Логотип exploitDog
source:"nvd"
Консоль
Логотип exploitDog

exploitDog

source:"nvd"

Количество 331 614

Количество 331 614

nvd логотип

CVE-2026-24927

3 дня назад

Out-of-bounds access vulnerability in the frequency modulation module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2026-24926

4 дня назад

Out-of-bounds write vulnerability in the camera module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 8.4
EPSS: Низкий
nvd логотип

CVE-2026-24925

4 дня назад

Heap-based buffer overflow vulnerability in the image module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2026-24924

3 дня назад

Vulnerability of improper permission control in the print module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2026-24923

4 дня назад

Permission control vulnerability in the HDC module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

CVSS3: 6.3
EPSS: Низкий
nvd логотип

CVE-2026-24922

4 дня назад

Buffer overflow vulnerability in the HDC module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 6.9
EPSS: Низкий
nvd логотип

CVE-2026-24921

4 дня назад

Address read vulnerability in the HDC module. Impact: Successful exploitation of this vulnerability will affect availability and confidentiality.

CVSS3: 4.8
EPSS: Низкий
nvd логотип

CVE-2026-24920

3 дня назад

Permission control vulnerability in the AMS module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 6.2
EPSS: Низкий
nvd логотип

CVE-2026-24919

4 дня назад

Out-of-bounds write vulnerability in the DFX module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 6
EPSS: Низкий
nvd логотип

CVE-2026-24918

4 дня назад

Address read vulnerability in the communication module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 6.8
EPSS: Низкий
nvd логотип

CVE-2026-24917

4 дня назад

UAF vulnerability in the security module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2026-24916

4 дня назад

Identity authentication bypass vulnerability in the window module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2026-24915

4 дня назад

Out-of-bounds read issue in the media subsystem. Impact: Successful exploitation of this vulnerability will affect availability and confidentiality.

CVSS3: 6.2
EPSS: Низкий
nvd логотип

CVE-2026-24914

4 дня назад

Type confusion vulnerability in the camera module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 4
EPSS: Низкий
nvd логотип

CVE-2026-24910

13 дней назад

In Bun before 1.3.5, the default trusted dependencies list (aka trust allow list) can be spoofed by a non-npm package in the case of a matching name (for file, link, git, or github).

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2026-24909

13 дней назад

vlt before 1.0.0-rc.10 mishandles path sanitization for tar, leading to path traversal during extraction.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2026-24905

11 дней назад

Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kubernetes clusters and Linux hosts using eBPF. The `ig` binary provides a subcommand for image building, used to generate custom gadget OCI images. A part of this functionality is implemented in the file `inspektor-gadget/cmd/common/image/build.go`. The `Makefile.build` file is the Makefile template employed during the building process. This file includes user-controlled data in an unsafe fashion, specifically some parameters are embedded without an adequate escaping in the commands inside the Makefile. Prior to version 0.48.1, this implementation is vulnerable to command injection: an attacker able to control values in the `buildOptions` structure would be able to execute arbitrary commands during the building process. An attacker able to exploit this vulnerability would be able to execute arbitrary command on the Linux host where the `ig` command is launched, if images are built with the `-

EPSS: Низкий
nvd логотип

CVE-2026-24904

11 дней назад

TrustTunnel is an open-source VPN protocol with a rule bypass issue in versions prior to 0.9.115. In `tls_listener.rs`, `TlsListener::listen()` peeks 1024 bytes and calls `extract_client_random(...)`. If `parse_tls_plaintext` fails (for example, a fragmented/partial ClientHello split across TCP writes), `extract_client_random` returns `None`. In `rules.rs`, `RulesEngine::evaluate` only evaluates `client_random_prefix` when `client_random` is `Some(...)`. As a result, when extraction fails (`client_random == None`), any rule that relies on `client_random_prefix` matching is skipped and evaluation falls through to later rules. As an important semantics note: `client_random_prefix` is a match condition only. It does not mean "block non-matching prefixes" by itself. A rule with `client_random_prefix = ...` triggers its `action` only when the prefix matches (and the field is available to evaluate). Non-matches (or `None`) simply do not match that rule and continue to fall through. The vulne

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2026-24903

3 дня назад

OrcaStatLLM Researcher is an LLM Based Research Paper Generator. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Log Message in the Session Page in OrcaStatLLM-Researcher that allows attackers to inject and execute arbitrary JavaScript code in victims' browsers through malicious research topic inputs.

EPSS: Низкий
nvd логотип

CVE-2026-24902

11 дней назад

TrustTunnel is an open-source VPN protocol with a server-side request forgery and and private network restriction bypass in versions prior to 0.9.114. In `tcp_forwarder.rs`, SSRF protection for `allow_private_network_connections = false` was only applied in the `TcpDestination::HostName(peer)` path. The `TcpDestination::Address(peer) => peer` path proceeded to `TcpStream::connect()` without equivalent checks (for example `is_global_ip`, `is_loopback`), allowing loopback/private targets to be reached by supplying a numeric IP. The vulnerability is fixed in version 0.9.114.

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-24927

Out-of-bounds access vulnerability in the frequency modulation module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 5.5
0%
Низкий
3 дня назад
nvd логотип
CVE-2026-24926

Out-of-bounds write vulnerability in the camera module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 8.4
0%
Низкий
4 дня назад
nvd логотип
CVE-2026-24925

Heap-based buffer overflow vulnerability in the image module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 7.3
0%
Низкий
4 дня назад
nvd логотип
CVE-2026-24924

Vulnerability of improper permission control in the print module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

CVSS3: 6.1
0%
Низкий
3 дня назад
nvd логотип
CVE-2026-24923

Permission control vulnerability in the HDC module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

CVSS3: 6.3
0%
Низкий
4 дня назад
nvd логотип
CVE-2026-24922

Buffer overflow vulnerability in the HDC module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 6.9
0%
Низкий
4 дня назад
nvd логотип
CVE-2026-24921

Address read vulnerability in the HDC module. Impact: Successful exploitation of this vulnerability will affect availability and confidentiality.

CVSS3: 4.8
0%
Низкий
4 дня назад
nvd логотип
CVE-2026-24920

Permission control vulnerability in the AMS module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 6.2
0%
Низкий
3 дня назад
nvd логотип
CVE-2026-24919

Out-of-bounds write vulnerability in the DFX module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 6
0%
Низкий
4 дня назад
nvd логотип
CVE-2026-24918

Address read vulnerability in the communication module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 6.8
0%
Низкий
4 дня назад
nvd логотип
CVE-2026-24917

UAF vulnerability in the security module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 6.5
0%
Низкий
4 дня назад
nvd логотип
CVE-2026-24916

Identity authentication bypass vulnerability in the window module. Impact: Successful exploitation of this vulnerability may affect service confidentiality.

CVSS3: 5.9
0%
Низкий
4 дня назад
nvd логотип
CVE-2026-24915

Out-of-bounds read issue in the media subsystem. Impact: Successful exploitation of this vulnerability will affect availability and confidentiality.

CVSS3: 6.2
0%
Низкий
4 дня назад
nvd логотип
CVE-2026-24914

Type confusion vulnerability in the camera module. Impact: Successful exploitation of this vulnerability may affect availability.

CVSS3: 4
0%
Низкий
4 дня назад
nvd логотип
CVE-2026-24910

In Bun before 1.3.5, the default trusted dependencies list (aka trust allow list) can be spoofed by a non-npm package in the case of a matching name (for file, link, git, or github).

CVSS3: 5.9
0%
Низкий
13 дней назад
nvd логотип
CVE-2026-24909

vlt before 1.0.0-rc.10 mishandles path sanitization for tar, leading to path traversal during extraction.

CVSS3: 5.9
0%
Низкий
13 дней назад
nvd логотип
CVE-2026-24905

Inspektor Gadget is a set of tools and framework for data collection and system inspection on Kubernetes clusters and Linux hosts using eBPF. The `ig` binary provides a subcommand for image building, used to generate custom gadget OCI images. A part of this functionality is implemented in the file `inspektor-gadget/cmd/common/image/build.go`. The `Makefile.build` file is the Makefile template employed during the building process. This file includes user-controlled data in an unsafe fashion, specifically some parameters are embedded without an adequate escaping in the commands inside the Makefile. Prior to version 0.48.1, this implementation is vulnerable to command injection: an attacker able to control values in the `buildOptions` structure would be able to execute arbitrary commands during the building process. An attacker able to exploit this vulnerability would be able to execute arbitrary command on the Linux host where the `ig` command is launched, if images are built with the `-

0%
Низкий
11 дней назад
nvd логотип
CVE-2026-24904

TrustTunnel is an open-source VPN protocol with a rule bypass issue in versions prior to 0.9.115. In `tls_listener.rs`, `TlsListener::listen()` peeks 1024 bytes and calls `extract_client_random(...)`. If `parse_tls_plaintext` fails (for example, a fragmented/partial ClientHello split across TCP writes), `extract_client_random` returns `None`. In `rules.rs`, `RulesEngine::evaluate` only evaluates `client_random_prefix` when `client_random` is `Some(...)`. As a result, when extraction fails (`client_random == None`), any rule that relies on `client_random_prefix` matching is skipped and evaluation falls through to later rules. As an important semantics note: `client_random_prefix` is a match condition only. It does not mean "block non-matching prefixes" by itself. A rule with `client_random_prefix = ...` triggers its `action` only when the prefix matches (and the field is available to evaluate). Non-matches (or `None`) simply do not match that rule and continue to fall through. The vulne

CVSS3: 5.3
0%
Низкий
11 дней назад
nvd логотип
CVE-2026-24903

OrcaStatLLM Researcher is an LLM Based Research Paper Generator. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Log Message in the Session Page in OrcaStatLLM-Researcher that allows attackers to inject and execute arbitrary JavaScript code in victims' browsers through malicious research topic inputs.

0%
Низкий
3 дня назад
nvd логотип
CVE-2026-24902

TrustTunnel is an open-source VPN protocol with a server-side request forgery and and private network restriction bypass in versions prior to 0.9.114. In `tcp_forwarder.rs`, SSRF protection for `allow_private_network_connections = false` was only applied in the `TcpDestination::HostName(peer)` path. The `TcpDestination::Address(peer) => peer` path proceeded to `TcpStream::connect()` without equivalent checks (for example `is_global_ip`, `is_loopback`), allowing loopback/private targets to be reached by supplying a numeric IP. The vulnerability is fixed in version 0.9.114.

CVSS3: 7.1
0%
Низкий
11 дней назад

Уязвимостей на страницу