Aggregator
UK Agency Exposed Corporate Executive Data
1 month 2 weeks ago
Directory Traversal Flaw Found in Companies House
The British government's company register service temporarily deactivated its online filing service after someone found a serious vulnerability that allowed people to access directors' sensitive personal data and potentially even amend companies' records or file bogus accounts on their behalf.
The British government's company register service temporarily deactivated its online filing service after someone found a serious vulnerability that allowed people to access directors' sensitive personal data and potentially even amend companies' records or file bogus accounts on their behalf.
Standing up for the open Internet: why we appealed Italy’s "Piracy Shield" fine
1 month 2 weeks ago
Cloudflare is appealing a €14 million fine from Italian regulators over "Piracy Shield," a system that forces providers to block content without oversight. We are challenging this framework to protect the Internet from disproportionate overblocking and lack of due process.
Patrick Nemeroff
New Phishing Scam Uses LiveChat to Pose as Amazon and PayPal in Real Time
1 month 2 weeks ago
Cofense researchers warn of a phishing scam where attackers use LiveChat to impersonate Amazon and PayPal agents and steal credit card and MFA codes.
Deeba Ahmed
CVE-2026-28500 | onnx onnx.hub.load data authenticity
1 month 2 weeks ago
A vulnerability identified as problematic has been detected in onnx. This issue affects the function onnx.hub.load. The manipulation leads to insufficient verification of data authenticity.
This vulnerability is documented as CVE-2026-28500. The attack can be initiated remotely. There is not any exploit available.
vuldb.com
CVE-2026-4224 | Python CPython up to 3.14.x Expat Parser ElementDeclHandler stack-based overflow (EUVD-2026-12486)
1 month 2 weeks ago
A vulnerability categorized as critical has been discovered in Python CPython up to 3.14.x. This vulnerability affects the function ElementDeclHandler of the component Expat Parser. Executing a manipulation can lead to stack-based buffer overflow.
This vulnerability is registered as CVE-2026-4224. It is possible to launch the attack remotely. No exploit is available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-23862 | Dell ThinOS 10 2602_10.0573 command injection (dsa-2026-122)
1 month 2 weeks ago
A vulnerability was found in Dell ThinOS 10 2602_10.0573. It has been rated as critical. This affects an unknown part. Performing a manipulation results in command injection.
This vulnerability is cataloged as CVE-2026-23862. The attack must be initiated from a local position. There is no exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-3644 | Python CPython up to 3.14.x http.cookies.Morsel input validation (EUVD-2026-12484)
1 month 2 weeks ago
A vulnerability was found in Python CPython up to 3.14.x. It has been declared as critical. Affected by this issue is the function http.cookies.Morsel. Such manipulation leads to improper input validation.
This vulnerability is listed as CVE-2026-3644. The attack may be performed from remote. There is no available exploit.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-4269 | Amazon AWS Bedrock AgentCore Starter Toolkit up to 0.1.12 generation of predictable numbers or identifiers
1 month 2 weeks ago
A vulnerability was found in Amazon AWS Bedrock AgentCore Starter Toolkit up to 0.1.12. It has been classified as critical. Affected by this vulnerability is an unknown functionality. This manipulation causes generation of predictable numbers or identifiers.
This vulnerability is tracked as CVE-2026-4269. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2025-69768 | Chyrp up to 2.5.2 Admin.php sql injection
1 month 2 weeks ago
A vulnerability was found in Chyrp up to 2.5.2 and classified as critical. Affected is an unknown function of the file Admin.php. The manipulation results in sql injection.
This vulnerability is identified as CVE-2025-69768. The attack can be executed remotely. There is not any exploit available.
vuldb.com
CVE-2026-27962 | Authlib up to 1.6.8 signature verification
1 month 2 weeks ago
A vulnerability has been found in Authlib up to 1.6.8 and classified as critical. This impacts an unknown function. The manipulation leads to improper verification of cryptographic signature.
This vulnerability is referenced as CVE-2026-27962. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
vuldb.com
CVE-2026-28498 | Authlib up to 1.6.8 Header Parameter integrity check
1 month 2 weeks ago
A vulnerability, which was classified as problematic, was found in Authlib up to 1.6.8. This affects an unknown function of the component Header Parameter Handler. Executing a manipulation can lead to improper validation of integrity check value.
The identification of this vulnerability is CVE-2026-28498. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2026-28490 | Authlib up to 1.6.8 information exposure (GHSA-7432-952)
1 month 2 weeks ago
A vulnerability, which was classified as problematic, has been found in Authlib up to 1.6.8. The impacted element is an unknown function. Performing a manipulation results in information exposure through discrepancy.
This vulnerability was named CVE-2026-28490. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
vuldb.com
INC
1 month 2 weeks ago
You must login to view this content
cohenido
CVE-2025-66687 | Doom Launcher 3.8.1.0 Path Validation path traversal
1 month 2 weeks ago
A vulnerability classified as critical was found in Doom Launcher 3.8.1.0. The affected element is an unknown function of the component Path Validation Handler. Such manipulation leads to path traversal.
This vulnerability is uniquely identified as CVE-2025-66687. The attack can be launched remotely. No exploit exists.
vuldb.com
CVE-2026-29521 | Shenzhen Hereta Hereta ETH-IMC408M up to 1.0.15 Setting setup.cgi cross-site request forgery
1 month 2 weeks ago
A vulnerability classified as problematic has been found in Shenzhen Hereta Hereta ETH-IMC408M up to 1.0.15. Impacted is an unknown function of the file setup.cgi of the component Setting Handler. This manipulation causes cross-site request forgery.
This vulnerability is handled as CVE-2026-29521. The attack can be initiated remotely. There is not any exploit available.
vuldb.com
CVE-2026-30405 | GoBGP GoBGPd 4.2.0 NEXT_HOP denial of service (Issue 3305)
1 month 2 weeks ago
A vulnerability described as problematic has been identified in GoBGP GoBGPd 4.2.0. This issue affects some unknown processing. The manipulation of the argument NEXT_HOP results in denial of service.
This vulnerability is known as CVE-2026-30405. It is possible to launch the attack remotely. No exploit is available.
vuldb.com
CVE-2026-29520 | Shenzhen Hereta Hereta ETH-IMC408M up to 1.0.15 ping_ipaddr cross site scripting
1 month 2 weeks ago
A vulnerability marked as problematic has been reported in Shenzhen Hereta Hereta ETH-IMC408M up to 1.0.15. This vulnerability affects unknown code. The manipulation of the argument ping_ipaddr leads to cross site scripting.
This vulnerability is traded as CVE-2026-29520. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2026-29513 | Shenzhen Hereta Hereta ETH-IMC408M up to 1.0.15 System Status Interface Device Location cross site scripting
1 month 2 weeks ago
A vulnerability labeled as problematic has been found in Shenzhen Hereta Hereta ETH-IMC408M up to 1.0.15. This affects an unknown part of the component System Status Interface. Executing a manipulation of the argument Device Location can lead to cross site scripting.
This vulnerability appears as CVE-2026-29513. The attack may be performed from remote. There is no available exploit.
vuldb.com
CVE-2026-29510 | Shenzhen Hereta Hereta ETH-IMC408M up to 1.0.15 System Status Interface Device Name cross site scripting
1 month 2 weeks ago
A vulnerability identified as problematic has been detected in Shenzhen Hereta Hereta ETH-IMC408M up to 1.0.15. Affected by this issue is some unknown functionality of the component System Status Interface. Performing a manipulation of the argument Device Name results in cross site scripting.
This vulnerability is reported as CVE-2026-29510. The attack is possible to be carried out remotely. No exploit exists.
vuldb.com