Flickr says a flaw at a third-party email provider may have exposed users’ names, email addresses, IPs, and account activity. Flickr is a photo-sharing platform owned by SmugMug. It has over 100 million registered users and millions of active photographers. Flickr warned users about a possible data breach caused by a flaw in a third-party […]
Currently trending CVE - Hype Score: 1 - The Metro Development Server, which is opened by the React Native Community CLI, binds to external interfaces by default. The server exposes an endpoint that is vulnerable to OS command injection. This allows unauthenticated network attackers to send a POST request to the server ...
A vulnerability was found in PHPGurukul Hospital Management System 4.0. It has been classified as critical. This impacts an unknown function of the file /admin/manage-users.php. This manipulation of the argument ID causes sql injection.
This vulnerability is handled as CVE-2026-2179. The attack can be initiated remotely. Additionally, an exploit exists.
A vulnerability was found in Tenda RX3 16.03.13.11. It has been declared as critical. Affected is an unknown function of the file /goform/fast_setting_wifi_set. Such manipulation of the argument ssid_5g leads to stack-based buffer overflow.
This vulnerability is uniquely identified as CVE-2026-2180. The attack can be launched remotely. Moreover, an exploit is present.
A vulnerability was found in Tenda RX3 16.03.13.11. It has been rated as critical. Affected by this vulnerability is an unknown functionality of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow.
This vulnerability was named CVE-2026-2181. The attack may be initiated remotely. In addition, an exploit is available.
A vulnerability categorized as critical has been discovered in UTT 进取 521G 3.1.1-190816. Affected by this issue is the function doSystem of the file /goform/setSysAdm. Executing a manipulation of the argument passwd1 can lead to command injection.
The identification of this vulnerability is CVE-2026-2182. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability identified as critical has been detected in Great Developers Certificate Generation System up to 97171bb0e5e22e52eacf4e4fa81773e5f3cffb73. This affects an unknown part of the file /restructured/csv.php. The manipulation leads to unrestricted upload.
This vulnerability is referenced as CVE-2026-2183. Remote exploitation of the attack is possible. No exploit is available.
This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided.
The code repository of the project has not been active for many years.
A vulnerability labeled as critical has been found in Great Developers Certificate Generation System up to 97171bb0e5e22e52eacf4e4fa81773e5f3cffb73. This vulnerability affects unknown code of the file /restructured/csv.php. The manipulation of the argument photo results in os command injection.
This vulnerability is identified as CVE-2026-2184. The attack can be executed remotely. There is not any exploit available.
This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable.
The code repository of the project has not been active for many years.
A vulnerability marked as critical has been reported in Tenda RX3 16.03.13.11. This issue affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. This manipulation of the argument devName/mac causes stack-based buffer overflow.
This vulnerability is tracked as CVE-2026-2185. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability described as critical has been identified in Tenda RX3 16.03.13.11. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow.
This vulnerability is listed as CVE-2026-2186. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability classified as critical has been found in Tenda RX3 16.03.13.11. The affected element is the function set_qosMib_list of the file /goform/formSetQosBand. Performing a manipulation of the argument list results in stack-based buffer overflow.
This vulnerability is cataloged as CVE-2026-2187. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability classified as critical was found in UTT 进取 521G 3.1.1-190816. The impacted element is the function sub_446B18 of the file /goform/formPdbUpConfig. Executing a manipulation of the argument policyNames can lead to os command injection.
This vulnerability is registered as CVE-2026-2188. It is possible to launch the attack remotely. Furthermore, an exploit is available.
A vulnerability, which was classified as critical, has been found in itsourcecode School Management System 1.0. This affects an unknown function of the file /ramonsys/report/index.php. The manipulation of the argument ay leads to sql injection.
This vulnerability is documented as CVE-2026-2189. The attack can be initiated remotely. Additionally, an exploit exists.
It has been a few months since my colleague Tony and I published our paper on Logit Gap Steering. In that work, we demonstrated a practical method for steering LLM behavior—specifically bridging the gap between “Refusal” and “Compliance”—by optimizing token sequences.