Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,025
Critical923
High3,045
Medium10,857
Reset
Showing 2081-2100 of 15025 records
Threat Entry Updated 2026-01-14

CVE-2026-22605 - Openproject Plugin

OpenProject is an open-source, web-based project management software. OpenProject versions prior to version 16.6.3, allowed users with the View Meetings permission on any project, to access meeting details of meetings that belonged to projects, the user does not have access to. This issue has been patched in version 16.6.3.

PLUGIN Openproject

CVE-2026-22605

MEDIUM CVSS 4.3 2026-01-10
Threat Entry Updated 2026-01-14

CVE-2026-22602 - Openproject Plugin

OpenProject is an open-source, web-based project management software. Prior to version 16.6.2, a low‑privileged logged-in user can view the full names of other users. Since user IDs are assigned sequentially and predictably (e.g., 1 to 1000), an attacker can extract a complete list of all users’ full names by iterating through these URLs. The same behavior can also be reproduced via the OpenProject API, allowing automated retrieval of full names through the API as well. This issue has been patched in version 16.6.2. Those who are unable to upgrade may…

PLUGIN Openproject

CVE-2026-22602

LOW CVSS 3.5 2026-01-10
Threat Entry Updated 2026-01-14

CVE-2026-22600 - Openproject Plugin

OpenProject is an open-source, web-based project management software. A Local File Read (LFR) vulnerability exists in the work package PDF export functionality of OpenProject prior to version 16.6.4. By uploading a specially crafted SVG file (disguised as a PNG) as a work package attachment, an attacker can exploit the backend image processing engine (ImageMagick). When the work package is exported to PDF, the backend attempts to resize the image, triggering the ImageMagick text: coder. This allows an attacker to read arbitrary local files that the application user has permissions to…

PLUGIN Openproject

CVE-2026-22600

CRITICAL CVSS 9.1 2026-01-10
Threat Entry Updated 2026-01-14

CVE-2026-22601 - Openproject Plugin

OpenProject is an open-source, web-based project management software. For OpenProject version 16.6.1 and below, a registered administrator can execute arbitrary command by configuring sendmail binary path and sending a test email. This issue has been patched in version 16.6.2.

PLUGIN Openproject

CVE-2026-22601

HIGH CVSS 8.6 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-22697 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, CryptoLib’s KMC crypto service integration is vulnerable to a heap buffer overflow when decoding Base64-encoded ciphertext/cleartext fields returned by the KMC service. The decode destination buffer is sized using an expected output length (len_data_out), but the Base64 decoder writes output based on the actual Base64 input length and does not enforce any destination…

PLUGIN CryptoLib

CVE-2026-22697

HIGH CVSS 7.5 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-22026 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the libcurl write_callback function in the KMC crypto service client allows unbounded memory growth by reallocating response buffers without any size limit or overflow check. A malicious KMC server can return arbitrarily large HTTP responses, forcing the client to allocate excessive memory until the process is terminated by the OS. This issue has…

PLUGIN CryptoLib

CVE-2026-22026

HIGH CVSS 8.2 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-22023 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, there is an out-of-bounds heap read vulnerability in cryptography_aead_encrypt(). This issue has been patched in version 1.4.3.

PLUGIN CryptoLib

CVE-2026-22023

HIGH CVSS 8.2 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-21900 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, an out-of-bounds heap read vulnerability in cryptography_encrypt() occurs when parsing JSON metadata from KMC server responses. The flawed strtok iteration pattern uses ptr + strlen(ptr) + 1 which reads one byte past allocated buffer boundaries when processing short or malformed metadata strings. This issue has been patched in version 1.4.3.

PLUGIN CryptoLib

CVE-2026-21900

HIGH CVSS 8.2 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-22025 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, when the KMC server returns a non-200 HTTP status code, cryptography_encrypt() and cryptography_decrypt() return immediately without freeing previously allocated buffers. Each failed request leaks approximately 467 bytes. Repeated failures (from a malicious server or network issues) can gradually exhaust memory. This issue has been patched in version 1.4.3.

PLUGIN CryptoLib

CVE-2026-22025

MEDIUM CVSS 6.3 2026-01-10
Threat Entry Updated 2026-01-16

CVE-2026-22024 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the cryptography_encrypt() function allocates multiple buffers for HTTP requests and JSON parsing that are never freed on any code path. Each call leaks approximately 400 bytes of memory. Sustained traffic can gradually exhaust available memory. This issue has been patched in version 1.4.3.

PLUGIN CryptoLib

CVE-2026-22024

MEDIUM CVSS 6.3 2026-01-10
Threat Entry Updated 2026-01-15

CVE-2026-22027 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the convert_hexstring_to_byte_array() function in the MariaDB SA interface writes decoded bytes into a caller-provided buffer without any capacity check. When importing SA fields from the database (e.g., IV, ARSN, ABM), a malformed or oversized hex string in the database can overflow the destination buffer, corrupting adjacent heap memory. This issue has been patched…

PLUGIN CryptoLib

CVE-2026-22027

MEDIUM CVSS 5.7 2026-01-10
Threat Entry Updated 2026-01-15

CVE-2026-21899 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, in base64urlDecode, padding-stripping dereferences input[inputLen - 1] before checking that inputLen > 0 or that input != NULL. For inputLen == 0, this becomes an OOB read at input[-1], potentially crashing the process. If input == NULL and inputLen == 0, it dereferences NULL - 1. This issue has been patched in version…

PLUGIN CryptoLib

CVE-2026-21899

MEDIUM CVSS 4.7 2026-01-10
Threat Entry Updated 2026-01-15

CVE-2026-21898 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the Crypto_AOS_ProcessSecurity function reads memory without valid bounds checking when parsing AOS frame hashes. This issue has been patched in version 1.4.3.

PLUGIN CryptoLib

CVE-2026-21898

HIGH CVSS 8.2 2026-01-10
Threat Entry Updated 2026-01-15

CVE-2026-21897 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the Crypto_Config_Add_Gvcid_Managed_Parameters function only checks whether gvcid_counter > GVCID_MAN_PARAM_SIZE. As a result, it allows up to the 251st entry, which causes a write past the end of the array, overwriting gvcid_counter located immediately after gvcid_managed_parameters_array[250]. This leads to an out-of-bounds write, and the overwritten gvcid_counter may become an arbitrary value, potentially affecting the…

PLUGIN CryptoLib

CVE-2026-21897

HIGH CVSS 7.3 2026-01-10
Threat Entry Updated 2026-01-22

CVE-2026-22584 - Uni2TS Plugin

Improper Control of Generation of Code ('Code Injection') vulnerability in Salesforce Uni2TS on MacOS, Windows, Linux allows Leverage Executable Code in Non-Executable Files.This issue affects Uni2TS: through 1.2.0.

PLUGIN Uni2TS

CVE-2026-22584

CRITICAL CVSS 9.8 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2026-0830 - Kiro IDE Plugin

Processing specially crafted workspace folder names could allow for arbitrary command injection in the Kiro GitLab Merge-Request helper in Kiro IDE before version 0.6.18 when opening maliciously crafted workspaces. To mitigate, users should update to the latest version.

PLUGIN Kiro IDE

CVE-2026-0830

HIGH CVSS 8.4 2026-01-09
Threat Entry Updated 2026-01-14

CVE-2026-22196 - GestSup Plugin

GestSup versions prior to 3.2.60 contain a SQL injection vulnerability in ticket creation functionality. User-controlled input provided during ticket creation is incorporated into SQL queries without sufficient neutralization, allowing an authenticated attacker to manipulate database queries. Successful exploitation can result in unauthorized access to or modification of database contents depending on database privileges.

PLUGIN GestSup

CVE-2026-22196

HIGH CVSS 7.7 2026-01-09
Threat Entry Updated 2026-01-14

CVE-2026-22197 - GestSup Plugin

GestSup versions prior to 3.2.60 contain multiple SQL injection vulnerabilities in the asset list functionality. Multiple request parameters used to filter, search, or sort assets are incorporated into SQL queries without sufficient neutralization, allowing an authenticated attacker to manipulate database queries. Successful exploitation can result in unauthorized access to or modification of database contents depending on database privileges.

PLUGIN GestSup

CVE-2026-22197

HIGH CVSS 7.5 2026-01-09
Threat Entry Updated 2026-01-14

CVE-2026-22198 - GestSup Plugin

GestSup versions prior to 3.2.60 contain a pre-authentication stored cross-site scripting (XSS) vulnerability in the API error logging functionality. By sending an API request with a crafted X-API-KEY header value (for example, to /api/v1/ticket.php), an unauthenticated attacker can cause attacker-controlled HTML/JavaScript to be written to log entries. When an administrator later views the affected logs in the web interface, the injected content is rendered without proper output encoding, resulting in arbitrary script execution in the administrator’s browser session.

PLUGIN GestSup

CVE-2026-22198

MEDIUM CVSS 5.1 2026-01-09
Threat Entry Updated 2026-01-14

CVE-2026-22194 - GestSup Plugin

GestSup versions up to and including 3.2.60 contain a cross-site request forgery (CSRF) vulnerability where the application does not verify the authenticity of client requests. An attacker can induce a logged-in user to submit crafted requests that perform actions with the victim's privileges. This can be exploited to create privileged accounts by targeting the administrative user creation endpoint.

PLUGIN GestSup

CVE-2026-22194

HIGH CVSS 8.9 2026-01-09
Scroll to top