24h | 7d | 30d

Overview

  • langflow-ai
  • langflow

20 Mar 2026
Published
21 Mar 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.46%

KEV

Description

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored flow data from the database. This code is passed to exec() with zero sandboxing, resulting in unauthenticated remote code execution. This is distinct from CVE-2025-3248, which fixed /api/v1/validate/code by adding authentication. The build_public_tmp endpoint is designed to be unauthenticated (for public flows) but incorrectly accepts attacker-supplied flow data containing arbitrary executable code. This issue has been fixed in version 1.9.0.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 1 hour ago

Bluesky

Profile picture fallback
CVE-2026-33017 is an unauthenticated remote code execution flaw in Langflow’s public flow build endpoint, exploited within 20 hours to run arbitrary Python and steal credentials via multi-stage attacks. #Langflow #RemoteCode #Exploit2026
  • 0
  • 1
  • 0
  • 4h ago
Profile picture fallback
Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure thehackernews.com/2026/03/crit...
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Langflow Got Hacked Twice Through the Same exec() Call - CVE-2026-33017 (CVSS 9.3) exploited in 20 hours with no public PoC
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • himmelblau-idm
  • himmelblau

11 Mar 2026
Published
11 Mar 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.02%

KEV

Description

Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Prior to 3.1.0 and 2.3.8, the himmelblaud-tasks daemon, running as root, writes Kerberos cache files under /tmp/krb5cc_<uid> without symlink protections. Since commit 87a51ee, PrivateTmp is explicitly removed from the tasks daemon's systemd hardening, exposing it to the host /tmp. A local user can exploit this via symlink attacks to chown or overwrite arbitrary files, achieving local privilege escalation. This vulnerability is fixed in 3.1.0 and 2.3.8.

Statistics

  • 1 Post
  • 11 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture fallback

A vulnerability in a Linux enterprise app can allow attackers root access over devices

The issue impacts Himmelblau, an interoperability suite to integrate Linux with Entra ID and Intune networks.

akamai.com/blog/security-resea

  • 7
  • 4
  • 0
  • 6h ago

Overview

  • Microsoft
  • Windows 10 Version 21H2

13 Jan 2026
Published
26 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.02%

KEV

Description

Improper handling of insufficient permissions or privileges in Windows Error Reporting allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post
  • 11 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

This is my analysis (and PoC) for CVE-2026-20817, a privilege escalation in the Windows Error Reporting service.

👉 itm4n.github.io/cve-2026-20817

Credit goes to Denis Faiustov and Ruslan Sayfiev for the discovery.

TL;DR A low privilege user could send an ALPC message to the WER service and coerce it to start a WerFault.exe process as SYSTEM with user-controlled arguments and options. I did not achieve arbitrary code execution, but perhaps someone knows how this can be done? 🤷‍♂️

  • 5
  • 6
  • 0
  • 1h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

10 Mar 2026
Published
20 Mar 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.06%

KEV

Description

Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 23 hours ago

Bluesky

Profile picture fallback
RegPwn: The 0-Day That Weaponized Windows Accessibility for Stealth Privilege Escalation + Video Introduction: A newly disclosed Local Privilege Escalation (LPE) vulnerability, tracked as CVE-2026-24291 and dubbed "RegPwn," demonstrates a sophisticated shift in adversary tradecraft. Exploiting…
  • 1
  • 2
  • 0
  • 23h ago

Overview

  • ConnectWise
  • ScreenConnect

17 Mar 2026
Published
18 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.0)
EPSS
0.06%

KEV

Description

A condition in ScreenConnect may allow an actor with access to server-level cryptographic material used for authentication to obtain unauthorized access, including elevated privileges, in certain scenarios.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 10 hours ago

Bluesky

Profile picture fallback
Unpatched ScreenConnect servers open to attack (CVE-2026-3564) - Help Net Security www.helpnetsecurity.com/2026/03/20/c...
  • 1
  • 0
  • 0
  • 10h ago

Overview

  • Tenda
  • FH451

22 Mar 2026
Published
22 Mar 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.05%

KEV

Description

A vulnerability has been found in Tenda FH451 1.0.0.9. This vulnerability affects the function WrlclientSet of the file /goform/WrlclientSet. Such manipulation of the argument GO leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 12 hours ago

Fediverse

Profile picture fallback

⚠️ HIGH severity: CVE-2026-4535 in Tenda FH451 (v1.0.0.9) — stack-based buffer overflow in /goform/WrlclientSet. Remote, unauthenticated code execution possible. Patch or mitigate now! radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 12h ago

Overview

  • Pending

24 Jun 2025
Published
03 Nov 2025
Updated

CVSS
Pending
EPSS
0.13%

KEV

Description

Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead to complete administrative takeover.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 18 hours ago

Fediverse

Profile picture fallback

⚠️ CRITICAL: Quest KACE vuln (CVE-2025-32975) under active exploitation, mainly in education. No patch yet — segment networks, monitor KACE activity, and restrict access. Global risk. Details: radar.offseq.com/threat/critic

  • 1
  • 0
  • 0
  • 18h ago

Overview

  • tomdever
  • wpForo Forum

19 Feb 2026
Published
23 Feb 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
11.33%

KEV

Description

The wpForo Forum plugin for WordPress is vulnerable to time-based SQL Injection via the 'wpfob' parameter in all versions up to, and including, 2.4.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 22 hours ago

Overview

  • Tenda
  • FH451

22 Mar 2026
Published
22 Mar 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.05%

KEV

Description

A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 10 hours ago

Fediverse

Profile picture fallback

🔎 CVE-2026-4534 (HIGH, CVSS 8.7): Stack-based buffer overflow in Tenda FH451 (v1.0.0.9) lets remote attackers execute code. PoC exploit published. Patch/mitigate now — restrict access & monitor for attacks. Info: radar.offseq.com/threat/cve-20

  • 0
  • 1
  • 0
  • 10h ago

Overview

  • Wavlink
  • WL-WN578W2

22 Mar 2026
Published
22 Mar 2026
Updated

CVSS v4.0
MEDIUM (5.3)
EPSS
0.18%

KEV

Description

A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is an unknown function of the file /cgi-bin/firewall.cgi of the component POST Request Handler. Performing a manipulation of the argument dmz_flag/del_flag results in command injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 7 hours ago

Fediverse

Profile picture fallback

⚠️ CVE-2026-4543: Wavlink WL-WN578W2 (v221110) has a MEDIUM severity command injection flaw in /cgi-bin/firewall.cgi. No patch; public exploit exists. Isolate, restrict access, and monitor traffic urgently. radar.offseq.com/threat/cve-20

  • 0
  • 1
  • 0
  • 7h ago
Showing 1 to 10 of 27 CVEs