6.8

CVSS4.0

CVE-2026-31893 - Tunnelblick arbitrary file read via symlink following in tunnelblickd

Tunnelblick is an open source graphic user interface for OpenVPN on macOS. In versions 3.3beta26 through 9.0beta01, any local user can read arbitrary root-owned files by exploiting a symlink following vulnerability in tunnelblick-helper, reachable through the world-accessible tunnelblickd Unix sockโ€ฆ

๐Ÿ“… Published: May 5, 2026, 6:55 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 9:21 a.m.

5.3

CVSS4.0

CVE-2026-31835 - Vaultwarden WebAuthn credential metadata tampered before signature verification

Vaultwarden is a Bitwarden-compatible server written in Rust. In versions 1.35.4 and earlier, the WebAuthn authentication flow in `validate_webauthn_login()` updates persistent credential metadata (1backup_eligible1 and 1backup_state flags1) based on unverified `authenticatorData` before signature โ€ฆ

๐Ÿ“… Published: May 5, 2026, 6:51 p.m. ๐Ÿ”„ Last Modified: May 5, 2026, 8:30 p.m.

8.2

CVSS4.0

CVE-2026-30923 - libModSecurity3 denial of service via segfault when using t:hexDecode on single-character query strโ€ฆ

ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. Libmodsecurity is one component of the ModSecurity v3 project. A segmentation fault occurs when a rule using the t:hexDecode transformation inspects a query string parameter containing a sโ€ฆ

๐Ÿ“… Published: May 5, 2026, 6:46 p.m. ๐Ÿ”„ Last Modified: May 5, 2026, 9:45 p.m.

9.8

CVSS3.1

CVE-2026-27960 - OpenCTI privilege escalation and unauthenticated access via default admin account

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. In versions 6.6.0 through 6.9.12, there is a privilege escalation vulnerability that can be exploited by unauthenticated attackers to query the API as any existing user, including the default admin โ€ฆ

๐Ÿ“… Published: May 5, 2026, 6:35 p.m. ๐Ÿ”„ Last Modified: May 5, 2026, 8:30 p.m.

8.7

CVSS4.0

CVE-2026-7855 - D-Link DI-8100 HTTP Request tggl.asp tggl_asp buffer overflow

A vulnerability was detected in D-Link DI-8100 16.07.26A1. Affected by this issue is the function tggl_asp of the file /tggl.asp of the component HTTP Request Handler. Performing a manipulation of the argument Name results in buffer overflow. The attack can be initiated remotely. The exploit is nowโ€ฆ

๐Ÿ“… Published: May 5, 2026, 6:30 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 5:38 p.m.

9.3

CVSS4.0

CVE-2026-7854 - D-Link DI-8100 POST Parameter url_rule.asp url_rule_asp buffer overflow

A security vulnerability has been detected in D-Link DI-8100 16.07.26A1. Affected by this vulnerability is the function url_rule_asp of the file /url_rule.asp of the component POST Parameter Handler. Such manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploโ€ฆ

๐Ÿ“… Published: May 5, 2026, 6:15 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 5:39 p.m.

9.3

CVSS4.0

CVE-2026-7853 - D-Link DI-8100 HTTP auto_reboot.asp sprintf buffer overflow

A weakness has been identified in D-Link DI-8100 16.07.26A1. Affected is the function sprintf of the file /auto_reboot.asp of the component HTTP Handler. This manipulation of the argument enable/time causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made aโ€ฆ

๐Ÿ“… Published: May 5, 2026, 5:45 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 5:40 p.m.

8.6

CVSS4.0

CVE-2026-7851 - D-Link DI-8100 yyxz.asp sprintf stack-based overflow

A vulnerability was identified in D-Link DI-8100 16.07.26A1. This affects the function sprintf of the file yyxz.asp. The manipulation of the argument ID leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

๐Ÿ“… Published: May 5, 2026, 5:30 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 5:40 p.m.

7.7

CVSS4.0

CVE-2026-25589 - RedisBloom RESTORE invalid memory access may allow remote code execution

RedisBloom is a probabilistic data structures module for Redis. In all versions of RedisBloom before 2.8.20, the module does not properly validate serialized values processed through the Redis RESTORE command. An authenticated attacker with permission to execute RESTORE on a server with the RedisBlโ€ฆ

๐Ÿ“… Published: May 5, 2026, 4:50 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 9:21 a.m.

7.7

CVSS4.0

CVE-2026-25588 - RedisTimeSeries RESTORE invalid memory access may allow remote code execution

RedisTimeSeries is a time-series module for Redis. In all versions before 1.12.14 of RedisTimeSeries, the module does not properly validate serialized values processed through the Redis RESTORE command. An authenticated attacker with permission to execute RESTORE on a server with the RedisTimeSerieโ€ฆ

๐Ÿ“… Published: May 5, 2026, 4:48 p.m. ๐Ÿ”„ Last Modified: May 6, 2026, 9:21 a.m.
Total resulsts: 348605
Page 52 of 34,861
ยซ previous page ยป next page
Filters