Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,024
Critical923
High3,044
Medium10,857
Reset
Showing 1501-1520 of 15024 records
Threat Entry Updated 2026-02-06

CVE-2026-1133 - KSOA Plugin

A vulnerability was determined in Yonyou KSOA 9.0. The impacted element is an unknown function of the file /kmf/folder.jsp of the component HTTP GET Parameter Handler. Executing a manipulation of the argument folderid can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1133

MEDIUM CVSS 6.9 2026-01-19
Threat Entry Updated 2026-02-06

CVE-2026-1132 - KSOA Plugin

A vulnerability was found in Yonyou KSOA 9.0. The affected element is an unknown function of the file /kmf/edit_folder.jsp of the component HTTP GET Parameter Handler. Performing a manipulation of the argument folderid results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1132

MEDIUM CVSS 6.9 2026-01-19
Threat Entry Updated 2026-02-10

CVE-2026-1131 - KSOA Plugin

A vulnerability has been found in Yonyou KSOA 9.0. Impacted is an unknown function of the file /kmc/save_catalog.jsp of the component HTTP GET Parameter Handler. Such manipulation of the argument catalogid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1131

MEDIUM CVSS 6.9 2026-01-19
Threat Entry Updated 2026-02-10

CVE-2026-1130 - KSOA Plugin

A flaw has been found in Yonyou KSOA 9.0. This issue affects some unknown processing of the file /worksheet/worksadd_plan.jsp of the component HTTP GET Parameter Handler. This manipulation of the argument ID causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1130

MEDIUM CVSS 6.9 2026-01-19
Threat Entry Updated 2026-02-10

CVE-2026-1129 - KSOA Plugin

A vulnerability was detected in Yonyou KSOA 9.0. This vulnerability affects unknown code of the file /worksheet/worksadd.jsp of the component HTTP GET Parameter Handler. The manipulation of the argument ID results in sql injection. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1129

MEDIUM CVSS 6.9 2026-01-19
Threat Entry Updated 2026-02-23

CVE-2026-23829 - Mailpit Plugin

Mailpit is an email testing tool and API for developers. Prior to version 1.28.3, Mailpit's SMTP server is vulnerable to Header Injection due to an insufficient Regular Expression used to validate `RCPT TO` and `MAIL FROM` addresses. An attacker can inject arbitrary SMTP headers (or corrupt existing ones) by including carriage return characters (`\r`) in the email address. This header injection occurs because the regex intended to filter control characters fails to exclude `\r` and `\n` when used inside a character class. Version 1.28.3 fixes this issue.

PLUGIN Mailpit

CVE-2026-23829

MEDIUM CVSS 5.3 2026-01-19
Threat Entry Updated 2026-02-18

CVE-2026-23644 - esm.sh Plugin

esm.sh is a no-build content delivery network (CDN) for web development. Prior to Go pseeudoversion 0.0.0-20260116051925-c62ab83c589e, the software has a path traversal vulnerability due to an incomplete fix. `path.Clean` normalizes a path but does not prevent absolute paths in a malicious tar file. Commit https://github.com/esm-dev/esm.sh/commit/9d77b88c320733ff6689d938d85d246a3af9af16, corresponding to pseudoversion 0.0.0-20260116051925-c62ab83c589e, fixes this issue.

PLUGIN esm.sh

CVE-2026-23644

HIGH CVSS 7.7 2026-01-18
Threat Entry Updated 2026-02-18

CVE-2026-23626 - Kimai Plugin

Kimai is a web-based multi-user time-tracking application. Prior to version 2.46.0, Kimai's export functionality uses a Twig sandbox with an overly permissive security policy (`DefaultPolicy`) that allows arbitrary method calls on objects available in the template context. An authenticated user with export permissions can deploy a malicious Twig template that extracts sensitive information including environment variables, all user password hashes, serialized session tokens, and CSRF tokens. Version 2.46.0 patches this issue.

PLUGIN Kimai

CVE-2026-23626

MEDIUM CVSS 6.8 2026-01-18
Threat Entry Updated 2026-01-26

CVE-2026-23733 - Lobe Chat Plugin

LobeChat is an open source chat application platform. Prior to version 2.0.0-next.180, a stored Cross-Site Scripting (XSS) vulnerability in the Mermaid artifact renderer allows attackers to execute arbitrary JavaScript within the application context. This XSS can be escalated to Remote Code Execution (RCE) by leveraging the exposed `electronAPI` IPC bridge, allowing attackers to run arbitrary system commands on the victim's machine. Version 2.0.0-next.180 patches the issue.

PLUGIN Lobe Chat

CVE-2026-23733

MEDIUM CVSS 6.4 2026-01-18
Threat Entry Updated 2026-01-26

CVE-2026-23525 - 1Panel Plugin

1Panel is an open-source, web-based control panel for Linux server management. A stored Cross-Site Scripting (XSS) vulnerability exists in the 1Panel App Store when viewing application details. Malicious scripts can execute in the context of the user’s browser, potentially compromising session data or sensitive system interfaces. All versions of 1Panel up to and including v1.10.33-lts and v2.0.16 are affected. An attacker could publish a malicious application that, when loaded by users (locally or remotely), can execute arbitrary scripts. This may result in theft of user cookies, unauthorized access to system…

PLUGIN 1Panel

CVE-2026-23525

MEDIUM CVSS 6.4 2026-01-18
Threat Entry Updated 2026-02-23

CVE-2026-1126 - Flow Plugin

A security vulnerability has been detected in lwj flow up to a3d2fe8133db9d3b50fda4f66f68634640344641. This affects the function uploadFile of the file \flow-master\flow-front-rest\src\main\java\com\dragon\flow\web\resource\flow\FormResource.java of the component SVG File Handler. The manipulation of the argument File leads to unrestricted upload. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The project was informed of the problem early through an issue report…

PLUGIN Flow

CVE-2026-1126

MEDIUM CVSS 5.3 2026-01-18
Threat Entry Updated 2026-02-10

CVE-2026-0863 - N8n Plugin

Using string formatting and exception handling, an attacker may bypass n8n's python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system. The vulnerability can be exploited via the Code block by an authenticated user with basic permissions and can lead to a full n8n instance takeover on instances operating under "Internal" execution mode. If the instance is operating under the "External" execution mode (ex. n8n's official Docker image) - arbitrary code execution occurs inside a Sidecar container and not the main node, which significantly reduces the…

PLUGIN N8n

CVE-2026-0863

HIGH CVSS 8.5 2026-01-18
Threat Entry Updated 2026-02-23

CVE-2026-1125 - DIR-823X Plugin

A weakness has been identified in D-Link DIR-823X 250416. Affected by this issue is the function sub_412E7C of the file /goform/set_wifidog_settings. Executing a manipulation of the argument wd_enable can lead to command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.

PLUGIN DIR-823X

CVE-2026-1125

MEDIUM CVSS 6.9 2026-01-18
Threat Entry Updated 2026-02-10

CVE-2026-1124 - KSOA Plugin

A security flaw has been discovered in Yonyou KSOA 9.0. Affected by this vulnerability is an unknown functionality of the file /worksheet/work_report.jsp of the component HTTP GET Parameter Handler. Performing a manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1124

MEDIUM CVSS 6.9 2026-01-18
Threat Entry Updated 2026-02-09

CVE-2026-1123 - KSOA Plugin

A vulnerability was identified in Yonyou KSOA 9.0. Affected is an unknown function of the file /worksheet/work_mod.jsp of the component HTTP GET Parameter Handler. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1123

MEDIUM CVSS 6.9 2026-01-18
Threat Entry Updated 2026-02-09

CVE-2026-1122 - KSOA Plugin

A vulnerability was determined in Yonyou KSOA 9.0. This impacts an unknown function of the file /worksheet/work_info.jsp of the component HTTP GET Parameter Handler. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1122

MEDIUM CVSS 6.9 2026-01-18
Threat Entry Updated 2026-02-09

CVE-2026-1121 - KSOA Plugin

A vulnerability was found in Yonyou KSOA 9.0. This affects an unknown function of the file /worksheet/del_workplan.jsp of the component HTTP GET Parameter Handler. The manipulation of the argument ID results in sql injection. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1121

MEDIUM CVSS 6.9 2026-01-18
Threat Entry Updated 2026-02-09

CVE-2026-1120 - KSOA Plugin

A vulnerability has been found in Yonyou KSOA 9.0. The impacted element is an unknown function of the file /worksheet/del_work.jsp of the component HTTP GET Parameter Handler. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1120

MEDIUM CVSS 6.9 2026-01-18
Threat Entry Updated 2026-02-04

CVE-2026-1119 - Society Management System Plugin

A flaw has been found in itsourcecode Society Management System 1.0. The affected element is an unknown function of the file /admin/delete_activity.php. Executing a manipulation of the argument activity_id can lead to sql injection. It is possible to launch the attack remotely. The exploit has been published and may be used.

PLUGIN Society Management System

CVE-2026-1119

MEDIUM CVSS 6.9 2026-01-18
Threat Entry Updated 2026-02-04

CVE-2026-1118 - Society Management System Plugin

A vulnerability was detected in itsourcecode Society Management System 1.0. Impacted is an unknown function of the file /admin/add_activity.php. Performing a manipulation of the argument Title results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.

PLUGIN Society Management System

CVE-2026-1118

MEDIUM CVSS 5.3 2026-01-18
Scroll to top