A vulnerability was found in Red Hat Keycloak. It has been rated as critical. This issue affects some unknown processing of the component resource_set Endpoint. The manipulation leads to improper access controls.
This vulnerability is traded as CVE-2026-4628. It is possible to initiate the attack remotely. There is no exploit available.
CISA ordered U.S. government agencies to patch three iOS vulnerabilities targeted in cryptocurrency theft and cyberespionage attacks using the DarkSword exploit kit. [...]
A vulnerability was found in itsourcecode Online Enrollment System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /sms/user/index.php?view=add of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection.
This vulnerability appears as CVE-2026-4632. The attack may be performed from remote. In addition, an exploit is available.
Cybersecurity researchers have uncovered malicious artifacts distributed via Docker Hub following the Trivy supply chain attack, highlighting the widening blast radius across developer environments.
The last known clean release of Trivy on Docker Hub is 0.69.3. The malicious versions 0.69.4, 0.69.5, and 0.69.6 have since been removed from the container image library.
"New image tags 0.69.5 and
A vulnerability was found in shaonsina Sina Extension for Elementor Plugin up to 3.7.0 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. Such manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2025-6229. The attack can be executed remotely. There is not any exploit available.
It is suggested to upgrade the affected component.
A vulnerability has been found in kingaddons King Addons for Elementor Plugin up to 51.1.49 on WordPress and classified as problematic. Affected by this vulnerability is the function render_full_form. This manipulation causes information disclosure.
This vulnerability is registered as CVE-2025-13997. Remote exploitation of the attack is possible. No exploit is available.
The affected component should be upgraded.
Operation Alice: Police dismantle a massive dark web network with 373,000 fake sites luring users seeking child sexual abuse material. An international law enforcement operation, code named Operation Alice, shut down one of the largest dark web scams, uncovering over 373,000 fake sites tricking users seeking child sexual abuse content. The operation, first investigated in […]
Currently trending CVE - Hype Score: 1 - A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may ...