Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,025
Critical923
High3,045
Medium10,857
Reset
Showing 2201-2220 of 15025 records
Threat Entry Updated 2026-01-22

CVE-2026-22246 - Mastodon Plugin

Mastodon is a free, open-source social network server based on ActivityPub. Mastodon 4.3 added notifications of severed relationships, allowing end-users to inspect the relationships they lost as the result of a moderation action. The code allowing users to download lists of severed relationships for a particular event fails to check the owner of the list before returning the lost relationships. Any registered local user can access the list of lost followers and followed users caused by any severance event, and go through all severance events this way. The leaked information…

PLUGIN Mastodon

CVE-2026-22246

MEDIUM CVSS 6.5 2026-01-08
Threat Entry Updated 2026-01-08

CVE-2026-22034 - Snuffleupagus Plugin

Snuffleupagus is a module that raises the cost of attacks against website by killing bug classes and providing a virtual patching system. On deployments of Snuffleupagus prior to version 0.13.0 with the non-default upload validation feature enabled and configured to use one of the upstream validation scripts based on Vulcan Logic Disassembler (VLD) while the VLD extension is not available to the CLI SAPI, all files from multipart POST requests are evaluated as PHP code. The issue was fixed in version 0.13.0.

PLUGIN Snuffleupagus

CVE-2026-22034

CRITICAL CVSS 9.2 2026-01-08
Threat Entry Updated 2026-01-23

CVE-2026-22241 - Openeclass Plugin

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an arbitrary file upload vulnerability in the theme import functionality enables an attacker with administrative privileges to upload arbitrary files on the server's file system. The main cause of the issue is that no validation or sanitization of the file's present inside the zip archive. This leads to remote code execution on the web server. Version 4.2 patches the issue.

PLUGIN Openeclass

CVE-2026-22241

HIGH CVSS 7.3 2026-01-08
Threat Entry Updated 2026-01-15

CVE-2026-22043 - Rustfs Plugin

RustFS is a distributed object storage system built in Rust. In versions 1.0.0-alpha.13 through 1.0.0-alpha.78, a flawed `deny_only` short-circuit in RustFS IAM allows a restricted service account or STS credential to self-issue an unrestricted service account, inheriting the parent’s full privileges. This enables privilege escalation and bypass of session/inline policy restrictions. Version 1.0.0-alpha.79 fixes the issue.

PLUGIN Rustfs

CVE-2026-22043

MEDIUM CVSS 5.7 2026-01-08
Threat Entry Updated 2026-01-15

CVE-2026-22042 - Rustfs Plugin

RustFS is a distributed object storage system built in Rust. Prior to version 1.0.0-alpha.79, he `ImportIam` admin API validates permissions using `ExportIAMAction` instead of `ImportIAMAction`, allowing a principal with export-only IAM permissions to perform import operations. Since importing IAM data performs privileged write actions (creating/updating users, groups, policies, and service accounts), this can lead to unauthorized IAM modification and privilege escalation. Version 1.0.0-alpha.79 fixes the issue.

PLUGIN Rustfs

CVE-2026-22042

MEDIUM CVSS 5.7 2026-01-08
Threat Entry Updated 2026-01-20

CVE-2026-22032 - Directus Plugin

Directus is a real-time API and App dashboard for managing SQL database content. Prior to version 11.14.0, an open redirect vulnerability exists in the Directus SAML authentication callback endpoint. During SAML authentication, the `RelayState` parameter is intended to preserve the user's original destination. However, while the login initiation flow validates redirect targets against allowed domains, this validation is not applied to the callback endpoint. This allows an attacker to craft a malicious authentication request that redirects users to an arbitrary external URL upon completion. The vulnerability is present in both…

PLUGIN Directus

CVE-2026-22032

MEDIUM CVSS 4.3 2026-01-08
Threat Entry Updated 2026-01-12

CVE-2026-22041 - Loggingredactor Plugin

Logging Redactor is a Python library designed to redact sensitive data in logs based on regex patterns and / or dictionary keys. Prior to version 0.0.6, non-string types are converted into string types, leading to type errors in %d conversions. The problem has been patched in version 0.0.6. No known workarounds are available.

PLUGIN Loggingredactor

CVE-2026-22041

LOW CVSS 2.0 2026-01-08
Threat Entry Updated 2026-01-12

CVE-2026-22028 - Preact Plugin

Preact, a lightweight web development framework, JSON serialization protection to prevent Virtual DOM elements from being constructed from arbitrary JSON. A regression introduced in Preact 10.26.5 caused this protection to be softened. In applications where values from JSON payloads are assumed to be strings and passed unmodified to Preact as children, a specially-crafted JSON payload could be constructed that would be incorrectly treated as a valid VNode. When this chain of failures occurs it can result in HTML injection, which can allow arbitrary script execution if not mitigated by CSP…

PLUGIN Preact

CVE-2026-22028

HIGH CVSS 7.2 2026-01-08
Threat Entry Updated 2026-01-12

CVE-2026-21891 - ZimaOS Plugin

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In versions up to and including 1.5.0, the application checks the validity of the username but appears to skip, misinterpret, or incorrectly validate the password when the provided username matches a known system service account. The application's login function fails to properly handle the password validation result for these users, effectively granting authenticated access to anyone who knows one of these common usernames and provides any password. As of time of publication, no…

PLUGIN ZimaOS

CVE-2026-21891

CRITICAL CVSS 9.4 2026-01-08
Threat Entry Updated 2026-02-23

CVE-2026-21876 - Coreruleset Plugin

The OWASP core rule set (CRS) is a set of generic attack detection rules for use with compatible web application firewalls. Prior to versions 4.22.0 and 3.3.8, the current rule 922110 has a bug when processing multipart requests with multiple parts. When the first rule in a chain iterates over a collection (like `MULTIPART_PART_HEADERS`), the capture variables (`TX:0`, `TX:1`) get overwritten with each iteration. Only the last captured value is available to the chained rule, which means malicious charsets in earlier parts can be missed if a later part has…

PLUGIN Coreruleset

CVE-2026-21876

CRITICAL CVSS 9.3 2026-01-08
Threat Entry Updated 2026-01-12

CVE-2026-21885 - V2 Plugin

Miniflux 2 is an open source feed reader. Prior to version 2.2.16, Miniflux's media proxy endpoint (`GET /proxy/{encodedDigest}/{encodedURL}`) can be abused to perform Server-Side Request Forgery (SSRF). An authenticated user can cause Miniflux to generate a signed proxy URL for attacker-chosen media URLs embedded in feed entry content, including internal addresses (e.g., localhost, private RFC1918 ranges, or link-local metadata endpoints). Requesting the resulting `/proxy/...` URL makes Miniflux fetch and return the internal response. Version 2.2.16 fixes the issue.

PLUGIN V2

CVE-2026-21885

MEDIUM CVSS 6.5 2026-01-08
Threat Entry Updated 2026-01-20

CVE-2026-21892 - Parsl Plugin

Parsl is a Python parallel scripting library. A SQL Injection vulnerability exists in the parsl-visualize component of versions prior to 2026.01.05. The application constructs SQL queries using unsafe string formatting (Python % operator) with user-supplied input (workflow_id) directly from URL routes. This allows an unauthenticated attacker with access to the visualization dashboard to inject arbitrary SQL commands, potentially leading to data exfiltration or denial of service against the monitoring database. Version 2026.01.05 fixes the issue.

PLUGIN Parsl

CVE-2026-21892

MEDIUM CVSS 5.3 2026-01-08
Threat Entry Updated 2026-01-08

CVE-2026-21895 - RSA Plugin

The `rsa` crate is an RSA implementation written in rust. Prior to version 0.9.10, when creating a RSA private key from its components, the construction panics instead of returning an error when one of the primes is `1`. Version 0.9.10 fixes the issue.

PLUGIN RSA

CVE-2026-21895

LOW CVSS 2.7 2026-01-08
Threat Entry Updated 2026-02-17

CVE-2026-0719 - Red Hat Enterprise Linux 10 Plugin

A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.

PLUGIN Red Hat Enterprise Linux 10

CVE-2026-0719

HIGH CVSS 8.6 2026-01-08
Threat Entry Updated 2026-01-12

CVE-2026-22242 - CoreShop Plugin

CoreShop is a Pimcore enhanced eCommerce solution. Prior to version 4.1.8, a blind SQL injection vulnerability exists in the application that allows an authenticated administrator-level user to extract database contents using boolean-based or time-based techniques. The database account used by the application is read-only and non-DBA, limiting impact to confidential data disclosure only. No data modification or service disruption is possible. This issue has been patched in version 4.1.8.

PLUGIN CoreShop

CVE-2026-22242

MEDIUM CVSS 4.9 2026-01-08
Threat Entry Updated 2026-01-15

CVE-2026-21873 - Nicegui Plugin

NiceGUI is a Python-based UI framework. From versions 2.22.0 to 3.4.1, an unsafe implementation in the pushstate event listener used by ui.sub_pages allows an attacker to manipulate the fragment identifier of the URL, which they can do despite being cross-site, using an iframe. This issue has been patched in version 3.5.0.

PLUGIN Nicegui

CVE-2026-21873

HIGH CVSS 7.2 2026-01-08
Threat Entry Updated 2026-01-20

CVE-2026-21894 - N8n Plugin

n8n is an open source workflow automation platform. In versions from 0.150.0 to before 2.2.2, an authentication bypass vulnerability in the Stripe Trigger node allows unauthenticated parties to trigger workflows by sending forged Stripe webhook events. The Stripe Trigger creates and stores a Stripe webhook signing secret when registering the webhook endpoint, but incoming webhook requests were not verified against this secret. As a result, any HTTP client that knows the webhook URL could send a POST request containing a matching event type, causing the workflow to execute as if…

PLUGIN N8n

CVE-2026-21894

MEDIUM CVSS 6.5 2026-01-08
Threat Entry Updated 2026-01-15

CVE-2026-21872 - Nicegui Plugin

NiceGUI is a Python-based UI framework. From versions 2.22.0 to 3.4.1, an unsafe implementation in the click event listener used by ui.sub_pages, combined with attacker-controlled link rendering on the page, causes XSS when the user actively clicks on the link. This issue has been patched in version 3.5.0.

PLUGIN Nicegui

CVE-2026-21872

MEDIUM CVSS 6.1 2026-01-08
Threat Entry Updated 2026-01-15

CVE-2026-21871 - Nicegui Plugin

NiceGUI is a Python-based UI framework. From versions 2.13.0 to 3.4.1, there is a XSS risk in NiceGUI when developers pass attacker-controlled strings into ui.navigate.history.push() or ui.navigate.history.replace(). These helpers are documented as History API wrappers for updating the browser URL without page reload. However, if the URL argument is embedded into generated JavaScript without proper escaping, a crafted payload can break out of the intended string context and execute arbitrary JavaScript in the victim’s browser. Applications that do not pass untrusted input into ui.navigate.history.push/replace are not affected. This issue has…

PLUGIN Nicegui

CVE-2026-21871

MEDIUM CVSS 6.1 2026-01-08
Threat Entry Updated 2026-01-15

CVE-2026-21874 - Nicegui Plugin

NiceGUI is a Python-based UI framework. From versions v2.10.0 to 3.4.1, an unauthenticated attacker can exhaust Redis connections by repeatedly opening and closing browser tabs on any NiceGUI application using Redis-backed storage. Connections are never released, leading to service degradation when Redis hits its connection limit. NiceGUI continues accepting new connections - errors are logged but the app stays up with broken storage functionality. This issue has been patched in version 3.5.0.

PLUGIN Nicegui

CVE-2026-21874

MEDIUM CVSS 5.3 2026-01-08
Scroll to top