Aggregator
GISEC GLOBAL 2026 – The Middle East & Africa’s Largest Cybersecurity Event
5 days 11 hours hence
CVE-2026-42208: LiteLLM bug exploited 36 hours after its disclosure
3 hours 46 minutes ago
Attackers quickly exploited a critical LiteLLM flaw (CVE-2026-42208) to access and modify sensitive database data via SQL injection. Attackers rapidly exploited a critical vulnerability in LiteLLM Python package, tracked as CVE-2026-42208, just days after it became public. The vulnerability, an SQL injection in the proxy API key verification process, lets attackers access and potentially modify database […]
Pierluigi Paganini
CVE-2026-7470 | Tenda 4G300 US_4G300V1.0Mt_V1.01.42_CN_TDC01 /goform/SafeMacFilter sub_427C3C page stack-based overflow
4 hours 30 minutes ago
A vulnerability classified as critical has been found in Tenda 4G300 US_4G300V1.0Mt_V1.01.42_CN_TDC01. Affected is the function sub_427C3C of the file /goform/SafeMacFilter. This manipulation of the argument page causes stack-based buffer overflow.
This vulnerability is registered as CVE-2026-7470. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
vuldb.com
CVE-2026-7469 | Tenda 4G300 US_4G300V1.0Mt_V1.01.42_CN_TDC01 /goform/DelFil sub_425A28 delflag command injection
4 hours 30 minutes ago
A vulnerability described as critical has been identified in Tenda 4G300 US_4G300V1.0Mt_V1.01.42_CN_TDC01. This impacts the function sub_425A28 of the file /goform/DelFil. The manipulation of the argument delflag results in command injection.
This vulnerability is cataloged as CVE-2026-7469. The attack may be launched remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2026-7468 | 1024-lab smart-admin up to 3.30.0 Demo Site index.html access control (Issue 117)
4 hours 34 minutes ago
A vulnerability marked as critical has been reported in 1024-lab smart-admin up to 3.30.0. This affects an unknown function of the file /smart-admin-api/druid/index.html of the component Demo Site. The manipulation leads to improper access controls.
This vulnerability is listed as CVE-2026-7468. The attack may be initiated remotely. In addition, an exploit is available.
The project was informed of the problem early through an issue report but has not responded yet.
vuldb.com
CVE-2026-27105 | Dell Alienware Purchased Apps up to 1.1.31.0 link following (dsa-2026-131)
4 hours 36 minutes ago
A vulnerability labeled as critical has been found in Dell Alienware Purchased Apps up to 1.1.31.0. The impacted element is an unknown function. Executing a manipulation can lead to link following.
This vulnerability is tracked as CVE-2026-27105. The attack is restricted to local execution. No exploit exists.
The affected component should be upgraded.
vuldb.com
CVE-2026-7422 | AWS FreeRTOS-Plus-TCP up to 4.2.5/4.4.0 Loopback Detection authentication spoofing (EUVD-2026-26275)
4 hours 36 minutes ago
A vulnerability identified as critical has been detected in AWS FreeRTOS-Plus-TCP up to 4.2.5/4.4.0. The affected element is an unknown function of the component Loopback Detection. Performing a manipulation results in authentication bypass by spoofing.
This vulnerability is identified as CVE-2026-7422. The attack can only be performed from the local network. There is not any exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2026-7424 | AWS FreeRTOS-Plus-TCP up to 4.2.5/4.4.0 integer underflow (EUVD-2026-26277)
4 hours 36 minutes ago
A vulnerability categorized as problematic has been discovered in AWS FreeRTOS-Plus-TCP up to 4.2.5/4.4.0. Impacted is an unknown function. Such manipulation leads to integer underflow.
This vulnerability is referenced as CVE-2026-7424. The attack needs to be initiated within the local network. No exploit is available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-7423 | AWS FreeRTOS-Plus-TCP up to 4.2.5/4.4.0 Packet Length integer underflow (EUVD-2026-26276)
4 hours 36 minutes ago
A vulnerability was found in AWS FreeRTOS-Plus-TCP up to 4.2.5/4.4.0. It has been rated as problematic. This issue affects some unknown processing of the component Packet Length Handler. This manipulation causes integer underflow.
The identification of this vulnerability is CVE-2026-7423. The attack needs to be done within the local network. There is no exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-7466 | berabuddies AgentFlow /api/runs pipeline_path code injection (1667fa3 / EUVD-2026-26279)
4 hours 37 minutes ago
A vulnerability was found in berabuddies AgentFlow. It has been declared as critical. This vulnerability affects unknown code of the file /api/runs. The manipulation of the argument pipeline_path results in code injection.
This vulnerability was named CVE-2026-7466. The attack may be performed from remote. There is no available exploit.
It is best practice to apply a patch to resolve this issue.
vuldb.com
CVE-2026-5712 | SailPoint IdentityIQ up to 8.3p4/8.4p3/8.5p1 authorization
4 hours 57 minutes ago
A vulnerability was found in SailPoint IdentityIQ up to 8.3p4/8.4p3/8.5p1. It has been classified as problematic. This affects an unknown part. The manipulation leads to incorrect authorization.
This vulnerability is uniquely identified as CVE-2026-5712. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-6914 | MongoDB Server up to 7.0.31/8.0.20/8.1.0/8.2.6 BSON Object integer underflow
4 hours 59 minutes ago
A vulnerability was found in MongoDB Server up to 7.0.31/8.0.20/8.1.0/8.2.6 and classified as problematic. Affected by this issue is some unknown functionality of the component BSON Object Handler. Executing a manipulation can lead to integer underflow.
This vulnerability is handled as CVE-2026-6914. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
vuldb.com
CVE-2026-26015 | arc53 DocsGPT up to 0.15.x command injection (GHSA-gcrq-f296-2j74)
5 hours ago
A vulnerability has been found in arc53 DocsGPT up to 0.15.x and classified as critical. Affected by this vulnerability is an unknown functionality. Performing a manipulation results in command injection.
This vulnerability is known as CVE-2026-26015. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
vuldb.com
CVE-2026-26206 | Wazuh up to 4.14.3 authenticate excessive authentication
5 hours ago
A vulnerability, which was classified as problematic, was found in Wazuh up to 4.14.3. Affected is an unknown function of the file /security/user/authenticate. Such manipulation leads to improper restriction of excessive authentication attempts.
This vulnerability is traded as CVE-2026-26206. The attack may be launched remotely. There is no exploit available.
You should upgrade the affected component.
vuldb.com
CVE-2026-26204 | Wazuh up to 4.14.3 Alert GetAlertData buffer underflow (GHSA-j4c7-hwjw-8857)
5 hours 5 minutes ago
A vulnerability, which was classified as problematic, has been found in Wazuh up to 4.14.3. This impacts the function GetAlertData of the component Alert Handler. This manipulation causes buffer underwrite.
This vulnerability appears as CVE-2026-26204. The attack requires local access. There is no available exploit.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-6915 | MongoDB Server up to 7.0.31/8.0.20/8.2.6 Management Command improper validation of specified quantity in input
5 hours 7 minutes ago
A vulnerability classified as critical was found in MongoDB Server up to 7.0.31/8.0.20/8.2.6. This affects an unknown function of the component Management Command Handler. The manipulation results in improper validation of specified quantity in input.
This vulnerability is reported as CVE-2026-6915. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
vuldb.com
CVE-2026-41499 | Wazuh up to 4.14.3 remoted_op.c parse_uname_string buffer underflow (EUVD-2026-26272)
5 hours 8 minutes ago
A vulnerability classified as problematic has been found in Wazuh up to 4.14.3. The impacted element is the function parse_uname_string of the file remoted_op.c. The manipulation leads to buffer underwrite.
This vulnerability is documented as CVE-2026-41499. The attack can be initiated remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2026-28221 | Wazuh up to 4.14.3 print_hex_string stack-based overflow (EUVD-2026-26270)
5 hours 8 minutes ago
A vulnerability described as critical has been identified in Wazuh up to 4.14.3. The affected element is the function print_hex_string. Executing a manipulation can lead to stack-based buffer overflow.
This vulnerability is registered as CVE-2026-28221. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is recommended.
vuldb.com
CVE-2026-7439 | berabuddies AgentFlow Localhost API /api/runs origin validation (1667fa3)
5 hours 8 minutes ago
A vulnerability marked as problematic has been reported in berabuddies AgentFlow. Impacted is an unknown function of the file /api/runs of the component Localhost API. Performing a manipulation results in origin validation error.
This vulnerability is cataloged as CVE-2026-7439. The attack must be initiated from a local position. There is no exploit available.
Applying a patch is the recommended action to fix this issue.
vuldb.com