Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,024
Critical923
High3,044
Medium10,857
Reset
Showing 1661-1680 of 15024 records
Threat Entry Updated 2026-02-05

CVE-2026-23520 - Arcane Plugin

Arcane provides modern docker management. Prior to 1.13.0, Arcane has a command injection in the updater service. Arcane’s updater service supported lifecycle labels com.getarcaneapp.arcane.lifecycle.pre-update and com.getarcaneapp.arcane.lifecycle.post-update that allowed defining a command to run before or after a container update. The label value is passed directly to /bin/sh -c without sanitization or validation. Because any authenticated user (not limited to administrators) can create projects through the API, an attacker can create a project that specifies one of these lifecycle labels with a malicious command. When an administrator later triggers a container…

PLUGIN Arcane

CVE-2026-23520

CRITICAL CVSS 9.0 2026-01-15
Threat Entry Updated 2026-01-23

CVE-2026-23527 - H3 Plugin

H3 is a minimal H(TTP) framework built for high performance and portability. Prior to 1.15.5, there is a critical HTTP Request Smuggling vulnerability. readRawBody is doing a strict case-sensitive check for the Transfer-Encoding header. It explicitly looks for "chunked", but per the RFC, this header should be case-insensitive. This vulnerability is fixed in 1.15.5.

PLUGIN H3

CVE-2026-23527

HIGH CVSS 8.9 2026-01-15
Threat Entry Updated 2026-01-23

CVE-2026-23519 - Utils Plugin

RustCrypto CMOV provides conditional move CPU intrinsics which are guaranteed on major platforms to execute in constant-time and not be rewritten as branches by the compiler. Prior to 0.4.4, the thumbv6m-none-eabi (Cortex M0, M0+ and M1) compiler emits non-constant time assembly when using cmovnz (portable version). This vulnerability is fixed in 0.4.4.

PLUGIN Utils

CVE-2026-23519

HIGH CVSS 8.9 2026-01-15
Threat Entry Updated 2026-01-28

CVE-2026-23622 - Easyappointments Plugin

Easy!Appointments is a self hosted appointment scheduler. In 1.5.2 and earlier, application/core/EA_Security.php::csrf_verify() only enforces CSRF for POST requests and returns early for non-POST methods. Several application endpoints perform state-changing operations while accepting parameters from GET (or $_REQUEST), so an attacker can perform CSRF by forcing a victim's browser to issue a crafted GET request. Impact: creation of admin accounts, modification of admin email/password, and full admin account takeover.

PLUGIN Easyappointments

CVE-2026-23622

HIGH CVSS 8.7 2026-01-15
Threat Entry Updated 2026-01-20

CVE-2026-23511 - Zitadel Plugin

ZITADEL is an open source identity management platform. Prior to 4.9.1 and 3.4.6, a user enumeration vulnerability has been discovered in Zitadel's login interfaces. An unauthenticated attacker can exploit this flaw to confirm the existence of valid user accounts by iterating through usernames and userIDs. This vulnerability is fixed in 4.9.1 and 3.4.6.

PLUGIN Zitadel

CVE-2026-23511

MEDIUM CVSS 5.3 2026-01-15
Threat Entry Updated 2026-01-21

CVE-2026-22803 - Kit Plugin

SvelteKit is a framework for rapidly developing robust, performant web applications using Svelte. From 2.49.0 to 2.49.4, the experimental form remote function uses a binary data format containing a representation of submitted form data. A specially-crafted payload can cause the server to allocate a large amount of memory, causing DoS via memory exhaustion. This vulnerability is fixed in 2.49.5.

PLUGIN Kit

CVE-2026-22803

HIGH CVSS 8.2 2026-01-15
Threat Entry Updated 2026-01-20

CVE-2026-22775 - Devalue Plugin

Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. From 5.1.0 to 5.6.1, certain inputs can cause devalue.parse to consume excessive CPU time and/or memory, potentially leading to denial of service in systems that parse input from untrusted sources. This affects applications using devalue.parse on externally-supplied data. The root cause is the ArrayBuffer hydration expecting base64 encoded strings as input, but not checking the assumption before decoding the input. This vulnerability is fixed in 5.6.2.

PLUGIN Devalue

CVE-2026-22775

HIGH CVSS 7.5 2026-01-15
Threat Entry Updated 2026-01-20

CVE-2026-22774 - Devalue Plugin

Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. From 5.3.0 to 5.6.1, certain inputs can cause devalue.parse to consume excessive CPU time and/or memory, potentially leading to denial of service in systems that parse input from untrusted sources. This affects applications using devalue.parse on externally-supplied data. The root cause is the typed array hydration expecting an ArrayBuffer as input, but not checking the assumption before creating the typed array. This vulnerability is fixed in 5.6.2.

PLUGIN Devalue

CVE-2026-22774

HIGH CVSS 7.5 2026-01-15
Threat Entry Updated 2026-01-22

CVE-2026-22249 - Docmost Plugin

Docmost is an open-source collaborative wiki and documentation software. From 0.21.0 to before 0.24.0, Docmost is vulnerable to Arbitrary File Write via Zip Import Feature (ZipSlip). In apps/server/src/integrations/import/utils/file.utils.ts, there are no validation on filename. This vulnerability is fixed in 0.24.0.

PLUGIN Docmost

CVE-2026-22249

HIGH CVSS 7.1 2026-01-15
Threat Entry Updated 2026-02-06

CVE-2026-0227 - Prisma Access Plugin

A vulnerability in Palo Alto Networks PAN-OS software enables an unauthenticated attacker to cause a denial of service (DoS) to the firewall. Repeated attempts to trigger this issue results in the firewall entering into maintenance mode.

PLUGIN Prisma Access

CVE-2026-0227

MEDIUM CVSS 6.6 2026-01-15
Threat Entry Updated 2026-01-20

CVE-2026-23493 - Pimcore Plugin

Pimcore is an Open Source Data & Experience Management Platform. Prior to 12.3.1 and 11.5.14, the http_error_log file stores the $_COOKIE and $_SERVER variables, which means sensitive information such as database passwords, cookie session data, and other details can be accessed or recovered through the Pimcore backend. This vulnerability is fixed in 12.3.1 and 11.5.14.

PLUGIN Pimcore

CVE-2026-23493

HIGH CVSS 8.6 2026-01-15
Threat Entry Updated 2026-01-30

CVE-2026-23496 - Pimcore Plugin

Pimcore Web2Print Tools Bundle adds tools for web-to-print use cases to Pimcore. Prior to 5.2.2 and 6.1.1, the application fails to enforce proper server-side authorization checks on the API endpoint responsible for managing "Favourite Output Channel Configurations." Testing revealed that an authenticated backend user without explicitely lacking permissions for this feature was still able to successfully invoke the endpoint and modify or retrieve these configurations. This vulnerability is fixed in 5.2.2 and 6.1.1.

PLUGIN Pimcore

CVE-2026-23496

MEDIUM CVSS 5.4 2026-01-15
Threat Entry Updated 2026-01-30

CVE-2026-23495 - Pimcore Plugin

Pimcore's Admin Classic Bundle provides a Backend UI for Pimcore. Prior to 2.2.3 and 1.7.16, the API endpoint for listing Predefined Properties in the Pimcore platform lacks adequate server-side authorization checks. Predefined Properties are configurable metadata definitions (e.g., name, key, type, default value) used across documents, assets, and objects to standardize custom attributes and improve editorial workflows, as documented in Pimcore's official properties guide. Testing confirmed that an authenticated backend user without explicit permissions for property management could successfully call the endpoint and retrieve the complete list of these configurations.…

PLUGIN Pimcore

CVE-2026-23495

MEDIUM CVSS 4.3 2026-01-15
Threat Entry Updated 2026-01-20

CVE-2026-23494 - Pimcore Plugin

Pimcore is an Open Source Data & Experience Management Platform. Prior to 12.3.1 and 11.5.14, the application fails to enforce proper server-side authorization checks on the API endpoint responsible for reading or listing static routes. In Pimcore, static routes are custom URL patterns defined via the backend interface or the var/config/staticroutes.php file, including details like regex-based patterns, controllers, variables, and priorities. These routes are registered automatically through the PimcoreStaticRoutesBundle and integrated into the MVC routing system. Testing revealed that an authenticated backend user lacking explicit permissions was able to invoke…

PLUGIN Pimcore

CVE-2026-23494

MEDIUM CVSS 4.3 2026-01-15
Threat Entry Updated 2026-01-16

CVE-2026-22867 - Docs Plugin

LaSuite Doc is a collaborative note taking, wiki and documentation platform. From 3.8.0 to 4.3.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Interlinking feature. When a user creates a link to another document within the editor, the URL of that link is not validated. An attacker with document editing privileges can inject a malicious javascript: URL that executes arbitrary code when other users click on the link. This vulnerability is fixed in 4.4.0.

PLUGIN Docs

CVE-2026-22867

HIGH CVSS 8.7 2026-01-15
Threat Entry Updated 2026-02-18

CVE-2026-22265 - Roxy Wi Plugin

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to 8.2.8.2, command injection vulnerability exists in the log viewing functionality that allows authenticated users to execute arbitrary system commands. The vulnerability is in app/modules/roxywi/logs.py line 87, where the grep parameter is used twice - once sanitized and once raw. This vulnerability is fixed in 8.2.8.2.

PLUGIN Roxy Wi

CVE-2026-22265

HIGH CVSS 7.5 2026-01-15
Threat Entry Updated 2026-01-30

CVE-2026-20076 - Cisco Identity Services Engine Software Plugin

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive,…

PLUGIN Cisco Identity Services Engine Software

CVE-2026-20076

MEDIUM CVSS 4.8 2026-01-15
Threat Entry Updated 2026-01-30

CVE-2026-20075 - Cisco Evolved Programmable Network Manager (EPNM) Plugin

A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against users of the interface of an affected system. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious code into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected…

PLUGIN Cisco Evolved Programmable Network Manager (EPNM)

CVE-2026-20075

MEDIUM CVSS 4.8 2026-01-15
Threat Entry Updated 2026-01-30

CVE-2026-20047 - Cisco Identity Services Engine Software Plugin

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the…

PLUGIN Cisco Identity Services Engine Software

CVE-2026-20047

MEDIUM CVSS 4.8 2026-01-15
Threat Entry Updated 2026-01-16

CVE-2026-0990 - Red Hat Enterprise Linux 10 Plugin

A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.

PLUGIN Red Hat Enterprise Linux 10

CVE-2026-0990

MEDIUM CVSS 5.9 2026-01-15
Scroll to top