Langflow CVE-2026-33017 exploited in 20 hours after disclosure, enabling RCE via exec(), exposing systems before patching ...
Trivy attack force-pushed 75 tags via GitHub Actions, exposing CI/CD secrets, enabling data theft and persistence across ...
Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.
An N-day vulnerability in Microsoft Word exposes nearly 14 million assets. Attackers can exploit this flaw to bypass security ...
GL Communications Inc., a global provider of voice testing solutions, announces enhanced capabilities in its Message ...
Researchers are warning about the risks posed by a low-cost device that can give insiders and hackers unusually broad powers ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results