CVE tracker
251 subscribers
3.3K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-20419 - Cisco WLAN AP/STA Firmware Denial of Service Vulnerability

CVE ID : CVE-2026-20419
Published : Feb. 2, 2026, 9:15 a.m. | 1 hour, 22 minutes ago
Description : In wlan AP/STA firmware, there is a possible system becoming irresponsive due to an uncaught exception. This could lead to remote (proximal/adjacent) denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00461663 / WCNCR00463309; Issue ID: MSV-4852.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-20420 - "Qualcomm Modem Denial of Service Remote Vulnerability"

CVE ID : CVE-2026-20420
Published : Feb. 2, 2026, 9:15 a.m. | 1 hour, 22 minutes ago
Description : In Modem, there is a possible system crash due to incorrect error handling. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738313; Issue ID: MSV-5935.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-20421 - "Modem Denial of Service Vulnerability"

CVE ID : CVE-2026-20421
Published : Feb. 2, 2026, 9:15 a.m. | 1 hour, 22 minutes ago
Description : In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01738293; Issue ID: MSV-5922.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-20422 - "Ericsson Modem Remote Denial of Service Vulnerability"

CVE ID : CVE-2026-20422
Published : Feb. 2, 2026, 9:15 a.m. | 1 hour, 22 minutes ago
Description : In Modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00827332; Issue ID: MSV-5919.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-54263 - WordPress Spirit Framework plugin <= 1.2.13 - Local File Inclusion vulnerability

CVE ID : CVE-2024-54263
Published : Feb. 2, 2026, 10:16 a.m. | 22 minutes ago
Description : Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Talemy Spirit Framework allows PHP Local File Inclusion.This issue affects Spirit Framework: from n/a through 1.2.13.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1117 - Improper Access Control in parisneo/lollms

CVE ID : CVE-2026-1117
Published : Feb. 2, 2026, 10:16 a.m. | 22 minutes ago
Description : A vulnerability in the `lollms_generation_events.py` component of parisneo/lollms version 5.9.0 allows unauthenticated access to sensitive Socket.IO events. The `add_events` function registers event handlers such as `generate_text`, `cancel_generation`, `generate_msg`, and `generate_msg_from` without implementing authentication or authorization checks. This allows unauthenticated clients to execute resource-intensive or state-altering operations, leading to potential denial of service, state corruption, and race conditions. Additionally, the use of global flags (`lollmsElfServer.busy`, `lollmsElfServer.cancel_gen`) for state management in a multi-client environment introduces further vulnerabilities, enabling one client's actions to affect the server's state and other clients' operations. The lack of proper access control and reliance on insecure global state management significantly impacts the availability and integrity of the service.
Severity: 8.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1751 - Missing Authorization in GitLab

CVE ID : CVE-2026-1751
Published : Feb. 2, 2026, 10:16 a.m. | 22 minutes ago
Description : A vulnerability has been discovered in GitLab CE/EE affecting all versions starting with 16.8 before 18.5.0 that could have allowed unauthorized edits to merge request approval rules under certain conditions.
Severity: 3.1 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-2356 - Remote Code Execution due to LFI in '/reinstall_extension' in parisneo/lollms-webui

CVE ID : CVE-2024-2356
Published : Feb. 2, 2026, 11:15 a.m. | 3 hours, 23 minutes ago
Description : A Local File Inclusion (LFI) vulnerability exists in the '/reinstall_extension' endpoint of the parisneo/lollms-webui application, specifically within the `name` parameter of the `@router.post("/reinstall_extension")` route. This vulnerability allows attackers to inject a malicious `name` parameter, leading to the server loading and executing arbitrary Python files from the upload directory for discussions. This issue arises due to the concatenation of `data.name` directly with `lollmsElfServer.lollms_paths.extensions_zoo_path` and its use as an argument for `ExtensionBuilder().build_extension()`. The server's handling of the `__init__.py` file in arbitrary locations, facilitated by `importlib.machinery.SourceFileLoader`, enables the execution of arbitrary code, such as command execution or creating a reverse-shell connection. This vulnerability affects the latest version of parisneo/lollms-webui and can lead to Remote Code Execution (RCE) when the application is exposed to an external endpoint or the UI, especially when bound to `0.0.0.0` or in `headless mode`. No user interaction is required for exploitation.
Severity: 9.6 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-4147 - Insufficient Access Control in lunary-ai/lunary

CVE ID : CVE-2024-4147
Published : Feb. 2, 2026, 11:16 a.m. | 3 hours, 23 minutes ago
Description : In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability allows users to delete prompts created in other organizations through ID manipulation. The vulnerability stems from the application's failure to validate the ownership of the prompt before deletion, only checking if the user has permissions to delete such resources without verifying if it belongs to the user's project or organization. As a result, users can remove prompts not owned by their organization or project, leading to legitimate users being unable to access the removed prompts and causing information inconsistencies.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-5386 - Account Hijacking via Password Reset Token Leak in lunary-ai/lunary

CVE ID : CVE-2024-5386
Published : Feb. 2, 2026, 11:16 a.m. | 3 hours, 23 minutes ago
Description : In lunary-ai/lunary version 1.2.2, an account hijacking vulnerability exists due to a password reset token leak. A user with a 'viewer' role can exploit this vulnerability to hijack another user's account by obtaining the password reset token. The vulnerability is triggered when the 'viewer' role user sends a specific request to the server, which responds with a password reset token in the 'recoveryToken' parameter. This token can then be used to reset the password of another user's account without authorization. The issue results from an excessive attack surface, allowing lower-privileged users to escalate their privileges and take over accounts.
Severity: 9.6 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2024-5986 - Remote Arbitrary File Write with Arbitrary Data in h2oai/h2o-3

CVE ID : CVE-2024-5986
Published : Feb. 2, 2026, 11:16 a.m. | 3 hours, 23 minutes ago
Description : A vulnerability in h2oai/h2o-3 version 3.46.0.1 allows remote attackers to write arbitrary data to any file on the server. This is achieved by exploiting the `/3/Parse` endpoint to inject attacker-controlled data as the header of an empty file, which is then exported using the `/3/Frames/framename/export` endpoint. The impact of this vulnerability includes the potential for remote code execution and complete access to the system running h2o-3, as attackers can overwrite critical files such as private SSH keys or script files.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-10279 - Privilege Escalation in mlflow/mlflow

CVE ID : CVE-2025-10279
Published : Feb. 2, 2026, 11:16 a.m. | 3 hours, 23 minutes ago
Description : In mlflow version 2.20.3, the temporary directory used for creating Python virtual environments is assigned insecure world-writable permissions (0o777). This vulnerability allows an attacker with write access to the `/tmp` directory to exploit a race condition and overwrite `.py` files in the virtual environment, leading to arbitrary code execution. The issue is resolved in version 3.4.0.
Severity: 7.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-6208 - Uncontrolled Memory Consumption in run-llama/llama_index

CVE ID : CVE-2025-6208
Published : Feb. 2, 2026, 11:16 a.m. | 3 hours, 23 minutes ago
Description : The `SimpleDirectoryReader` component in `llama_index.core` version 0.12.23 suffers from uncontrolled memory consumption due to a resource management flaw. The vulnerability arises because the user-specified file limit (`num_files_limit`) is applied after all files in a directory are loaded into memory. This can lead to memory exhaustion and degraded performance, particularly in environments with limited resources. The issue is resolved in version 0.12.41.
Severity: 5.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-7105 - Denial of Service via JavaScript Memory Overflow in danny-avila/librechat

CVE ID : CVE-2025-7105
Published : Feb. 2, 2026, 11:16 a.m. | 3 hours, 23 minutes ago
Description : A vulnerability in danny-avila/librechat allows attackers to exploit the unrestricted Fork Function in `/api/convos/fork` to fork numerous contents rapidly. If the forked content includes a Mermaid graph with a large number of nodes, it can lead to a JavaScript heap out of memory error upon service restart, causing a denial of service. This issue affects the latest version of the product.
Severity: 5.7 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0599 - Unbounded External Image Fetch in Validation Leads to Resource-Exhaustion DoS in huggingface/text-generation-inference

CVE ID : CVE-2026-0599
Published : Feb. 2, 2026, 11:16 a.m. | 3 hours, 23 minutes ago
Description : A vulnerability in huggingface/text-generation-inference version 3.3.6 allows unauthenticated remote attackers to exploit unbounded external image fetching during input validation in VLM mode. The issue arises when the router scans inputs for Markdown image links and performs a blocking HTTP GET request, reading the entire response body into memory and cloning it before decoding. This behavior can lead to resource exhaustion, including network bandwidth saturation, memory inflation, and CPU overutilization. The vulnerability is triggered even if the request is later rejected for exceeding token limits. The default deployment configuration, which lacks memory usage limits and authentication, exacerbates the impact, potentially crashing the host machine. The issue is resolved in version 3.3.7.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-8587 - Time-Based Blind SQLi in AKCE Software's SKSPro

CVE ID : CVE-2025-8587
Published : Feb. 2, 2026, 1:15 p.m. | 1 hour, 23 minutes ago
Description : Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in AKCE Software Technology R&D Industry and Trade Inc. SKSPro allows SQL Injection.This issue affects SKSPro: through 07012026.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-1757 - Libxml2: memory leak leading to local denial of service in xmllint interactive shell

CVE ID : CVE-2026-1757
Published : Feb. 2, 2026, 1:15 p.m. | 1 hour, 23 minutes ago
Description : A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.
Severity: 6.2 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2022-50975 - Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated access to device configuration

CVE ID : CVE-2022-50975
Published : Feb. 2, 2026, 2:07 p.m. | 32 minutes ago
Description : An unauthenticated remote attacker is able to use an existing session id of a logged in user and gain full access to the device if configuration via ethernet is enabled.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2022-50976 - Innomic VibroLine Configurator and avibia Configurator allow unintended device reset via USB

CVE ID : CVE-2022-50976
Published : Feb. 2, 2026, 2:08 p.m. | 31 minutes ago
Description : A local attacker could cause a full device reset by resetting the device passwords using an invalid reset file via USB.
Severity: 7.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2022-50977 - Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via HTTP

CVE ID : CVE-2022-50977
Published : Feb. 2, 2026, 2:08 p.m. | 30 minutes ago
Description : An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via HTTP.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2022-50978 - Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via Modbus (TCP)

CVE ID : CVE-2022-50978
Published : Feb. 2, 2026, 2:09 p.m. | 29 minutes ago
Description : An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (TCP).
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...