CVE tracker
305 subscribers
4.34K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-45230 - DumbAssets 1.0.11 Path Traversal File Deletion via /api/delete-file

CVE ID :CVE-2026-45230
Published : May 18, 2026, 6:17 p.m. | 1 hour, 4 minutes ago
Description :DumbAssets through 1.0.11 contains a path traversal vulnerability in the POST /api/delete-file endpoint and filesToDelete array parameters that allows unauthenticated attackers to delete arbitrary files by supplying ../ sequences that bypass directory boundary validation. Attackers can exploit the optional and disabled-by-default authentication control to traverse outside the intended application directory and delete critical files such as server.js or package.json, causing complete denial of service.
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45492 - Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability

CVE ID :CVE-2026-45492
Published : May 18, 2026, 6:17 p.m. | 1 hour, 4 minutes ago
Description :Improper input validation in Microsoft Edge (Chromium-based) allows an unauthorized attacker to bypass a security feature over a network.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45494 - Microsoft Edge (Chromium-based) Spoofing Vulnerability

CVE ID :CVE-2026-45494
Published : May 18, 2026, 6:17 p.m. | 1 hour, 4 minutes ago
Description :Microsoft Edge (Chromium-based) Spoofing Vulnerability
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45495 - Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

CVE ID :CVE-2026-45495
Published : May 18, 2026, 6:17 p.m. | 1 hour, 4 minutes ago
Description :Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45231 - DumbAssets 1.0.11 Stored Cross-Site Scripting via Asset Fields

CVE ID :CVE-2026-45231
Published : May 18, 2026, 6:40 p.m. | 41 minutes ago
Description :DumbAssets through 1.0.11 contains a stored cross-site scripting vulnerability in asset fields including name, description, modelNumber, serialNumber, and tags that are stored without server-side sanitization and rendered using innerHTML without client-side escaping. Attackers can create or update assets with HTML or JavaScript payloads via the asset API endpoints to execute arbitrary scripts in the browsers of users viewing the asset list, and with Content-Security-Policy disabled, the injected scripts can make unrestricted connections to internal network services.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8836 - lwIP snmpv3 USM snmp_msg.c snmp_parse_inbound_frame stack-based overflow

CVE ID :CVE-2026-8836
Published : May 18, 2026, 6:45 p.m. | 36 minutes ago
Description :A vulnerability was found in lwIP up to 2.2.1. Affected is the function snmp_parse_inbound_frame of the file src/apps/snmp/snmp_msg.c of the component snmpv3 USM Handler. Performing a manipulation of the argument msgAuthenticationParameters results in stack-based buffer overflow. The attack may be initiated remotely. The patch is named 0c957ec03054eb6c8205e9c9d1d05d90ada3898c. It is suggested to install a patch to address this issue.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45243 - Summarize < 0.15.1 Browser Extension Missing Authorization via Content Script

CVE ID :CVE-2026-45243
Published : May 18, 2026, 6:50 p.m. | 31 minutes ago
Description :Summarize prior to 0.15.1 contains a missing authorization vulnerability in the content script window.postMessage bridge that allows malicious pages to perform unauthorized operations on automation artifacts. Attackers can simulate runtime messages with spoofed sender identifiers to list, read, create, overwrite, or delete automation artifacts scoped to the affected tab without proper authorization checks.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45242 - Summarize < 0.15.1 Path Traversal via slidesDir Parameter

CVE ID :CVE-2026-45242
Published : May 18, 2026, 6:52 p.m. | 29 minutes ago
Description :Summarize prior to 0.15.1 contains a path traversal vulnerability in the /v1/summarize daemon endpoint that allows authenticated callers to write files to arbitrary directories by supplying an absolute path or directory traversal sequence in the slidesDir request parameter. Attackers can exploit this to write slide_*.png and slides.json files to any writable directory and subsequently delete matching files at the specified location through repeat extraction.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8851 - SOGo 5.12.7 SQL Injection via addUserInAcls endpoint

CVE ID :CVE-2026-8851
Published : May 18, 2026, 8:10 p.m. | 1 hour, 13 minutes ago
Description :SOGo 5.12.7 contains a SQL injection vulnerability in the Access Control List management functionality that allows authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUserInAcls endpoint. Attackers can inject malicious SQL code to write extracted data into the sogo_acl table and retrieve it through the /acls API, establishing an out-of-band data exfiltration channel.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-8838 - Remote Code Execution via eval() Injection in amazon-redshift-python-driver

CVE ID :CVE-2026-8838
Published : May 18, 2026, 8:15 p.m. | 1 hour, 8 minutes ago
Description :Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client. To remediate this issue, users should upgrade to version 2.1.14.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-65954 - SimpleSAMLphp-casserver has an Open Redirect vulnerability via logout

CVE ID :CVE-2025-65954
Published : May 18, 2026, 8:16 p.m. | 1 hour, 7 minutes ago
Description :SimpleSAMLphp-casserver is a CAS 1.0 and 2.0 compliant CAS server in the form of a SimpleSAMLphp module. In versions below 6.3.1 and 7.0.0, the logout endpoint accepts a url query parameter to redirect to. casserver treats that url as trusted, and either (depending on configuration) redirects the browser there, or shows a "you've been logged out" page with a link to continue to that url. Impacted configs include 'enable_logout' => true, and 'skip_logout_page' -> true. This issue has been resolved in versions 6.3.1 and 7.0.0.
Severity: 4.7 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-21789 - HCL Connections is vulnerable to broken access control

CVE ID :CVE-2026-21789
Published : May 18, 2026, 8:16 p.m. | 1 hour, 7 minutes ago
Description :HCL Connections contains a broken access control vulnerability that may allow unauthorized user to update data in certain scenarios.
Severity: 4.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45244 - Summarize < 0.15.1 Unapproved Browser Automation Execution

CVE ID :CVE-2026-45244
Published : May 18, 2026, 8:16 p.m. | 1 hour, 7 minutes ago
Description :Summarize prior to 0.15.1 contains a missing authorization vulnerability that allows attackers to execute browser automation actions without per-call user approval when the extension automation feature is enabled. Attackers can influence the agent through malicious page or summary content to invoke enabled extension automation tools such as navigation or debugger-backed actions, bypassing the final user approval step when a user interacts with attacker-controlled content.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45245 - Summarize < 0.15.1 Unauthorized Daemon Request via Untrusted Events

CVE ID :CVE-2026-45245
Published : May 18, 2026, 8:16 p.m. | 1 hour, 7 minutes ago
Description :Summarize prior to 0.15.1 contains a vulnerability in the hover summary feature that allows malicious pages to dispatch synthetic mouseover events over attacker-controlled links, causing the extension to make authenticated daemon requests using stored tokens without verifying event trustworthiness. Attackers can place local or private-network URLs behind hoverable links to route authenticated requests through the daemon, potentially accessing sensitive internal endpoints when users interact with attacker-controlled content.
Severity: 7.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-45246 - Summarize < 0.15.1 Insecure File Permissions Information Disclosure

CVE ID :CVE-2026-45246
Published : May 18, 2026, 8:16 p.m. | 1 hour, 7 minutes ago
Description :Summarize prior to 0.15.1 contains an insecure file permission vulnerability in the refresh-free configuration rewrite path that allows local users to read sensitive credentials by exploiting default filesystem permissions. When the refresh-free path rewrites the configuration file, it creates the replacement with default process umask permissions instead of preserving the original file permissions, exposing the config file containing API keys and provider credentials to other local users on shared Unix-like systems.
Severity: 6.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-47090 - Claude HUD 0.0.12 Terminal Injection via OSC 8 Hyperlinks

CVE ID :CVE-2026-47090
Published : May 18, 2026, 8:16 p.m. | 1 hour, 7 minutes ago
Description :Claude HUD through 0.0.12, patched in commit 234d9aa, constructs OSC 8 terminal hyperlink escape sequences using raw cwd and branchUrl values without stripping control characters or encoding embedded values, allowing attackers to inject arbitrary ANSI codes into terminal sessions. Attackers can embed ESC+backslash sequences in the current working directory or branch URL to execute malicious ANSI codes including text color changes, forged prompts, and OSC 52 clipboard writes, or trigger outbound HTTP requests to attacker-controlled remotes when hyperlinks are clicked.
Severity: 4.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-47091 - Claude HUD 0.0.12 Path Traversal via transcript_path

CVE ID :CVE-2026-47091
Published : May 18, 2026, 8:16 p.m. | 1 hour, 7 minutes ago
Description :Claude HUD through 0.0.12, patched in commit 234d9aa, contains a path traversal vulnerability that allows attackers to read arbitrary files by supplying an unvalidated transcript_path value via stdin JSON. Attackers can access any file readable by the process and the file metadata is written to a persistent cache file with insufficient permissions, creating a forensic record of accessed paths that survives process exit.
Severity: 4.8 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-47092 - Claude HUD 0.0.12 Arbitrary Command Execution via COMSPEC Environment Variable

CVE ID :CVE-2026-47092
Published : May 18, 2026, 8:16 p.m. | 1 hour, 7 minutes ago
Description :Claude HUD through 0.0.12, patched in commit 234d9aa, contains a command injection vulnerability that allows local attackers to execute arbitrary commands by manipulating the COMSPEC environment variable. Attackers can set COMSPEC to an arbitrary binary path before claude-hud performs its version check, causing execFile() to execute the attacker-supplied executable with cmd.exe arguments, resulting in arbitrary code execution on Windows systems.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22810 - Joplin: Path traversal in OneNote importer allows overwriting arbitrary files

CVE ID :CVE-2026-22810
Published : May 18, 2026, 8:23 p.m. | 59 minutes ago
Description :Joplin is an open source note-taking and to-do application that organises notes and lists into notebooks. Versions prior to 3.5.7 contain a path traversal vulnerability in the importer which allows overwriting arbitrary files on disk. The OneNote converter does not sanitize the names of embedded files before writing them to disk. As a result, it's possible for an attacker to create a malicious .one file that includes file names containing ../../, that are then interpreted as part of the target path when extracting attachments from the .one file. This issue has been patched in version 3.5.7.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-4137 - Incomplete Fix for CVE-2025-10279: Insecure Temporary Directory Permissions in mlflow/mlflow

CVE ID :CVE-2026-4137
Published : May 18, 2026, 8:26 p.m. | 57 minutes ago
Description :In mlflow/mlflow versions prior to 3.11.0, the `get_or_create_nfs_tmp_dir()` function in `mlflow/utils/file_utils.py` creates temporary directories with world-writable permissions (0o777), and the `_create_model_downloading_tmp_dir()` function in `mlflow/pyfunc/__init__.py` creates directories with group-writable permissions (0o770). These insecure permissions allow local attackers to tamper with model artifacts, such as cloudpickle-serialized Python objects, and achieve arbitrary code execution when the tampered artifacts are deserialized via `cloudpickle.load()`. This vulnerability is particularly critical in environments with shared NFS mounts, such as Databricks, where NFS is enabled by default. The issue is a continuation of the vulnerability class addressed in CVE-2025-10279, which was only partially fixed.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-25244 - WebdriverIO has Command Injection in the BrowserStack Service

CVE ID :CVE-2026-25244
Published : May 18, 2026, 8:31 p.m. | 52 minutes ago
Description :WebdriverIO is a test automation framework for unit, e2e and component testing using WebDriver, WebDriver BiDi and Appium. Versions below 9.24.0 contain a command injection vulnerability leading to remote code execution (RCE) in test orchestration. Git permits branch names containing shell metacharacters, and getGitMetadataForAISelection() interpolates these names directly into execSync() calls without sanitization. An attacker can exploit this by supplying a malicious repository (via testOrchestrationOptions.runSmartSelection.source, or the current directory if unset) whose branch name carries a payload, causing the shell to execute arbitrary code. This enables remote code execution on CI/CD servers and developer machines, leading to credential and secret disclosure, source code and SSH key exfiltration, system compromise, and supply chain attacks via tampered build artifacts. The issue has been fixed in version 9.24.0.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...