A single rewrite rule, the kind pasted into NGINX configurations thousands of times a day, can hand an unauthenticated ...
For roughly 18 years, a chunk of code inside one of the internet’s most popular web servers quietly carried a critical ...
CVE-2026-44009 (CVSS score: 9.8) - A vulnerability that allows sandbox escape via a null proto exception and permits an ...
A new vulnerability has been discovered in the R programming language that allows arbitrary code execution upon deserializing specially crafted RDS and RDX files. R is an open-source programming ...
An unpatched vulnerability in ChromaDB could be exploited without authentication for remote code execution and server ...
Thirteen critical vulnerabilities have been found in the vm2 JavaScript sandbox package that could allow an attacker’s code ...
Adobe has released patches for 52 vulnerabilities across 10 products, including flaws leading to arbitrary code execution.
A critical vulnerability affecting certain configurations of the Exim open-source mail transfer agent could be exploited by ...
PandasAI, an open source project by SinaptikAI, has been found vulnerable to Prompt Injection attacks. An attacker with access to the chat prompt can craft malicious input that is interpreted as code, ...
Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Gemini CLI, and CoPilot CLI with minimal or no ...
The Howyar UEFI Application “Reloader” (32-bit and 64-bit), distributed as part of SysReturn prior to version 10.2.02320240919, is vulnerable to the execution of arbitrary software from a hard-coded ...
Researchers have found 14 logic flaws in various components of HashiCorp Vault and CyberArk Conjur, two open-source credential management systems, allowing attacks that could bypass authentication ...