5.9

CVSS3.1

CVE-2026-24910 -

In Bun before 1.3.5, the default trusted dependencies list (aka trust allow list) can be spoofed by a non-npm package in the case of a matching name (for file, link, git, or github).

๐Ÿ“… Published: Jan. 27, 2026, 10:26 p.m. ๐Ÿ”„ Last Modified: Jan. 29, 2026, 4:31 p.m.

5.9

CVSS3.1

CVE-2026-24909 -

vlt before 1.0.0-rc.10 mishandles path sanitization for tar, leading to path traversal during extraction.

๐Ÿ“… Published: Jan. 27, 2026, 10:14 p.m. ๐Ÿ”„ Last Modified: Jan. 29, 2026, 4:31 p.m.

7.5

CVSS3.1

CVE-2026-24783 - soroban-fixed-point-math has Incorrect Rounding and Overflow Handling in Signed Fixed-Point Math wiโ€ฆ

soroban-fixed-point-math is a fixed-point math library for Soroban smart contacts. In versions 1.3.0 and 1.4.0, the `mulDiv(x, y, z)` function incorrectly handled cases where both the intermediate product $x * y$ and the divisor $z$ were negative. The logic assumed that if the intermediate product โ€ฆ

๐Ÿ“… Published: Jan. 27, 2026, 10:04 p.m. ๐Ÿ”„ Last Modified: Jan. 29, 2026, 4:31 p.m.

7.1

CVSS3.1

CVE-2026-24779 - vLLM vulnerable to Server-Side Request Forgery (SSRF) in `MediaConnector`

vLLM is an inference and serving engine for large language models (LLMs). Prior to version 0.14.1, a Server-Side Request Forgery (SSRF) vulnerability exists in the `MediaConnector` class within the vLLM project's multimodal feature set. The load_from_url and load_from_url_async methods obtain and pโ€ฆ

๐Ÿ“… Published: Jan. 27, 2026, 10:01 p.m. ๐Ÿ”„ Last Modified: Jan. 30, 2026, 2:41 p.m.

8.8

CVSS3.1

CVE-2026-24778 - Ghost vulnerable to XSS via malicious Portal preview links

Ghost is an open source content management system. In Ghost versions 5.43.0 through 5.12.04 and 6.0.0 through 6.14.0, an attacker was able to craft a malicious link that, when accessed by an authenticated staff user or member, would execute JavaScript with the victim's permissions, potentially leadโ€ฆ

๐Ÿ“… Published: Jan. 27, 2026, 9:57 p.m. ๐Ÿ”„ Last Modified: Feb. 2, 2026, 3:21 p.m.

9.8

CVSS3.1

CVE-2026-24770 - RAGFlow Affected by Zip Slip Remote Code Execution (RCE) in MinerUParser

RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In version 0.23.1 and possibly earlier versions, the MinerU parser contains a "Zip Slip" vulnerability, allowing an attacker to overwrite arbitrary files on the server (leading to Remote Code Execution) via a malicious ZIP archiโ€ฆ

๐Ÿ“… Published: Jan. 27, 2026, 9:51 p.m. ๐Ÿ”„ Last Modified: Jan. 30, 2026, 9:53 p.m.

7.8

CVSS3.1

CVE-2026-24765 - PHPUnit Vulnerable to Unsafe Deserialization in PHPT Code Coverage Handling

PHPUnit is a testing framework for PHP. A vulnerability has been discovered in versions prior to 12.5.8, 11.5.50, 10.5.62, 9.6.33, and 8.5.52 involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists in the `cleanupForCoverage()` method, which deserialiโ€ฆ

๐Ÿ“… Published: Jan. 27, 2026, 9:35 p.m. ๐Ÿ”„ Last Modified: March 3, 2026, 3:25 p.m.

6.9

CVSS4.0

CVE-2026-24748 - Kargo's `GetConfig()` and `RefreshResource()` API endpoints allow unauthenticated access

Kargo manages and automates the promotion of software artifacts. Prior to versions 1.8.7, 1.7.7, and 1.6.3, a bug was found with authentication checks on the `GetConfig()` API endpoint. This allowed unauthenticated users to access this endpoint by specifying an `Authorization` header with any non-eโ€ฆ

๐Ÿ“… Published: Jan. 27, 2026, 9:23 p.m. ๐Ÿ”„ Last Modified: Feb. 25, 2026, 5:59 p.m.

8.8

CVSS3.1

CVE-2026-24747 - PyTorch Vulnerable to Remote Code Execution via Untrusted Checkpoint Files

PyTorch is a Python package that provides tensor computation. Prior to version 2.10.0, a vulnerability in PyTorch's `weights_only` unpickler allows an attacker to craft a malicious checkpoint file (`.pth`) that, when loaded with `torch.load(..., weights_only=True)`, can corrupt memory and potentialโ€ฆ

๐Ÿ“… Published: Jan. 27, 2026, 9:13 p.m. ๐Ÿ”„ Last Modified: Feb. 26, 2026, 3:04 p.m.

8.1

CVSS3.1

CVE-2026-24741 - ConvertX Vulnerable to Arbitrary File Deletion via Path Traversal in `POST /delete`

ConvertXis a self-hosted online file converter. In versions prior to 0.17.0, the `POST /delete` endpoint uses a user-controlled `filename` value to construct a filesystem path and deletes it via `unlink` without sufficient validation. By supplying path traversal sequences (e.g., `../`), an attackerโ€ฆ

๐Ÿ“… Published: Jan. 27, 2026, 9:11 p.m. ๐Ÿ”„ Last Modified: Feb. 12, 2026, 9:08 p.m.
Total resulsts: 343968
Page 1403 of 34,397
ยซ previous page ยป next page
Filters