CVE-2026-7059 - 666ghj MiroFish Query Parameter simulation.py get_simulation_posts path traversal
CVE ID :CVE-2026-7059 Published : April 26, 2026, 8 p.m. | 1 hour, 59 minutes ago Description :A vulnerability was found in 666ghj MiroFish up to 0.1.2. This affects the function get_simulation_posts of the file backend/app/api/simulation.py of the component Query Parameter Handler. Performing
ORIGINAL SOURCE →via CVE Feed Latest
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] CVE-2026-7068 - D-Link DIR-825 nmbd sserver.c NMBD_process buffer overflow
- [CYBER] CVE-2026-7067 - D-Link DIR-822 udhcpd DHCP Service dhcpd.c system command injection
- [CYBER] Production-Grade Serverless Web App Architecture on AWS with CloudFront, S3, API Gateway, Lambda, and DynamoDB
- [CYBER] CVE-2026-7064 - AgentDeskAI browser-tools-mcp browser-connector.ts os command injection
- [CYBER] CVE-2026-7063 - code-projects Employee Management System Endpoint eprocess.php sql injection
- [CYBER] CVE-2026-7062 - Intina47 context-sync Git Integration git-integration.ts os command injection