Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3,039
Critical0
High3,039
Medium0
Reset
Showing 541-560 of 3039 records
Threat Entry Updated 2026-01-15

CVE-2026-22594 - Ghost Plugin

Ghost is a Node.js content management system. In versions 5.105.0 through 5.130.5 and 6.0.0 through 6.10.3, a vulnerability in Ghost's 2FA mechanism allows staff users to skip email 2FA. This issue has been patched in versions 5.130.6 and 6.11.0.

PLUGIN Ghost

CVE-2026-22594

HIGH CVSS 8.1 2026-01-10
Threat Entry Updated 2026-01-30

CVE-2026-21884 - React Router Plugin

React Router is a router for React. In @remix-run/react version prior to 2.17.3. and react-router 7.0.0 through 7.11.0, a XSS vulnerability exists in in React Router's API in Framework Mode when using the getKey/storageKey props during Server-Side Rendering which could allow arbitrary JavaScript execution during SSR if untrusted content is used to generate the keys. There is no impact if server-side rendering in Framework Mode is disabled, or if Declarative Mode () or Data Mode (createBrowserRouter/) is being used. This issue has been patched in @remix-run/react version 2.17.3 and react-router…

PLUGIN React Router

CVE-2026-21884

HIGH CVSS 8.2 2026-01-10
Threat Entry Updated 2026-02-10

CVE-2026-22029 - React Router Plugin

React Router is a router for React. In @remix-run/router version prior to 1.23.2. and react-router 7.0.0 through 7.11.0, React Router (and Remix v1/v2) SPA open navigation redirects originating from loaders or actions in Framework Mode, Data Mode, or the unstable RSC modes can result in unsafe URLs causing unintended javascript execution on the client. This is only an issue if you are creating redirect paths from untrusted content or via an open redirect. There is no impact if Declarative Mode () is being used. This issue has been patched in…

PLUGIN React Router

CVE-2026-22029

HIGH CVSS 8.0 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-22612 - Fickling Plugin

Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, Fickling is vulnerable to detection bypass due to "builtins" blindness. This issue has been patched in version 0.1.7.

PLUGIN Fickling

CVE-2026-22612

HIGH CVSS 8.9 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-22609 - Fickling Plugin

Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, the unsafe_imports() method in Fickling's static analyzer fails to flag several high-risk Python modules that can be used for arbitrary code execution. Malicious pickles importing these modules will not be detected as unsafe, allowing attackers to bypass Fickling's primary static safety checks. This issue has been patched in version 0.1.7.

PLUGIN Fickling

CVE-2026-22609

HIGH CVSS 8.9 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-22608 - Fickling Plugin

Fickling is a Python pickling decompiler and static analyzer. Prior to version 0.1.7, both ctypes and pydoc modules aren't explicitly blocked. Even other existing pickle scanning tools (like picklescan) do not block pydoc.locate. Chaining these two together can achieve RCE while the scanner still reports the file as LIKELY_SAFE. This issue has been patched in version 0.1.7.

PLUGIN Fickling

CVE-2026-22608

HIGH CVSS 8.9 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-22607 - Fickling Plugin

Fickling is a Python pickling decompiler and static analyzer. Fickling versions up to and including 0.1.6 do not treat Python's cProfile module as unsafe. Because of this, a malicious pickle that uses cProfile.run() is classified as SUSPICIOUS instead of OVERTLY_MALICIOUS. If a user relies on Fickling's output to decide whether a pickle is safe to deserialize, this misclassification can lead them to execute attacker-controlled code on their system. This affects any workflow or product that uses Fickling as a security gate for pickle deserialization. This issue has been patched in…

PLUGIN Fickling

CVE-2026-22607

HIGH CVSS 8.9 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-22606 - Fickling Plugin

Fickling is a Python pickling decompiler and static analyzer. Fickling versions up to and including 0.1.6 do not treat Python’s runpy module as unsafe. Because of this, a malicious pickle that uses runpy.run_path() or runpy.run_module() is classified as SUSPICIOUS instead of OVERTLY_MALICIOUS. If a user relies on Fickling’s output to decide whether a pickle is safe to deserialize, this misclassification can lead them to execute attacker-controlled code on their system. This affects any workflow or product that uses Fickling as a security gate for pickle deserialization. This issue has been…

PLUGIN Fickling

CVE-2026-22606

HIGH CVSS 8.9 2026-01-10
Threat Entry Updated 2026-01-14

CVE-2026-22601 - Openproject Plugin

OpenProject is an open-source, web-based project management software. For OpenProject version 16.6.1 and below, a registered administrator can execute arbitrary command by configuring sendmail binary path and sending a test email. This issue has been patched in version 16.6.2.

PLUGIN Openproject

CVE-2026-22601

HIGH CVSS 8.6 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-22697 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, CryptoLib’s KMC crypto service integration is vulnerable to a heap buffer overflow when decoding Base64-encoded ciphertext/cleartext fields returned by the KMC service. The decode destination buffer is sized using an expected output length (len_data_out), but the Base64 decoder writes output based on the actual Base64 input length and does not enforce any destination…

PLUGIN CryptoLib

CVE-2026-22697

HIGH CVSS 7.5 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-22026 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the libcurl write_callback function in the KMC crypto service client allows unbounded memory growth by reallocating response buffers without any size limit or overflow check. A malicious KMC server can return arbitrarily large HTTP responses, forcing the client to allocate excessive memory until the process is terminated by the OS. This issue has…

PLUGIN CryptoLib

CVE-2026-22026

HIGH CVSS 8.2 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-22023 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, there is an out-of-bounds heap read vulnerability in cryptography_aead_encrypt(). This issue has been patched in version 1.4.3.

PLUGIN CryptoLib

CVE-2026-22023

HIGH CVSS 8.2 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-21900 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, an out-of-bounds heap read vulnerability in cryptography_encrypt() occurs when parsing JSON metadata from KMC server responses. The flawed strtok iteration pattern uses ptr + strlen(ptr) + 1 which reads one byte past allocated buffer boundaries when processing short or malformed metadata strings. This issue has been patched in version 1.4.3.

PLUGIN CryptoLib

CVE-2026-21900

HIGH CVSS 8.2 2026-01-10
Threat Entry Updated 2026-01-15

CVE-2026-21898 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the Crypto_AOS_ProcessSecurity function reads memory without valid bounds checking when parsing AOS frame hashes. This issue has been patched in version 1.4.3.

PLUGIN CryptoLib

CVE-2026-21898

HIGH CVSS 8.2 2026-01-10
Threat Entry Updated 2026-01-15

CVE-2026-21897 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the Crypto_Config_Add_Gvcid_Managed_Parameters function only checks whether gvcid_counter > GVCID_MAN_PARAM_SIZE. As a result, it allows up to the 251st entry, which causes a write past the end of the array, overwriting gvcid_counter located immediately after gvcid_managed_parameters_array[250]. This leads to an out-of-bounds write, and the overwritten gvcid_counter may become an arbitrary value, potentially affecting the…

PLUGIN CryptoLib

CVE-2026-21897

HIGH CVSS 7.3 2026-01-10
Threat Entry Updated 2026-01-13

CVE-2026-0830 - Kiro IDE Plugin

Processing specially crafted workspace folder names could allow for arbitrary command injection in the Kiro GitLab Merge-Request helper in Kiro IDE before version 0.6.18 when opening maliciously crafted workspaces. To mitigate, users should update to the latest version.

PLUGIN Kiro IDE

CVE-2026-0830

HIGH CVSS 8.4 2026-01-09
Threat Entry Updated 2026-01-14

CVE-2026-22196 - GestSup Plugin

GestSup versions prior to 3.2.60 contain a SQL injection vulnerability in ticket creation functionality. User-controlled input provided during ticket creation is incorporated into SQL queries without sufficient neutralization, allowing an authenticated attacker to manipulate database queries. Successful exploitation can result in unauthorized access to or modification of database contents depending on database privileges.

PLUGIN GestSup

CVE-2026-22196

HIGH CVSS 7.7 2026-01-09
Threat Entry Updated 2026-01-14

CVE-2026-22197 - GestSup Plugin

GestSup versions prior to 3.2.60 contain multiple SQL injection vulnerabilities in the asset list functionality. Multiple request parameters used to filter, search, or sort assets are incorporated into SQL queries without sufficient neutralization, allowing an authenticated attacker to manipulate database queries. Successful exploitation can result in unauthorized access to or modification of database contents depending on database privileges.

PLUGIN GestSup

CVE-2026-22197

HIGH CVSS 7.5 2026-01-09
Threat Entry Updated 2026-01-14

CVE-2026-22194 - GestSup Plugin

GestSup versions up to and including 3.2.60 contain a cross-site request forgery (CSRF) vulnerability where the application does not verify the authenticity of client requests. An attacker can induce a logged-in user to submit crafted requests that perform actions with the victim's privileges. This can be exploited to create privileged accounts by targeting the administrative user creation endpoint.

PLUGIN GestSup

CVE-2026-22194

HIGH CVSS 8.9 2026-01-09
Threat Entry Updated 2026-01-14

CVE-2026-22195 - GestSup Plugin

GestSup versions prior to 3.2.60 contain a SQL injection vulnerability in the search bar functionality. User-controlled search input is incorporated into SQL queries without sufficient neutralization, allowing an authenticated attacker to manipulate database queries. Successful exploitation can result in unauthorized access to or modification of database contents depending on database privileges.

PLUGIN GestSup

CVE-2026-22195

HIGH CVSS 7.7 2026-01-09
Scroll to top