<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>SOC Cyber Wall v13 — Veille CVE</title>
    <link>https://factualrisk.com/dashboard.html</link>
    <description>Flux CVE automatisé — 2026-04-03T22:02</description>
    <language>fr</language>
    <lastBuildDate>2026-04-03T22:02:40.754860+02:00</lastBuildDate>
  <item>
    <title>[P0] CVE-2026-3055 — Citrix NetScaler Out-of-Bounds Read Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-3055</link>
    <description>CVSS=9.8 EPSS=0.443 Score=222.0 | Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread</description>
    <pubDate>Sun, 29 Mar 2026 22:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-3055</guid>
  </item>
  <item>
    <title>[P0] CVE-2017-7921 — Hikvision Multiple Products Improper Authentication Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2017-7921</link>
    <description>CVSS=0.0 EPSS=0.942 Score=218.1 | Hikvision Multiple Products Improper Authentication Vulnerability</description>
    <pubDate>Wed, 04 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2017-7921</guid>
  </item>
  <item>
    <title>[P0] CVE-2021-22054 — Omnissa Workspace ONE Server-Side Request Forgery [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2021-22054</link>
    <description>CVSS=0.0 EPSS=0.938 Score=217.6 | Omnissa Workspace ONE Server-Side Request Forgery</description>
    <pubDate>Sun, 08 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2021-22054</guid>
  </item>
  <item>
    <title>[P0] CVE-2025-32432 — Craft CMS Code Injection Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2025-32432</link>
    <description>CVSS=0.0 EPSS=0.877 Score=210.2 | Craft CMS Code Injection Vulnerability</description>
    <pubDate>Thu, 19 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2025-32432</guid>
  </item>
  <item>
    <title>[P0] CVE-2025-68613 — n8n Improper Control of Dynamically-Managed Code Resources Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2025-68613</link>
    <description>CVSS=0.0 EPSS=0.792 Score=200.0 | n8n Improper Control of Dynamically-Managed Code Resources Vulnerability</description>
    <pubDate>Tue, 10 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2025-68613</guid>
  </item>
  <item>
    <title>[P0] CVE-2026-1603 — Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-1603</link>
    <description>CVSS=0.0 EPSS=0.654 Score=183.5 | Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability</description>
    <pubDate>Sun, 08 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-1603</guid>
  </item>
  <item>
    <title>[P0] CVE-2026-33634 — Aquasecurity Trivy Embedded Malicious Code Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-33634</link>
    <description>CVSS=8.8 EPSS=0.212 Score=183.2 | Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credential-stealing malware, and replace all 7 tags in `aquasecurity/setup-trivy` with maliciou</description>
    <pubDate>Wed, 25 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-33634</guid>
  </item>
  <item>
    <title>[P0] CVE-2026-33017 — Langflow Code Injection Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-33017</link>
    <description>CVSS=9.8 EPSS=0.057 Score=175.6 | Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker</description>
    <pubDate>Tue, 24 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-33017</guid>
  </item>
  <item>
    <title>[P0] CVE-2026-20131 — Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deseri [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-20131</link>
    <description>CVSS=10.0 EPSS=0.006 Score=170.7 | A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root&amp;nbsp;on an affected device.

This vulnerability is due to insecure deserialization of a user-suppli</description>
    <pubDate>Wed, 18 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-20131</guid>
  </item>
  <item>
    <title>[P0] CVE-2026-3910 — Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-3910</link>
    <description>CVSS=8.8 EPSS=0.015 Score=164.6 | Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)</description>
    <pubDate>Thu, 12 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-3910</guid>
  </item>
  <item>
    <title>[P0] CVE-2025-54068 — Laravel Livewire Code Injection Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2025-54068</link>
    <description>CVSS=0.0 EPSS=0.489 Score=163.6 | Laravel Livewire Code Injection Vulnerability</description>
    <pubDate>Thu, 19 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2025-54068</guid>
  </item>
  <item>
    <title>[P0] CVE-2026-3909 — Google Skia Out-of-Bounds Write Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-3909</link>
    <description>CVSS=8.8 EPSS=0.005 Score=163.4 | Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)</description>
    <pubDate>Thu, 12 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-3909</guid>
  </item>
  <item>
    <title>[P0] CVE-2026-5281 — Google Dawn Use-After-Free Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-5281</link>
    <description>CVSS=8.8 EPSS=0.000 Score=162.8 | Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)</description>
    <pubDate>Tue, 31 Mar 2026 22:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-5281</guid>
  </item>
  <item>
    <title>[P0] CVE-2025-53521 — F5 BIG-IP Stack-Based Buffer Overflow Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2025-53521</link>
    <description>CVSS=0.0 EPSS=0.414 Score=154.7 | F5 BIG-IP Stack-Based Buffer Overflow Vulnerability</description>
    <pubDate>Thu, 26 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2025-53521</guid>
  </item>
  <item>
    <title>[P0] CVE-2026-3502 — TrueConf Client Download of Code Without Integrity Check Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-3502</link>
    <description>CVSS=7.8 EPSS=0.000 Score=151.8 | TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code executio</description>
    <pubDate>Wed, 01 Apr 2026 22:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-3502</guid>
  </item>
  <item>
    <title>[P0] CVE-2025-26399 — SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2025-26399</link>
    <description>CVSS=0.0 EPSS=0.282 Score=138.9 | SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability</description>
    <pubDate>Sun, 08 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2025-26399</guid>
  </item>
  <item>
    <title>[P0] CVE-2025-47813 — Wing FTP Server Information Disclosure Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2025-47813</link>
    <description>CVSS=0.0 EPSS=0.204 Score=129.5 | Wing FTP Server Information Disclosure Vulnerability</description>
    <pubDate>Sun, 15 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2025-47813</guid>
  </item>
  <item>
    <title>[P0] CVE-2021-22681 — Rockwell Multiple Products Insufficient Protected Credentials Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2021-22681</link>
    <description>CVSS=0.0 EPSS=0.129 Score=120.5 | Rockwell Multiple Products Insufficient Protected Credentials Vulnerability</description>
    <pubDate>Wed, 04 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2021-22681</guid>
  </item>
  <item>
    <title>[P0] CVE-2025-66376 — Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2025-66376</link>
    <description>CVSS=0.0 EPSS=0.100 Score=117.0 | Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability</description>
    <pubDate>Tue, 17 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2025-66376</guid>
  </item>
  <item>
    <title>[P0] CVE-2026-20963 — Microsoft SharePoint Deserialization of Untrusted Data Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-20963</link>
    <description>CVSS=0.0 EPSS=0.062 Score=112.4 | Microsoft SharePoint Deserialization of Untrusted Data Vulnerability</description>
    <pubDate>Tue, 17 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-20963</guid>
  </item>
  <item>
    <title>[P0] CVE-2021-30952 — Apple Multiple Products Integer Overflow or Wraparound Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2021-30952</link>
    <description>CVSS=0.0 EPSS=0.013 Score=106.5 | Apple Multiple Products Integer Overflow or Wraparound Vulnerability</description>
    <pubDate>Wed, 04 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2021-30952</guid>
  </item>
  <item>
    <title>[P0] CVE-2025-43520 — Apple Multiple Products Classic Buffer Overflow Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2025-43520</link>
    <description>CVSS=0.0 EPSS=0.005 Score=105.6 | Apple Multiple Products Classic Buffer Overflow Vulnerability</description>
    <pubDate>Thu, 19 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2025-43520</guid>
  </item>
  <item>
    <title>[P0] CVE-2025-43510 — Apple Multiple Products Improper Locking Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2025-43510</link>
    <description>CVSS=0.0 EPSS=0.005 Score=105.5 | Apple Multiple Products Improper Locking Vulnerability</description>
    <pubDate>Thu, 19 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2025-43510</guid>
  </item>
  <item>
    <title>[P0] CVE-2025-31277 — Apple Multiple Products Buffer Overflow Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2025-31277</link>
    <description>CVSS=0.0 EPSS=0.002 Score=105.2 | Apple Multiple Products Buffer Overflow Vulnerability</description>
    <pubDate>Thu, 19 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2025-31277</guid>
  </item>
  <item>
    <title>[P0] CVE-2023-41974 — Apple iOS and iPadOS Use-After-Free Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2023-41974</link>
    <description>CVSS=0.0 EPSS=0.002 Score=105.2 | Apple iOS and iPadOS Use-After-Free Vulnerability</description>
    <pubDate>Wed, 04 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2023-41974</guid>
  </item>
  <item>
    <title>[P0] CVE-2023-43000 — Apple Multiple products Use-After-Free Vulnerability [KEV | RANSOMWARE:Conti | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2023-43000</link>
    <description>CVSS=0.0 EPSS=0.001 Score=105.1 | Apple Multiple products Use-After-Free Vulnerability</description>
    <pubDate>Wed, 04 Mar 2026 23:00:00 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2023-43000</guid>
  </item>
  <item>
    <title>[P2] GHSA-9q7v-8mr7-g23p — OpenClaw: SSRF via Unguarded `fetch()` in Marketplace Plugin Download and Ollama Model Discovery [RANSOMWARE:Hive | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/GHSA-9q7v-8mr7-g23p</link>
    <description>CVSS=0.0 EPSS=0.000 Score=65.0 | ## Summary
SSRF via Unguarded `fetch()` in Marketplace Plugin Download and Ollama Model Discovery

## Current Maintainer Triage
- Status: narrow
- Normalized severity: medium
- Assessment: Keep the shipped marketplace archive-fetch SSRF, but narrow out the Ollama half because it is operator-configur</description>
    <pubDate>Thu, 02 Apr 2026 21:22:57 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/GHSA-9q7v-8mr7-g23p</guid>
  </item>
  <item>
    <title>[P2] CVE-2026-35393 — goshs: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs POST multipart upload</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-35393</link>
    <description>CVSS=9.8 EPSS=0.000 Score=63.8 | ### Summary
* POST multipart upload directory not sanitized | `httpserver/updown.go:71-174`

This finding affect the default configuration, no flags or authentication required.

### Details

**File:** `httpserver/updown.go:71-174`
**Trigger:** `POST /&lt;path&gt;/upload` (server.go:49-51 checks `HasSuffix</description>
    <pubDate>Fri, 03 Apr 2026 04:08:21 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-35393</guid>
  </item>
  <item>
    <title>[P2] CVE-2026-35392 — goshs: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in goshs PUT Upload</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-35392</link>
    <description>CVSS=9.8 EPSS=0.000 Score=63.8 | ### Summary
* PUT upload has no path sanitization | `httpserver/updown.go:20-69`

This finding affects the default configuration, no flags or authentication required.

### Details

**File:** `httpserver/updown.go:20-69`
**Trigger:** `PUT /&lt;path&gt;` (server.go:57-59 routes directly to `put()`)

The han</description>
    <pubDate>Fri, 03 Apr 2026 04:07:55 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-35392</guid>
  </item>
  <item>
    <title>[P2] CVE-2026-35171 — Kedro has Arbitrary Code Execution via Malicious Logging Configuration</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-35171</link>
    <description>CVSS=9.8 EPSS=0.000 Score=63.8 | ### Impact

This is a **critical Remote Code Execution (RCE)** vulnerability caused by unsafe use of `logging.config.dictConfig()` with user-controlled input.

Kedro allows the logging configuration file path to be set via the `KEDRO_LOGGING_CONFIG` environment variable and loads it without validati</description>
    <pubDate>Fri, 03 Apr 2026 03:48:49 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-35171</guid>
  </item>
  <item>
    <title>[P2] GHSA-37v6-fxx8-xjmx — OpenClaw: Telnyx Webhook Replay Detection Bypass via Base64 Signature Re-encoding [RANSOMWARE:Play | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/GHSA-37v6-fxx8-xjmx</link>
    <description>CVSS=0.0 EPSS=0.000 Score=60.0 | ## Summary
Telnyx Webhook Replay Detection Bypass via Base64 Signature Re-encoding

## Current Maintainer Triage
- Status: narrow
- Normalized severity: low
- Assessment: Shipped v2026.3.28 replay hashing treated equivalent Telnyx Base64/Base64URL signatures as distinct requests, but signature verif</description>
    <pubDate>Fri, 03 Apr 2026 02:58:18 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/GHSA-37v6-fxx8-xjmx</guid>
  </item>
  <item>
    <title>[P2] GHSA-hhq4-97c2-p447 — OpenClaw: Zalo webhook replay cache cross-target messageId scope bypass [RANSOMWARE:Play | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/GHSA-hhq4-97c2-p447</link>
    <description>CVSS=0.0 EPSS=0.000 Score=60.0 | ## Summary
Zalo webhook replay cache cross-target messageId scope bypass

## Current Maintainer Triage
- Status: narrow
- Normalized severity: low
- Assessment: v2026.3.28 replay dedupe is still keyed too broadly, but the issue should stay scoped to authenticated sibling-target delivery paths rather</description>
    <pubDate>Thu, 02 Apr 2026 20:59:11 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/GHSA-hhq4-97c2-p447</guid>
  </item>
  <item>
    <title>[P2] GHSA-89r3-6x4j-v7wf — OpenClaw: Voice-call Plivo replay mutates in-process callback origin before replay rejection [RANSOMWARE:Play | ITW]</title>
    <link>https://nvd.nist.gov/vuln/detail/GHSA-89r3-6x4j-v7wf</link>
    <description>CVSS=0.0 EPSS=0.000 Score=60.0 | ## Summary
Voice-call Plivo replay mutates in-process callback origin before replay rejection

## Current Maintainer Triage
- Status: narrow
- Normalized severity: low
- Assessment: v2026.3.28 can still mutate Plivo callback origin before replay rejection, but this needs a captured valid callback fo</description>
    <pubDate>Thu, 02 Apr 2026 20:57:06 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/GHSA-89r3-6x4j-v7wf</guid>
  </item>
  <item>
    <title>[P2] CVE-2026-34976 — Dgraph: Pre-Auth Database Overwrite + SSRF + File Read via restoreTenant Missing Authorization</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-34976</link>
    <description>CVSS=10.0 EPSS=0.000 Score=60.0 | The `restoreTenant` admin mutation is missing from the authorization middleware config (`admin.go:499-522`), making it completely unauthenticated. Unlike the similar `restore` mutation which requires Guardian-of-Galaxy authentication, `restoreTenant` executes with zero middleware.

This mutation acc</description>
    <pubDate>Thu, 02 Apr 2026 20:44:38 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-34976</guid>
  </item>
  <item>
    <title>[P3] CVE-2026-35168 — OpenSTAManager: SQL Injection via Aggiornamenti Module</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-35168</link>
    <description>CVSS=8.8 EPSS=0.001 Score=57.9 | ## Description

The Aggiornamenti (Updates) module in OpenSTAManager &lt;= 2.10.1 contains a database conflict resolution feature (`op=risolvi-conflitti-database`) that accepts a JSON array of SQL statements via POST and executes them directly against the database without any validation, allowlist, or </description>
    <pubDate>Fri, 03 Apr 2026 03:47:38 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-35168</guid>
  </item>
  <item>
    <title>[P3] CVE-2026-35039 — fast-jwt: Cache Confusion via cacheKeyBuilder Collisions Can Return Claims From a Different Token (Identity/Authorizatio</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-35039</link>
    <description>CVSS=9.1 EPSS=0.000 Score=54.6 | ## Impact

Setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause tokens to be mis-identified during the verification process leading to:

- Valid tokens returning claims from different valid tokens
- </description>
    <pubDate>Fri, 03 Apr 2026 04:07:10 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-35039</guid>
  </item>
  <item>
    <title>[P3] CVE-2026-34950 — fast-jwt: Incomplete fix for CVE-2023-48223: JWT Algorithm Confusion via Whitespace-Prefixed RSA Public Key</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-34950</link>
    <description>CVSS=9.1 EPSS=0.000 Score=54.6 | ### Summary
 The fix for GHSA-c2ff-88x2-x9pg (CVE-2023-48223) is incomplete. The publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT algorithm confusion attack that the CVE patched.

### Deta</description>
    <pubDate>Thu, 02 Apr 2026 20:37:54 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-34950</guid>
  </item>
  <item>
    <title>[P3] CVE-2026-34774 — Electron: Use-after-free in offscreen child window paint callback</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-34774</link>
    <description>CVSS=8.1 EPSS=0.000 Score=53.6 | ### Impact
Apps that use offscreen rendering and allow child windows via `window.open()` may be vulnerable to a use-after-free. If the parent offscreen `WebContents` is destroyed while a child window remains open, subsequent paint frames on the child dereference freed memory, which may lead to a cra</description>
    <pubDate>Fri, 03 Apr 2026 02:42:31 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-34774</guid>
  </item>
  <item>
    <title>[P3] CVE-2026-34780 — Electron: Context Isolation bypass via contextBridge VideoFrame transfer</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-34780</link>
    <description>CVSS=8.4 EPSS=0.000 Score=50.4 | ### Impact
Apps that pass `VideoFrame` objects (from the WebCodecs API) across the `contextBridge` are vulnerable to a context isolation bypass. An attacker who can execute JavaScript in the main world (for example, via XSS) can use a bridged `VideoFrame` to gain access to the isolated world, includ</description>
    <pubDate>Fri, 03 Apr 2026 02:46:57 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-34780</guid>
  </item>
  <item>
    <title>[P3] CVE-2026-28815 — Swift Crypto: X-Wing HPKE Decapsulation Accepts Malformed Ciphertext Length</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-28815</link>
    <description>CVSS=7.5 EPSS=0.000 Score=50.0 | ### Summary

The X-Wing decapsulation path accepts attacker-controlled encapsulated ciphertext bytes without enforcing the required fixed ciphertext length. The decapsulation call is forwarded into a C API, which expects a compile-time fixed-size ciphertext buffer of 1120 bytes. This creates an FFI </description>
    <pubDate>Fri, 03 Apr 2026 03:39:42 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-28815</guid>
  </item>
  <item>
    <title>[P3] CVE-2026-35036 — Ech0 has Unauthenticated Server-Side Request Forgery in Website Preview Feature</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-35036</link>
    <description>CVSS=7.5 EPSS=0.000 Score=50.0 | ### Summary

Ech0 implements **link preview** (editor fetches a page title) through **`GET /api/website/title`**. That is **legitimate product behavior**, but the implementation is **unsafe**: the route is **unauthenticated**, accepts a **fully attacker-controlled URL**, performs a **server-side GET</description>
    <pubDate>Fri, 03 Apr 2026 03:30:55 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-35036</guid>
  </item>
  <item>
    <title>[P3] CVE-2026-34771 — Electron: Use-after-free in WebContents fullscreen, pointer-lock, and keyboard-lock permission callbacks</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-34771</link>
    <description>CVSS=7.5 EPSS=0.000 Score=50.0 | ### Impact
Apps that register an asynchronous `session.setPermissionRequestHandler()` may be vulnerable to a use-after-free when handling fullscreen, pointer-lock, or keyboard-lock permission requests. If the requesting frame navigates or the window closes while the permission handler is pending, in</description>
    <pubDate>Fri, 03 Apr 2026 02:40:26 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-34771</guid>
  </item>
  <item>
    <title>[P3] GHSA-ghc5-95c2-vwcv — Auth0 Symfony SDK has Insufficient Entropy in Cookie Encryption</title>
    <link>https://nvd.nist.gov/vuln/detail/GHSA-ghc5-95c2-vwcv</link>
    <description>CVSS=8.2 EPSS=0.000 Score=49.2 | ### Impact
In applications built with the Auth0 PHP SDK, cookies are encrypted with insufficient entropy, which may result in threat actors brute-forcing the encryption key and forging session cookies.

### Am I Affected?
Consumers are affected if their application meets the following preconditions:</description>
    <pubDate>Fri, 03 Apr 2026 03:44:13 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/GHSA-ghc5-95c2-vwcv</guid>
  </item>
  <item>
    <title>[P3] GHSA-vfpx-q664-h93m — Auth0 WordPress Plugin has Insufficient Entropy in Cookie Encryption</title>
    <link>https://nvd.nist.gov/vuln/detail/GHSA-vfpx-q664-h93m</link>
    <description>CVSS=8.2 EPSS=0.000 Score=49.2 | ### Impact
In applications built with the Auth0 PHP SDK, cookies are encrypted with insufficient entropy, which may result in threat actors brute-forcing the encryption key and forging session cookies.

### Am I Affected?
Consumers are affected if their application meets the following preconditions:</description>
    <pubDate>Fri, 03 Apr 2026 03:43:13 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/GHSA-vfpx-q664-h93m</guid>
  </item>
  <item>
    <title>[P3] GHSA-fmg6-246m-9g2v — Auth0 laravel-auth0 SDK has Insufficient Entropy in Cookie Encryption</title>
    <link>https://nvd.nist.gov/vuln/detail/GHSA-fmg6-246m-9g2v</link>
    <description>CVSS=8.2 EPSS=0.000 Score=49.2 | ### Impact
In applications built with the Auth0 PHP SDK, cookies are encrypted with insufficient entropy, which may result in threat actors brute-forcing the encryption key and forging session cookies.

### Am I Affected?
You are affected if you meet the following preconditions:

- Applications usin</description>
    <pubDate>Fri, 03 Apr 2026 03:41:07 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/GHSA-fmg6-246m-9g2v</guid>
  </item>
  <item>
    <title>[P3] CVE-2024-24762 — python-multipart vulnerable to Content-Type Header ReDoS</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2024-24762</link>
    <description>CVSS=7.5 EPSS=0.034 Score=49.1 | ### Summary

When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options.

An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (</description>
    <pubDate>Fri, 03 Apr 2026 19:13:44 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2024-24762</guid>
  </item>
  <item>
    <title>[P3] CVE-2026-35037 — Ech0: Unauthenticated SSRF in GetWebsiteTitle allows access to internal services and cloud metadata</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-35037</link>
    <description>CVSS=7.2 EPSS=0.000 Score=48.2 | ## Summary

The `GET /api/website/title` endpoint accepts an arbitrary URL via the `website_url` query parameter and makes a server-side HTTP request to it without any validation of the target host or IP address. The endpoint requires no authentication. An attacker can use this to reach internal net</description>
    <pubDate>Fri, 03 Apr 2026 03:33:01 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-35037</guid>
  </item>
  <item>
    <title>[P3] CVE-2026-35167 — Kedro: Path Traversal in versioned dataset loading via unsanitized version string</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-35167</link>
    <description>CVSS=7.1 EPSS=0.000 Score=47.6 | ### Impact
The `_get_versioned_path()` method in kedro/io/core.py constructs filesystem paths by directly interpolating user-supplied version strings without sanitization. Because version strings are used as path components, traversal sequences such as ../ are preserved and can escape the intended v</description>
    <pubDate>Fri, 03 Apr 2026 03:46:48 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-35167</guid>
  </item>
  <item>
    <title>[P3] CVE-2026-34770 — Electron: Use-after-free in PowerMonitor on Windows and macOS</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-34770</link>
    <description>CVSS=7.0 EPSS=0.000 Score=47.0 | ### Impact
Apps that use the `powerMonitor` module may be vulnerable to a use-after-free. After the native `PowerMonitor` object is garbage-collected, the associated OS-level resources (a message window on Windows, a shutdown handler on macOS) retain dangling references. A subsequent session-change </description>
    <pubDate>Fri, 03 Apr 2026 02:39:56 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-34770</guid>
  </item>
  <item>
    <title>[P3] CVE-2026-34769 — Electron: Renderer command-line switch injection via undocumented commandLineSwitches webPreference</title>
    <link>https://nvd.nist.gov/vuln/detail/CVE-2026-34769</link>
    <description>CVSS=7.8 EPSS=0.000 Score=46.8 | ### Impact
An undocumented `commandLineSwitches` webPreference allowed arbitrary switches to be appended to the renderer process command line. Apps that construct `webPreferences` by spreading untrusted configuration objects may inadvertently allow an attacker to inject switches that disable rendere</description>
    <pubDate>Fri, 03 Apr 2026 02:39:16 +0000</pubDate>
    <guid>https://nvd.nist.gov/vuln/detail/CVE-2026-34769</guid>
  </item>
  </channel>
</rss>