CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad

CVEReports
•9 minutes ago•CVE-2026-40074
6.3

CVE-2026-40074: Denial of Service via Unhandled Exceptions in SvelteKit Redirects

SvelteKit versions prior to 2.57.1 are vulnerable to a Denial of Service (DoS) condition due to improper handling of exceptional conditions in the `redirect()` function. When supplied with invalid HTTP header characters, the underlying JavaScript runtime throws a TypeError that terminates the process or hangs the request.

Amit Schendel
Amit Schendel
0 views•8 min read
•36 minutes ago•CVE-2026-40077
3.5

CVE-2026-40077: Insecure Direct Object Reference in Beszel Hub API

CVE-2026-40077 is an Insecure Direct Object Reference (IDOR) vulnerability in the Beszel Hub API prior to version 0.18.7. The flaw allows authenticated users to bypass authorization controls and access sensitive container logs, retrieve systemd metadata, or trigger SMART disk scans on monitoring agents belonging to other users.

Amit Schendel
Amit Schendel
0 views•5 min read
•about 1 hour ago•CVE-2026-40073
8.2

CVE-2026-40073: Unrestricted Resource Allocation in SvelteKit adapter-node via Chunked Transfer Encoding

SvelteKit's adapter-node fails to enforce the configured BODY_SIZE_LIMIT for incoming requests utilizing chunked transfer encoding. This logic error allows unauthenticated remote attackers to send arbitrarily large request bodies, bypassing internal framework protections and leading to memory exhaustion and server denial of service.

Alon Barad
Alon Barad
1 views•5 min read
•about 2 hours ago•CVE-2026-40103
4.3

CVE-2026-40103: Authorization Bypass via Method Confusion in Vikunja API

Vikunja versions prior to 2.3.0 contain an authorization bypass vulnerability caused by method confusion in scoped API token validation. The application validates authorization scopes using URL path strings but fails to enforce matching HTTP methods, allowing a read-only token to perform destructive state-changing operations.

Alon Barad
Alon Barad
1 views•6 min read
•about 3 hours ago•CVE-2024-23653
9.8

CVE-2024-23653: Build-Time Container Escape in Moby BuildKit via GRPC API Authorization Bypass

Moby BuildKit versions prior to 0.12.5 contain a critical authorization bypass vulnerability (CWE-863) within the interactive containers GRPC Gateway API. A maliciously crafted Dockerfile using a custom frontend can bypass entitlement checks to launch a privileged container, resulting in a build-time escape and full host root command execution.

Alon Barad
Alon Barad
2 views•5 min read
•about 4 hours ago•CVE-2026-40046
8.8

CVE-2026-40046: Integer Overflow and Protocol Smuggling in Apache ActiveMQ MQTT Decoder

CVE-2026-40046 is an integer overflow vulnerability in the MQTT transport module of Apache ActiveMQ versions 6.0.0 through 6.2.3. The flaw stems from a failure to enforce the specification-defined maximum byte length for the MQTT 'Remaining Length' header. Attackers can exploit this logic error to trigger protocol desynchronization, perform command smuggling, and cause denial-of-service conditions. This vulnerability is a regression of CVE-2025-66168, which was patched in the 5.19.x branch but inadvertently omitted from the 6.x release line.

Alon Barad
Alon Barad
1 views•7 min read
•about 4 hours ago•CVE-2026-34941
6.9

CVE-2026-34941: Heap Out-of-bounds Read in Wasmtime Component String Transcoding

Wasmtime contains a critical out-of-bounds read vulnerability in its Fast API Call Trampoline (fact) compiler. A logic error during UTF-16 string transcoding validates the string length using code units rather than byte sizes, allowing malicious WebAssembly guests to induce the host runtime into reading adjacent memory.

Amit Schendel
Amit Schendel
1 views•7 min read
•about 5 hours ago•CVE-2026-34942
5.9

CVE-2026-34942: Denial of Service via Unaligned Memory Allocation in Wasmtime Component Model

Wasmtime fails to verify the alignment of memory pointers returned by guest modules during UTF-16 string transcoding. A malicious guest can exploit this by returning an unaligned pointer from its reallocation function, triggering an unrecoverable host panic and causing a complete denial of service.

Alon Barad
Alon Barad
2 views•6 min read
•about 6 hours ago•CVE-2026-34943
5.6

CVE-2026-34943: Host-Side Panic and Denial of Service in Wasmtime Dynamic Lifting

Wasmtime is vulnerable to a denial-of-service condition due to a host-side panic triggered when dynamically lifting WebAssembly Component Model flags types. The dynamic lifter fails to ignore undefined bits provided by a guest, leading to an unhandled exception.

Alon Barad
Alon Barad
2 views•9 min read
•about 6 hours ago•CVE-2026-34944
4.1

CVE-2026-34944: Out-of-bounds Read and Denial of Service in Wasmtime Cranelift Backend

An out-of-bounds read vulnerability exists in the Cranelift x86-64 backend of Wasmtime. When SSE3 is disabled, incorrect instruction selection for the f64x2.splat operation results in a widened 16-byte memory load instead of the intended 8-byte load, leading to a process-level segmentation fault and Denial of Service.

Alon Barad
Alon Barad
4 views•6 min read
•about 8 hours ago•CVE-2026-34945
2.3

CVE-2026-34945: Host Stack Memory Leak via Type Confusion in Wasmtime Winch Compiler

The Wasmtime WebAssembly runtime is affected by a type confusion vulnerability in its Winch compiler backend when processing the `table.size` instruction. When the `memory64` proposal is enabled, this flaw allows a malicious guest WebAssembly module to read uninitialized host stack memory, potentially leaking sensitive host data.

Alon Barad
Alon Barad
4 views•6 min read
•about 9 hours ago•CVE-2026-23226
8.8

CVE-2026-23226: Use-After-Free in Linux Kernel ksmbd Multi-Channel Sessions

CVE-2026-23226 is a high-severity use-after-free vulnerability in the Linux kernel's in-kernel SMB server (ksmbd). The flaw arises from a missing synchronization lock in the multi-channel session management code, specifically within the ksmbd_chann_list xarray. Successful exploitation allows an authenticated network attacker to achieve arbitrary code execution, kernel panics, or information disclosure.

Alon Barad
Alon Barad
5 views•5 min read
SeverityExploitPeriodCatalog
Sort

Or generate a custom report

Search for a CVE ID (e.g. CVE-2024-1234) to generate an AI-powered vulnerability analysis

Automated vulnerability intelligence. 1,454+ reports.