Cloudflare’s new Web and API Vulnerability Scanner helps teams proactively find logic flaws. By using AI to build API call graphs, we identify vulnerabilities that standard defensive tools miss.
Today we’re disclosing request smuggling vulnerabilities when our open source Pingora service is deployed as an ingress proxy and how we’ve fixed them in Pingora 0.8.0.
Another week in cybersecurity. Another week of "you've got to be kidding me."
Attackers were busy. Defenders were busy. And somewhere in the middle, a whole lot of people had a very bad Monday morning. That's kind of just how it goes now.
The good news? There were some actual wins this week. Real ones. The kind where the good guys showed up, did the work, and made a dent. It doesn't always
A vulnerability was found in fast-xml-parser up to 4.2.3 and classified as problematic. The impacted element is an unknown function. Such manipulation leads to denial of service.
This vulnerability is traded as CVE-2023-34104. Access to the local network is required for this attack to succeed. There is no exploit available.
It is suggested to upgrade the affected component.
A vulnerability was found in Birtech Senseway up to 09022026. It has been declared as problematic. Affected by this issue is some unknown functionality. The manipulation results in insecure storage of sensitive information.
This vulnerability is cataloged as CVE-2025-10464. The attack may be launched remotely. There is no exploit available.
A vulnerability was found in Birtech Sensaway up to 09022026. It has been rated as critical. This affects an unknown part. This manipulation causes unrestricted upload.
This vulnerability is registered as CVE-2025-10465. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability categorized as critical has been discovered in Birtech Senseway up to 09022026. This vulnerability affects unknown code. Such manipulation leads to improper authentication.
This vulnerability is documented as CVE-2025-10463. The attack can be executed remotely. There is not any exploit available.
A vulnerability, which was classified as critical, was found in DesignThemes Booking Manager Plugin up to 2.0 on WordPress. The impacted element is an unknown function. The manipulation results in missing authorization.
This vulnerability is reported as CVE-2026-27388. The attack can be launched remotely. No exploit exists.
A vulnerability has been found in DesignThemes WeDesignTech Ultimate Booking Addon Plugin up to 1.0.1 on WordPress and classified as critical. This affects an unknown function. This manipulation causes authentication bypass using alternate channel.
This vulnerability appears as CVE-2026-27390. The attack may be initiated remotely. There is no available exploit.
A vulnerability has been found in Joe Dolson My Tickets Plugin up to 2.1.0 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality. Performing a manipulation results in insertion of sensitive information into sent data.
This vulnerability is reported as CVE-2026-27406. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability described as problematic has been identified in hexpm hex.pm. This vulnerability affects unknown code in the library lib/hexpm_web/controllers/api/oauth_controller.ex. The manipulation results in incorrect authorization.
This vulnerability is reported as CVE-2026-21621. The attack can be launched remotely. No exploit exists.
A patch should be applied to remediate this issue.
A vulnerability was found in D-Link DIR-1253 1.6.1684. It has been declared as critical. Affected is an unknown function of the file /etc/shadow.sample. Executing a manipulation can lead to improper privilege management.
This vulnerability appears as CVE-2025-29165. The attacker needs to be present on the local network. There is no available exploit.
A vulnerability classified as critical has been found in Canonical Ubuntu Linux up to 6.7. This issue affects the function skb_get. This manipulation causes use after free.
This vulnerability appears as CVE-2025-13350. The attack requires local access. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability labeled as problematic has been found in Fonoster up to 0.6.0. This issue affects the function serveFiles of the file mods/voice/src/utils.ts. The manipulation results in path traversal: '../filedir'.
This vulnerability is cataloged as CVE-2024-43035. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.