13766 results (0.084 seconds)

CVSS: 8.9EPSS: %CPEs: 1EXPL: 0

20 Jan 2026 — Versions 7.10.0 until 8.0.2 are vulnerable to arbitrary code execution in environments consuming generated clients. • https://github.com/orval-labs/orval/releases/tag/v8.0.2 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 5.8EPSS: %CPEs: 1EXPL: 0

19 Jan 2026 — SiYuan is a personal knowledge management system. Versions prior to 3.5.4 have a stored Cross-Site Scripting (XSS) vulnerability that allows an attacker to inject arbitrary HTML attributes into the `icon` attribute of a block via the `/api/attr/setBlockAttrs` API. The payload is later rendered in the dynamic icon feature in an unsanitized context, leading to stored XSS and, in the desktop environment, potential remote code execution (RCE). This issue bypasses the previous fix for issue `#15970` (XSS → RCE v... • https://github.com/siyuan-note/siyuan/commit/0be7e1d4e0da9aac0da850b7aeb9b50ede7e5bdb • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 2.7EPSS: %CPEs: 1EXPL: 0

19 Jan 2026 — This can allow malicious file uploads, potentially resulting in unauthorized code execution or system compromise. • https://support.hcl-software.com/kb_view.do?sys_kb_id=4b92474633de7ad4159a05273e5c7b4b&searchTerm=kb0127995# • CWE-644: Improper Neutralization of HTTP Headers for Scripting Syntax •

CVSS: 3.1EPSS: %CPEs: 1EXPL: 0

19 Jan 2026 — This can allow malicious file uploads, potentially resulting in unauthorized code execution or system compromise. • https://support.hcl-software.com/kb_view.do?sys_kb_id=4b92474633de7ad4159a05273e5c7b4b&searchTerm=kb0127995# • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

18 Jan 2026 — LobeChat is an open source chat application platform. Prior to version 2.0.0-next.180, a stored Cross-Site Scripting (XSS) vulnerability in the Mermaid artifact renderer allows attackers to execute arbitrary JavaScript within the application context. This XSS can be escalated to Remote Code Execution (RCE) by leveraging the exposed `electronAPI` IPC bridge, allowing attackers to run arbitrary system commands on the victim's machine. Version 2.0.0-next.180 patches the issue. • https://github.com/lobehub/lobe-chat/security/advisories/GHSA-4gpc-rhpj-9443 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 8.5EPSS: 0%CPEs: -EXPL: 0

18 Jan 2026 — If the instance is operating under the "External" execution mode (ex. n8n's official Docker image) - arbitrary code execution occurs inside a Sidecar container and not the main node, which significantly reduces the vulnerability impact. • https://github.com/n8n-io/n8n/commit/b73a4283cb14e0f27ce19692326f362c7bf3da02 • CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

16 Jan 2026 — Skipper is an HTTP router and reverse proxy for service composition. The default skipper configuration before 0.23.0 was -lua-sources=inline,file. The problem starts if untrusted users can create lua filters, because of -lua-sources=inline , for example through a Kubernetes Ingress resource. The configuration inline allows these user to create a script that is able to read the filesystem accessible to the skipper process and if the user has access to read the logs, they an read skipper secrets. This vulnera... • https://github.com/zalando/skipper/commit/0b52894570773b29e2f3c571b94b4211ef8fa714 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-250: Execution with Unnecessary Privileges CWE-522: Insufficiently Protected Credentials •

CVSS: 9.4EPSS: 0%CPEs: 1EXPL: 0

16 Jan 2026 — WeGIA is a Web Manager for Charitable Institutions. Prior to 3.6.2, a Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the WeGIA system, specifically within the html/memorando/insere_despacho.php file. The application fails to properly sanitize or encode user-supplied input via the id_memorando GET parameter before reflecting it into the HTML source (likely inside a