6.6

CVSS4.0

CVE-2026-24905 - Inspektor Gadget has a Command Injection vulnerability in Makefile.build

Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kubernetes clusters and Linux hosts using eBPF. The `ig` binary provides a subcommand for image building, used to generate custom gadget OCI images. A part of this functionality is implemented in the file …

πŸ“… Published: Jan. 29, 2026, 9:29 p.m. πŸ”„ Last Modified: April 30, 2026, 7:21 p.m.

7.1

CVSS3.1

CVE-2026-24902 - TrustTunnel has SSRF and private network restriction bypass via numeric address destinations

TrustTunnel is an open-source VPN protocol with a server-side request forgery and and private network restriction bypass in versions prior to 0.9.114. In `tcp_forwarder.rs`, SSRF protection for `allow_private_network_connections = false` was only applied in the `TcpDestination::HostName(peer)` path…

πŸ“… Published: Jan. 29, 2026, 9:21 p.m. πŸ”„ Last Modified: April 18, 2026, 1:30 a.m.

5.3

CVSS3.1

CVE-2026-24904 - TrustTunnel has `client_random_prefix` rule bypass via fragmented or partial TLS ClientHello

TrustTunnel is an open-source VPN protocol with a rule bypass issue in versions prior to 0.9.115. In `tls_listener.rs`, `TlsListener::listen()` peeks 1024 bytes and calls `extract_client_random(...)`. If `parse_tls_plaintext` fails (for example, a fragmented/partial ClientHello split across TCP wri…

πŸ“… Published: Jan. 29, 2026, 9:19 p.m. πŸ”„ Last Modified: April 18, 2026, 2:45 p.m.

5.5

CVSS3.1

CVE-2026-24846 - malcontent's archive extraction could write outside extraction directory

malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. Starting in version 1.8.0 and prior to version 1.20.3, malcontent could be made to create symlinks outside the intended extraction directory when scanning a specially crafted tar or deb archive. The `ha…

πŸ“… Published: Jan. 29, 2026, 9:12 p.m. πŸ”„ Last Modified: April 18, 2026, 2:45 p.m.

6.5

CVSS3.1

CVE-2026-24845 - malcontent's OCI image scanning could expose registry credentials

malcontent discovers supply-chain compromises through. context, differential analysis, and YARA. Starting in version 0.10.0 and prior to version 1.20.3, malcontent could be made to expose Docker registry credentials if it scanned a specially crafted OCI image reference. malcontent uses google/go-co…

πŸ“… Published: Jan. 29, 2026, 9:02 p.m. πŸ”„ Last Modified: April 18, 2026, 1:30 a.m.

5.3

CVSS4.0

CVE-2026-1623 - Totolink A7000R cstecgi.cgi setUpgradeFW command injection

A weakness has been identified in Totolink A7000R 4.1cu.4154. Impacted is the function setUpgradeFW of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument FileName causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and coul…

πŸ“… Published: Jan. 29, 2026, 8:32 p.m. πŸ”„ Last Modified: April 18, 2026, 1:30 a.m.

3.1

CVSS3.1

CVE-2025-15288 - Tanium addressed an improper access controls vulnerability in Interact.

Tanium addressed an improper access controls vulnerability in Interact.

πŸ“… Published: Jan. 29, 2026, 8:10 p.m. πŸ”„ Last Modified: March 9, 2026, 6:09 p.m.

6

CVSS4.0

CVE-2026-24687 - Umbraco.Forms has path traversal and file enumeration vulnerability in Linux/Mac

Umbraco Forms is a form builder that integrates with the Umbraco content management system. It's possible for an authenticated backoffice-user to enumerate and traverse paths/files on the systems filesystem and read their contents, on Mac/Linux Umbraco installations using Forms. As Umbraco Cloud ru…

πŸ“… Published: Jan. 29, 2026, 7:57 p.m. πŸ”„ Last Modified: April 18, 2026, 1:30 a.m.

9.1

CVSS3.1

CVE-2026-22806 - vCluster Platform's Access Keys Allows Access Beyond Scope

vCluster Platform provides a Kubernetes platform for managing virtual clusters, multi-tenancy, and cluster sharing. Prior to versions 4.6.0, 4.5.4, 4.4.2, and 4.3.10, when an access key is created with a limited scope, the scope can be bypassed to access resources outside of it. However, the user s…

πŸ“… Published: Jan. 29, 2026, 7:54 p.m. πŸ”„ Last Modified: April 18, 2026, 1:30 a.m.

5.1

CVSS4.0

CVE-2025-15550 - birkir prime <= 0.4.0.beta.0 - Cross-Site Request Forgery in GraphQL

birkir prime <= 0.4.0.beta.0 contains a cross-site request forgery vulnerability in its GraphQL endpoint that allows attackers to exploit GET-based query requests. Attackers can craft malicious GET requests to trigger unauthorized actions against privileged users by manipulating GraphQL query param…

πŸ“… Published: Jan. 29, 2026, 7:41 p.m. πŸ”„ Last Modified: April 15, 2026, 12:35 a.m.
Total resulsts: 347405
Page 1712 of 34,741
Β« previous page Β» next page
Filters