Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total10,857
Critical0
High0
Medium10,857
Reset
Showing 1221-1240 of 10857 records
Threat Entry Updated 2026-01-22

CVE-2026-22036 - Undici Plugin

Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.

PLUGIN Undici

CVE-2026-22036

MEDIUM CVSS 5.9 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22857 - FreeRDP Plugin

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap use-after-free occurs in irp_thread_func because the IRP is freed by irp->Complete() and then accessed again on the error path. This vulnerability is fixed in 3.20.1.

PLUGIN FreeRDP

CVE-2026-22857

MEDIUM CVSS 6.8 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22856 - FreeRDP Plugin

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race in the serial channel IRP thread tracking allows a heap use‑after‑free when one thread removes an entry from serial->IrpThreads while another reads it. This vulnerability is fixed in 3.20.1.

PLUGIN FreeRDP

CVE-2026-22856

MEDIUM CVSS 6.8 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22859 - FreeRDP Plugin

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, the URBDRC client does not perform bounds checking on server‑supplied MSUSB_INTERFACE_DESCRIPTOR values and uses them as indices in libusb_udev_complete_msconfig_setup, causing an out‑of‑bounds read. This vulnerability is fixed in 3.20.1.

PLUGIN FreeRDP

CVE-2026-22859

MEDIUM CVSS 5.6 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22858 - FreeRDP Plugin

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, global-buffer-overflow was observed in FreeRDP's Base64 decoding path. The root cause appears to be implementation-defined char signedness: on Arm/AArch64 builds, plain char is treated as unsigned, so the guard c

PLUGIN FreeRDP

CVE-2026-22858

MEDIUM CVSS 5.6 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22855 - FreeRDP Plugin

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap out-of-bounds read occurs in the smartcard SetAttrib path when cbAttrLen does not match the actual NDR buffer length. This vulnerability is fixed in 3.20.1.

PLUGIN FreeRDP

CVE-2026-22855

MEDIUM CVSS 5.6 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22851 - FreeRDP Plugin

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race condition between the RDPGFX dynamic virtual channel thread and the SDL render thread leads to a heap use-after-free. Specifically, an escaped pointer to sdl->primary (SDL_Surface) is accessed after it has been freed during RDPGFX ResetGraphics handling. This vulnerability is fixed in 3.20.1.

PLUGIN FreeRDP

CVE-2026-22851

MEDIUM CVSS 6.9 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22854 - FreeRDP Plugin

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.

PLUGIN FreeRDP

CVE-2026-22854

MEDIUM CVSS 6.8 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22853 - FreeRDP Plugin

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, RDPEAR’s NDR array reader does not perform bounds checking on the on‑wire element count and can write past the heap buffer allocated from hints, causing a heap buffer overflow in ndr_read_uint8Array. This vulnerability is fixed in 3.20.1.

PLUGIN FreeRDP

CVE-2026-22853

MEDIUM CVSS 6.8 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22852 - FreeRDP Plugin

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a malicious RDP server can trigger a heap-buffer-overflow write in the FreeRDP client when processing Audio Input (AUDIN) format lists. audin_process_formats reuses callback->formats_count across multiple MSG_SNDIN_FORMATS PDUs and writes past the newly allocated formats array, causing memory corruption and a crash. This vulnerability is fixed in 3.20.1.

PLUGIN FreeRDP

CVE-2026-22852

MEDIUM CVSS 6.8 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22819 - Outray Plugin

Outray openSource ngrok alternative. Prior to 0.1.5, this vulnerability allows a user i.e a free plan user to get more than the desired subdomains due to lack of db transaction lock mechanisms in main/apps/web/src/routes/api/$orgSlug/subdomains/index.ts. This vulnerability is fixed in 0.1.5.

PLUGIN Outray

CVE-2026-22819

MEDIUM CVSS 5.9 2026-01-14
Threat Entry Updated 2026-01-22

CVE-2026-22779 - BlackSheep Plugin

BlackSheep is an asynchronous web framework to build event based web applications with Python. Prior to 2.4.6, the HTTP Client implementation in BlackSheep is vulnerable to CRLF injection. Missing headers validation makes it possible for an attacker to modify the HTTP requests (e.g. insert a new header) or even create a new HTTP request. Exploitation requires developers to pass unsanitized user input directly into headers.The server part is not affected because BlackSheep delegates to an underlying ASGI server handling of response headers. This vulnerability is fixed in 2.4.6.

PLUGIN BlackSheep

CVE-2026-22779

MEDIUM CVSS 6.3 2026-01-14
Threat Entry Updated 2026-01-16

CVE-2026-22694 - Aliasvault Plugin

AliasVault is a privacy-first password manager with built-in email aliasing. AliasVault Android versions 0.24.0 through 0.25.2 contained an issue in how passkey requests from Android apps were validated. Under certain local conditions, a malicious app could attempt to obtain a passkey response for a site it was not authorized to access. The issue involved incomplete validation of calling app identity, origin, and RP ID in the Android credential provider. This issue was fixed in AliasVault Android 0.25.3.

PLUGIN Aliasvault

CVE-2026-22694

MEDIUM CVSS 6.1 2026-01-14
Threat Entry Updated 2026-01-14

CVE-2026-22211 - TinyOS Plugin

TinyOS versions up to and including 2.1.2 contain a global buffer overflow vulnerability in the printfUART formatted output implementation used within the ZigBee / IEEE 802.15.4 networking stack. The implementation formats output into a fixed-size global buffer and concatenates strings for %s format specifiers using strcat() without verifying remaining buffer capacity. When printfUART is invoked with a caller-controlled string longer than the available space, the unbounded sprintf/strcat sequence writes past the end of debugbuf, resulting in global memory corruption. This can cause denial of service, unintended behavior, or information disclosure…

PLUGIN TinyOS

CVE-2026-22211

MEDIUM CVSS 5.1 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22820 - Outray Plugin

Outray openSource ngrok alternative. Prior to 0.1.5, a TOCTOU race condition vulnerability allows a user to exceed the set number of active tunnels in their subscription plan. This vulnerability is fixed in 0.1.5.

PLUGIN Outray

CVE-2026-22820

MEDIUM CVSS 6.3 2026-01-14
Threat Entry Updated 2026-01-14

CVE-2026-0529 - Packetbeat Plugin

Improper Validation of Array Index (CWE-129) in Packetbeat’s MongoDB protocol parser can allow an attacker to cause Overflow Buffers (CAPEC-100) through specially crafted network traffic. This requires an attacker to send a malformed payload to a monitored network interface where MongoDB protocol parsing is enabled.

PLUGIN Packetbeat

CVE-2026-0529

MEDIUM CVSS 6.5 2026-01-14
Threat Entry Updated 2026-04-15

CVE-2026-0813 - Short Link Plugin

The Short Link plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'short_link_post_title' and 'short_link_page_title' parameters in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected page.

PLUGIN Short Link

CVE-2026-0813

MEDIUM CVSS 4.4 2026-01-14
Scroll to top