Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total10,857
Critical0
High0
Medium10,857
Reset
Showing 1481-1500 of 10857 records
Threat Entry Updated 2026-02-02

CVE-2026-21859 - Mailpit Plugin

Mailpit is an email testing tool and API for developers. Versions 1.28.0 and below have a Server-Side Request Forgery (SSRF) vulnerability in the /proxy endpoint, allowing attackers to make requests to internal network resources. The /proxy endpoint validates http:// and https:// schemes, but it does not block internal IP addresses, enabling attackers to access internal services and APIs. This vulnerability is limited to HTTP GET requests with minimal headers. The issue is fixed in version 1.28.1.

PLUGIN Mailpit

CVE-2026-21859

MEDIUM CVSS 5.8 2026-01-08
Threat Entry Updated 2026-01-12

CVE-2026-21694 - Titra Plugin

Titra is open source project time tracking software. Versions 0.99.49 and below have Improper Access Control, allowing users to view and edit other users' time entries in private projects they have not been granted access to. This issue is fixed in version 0.99.50.

PLUGIN Titra

CVE-2026-21694

MEDIUM CVSS 6.8 2026-01-08
Threat Entry Updated 2026-01-12

CVE-2026-21695 - Titra Plugin

Titra is open source project time tracking software. In versions 0.99.49 and below, an API has a Mass Assignment vulnerability which allows authenticated users to inject arbitrary fields into time entries, bypassing business logic controls via the customfields parameter. The affected endpoint uses the JavaScript spread operator (...customfields) to merge user-controlled input directly into the database document. While customfields is validated as an Object type, there is no validation of which keys are permitted inside that object. This allows attackers to overwrite protected fields such as userId, hours, and state.…

PLUGIN Titra

CVE-2026-21695

MEDIUM CVSS 4.3 2026-01-08
Threat Entry Updated 2026-02-02

CVE-2026-21851 - MONAI Plugin

MONAI (Medical Open Network for AI) is an AI toolkit for health care imaging. In versions up to and including 1.5.1, a Path Traversal (Zip Slip) vulnerability exists in MONAI's `_download_from_ngc_private()` function. The function uses `zipfile.ZipFile.extractall()` without path validation, while other similar download functions in the same codebase properly use the existing `safe_extract_member()` function. Commit 4014c8475626f20f158921ae0cf98ed259ae4d59 fixes this issue.

PLUGIN MONAI

CVE-2026-21851

MEDIUM CVSS 5.3 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-21689 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `CIccProfileXml::ParseBasic()` at `IccXML/IccLibXML/IccProfileXml.cpp`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-21689

MEDIUM CVSS 6.5 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-21690 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `CIccTagXmlTagData::ToXml()`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-21690

MEDIUM CVSS 6.3 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-21691 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a Type Confusion vulnerability in `CIccTag:IsTypeCompressed()`. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-21691

MEDIUM CVSS 5.4 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-22189 - Panda3D Plugin

Panda3D versions up to and including 1.10.16 egg-mkfont contains a stack-based buffer overflow vulnerability due to use of an unbounded sprintf() call with attacker-controlled input. When constructing glyph filenames, egg-mkfont formats a user-supplied glyph pattern (-gp) into a fixed-size stack buffer without length validation. Supplying an excessively long glyph pattern string can overflow the stack buffer, resulting in memory corruption and a deterministic crash. Depending on build configuration and execution environment, the overflow may also be exploitable for arbitrary code execution.

PLUGIN Panda3D

CVE-2026-22189

MEDIUM CVSS 6.9 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-22190 - Panda3D Plugin

Panda3D versions up to and including 1.10.16 egg-mkfont contains an uncontrolled format string vulnerability. The -gp (glyph pattern) command-line option is used directly as the format string for sprintf() with only a single argument supplied. If an attacker provides additional format specifiers, egg-mkfont may read unintended stack values and write the formatted output into generated .egg and .png files, resulting in disclosure of stack-resident memory and pointer values.

PLUGIN Panda3D

CVE-2026-22190

MEDIUM CVSS 5.1 2026-01-07
Threat Entry Updated 2026-01-12

CVE-2026-22188 - Panda3D Plugin

Panda3D versions up to and including 1.10.16 deploy-stub contains a denial of service vulnerability due to unbounded stack allocation. The deploy-stub executable allocates argv_copy and argv_copy2 using alloca() based directly on the attacker-controlled argc value without validation. Supplying a large number of command-line arguments can exhaust stack space and propagate uninitialized stack memory into Python interpreter initialization, resulting in a reliable crash and undefined behavior.

PLUGIN Panda3D

CVE-2026-22188

MEDIUM CVSS 6.9 2026-01-07
Threat Entry Updated 2026-02-26

CVE-2026-22187 - Bio-Formats Plugin

Bio-Formats versions up to and including 8.3.0 perform unsafe Java deserialization of attacker-controlled memoization cache files (.bfmemo) during image processing. The loci.formats.Memoizer class automatically loads and deserializes memo files associated with images without validation, integrity checks, or trust enforcement. An attacker who can supply a crafted .bfmemo file alongside an image can trigger deserialization of untrusted data, which may result in denial of service, logic manipulation, or potentially remote code execution in environments where suitable gadget chains are present on the classpath.

PLUGIN Bio-Formats

CVE-2026-22187

MEDIUM CVSS 6.8 2026-01-07
Threat Entry Updated 2026-02-26

CVE-2026-22186 - Bio-Formats Plugin

Bio-Formats versions up to and including 8.3.0 contain an XML External Entity (XXE) vulnerability in the Leica Microsystems metadata parsing component (e.g., XLEF). The parser uses an insecurely configured DocumentBuilderFactory when processing Leica XML-based metadata files, allowing external entity expansion and external DTD loading. A crafted metadata file can trigger outbound network requests (SSRF), access local system resources where readable, or cause a denial of service during XML parsing.

PLUGIN Bio-Formats

CVE-2026-22186

MEDIUM CVSS 4.6 2026-01-07
Threat Entry Updated 2026-01-14

CVE-2026-22185 - OpenLDAP Plugin

OpenLDAP Lightning Memory-Mapped Database (LMDB) versions up to and including 0.9.14, prior to commit 8e1fda8, contain a heap buffer underflow in the readline() function of mdb_load. When processing malformed input containing an embedded NUL byte, an unsigned offset calculation can underflow and cause an out-of-bounds read of one byte before the allocated heap buffer. This can cause mdb_load to crash, leading to a limited denial-of-service condition.

PLUGIN OpenLDAP

CVE-2026-22185

MEDIUM CVSS 4.6 2026-01-07
Threat Entry Updated 2026-01-15

CVE-2026-22184 - Zlib Plugin

zlib versions up to and including 1.3.1.2 include a global buffer overflow in the untgz utility located under contrib/untgz. The vulnerability is limited to the standalone demonstration utility and does not affect the core zlib compression library. The flaw occurs when a user executes the untgz command with an excessively long archive name supplied via the command line, leading to an out-of-bounds write in a fixed-size global buffer.

PLUGIN Zlib

CVE-2026-22184

MEDIUM CVSS 4.6 2026-01-07
Threat Entry Updated 2026-02-23

CVE-2026-0670 - MediaWiki - ProofreadPage Extension Plugin

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation MediaWiki - ProofreadPage Extension allows Cross-Site Scripting (XSS).This issue affects MediaWiki - ProofreadPage Extension: 1.45, 1.44, 1.43, 1.39.

PLUGIN MediaWiki - ProofreadPage Extension

CVE-2026-0670

MEDIUM CVSS 6.1 2026-01-07
Threat Entry Updated 2026-01-09

CVE-2026-21680 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Versions prior to 2.3.1.2 have a NULL pointer dereference vulnerability. This vulnerability affects users of the iccDEV library who process ICC color profiles. Version 2.3.1.2 contains a patch. No known workarounds are available.

PLUGIN iccDEV

CVE-2026-21680

MEDIUM CVSS 6.5 2026-01-07
Threat Entry Updated 2026-01-08

CVE-2026-22539 - QC 60/90/120 Plugin

As the service interaction is performed without authentication, an attacker with some knowledge of the protocol could obtain information about the charger via OCPP v1.6.

PLUGIN QC 60/90/120

CVE-2026-22539

MEDIUM CVSS 5.3 2026-01-07
Threat Entry Updated 2026-01-09

CVE-2026-21504 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, iccDEV is vulnerable to heap buffer overflow in the ToneMap parser. This issue has been patched in version 2.3.1.2.

PLUGIN iccDEV

CVE-2026-21504

MEDIUM CVSS 6.6 2026-01-07
Threat Entry Updated 2026-01-09

CVE-2026-21503 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, iccDEV has undefined behavior due to a null pointer passed to memcpy() in CIccTagSparseMatrixArray. This issue has been patched in version 2.3.1.2.

PLUGIN iccDEV

CVE-2026-21503

MEDIUM CVSS 6.1 2026-01-07
Threat Entry Updated 2026-01-13

CVE-2026-21506 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of ICC color management profiles. Prior to version 2.3.1.2, iccDEV is vulnerable to Null pointer dereference in CIccProfileXml::ParseBasic(), leading to denial of service. This issue has been patched in version 2.3.1.2.

PLUGIN iccDEV

CVE-2026-21506

MEDIUM CVSS 5.5 2026-01-07
Scroll to top