Forwarded from DailyCVE
🔴 s3-proxy, Authentication Bypass via Percent-Encoded Slash, #CVE(unknown) (Critical)
🔗 https://dailycve.com/s3-proxy-authentication-bypass-via-percent-encoded-slash-cveunknown-critical/
@Daily_CVE
🔗 https://dailycve.com/s3-proxy-authentication-bypass-via-percent-encoded-slash-cveunknown-critical/
@Daily_CVE
DailyCVE
s3-proxy, Authentication Bypass via Percent-Encoded Slash, CVE(unknown) (Critical) - DailyCVE
s3-proxy, Authentication Bypass via Percent-Encoded Slash, CVE(unknown) (Critical) - "DailyCVE.com – The advanced vulnerability database with modern testing,
Forwarded from DailyCVE
🟠 XWiki, Server-Side Request Forgery, #CVE-2026-42140 (moderate)
🔗 https://dailycve.com/xwiki-server-side-request-forgery-cve-2026-42140-moderate/
@Daily_CVE
🔗 https://dailycve.com/xwiki-server-side-request-forgery-cve-2026-42140-moderate/
@Daily_CVE
DailyCVE
XWiki, Server-Side Request Forgery, CVE-2026-42140 (moderate) - DailyCVE
XWiki, Server-Side Request Forgery, CVE-2026-42140 (moderate) - "DailyCVE.com – The advanced vulnerability database with modern testing, patching tutorials,
Forwarded from DailyCVE
🔴 AVideo CloneSite Plugin, Secret Disclosure & Remote Database Exfiltration (Critical)
🔗 https://dailycve.com/avideo-clonesite-plugin-secret-disclosure-remote-database-exfiltration-critical/
@Daily_CVE
🔗 https://dailycve.com/avideo-clonesite-plugin-secret-disclosure-remote-database-exfiltration-critical/
@Daily_CVE
DailyCVE
AVideo CloneSite Plugin, Secret Disclosure & Remote Database Exfiltration (Critical) - DailyCVE
AVideo CloneSite Plugin, Secret Disclosure & Remote Database Exfiltration (Critical) - "DailyCVE.com – The advanced vulnerability database with modern
Forwarded from DailyCVE
🔴 gitoxide (gix-pack), Multiple DoS Vulnerabilities (Unchecked Array Indexing & Uncapped Allocation) - No #CVE assigned yet, High
🔗 https://dailycve.com/gitoxide-gix-pack-multiple-dos-vulnerabilities-unchecked-array-indexing-uncapped-allocation-no-cve-assigned-yet-high/
@Daily_CVE
🔗 https://dailycve.com/gitoxide-gix-pack-multiple-dos-vulnerabilities-unchecked-array-indexing-uncapped-allocation-no-cve-assigned-yet-high/
@Daily_CVE
Forwarded from DailyCVE
🟠 gitoxide (curl backend), Credential Leak via HTTP Redirect, #CVE(not provided) (Medium)
🔗 https://dailycve.com/gitoxide-curl-backend-credential-leak-via-http-redirect-cvenot-provided-medium/
@Daily_CVE
🔗 https://dailycve.com/gitoxide-curl-backend-credential-leak-via-http-redirect-cvenot-provided-medium/
@Daily_CVE
DailyCVE
gitoxide (curl backend), Credential Leak via HTTP Redirect, CVE(not provided) (Medium) - DailyCVE
gitoxide (curl backend), Credential Leak via HTTP Redirect, CVE(not provided) (Medium) - "DailyCVE.com – The advanced vulnerability database with modern
Forwarded from DailyCVE
🔴 AVideo YPTSocket, Incomplete Mitigation Bypass, GHSA-gph2-j4c9-vhhr (Critical)
🔗 https://dailycve.com/avideo-yptsocket-incomplete-mitigation-bypass-ghsa-gph2-j4c9-vhhr-critical/
@Daily_CVE
🔗 https://dailycve.com/avideo-yptsocket-incomplete-mitigation-bypass-ghsa-gph2-j4c9-vhhr-critical/
@Daily_CVE
DailyCVE
AVideo YPTSocket, Incomplete Mitigation Bypass, GHSA-gph2-j4c9-vhhr (Critical) - DailyCVE
AVideo YPTSocket, Incomplete Mitigation Bypass, GHSA-gph2-j4c9-vhhr (Critical) - "DailyCVE.com – The advanced vulnerability database with modern testing,
Forwarded from DailyCVE
🔴 AVideo, #HTML Injection via notifySubscribersjsonphp, #CVE(Not assigned) (critical)
🔗 https://dailycve.com/avideo-html-injection-via-notifysubscribersjsonphp-cvenot-assigned-critical/
@Daily_CVE
🔗 https://dailycve.com/avideo-html-injection-via-notifysubscribersjsonphp-cvenot-assigned-critical/
@Daily_CVE
Forwarded from DailyCVE
🟠 Gitoxide, Path Traversal/Repository Confusion, (medium)
🔗 https://dailycve.com/gitoxide-path-traversal-repository-confusion-medium/
@Daily_CVE
🔗 https://dailycve.com/gitoxide-path-traversal-repository-confusion-medium/
@Daily_CVE
DailyCVE
Gitoxide, Path Traversal/Repository Confusion, (medium) - DailyCVE
Gitoxide, Path Traversal/Repository Confusion, (medium) - "DailyCVE.com – The advanced vulnerability database with modern testing, patching tutorials, and
Forwarded from DailyCVE
🔴 OpenMage LTS, Weak Session ID Generation, Critical
🔗 https://dailycve.com/openmage-lts-weak-session-id-generation-critical/
@Daily_CVE
🔗 https://dailycve.com/openmage-lts-weak-session-id-generation-critical/
@Daily_CVE
DailyCVE
OpenMage LTS, Weak Session ID Generation, Critical - DailyCVE
OpenMage LTS, Weak Session ID Generation, Critical - "DailyCVE.com – The advanced vulnerability database with modern testing, patching tutorials, and
Forwarded from DailyCVE
🔴 Prometheus, Remote read endpoint denial-of-service (#CVE-2026-XXXXX) (High)
🔗 https://dailycve.com/prometheus-remote-read-endpoint-denial-of-service-cve-2026-xxxxx-high/
@Daily_CVE
🔗 https://dailycve.com/prometheus-remote-read-endpoint-denial-of-service-cve-2026-xxxxx-high/
@Daily_CVE
DailyCVE
Prometheus, Remote read endpoint denial-of-service (CVE-2026-XXXXX) (High) - DailyCVE
Prometheus, Remote read endpoint denial-of-service (CVE-2026-XXXXX) (High) - "DailyCVE.com – The advanced vulnerability database with modern testing, patching
Forwarded from DailyCVE
🟠 exiftool-vendored, Argument Injection, #CVE-N/A (Medium)
🔗 https://dailycve.com/exiftool-vendored-argument-injection-cve-n-a-medium/
@Daily_CVE
🔗 https://dailycve.com/exiftool-vendored-argument-injection-cve-n-a-medium/
@Daily_CVE
DailyCVE
exiftool-vendored, Argument Injection, CVE-N/A (Medium) - DailyCVE
exiftool-vendored, Argument Injection, CVE-N/A (Medium) - "DailyCVE.com – The advanced vulnerability database with modern testing, patching tutorials, and
Forwarded from DailyCVE
🟠 requests-hardened, SSRF Bypass, #CVE-2024-12345 (Medium)
🔗 https://dailycve.com/requests-hardened-ssrf-bypass-cve-2024-12345-medium/
@Daily_CVE
🔗 https://dailycve.com/requests-hardened-ssrf-bypass-cve-2024-12345-medium/
@Daily_CVE
DailyCVE
requests-hardened, SSRF Bypass, CVE-2024-12345 (Medium) - DailyCVE
requests-hardened, SSRF Bypass, CVE-2024-12345 (Medium) - "DailyCVE.com – The advanced vulnerability database with modern testing, patching tutorials, and
Forwarded from DailyCVE
🔴 gitoxide, Path Traversal and Trust Bypass, GHSA-7w47-3wg8-547c (High)
🔗 https://dailycve.com/gitoxide-path-traversal-and-trust-bypass-ghsa-7w47-3wg8-547c-high/
@Daily_CVE
🔗 https://dailycve.com/gitoxide-path-traversal-and-trust-bypass-ghsa-7w47-3wg8-547c-high/
@Daily_CVE
DailyCVE
gitoxide, Path Traversal and Trust Bypass, GHSA-7w47-3wg8-547c (High) - DailyCVE
gitoxide, Path Traversal and Trust Bypass, GHSA-7w47-3wg8-547c (High) - "DailyCVE.com – The advanced vulnerability database with modern testing, patching
Forwarded from DailyCVE
🔴 AVideo (Meet plugin), Reflected XSS, #CVE-NotProvided (critical)
🔗 https://dailycve.com/avideo-meet-plugin-reflected-xss-cve-notprovided-critical/
@Daily_CVE
🔗 https://dailycve.com/avideo-meet-plugin-reflected-xss-cve-notprovided-critical/
@Daily_CVE
DailyCVE
AVideo (Meet plugin), Reflected XSS, CVE-NotProvided (critical) - DailyCVE
AVideo (Meet plugin), Reflected XSS, CVE-NotProvided (critical) - "DailyCVE.com – The advanced vulnerability database with modern testing, patching tutorials,
Forwarded from DailyCVE
🟠 gitoxide, Symlink Path Traversal, #CVE-NotApplicable (medium)
🔗 https://dailycve.com/gitoxide-symlink-path-traversal-cve-notapplicable-medium/
@Daily_CVE
🔗 https://dailycve.com/gitoxide-symlink-path-traversal-cve-notapplicable-medium/
@Daily_CVE
DailyCVE
gitoxide, Symlink Path Traversal, CVE-NotApplicable (medium) - DailyCVE
gitoxide, Symlink Path Traversal, CVE-NotApplicable (medium) - "DailyCVE.com – The advanced vulnerability database with modern testing, patching tutorials,
Forwarded from DailyCVE
🔴 AVideo, CSRF Profile Photo Overwrite, #CVE-2022-36267 (Critical)
🔗 https://dailycve.com/avideo-csrf-profile-photo-overwrite-cve-2022-36267-critical/
@Daily_CVE
🔗 https://dailycve.com/avideo-csrf-profile-photo-overwrite-cve-2022-36267-critical/
@Daily_CVE
DailyCVE
AVideo, CSRF Profile Photo Overwrite, CVE-2022-36267 (Critical) - DailyCVE
AVideo, CSRF Profile Photo Overwrite, CVE-2022-36267 (Critical) - "DailyCVE.com – The advanced vulnerability database with modern testing, patching tutorials,
Forwarded from DailyCVE
🔴 awslabs/tough, Metadata Validation Bypass, #CVE-NotDisclosed (High)
🔗 https://dailycve.com/awslabs-tough-metadata-validation-bypass-cve-notdisclosed-high/
@Daily_CVE
🔗 https://dailycve.com/awslabs-tough-metadata-validation-bypass-cve-notdisclosed-high/
@Daily_CVE
DailyCVE
awslabs/tough, Metadata Validation Bypass, CVE-NotDisclosed (High) - DailyCVE
awslabs/tough, Metadata Validation Bypass, CVE-NotDisclosed (High) - "DailyCVE.com – The advanced vulnerability database with modern testing, patching
Forwarded from DailyCVE
🔴 AVideo, OAuth Password Hash Exposure (Critical)
🔗 https://dailycve.com/avideo-oauth-password-hash-exposure-critical/
@Daily_CVE
🔗 https://dailycve.com/avideo-oauth-password-hash-exposure-critical/
@Daily_CVE
DailyCVE
AVideo, OAuth Password Hash Exposure (Critical) - DailyCVE
AVideo, OAuth Password Hash Exposure (Critical) - "DailyCVE.com – The advanced vulnerability database with modern testing, patching tutorials, and up-to-date
Forwarded from DailyCVE
🔴 Prometheus, Information Exposure, #CVE-2026-42151 (High)
🔗 https://dailycve.com/prometheus-information-exposure-cve-2026-42151-high/
@Daily_CVE
🔗 https://dailycve.com/prometheus-information-exposure-cve-2026-42151-high/
@Daily_CVE
DailyCVE
Prometheus, Information Exposure, CVE-2026-42151 (High) - DailyCVE
Prometheus, Information Exposure, CVE-2026-42151 (High) - "DailyCVE.com – The advanced vulnerability database with modern testing, patching tutorials, and
Forwarded from UNDERCODE NEWS (Fact Checker)
⚡️ Key #Update on NISAR Mission Data Application Requirements
-Fact Checker: ✅: 3 ❌: 0 || 3/3
🔗 http://undercodenews.com/key-update-on-nisar-mission-data-application-requirements/
@Undercode_News
-Fact Checker: ✅: 3 ❌: 0 || 3/3
🔗 http://undercodenews.com/key-update-on-nisar-mission-data-application-requirements/
@Undercode_News
UNDERCODE NEWS
Key Update on NISAR Mission Data Application Requirements - UNDERCODE NEWS
On May 5, 2026, the NISAR DART team issued a correction regarding requirements for Step-2 proposals in the application project process. The key clarification