affects systems where Secure Boot is set to User Mode.

PLUGIN ThinkPad L13 Gen 6 2 in 1 BIOS

CVE-2026-0421

HIGH CVSS 7.0 2026-01-14
Threat Entry Updated 2026-01-16

CVE-2025-12166 - Simply Schedule Appointments Booking Plugin

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection via the `order` and `append_where_sql` parameters in all versions up to, and including, 1.6.9.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Simply Schedule Appointments Booking

CVE-2025-12166

HIGH CVSS 7.5 2026-01-14
Threat Entry Updated 2026-02-03

CVE-2026-23512 - Sumatrapdf Plugin

SumatraPDF is a multi-format reader for Windows. In 3.5.2 and earlier, there is a Untrusted Search Path vulnerability when Advanced Options setting is trigger. The application executes notepad.exe without specifying an absolute path when using the Advanced Options setting. On Windows, this allows execution of a malicious notepad.exe placed in the application's installation directory, leading to arbitrary code execution.

PLUGIN Sumatrapdf

CVE-2026-23512

HIGH CVSS 8.6 2026-01-14
Scroll to top