CVE-2026-8751: h2oai h2o-3 up to Deserialization
h2oai h2o-3 up to deserialization (CVE-2026-8751) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Intelligence Feed
The Sherlock Forensics Intelligence Feed provides expert analysis of AI code security, vibe coding vulnerabilities, CVE advisories and digital forensics methodologies from certified examiners with over 20 years of field experience in Vancouver, BC.
h2oai h2o-3 up to deserialization (CVE-2026-8751) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A flaw has been directory traversal (CVE-2026-8755) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
fishaudio Bert-VITS2 up to directory traversal (CVE-2026-8756) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
adenhq hive up to directory traversal (CVE-2026-8757) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Metasoft 美特软件 MetaCRM up vulnerability (CVE-2026-8758) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
xiandafu beetl up to vulnerability (CVE-2026-8759) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A security vulnerability has buffer overflow (CVE-2026-8764) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
vercel ai up to vulnerability (CVE-2026-8768) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Improper neutralization of input cross-site scripting (CVE-2026-7498) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
linlinjava litemall up to SQL injection (CVE-2026-8771) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A flaw has been buffer overflow (CVE-2026-8775) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Edimax BR-6428NS 1.10. This buffer overflow (CVE-2026-8776) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
A flaw has been SQL injection (CVE-2026-8785) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
AI Engine – The privilege escalation (CVE-2026-8719) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
A weakness has been vulnerability (CVE-2026-8725) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Oinone Pamirs up to SQL injection (CVE-2026-8734) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
phpMyFAQ before 4.1.2 unauthenticated SQL injection (CVE-2026-46364) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Improper neutralization of special SQL injection (CVE-2025-11024) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Authorization bypass through User-Contro (CVE-2025-12008) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Incorrect Authorization vulnerability in authorization bypass (CVE-2025-15023) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Improper Control of Generation code injection (CVE-2025-15024) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Authorization bypass through User-Contro (CVE-2025-15025) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
A vulnerability in the XXE (CVE-2026-20224) scores CVSS 8.6 HIGH. Analysis of affected systems and remediation steps.
Authorization bypass through User-Contro (CVE-2026-2347) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Database Backup for WordPress vulnerability (CVE-2026-4029) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Database Backup for WordPress file read (CVE-2026-4030) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
Database Backup for WordPress authorization bypass (CVE-2026-4031) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Exposure of sensitive information vulnerability (CVE-2026-41615) scores CVSS 9.6 CRITICAL. Analysis of affected systems and remediation steps.
Improper neutralization of input cross-site scripting (CVE-2026-42897) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
Crabbox prior to v0.12.0 authentication bypass (CVE-2026-8621) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Crabbox prior to v0.12.0 privilege escalation (CVE-2026-8629) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
Crabbox prior to v0.12.0 vulnerability (CVE-2026-8634) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
FOX – Currency Switcher vulnerability (CVE-2026-4094) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
Form Notify plugin for authentication bypass (CVE-2026-5229) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Frontend Admin by DynamiApps privilege escalation (CVE-2026-6228) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Quick Playground plugin for directory traversal (CVE-2026-6403) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
An authenticated iControl REST file read (CVE-2026-20916) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
A vulnerability exists in (CVE-2026-32673) scores CVSS 8.7 HIGH. Analysis of affected systems and remediation steps.
When running in Appliance command injection (CVE-2026-34176) scores CVSS 8.7 HIGH. Analysis of affected systems and remediation steps.
RTMKit Addons for Elementor authorization bypass (CVE-2026-3425) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
When the BIG-IP Configuration vulnerability (CVE-2026-39455) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
When a BIG-IP DNS vulnerability (CVE-2026-39458) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
A vulnerability exists in (CVE-2026-39459) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
When BIG-IP DNS is vulnerability (CVE-2026-40061) scores CVSS 8.7 HIGH. Analysis of affected systems and remediation steps.
When a SIP profile vulnerability (CVE-2026-40423) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
When an SSL profile vulnerability (CVE-2026-40618) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
An authenticated attacker with privilege escalation (CVE-2026-40631) scores CVSS 8.7 HIGH. Analysis of affected systems and remediation steps.
A vulnerability exists in privilege escalation (CVE-2026-40698) scores CVSS 8.7 HIGH. Analysis of affected systems and remediation steps.
A vulnerability exists in (CVE-2026-41217) scores CVSS 7.9 HIGH. Analysis of affected systems and remediation steps.
When BIG-IP PEM iRules vulnerability (CVE-2026-41218) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
A vulnerability exists in (CVE-2026-41225) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
On an HTTP/2 virtual denial of service (CVE-2026-41227) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
A vulnerability exists in privilege escalation (CVE-2026-41953) scores CVSS 8.7 HIGH. Analysis of affected systems and remediation steps.
When a classification profile vulnerability (CVE-2026-41956) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
An authenticated remote code remote code execution (CVE-2026-41957) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
When an HTTP/2 profile vulnerability (CVE-2026-42409) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
When a Client SSL vulnerability (CVE-2026-42920) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
An authenticated attacker with privilege escalation (CVE-2026-42924) scores CVSS 8.7 HIGH. Analysis of affected systems and remediation steps.
When running in Appliance vulnerability (CVE-2026-42930) scores CVSS 8.7 HIGH. Analysis of affected systems and remediation steps.
protobufjs project protobufjs vulnerability (CVE-2026-44293) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Quark Drive before 0.8.5 vulnerability (CVE-2026-45229) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
ProfileGrid – User Profiles, vulnerability (CVE-2026-4609) scores CVSS 7.1 HIGH. Analysis of affected systems and remediation steps.
Avada Builder plugin for SQL injection (CVE-2026-4798) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
haxx curl vulnerability (CVE-2026-5773) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Custom Twitter Feeds plugin cross-site scripting (CVE-2026-6177) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
A potential vulnerability was remote code execution (CVE-2026-6281) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
A potential improper file vulnerability (CVE-2026-6282) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
ManageWP Worker plugin for cross-site scripting (CVE-2026-3718) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
Motors – Car Dealership file read (CVE-2026-3892) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
Fluent Forms – Customizable vulnerability (CVE-2026-5395) scores CVSS 8.2 HIGH. Analysis of affected systems and remediation steps.
Fluent Forms plugin for authorization bypass (CVE-2026-5396) scores CVSS 8.2 HIGH. Analysis of affected systems and remediation steps.
Career Section plugin for remote code execution (CVE-2026-6271) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
InfusedWoo Pro plugin for privilege escalation (CVE-2026-6506) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
InfusedWoo Pro plugin for privilege escalation (CVE-2026-6510) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
InfusedWoo Pro plugin for authorization bypass (CVE-2026-6512) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
InfusedWoo Pro plugin for file read (CVE-2026-6514) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Burst Statistics – Privacy-Friendly privilege escalation (CVE-2026-8181) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
affected devices contain a denial of service (CVE-2025-40833) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
RUGGEDCOM ROX MX5000 (All remote code execution (CVE-2025-40947) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
RUGGEDCOM ROX MX5000 (All remote code execution (CVE-2025-40949) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
Improper neutralization of special SQL injection (CVE-2025-6577) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Court Reservation – Manage SQL injection (CVE-2026-1250) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
SIMATIC CN 4100 (All vulnerability (CVE-2026-22924) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
SIMATIC CN 4100 (All vulnerability (CVE-2026-22925) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Incorrect Authorization vulnerability in privilege escalation (CVE-2026-2465) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Affected devices do not vulnerability (CVE-2026-25786) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
Affected devices do not vulnerability (CVE-2026-25787) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
Affected devices do not vulnerability (CVE-2026-25789) scores CVSS 7.1 HIGH. Analysis of affected systems and remediation steps.
Affected devices do not vulnerability (CVE-2026-27662) scores CVSS 7.7 HIGH. Analysis of affected systems and remediation steps.
Concurrent execution using shared vulnerability (CVE-2026-32161) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in privilege escalation (CVE-2026-32177) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
External control of file privilege escalation (CVE-2026-32204) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Deserialization of untrusted data (CVE-2026-33110) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Deserialization of untrusted data (CVE-2026-33112) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Improper authentication in Azure vulnerability (CVE-2026-33117) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
Improper neutralization of special vulnerability (CVE-2026-33833) scores CVSS 8.2 HIGH. Analysis of affected systems and remediation steps.
Improper access control in privilege escalation (CVE-2026-33834) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-33835) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in privilege escalation (CVE-2026-33837) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Double free in Windows privilege escalation (CVE-2026-33838) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Concurrent execution using shared privilege escalation (CVE-2026-33839) scores CVSS 7.0 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-33840) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in privilege escalation (CVE-2026-33841) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in (CVE-2026-34329) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Integer overflow or wraparound privilege escalation (CVE-2026-34330) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Concurrent execution using shared privilege escalation (CVE-2026-34331) scores CVSS 7.0 HIGH. Analysis of affected systems and remediation steps.
Use after free in vulnerability (CVE-2026-34332) scores CVSS 8.0 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-34333) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Concurrent execution using shared privilege escalation (CVE-2026-34334) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Buffer over-read in Windows vulnerability (CVE-2026-34336) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-34337) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-34338) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-34340) scores CVSS 7.0 HIGH. Analysis of affected systems and remediation steps.
Double free in Windows privilege escalation (CVE-2026-34341) scores CVSS 7.0 HIGH. Analysis of affected systems and remediation steps.
Concurrent execution using shared privilege escalation (CVE-2026-34342) scores CVSS 7.0 HIGH. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in privilege escalation (CVE-2026-34343) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Access of resource using privilege escalation (CVE-2026-34344) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Concurrent execution using shared privilege escalation (CVE-2026-34345) scores CVSS 7.0 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-34347) scores CVSS 7.0 HIGH. Analysis of affected systems and remediation steps.
Concurrent execution using shared privilege escalation (CVE-2026-34351) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Premiere Pro versions 26.0.2, remote code execution (CVE-2026-34636) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Premiere Pro versions 26.0.2, remote code execution (CVE-2026-34637) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Premiere Pro versions 26.0.2, remote code execution (CVE-2026-34638) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Media Encoder versions 26.0.2, remote code execution (CVE-2026-34639) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Media Encoder versions 26.0.2, remote code execution (CVE-2026-34640) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
After Effects versions 26.0, remote code execution (CVE-2026-34642) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
After Effects versions 26.0, remote code execution (CVE-2026-34643) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
After Effects versions 26.0, remote code execution (CVE-2026-34644) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Adobe Commerce versions 2.4.9-beta1, authorization bypass (CVE-2026-34645) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Adobe Commerce versions 2.4.9-beta1, authorization bypass (CVE-2026-34646) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Adobe Commerce versions 2.4.9-beta1, SSRF (CVE-2026-34647) scores CVSS 7.4 HIGH. Analysis of affected systems and remediation steps.
Adobe Commerce versions 2.4.9-beta1, vulnerability (CVE-2026-34648) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Adobe Commerce versions 2.4.9-beta1, vulnerability (CVE-2026-34649) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Adobe Commerce versions 2.4.9-beta1, vulnerability (CVE-2026-34650) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Adobe Commerce versions 2.4.9-beta1, vulnerability (CVE-2026-34651) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Adobe Commerce versions 2.4.9-beta1, vulnerability (CVE-2026-34652) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Adobe Commerce versions 2.4.9-beta1, directory traversal (CVE-2026-34653) scores CVSS 8.7 HIGH. Analysis of affected systems and remediation steps.
Adobe Connect versions 2025.9.15, remote code execution (CVE-2026-34659) scores CVSS 9.6 CRITICAL. Analysis of affected systems and remediation steps.
Adobe Connect versions 2025.9.15, remote code execution (CVE-2026-34660) scores CVSS 9.3 CRITICAL. Analysis of affected systems and remediation steps.
adobe illustrator remote code execution (CVE-2026-34661) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
CAI Content Credentials versions vulnerability (CVE-2026-34665) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
adobe substance 3d painter remote code execution (CVE-2026-34675) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
adobe substance 3d painter remote code execution (CVE-2026-34676) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Substance3D - Designer versions remote code execution (CVE-2026-34681) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Substance3D - Designer versions remote code execution (CVE-2026-34682) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Adobe Commerce versions 2.4.9-beta1, cross-site scripting (CVE-2026-34686) scores CVSS 8.7 HIGH. Analysis of affected systems and remediation steps.
adobe illustrator remote code execution (CVE-2026-34687) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
After Effects versions 26.0, remote code execution (CVE-2026-34690) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Integer overflow or wraparound privilege escalation (CVE-2026-35415) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-35416) scores CVSS 7.0 HIGH. Analysis of affected systems and remediation steps.
Access of resource using privilege escalation (CVE-2026-35417) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-35418) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in privilege escalation (CVE-2026-35420) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in (CVE-2026-35421) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Missing release of memory vulnerability (CVE-2026-35424) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Insufficient granularity of access privilege escalation (CVE-2026-35436) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Missing authorization in Windows privilege escalation (CVE-2026-35438) scores CVSS 8.3 HIGH. Analysis of affected systems and remediation steps.
Deserialization of untrusted data (CVE-2026-35439) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Deserialization of untrusted data (CVE-2026-40357) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Use after free in vulnerability (CVE-2026-40358) scores CVSS 8.4 HIGH. Analysis of affected systems and remediation steps.
Use after free in vulnerability (CVE-2026-40359) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Out-of-bounds read in Microsoft vulnerability (CVE-2026-40360) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Use after free in vulnerability (CVE-2026-40361) scores CVSS 8.4 HIGH. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in (CVE-2026-40362) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in (CVE-2026-40363) scores CVSS 8.4 HIGH. Analysis of affected systems and remediation steps.
Access of resource using vulnerability (CVE-2026-40364) scores CVSS 8.4 HIGH. Analysis of affected systems and remediation steps.
Insufficient granularity of access authorization bypass (CVE-2026-40365) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Use after free in vulnerability (CVE-2026-40366) scores CVSS 8.4 HIGH. Analysis of affected systems and remediation steps.
Untrusted pointer dereference in vulnerability (CVE-2026-40367) scores CVSS 8.4 HIGH. Analysis of affected systems and remediation steps.
Deserialization of untrusted data (CVE-2026-40368) scores CVSS 8.0 HIGH. Analysis of affected systems and remediation steps.
Untrusted pointer dereference in privilege escalation (CVE-2026-40369) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in privilege escalation (CVE-2026-40377) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Exposure of sensitive information vulnerability (CVE-2026-40379) scores CVSS 9.3 CRITICAL. Analysis of affected systems and remediation steps.
Improper access control in privilege escalation (CVE-2026-40381) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-40382) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Integer underflow (wrap or privilege escalation (CVE-2026-40397) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in privilege escalation (CVE-2026-40398) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Stack-based buffer overflow in privilege escalation (CVE-2026-40399) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Null pointer dereference in vulnerability (CVE-2026-40401) scores CVSS 7.1 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-40402) scores CVSS 9.3 CRITICAL. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in (CVE-2026-40403) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Null pointer dereference in vulnerability (CVE-2026-40405) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Use after free in vulnerability (CVE-2026-40406) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in privilege escalation (CVE-2026-40407) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-40408) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-40410) scores CVSS 7.0 HIGH. Analysis of affected systems and remediation steps.
Null pointer dereference in vulnerability (CVE-2026-40413) scores CVSS 7.4 HIGH. Analysis of affected systems and remediation steps.
Null pointer dereference in vulnerability (CVE-2026-40414) scores CVSS 7.4 HIGH. Analysis of affected systems and remediation steps.
Use after free in vulnerability (CVE-2026-40415) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
Weak authentication in Dynamics privilege escalation (CVE-2026-40417) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-40418) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-40419) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Improper access control in privilege escalation (CVE-2026-40420) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Improper access control in privilege escalation (CVE-2026-41086) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
External control of file privilege escalation (CVE-2026-41088) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Stack-based buffer overflow in (CVE-2026-41089) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Improper control of generation code injection (CVE-2026-41094) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in (CVE-2026-41096) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Improper access control in authorization bypass (CVE-2026-41101) scores CVSS 7.1 HIGH. Analysis of affected systems and remediation steps.
Improper access control in authorization bypass (CVE-2026-41102) scores CVSS 7.1 HIGH. Analysis of affected systems and remediation steps.
Incorrect implementation of authenticati privilege escalation (CVE-2026-41103) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps
Improper neutralization of special vulnerability (CVE-2026-41109) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
ROS# (All versions < directory traversal (CVE-2026-41551) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
Improper neutralization of script-relate cross-site scripting (CVE-2026-41611) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Improper access control in privilege escalation (CVE-2026-42823) scores CVSS 9.9 CRITICAL. Analysis of affected systems and remediation steps.
Use after free in privilege escalation (CVE-2026-42825) scores CVSS 7.0 HIGH. Analysis of affected systems and remediation steps.
Heap-based buffer overflow in (CVE-2026-42831) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Improper access control in authorization bypass (CVE-2026-42832) scores CVSS 7.7 HIGH. Analysis of affected systems and remediation steps.
Execution with unnecessary privileges vulnerability (CVE-2026-42833) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
Improper neutralization of special command injection (CVE-2026-42893) scores CVSS 7.4 HIGH. Analysis of affected systems and remediation steps.
Integer overflow or wraparound privilege escalation (CVE-2026-42896) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Improper control of generation code injection (CVE-2026-42898) scores CVSS 9.9 CRITICAL. Analysis of affected systems and remediation steps.
Solid Edge SE2026 (All vulnerability (CVE-2026-44412) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Heym before 0.0.21 path directory traversal (CVE-2026-45225) scores CVSS 7.6 HIGH. Analysis of affected systems and remediation steps.
Heym before 0.0.21 authorization authorization bypass (CVE-2026-45226) scores CVSS 7.1 HIGH. Analysis of affected systems and remediation steps.
Heym before 0.0.21 sandbox vulnerability (CVE-2026-45227) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
MonsterInsights – Google Analytics vulnerability (CVE-2026-5371) scores CVSS 7.1 HIGH. Analysis of affected systems and remediation steps.
Authorization bypass through User-Contro (CVE-2026-6001) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
SPIP versions prior to remote code execution (CVE-2026-8429) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Linux ksmbd remote memory privilege escalation (CVE-2026-8449) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenCart 3.0.3.8 session fixation vulnerability (CVE-2021-47923) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Opencart TMD Vendor System SQL injection (CVE-2021-47928) scores CVSS 8.2 HIGH. Analysis of affected systems and remediation steps.
Balbooa Joomla Forms Builder SQL injection (CVE-2021-47930) scores CVSS 8.2 HIGH. Analysis of affected systems and remediation steps.
WordPress TheCartPress 1.5.3.6 unauthent privilege escalation (CVE-2021-47932) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps
WordPress MStore API 2.0.6 remote code execution (CVE-2021-47933) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Sentry 8.2.0 remote code remote code execution (CVE-2021-47935) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenCATS 0.9.4 remote code remote code execution (CVE-2021-47936) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
e107 CMS 2.3.0 remote remote code execution (CVE-2021-47937) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
ImpressCMS 1.4.2 remote code remote code execution (CVE-2021-47938) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Evolution CMS 3.1.6 remote remote code execution (CVE-2021-47939) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
WordPress Plugin Download From file read (CVE-2021-47940) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
WordPress Plugin Survey & SQL injection (CVE-2021-47941) scores CVSS 8.2 HIGH. Analysis of affected systems and remediation steps.
TextPattern CMS 4.8.7 remote remote code execution (CVE-2021-47943) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
memono Notepad 4.2 denial denial of service (CVE-2021-47944) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Argus Surveillance DVR 4.0 vulnerability (CVE-2021-47945) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
CyberPanel 2.1 command execution file read (CVE-2021-47949) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
barebox version prior to buffer overflow (CVE-2026-34963) scores CVSS 8.4 HIGH. Analysis of affected systems and remediation steps.
Bitwarden Server prior to vulnerability (CVE-2026-43639) scores CVSS 8.0 HIGH. Analysis of affected systems and remediation steps.
Bitwarden Server prior to vulnerability (CVE-2026-43640) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.20 improper code injection (CVE-2026-44995) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.20 guard SSRF (CVE-2026-45001) scores CVSS 7.1 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.23 arbitrary remote code execution (CVE-2026-45004) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.23 improper authorization bypass (CVE-2026-45006) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
A flaw was found vulnerability (CVE-2026-4802) scores CVSS 8.0 HIGH. Analysis of affected systems and remediation steps.
OpenClaw up to 2026.1.24. vulnerability (CVE-2026-8305) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
inkeep agents 0.58.14. This authentication bypass (CVE-2026-8321) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
AI Chatbot & Workflow SQL injection (CVE-2026-2993) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Due to an OS vulnerability (CVE-2026-34259) scores CVSS 8.2 HIGH. Analysis of affected systems and remediation steps.
SAP S/4HANA (SAP Enterprise SQL injection (CVE-2026-34260) scores CVSS 9.6 CRITICAL. Analysis of affected systems and remediation steps.
Due to improper Spring code injection (CVE-2026-34263) scores CVSS 9.6 CRITICAL. Analysis of affected systems and remediation steps.
LifePress plugin for WordPress cross-site scripting (CVE-2026-6690) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
** UNSUPPORTED WHEN ASSIGNED command injection (CVE-2026-7256) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
** UNSUPPORTED WHEN ASSIGNED buffer overflow (CVE-2026-7287) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Aero CMS 0.0.1 PHP code injection (CVE-2022-50944) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
D-Link DCS-935L up to buffer overflow (CVE-2026-8260) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Industrial Application Software IAS vulnerability (CVE-2026-8216) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A security vulnerability has buffer overflow (CVE-2026-8234) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
DrayTek Vigor 2960 firmware remote code execution (CVE-2022-50994) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
apache nifi vulnerability (CVE-2026-39816) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
zfnd zebra-script vulnerability (CVE-2026-41583) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
zfnd zebra-chain vulnerability (CVE-2026-41584) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
praison praisonaiagents SSRF (CVE-2026-44335) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
praison praisonai remote code execution (CVE-2026-44336) scores CVSS 9.6 CRITICAL. Analysis of affected systems and remediation steps.
MailEnable Enterprise Premium 10.55 authorization bypass (CVE-2026-44400) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
zfnd zebra-script vulnerability (CVE-2026-44497) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
zfnd zebrad vulnerability (CVE-2026-44498) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
SmarterTools SmarterMail builds prior vulnerability (CVE-2026-7807) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
Improperly controlled modification of vulnerability (CVE-2025-14341) scores CVSS 8.3 HIGH. Analysis of affected systems and remediation steps.
Improper neutralization of special vulnerability (CVE-2026-26164) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Improper neutralization of input cross-site scripting (CVE-2026-32207) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Improper access control in authorization bypass (CVE-2026-33109) scores CVSS 9.9 CRITICAL. Analysis of affected systems and remediation steps.
Improper neutralization of special command injection (CVE-2026-33111) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
lfnovo open-notebook vulnerability (CVE-2026-33587) scores CVSS 10.0 CRITICAL. Analysis of affected systems and remediation steps.
lfnovo open-notebook directory traversal (CVE-2026-33588) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
Improper authorization in Microsoft authorization bypass (CVE-2026-33823) scores CVSS 9.6 CRITICAL. Analysis of affected systems and remediation steps.
Improper input validation in vulnerability (CVE-2026-33844) scores CVSS 9.0 CRITICAL. Analysis of affected systems and remediation steps.
Externally controlled reference to vulnerability (CVE-2026-34327) scores CVSS 8.2 HIGH. Analysis of affected systems and remediation steps.
Improper neutralization of special command injection (CVE-2026-35428) scores CVSS 9.6 CRITICAL. Analysis of affected systems and remediation steps.
Improper access control in privilege escalation (CVE-2026-35435) scores CVSS 8.6 HIGH. Analysis of affected systems and remediation steps.
Improper neutralization of input cross-site scripting (CVE-2026-3953) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Server-side request forgery (ssrf) privilege escalation (CVE-2026-41105) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
A flaw was found vulnerability (CVE-2026-42011) scores CVSS 7.4 HIGH. Analysis of affected systems and remediation steps.
gitpython project gitpython vulnerability (CVE-2026-42284) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
Exposure of sensitive information vulnerability (CVE-2026-42826) scores CVSS 10.0 CRITICAL. Analysis of affected systems and remediation steps.
gitpython project gitpython vulnerability (CVE-2026-44243) scores CVSS 7.1 HIGH. Analysis of affected systems and remediation steps.
Improper neutralization of input cross-site scripting (CVE-2026-5784) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Cross-Site request forgery (CSRF) vulnerability (CVE-2026-5791) scores CVSS 9.6 CRITICAL. Analysis of affected systems and remediation steps.
Improper neutralization of Script-Relate cross-site scripting (CVE-2026-6002) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Origin Validation Error vulnerability (CVE-2026-6508) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
URL redirection to untrusted vulnerability (CVE-2026-6795) scores CVSS 9.6 CRITICAL. Analysis of affected systems and remediation steps.
ivanti endpoint manager mobile information disclosure (CVE-2026-7821) scores CVSS 7.4 HIGH. Analysis of affected systems and remediation steps.
SourceCodester Pharmacy Sales and SQL injection (CVE-2026-8083) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A security vulnerability has SQL injection (CVE-2026-8098) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
User Frontend: AI Powered deserialization (CVE-2026-5127) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Auto Affiliate Links plugin cross-site scripting (CVE-2026-7330) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
A flaw has been SQL injection (CVE-2026-8126) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
SourceCodester SUP Online Shopping SQL injection (CVE-2026-8128) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
SourceCodester SUP Online Shopping SQL injection (CVE-2026-8129) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
SourceCodester SUP Online Shopping SQL injection (CVE-2026-8130) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
SourceCodester SUP Online Shopping SQL injection (CVE-2026-8131) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A weakness has been SQL injection (CVE-2026-8132) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A security vulnerability has SQL injection (CVE-2026-8133) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Totolink X5000R 9.1.0u.6369_B20230113. T buffer overflow (CVE-2026-8137) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Tenda CX12L 16.03.53.12. This buffer overflow (CVE-2026-8138) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Gravity Bookings Premium plugin SQL injection (CVE-2026-1719) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
A vulnerability in the (CVE-2026-20034) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
A vulnerability in the SSRF (CVE-2026-20035) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
A vulnerability in the denial of service (CVE-2026-20167) scores CVSS 7.7 HIGH. Analysis of affected systems and remediation steps.
A vulnerability in the denial of service (CVE-2026-20185) scores CVSS 7.7 HIGH. Analysis of affected systems and remediation steps.
A vulnerability in the denial of service (CVE-2026-20188) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
apache wicket vulnerability (CVE-2026-40010) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
Vvveb before version 1.0.8.2 remote code execution (CVE-2026-41934) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw versions 2026.2.21 before authentication bypass (CVE-2026-43575) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.5 server-side SSRF (CVE-2026-43576) scores CVSS 7.7 HIGH. Analysis of affected systems and remediation steps.
OpenClaw versions 2026.3.31 before privilege escalation (CVE-2026-43578) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.10 incomplete SSRF (CVE-2026-43580) scores CVSS 7.7 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.10 improper vulnerability (CVE-2026-43581) scores CVSS 9.6 CRITICAL. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.10 insufficient vulnerability (CVE-2026-43584) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.15 captures vulnerability (CVE-2026-43585) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.15 authentication remote code execution (CVE-2026-44109) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation step
OpenClaw before 2026.4.15 authorization authorization bypass (CVE-2026-44110) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.20 fails vulnerability (CVE-2026-44114) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.22 exec vulnerability (CVE-2026-44115) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.22 server-side SSRF (CVE-2026-44116) scores CVSS 8.6 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.22 derives vulnerability (CVE-2026-44118) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
NanoClaw host/container filesystem bound file read (CVE-2026-7875) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
A flaw has been vulnerability (CVE-2026-8032) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
BetterDocs Pro plugin for SQL injection (CVE-2026-4348) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Slider Revolution plugin for remote code execution (CVE-2026-6692) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
WP-Optimize – Cache, Compress remote code execution (CVE-2026-7252) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
Eclipse Equinox OSGi versions remote code execution (CVE-2023-54342) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Eclipse Equinox OSGi 3.7.2 remote code execution (CVE-2023-54344) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
frappe erpnext vulnerability (CVE-2023-54345) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
WordPress Plugin Backup Migration information disclosure (CVE-2023-54346) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
open-emr openemr vulnerability (CVE-2023-54347) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
ERPGo SaaS 3.9 CSV vulnerability (CVE-2023-54348) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw versions 2026.4.5 before vulnerability (CVE-2026-42434) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw versions from 2026.2.22 vulnerability (CVE-2026-42435) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.14 improper authorization bypass (CVE-2026-42436) scores CVSS 7.7 HIGH. Analysis of affected systems and remediation steps.
OpenClaw versions 2026.4.9 before denial of service (CVE-2026-42437) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
OpenClaw versions 2026.4.9 before vulnerability (CVE-2026-42438) scores CVSS 7.7 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.10 server-side SSRF (CVE-2026-42439) scores CVSS 8.5 HIGH. Analysis of affected systems and remediation steps.
WeePie Cookie Allow plugin SQL injection (CVE-2026-4304) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.12 server-side SSRF (CVE-2026-43526) scores CVSS 8.2 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.14 server-side SSRF (CVE-2026-43527) scores CVSS 7.7 HIGH. Analysis of affected systems and remediation steps.
OpenClaw versions 2026.2.23 before vulnerability (CVE-2026-43530) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.9 environment vulnerability (CVE-2026-43531) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
OpenClaw versions 2026.4.7 before vulnerability (CVE-2026-43532) scores CVSS 7.7 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.10 input vulnerability (CVE-2026-43534) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
OpenClaw versions 2026.4.7 before privilege escalation (CVE-2026-43566) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.9 authentication authentication bypass (CVE-2026-43569) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.10 plugin vulnerability (CVE-2026-43571) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.10 server-side SSRF (CVE-2026-43573) scores CVSS 7.7 HIGH. Analysis of affected systems and remediation steps.
Betheme theme for WordPress remote code execution (CVE-2026-6261) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
eclipse openj9 vulnerability (CVE-2026-6918) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
IObit Advanced SystemCare 19. vulnerability (CVE-2026-7832) scores CVSS 7.0 HIGH. Analysis of affected systems and remediation steps.
A weakness has been command injection (CVE-2026-7833) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
A security vulnerability has buffer overflow (CVE-2026-7834) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
D-Link DI-8100 16.07.26A1. This buffer overflow (CVE-2026-7851) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
A weakness has been buffer overflow (CVE-2026-7853) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
A security vulnerability has buffer overflow (CVE-2026-7854) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
D-Link DI-8100 16.07.26A1. Affected buffer overflow (CVE-2026-7855) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
A flaw has been buffer overflow (CVE-2026-7856) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
D-Link DI-8100 16.07.26A1. This buffer overflow (CVE-2026-7857) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
LatePoint – Calendar Booking cross-site scripting (CVE-2026-7332) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
LatePoint – Calendar Booking cross-site scripting (CVE-2026-7448) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
Memory corruption when processing vulnerability (CVE-2025-47405) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Memory corruption while creating vulnerability (CVE-2025-47407) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Memory corruption when another vulnerability (CVE-2025-47408) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Memory Corruption when copying vulnerability (CVE-2026-24082) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
Buffer overflow due to (CVE-2026-25293) scores CVSS 9.6 CRITICAL. Analysis of affected systems and remediation steps.
Conditional Fields for Contact vulnerability (CVE-2026-25863) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
BusyBox before commit 42202bf remote code execution (CVE-2026-29004) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
NetBox versions 4.3.5 through remote code execution (CVE-2026-29514) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Improper Control of Generation command injection (CVE-2026-3120) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
Easy PayPal Events & authentication bypass (CVE-2026-32834) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Easy PayPal Events & information disclosure (CVE-2026-41471) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Arelle before 2.39.10 unauthenticated remote code execution (CVE-2026-42796) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Detect-It-Easy prior to 3.21 directory traversal (CVE-2026-43616) scores CVSS 7.1 HIGH. Analysis of affected systems and remediation steps.
A weakness has been buffer overflow (CVE-2026-7748) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
A security vulnerability has buffer overflow (CVE-2026-7749) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Totolink N300RH 3.2.4-B20220812. This buffer overflow (CVE-2026-7750) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Mentoring plugin for WordPress privilege escalation (CVE-2025-13618) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Form Maker by 10Web SQL injection (CVE-2026-3359) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
GeekyBot — Generate AI SQL injection (CVE-2026-3456) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Oracle MCP Server Helper vulnerability (CVE-2026-35228) scores CVSS 8.7 HIGH. Analysis of affected systems and remediation steps.
Royal Elementor Addons plugin cross-site scripting (CVE-2026-4803) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
AWP Classifieds plugin for SQL injection (CVE-2026-5100) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Forminator Forms – Contact directory traversal (CVE-2026-5192) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Geeky Bot plugin for remote code execution (CVE-2026-5294) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
MoreConvert Pro plugin for authentication bypass (CVE-2026-5722) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
RTGS2017 NagaAgent up to directory traversal (CVE-2026-7784) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A-G-U-P-T-A wireshark-mcp edaf604416fbc9 command injection (CVE-2026-7785) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Axle-Bucamp MCP-Docusaurus up to directory traversal (CVE-2026-7788) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A flaw has been directory traversal (CVE-2026-7810) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
54yyyu code-mcp up to directory traversal (CVE-2026-7811) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
54yyyu code-mcp up to command injection (CVE-2026-7812) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Totolink A8000RU 7.1cu.643_b20200521. Af command injection (CVE-2026-7823) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
A flaw has been SQL injection (CVE-2026-7694) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Acrel Electrical EEMS Enterprise SQL injection (CVE-2026-7695) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Tiandy Easy7 Integrated Management command injection (CVE-2026-7698) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A flaw has been code injection (CVE-2026-7703) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Improper neutralization of input cross-site scripting (CVE-2025-14320) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
YunaiV yudao-cloud up to vulnerability (CVE-2026-7710) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A weakness has been vulnerability (CVE-2026-7711) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Totolink WA300 5.2cu.7112_B20190227. Thi buffer overflow (CVE-2026-7717) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Totolink WA300 5.2cu.7112_B20190227. The buffer overflow (CVE-2026-7719) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
A flaw has been vulnerability (CVE-2026-7723) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Shandong Hoteam Software PDM SQL injection (CVE-2026-7727) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A flaw has been vulnerability (CVE-2026-7733) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
osrg GoBGP up to buffer overflow (CVE-2026-7735) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Totolink N300RH 3.2.4-B20220812. Affecte buffer overflow (CVE-2026-7747) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
WCFM – Frontend Manager vulnerability (CVE-2026-2554) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
Geo Mashup plugin for SQL injection (CVE-2026-4060) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Geo Mashup plugin for SQL injection (CVE-2026-4061) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Geo Mashup plugin for SQL injection (CVE-2026-4062) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Paid Memberships Pro plugin vulnerability (CVE-2026-4100) scores CVSS 7.1 HIGH. Analysis of affected systems and remediation steps.
Salon Booking System – file read (CVE-2026-6320) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
CTMS developed by Sunnet SQL injection (CVE-2026-7489) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
CTMS and CPAS developed remote code execution (CVE-2026-7490) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
innocommerce InnoShop up to vulnerability (CVE-2026-7630) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
ChatGPTNextWeb NextChat up to authorization bypass (CVE-2026-7644) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
MikroTik RouterOS 6.49.8. This vulnerability (CVE-2026-7668) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A flaw has been SQL injection (CVE-2026-7670) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
NEX-Forms – Ultimate Forms cross-site scripting (CVE-2026-5063) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
A flaw has been buffer overflow (CVE-2026-7674) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Shenzhen Libituo Technology LBT-T300-HW1 buffer overflow (CVE-2026-7675) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
YunaiV yudao-cloud up to vulnerability (CVE-2026-7679) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A security vulnerability has buffer overflow (CVE-2026-7684) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Edimax BR-6208AC up to buffer overflow (CVE-2026-7685) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
cPanel and WHM authentication bypass affects versions 11.40 through 136.0.4. CISA KEV: action required by May 3, 2026. Public exploits documented.
PDFs execute JavaScript, launch URLs and drop payloads the moment you open them. Your PDF reader is running code you never consented to. Here is how to stop it.
CVE-2026-31431: a logic bug in the Linux kernel crypto API lets any unprivileged user escape containers and get root. 732 bytes of Python. Self-check guide inside.
Gravity Forms plugin for cross-site scripting (CVE-2026-5109) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
Gravity Forms plugin for cross-site scripting (CVE-2026-5110) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
Gravity Forms plugin for cross-site scripting (CVE-2026-5111) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
Gravity Forms plugin for cross-site scripting (CVE-2026-5112) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
Gravity Forms plugin for cross-site scripting (CVE-2026-5113) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
Brizy – Page Builder cross-site scripting (CVE-2026-5324) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
PixelYourSite Pro – Your SSRF (CVE-2026-7049) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
User Verification by PickPlugins authentication bypass (CVE-2026-7458) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Import and export users privilege escalation (CVE-2026-7641) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
ARMember – Membership Plugin, SQL injection (CVE-2026-7649) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Weaver (Fanwei) E-office versions remote code execution (CVE-2022-50993) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Otter Blocks plugin for vulnerability (CVE-2026-2892) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
IBM Langflow Desktop 1.0.0 vulnerability (CVE-2026-4503) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
IBM Turbonomic prometurbo agent vulnerability (CVE-2026-6389) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
IBM Langflow Desktop 1.0.0 remote code execution (CVE-2026-6543) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
SSCMS v7.4.0 SQL injection (CVE-2026-7435) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
MyBB Recent threads 17.0 cross-site scripting (CVE-2018-25309) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
Improper Limitation of a directory traversal (CVE-2026-5166) scores CVSS 9.6 CRITICAL. Analysis of affected systems and remediation steps.
AgentFlow arbitrary code execution remote code execution (CVE-2026-7466) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
A security vulnerability has authorization bypass (CVE-2026-7468) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
OpenCATS prior to commit code injection (CVE-2026-27760) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.3.31 privilege remote code execution (CVE-2026-41378) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.3.22 privilege privilege escalation (CVE-2026-41386) scores CVSS 9.1 CRITICAL. Analysis of affected systems and remediation steps.
OpenClaw before 2026.3.28 webhook vulnerability (CVE-2026-41395) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.3.28 accepts vulnerability (CVE-2026-41399) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.3.31 parses vulnerability (CVE-2026-41405) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
apache thrift vulnerability (CVE-2026-41636) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
apache pony mail vulnerability (CVE-2026-41873) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.8 server-side SSRF (CVE-2026-41912) scores CVSS 7.6 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.8 approval-timeou vulnerability (CVE-2026-42423) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.8 improper authorization bypass (CVE-2026-42426) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.8 security vulnerability (CVE-2026-42431) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.4.8 privilege privilege escalation (CVE-2026-42432) scores CVSS 7.8 HIGH. Analysis of affected systems and remediation steps.
A flaw has been directory traversal (CVE-2026-7272) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
eiceblue spire-doc-mcp-server 1.0.0. Thi directory traversal (CVE-2026-7314) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Tenda i9 1.0.0.5(2204). This directory traversal (CVE-2026-7036) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A flaw has been vulnerability (CVE-2026-7042) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
liyupi yu-picture up to SQL injection (CVE-2026-7060) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A weakness has been command injection (CVE-2026-7061) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
BidingCC BuildingAI up to vulnerability (CVE-2026-7065) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
CodePanda Source canteen_management_syst SQL injection (CVE-2026-7072) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A weakness has been buffer overflow (CVE-2026-7097) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
A security vulnerability has authorization bypass (CVE-2026-6977) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
PicoClaw up to 0.2.4. command injection (CVE-2026-6987) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
KLiK SocialMediaWebsite up to SQL injection (CVE-2026-7002) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Exposure of sensitive information privilege escalation (CVE-2026-21515) scores CVSS 9.9 CRITICAL. Analysis of affected systems and remediation steps.
BridgeHead FileStore versions prior remote code execution (CVE-2026-39920) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Kofax Capture, now referred remote code execution (CVE-2026-23751) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
KTransformers through 0.5.3 unsafe deserialization (CVE-2026-26210) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
OpenClaw before 2026.3.28 agentic vulnerability (CVE-2026-41349) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.3.31 remote remote code execution (CVE-2026-41352) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
OpenClaw before 2026.3.22 access authorization bypass (CVE-2026-41353) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
Drag and Drop File remote code execution (CVE-2026-5364) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
ExactMetrics – Google Analytics remote code execution (CVE-2026-5464) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
Borg SPM 2007 (Sales remote code execution (CVE-2026-6885) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
How to run external reconnaissance on your own organization. Domain enumeration, DNS analysis, port discovery and credential leak checks.
Healthcare breaches cost $10.93M average. HIPAA Security Rule requirements, ransomware targeting hospitals and what your security program needs.
SOC 2 Trust Service Criteria CC7.1 and CC7.2 require penetration testing. What auditors read in your report, common fails and how to pass.
Penetration test report explained for non-technical executives. Severity ratings, finding vs vulnerability, red flags and what to do next.
Law firms hold high-value confidential data and process large wire transfers with low security maturity. Here is what attackers know.
What actually happens when you call an incident responder during a ransomware attack. Containment, recovery and insurance coordination.
Five breaches that a pentest would have prevented. Average breach costs $4.45M. Average pentest costs $5K-$25K. The math is simple.
Most DMARC implementations are stuck on p=none. SPF records have too many lookups. DKIM keys haven't been rotated in years.
Hour-by-hour incident response timeline from detection through 72 hours. What to do, who to call and what most companies get wrong.
Google told developers API keys aren't secrets. Then Gemini changed the rules. Nearly 3,000 public API keys now silently authenticate to Gemini.
First pentest? Here is what happens before, during and after. Scoping, rules of engagement, the report and remediation. No surprises.
Business email compromise case study: from initial phish to $2M wire transfer. Timeline, forensic findings and prevention steps.
2026 cyber insurance requirements: MFA, EDR, IR plan, annual pentest, tabletop exercises. Complete checklist for your renewal.
How to collect phone evidence for HR investigations. Legal considerations, logical acquisition, chain of custody and court-ready reporting.
Why construction firms lose more to email fraud than any other industry. The subcontractor invoice scam and how to stop it.
IBM WebSphere Application Server vulnerability (CVE-2026-3621) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
WeKan before 8.35 missing authorization vulnerability (CVE-2026-41454) scores CVSS 8.3 HIGH. Analysis of affected systems and remediation steps.
WeKan before 8.35 server-side request vulnerability (CVE-2026-41455) scores CVSS 8.5 HIGH. Analysis of affected systems and remediation steps.
Beghelli Sicuro24 SicuroWeb embeds vulnerability (CVE-2026-41468) scores CVSS 8.7 HIGH. Analysis of affected systems and remediation steps.
IBM Total Storage Service remote code execution (CVE-2026-5935) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A flaw was found vulnerability (CVE-2026-6859) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
Oracle vulnerability (CVE-2026-22016) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Incorrect authorization vulnerability (CVE-2026-33519) scores CVSS 9.8 CRITICAL. Analysis of affected systems and remediation steps.
Vulnerability in the Oracle denial of service (CVE-2026-34282) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
Oracle vulnerability (CVE-2026-34292) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
Oracle vulnerability (CVE-2026-34305) scores CVSS 7.5 HIGH. Analysis of affected systems and remediation steps.
FreePBX api module version remote code execution (CVE-2026-40520) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
The HTTP Headers plugin remote code execution (CVE-2026-4132) scores CVSS 7.2 HIGH. Analysis of affected systems and remediation steps.
Hermes WebUI directory traversal (CVE-2026-6832) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
ThreatSonar Anti-Ransomware developed by directory traversal (CVE-2026-5966) scores CVSS 8.1 HIGH. Analysis of affected systems and remediation steps.
A vulnerability was determined directory traversal (CVE-2026-6568) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Vulnerability (CVE-2026-6569) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Vulnerability (CVE-2026-6574) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Vulnerability (CVE-2026-6580) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A vulnerability was detected buffer overflow (CVE-2026-6581) scores CVSS 8.8 HIGH. Analysis of affected systems and remediation steps.
A security flaw has vulnerability (CVE-2026-6596) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Vulnerability (CVE-2026-6602) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A vulnerability was determined code injection (CVE-2026-6603) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
Vulnerability (CVE-2026-6604) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
A security flaw has vulnerability (CVE-2026-6605) scores CVSS 7.3 HIGH. Analysis of affected systems and remediation steps.
How to find and recover deleted emails from PST files. Step-by-step forensic recovery using a read-only PST viewer with SHA-256 verification.
Sherlock Forensics PST Viewer v0.1.6 reads MSG and EML files with SMTP transport chain analysis, anomaly detection and MAPI timestamps. Free download.
Sherlock Forensics Android Acquirer: logical extraction via ADB with SHA-256 per artifact. Free + Forensic Edition from $399. Cellebrite alternative.
Why we built Sherlock Forensics PST Viewer. Court-ready reports, SHA256 per message, $67 instead of $300. The story behind our forensic email tool.
Free forensic desktop tools: PST/OST viewer, hash calculator, metadata inspector and port scanner. SHA256 verified. Built by investigators.
Feature-by-feature comparison of PST viewer tools for forensic examiners and legal professionals. Pricing, SHA-256 hashing and court-ready reporting compared.
Step-by-step guide to opening PST email archives with chain of custody preservation. Hash verification, read-only analysis and evidence integrity.
PST files remain critical evidence sources in litigation. How to preserve, search and produce PST archives for legal proceedings.
The Easy Appointments plugin vulnerability (CVE-2026-2262) scores CVSS 7.5 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
OpenHarness before commit bd4df81 contains vulnerability (CVE-2026-40515) scores CVSS 7.5 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
OpenHarness before commit bd4df81 contains vulnerability (CVE-2026-40516) scores CVSS 8.3 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
OpenViking prior to commit c7bb167 authentication bypass (CVE-2026-40525) scores CVSS 9.1 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
The Drag and Drop directory traversal (CVE-2026-5710) scores CVSS 7.5 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
The CMP – Coming remote code execution (CVE-2026-6518) scores CVSS 8.8 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
The DirectoryPress – Business SQL injection (CVE-2026-3489) scores CVSS 7.5 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
The WP Statistics plugin cross-site scripting (CVE-2026-5231) scores CVSS 7.2 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
A vulnerability in Cisco denial of service (CVE-2026-20147) scores CVSS 9.9 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
A vulnerability in Cisco denial of service (CVE-2026-20180) scores CVSS 9.9 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
Cisco Webex SSO certificate validation bypass (CVE-2026-20184) scores CVSS 9.8 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
A vulnerability in Cisco denial of service (CVE-2026-20186) scores CVSS 9.9 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
In Splunk Enterprise versions remote code execution (CVE-2026-20204) scores CVSS 7.1 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
In Splunk MCP Server vulnerability (CVE-2026-20205) scores CVSS 7.2 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
The Riaxe Product Customizer SQL injection (CVE-2026-3599) scores CVSS 7.5 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
The Prismatic plugin for cross-site scripting (CVE-2026-3876) scores CVSS 7.2 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
The Barcode Scanner (+Mobile privilege escalation (CVE-2026-4880) scores CVSS 9.8 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
The Payment Gateway for vulnerability (CVE-2026-5050) scores CVSS 7.5 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Spring cleaning for your security posture. Remove old accounts, rotate keys, patch outstanding CVEs and test your incident response plan.
4 new Cross-Site Scripting (XSS) CVEs this week including CVE-2026-27243 (CVSS 9.3). What SaaS Security teams need to know.
SOC 2 does not explicitly require a penetration test. But every auditor expects one. What the Trust Services Criteria actually say and what your report needs.
How to scope a SaaS penetration test. Covers API endpoints, authentication flows, multi-tenant isolation, webhooks and third-party integrations that most vendors skip.
Improper access control in access control (CVE-2026-26183) scores CVSS 7.8 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Adobe Connect versions 2025.3, cross-site scripting (CVE-2026-27243) scores CVSS 9.3 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
Adobe Connect versions 2025.3, cross-site scripting (CVE-2026-27245) scores CVSS 9.3 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
Adobe Connect versions 2025.3, cross-site scripting (CVE-2026-27246) scores CVSS 9.3 CRITICAL. Analysis of affected systems, exploitation risk and remediation steps.
ColdFusion versions 2023.18, 2025.6 vulnerability (CVE-2026-27305) scores CVSS 8.6 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Concurrent execution using shared vulnerability (CVE-2026-27926) scores CVSS 7.0 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Use after free in vulnerability (CVE-2026-32089) scores CVSS 7.8 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Concurrent execution using shared vulnerability (CVE-2026-32090) scores CVSS 7.8 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Improper input validation in vulnerability (CVE-2026-32168) scores CVSS 7.8 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Insufficiently protected credentials in vulnerability (CVE-2026-32171) scores CVSS 8.8 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Deserialization of untrusted data deserialization (CVE-2026-32192) scores CVSS 7.8 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Adobe Connect versions 2025.3, privilege escalation (CVE-2026-34617) scores CVSS 8.7 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
ColdFusion versions 2023.18, 2025.6 vulnerability (CVE-2026-34619) scores CVSS 7.7 HIGH. Analysis of affected systems, exploitation risk and remediation steps.
Many cyber insurance policies cover penetration testing under loss prevention or pre-breach services. Search your policy for four key terms to find out.
Spend $1,500 on a pentest, save $3,000 to $10,000 on your premium. The ROI math and what to include in your renewal package.
Most policyholders use 2 of 10 available security benefits. Here is the full checklist of what your premium pays for.
What brokers skip: proactive benefits, vendor lists and premium reduction strategies. Five questions to ask at renewal.
Six steps from policy check to reimbursement. Our reports are formatted for insurance submission.
Scope definition, CVSS ratings, remediation steps, executive summary, tester credentials and retest results. Our reports check every box.
Five common denial reasons and how a $1,500 pentest provides the due diligence evidence that prevents each one.
Many cyber insurance policies cover annual penetration tests as a preventive benefit. Your premium already includes this. Here is how to check and submit the request.
Step-by-step walkthrough of the cyber insurance claims process from notification through triage, investigation, report and claim resolution.
Penetration tests reduce claims, demonstrate due diligence and satisfy policy conditions. Skip them and your coverage faces exclusions and denied claims.
The big firms handle 500 cases a year. We handle yours. Comparing large panel vendors to independent forensics for cyber insurance claims.
Recent pentest, IR plan, MFA, tested backups and logging. Do these five and your insurer loves you. Skip them and your claim gets complicated.
You are one person against every bot on the internet. A casual, direct guide to the attacks that actually hit solo builders and how to stop them.
10 quick security checks with how-to steps for each. Free checklist for solopreneurs and indie hackers launching web apps.
First person narrative. Relatable. Honest. The answer is almost certainly no. But that is fixable.
A priority ladder from free tools to $5,000 pentests. Genuinely helpful at every budget level. No hard sell.
The moment someone gives you money or personal data, you are responsible for protecting it. Legal obligations kick in.
AI-assisted code auditing with ChatGPT, Claude and SAST tools. What AI catches, what it misses and when to call a professional.
10 copy-paste security prompts for vibe coders. Check your AI-generated code for SQL injection, hardcoded secrets, broken auth and more.
Claude Mythos can find zero-days faster than any human. If AI discovers vulnerabilities this fast, your unaudited code is a sitting target.
National reach, court-qualified in BC and Newfoundland, remote forensic capabilities and on-site collection anywhere in Canada.
5 free methods to test your website security. Security headers, SSL, exposed files, admin panels and Google dorking.
Step-by-step guide for the first 60 minutes of an active breach. Isolate, preserve, assess, communicate and engage forensics.
20 years of cybersecurity and forensics. Services, pricing, credentials, CBC appearances and what makes Sherlock different.
SaaS penetration testing covers multi-tenant security, API testing, auth/authz review and compliance reporting. From $5,000 CAD.
What happens during a vibe code audit, what we check, common findings and how to prepare your AI-built app for review. From $1,500 CAD.
On-site forensic collection, BC court testimony, PIPEDA compliance and same-day incident response from two Metro Vancouver offices.
Court-qualified examiner with 20+ years experience. Computer forensics, cellphone forensics, eDiscovery and expert witness testimony.
AI code slop is getting worse. Our 2026 audit data shows what happens when AI-generated code ships without security review.
Analysis of Claude Mythos vulnerability discovery capabilities, what remains unpatched and what it means for your security posture.
Most firewalls are configured once and never validated. Years of rule bloat create hidden pathways through your perimeter.
Default credentials, any-any rules, no egress filtering and seven other misconfigurations we find in nearly every firewall we test.
Fileless attacks, LOLBins and credential abuse bypass EDR detection. A penetration test reveals what your endpoint protection misses.
Zscaler, Cloudflare Zero Trust and BeyondTrust have limitations. Insider threats and misconfigurations bypass the architecture.
Companies buy firewall, EDR, NDR, SIEM and MFA but never test them together. ShadowTap tests the whole stack simultaneously.
Companies spend millions on Darktrace, CrowdStrike and Sentinel but never test if they work. Why security tool validation is the missing piece.
Known limitations of behavioral analysis: encrypted tunnels, MAC spoofing, low-throughput DNS tunnels and traffic mimicking normal patterns.
AI detection tools need training data and baseline. New devices have no baseline. Slow-moving attackers stay under radar.
Sanitized methodology: Darktrace stays fully operational, controlled phase escalation and joint review after testing.
Encrypted tunnels, DNS exfiltration, ICMP tunnels, non-standard ports and identity rotation. The gaps attackers exploit.
Years watching networks for attackers taught us exactly how to be one. 12,000+ signatures became 12,000+ things we know how to test for.
ShadowTap Ghost Mode: physically on your network, generating zero outbound traffic. All C2 through cellular. Your IDS cannot see what is not there.
Anti-Antigena MAC prefix matching and hostname mimicry. To the AI, we looked like just another Intel workstation named WS4827.
Cloudflare ARGO, Iodine DNS, ICMP ptunnel, SSH reverse and JML ICMP timing. Each tunnel that fails teaches us about your detection.
When ShadowTap plugs in, the clock starts. The baseline window is the attacker's window. A real attacker has the same opportunity.
If your vendor cannot answer these five questions about detection coverage, we can. By testing it.
Blue team monitors. Red team attacks. Purple team approach delivers collaborative improvement that neither side achieves alone.
AI coding is incredible. Here is how to do it without leaving the door open. Secure environments, security prompts, pre-commit hooks and deploy checks.
Every revolution needed a security layer. Assembly needed memory safety. The web needed HTTPS. AI needs audit.
Ban AI and your developers use it anyway. Embrace it with guardrails. Policy template for enterprise CTOs who want to say yes to AI.
We pointed our own tools at sherlockforensics.com and documented everything honestly. Missing headers, demo files, permission issues and more.
A penetration test is an authorized simulated cyberattack to find vulnerabilities. Learn types, cost, timeline and what to expect.
Penetration test costs from $1,500 to $50,000 CAD. Pricing table by tier, scope and timeline. Transparent pricing breakdown.
AI slop is unreviewed AI-generated code that compiles correctly but hides security vulnerabilities. Definition, examples and how to fix it.
Vibe coding is building apps with AI assistants and minimal manual coding. Learn the security risks and how to protect vibe-coded applications.
The complete 7-step penetration testing process from scoping and planning through exploitation, reporting and remediation support.
External, internal, web app, API, mobile, social engineering, cloud and red team. Which type of penetration test do you need?
Comparing the top pentest firms in Canada: Sherlock Forensics, Mandiant, Coalfire, GoSecure, Herjavec Group and KPMG. Specialties, pricing and target markets.
What Nessus, Qualys and Burp Suite find vs. what a human pentester catches. Pricing comparison and why you likely need both.
CrowdStrike protects endpoints. We test if your application can be broken into. Why SMBs need pentesting, not just EDR.
Real pricing from $1,500 quick audits to $50,000+ enterprise red teams. Transparent comparison with factors affecting cost.
What OWASP ZAP, Nikto, nmap and SSL Labs do well and where free tools stop. Use them for hygiene. Hire professionals for assurance.
I built a SaaS with Cursor in a weekend. Then I ran our own security testing tool against it. 14 vulnerabilities in 45 minutes.
Took us 4 minutes to find the database password. passwords.txt in the public directory. A war story of escalating findings from one engagement.
15 practical security checks for AI-generated code. Each item includes what to check, why it matters and a copy-paste fix you can use right now.
How .env files end up exposed in apps built with Cursor, Bolt and Lovable. How to check if yours is leaking and how to fix it in 5 minutes.
92% had critical vulnerabilities. 78% stored secrets in plaintext. Data-driven analysis with visual breakdowns by vulnerability category and AI tool.
Experience catches business logic flaws, court-admissible documentation and auditor-ready reports. What 20 years and CISSP/ISSAP/ISSMP certifications actually deliver.
A buyer's guide covering certifications, manual testing, compliance reports, retesting, expert witness capability and more. With Sherlock's answers to each.
Default credentials, missing rate limiting, exposed admin panels, SQL injection and more. The 10 most common findings from real pentests with severity ratings.
Seven essential security prompts to paste into your AI coding tool before deploying. Catch broken auth, injection flaws, exposed secrets and more.
The security gap between mandating AI coding tools and auditing what they produce. References Linus Torvalds, Zuckerberg and the enterprise accountability problem.
Practical npm and pip verification commands to confirm AI-suggested packages exist before installing them. Prevent supply chain attacks from hallucinated dependencies.
A 7-point checklist for CPAs reviewing SOC 2 pentest reports. Scope, methodology, CVSS findings, remediation status, retest evidence and red flags.
Transparent pricing from $1,500 to $25,000+ CAD. Four tiers compared to industry averages, cost factors and why cheap pentests are expensive.
Aggregate data from hundreds of engagements. Default credentials, SQL injection, broken access controls and more, with severity ratings and fixes.
Clear comparison of pentests, vulnerability scans, bug bounties and red teams. Table format with costs, use cases and a decision tree.
Step-by-step walkthrough of a real engagement. Scoping, reconnaissance, exploitation, reporting and debrief demystified for founders and CTOs.
Penetration testing explained in plain language. What it is, why it matters, what happens during one, what the report looks like and how much it costs.
Side-by-side comparison for CTOs. Pros, cons, costs and a decision framework for choosing between pentests and bug bounty programs.
A detailed day-by-day walkthrough of a standard penetration test. Scoping, reconnaissance, active testing, exploitation, reporting and debrief.
The most common API vulnerabilities mapped to the OWASP API Security Top 10. Broken auth, BOLA, mass assignment, rate limiting and SSRF with real findings.
How to tell a good pentest report from a bad one. Red flags, green flags and what to demand from your security vendor.
SOC 2 penetration testing requirements for startups. What the standard requires, how to scope, timing and what auditors look for in the report.
Top 5 findings from the 2026 AI Code Security Report. 92% of AI-generated codebases have critical vulnerabilities. 88% lack rate limiting. 78% expose secrets.
Aggregate data from 50 AI code audits. 92% had critical vulnerabilities, 78% stored secrets in plaintext and 54% had SQL injection. Vibe-coded vs professional comparison.
Anonymized case study. 3-person SaaS startup built with Cursor. 8 critical vulnerabilities found in a $1,500 quick audit and fixed in 2 days.
$1,500 audit vs $4.88M breach. The math of prevention vs doing nothing, including PIPEDA fines, cyber insurance and reputation damage.
The 10 most common security disasters in vibe-coded authentication. Plaintext passwords, client-side auth, exposed .env files and more.
Ten checks you can run right now. If you fail more than two you need a professional audit before launch.
A realistic 60-minute attack walkthrough on a typical vibe-coded SaaS. From recon to database dump to Stripe access.
Decision tree for founders. If it handles user data, processes payments or has login, the answer is yes.
Directory traversal, server misconfiguration and zero hashing. Why flat file password storage is catastrophic and what to use instead.
AI slop ships fast and breaks faster. Unreviewed AI-generated code carries injection flaws, hallucinated dependencies and hardcoded secrets that survive to production.
Working code is not secure code. AI writes functional applications that hide auth bypasses, injectable queries and unprotected API endpoints.
You built it in a weekend with Cursor. An attacker dismantled it in an afternoon. The incident response playbook for AI-built applications.
Nine security categories every CTO must check before shipping AI-generated code. Dependency verification, secrets scanning, auth review and more.
Hallucinated packages, weak randomness, SQL injection, hardcoded secrets and insecure deserialization. The five patterns we find in every AI code audit.
Anthropic's Claude Mythos found thousands of zero-days for under $50 each. Over 99% remain unpatched.
The rise of non-developers shipping production apps and why scanning alone is not enough to secure vibe coded software.
EU AI Act, NIST AI RMF and investor expectations are making AI security audits a pre-launch requirement.
Documented cases of AI systems being exploited in production. Prompt injection, model poisoning and supply chain attacks with real-world impact.
A forensic examination of AI attack surfaces. Model extraction, data poisoning, adversarial inputs and the security gaps most teams overlook.
Employees are using AI tools you did not approve on data you did not authorize. The compliance and security implications are significant.
The tools our team actually uses on engagements. From reconnaissance to exploitation to reporting.
What Canadian businesses need to know about PIPEDA compliance, data breach notification and privacy impact assessments.
How evolving post-quantum encryption standards are reshaping volatile memory analysis and what forensic examiners must adapt.
A forensic methodology for authenticating digital evidence when AI-generated media enters the courtroom.
Investors are asking about security posture. Here is what a pre-funding penetration test actually covers and why waiting costs more.
CVE Intelligence
High and critical vulnerabilities relevant to cloud, web and AI infrastructure. Updated daily from the National Vulnerability Database.
| CVE | Severity | CVSS | Affected Product | Vulnerability |
|---|---|---|---|---|
| CVE-2026-23696 | CRITICAL | 9.9 | Windmill CE/EE | SQL injection in folder ownership management |
| CVE-2021-4473 | CRITICAL | 9.8 | Tianxin Management System | Command injection in Reporter component |
| CVE-2026-22679 | CRITICAL | 9.8 | Weaver E-cology 10.0 | Unauthenticated RCE via debug endpoint |
| CVE-2026-3296 | CRITICAL | 9.8 | Everest Forms (WordPress) | PHP Object Injection via deserialization |
| CVE-2026-4631 | CRITICAL | 9.8 | Cockpit (Linux) | SSH command injection via login endpoint |
| CVE-2026-1346 | CRITICAL | 9.3 | IBM Verify Identity Access | Privilege escalation for local users |
| CVE-2026-22683 | HIGH | 8.8 | Windmill | Missing authorization bypasses operator restrictions |
| CVE-2026-3357 | HIGH | 8.8 | IBM Langflow Desktop | Insecure FAISS deserialization enables code execution |
| CVE-2026-1342 | HIGH | 8.5 | IBM Verify Identity Access | Local users can execute malicious scripts |
| CVE-2026-4788 | HIGH | 8.4 | IBM Tivoli Netcool Impact | Sensitive data exposure in log files |
| CVE-2026-4740 | HIGH | 8.2 | Red Hat ACM / Open Cluster Mgmt | Certificate forgery via improper validation |
| CVE-2026-5736 | HIGH | 7.3 | PowerJob | detailPlus endpoint manipulation |
| CVE-2026-5739 | HIGH | 7.3 | PowerJob | Code injection via OpenAPI workflow endpoint |
| CVE-2026-5741 | HIGH | 7.3 | docker-mcp-server | OS command injection via HTTP interface |
| CVE-2026-1343 | HIGH | 7.2 | IBM Verify Identity Access | SSRF exposes internal auth endpoints |
| CVE-2026-22682 | HIGH | 7.1 | OpenHarness | Improper access control exposes local files |