Kernel-level visibility reveals hidden data movement in breaches, exposing gaps in modern security tools and improving detection, compliance, and system behavior tracking.
A vulnerability described as critical has been identified in Login Disable up to 2.1.2 on Drupal. The impacted element is an unknown function. Such manipulation leads to authentication bypass using alternate channel.
This vulnerability is uniquely identified as CVE-2026-1917. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is recommended.
A vulnerability labeled as problematic has been found in Cisco IOS XE. This affects an unknown function of the component DHCP Snooping. Such manipulation leads to resource consumption.
This vulnerability is traded as CVE-2026-20084. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability marked as critical has been reported in Cisco IOS XE up to 17.18.1. This impacts an unknown function of the component CAPWAP. Performing a manipulation results in improper handling of missing values.
This vulnerability is known as CVE-2026-20086. Remote exploitation of the attack is possible. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability described as problematic has been identified in Cisco IOS XE. Affected is an unknown function of the component Application Hosting Environment Management Interface. Executing a manipulation can lead to crlf injection.
This vulnerability is handled as CVE-2026-20113. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, was found in Cisco IOS XE. This vulnerability affects unknown code of the component Extensible Authentication Protocol. Such manipulation leads to missing reference to active allocated resource.
This vulnerability is referenced as CVE-2026-20004. The attack needs to be initiated within the local network. No exploit is available.
You should upgrade the affected component.
A vulnerability has been found in Cisco IOS XE and classified as problematic. This issue affects some unknown processing of the component CLI. Performing a manipulation results in incorrect privilege assignment.
This vulnerability is identified as CVE-2026-20110. The attack is only possible with local access. There is not any exploit available.
The affected component should be upgraded.
A vulnerability was found in Cisco IOS XE and classified as problematic. Impacted is an unknown function of the component Secure Copy Protocol. Executing a manipulation can lead to improper handling of extra parameters.
This vulnerability is tracked as CVE-2026-20083. The attack is restricted to local execution. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability was found in Cisco IOS XE. It has been classified as problematic. The affected element is an unknown function of the component Application Hosting Environment Management Interface. The manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2026-20112. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in Cisco IOS XE. It has been rated as problematic. This affects an unknown function of the component Bootloader. This manipulation causes buffer underwrite.
This vulnerability is registered as CVE-2026-20104. It is feasible to perform the attack on the physical device. No exploit is available.
Upgrading the affected component is advised.
A vulnerability identified as problematic has been detected in Cisco Catalyst SD-WAN Manager. Affected is an unknown function of the component Web-based Management Interface. Performing a manipulation results in cross site scripting.
This vulnerability is reported as CVE-2026-20108. The attack is possible to be carried out remotely. No exploit exists.
You should upgrade the affected component.
A pro-Russian hacker group impersonated Ukraine’s national cyber incident response team in a phishing campaign targeting government agencies, businesses, and other institutions, Ukrainian cybersecurity officials said.
A vulnerability categorized as critical has been discovered in Kiteworks Core up to 9.2.1. Affected by this vulnerability is an unknown functionality. Such manipulation leads to improper ownership management.
This vulnerability is traded as CVE-2026-23514. The attack may be launched remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in N2WS Backup & Recovery up to 4.3.x. It has been classified as critical. Affected by this vulnerability is an unknown functionality of the component RESTful API. This manipulation causes race condition.
This vulnerability is registered as CVE-2025-32991. Remote exploitation of the attack is possible. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability was found in N2W up to 4.3.1/4.4.0. It has been declared as critical. Affected by this issue is some unknown functionality of the component API Request Handler. Such manipulation leads to authentication bypass by spoofing.
This vulnerability is documented as CVE-2025-59706. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in N2W up to 4.3.1/4.4.0. It has been rated as critical. This affects an unknown part. Performing a manipulation results in authentication bypass by spoofing.
This vulnerability is reported as CVE-2025-59707. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability identified as problematic has been detected in GitLab Enterprise Edition up to 18.8.6/18.9.2/18.10.0. This issue affects some unknown processing. The manipulation leads to incorrect authorization.
This vulnerability is traded as CVE-2026-4363. It is possible to initiate the attack remotely. There is no exploit available.
You should upgrade the affected component.
A vulnerability classified as critical has been found in pdf-image up to 2.0.0. This affects the function constructGetInfoCommand/constructConvertCommandForPage. Performing a manipulation of the argument pdfFilePath results in os command injection.
This vulnerability was named CVE-2026-26830. The attack may be initiated remotely. There is no available exploit.