Aggregator
CVE-2026-26983 | ImageMagick up to 6.9.13-39/7.1.2-14 MSL Interpreter null pointer dereference (GHSA-w8mw-frc6-r7m8 / Nessus ID 299970)
CVE-2026-25799 | ImageMagick up to 6.9.13-39/7.1.2-14 Image Parser divide by zero (GHSA-543g-8grm-9cw6 / Nessus ID 299969)
CVE-2026-3147 | libvips up to 8.18.0 csvload.c vips_foreign_load_csv_build heap-based overflow (Issue 4874 / Nessus ID 299977)
CVE-2026-27204 | bytecodealliance wasmtime up to 24.0.5/36.0.5/40.0.3/41.0.3 resource consumption (ID 11552 / Nessus ID 299973)
CVE-2026-2239 | GIMP PSD File Parser denial of service (Nessus ID 299978)
CVE-2026-25576 | ImageMagick up to 6.9.13-39/7.1.2-14 Raw Image Format out-of-bounds (GHSA-jv4p-gjwq-9r2j / Nessus ID 299971)
CVE-2026-27589 | caddyserver caddy up to 2.11.0 Admin API /load cross-site request forgery (Nessus ID 299979)
CVE-2025-61882
CVE-2026-27734 | henrygd beszel up to 0.18.3 API Endpoint logs PathEscape path traversal (GHSA-phwh-4f42-gwf3 / EUVD-2026-9053)
CVE-2026-27836 | thorsten phpmyfaq up to 4.0.17 WebAuthn Prepare Endpoint /api/webauthn/prepare authorization (GHSA-w22q-m2fm-x9f4 / EUVD-2026-9059)
CVE-2026-28352 | Indico up to 3.3.10 API Endpoint missing authentication (EUVD-2026-9071)
CVE-2026-28402 | nimiq core-rs-albatross up to 1.2.1 header.body_root integrity check (EUVD-2026-9074)
CVE-2026-28400 | Docker model-runner up to 1.0.15 API /engines/_configure routine (EUVD-2026-9073)
CVE-2026-27840 | Zitadel up to 2.71.19/3.4.6/4.10.x Access Token token_id authentication bypass by assumed-immutable data (GHSA-6mq3-xmgp-pjm5 / EUVD-2026-8789)
CVE-2026-27946 | Zitadel up to 3.4.6/4.10.x authorization (GHSA-282g-fhmx-xf54 / EUVD-2026-8794)
CVE-2026-22716 | VMware Workstation up to 25H1 out-of-bounds write (EUVD-2026-9043)
Stay Ahead of Ransomware - The AI Arms Race: When Both Sides Have Copilots
How does Agentic AI deliver value in cybersecurity
How Can Non-Human Identities Enhance Cybersecurity? Are your security strategies keeping up with the increasing complexity of digital? With cybersecurity challenges evolve, so do the measures to counter them. Among these advancements, the management of Non-Human Identities (NHIs) is proving crucial. NHIs, which combine machine identities with secured secrets such as encrypted passwords and tokens, […]
The post How does Agentic AI deliver value in cybersecurity appeared first on Entro.
The post How does Agentic AI deliver value in cybersecurity appeared first on Security Boulevard.
Is your AI security solution scalable for future challenges
Are Non-Human Identities the Key to Scalable AI Security? How can organizations ensure their AI security solution stays scalable in evolving digital threats? The answer may lie in the effective management of Non-Human Identities (NHIs). With the increasing adoption of cloud solutions across industries, managing these machine identities becomes paramount. In sectors such as financial […]
The post Is your AI security solution scalable for future challenges appeared first on Entro.
The post Is your AI security solution scalable for future challenges appeared first on Security Boulevard.