Attackers that want to use artificial intelligence tools to build ransomware or help run their cyber operations risk getting much less than they bargained for, said security expert Candid Wuest, in part because they'll still rely on known tactics that can be readily spotted and blocked.
Currently trending CVE - Hype Score: 1 - A stack-based buffer overflow vulnerability in NetSupport Manager 14.x versions prior to 14.12.0000 allows a remote, unauthenticated attacker to cause a denial of service (DoS) or potentially leak a limited amount of memory.
A fake 7-Zip website is distributing a trojanized installer of the popular archiving tool that turns the user's computer into a residential proxy node. [...]
A vulnerability was found in MongoDB Server up to 7.0.28/8.0.17/8.2.3 and classified as critical. This vulnerability affects unknown code. Executing a manipulation can lead to missing authorization.
This vulnerability is registered as CVE-2026-25609. It is possible to launch the attack remotely. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability has been found in MongoDB Server up to 8.0.17/8.2.3 and classified as problematic. This affects an unknown part. Performing a manipulation results in allocation of resources.
This vulnerability is cataloged as CVE-2026-1850. It is possible to initiate the attack remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in MongoDB Server up to 7.0.28/8.0.17/8.2.3. Affected by this issue is some unknown functionality. Such manipulation leads to incorrect type conversion.
This vulnerability is listed as CVE-2026-25613. The attack may be performed from remote. There is no available exploit.
You should upgrade the affected component.
A vulnerability, which was classified as critical, has been found in dun munge up to 0.5.17. Affected by this vulnerability is an unknown functionality of the component Message Handler. This manipulation of the argument length causes out-of-bounds write.
This vulnerability is tracked as CVE-2026-25506. The attack is restricted to local execution. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in MongoDB Ruby Driver up to 7.6.1/8.0.12/8.1.12/9.0.10. Affected is the function Mongoid::Criteria. The manipulation results in privilege escalation.
This vulnerability is identified as CVE-2026-2302. The attack can be executed remotely. There is not any exploit available.
A vulnerability classified as problematic has been found in MongoDB Server up to 7.0.28/8.0.17/8.2.1. This impacts an unknown function. The manipulation leads to uncontrolled recursion.
This vulnerability is referenced as CVE-2026-1849. Remote exploitation of the attack is possible. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in karutoil catalyst. This affects an unknown function. Executing a manipulation can lead to os command injection.
The identification of this vulnerability is CVE-2026-26009. The attack may be launched remotely. There is no exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability marked as critical has been reported in libssh. The impacted element is the function ssh_get_hexa. Performing a manipulation results in buffer overflow.
This vulnerability was named CVE-2026-0966. The attack may be initiated remotely. There is no available exploit.
A vulnerability labeled as problematic has been found in MongoDB Server up to 7.0.28/8.0.17/8.2.3. The affected element is an unknown function of the component Message Handler. Such manipulation leads to asymmetric resource consumption.
This vulnerability is uniquely identified as CVE-2026-25611. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in MongoDB Server up to 7.0.28/8.0.12. Impacted is an unknown function of the component geoNear Pipeline Handler. This manipulation causes reachable assertion.
This vulnerability is handled as CVE-2026-25610. The attack can be initiated remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in labring FastGPT up to 4.14.5. This issue affects some unknown processing of the file /FastGPT/api/plugin/xxx of the component Plugin Installation Handler. The manipulation results in open redirect.
This vulnerability is known as CVE-2026-26003. It is possible to launch the attack remotely. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability was found in SiYuan up to 3.5.4. It has been rated as critical. This vulnerability affects unknown code of the file /api/file/getFile of the component Endpoint. The manipulation leads to path traversal.
This vulnerability is traded as CVE-2026-25992. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.