We are opening our advanced Client-Side Security tools to all users, featuring a new cascading AI detection system. By combining graph neural networks and LLMs, we've reduced false positives by up to 200x while catching sophisticated zero-day exploits.
A vulnerability was found in Node.js up to 20.20.1/22.22.1/24.14.0/25.8.1 and classified as problematic. This vulnerability affects the function fs.realpathSync.native of the component File Existence Handler. Executing a manipulation can lead to information disclosure.
This vulnerability appears as CVE-2026-21715. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability has been found in Node.js up to 20.20.1/22.22.1/24.14.0/25.8.1 and classified as problematic. This affects the function JSON.parse of the component V8 Handler. Performing a manipulation results in denial of service.
This vulnerability is reported as CVE-2026-21717. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability, which was classified as problematic, was found in Node.js up to 20.20.1/22.22.1/24.14.0/25.8.1. Affected by this issue is some unknown functionality of the component HTTP2 Server. Such manipulation leads to resource consumption.
This vulnerability is documented as CVE-2026-21714. The attack can be executed remotely. There is not any exploit available.
You should upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Node.js up to 20.20.1/22.22.1/24.14.0/25.8.1. Affected by this vulnerability is the function memcmp of the file crypto_hmac.cc of the component HMAC Verification. This manipulation causes incorrect comparison.
This vulnerability is registered as CVE-2026-21713. Remote exploitation of the attack is possible. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability classified as problematic was found in Node.js up to 20.20.1/22.22.1/24.14.0/25.8.1. Affected is the function url.format of the file node_url.cc of the component URL Handler. The manipulation results in reachable assertion.
This vulnerability is cataloged as CVE-2026-21712. The attack may be launched remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in Node.js up to 20.20.1/22.22.1/24.14.0/25.8.1. This impacts an unknown function of the component UDS Server Handler. The manipulation leads to permission issues.
This vulnerability is listed as CVE-2026-21711. The attack may be initiated remotely. There is no available exploit.
It is recommended to upgrade the affected component.
A vulnerability described as problematic has been identified in Node.js up to 20.20.1/22.22.1/24.14.0/25.8.1. This affects an unknown function. Executing a manipulation of the argument req.headersDistinct can lead to denial of service.
This vulnerability is tracked as CVE-2026-21710. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability marked as problematic has been reported in OWASP coreruleset up to 3.3.8/4.24.x. The impacted element is an unknown function of the component Whitespace Handler. Performing a manipulation results in improper handling of case sensitivity.
This vulnerability is identified as CVE-2026-33691. The attack can be initiated remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in GitLab Community Edition and Enterprise Edition up to 18.8.6/18.9.2/18.10.0. The affected element is an unknown function. Such manipulation leads to improper handling of parameters.
This vulnerability is referenced as CVE-2026-2370. It is possible to launch the attack remotely. No exploit is available.
The affected component should be upgraded.
A vulnerability identified as critical has been detected in wpchill Download Monitor Plugin up to 5.1.7 on WordPress. Impacted is the function executePayment. This manipulation causes authorization bypass.
The identification of this vulnerability is CVE-2026-3124. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability categorized as critical has been discovered in MLflow up to 3.8.x. This issue affects the function extract_archive_to_dir of the file mlflow/pyfunc/dbconnect_artifact_cache.py. The manipulation results in path traversal: '\..\filename'.
This vulnerability was named CVE-2025-15036. The attack may be performed from remote. There is no available exploit.
It is advisable to upgrade the affected component.