Aggregator
CVE-2024-50421 | WP Overnight WooCommerce PDF Invoices & Packing Slips Plugin up to 3.8.6 on WordPress authorization
4 days 23 hours ago
A vulnerability has been found in WP Overnight WooCommerce PDF Invoices & Packing Slips Plugin up to 3.8.6 on WordPress and classified as problematic. This impacts an unknown function. The manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2024-50421. The attack is possible to be carried out remotely. No exploit exists.
vuldb.com
CVE-2024-50428 | Mondula Multi Step Form Plugin up to 1.7.21 on WordPress authorization
4 days 23 hours ago
A vulnerability was found in Mondula Multi Step Form Plugin up to 1.7.21 on WordPress and classified as problematic. This affects an unknown part. Such manipulation leads to missing authorization.
This vulnerability is uniquely identified as CVE-2024-50428. The attack can be launched remotely. No exploit exists.
vuldb.com
CVE-2024-50454 | SEOPress Plugin up to 8.1.1 on WordPress authorization
4 days 23 hours ago
A vulnerability was found in SEOPress Plugin up to 8.1.1 on WordPress. It has been classified as problematic. This vulnerability affects unknown code. Performing a manipulation results in missing authorization.
This vulnerability was named CVE-2024-50454. The attack may be initiated remotely. There is no available exploit.
vuldb.com
CVE-2024-50425 | Veribo & Roland Murg WP Booking System Plugin up to 2.0.19.10 on WordPress exposure of sensitive system information to an unauthorized control sphere
4 days 23 hours ago
A vulnerability was found in Veribo & Roland Murg WP Booking System Plugin up to 2.0.19.10 on WordPress. It has been declared as problematic. This issue affects some unknown processing. Executing a manipulation can lead to exposure of sensitive system information to an unauthorized control sphere.
The identification of this vulnerability is CVE-2024-50425. The attack may be launched remotely. There is no exploit available.
vuldb.com
CVE-2024-50455 | SEOPress Plugin up to 8.1.1 on WordPress authorization
4 days 23 hours ago
A vulnerability was found in SEOPress Plugin up to 8.1.1 on WordPress. It has been rated as problematic. Impacted is an unknown function. The manipulation leads to missing authorization.
This vulnerability is referenced as CVE-2024-50455. Remote exploitation of the attack is possible. No exploit is available.
vuldb.com
CVE-2024-50456 | SEOPress Plugin up to 8.1.1 on WordPress authorization
4 days 23 hours ago
A vulnerability categorized as problematic has been discovered in SEOPress Plugin up to 8.1.1 on WordPress. The affected element is an unknown function. The manipulation results in missing authorization.
This vulnerability is identified as CVE-2024-50456. The attack can be executed remotely. There is not any exploit available.
vuldb.com
CVE-2024-50422 | Cloudways Breeze Plugin up to 2.1.14 on WordPress authorization
4 days 23 hours ago
A vulnerability marked as problematic has been reported in Cloudways Breeze Plugin up to 2.1.14 on WordPress. This impacts an unknown function. Performing a manipulation results in missing authorization.
This vulnerability is cataloged as CVE-2024-50422. It is possible to initiate the attack remotely. There is no exploit available.
vuldb.com
CVE-2024-50423 | Templately Plugin up to 3.1.5 on WordPress authorization
4 days 23 hours ago
A vulnerability described as problematic has been identified in Templately Plugin up to 3.1.5 on WordPress. Affected is an unknown function. Executing a manipulation can lead to missing authorization.
This vulnerability is registered as CVE-2024-50423. It is possible to launch the attack remotely. No exploit is available.
vuldb.com
CVE-2024-50424 | Templately Plugin up to 3.1.5 on WordPress authorization
4 days 23 hours ago
A vulnerability classified as critical has been found in Templately Plugin up to 3.1.5 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to missing authorization.
This vulnerability is documented as CVE-2024-50424. The attack can be initiated remotely. There is not any exploit available.
vuldb.com
CVE-2024-50503 | Deryck Oñate User Toolkit Plugin up to 1.2.3 on WordPress authentication bypass
4 days 23 hours ago
A vulnerability marked as critical has been reported in Deryck Oñate User Toolkit Plugin up to 1.2.3 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to authentication bypass using alternate channel.
This vulnerability is listed as CVE-2024-50503. The attack may be initiated remotely. There is no available exploit.
vuldb.com
Android security advisory – April 2026 monthly rollup (AV26-314)
4 days 23 hours ago
Canadian Centre for Cyber Security
Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
4 days 23 hours ago
A high-severity security vulnerability has been disclosed in Docker Engine that could permit an attacker to bypass authorization plugins (AuthZ) under specific circumstances.
The vulnerability, tracked as CVE-2026-34040 (CVSS score: 8.8), stems from an incomplete fix for CVE-2024-41110, a maximum-severity vulnerability in the same component that came to light in July 2024.
"
The Hacker News
The Complete Guide to Passwordless Authentication in 2026: How It Works, Why It Matters, and How to Implement It
4 days 23 hours ago
Passwords are responsible for 80% of data breaches. Passwordless authentication eliminates the attack surface entirely. Here is the complete technical and business guide to how it works, which methods fit which scenarios, and how to implement it in 2026.
The post The Complete Guide to Passwordless Authentication in 2026: How It Works, Why It Matters, and How to Implement It appeared first on Security Boulevard.
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author
GPU Rowhammer Attack Enables Privilege Escalation and Full System Compromise
4 days 23 hours ago
GPUBreach uses GPU Rowhammer on GDDR6 to flip bits, corrupt page tables and escalate to system root
CVE-2026-22666 | Dolibarr ERP CRM up to 23.0.1 dol_eval_standard eval injection (EUVD-2026-19606)
4 days 23 hours ago
A vulnerability identified as problematic has been detected in Dolibarr ERP CRM up to 23.0.1. The affected element is the function dol_eval_standard. This manipulation causes improper neutralization of directives in dynamically evaluated code.
This vulnerability is registered as CVE-2026-22666. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2026-22679 | Weaver Network e-cology 10.0/2026-03-31 POST Request method interfaceName/methodName missing authentication (EUVD-2026-19607)
4 days 23 hours ago
A vulnerability labeled as critical has been found in Weaver Network e-cology 10.0/2026-03-31. The impacted element is an unknown function of the file /papi/esearch/data/devops/dubboApi/debug/method of the component POST Request Handler. Such manipulation of the argument interfaceName/methodName leads to missing authentication.
This vulnerability is documented as CVE-2026-22679. The attack can be executed remotely. Additionally, an exploit exists.
The affected component should be upgraded.
vuldb.com
CVE-2021-4473 | Beijing Topsec Network Security Tianxin Internet Behavior Management System prior 4.0.0.7_20210716.180815 Reporter objClass os command injection (CNVD-2021-41972 / EUVD-2021-34776)
4 days 23 hours ago
A vulnerability categorized as critical has been discovered in Beijing Topsec Network Security Tianxin Internet Behavior Management System. Impacted is an unknown function of the component Reporter Component. The manipulation of the argument objClass results in os command injection.
This vulnerability is cataloged as CVE-2021-4473. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
vuldb.com
CVE-2026-33865 | mlflow up to 3.10.1 Web Interface cross site scripting (EUVD-2026-19608)
4 days 23 hours ago
A vulnerability marked as problematic has been reported in mlflow up to 3.10.1. This affects an unknown function of the component Web Interface. Performing a manipulation results in cross site scripting.
This vulnerability is reported as CVE-2026-33865. The attack is possible to be carried out remotely. No exploit exists.
vuldb.com
CVE-2026-33866 | MLflow up to 3.10.1 AJAX Endpoint authorization (EUVD-2026-19609)
4 days 23 hours ago
A vulnerability, which was classified as problematic, has been found in MLflow up to 3.10.1. Affected by this issue is some unknown functionality of the component AJAX Endpoint. This manipulation causes missing authorization.
This vulnerability is handled as CVE-2026-33866. The attack can be initiated remotely. There is not any exploit available.
vuldb.com