## Updated at UTC 2026-03-18T03:52:30.309980

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-2603 8.1 0.00% 2 2 2026-03-18T02:16:24.813000 A flaw was found in Keycloak. A remote attacker could bypass security controls b
CVE-2026-2092 7.7 0.00% 2 0 2026-03-18T02:16:24.577000 A flaw was found in Keycloak. Keycloak's Security Assertion Markup Language (SAM
CVE-2026-28500 8.6 0.00% 2 0 2026-03-18T02:16:24.227000 Open Neural Network Exchange (ONNX) is an open standard for machine learning int
CVE-2026-32838 7.5 0.00% 2 0 2026-03-18T00:30:59 Edimax GS-5008PL firmware version 1.00.54 and prior use cleartext HTTP for the w
CVE-2026-1376 7.5 0.00% 2 0 2026-03-18T00:30:59 IBM i 7.6 could allow a remote attacker to cause a denial of service using faile
CVE-2026-3888 7.9 0.00% 2 0 2026-03-18T00:30:54 Local privilege escalation in snapd on Linux allows local attackers to get root
CVE-2026-22727 7.5 0.00% 2 0 2026-03-17T23:16:17.470000 Unprotected internal endpoints in Cloud Foundry Capi Release 1.226.0 and below,
CVE-2026-21994 9.8 0.00% 2 0 2026-03-17T23:16:17.310000 Vulnerability in the Oracle Edge Cloud Infrastructure Designer and Visualisation
CVE-2026-20643 0 0.00% 3 1 2026-03-17T23:16:17.193000 A cross-origin issue in the Navigation API was addressed with improved input val
CVE-2025-14031 7.5 0.00% 2 0 2026-03-17T23:16:15.863000 IBM Sterling B2B Integrator and and IBM Sterling File Gateway 6.1.0.0 through 6.
CVE-2026-32841 8.1 0.00% 4 0 2026-03-17T22:16:15.043000 Edimax GS-5008PL firmware version 1.00.54 and prior contain an authentication by
CVE-2026-4064 8.3 0.00% 2 0 2026-03-17T21:31:53 Missing authorization checks on multiple gRPC service endpoints in PowerShell Un
CVE-2026-4295 7.8 0.00% 2 0 2026-03-17T21:31:53 Improper trust boundary enforcement in Kiro IDE before version 0.8.0 on all supp
CVE-2026-32981 7.5 0.00% 2 0 2026-03-17T21:31:53 A path traversal vulnerability was identified in Ray Dashboard (default port 826
CVE-2025-64301 7.8 0.00% 2 0 2026-03-17T21:31:53 An out‑of‑bounds write vulnerability exists in the EMF functionality of Canva Af
CVE-2026-22182 7.5 0.08% 1 0 2026-03-17T21:31:44 wpDiscuz before 7.6.47 contains an unauthenticated denial of service vulnerabili
CVE-2025-66342 7.8 0.00% 2 0 2026-03-17T21:16:18.250000 A type confusion vulnerability exists in the EMF functionality of Canva Affinity
CVE-2026-22193 8.1 0.03% 1 0 2026-03-17T20:27:42.513000 wpDiscuz before 7.6.47 contains an SQL injection vulnerability in the getAllSubs
CVE-2026-32600 8.2 0.01% 1 0 2026-03-17T19:25:09.150000 xml-security is a library that implements XML signatures and encryption. Prior t
CVE-2026-25769 9.1 0.00% 2 1 2026-03-17T19:16:00.957000 Wazuh is a free and open source platform used for threat prevention, detection,
CVE-2026-2921 7.8 0.06% 1 0 2026-03-17T18:59:00.343000 GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability. Thi
CVE-2026-3083 8.8 0.36% 1 0 2026-03-17T18:57:46.047000 GStreamer rtpqdm2depay Out-Of-Bounds Write Remote Code Execution Vulnerability.
CVE-2026-3086 7.8 0.06% 1 2 2026-03-17T18:56:36.537000 GStreamer H.266 Codec Parser Out-Of-Bounds Write Remote Code Execution Vulnerabi
CVE-2026-28430 9.8 0.14% 2 0 2026-03-17T18:53:49.153000 Chamilo LMS is a learning management system. Prior to version 1.11.34, there is
CVE-2026-30875 8.8 0.15% 2 0 2026-03-17T18:53:29.480000 Chamilo LMS is a learning management system. Prior to version 1.11.36, an arbitr
CVE-2026-2673 7.5 0.02% 2 0 2026-03-17T18:31:38 Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected pref
CVE-2026-32298 9.1 0.00% 6 0 2026-03-17T18:30:43 The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by
CVE-2026-32295 7.5 0.00% 2 0 2026-03-17T18:30:42 JetKVM before 0.5.4 does not rate limit login requests, enabling brute-force att
CVE-2026-32292 7.5 0.00% 2 0 2026-03-17T18:30:37 The GL-iNet Comet (GL-RM1) KVM web interface does not limit login requests, enab
CVE-2026-32297 7.5 0.00% 8 0 2026-03-17T18:16:17.137000 The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary
CVE-2026-32296 8.2 0.00% 10 0 2026-03-17T18:16:16.960000 Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without prope
CVE-2026-25534 9.1 0.00% 4 0 2026-03-17T18:16:15.063000 ### Impact Spinnaker updated URL Validation logic on user input to provide sanit
CVE-2026-4148 8.8 0.00% 4 0 2026-03-17T16:16:23.807000 A use-after-free vulnerability can be triggered in sharded clusters by an authen
CVE-2026-28519 8.8 0.01% 2 0 2026-03-17T15:38:55.280000 arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vuln
CVE-2026-4258 7.5 0.02% 4 0 2026-03-17T15:37:26 All versions of the package sjcl are vulnerable to Improper Verification of Cryp
CVE-2026-30911 8.1 0.02% 4 0 2026-03-17T15:37:26 Apache Airflow versions 3.1.0 through 3.1.7 missing authorization vulnerability
CVE-2026-4318 8.8 0.00% 2 0 2026-03-17T15:36:34 A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Affected is
CVE-2026-28779 7.5 0.02% 2 0 2026-03-17T15:36:23 Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is
CVE-2026-32267 None 0.02% 2 0 2026-03-17T15:23:52 ### Summary A low-privilege user (or an unauthenticated user who has been sent a
CVE-2026-3564 9.0 0.00% 2 0 2026-03-17T15:16:19.253000 A condition in ScreenConnect may allow an actor with access to server-level cryp
CVE-2026-0708 8.3 0.16% 2 0 2026-03-17T14:20:01.670000 A flaw was found in libucl. A remote attacker could exploit this by providing a
CVE-2026-4208 0 0.05% 2 0 2026-03-17T14:20:01.670000 The extension fails to properly reset the generated MFA code after successful au
CVE-2026-23489 9.1 0.06% 3 0 2026-03-17T14:20:01.670000 Fields is a GLPI plugin that allows users to add custom fields on GLPI items for
CVE-2026-4269 7.5 0.05% 1 0 2026-03-17T14:20:01.670000 A missing S3 ownership verification in the Bedrock AgentCore Starter Toolkit bef
CVE-2026-4312 9.8 0.13% 4 0 2026-03-17T09:31:33 GCB/FCB Audit Software developed by DrangSoft has a Missing Authentication vulne
CVE-2026-2579 7.5 0.07% 2 0 2026-03-17T03:30:22 The WowStore – Store Builder & Product Blocks for WooCommerce plugin for WordPre
CVE-2026-32313 8.2 0.01% 1 0 2026-03-16T22:01:06 ### Summary XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256
CVE-2026-32720 None 0.04% 1 0 2026-03-16T22:00:36 ### Impact Due to a mis-written NetworkPolicy, a malicious actor can pivot from
CVE-2026-27962 9.1 0.04% 2 0 2026-03-16T21:54:00 ## Description ### Summary A JWK Header Injection vulnerability in `authlib`'s
CVE-2025-69784 8.8 0.01% 1 0 2026-03-16T21:35:35 A local, non-privileged attacker can abuse a vulnerable IOCTL interface exposed
CVE-2025-69768 7.5 0.04% 4 0 2026-03-16T21:35:34 SQL Injection vulnerability in Chyrp v.2.5.2 and before allows a remote attacker
CVE-2025-69809 9.8 0.04% 4 0 2026-03-16T21:34:38 A write-what-where condition in p2r3 Bareiron commit 8e4d40 allows unauthenticat
CVE-2025-69808 9.1 0.07% 2 0 2026-03-16T21:34:38 An out-of-bounds memory access (OOB) in p2r3 Bareiron commit 8e4d40 allows unaut
CVE-2026-32626 9.6 0.14% 2 0 2026-03-16T20:34:47.637000 AnythingLLM is an application that turns pieces of content into context that any
CVE-2026-4252 9.8 0.14% 3 0 2026-03-16T18:32:15 A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue
CVE-2026-4254 9.8 0.05% 3 0 2026-03-16T18:32:15 A weakness has been identified in Tenda AC8 up to 16.03.50.11. This vulnerabilit
CVE-2026-23862 7.8 0.06% 1 0 2026-03-16T18:32:15 Dell ThinOS 10 versions prior to ThinOS 2602_10.0573, contain an Improper Neutra
CVE-2025-62319 9.8 0.03% 1 0 2026-03-16T18:32:14 Boolean-Based SQL Injection is a type of blind SQL injection where an attacker m
CVE-2025-47813 4.3 20.96% 5 0 template 2026-03-16T18:32:03 loginok.html in Wing FTP Server before 7.4.4 discloses the full local installati
CVE-2026-4092 None 1.01% 1 1 2026-03-16T17:08:24 ### Impact Allows an attacker to perform a "Path Traversal" attack to modify fil
CVE-2026-32302 8.1 0.01% 1 0 2026-03-16T17:07:29 ## Summary In affected versions of `openclaw`, browser-originated WebSocket conn
CVE-2026-32301 9.3 0.04% 1 0 2026-03-16T17:07:19 ### Summary Centrifugo is vulnerable to Server-Side Request Forgery (SSRF) when
CVE-2026-32306 10.0 0.23% 1 0 2026-03-16T17:06:59 ### Summary The telemetry aggregation API accepts user-controlled `aggregationT
CVE-2026-32308 7.6 0.03% 1 0 2026-03-16T17:06:50 ### Summary The Markdown viewer component renders Mermaid diagrams with `securi
CVE-2026-31882 7.5 0.19% 1 0 2026-03-16T17:06:34 # SSE Authentication Bypass in Basic Auth Mode ## Summary When Dagu is configu
CVE-2026-26954 10.0 0.05% 2 0 2026-03-16T17:05:29 ### Summary It is possible to obtain arrays containing `Function`, which allows
CVE-2026-32614 7.5 0.02% 1 0 2026-03-16T16:37:11 ## Overview The current SM9 decryption implementation contains an infinity-poin
CVE-2026-31886 9.1 0.08% 2 0 2026-03-16T16:36:36 ## 1. Vulnerability Summary The `dagRunId` request field accepted by the inline
CVE-2026-3476 7.8 0.02% 1 0 2026-03-16T16:16:16.600000 A Code Injection vulnerability affecting SOLIDWORKS Desktop from Release 2025 th
CVE-2026-4182 9.8 0.06% 2 0 2026-03-16T15:30:59 A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unkn
CVE-2026-4255 None 0.02% 1 0 2026-03-16T15:30:59 A DLL search order hijacking vulnerability in Thermalright TR-VISION HOME on Win
CVE-2026-4188 8.8 0.04% 3 0 2026-03-16T15:30:58 A security flaw has been discovered in D-Link DIR-619L 2.06B01. The affected ele
CVE-2026-4214 8.8 0.04% 2 0 2026-03-16T15:30:58 A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L,
CVE-2026-4227 8.8 0.04% 2 0 2026-03-16T15:30:58 A security vulnerability has been detected in LB-LINK BL-WR9000 2.4.9. The impac
CVE-2026-4226 8.8 0.04% 2 0 2026-03-16T15:30:58 A weakness has been identified in LB-LINK BL-WR9000 2.4.9. The affected element
CVE-2026-4211 8.8 0.04% 1 0 2026-03-16T15:30:58 A weakness has been identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, D
CVE-2026-3081 7.8 0.06% 1 0 2026-03-16T15:30:57 GStreamer H.266 Codec Parser Stack-based Buffer Overflow Remote Code Execution V
CVE-2026-3558 8.1 0.03% 1 0 2026-03-16T15:30:57 Philips Hue Bridge HomeKit Accessory Protocol Transient Pairing Mode Authenticat
CVE-2026-3556 8.8 0.07% 1 0 2026-03-16T15:30:57 Philips Hue Bridge HomeKit Pair-Setup Heap-based Buffer Overflow Remote Code Exe
CVE-2026-3555 8.0 0.05% 1 0 2026-03-16T15:30:57 Philips Hue Bridge Zigbee Stack Custom Command Handler Heap-based Buffer Overflo
CVE-2026-3559 8.1 0.03% 1 0 2026-03-16T15:30:57 Philips Hue Bridge HomeKit Accessory Protocol Static Nonce Authentication Bypass
CVE-2026-4163 9.8 0.16% 4 0 2026-03-16T15:30:57 A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects th
CVE-2026-4212 8.8 0.04% 2 0 2026-03-16T15:30:57 A security vulnerability has been detected in D-Link DNS-120, DNR-202L, DNS-315L
CVE-2026-4201 7.3 0.04% 1 0 2026-03-16T15:30:57 A weakness has been identified in glowxq glowxq-oj up to 6f7c723090472057252040f
CVE-2026-3085 8.8 0.25% 1 0 2026-03-16T15:30:56 GStreamer rtpqdm2depay Heap-based Buffer Overflow Remote Code Execution Vulnerab
CVE-2026-3082 7.8 0.06% 1 0 2026-03-16T15:30:56 GStreamer JPEG Parser Heap-based Buffer Overflow Remote Code Execution Vulnerabi
CVE-2026-3838 8.8 1.58% 2 0 2026-03-16T15:30:56 Unraid Update Request Path Traversal Remote Code Execution Vulnerability. This v
CVE-2026-4164 9.8 0.17% 4 0 2026-03-16T15:30:56 A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is the function Del
CVE-2026-3561 8.0 0.11% 1 0 2026-03-16T15:30:56 Philips Hue Bridge hk_hap characteristics Heap-based Buffer Overflow Remote Code
CVE-2026-4170 9.8 0.15% 2 0 2026-03-16T15:30:56 A weakness has been identified in Topsec TopACM 3.0. Affected by this vulnerabil
CVE-2026-4183 9.8 0.06% 3 0 2026-03-16T15:30:56 A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected
CVE-2026-4167 8.8 0.04% 3 0 2026-03-16T15:30:56 A vulnerability was determined in Belkin F9K1122 1.00.33. This affects the funct
CVE-2026-4187 5.3 0.06% 1 0 2026-03-16T15:30:56 A vulnerability was identified in Tiandy Easy7 Integrated Management Platform 7.
CVE-2026-4169 2.4 0.03% 1 0 2026-03-16T15:30:56 A security flaw has been discovered in Tecnick TCExam up to 16.6.0. Affected is
CVE-2026-28521 7.7 0.01% 2 0 2026-03-16T15:30:55 arduino-TuyaOpen before version 1.2.1 contains an out-of-bounds memory read vuln
CVE-2026-28520 8.4 0.01% 2 0 2026-03-16T15:30:55 arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vul
CVE-2026-2493 7.5 10.28% 2 0 2026-03-16T15:30:55 IceWarp collaboration Directory Traversal Information Disclosure Vulnerability.
CVE-2026-2920 7.8 0.06% 1 0 2026-03-16T15:30:55 GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerabi
CVE-2026-2922 7.8 0.06% 1 0 2026-03-16T15:30:55 GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerabil
CVE-2026-2923 7.8 0.06% 1 0 2026-03-16T15:30:55 GStreamer DVB Subtitles Out-Of-Bounds Write Remote Code Execution Vulnerability.
CVE-2026-3084 7.8 0.06% 1 0 2026-03-16T15:30:55 GStreamer H.266 Codec Parser Integer Underflow Remote Code Execution Vulnerabili
CVE-2026-31386 7.2 0.16% 1 0 2026-03-16T15:30:55 OpenLiteSpeed and LSWS Enterprise provided by LiteSpeed Technologies contain an
CVE-2026-1947 7.5 0.03% 2 0 2026-03-16T15:30:54 The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vuln
CVE-2026-32746 9.8 0.04% 1 0 2026-03-16T15:30:40 telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMO
CVE-2025-13779 8.3 0.03% 1 0 2026-03-16T14:54:11.293000 Missing authentication for critical function vulnerability in ABB AWIN GW100 rev
CVE-2026-0956 7.8 0.01% 1 0 2026-03-16T14:54:11.293000 There is a memory corruption vulnerability due to an out-of-bounds read when loa
CVE-2026-25819 7.5 0.22% 1 0 2026-03-16T14:54:11.293000 HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx b
CVE-2026-2890 7.5 0.05% 1 0 2026-03-16T14:54:11.293000 The Formidable Forms plugin for WordPress is vulnerable to a payment integrity b
CVE-2026-31917 8.5 0.03% 1 0 2026-03-16T14:54:11.293000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-32304 9.8 0.08% 1 0 2026-03-16T14:54:11.293000 Locutus brings stdlibs of other programming languages to JavaScript for educatio
CVE-2026-32319 7.5 0.06% 1 0 2026-03-16T14:54:11.293000 Ella Core is a 5G core designed for private networks. Prior to 1.5.1, Ella Core
CVE-2016-20030 9.8 0.06% 1 0 2026-03-16T14:53:46.157000 ZKTeco ZKBioSecurity 3.0 contains a user enumeration vulnerability that allows u
CVE-2026-32426 7.5 0.11% 2 0 2026-03-16T14:53:46.157000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-32366 8.5 0.03% 1 0 2026-03-16T14:53:46.157000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-2476 7.6 0.03% 1 0 2026-03-16T14:53:07.390000 Mattermost Plugins versions <=2.0.3.0 fail to properly mask sensitive configurat
CVE-2026-3557 8.0 0.14% 1 0 2026-03-16T14:53:07.390000 Philips Hue Bridge hap_pair_verify_handler Sub-TLV Parsing Heap-based Buffer Ove
CVE-2026-3560 8.8 0.07% 1 0 2026-03-16T14:53:07.390000 Philips Hue Bridge HomeKit hk_hap_pair_storage_put Heap-based Buffer Overflow Re
CVE-2026-4181 9.8 0.06% 2 0 2026-03-16T14:53:07.390000 A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an
CVE-2026-4184 9.8 0.06% 2 0 2026-03-16T14:53:07.390000 A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulne
CVE-2026-4213 8.8 0.08% 1 0 2026-03-16T14:53:07.390000 A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS
CVE-2026-4206 6.3 0.43% 1 0 2026-03-16T14:53:07.390000 A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-32
CVE-2026-4172 7.2 0.04% 1 0 2026-03-16T14:53:07.390000 A vulnerability was detected in TRENDnet TEW-632BRP 1.010B32. This affects an un
CVE-2026-3227 0 0.42% 1 0 2026-03-16T14:53:07.390000 A command injection vulnerability was identified in TP-Link TL-WR802N v4, TL-WR8
CVE-2026-26795 9.8 0.68% 1 0 2026-03-16T14:18:27.577000 GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulner
CVE-2026-3910 8.8 21.89% 8 0 2026-03-13T22:00:01.403000 Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allow
CVE-2026-3909 8.8 27.12% 10 0 2026-03-13T21:32:59 Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a re
CVE-2026-26791 9.8 0.68% 1 0 2026-03-13T21:32:49 GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulner
CVE-2026-26792 9.8 0.68% 1 0 2026-03-13T21:32:48 GL-iNet GL-AR300M16 v4.3.11 was discovered to contain multiple command injection
CVE-2026-32422 8.5 0.03% 2 0 2026-03-13T21:32:00 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-32368 8.5 0.03% 2 0 2026-03-13T21:31:59 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-32358 7.6 0.03% 1 0 2026-03-13T21:31:59 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-32400 7.5 0.11% 1 0 2026-03-13T21:31:59 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22202 8.1 0.01% 1 0 2026-03-13T21:31:58 wpDiscuz before 7.6.47 contains a cross-site request forgery vulnerability that
CVE-2026-25818 9.1 0.02% 1 0 2026-03-13T21:31:58 HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx b
CVE-2026-31922 8.5 0.03% 1 0 2026-03-13T21:31:58 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-0957 7.8 0.01% 1 0 2026-03-13T21:31:57 There is a memory corruption vulnerability due to an out-of-bounds write when lo
CVE-2026-0955 7.8 0.01% 1 0 2026-03-13T21:31:57 There is a memory corruption vulnerability due to an out-of-bounds read when loa
CVE-2026-0954 7.8 0.01% 1 0 2026-03-13T21:31:57 There is a memory corruption vulnerability due to an out-of-bounds write when lo
CVE-2026-25817 8.8 0.26% 1 0 2026-03-13T21:31:57 HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx b
CVE-2026-25823 9.8 0.19% 1 0 2026-03-13T21:31:57 HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx b
CVE-2025-13777 8.3 0.03% 1 0 2026-03-13T21:31:49 Authentication bypass by capture-replay vulnerability in ABB AWIN GW100 rev.2, A
CVE-2026-32621 9.9 0.03% 3 0 2026-03-13T20:51:15 ### Impact A vulnerability exists in query plan execution within the gateway th
CVE-2026-31899 7.5 0.04% 1 1 2026-03-13T18:57:34 ## Summary Kozea/CairoSVG has exponential denial of service via recursive `<use
CVE-2026-26793 9.8 0.68% 1 0 2026-03-13T16:02:22.993000 GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulner
CVE-2026-28356 7.5 0.54% 1 0 2026-03-12T18:32:23 ## Summary The `parse_options_header()` function in `multipart.py` uses a regul
CVE-2026-32136 9.8 0.79% 1 0 2026-03-12T14:47:49 VULNERABILITY: HTTP/2 Cleartext (h2c) Upgrade Authentication Bypass ============
CVE-2026-26130 7.5 1.59% 1 0 2026-03-11T21:11:31 # Microsoft Security Advisory CVE-2026-26130 – .NET Denial of Service Vulnerabil
CVE-2026-1965 6.5 0.05% 1 0 2026-03-11T15:32:59 libcurl can in some circumstances reuse the wrong connection when asked to do an
CVE-2026-2413 7.5 14.93% 3 2 template 2026-03-11T06:31:47 The Ally – Web Accessibility & Usability plugin for WordPress is vulnerable to S
CVE-2026-26123 5.5 0.04% 1 0 2026-03-10T21:32:18 Cwe is not in rca categories in Microsoft Authenticator allows an unauthorized a
CVE-2026-25185 5.3 0.10% 1 0 2026-03-10T18:31:30 Exposure of sensitive information to an unauthorized actor in Windows Shell Link
CVE-2025-14558 7.2 41.56% 1 2 2026-03-09T15:30:47 The rtsol(8) and rtsold(8) programs do not validate the domain search list optio
CVE-2026-2256 6.5 2.31% 1 1 2026-03-04T21:14:09 A Command Injection vulnerability in ModelScope's MS-Agent versions v1.6.0rc1 an
CVE-2026-25646 8.1 0.07% 1 0 2026-02-13T20:43:44.690000 LIBPNG is a reference library for use in applications that read, create, and man
CVE-2025-12420 9.8 0.05% 1 1 2026-01-27T21:32:42 A vulnerability has been identified in the ServiceNow AI Platform that could ena
CVE-2025-32463 9.4 26.52% 2 83 2025-10-22T00:34:26 Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswi
CVE-2025-59284 3.3 0.03% 2 1 2025-10-14T18:30:47 Exposure of sensitive information to an unauthorized actor in Windows NTLM allow
CVE-2025-53773 7.8 0.64% 1 0 2025-08-15T17:01:01.673000 Improper neutralization of special elements used in a command ('command injectio
CVE-2024-45163 9.1 0.11% 2 0 2024-08-22T18:31:21 The Mirai botnet through 2024-08-19 mishandles simultaneous TCP connections to t
CVE-2026-32628 0 0.03% 3 0 N/A
CVE-2026-24901 0 0.00% 6 0 N/A
CVE-2026-25770 0 0.00% 2 0 N/A
CVE-2025-30201 0 0.28% 2 0 N/A
CVE-2026-30881 0 0.03% 2 0 N/A
CVE-2026-32616 0 0.03% 1 0 N/A
CVE-2026-32627 0 0.02% 1 0 N/A
CVE-2026-32708 0 0.02% 2 0 N/A
CVE-2026-32729 0 0.06% 1 0 N/A
CVE-2026-31852 0 0.10% 1 0 N/A
CVE-2026-26969 0 0.00% 1 0 N/A
CVE-2026-32133 0 0.04% 1 0 N/A
CVE-2026-31944 0 0.03% 1 0 N/A

CVE-2026-2603
(8.1 HIGH)

EPSS: 0.00%

updated 2026-03-18T02:16:24.813000

2 posts

A flaw was found in Keycloak. A remote attacker could bypass security controls by sending a valid SAML response from an external Identity Provider (IdP) to the Keycloak SAML endpoint for IdP-initiated broker logins. This allows the attacker to complete broker logins even when the SAML Identity Provider is disabled, leading to unauthorized authentication.

2 repos

https://github.com/mbanyamer/CVE-2026-26030-Microsoft-Semantic-Kernel-1.39.4-RCE

https://github.com/piiiico/mcp-check

thehackerwire@mastodon.social at 2026-03-18T02:45:25.000Z ##

🟠 CVE-2026-2603 - High (8.1)

A flaw was found in Keycloak. A remote attacker could bypass security controls by sending a valid SAML response from an external Identity Provider (IdP) to the Keycloak SAML endpoint for IdP-initiated broker logins. This allows the attacker to com...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T02:45:25.000Z ##

🟠 CVE-2026-2603 - High (8.1)

A flaw was found in Keycloak. A remote attacker could bypass security controls by sending a valid SAML response from an external Identity Provider (IdP) to the Keycloak SAML endpoint for IdP-initiated broker logins. This allows the attacker to com...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2092
(7.7 HIGH)

EPSS: 0.00%

updated 2026-03-18T02:16:24.577000

2 posts

A flaw was found in Keycloak. Keycloak's Security Assertion Markup Language (SAML) broker endpoint does not properly validate encrypted assertions when the overall SAML response is not signed. An attacker with a valid signed SAML assertion can exploit this by crafting a malicious SAML response. This allows the attacker to inject an encrypted assertion for an arbitrary principal, leading to unautho

thehackerwire@mastodon.social at 2026-03-18T02:45:15.000Z ##

🟠 CVE-2026-2092 - High (7.7)

A flaw was found in Keycloak. Keycloak's Security Assertion Markup Language (SAML) broker endpoint does not properly validate encrypted assertions when the overall SAML response is not signed. An attacker with a valid signed SAML assertion can exp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T02:45:15.000Z ##

🟠 CVE-2026-2092 - High (7.7)

A flaw was found in Keycloak. Keycloak's Security Assertion Markup Language (SAML) broker endpoint does not properly validate encrypted assertions when the overall SAML response is not signed. An attacker with a valid signed SAML assertion can exp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28500
(8.6 HIGH)

EPSS: 0.00%

updated 2026-03-18T02:16:24.227000

2 posts

Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification mechanism. While the function is designed to warn users when loading models from non-official sources, the use of the silent=True parameter completely sup

thehackerwire@mastodon.social at 2026-03-18T02:45:05.000Z ##

🟠 CVE-2026-28500 - High (8.6)

Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T02:45:05.000Z ##

🟠 CVE-2026-28500 - High (8.6)

Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32838
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-18T00:30:59

2 posts

Edimax GS-5008PL firmware version 1.00.54 and prior use cleartext HTTP for the web management interface without implementing TLS or SSL encryption. Attackers on the same network can intercept management traffic to capture administrator credentials and sensitive configuration data.

thehackerwire@mastodon.social at 2026-03-17T22:59:49.000Z ##

🟠 CVE-2026-32838 - High (7.5)

Edimax GS-5008PL firmware version 1.00.54 and prior use cleartext HTTP for the web management interface without implementing TLS or SSL encryption. Attackers on the same network can intercept management traffic to capture administrator credentials...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T22:59:49.000Z ##

🟠 CVE-2026-32838 - High (7.5)

Edimax GS-5008PL firmware version 1.00.54 and prior use cleartext HTTP for the web management interface without implementing TLS or SSL encryption. Attackers on the same network can intercept management traffic to capture administrator credentials...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1376
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-18T00:30:59

2 posts

IBM i 7.6 could allow a remote attacker to cause a denial of service using failed authentication connections due to improper allocation of resources.

thehackerwire@mastodon.social at 2026-03-17T22:31:49.000Z ##

🟠 CVE-2026-1376 - High (7.5)

IBM i 7.6 could allow a remote attacker to cause a denial of service using failed authentication connections due to improper allocation of resources.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T22:31:49.000Z ##

🟠 CVE-2026-1376 - High (7.5)

IBM i 7.6 could allow a remote attacker to cause a denial of service using failed authentication connections due to improper allocation of resources.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3888
(7.9 HIGH)

EPSS: 0.00%

updated 2026-03-18T00:30:54

2 posts

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

thehackerwire@mastodon.social at 2026-03-17T19:58:45.000Z ##

🟠 CVE-2026-3888 - High (7.8)

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LT...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:58:45.000Z ##

🟠 CVE-2026-3888 - High (7.8)

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LT...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22727
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-17T23:16:17.470000

2 posts

Unprotected internal endpoints in Cloud Foundry Capi Release 1.226.0 and below, and CF Deployment v54.9.0 and below on all platforms allows any user who has bypassed the firewall to potentially replace droplets and therefore applications allowing them to access secure application information.

thehackerwire@mastodon.social at 2026-03-17T23:32:31.000Z ##

🟠 CVE-2026-22727 - High (7.5)

Unprotected internal endpoints in Cloud Foundry Capi Release 1.226.0 and below, and CF Deployment v54.9.0 and below on all platforms allows any user who has bypassed the firewall to potentially replace droplets and therefore applications allowing ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T23:32:31.000Z ##

🟠 CVE-2026-22727 - High (7.5)

Unprotected internal endpoints in Cloud Foundry Capi Release 1.226.0 and below, and CF Deployment v54.9.0 and below on all platforms allows any user who has bypassed the firewall to potentially replace droplets and therefore applications allowing ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21994
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-17T23:16:17.310000

2 posts

Vulnerability in the Oracle Edge Cloud Infrastructure Designer and Visualisation Toolkit product of Oracle Open Source Projects (component: Desktop). The supported version that is affected is 0.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Edge Cloud Infrastructure Designer and Visualisation Toolkit. Successful attacks of

thehackerwire@mastodon.social at 2026-03-17T23:32:22.000Z ##

🔴 CVE-2026-21994 - Critical (9.8)

Vulnerability in the Oracle Edge Cloud Infrastructure Designer and Visualisation Toolkit product of Oracle Open Source Projects (component: Desktop). The supported version that is affected is 0.3.0. Easily exploitable vulnerability allows unauth...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T23:32:22.000Z ##

🔴 CVE-2026-21994 - Critical (9.8)

Vulnerability in the Oracle Edge Cloud Infrastructure Designer and Visualisation Toolkit product of Oracle Open Source Projects (component: Desktop). The supported version that is affected is 0.3.0. Easily exploitable vulnerability allows unauth...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20643
(0 None)

EPSS: 0.00%

updated 2026-03-17T23:16:17.193000

3 posts

A cross-origin issue in the Navigation API was addressed with improved input validation. This issue is fixed in Background Security Improvements for iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2. Processing maliciously crafted web content may bypass Same Origin Policy.

1 repos

https://github.com/zeroxjf/WebKit-NavigationAPI-SOP-Bypass

oversecurity@mastodon.social at 2026-03-18T01:20:17.000Z ##

Apple pushes first Background Security Improvements update to fix WebKit flaw

Apple has released its first Background Security Improvements update to fix a WebKit flaw tracked as CVE-2026-20643 on iPhones, iPads, and Macs...

🔗️ [Bleepingcomputer] link.is.it/9V9yPV

##

forest_watch_impress@rss-mstdn.studiofreesia.com at 2026-03-17T22:52:00.000Z ##

iPhone/iPad/Macに脆弱性、Appleが「バックグラウンドセキュリティ改善」を実施/クロスオリジン問題「CVE-2026-20643」を解決
forest.watch.impress.co.jp/doc

#forest_watch_impress #Apple #iOS #iPadOS #セキュリティ #脆弱性 #システム_ファイル #システム

##

oversecurity@mastodon.social at 2026-03-18T01:20:17.000Z ##

Apple pushes first Background Security Improvements update to fix WebKit flaw

Apple has released its first Background Security Improvements update to fix a WebKit flaw tracked as CVE-2026-20643 on iPhones, iPads, and Macs...

🔗️ [Bleepingcomputer] link.is.it/9V9yPV

##

CVE-2025-14031
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-17T23:16:15.863000

2 posts

IBM Sterling B2B Integrator and and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 could allow an unauthenticated attacker to send a specially crafted request that causes the application to crash.

thehackerwire@mastodon.social at 2026-03-17T23:32:41.000Z ##

🟠 CVE-2025-14031 - High (7.5)

IBM Sterling B2B Integrator and and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 could allow an unauthenticated attacker to send a specially crafted request that causes th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T23:32:41.000Z ##

🟠 CVE-2025-14031 - High (7.5)

IBM Sterling B2B Integrator and and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 could allow an unauthenticated attacker to send a specially crafted request that causes th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32841
(8.1 HIGH)

EPSS: 0.00%

updated 2026-03-17T22:16:15.043000

4 posts

Edimax GS-5008PL firmware version 1.00.54 and prior contain an authentication bypass vulnerability that allows unauthenticated attackers to access the management interface. Attackers can exploit the global authentication flag mechanism to gain administrative access without credentials after any user authenticates, enabling unauthorized password changes, firmware uploads, and configuration modifica

offseq at 2026-03-18T00:00:38.614Z ##

⚠️ CRITICAL: Edimax GS-5008PL (≤1.00.54) has an auth bypass flaw (CVE-2026-32841). Attackers can gain admin access with no creds after any login. Isolate devices, restrict access, monitor logs — patch ASAP when available. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-17T22:31:40.000Z ##

🟠 CVE-2026-32841 - High (8.1)

Edimax GS-5008PL firmware version 1.00.54 and prior contain an authentication bypass vulnerability that allows unauthenticated attackers to access the management interface. Attackers can exploit the global authentication flag mechanism to gain adm...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-18T00:00:38.000Z ##

⚠️ CRITICAL: Edimax GS-5008PL (≤1.00.54) has an auth bypass flaw (CVE-2026-32841). Attackers can gain admin access with no creds after any login. Isolate devices, restrict access, monitor logs — patch ASAP when available. radar.offseq.com/threat/cve-20 #OffSeq #CVE202632841 #IoTSecurity

##

thehackerwire@mastodon.social at 2026-03-17T22:31:40.000Z ##

🟠 CVE-2026-32841 - High (8.1)

Edimax GS-5008PL firmware version 1.00.54 and prior contain an authentication bypass vulnerability that allows unauthenticated attackers to access the management interface. Attackers can exploit the global authentication flag mechanism to gain adm...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4064
(8.3 HIGH)

EPSS: 0.00%

updated 2026-03-17T21:31:53

2 posts

Missing authorization checks on multiple gRPC service endpoints in PowerShell Universal before 2026.1.4 allows an authenticated user with any valid token to bypass role-based access controls and perform privileged operations — including reading sensitive data, creating or deleting resources, and disrupting service operations — via crafted gRPC requests.

thehackerwire@mastodon.social at 2026-03-17T21:49:11.000Z ##

🟠 CVE-2026-4064 - High (8.3)

Missing authorization checks on multiple gRPC service endpoints in PowerShell Universal before 2026.1.4 allows an authenticated user with any valid token to bypass role-based access controls and perform privileged operations — including reading ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T21:49:11.000Z ##

🟠 CVE-2026-4064 - High (8.3)

Missing authorization checks on multiple gRPC service endpoints in PowerShell Universal before 2026.1.4 allows an authenticated user with any valid token to bypass role-based access controls and perform privileged operations — including reading ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4295
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-17T21:31:53

2 posts

Improper trust boundary enforcement in Kiro IDE before version 0.8.0 on all supported platforms might allow a remote unauthenticated threat actor to execute arbitrary code via maliciously crafted project directory files that bypass workspace trust protections when a local user opens the directory. To remediate this issue, users should upgrade to version 0.8.0 or higher.

thehackerwire@mastodon.social at 2026-03-17T20:48:25.000Z ##

🟠 CVE-2026-4295 - High (7.8)

Improper trust boundary enforcement in Kiro IDE before version 0.8.0 on all supported platforms might allow a remote unauthenticated threat actor to execute arbitrary code via maliciously crafted project directory files that bypass workspace trust...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T20:48:25.000Z ##

🟠 CVE-2026-4295 - High (7.8)

Improper trust boundary enforcement in Kiro IDE before version 0.8.0 on all supported platforms might allow a remote unauthenticated threat actor to execute arbitrary code via maliciously crafted project directory files that bypass workspace trust...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32981
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-17T21:31:53

2 posts

A path traversal vulnerability was identified in Ray Dashboard (default port 8265) in Ray versions prior to 2.8.1. Due to improper validation and sanitization of user-supplied paths in the static file handling mechanism, an attacker can use traversal sequences (e.g., ../) to access files outside the intended static directory, resulting in local file disclosure.

thehackerwire@mastodon.social at 2026-03-17T20:24:21.000Z ##

🟠 CVE-2026-32981 - High (7.5)

A path traversal vulnerability was identified in Ray Dashboard (default port 8265) in Ray versions prior to 2.8.1. Due to improper validation and sanitization of user-supplied paths in the static file handling mechanism, an attacker can use traver...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T20:24:21.000Z ##

🟠 CVE-2026-32981 - High (7.5)

A path traversal vulnerability was identified in Ray Dashboard (default port 8265) in Ray versions prior to 2.8.1. Due to improper validation and sanitization of user-supplied paths in the static file handling mechanism, an attacker can use traver...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-64301
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-17T21:31:53

2 posts

An out‑of‑bounds write vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out‑of‑bounds write, potentially leading to code execution.

thehackerwire@mastodon.social at 2026-03-17T19:31:06.000Z ##

🟠 CVE-2025-64301 - High (7.8)

An out‑of‑bounds write vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out‑of‑bounds write, potentially leading to code exec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:31:06.000Z ##

🟠 CVE-2025-64301 - High (7.8)

An out‑of‑bounds write vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out‑of‑bounds write, potentially leading to code exec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22182
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-17T21:31:44

1 posts

wpDiscuz before 7.6.47 contains an unauthenticated denial of service vulnerability that allows anonymous users to trigger mass notification emails by exploiting the checkNotificationType() function. Attackers can repeatedly call the wpdiscuz-ajax.php endpoint with arbitrary postId and comment_id parameters to flood subscribers with notifications, as the handler lacks nonce verification, authentica

thehackerwire@mastodon.social at 2026-03-14T18:00:36.000Z ##

🟠 CVE-2026-22182 - High (7.5)

wpDiscuz before 7.6.47 contains an unauthenticated denial of service vulnerability that allows anonymous users to trigger mass notification emails by exploiting the checkNotificationType() function. Attackers can repeatedly call the wpdiscuz-ajax....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66342
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-17T21:16:18.250000

2 posts

A type confusion vulnerability exists in the EMF functionality of Canva Affinity. A specially crafted EMF file can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution.

thehackerwire@mastodon.social at 2026-03-17T19:30:56.000Z ##

🟠 CVE-2025-66342 - High (7.8)

A type confusion vulnerability exists in the EMF functionality of Canva Affinity. A specially crafted EMF file can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:30:56.000Z ##

🟠 CVE-2025-66342 - High (7.8)

A type confusion vulnerability exists in the EMF functionality of Canva Affinity. A specially crafted EMF file can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22193
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-17T20:27:42.513000

1 posts

wpDiscuz before 7.6.47 contains an SQL injection vulnerability in the getAllSubscriptions() function where string parameters lack proper quote escaping in SQL queries. Attackers can inject malicious SQL code through email, activation_key, subscription_date, and imported_from parameters to manipulate database queries and extract sensitive information.

thehackerwire@mastodon.social at 2026-03-14T18:00:26.000Z ##

🟠 CVE-2026-22193 - High (8.1)

wpDiscuz before 7.6.47 contains an SQL injection vulnerability in the getAllSubscriptions() function where string parameters lack proper quote escaping in SQL queries. Attackers can inject malicious SQL code through email, activation_key, subscrip...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32600
(8.2 HIGH)

EPSS: 0.01%

updated 2026-03-17T19:25:09.150000

1 posts

xml-security is a library that implements XML signatures and encryption. Prior to versions 2.3.1 and 1.13.9, XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256-gcm lack validation of the authentication tag length. An attacker can use this to brute-force an authentication tag, recover the GHASH key, and decrypt the encrypted nodes. It also allows to forge arbitrary ciphertexts wit

thehackerwire@mastodon.social at 2026-03-16T19:15:48.000Z ##

🟠 CVE-2026-32600 - High (8.2)

xml-security is a library that implements XML signatures and encryption. Prior to versions 2.3.1 and 1.13.9, XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256-gcm lack validation of the authentication tag length. An attacker can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25769
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-03-17T19:16:00.957000

2 posts

Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using cluster mode (master/worker architecture) and any organization with a compromised worker node (e.g., through initial access, insider threat, or supply chain

1 repos

https://github.com/hakaioffsec/CVE-2026-25769

thehackerwire@mastodon.social at 2026-03-17T19:00:48.000Z ##

🔴 CVE-2026-25769 - Critical (9.1)

Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using clu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:00:48.000Z ##

🔴 CVE-2026-25769 - Critical (9.1)

Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using clu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2921
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-17T18:59:00.343000

1 posts

GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of palette data in AVI files. The i

thehackerwire@mastodon.social at 2026-03-16T20:00:42.000Z ##

🟠 CVE-2026-2921 - High (7.8)

GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vul...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3083
(8.8 HIGH)

EPSS: 0.36%

updated 2026-03-17T18:57:46.047000

1 posts

GStreamer rtpqdm2depay Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of X-QDM RTP payload elements.

thehackerwire@mastodon.social at 2026-03-16T19:01:02.000Z ##

🟠 CVE-2026-3083 - High (8.8)

GStreamer rtpqdm2depay Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3086
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-17T18:56:36.537000

1 posts

GStreamer H.266 Codec Parser Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of APS units. The issue

2 repos

https://github.com/Worthes/CVE-2026-30863-Exploit

https://github.com/drkim-dev/CVE-2026-30862

thehackerwire@mastodon.social at 2026-03-16T19:13:18.000Z ##

🟠 CVE-2026-3086 - High (7.8)

GStreamer H.266 Codec Parser Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28430
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-03-17T18:53:49.153000

2 posts

Chamilo LMS is a learning management system. Prior to version 1.11.34, there is an unauthenticated SQL injection vulnerability which allows remote attackers to execute arbitrary SQL commands via the custom_dates parameter. By chaining this with a predictable legacy password reset mechanism, an attacker can achieve full administrative account takeover without any prior credentials. The vulnerabilit

offseq at 2026-03-17T00:00:46.958Z ##

Chamilo LMS < 1.11.34 has a CRITICAL SQL injection vuln (CVE-2026-28430, CVSS 9.3). Unauth attackers can hijack admin accounts & access PII. Upgrade to 1.11.34 ASAP. No public exploits yet. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-17T00:00:46.000Z ##

Chamilo LMS < 1.11.34 has a CRITICAL SQL injection vuln (CVE-2026-28430, CVSS 9.3). Unauth attackers can hijack admin accounts & access PII. Upgrade to 1.11.34 ASAP. No public exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Chamilo #InfoSec

##

CVE-2026-30875
(8.8 HIGH)

EPSS: 0.15%

updated 2026-03-17T18:53:29.480000

2 posts

Chamilo LMS is a learning management system. Prior to version 1.11.36, an arbitrary file upload vulnerability in the H5P Import feature allows authenticated users with Teacher role to achieve Remote Code Execution (RCE). The H5P package validation only checks if h5p.json exists but doesn't block .htaccess or PHP files with alternative extensions. An attacker uploads a crafted H5P package containin

thehackerwire@mastodon.social at 2026-03-16T20:17:16.000Z ##

🟠 CVE-2026-30875 - High (8.8)

Chamilo LMS is a learning management system. Prior to version 1.11.36, an arbitrary file upload vulnerability in the H5P Import feature allows authenticated users with Teacher role to achieve Remote Code Execution (RCE). The H5P package validation...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:17:16.000Z ##

🟠 CVE-2026-30875 - High (8.8)

Chamilo LMS is a learning management system. Prior to version 1.11.36, an arbitrary file upload vulnerability in the H5P Import feature allows authenticated users with Teacher role to achieve Remote Code Execution (RCE). The H5P package validation...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2673
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-17T18:31:38

2 posts

Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the 'DEFAULT' keyword. Impact summary: A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client's initial predicated

CVE-2026-32298
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-03-17T18:30:43

6 posts

The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by the 'cfg.lua' script, allowing an authenticated attacker to execute OS-level commands.

thehackerwire@mastodon.social at 2026-03-17T19:01:50.000Z ##

🔴 CVE-2026-32298 - Critical (9.1)

The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by the 'cfg.lua' script, allowing an authenticated attacker to execute OS-level commands.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:59:35.000Z ##

🔴 CVE-2026-32298 - Critical (9.1)

The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by the 'cfg.lua' script, allowing an authenticated attacker to execute OS-level commands.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:58:53.000Z ##

🔴 CVE-2026-32298 - Critical (9.1)

The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by the 'cfg.lua' script, allowing an authenticated attacker to execute OS-level commands.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:01:50.000Z ##

🔴 CVE-2026-32298 - Critical (9.1)

The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by the 'cfg.lua' script, allowing an authenticated attacker to execute OS-level commands.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:59:35.000Z ##

🔴 CVE-2026-32298 - Critical (9.1)

The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by the 'cfg.lua' script, allowing an authenticated attacker to execute OS-level commands.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:58:53.000Z ##

🔴 CVE-2026-32298 - Critical (9.1)

The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by the 'cfg.lua' script, allowing an authenticated attacker to execute OS-level commands.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32295
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-17T18:30:42

2 posts

JetKVM before 0.5.4 does not rate limit login requests, enabling brute-force attempts to guess credentials.

thehackerwire@mastodon.social at 2026-03-17T18:59:03.000Z ##

🟠 CVE-2026-32295 - High (7.5)

JetKVM before 0.5.4 does not rate limit login requests, enabling brute-force attempts to guess credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:59:03.000Z ##

🟠 CVE-2026-32295 - High (7.5)

JetKVM before 0.5.4 does not rate limit login requests, enabling brute-force attempts to guess credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32292
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-17T18:30:37

2 posts

The GL-iNet Comet (GL-RM1) KVM web interface does not limit login requests, enabling brute-force attempts to guess credentials.

thehackerwire@mastodon.social at 2026-03-17T18:58:54.000Z ##

🟠 CVE-2026-32292 - High (7.5)

The GL-iNet Comet (GL-RM1) KVM web interface does not limit login requests, enabling brute-force attempts to guess credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:58:54.000Z ##

🟠 CVE-2026-32292 - High (7.5)

The GL-iNet Comet (GL-RM1) KVM web interface does not limit login requests, enabling brute-force attempts to guess credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32297
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-17T18:16:17.137000

8 posts

The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an attacker to take complete control of a vulnerable system.

offseq at 2026-03-18T03:00:27.735Z ##

🚨 CVE-2026-32297 (CRITICAL, CVSS 9.3): ANGEET ES3 KVM allows unauthenticated remote file writes — attackers can take full control. Isolate & restrict access immediately. No patch yet. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-17T19:01:41.000Z ##

🟠 CVE-2026-32297 - High (7.5)

The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an attacker to take complete control of a vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:59:26.000Z ##

🟠 CVE-2026-32297 - High (7.5)

The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an attacker to take complete control of a vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:58:43.000Z ##

🟠 CVE-2026-32297 - High (7.5)

The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an attacker to take complete control of a vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-18T03:00:27.000Z ##

🚨 CVE-2026-32297 (CRITICAL, CVSS 9.3): ANGEET ES3 KVM allows unauthenticated remote file writes — attackers can take full control. Isolate & restrict access immediately. No patch yet. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202632297 #KVM #Vuln #Infosec

##

thehackerwire@mastodon.social at 2026-03-17T19:01:41.000Z ##

🟠 CVE-2026-32297 - High (7.5)

The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an attacker to take complete control of a vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:59:26.000Z ##

🟠 CVE-2026-32297 - High (7.5)

The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an attacker to take complete control of a vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:58:43.000Z ##

🟠 CVE-2026-32297 - High (7.5)

The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an attacker to take complete control of a vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32296
(8.2 HIGH)

EPSS: 0.00%

updated 2026-03-17T18:16:16.960000

10 posts

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a request to exhaust the system memory and terminate the KVM process.

thehackerwire@mastodon.social at 2026-03-17T22:01:18.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T21:02:23.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:58:06.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:59:44.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:59:13.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T22:01:18.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T21:02:23.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:58:06.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:59:44.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:59:13.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25534
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-03-17T18:16:15.063000

4 posts

### Impact Spinnaker updated URL Validation logic on user input to provide sanitation on user inputted URLs for clouddriver. However, they missed that Java URL objects do not correctly handle underscores on parsing. This led to a bypass of the previous CVE (CVE-2025-61916) through the use of carefully crafted URLs. Note, Spinnaker found this not just in that CVE, but in the existing URL validat

offseq at 2026-03-18T01:30:28.914Z ##

🚨 CRITICAL: CVE-2026-25534 SSRF in Spinnaker clouddriver-artifacts. Versions <2025.2.4 & select 2025.x allow SSRF via URL validation bypass. Patch to 2025.2.4+, 2025.3.1, 2025.4.1, or 2026.0.0 ASAP! Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-17T18:59:50.000Z ##

🔴 CVE-2026-25534 - Critical (9.1)

### Impact
Spinnaker updated URL Validation logic on user input to provide sanitation on user inputted URLs for clouddriver. However, they missed that Java URL objects do not correctly handle underscores on parsing. This led to a bypass of the p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-18T01:30:28.000Z ##

🚨 CRITICAL: CVE-2026-25534 SSRF in Spinnaker clouddriver-artifacts. Versions <2025.2.4 & select 2025.x allow SSRF via URL validation bypass. Patch to 2025.2.4+, 2025.3.1, 2025.4.1, or 2026.0.0 ASAP! Details: radar.offseq.com/threat/cve-20 #OffSeq #SSRF #Spinnaker

##

thehackerwire@mastodon.social at 2026-03-17T18:59:50.000Z ##

🔴 CVE-2026-25534 - Critical (9.1)

### Impact
Spinnaker updated URL Validation logic on user input to provide sanitation on user inputted URLs for clouddriver. However, they missed that Java URL objects do not correctly handle underscores on parsing. This led to a bypass of the p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4148
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-17T16:16:23.807000

4 posts

A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.

thehackerwire@mastodon.social at 2026-03-17T21:02:31.000Z ##

🟠 CVE-2026-4148 - High (8.8)

A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:58:16.000Z ##

🟠 CVE-2026-4148 - High (8.8)

A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T21:02:31.000Z ##

🟠 CVE-2026-4148 - High (8.8)

A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:58:16.000Z ##

🟠 CVE-2026-4148 - High (8.8)

A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28519
(8.8 HIGH)

EPSS: 0.01%

updated 2026-03-17T15:38:55.280000

2 posts

arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap buffer, potentially allowing execution of arbitrary code on affected embedded devices.

thehackerwire@mastodon.social at 2026-03-16T20:51:26.000Z ##

🟠 CVE-2026-28519 - High (8.8)

arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:51:26.000Z ##

🟠 CVE-2026-28519 - High (8.8)

arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4258
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-17T15:37:26

4 posts

All versions of the package sjcl are vulnerable to Improper Verification of Cryptographic Signature due to missing point-on-curve validation in sjcl.ecc.basicKey.publicKey(). An attacker can recover a victim's ECDH private key by sending crafted off-curve public keys and observing ECDH outputs. The dhJavaEc() function directly returns the raw x-coordinate of the scalar multiplication result (no ha

thehackerwire@mastodon.social at 2026-03-17T22:15:58.000Z ##

🟠 CVE-2026-4258 - High (7.5)

All versions of the package sjcl are vulnerable to Improper Verification of Cryptographic Signature due to missing point-on-curve validation in sjcl.ecc.basicKey.publicKey(). An attacker can recover a victim's ECDH private key by sending crafted o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-03-17T07:30:29.409Z ##

🚨 CVE-2026-4258 (HIGH): All sjcl versions affected by lack of public key validation could let remote attackers recover ECDH private keys. No patch yet — audit sjcl use, validate keys, avoid dhJavaEc()! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-17T22:15:58.000Z ##

🟠 CVE-2026-4258 - High (7.5)

All versions of the package sjcl are vulnerable to Improper Verification of Cryptographic Signature due to missing point-on-curve validation in sjcl.ecc.basicKey.publicKey(). An attacker can recover a victim's ECDH private key by sending crafted o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-17T07:30:29.000Z ##

🚨 CVE-2026-4258 (HIGH): All sjcl versions affected by lack of public key validation could let remote attackers recover ECDH private keys. No patch yet — audit sjcl use, validate keys, avoid dhJavaEc()! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #sjcl #Cryptography #Infosec

##

CVE-2026-30911
(8.1 HIGH)

EPSS: 0.02%

updated 2026-03-17T15:37:26

4 posts

Apache Airflow versions 3.1.0 through 3.1.7 missing authorization vulnerability in the Execution API's Human-in-the-Loop (HITL) endpoints that allows any authenticated task instance to read, approve, or reject HITL workflows belonging to any other task instance. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.

thehackerwire@mastodon.social at 2026-03-17T22:01:36.000Z ##

🟠 CVE-2026-30911 - High (8.1)

Apache Airflow versions 3.1.0 through 3.1.7 missing authorization vulnerability in the Execution API's Human-in-the-Loop (HITL) endpoints that allows any authenticated task instance to read, approve, or reject HITL workflows belonging to any other...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T21:02:43.000Z ##

🟠 CVE-2026-30911 - High (8.1)

Apache Airflow versions 3.1.0 through 3.1.7 missing authorization vulnerability in the Execution API's Human-in-the-Loop (HITL) endpoints that allows any authenticated task instance to read, approve, or reject HITL workflows belonging to any other...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T22:01:36.000Z ##

🟠 CVE-2026-30911 - High (8.1)

Apache Airflow versions 3.1.0 through 3.1.7 missing authorization vulnerability in the Execution API's Human-in-the-Loop (HITL) endpoints that allows any authenticated task instance to read, approve, or reject HITL workflows belonging to any other...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T21:02:43.000Z ##

🟠 CVE-2026-30911 - High (8.1)

Apache Airflow versions 3.1.0 through 3.1.7 missing authorization vulnerability in the Execution API's Human-in-the-Loop (HITL) endpoints that allows any authenticated task instance to read, approve, or reject HITL workflows belonging to any other...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4318
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-17T15:36:34

2 posts

A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formApLbConfig. This manipulation of the argument loadBalanceNameOld causes buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-17T19:58:36.000Z ##

🟠 CVE-2026-4318 - High (8.8)

A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formApLbConfig. This manipulation of the argument loadBalanceNameOld causes buffer overflow. The attack can be initiated remot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:58:36.000Z ##

🟠 CVE-2026-4318 - High (8.8)

A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formApLbConfig. This manipulation of the argument loadBalanceNameOld causes buffer overflow. The attack can be initiated remot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28779
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-17T15:36:23

2 posts

Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url. This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself. Users are recommended to upgrade to Apache

thehackerwire@mastodon.social at 2026-03-17T21:02:41.000Z ##

🟠 CVE-2026-28779 - High (7.5)

Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url.
This allows any application co-hosted under the same domain to capture valid Airfl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T21:02:41.000Z ##

🟠 CVE-2026-28779 - High (7.5)

Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url.
This allows any application co-hosted under the same domain to capture valid Airfl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32267(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-03-17T15:23:52

2 posts

### Summary A low-privilege user (or an unauthenticated user who has been sent a shared URL) can escalate their privileges to admin by abusing `UsersController->actionImpersonateWithToken`. Affected users should update to Craft 4.17.6 and 5.9.12 to mitigate the issue. ### Details This vulnerability allows any low-privilege user to escalate their privileges and become an admin, or, in extreme cir

offseq at 2026-03-17T01:30:30.453Z ##

🚨 CRITICAL: CVE-2026-32267 in Craft CMS (4.x <4.17.6, 5.x <5.9.12) — incorrect auth allows privilege escalation to admin via shared URLs. Upgrade ASAP! Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-17T01:30:30.000Z ##

🚨 CRITICAL: CVE-2026-32267 in Craft CMS (4.x <4.17.6, 5.x <5.9.12) — incorrect auth allows privilege escalation to admin via shared URLs. Upgrade ASAP! Details: radar.offseq.com/threat/cve-20 #OffSeq #CraftCMS #CVE202632267 #Vulnerability

##

CVE-2026-3564
(9.0 CRITICAL)

EPSS: 0.00%

updated 2026-03-17T15:16:19.253000

2 posts

A condition in ScreenConnect may allow an actor with access to server-level cryptographic material used for authentication to obtain unauthorized access, including elevated privileges, in certain scenarios.

thehackerwire@mastodon.social at 2026-03-17T19:58:27.000Z ##

🔴 CVE-2026-3564 - Critical (9)

A condition in ScreenConnect may allow an actor with access to server-level cryptographic material used for authentication to obtain unauthorized access, including elevated privileges, in certain scenarios.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:58:27.000Z ##

🔴 CVE-2026-3564 - Critical (9)

A condition in ScreenConnect may allow an actor with access to server-level cryptographic material used for authentication to obtain unauthorized access, including elevated privileges, in certain scenarios.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0708
(8.3 HIGH)

EPSS: 0.16%

updated 2026-03-17T14:20:01.670000

2 posts

A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the `ucl_object_emit` function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system.

thehackerwire@mastodon.social at 2026-03-17T22:16:08.000Z ##

🟠 CVE-2026-0708 - High (8.3)

A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T22:16:08.000Z ##

🟠 CVE-2026-0708 - High (8.3)

A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4208
(0 None)

EPSS: 0.05%

updated 2026-03-17T14:20:01.670000

2 posts

The extension fails to properly reset the generated MFA code after successful authentication. This leads to a possible MFA bypass for future login attempts by providing an empty string as MFA code to the extensions MFA provider.

offseq at 2026-03-17T10:30:29.478Z ##

⚠️ HIGH severity: CVE-2026-4208 in TYPO3 "E-Mail MFA Provider" lets attackers bypass MFA by reusing/omitting codes due to faulty state reset. Patch or disable the extension and monitor logs for abuse. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-17T10:30:29.000Z ##

⚠️ HIGH severity: CVE-2026-4208 in TYPO3 "E-Mail MFA Provider" lets attackers bypass MFA by reusing/omitting codes due to faulty state reset. Patch or disable the extension and monitor logs for abuse. radar.offseq.com/threat/cve-20 #OffSeq #TYPO3 #MFA #Vuln

##

CVE-2026-23489
(9.1 CRITICAL)

EPSS: 0.06%

updated 2026-03-17T14:20:01.670000

3 posts

Fields is a GLPI plugin that allows users to add custom fields on GLPI items forms. Prior to version 1.23.3, it is possible to execute arbitrary PHP code from users that are allowed to create dropdowns. This issue has been patched in version 1.23.3.

offseq at 2026-03-17T04:30:26.615Z ##

🚨 CVE-2026-23489 (CRITICAL, CVSS 9.1): GLPI 'fields' plugin (<1.23.3) allows privileged users to execute arbitrary PHP code (RCE risk). Patch to 1.23.3+, review permissions, and monitor activity. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-17T04:30:26.000Z ##

🚨 CVE-2026-23489 (CRITICAL, CVSS 9.1): GLPI 'fields' plugin (<1.23.3) allows privileged users to execute arbitrary PHP code (RCE risk). Patch to 1.23.3+, review permissions, and monitor activity. radar.offseq.com/threat/cve-20 #OffSeq #GLPI #CVE202623489 #infosec

##

thehackerwire@mastodon.social at 2026-03-16T18:55:53.000Z ##

🔴 CVE-2026-23489 - Critical (9.1)

Fields is a GLPI plugin that allows users to add custom fields on GLPI items forms. Prior to version 1.23.3, it is possible to execute arbitrary PHP code from users that are allowed to create dropdowns. This issue has been patched in version 1.23.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4269
(7.5 HIGH)

EPSS: 0.05%

updated 2026-03-17T14:20:01.670000

1 posts

A missing S3 ownership verification in the Bedrock AgentCore Starter Toolkit before version v0.1.13 may allow a remote actor to inject code during the build process, leading to code execution in the AgentCore Runtime. This issue only affects users of the Bedrock AgentCore Starter Toolkit before version v0.1.13 who build or have built the Toolkit after September 24, 2025. Any users on a version >=v

thehackerwire@mastodon.social at 2026-03-16T18:55:27.000Z ##

🟠 CVE-2026-4269 - High (7.5)

A missing S3 ownership verification in the Bedrock AgentCore Starter Toolkit before version v0.1.13 may allow a remote actor to inject code during the build process, leading to code execution in the AgentCore Runtime. This issue only affects users...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4312
(9.8 CRITICAL)

EPSS: 0.13%

updated 2026-03-17T09:31:33

4 posts

GCB/FCB Audit Software developed by DrangSoft has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to directly access certain APIs to create a new administrative account.

thehackerwire@mastodon.social at 2026-03-17T21:02:50.000Z ##

🔴 CVE-2026-4312 - Critical (9.8)

GCB/FCB Audit Software developed by DrangSoft has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to directly access certain APIs to create a new administrative account.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-03-17T09:00:30.904Z ##

🚨 CVE-2026-4312 (CRITICAL, CVSS 9.3) in DrangSoft GCB/FCB Audit Software: missing auth allows remote admin account creation & full compromise. No patch yet — restrict API access, monitor closely. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-17T21:02:50.000Z ##

🔴 CVE-2026-4312 - Critical (9.8)

GCB/FCB Audit Software developed by DrangSoft has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to directly access certain APIs to create a new administrative account.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-17T09:00:30.000Z ##

🚨 CVE-2026-4312 (CRITICAL, CVSS 9.3) in DrangSoft GCB/FCB Audit Software: missing auth allows remote admin account creation & full compromise. No patch yet — restrict API access, monitor closely. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #InfoSec

##

CVE-2026-2579
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-17T03:30:22

2 posts

The WowStore – Store Builder & Product Blocks for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the ‘search’ parameter in all versions up to, and including, 4.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into a

thehackerwire@mastodon.social at 2026-03-17T22:16:17.000Z ##

🟠 CVE-2026-2579 - High (7.5)

The WowStore – Store Builder & Product Blocks for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the ‘search’ parameter in all versions up to, and including, 4.4.3 due to insufficient escaping on the user supplied parame...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T22:16:17.000Z ##

🟠 CVE-2026-2579 - High (7.5)

The WowStore – Store Builder & Product Blocks for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the ‘search’ parameter in all versions up to, and including, 4.4.3 due to insufficient escaping on the user supplied parame...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32313
(8.2 HIGH)

EPSS: 0.01%

updated 2026-03-16T22:01:06

1 posts

### Summary XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256-gcm lack validation of the authentication tag length. An attacker can use this to brute-force an authentication tag, recover the [GHASH key](https://en.wikipedia.org/wiki/Galois/Counter_Mode#:~:text=%29%20is%20the-,hash%20key,-%2C%20a%20string%20of), and decrypt the encrypted nodes. It also allows to forge arbitrary c

thehackerwire@mastodon.social at 2026-03-16T19:16:09.000Z ##

🟠 CVE-2026-32313 - High (8.2)

xmlseclibs is a library written in PHP for working with XML Encryption and Signatures. Prior to 3.1.5, XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256-gcm lack validation of the authentication tag length. An attacker can use t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32720(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-03-16T22:00:36

1 posts

### Impact Due to a mis-written NetworkPolicy, a malicious actor can pivot from a component to any other namespace. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. ### Patch Removing the `inter-ns` NetworkPolicy patches the vulnerability. If updates are not possible in production environments, we recommend to manu

offseq@infosec.exchange at 2026-03-14T09:00:27.000Z ##

CVE-2026-32720 (HIGH): ctfer-io monitoring <0.2.1 has improper access control, allowing lateral movement across Kubernetes namespaces — risks sensitive logs/metrics. Patch to 0.2.1+ ASAP! 🔒 radar.offseq.com/threat/cve-20 #OffSeq #Kubernetes #CVE #CloudSecurity

##

CVE-2026-27962
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-16T21:54:00

2 posts

## Description ### Summary A JWK Header Injection vulnerability in `authlib`'s JWS implementation allows an unauthenticated attacker to forge arbitrary JWT tokens that pass signature verification. When `key=None` is passed to any JWS deserialization function, the library extracts and uses the cryptographic key embedded in the attacker-controlled JWT `jwk` header field. An attacker can sign a tok

thehackerwire@mastodon.social at 2026-03-16T18:57:30.000Z ##

🔴 CVE-2026-27962 - Critical (9.1)

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a JWK Header Injection vulnerability in authlib's JWS implementation allows an unauthenticated attacker to forge arbitrary JWT tokens that pass sign...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T18:55:47.000Z ##

🔴 CVE-2026-27962 - Critical (9.1)

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a JWK Header Injection vulnerability in authlib's JWS implementation allows an unauthenticated attacker to forge arbitrary JWT tokens that pass sign...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69784
(8.8 HIGH)

EPSS: 0.01%

updated 2026-03-16T21:35:35

1 posts

A local, non-privileged attacker can abuse a vulnerable IOCTL interface exposed by the OpenEDR 2.5.1.0 kernel driver to modify the DLL injection path used by the product. By redirecting this path to a user-writable location, an attacker can cause OpenEDR to load an attacker-controlled DLL into high-privilege processes. This results in arbitrary code execution with SYSTEM privileges, leading to ful

thehackerwire@mastodon.social at 2026-03-16T20:00:31.000Z ##

🟠 CVE-2025-69784 - High (8.8)

A local, non-privileged attacker can abuse a vulnerable IOCTL interface exposed by the OpenEDR 2.5.1.0 kernel driver to modify the DLL injection path used by the product. By redirecting this path to a user-writable location, an attacker can cause ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69768
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-16T21:35:34

4 posts

SQL Injection vulnerability in Chyrp v.2.5.2 and before allows a remote attacker to obtain sensitive information via the Admin.php component

thehackerwire@mastodon.social at 2026-03-16T20:45:53.000Z ##

🟠 CVE-2025-69768 - High (7.5)

SQL Injection vulnerability in Chyrp v.2.5.2 and before allows a remote attacker to obtain sensitive information via the Admin.php component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:17:13.000Z ##

🟠 CVE-2025-69768 - High (7.5)

SQL Injection vulnerability in Chyrp v.2.5.2 and before allows a remote attacker to obtain sensitive information via the Admin.php component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:45:53.000Z ##

🟠 CVE-2025-69768 - High (7.5)

SQL Injection vulnerability in Chyrp v.2.5.2 and before allows a remote attacker to obtain sensitive information via the Admin.php component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:17:13.000Z ##

🟠 CVE-2025-69768 - High (7.5)

SQL Injection vulnerability in Chyrp v.2.5.2 and before allows a remote attacker to obtain sensitive information via the Admin.php component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69809
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-16T21:34:38

4 posts

A write-what-where condition in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to write arbitrary values to memory, enabling arbitrary code execution via a crafted packet.

thehackerwire@mastodon.social at 2026-03-16T20:45:43.000Z ##

🔴 CVE-2025-69809 - Critical (9.8)

A write-what-where condition in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to write arbitrary values to memory, enabling arbitrary code execution via a crafted packet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:17:03.000Z ##

🔴 CVE-2025-69809 - Critical (9.8)

A write-what-where condition in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to write arbitrary values to memory, enabling arbitrary code execution via a crafted packet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:45:43.000Z ##

🔴 CVE-2025-69809 - Critical (9.8)

A write-what-where condition in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to write arbitrary values to memory, enabling arbitrary code execution via a crafted packet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:17:03.000Z ##

🔴 CVE-2025-69809 - Critical (9.8)

A write-what-where condition in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to write arbitrary values to memory, enabling arbitrary code execution via a crafted packet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69808
(9.1 CRITICAL)

EPSS: 0.07%

updated 2026-03-16T21:34:38

2 posts

An out-of-bounds memory access (OOB) in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to access sensitive information and cause a Denial of Service (DoS) via supplying a crafted packet.

thehackerwire@mastodon.social at 2026-03-16T20:16:54.000Z ##

🔴 CVE-2025-69808 - Critical (9.1)

An out-of-bounds memory access (OOB) in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to access sensitive information and cause a Denial of Service (DoS) via supplying a crafted packet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:16:54.000Z ##

🔴 CVE-2025-69808 - Critical (9.1)

An out-of-bounds memory access (OOB) in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to access sensitive information and cause a Denial of Service (DoS) via supplying a crafted packet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32626
(9.6 CRITICAL)

EPSS: 0.14%

updated 2026-03-16T20:34:47.637000

2 posts

AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, AnythingLLM Desktop contains a Streaming Phase XSS vulnerability in the chat rendering pipeline that escalates to Remote Code Execution on the host OS due to insecure Electron configuration. This works with default settings and requires no user interact

thehackerwire@mastodon.social at 2026-03-16T19:14:15.000Z ##

🔴 CVE-2026-32626 - Critical (9.6)

AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, AnythingLLM Desktop contains a Streaming Phase XSS vulnerability in the chat rendering pipeline that...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-14T01:30:28.000Z ##

🚨 CRITICAL: CVE-2026-32626 in AnythingLLM Desktop ≤1.11.1 lets attackers run code via XSS → RCE (CVSS 9.7). No patch yet. Restrict chat, harden Electron, sanitize input. High risk, act now! More: radar.offseq.com/threat/cve-20 #OffSeq #XSS #RCE #InfoSec

##

CVE-2026-4252
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-03-16T18:32:15

3 posts

A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue is the function check_is_ipv6 of the component IPv6 Handler. The manipulation leads to reliance on ip address for authentication. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

offseq at 2026-03-17T06:00:27.608Z ##

🚩 CRITICAL: CVE-2026-4252 impacts Tenda AC8 (16.03.50.11). IP-based auth in IPv6 Handler lets remote attackers bypass login. Exploit is public. Disable remote mgmt, restrict access, monitor traffic. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-17T06:00:27.000Z ##

🚩 CRITICAL: CVE-2026-4252 impacts Tenda AC8 (16.03.50.11). IP-based auth in IPv6 Handler lets remote attackers bypass login. Exploit is public. Disable remote mgmt, restrict access, monitor traffic. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE #RouterSecurity #Infosec

##

thehackerwire@mastodon.social at 2026-03-16T17:19:18.000Z ##

🔴 CVE-2026-4252 - Critical (9.8)

A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue is the function check_is_ipv6 of the component IPv6 Handler. The manipulation leads to reliance on ip address for authentication. It is possible to initiate the attack...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4254
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-16T18:32:15

3 posts

A weakness has been identified in Tenda AC8 up to 16.03.50.11. This vulnerability affects the function doSystemCmd of the file /goform/SysToolChangePwd of the component HTTP Endpoint. This manipulation of the argument local_2c causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.

offseq at 2026-03-17T03:02:39.441Z ##

🚨 CRITICAL: CVE-2026-4254 in Tenda AC8 (fw ≤16.03.50.11) enables remote stack buffer overflow via /goform/SysToolChangePwd. Public exploit out — isolate & monitor! No patch yet. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-17T03:02:39.000Z ##

🚨 CRITICAL: CVE-2026-4254 in Tenda AC8 (fw ≤16.03.50.11) enables remote stack buffer overflow via /goform/SysToolChangePwd. Public exploit out — isolate & monitor! No patch yet. radar.offseq.com/threat/cve-20 #OffSeq #CVE20264254 #RouterSecurity #Vuln

##

thehackerwire@mastodon.social at 2026-03-16T18:55:37.000Z ##

🔴 CVE-2026-4254 - Critical (9.8)

A weakness has been identified in Tenda AC8 up to 16.03.50.11. This vulnerability affects the function doSystemCmd of the file /goform/SysToolChangePwd of the component HTTP Endpoint. This manipulation of the argument local_2c causes stack-based b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23862
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-16T18:32:15

1 posts

Dell ThinOS 10 versions prior to ThinOS 2602_10.0573, contain an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

thehackerwire@mastodon.social at 2026-03-16T18:56:03.000Z ##

🟠 CVE-2026-23862 - High (7.8)

Dell ThinOS 10 versions prior to ThinOS 2602_10.0573, contain an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-62319
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-16T18:32:14

1 posts

Boolean-Based SQL Injection is a type of blind SQL injection where an attacker manipulates SQL queries by injecting Boolean conditions (TRUE or FALSE) into application input fields. Instead of returning database errors or visible data, the application responds differently depending on whether the injected condition evaluates to true or false. This allows an attacker to inject arbitrary SQL into ba

thehackerwire@mastodon.social at 2026-03-16T17:00:10.000Z ##

🔴 CVE-2025-62319 - Critical (9.8)

Boolean-Based SQL Injection is a type of blind SQL injection where an attacker manipulates SQL queries by injecting Boolean conditions (TRUE or FALSE) into application input fields. Instead of returning database errors or visible data, the applica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47813
(4.3 MEDIUM)

EPSS: 20.96%

updated 2026-03-16T18:32:03

5 posts

loginok.html in Wing FTP Server before 7.4.4 discloses the full local installation path of the application when using a long value in the UID cookie.

Nuclei template

technadu at 2026-03-17T13:49:21.041Z ##

New KEV addition by CISA:
CVE-2025-47813 (Wing FTP Server)
• Information disclosure flaw
• Actively exploited
• High remediation priority
KEV = real-world threat signal.

Source: cisa.gov/news-events/alerts/20

Follow @technadu for updates.

##

technadu@infosec.exchange at 2026-03-17T13:49:21.000Z ##

New KEV addition by CISA:
CVE-2025-47813 (Wing FTP Server)
• Information disclosure flaw
• Actively exploited
• High remediation priority
KEV = real-world threat signal.

Source: cisa.gov/news-events/alerts/20

Follow @technadu for updates.

#InfoSec #CISA #VulnerabilityManagement

##

secdb@infosec.exchange at 2026-03-16T20:00:17.000Z ##

🚨 [CISA-2026:0316] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-47813 (secdb.nttzen.cloud/cve/detail/)
- Name: Wing FTP Server Information Disclosure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Wing FTP Server
- Product: Wing FTP Server
- Notes: wftpserver.com/serverhistory.h ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260316 #cisa20260316 #cve_2025_47813 #cve202547813

##

cisakevtracker@mastodon.social at 2026-03-16T17:00:47.000Z ##

CVE ID: CVE-2025-47813
Vendor: Wing FTP Server
Product: Wing FTP Server
Date Added: 2026-03-16
Notes: wftpserver.com/serverhistory.h ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-16T16:47:31.000Z ##

CISA has updated the KEV catalogue.

- CVE-2025-47813: Wing FTP Server Information Disclosure Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #infosec #vulnerability

##

CVE-2026-4092(CVSS UNKNOWN)

EPSS: 1.01%

updated 2026-03-16T17:08:24

1 posts

### Impact Allows an attacker to perform a "Path Traversal" attack to modify files outside the projects directory, potentially allowing for running attacker code on the developer's machine. ### Patches Fixed in version 3.2.0 ### Workarounds * Only clone or pull scripts from trusted sources * Review the output of the `pull` and `clone` commands to verify only expected project files are modified

1 repos

https://github.com/g0w6y/CVE-2026-4092

secdb@infosec.exchange at 2026-03-16T00:01:14.000Z ##

📈 CVE Published in last 7 days (2026-03-09 - 2026-03-16)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1301

Severity:
- Critical: 114
- High: 499
- Medium: 548
- Low: 44
- None: 96

Status:
- : 27
- Analyzed: 466
- Awaiting Analysis: 494
- Modified: 13
- Received: 245
- Rejected: 5
- Undergoing Analysis: 51

Top CNAs:
- GitHub, Inc.: 312
- Patchstack: 140
- VulDB: 88
- VulnCheck: 88
- Adobe Systems Incorporated: 85
- Microsoft Corporation: 78
- MITRE: 76
- Wordfence: 44
- Chrome: 31
- N/A: 27

Top Affected Products:
- UNKNOWN: 755
- Microsoft Windows 10 22h2: 42
- Microsoft Windows 10 21h2: 42
- Microsoft Windows Server 2022: 41
- Microsoft Windows 11 24h2: 40
- Microsoft Windows 11 23h2: 40
- Microsoft Windows 11 25h2: 40
- Microsoft Windows Server 2025: 39
- Microsoft Windows 11 26h1: 39
- Microsoft Windows Server 2019: 39

Top EPSS Score:
- CVE-2025-14558 - 39.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3909 - 27.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3910 - 21.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2413 - 11.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26130 - 1.27 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4092 - 1.01 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26791 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26792 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26793 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26795 - 0.68 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-32302
(8.1 HIGH)

EPSS: 0.01%

updated 2026-03-16T17:07:29

1 posts

## Summary In affected versions of `openclaw`, browser-originated WebSocket connections could bypass origin validation when `gateway.auth.mode` was set to `trusted-proxy` and the request arrived with proxy headers. A page served from an untrusted origin could connect through a trusted reverse proxy, inherit proxy-authenticated identity, and establish a privileged operator session. ## Impact This

thehackerwire@mastodon.social at 2026-03-13T21:00:13.000Z ##

🟠 CVE-2026-32302 - High (8.1)

OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-originated WebSocket connections could bypass origin validation when gateway.auth.mode was set to trusted-proxy and the request arrived with proxy headers. A page served from an untr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32301
(9.3 CRITICAL)

EPSS: 0.04%

updated 2026-03-16T17:07:19

1 posts

### Summary Centrifugo is vulnerable to Server-Side Request Forgery (SSRF) when configured with a dynamic JWKS endpoint URL using template variables (e.g. `{{tenant}}`). An unauthenticated attacker can craft a JWT with a malicious `iss` or `aud` claim value that gets interpolated into the JWKS fetch URL **before the token signature is verified**, causing Centrifugo to make an outbound HTTP request

thehackerwire@mastodon.social at 2026-03-13T20:29:19.000Z ##

🔴 CVE-2026-32301 - Critical (9.3)

Centrifugo is an open-source scalable real-time messaging server. Prior to 6.7.0, Centrifugo is vulnerable to Server-Side Request Forgery (SSRF) when configured with a dynamic JWKS endpoint URL using template variables (e.g. {{tenant}}). An unauth...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32306
(10.0 CRITICAL)

EPSS: 0.23%

updated 2026-03-16T17:06:59

1 posts

### Summary The telemetry aggregation API accepts user-controlled `aggregationType`, `aggregateColumnName`, and `aggregationTimestampColumnName` parameters and interpolates them directly into ClickHouse SQL queries via the `.append()` method (documented as "trusted SQL"). There is no allowlist, no parameterized query binding, and no input validation. An authenticated user can inject arbitrary SQL

thehackerwire@mastodon.social at 2026-03-13T20:17:47.000Z ##

🔴 CVE-2026-32306 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the telemetry aggregation API accepts user-controlled aggregationType, aggregateColumnName, and aggregationTimestampColumnName parameters and interpolates them ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32308
(7.6 HIGH)

EPSS: 0.03%

updated 2026-03-16T17:06:50

1 posts

### Summary The Markdown viewer component renders Mermaid diagrams with `securityLevel: "loose"` and injects the SVG output via `innerHTML`. This configuration explicitly allows interactive event bindings in Mermaid diagrams, enabling XSS through Mermaid's `click` directive which can execute arbitrary JavaScript. Any field that renders markdown (incident descriptions, status page announcements, m

thehackerwire@mastodon.social at 2026-03-13T20:29:00.000Z ##

🟠 CVE-2026-32308 - High (7.6)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the Markdown viewer component renders Mermaid diagrams with securityLevel: "loose" and injects the SVG output via innerHTML. This configuration explicitly allow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31882
(7.5 HIGH)

EPSS: 0.19%

updated 2026-03-16T17:06:34

1 posts

# SSE Authentication Bypass in Basic Auth Mode ## Summary When Dagu is configured with HTTP Basic authentication (`DAGU_AUTH_MODE=basic`), all Server-Sent Events (SSE) endpoints are accessible without any credentials. This allows unauthenticated attackers to access real-time DAG execution data, workflow configurations, execution logs, and queue status — bypassing the authentication that protects

thehackerwire@mastodon.social at 2026-03-14T16:40:23.000Z ##

🟠 CVE-2026-31882 - High (7.5)

Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, when Dagu is configured with HTTP Basic authentication (DAGU_AUTH_MODE=basic), all Server-Sent Events (SSE) endpoints are accessible without any credentials. This allows...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26954
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-03-16T17:05:29

2 posts

### Summary It is possible to obtain arrays containing `Function`, which allows escaping the sandbox. ### Details There are various ways to get an array containing `Function`, e.g. ```js Object.entries(this).at(1) // [ 'Function', [Function: Function] ] Object.values(this).slice(1, 2) // [ [Function: Function] ] ``` Given an array containing `Function`, and `Object.fromEntries`, it is possib

thehackerwire@mastodon.social at 2026-03-14T17:00:17.000Z ##

🔴 CVE-2026-26954 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to obtain arrays containing Function, which allows escaping the sandbox. Given an array containing Function, and Object.fromEntries, it is possible to construct {[p]: Fu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-14T06:00:27.000Z ##

🔥 CRITICAL: CVE-2026-26954 in SandboxJS (< 0.8.34) enables sandbox escape via Function & Object.fromEntries. Attackers can run arbitrary code remotely! Upgrade to v0.8.34+ now. Full details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202626954 #infosec #sandbox

##

CVE-2026-32614
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-16T16:37:11

1 posts

## Overview The current SM9 decryption implementation contains an infinity-point ciphertext forgery vulnerability. The root cause is that, during decryption, the elliptic-curve point C1 in the ciphertext is only deserialized and checked to be on the curve, but the implementation does not explicitly reject the point at infinity. In the current implementation, an attacker can construct C1 as the p

thehackerwire@mastodon.social at 2026-03-16T19:15:18.000Z ##

🟠 CVE-2026-32614 - High (7.5)

Go ShangMi (Commercial Cryptography) Library (GMSM) is a cryptographic library that covers the Chinese commercial cryptographic public algorithms SM2/SM3/SM4/SM9/ZUC. Prior to 0.41.1, the current SM9 decryption implementation contains an infinity-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31886
(9.1 CRITICAL)

EPSS: 0.08%

updated 2026-03-16T16:36:36

2 posts

## 1. Vulnerability Summary The `dagRunId` request field accepted by the inline DAG execution endpoints is passed directly into `filepath.Join` to construct a temporary directory path without any format validation. Go's `filepath.Join` resolves `..` segments lexically, so a caller can supply a value such as `".."` to redirect the computed directory outside the intended `/tmp/<name>/<id>` path. A

thehackerwire@mastodon.social at 2026-03-14T16:40:33.000Z ##

🔴 CVE-2026-31886 - Critical (9.1)

Dagu is a workflow engine with a built-in Web user interface. Prior to 2.2.4, the dagRunId request field accepted by the inline DAG execution endpoints is passed directly into filepath.Join to construct a temporary directory path without any forma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-14T03:00:26.000Z ##

⚠️ CRITICAL vuln: dagu <2.2.4 suffers from path traversal (CVE-2026-31886). Exploit allows deletion of /tmp, causing system-wide DoS. Upgrade to 2.2.4+ or enforce input validation now! radar.offseq.com/threat/cve-20 #OffSeq #dagu #security #CVE2026_31886

##

CVE-2026-3476
(7.8 HIGH)

EPSS: 0.02%

updated 2026-03-16T16:16:16.600000

1 posts

A Code Injection vulnerability affecting SOLIDWORKS Desktop from Release 2025 through Release 2026 could allow an attacker to execute arbitrary code on the user's machine while opening a specially crafted file.

thehackerwire@mastodon.social at 2026-03-16T17:21:40.000Z ##

🟠 CVE-2026-3476 - High (7.8)

A Code Injection vulnerability affecting SOLIDWORKS Desktop from Release 2025 through Release 2026 could allow an attacker to execute arbitrary code on the user's machine while opening a specially crafted file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4182
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-16T15:30:59

2 posts

A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This vul

thehackerwire@mastodon.social at 2026-03-16T17:01:14.000Z ##

🔴 CVE-2026-4182 - Critical (9.8)

A weakness has been identified in D-Link DIR-816 1.10CNB05. This impacts an unknown function of the file /goform/form2Wl5RepeaterStep2.cgi of the component goahead. This manipulation of the argument key1/key2/key3/key4/pskValue causes stack-based ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-16T10:30:29.000Z ##

🚨 CRITICAL: CVE-2026-4182 in D-Link DIR-816 (v1.10CNB05) — stack buffer overflow in /goform/form2Wl5RepeaterStep2.cgi enables remote code execution. No patch, public exploit exists. Replace or isolate devices now! radar.offseq.com/threat/cve-20 #OffSeq #DLink #IoTSecurity

##

CVE-2026-4255(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-03-16T15:30:59

1 posts

A DLL search order hijacking vulnerability in Thermalright TR-VISION HOME on Windows (64-bit) allows a local attacker to escalate privileges via DLL side-loading. The application loads certain dynamic-link library (DLL) dependencies using the default Windows search order, which includes directories that may be writable by non-privileged users.\n\n\n\nBecause these directories can be modified by un

offseq@infosec.exchange at 2026-03-16T07:30:28.000Z ##

🛡️ HIGH severity alert: CVE-2026-4255 in TR-VISION HOME (≤2.0.5) enables DLL hijacking; local attackers can escalate privileges via side-loading. Restrict write access & monitor for rogue DLLs. radar.offseq.com/threat/cve-20 #OffSeq #Infosec #CVE20264255 #Windows

##

CVE-2026-4188
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-16T15:30:58

3 posts

A security flaw has been discovered in D-Link DIR-619L 2.06B01. The affected element is the function formSchedule of the file /goform/formSchedule of the component boa. Performing a manipulation of the argument curTime results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. This vulnerability only affect

thehackerwire@mastodon.social at 2026-03-16T17:02:09.000Z ##

🟠 CVE-2026-4188 - High (8.8)

A security flaw has been discovered in D-Link DIR-619L 2.06B01. The affected element is the function formSchedule of the file /goform/formSchedule of the component boa. Performing a manipulation of the argument curTime results in stack-based buffe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T17:01:12.000Z ##

🟠 CVE-2026-4188 - High (8.8)

A security flaw has been discovered in D-Link DIR-619L 2.06B01. The affected element is the function formSchedule of the file /goform/formSchedule of the component boa. Performing a manipulation of the argument curTime results in stack-based buffe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-16T00:00:42.000Z ##

CVE-2026-4188: HIGH severity stack-based buffer overflow in D-Link DIR-619L (2.06B01). Allows remote, unauthenticated RCE. Device is unsupported — replace or strictly isolate! Exploit is public. More: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #DLink #InfoSec

##

CVE-2026-4214
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-16T15:30:58

2 posts

A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This issue affects the function UPnP_AV_Server_Path_Setting of the file /cgi-bin/app_mgr.cgi. Executing a manipulation can lead to stack-based buffer

thehackerwire@mastodon.social at 2026-03-16T15:31:24.000Z ##

🟠 CVE-2026-4214 - High (8.8)

A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 202602...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T15:01:39.000Z ##

🟠 CVE-2026-4214 - High (8.8)

A flaw has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 202602...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4227
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-16T15:30:58

2 posts

A security vulnerability has been detected in LB-LINK BL-WR9000 2.4.9. The impacted element is the function sub_44D844 of the file /goform/get_hidessid_cfg. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-03-16T15:31:15.000Z ##

🟠 CVE-2026-4227 - High (8.8)

A security vulnerability has been detected in LB-LINK BL-WR9000 2.4.9. The impacted element is the function sub_44D844 of the file /goform/get_hidessid_cfg. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T15:01:29.000Z ##

🟠 CVE-2026-4227 - High (8.8)

A security vulnerability has been detected in LB-LINK BL-WR9000 2.4.9. The impacted element is the function sub_44D844 of the file /goform/get_hidessid_cfg. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4226
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-16T15:30:58

2 posts

A weakness has been identified in LB-LINK BL-WR9000 2.4.9. The affected element is the function sub_44E8D0 of the file /goform/get_virtual_cfg. Executing a manipulation can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not res

thehackerwire@mastodon.social at 2026-03-16T15:31:05.000Z ##

🟠 CVE-2026-4226 - High (8.8)

A weakness has been identified in LB-LINK BL-WR9000 2.4.9. The affected element is the function sub_44E8D0 of the file /goform/get_virtual_cfg. Executing a manipulation can lead to stack-based buffer overflow. The attack may be performed from remo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T15:01:19.000Z ##

🟠 CVE-2026-4226 - High (8.8)

A weakness has been identified in LB-LINK BL-WR9000 2.4.9. The affected element is the function sub_44E8D0 of the file /goform/get_virtual_cfg. Executing a manipulation can lead to stack-based buffer overflow. The attack may be performed from remo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4211
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-16T15:30:58

1 posts

A weakness has been identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. Affected by this issue is the function Local_Backup_Info of the file /cgi-bin/local_backup_mgr.cgi. This manipulation of the argument f_idx

thehackerwire@mastodon.social at 2026-03-16T15:01:47.000Z ##

🟠 CVE-2026-4211 - High (8.8)

A weakness has been identified in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3081
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-16T15:30:57

1 posts

GStreamer H.266 Codec Parser Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of decoding units.

thehackerwire@mastodon.social at 2026-03-16T18:58:31.000Z ##

🟠 CVE-2026-3081 - High (7.8)

GStreamer H.266 Codec Parser Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3558
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-16T15:30:57

1 posts

Philips Hue Bridge HomeKit Accessory Protocol Transient Pairing Mode Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Philips Hue Bridge. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the HomeKit Accessory Protocol service, which liste

thehackerwire@mastodon.social at 2026-03-16T18:58:22.000Z ##

🟠 CVE-2026-3558 - High (8.1)

Philips Hue Bridge HomeKit Accessory Protocol Transient Pairing Mode Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Philips Hue Bridge. Authentication...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3556
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-16T15:30:57

1 posts

Philips Hue Bridge HomeKit Pair-Setup Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. Authentication is not required to exploit this vulnerability. The specific flaw exists within the hk_hap_pair_storage_put function. The issue results from the lack of pr

thehackerwire@mastodon.social at 2026-03-16T18:00:37.000Z ##

🟠 CVE-2026-3556 - High (8.8)

Philips Hue Bridge HomeKit Pair-Setup Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. Authentication is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3555
(8.0 HIGH)

EPSS: 0.05%

updated 2026-03-16T15:30:57

1 posts

Philips Hue Bridge Zigbee Stack Custom Command Handler Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. User interaction is required to exploit this vulnerability in that the user must initiate the device pairing process. The specific flaw exists within th

thehackerwire@mastodon.social at 2026-03-16T18:00:27.000Z ##

🟠 CVE-2026-3555 - High (8)

Philips Hue Bridge Zigbee Stack Custom Command Handler Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3559
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-16T15:30:57

1 posts

Philips Hue Bridge HomeKit Accessory Protocol Static Nonce Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Philips Hue Bridge. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the SRP authentication mechanism in the HomeKit Accessory Pro

thehackerwire@mastodon.social at 2026-03-16T17:21:30.000Z ##

🟠 CVE-2026-3559 - High (8.1)

Philips Hue Bridge HomeKit Accessory Protocol Static Nonce Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Philips Hue Bridge. Authentication is not re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4163
(9.8 CRITICAL)

EPSS: 0.16%

updated 2026-03-16T15:30:57

4 posts

A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects the function SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Performing a manipulation results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. Upgrading the affected component is recommended.

thehackerwire@mastodon.social at 2026-03-16T17:20:09.000Z ##

🔴 CVE-2026-4163 - Critical (9.8)

A vulnerability was detected in Wavlink WL-WN579A3 220323. This issue affects the function SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Performing a manipulation results in command injection. It is pos...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-15T12:00:27.000Z ##

⚠️ CRITICAL: CVE-2026-4163 in Wavlink WL-WN579A3 (220323) enables remote unauthenticated command injection via /cgi-bin/wireless.cgi. Exploit is public — restrict remote admin, monitor logs, and patch ASAP. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #IoTSecurity

##

offseq@infosec.exchange at 2026-03-15T00:30:28.000Z ##

🚨 CVE-2026-4163 (CRITICAL): Wavlink WL-WN579A3 routers (v220323) have a command injection bug in /cgi-bin/wireless.cgi. Public exploit code available — restrict remote mgmt, monitor logs, and patch ASAP. radar.offseq.com/threat/cve-20 #OffSeq #CVE20264163 #infosec #routersecurity

##

offseq@infosec.exchange at 2026-03-15T00:00:37.000Z ##

🚨 CRITICAL: CVE-2026-4163 in Wavlink WL-WN579A3 (220323) enables unauthenticated remote command injection via /cgi-bin/wireless.cgi. Exploit code is public — restrict remote admin & monitor traffic until patched! radar.offseq.com/threat/cve-20 #OffSeq #CVE20264163 #Infosec

##

CVE-2026-4212
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-16T15:30:57

2 posts

A security vulnerability has been detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This affects the function Downloads_Schedule_Info of the file /cgi-bin/download_mgr.cgi. Such manipulation leads to stack-based

thehackerwire@mastodon.social at 2026-03-16T15:01:57.000Z ##

🟠 CVE-2026-4212 - High (8.8)

A security vulnerability has been detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-16T04:30:26.000Z ##

🚨 CVE-2026-4212 (HIGH, CVSS 8.7): D-Link DNS-120 NAS stack buffer overflow in /cgi-bin/download_mgr.cgi enables remote, unauthenticated compromise. Patch or restrict access now. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #DLink #BlueTeam

##

CVE-2026-4201
(7.3 HIGH)

EPSS: 0.04%

updated 2026-03-16T15:30:57

1 posts

A weakness has been identified in glowxq glowxq-oj up to 6f7c723090472057252040fd2bbbdaa1b5ed2393. This vulnerability affects the function Upload of the file business/business-system/src/main/java/com/glowxq/system/admin/controller/SysFileController.java. Executing a manipulation can lead to unrestricted upload. The attack can be launched remotely. The exploit has been made available to the public

offseq@infosec.exchange at 2026-03-16T01:30:27.000Z ##

CVE-2026-4201 (MEDIUM, CVSS 6.9) in glowxq-oj allows remote, unauthenticated file uploads — risk of code execution. No patch, public exploit exists. Restrict upload access, validate files, monitor closely. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #CyberSecurity

##

CVE-2026-3085
(8.8 HIGH)

EPSS: 0.25%

updated 2026-03-16T15:30:56

1 posts

GStreamer rtpqdm2depay Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of X-QDM RTP payloads.

thehackerwire@mastodon.social at 2026-03-16T19:13:08.000Z ##

🟠 CVE-2026-3085 - High (8.8)

GStreamer rtpqdm2depay Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3082
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-16T15:30:56

1 posts

GStreamer JPEG Parser Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of Huffman tables. The i

thehackerwire@mastodon.social at 2026-03-16T19:00:51.000Z ##

🟠 CVE-2026-3082 - High (7.8)

GStreamer JPEG Parser Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3838
(8.8 HIGH)

EPSS: 1.58%

updated 2026-03-16T15:30:56

2 posts

Unraid Update Request Path Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unraid. Authentication is required to exploit this vulnerability. The specific flaw exists within the update.php file. The issue results from the lack of proper validation of a user-supplied path prior to using it in file opera

thehackerwire@mastodon.social at 2026-03-16T18:00:14.000Z ##

🟠 CVE-2026-3838 - High (8.8)

Unraid Update Request Path Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unraid. Authentication is required to exploit this vulnerability.

The spec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T17:21:06.000Z ##

🟠 CVE-2026-3838 - High (8.8)

Unraid Update Request Path Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unraid. Authentication is required to exploit this vulnerability.

The spec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4164
(9.8 CRITICAL)

EPSS: 0.17%

updated 2026-03-16T15:30:56

4 posts

A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is the function Delete_Mac_list/SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Executing a manipulation can lead to command injection. It is possible to launch the attack remotely. The exploit has been published and may be used. It is recommended to upgrade the affected component.

thehackerwire@mastodon.social at 2026-03-16T17:21:20.000Z ##

🔴 CVE-2026-4164 - Critical (9.8)

A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is the function Delete_Mac_list/SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Executing a manipulation can lead to command injection. It is p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T17:20:18.000Z ##

🔴 CVE-2026-4164 - Critical (9.8)

A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is the function Delete_Mac_list/SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Executing a manipulation can lead to command injection. It is p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-15T10:30:25.000Z ##

🚩 CVE-2026-4164 (CRITICAL): Wavlink WL-WN578W2 (221110) is vulnerable to remote command injection via POST to /cgi-bin/wireless.cgi. Public exploit is out. Restrict access, monitor logs, and upgrade ASAP. radar.offseq.com/threat/cve-20 #OffSeq #CVE #RouterSecurity #IoTSecurity

##

offseq@infosec.exchange at 2026-03-15T05:00:27.000Z ##

🚨 CVE-2026-4164 (CRITICAL, CVSS 9.3) in Wavlink WL-WN578W2 (v221110): Unauth'd command injection via /cgi-bin/wireless.cgi. Public exploit released. Patch ASAP or restrict access! radar.offseq.com/threat/cve-20 #OffSeq #CVE #RouterSecurity #Infosec

##

CVE-2026-3561
(8.0 HIGH)

EPSS: 0.11%

updated 2026-03-16T15:30:56

1 posts

Philips Hue Bridge hk_hap characteristics Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handlin

thehackerwire@mastodon.social at 2026-03-16T17:20:57.000Z ##

🟠 CVE-2026-3561 - High (8)

Philips Hue Bridge hk_hap characteristics Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. Although auth...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4170
(9.8 CRITICAL)

EPSS: 0.15%

updated 2026-03-16T15:30:56

2 posts

A weakness has been identified in Topsec TopACM 3.0. Affected by this vulnerability is an unknown functionality of the file /view/systemConfig/management/nmc_sync.php of the component HTTP Request Handler. Executing a manipulation of the argument template_path can lead to os command injection. The attack can be executed remotely. The exploit has been made available to the public and could be used

thehackerwire@mastodon.social at 2026-03-16T17:19:59.000Z ##

🔴 CVE-2026-4170 - Critical (9.8)

A weakness has been identified in Topsec TopACM 3.0. Affected by this vulnerability is an unknown functionality of the file /view/systemConfig/management/nmc_sync.php of the component HTTP Request Handler. Executing a manipulation of the argument ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-15T09:00:33.000Z ##

🔴 CRITICAL: CVE-2026-4170 in Topsec TopACM 3.0 enables unauthenticated OS command injection via 'template_path' in /nmc_sync.php. No patch, public exploit out. Restrict access, deploy WAF/IDS, monitor logs urgently! radar.offseq.com/threat/cve-20 #OffSeq #vuln #cybersecurity

##

CVE-2026-4183
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-16T15:30:56

3 posts

A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. This vulnerability only affects products that are n

thehackerwire@mastodon.social at 2026-03-16T17:02:18.000Z ##

🔴 CVE-2026-4183 - Critical (9.8)

A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer ov...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T17:01:21.000Z ##

🔴 CVE-2026-4183 - Critical (9.8)

A security vulnerability has been detected in D-Link DIR-816 1.10CNB05. Affected is an unknown function of the file /goform/form2WlanBasicSetup.cgi of the component goahead. Such manipulation of the argument pskValue leads to stack-based buffer ov...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-16T09:00:28.000Z ##

🔎 CVE-2026-4183 (CRITICAL, CVSS 9.3): D-Link DIR-816 (v1.10CNB05) stack buffer overflow via /goform/form2WlanBasicSetup.cgi. Exploit code public, no patch. Replace or isolate devices ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CVE20264183 #IoTSecurity

##

CVE-2026-4167
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-16T15:30:56

3 posts

A vulnerability was determined in Belkin F9K1122 1.00.33. This affects the function formReboot of the file /goform/formReboot. This manipulation of the argument webpage causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-03-16T17:01:33.000Z ##

🟠 CVE-2026-4167 - High (8.8)

A vulnerability was determined in Belkin F9K1122 1.00.33. This affects the function formReboot of the file /goform/formReboot. This manipulation of the argument webpage causes stack-based buffer overflow. The attack may be initiated remotely. The ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-15T15:00:12.000Z ##

⚠️ HIGH-severity: CVE-2026-4167 stack overflow in Belkin F9K1122 v1.00.33. Remote attackers can exploit /goform/formReboot — no patch, public exploit out. Restrict access, monitor for attack attempts. radar.offseq.com/threat/cve-20 #OffSeq #CVE20264167 #IoTSecurity

##

offseq@infosec.exchange at 2026-03-15T06:30:26.000Z ##

🚨 HIGH severity: CVE-2026-4167 in Belkin F9K1122 (1.00.33) enables remote code execution via stack buffer overflow — no auth needed, no patch. Isolate, restrict, and monitor now! radar.offseq.com/threat/cve-20 #OffSeq #infosec #routersecurity #CVE20264167

##

CVE-2026-4187
(5.3 MEDIUM)

EPSS: 0.06%

updated 2026-03-16T15:30:56

1 posts

A vulnerability was identified in Tiandy Easy7 Integrated Management Platform 7.17.0. Impacted is an unknown function of the file /WebService/UpdateLocalDevInfo.jsp of the component Device Identifier Handler. Such manipulation of the argument username/password leads to missing authentication. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was c

offseq@infosec.exchange at 2026-03-15T19:30:11.000Z ##

⚠️ MEDIUM severity: Tiandy Easy7 Integrated Management Platform 7.17.0 has a missing authentication bug (CVE-2026-4187) in Device Identifier Handler. Public exploit exists. No vendor fix yet — review exposure & restrict access. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Tiandy #Cybersecurity

##

CVE-2026-4169
(2.4 LOW)

EPSS: 0.03%

updated 2026-03-16T15:30:56

1 posts

A security flaw has been discovered in Tecnick TCExam up to 16.6.0. Affected is the function F_xml_export_users of the file admin/code/tce_xml_users.php of the component XML Export. Performing a manipulation results in cross site scripting. Remote exploitation of the attack is possible. There are still doubts about whether this vulnerability truly exists. Upgrading to version 16.6.1 is able to add

offseq@infosec.exchange at 2026-03-15T08:00:27.000Z ##

🚨 CVE-2026-4169: MEDIUM XSS in Tecnick TCExam (v16.0 – 16.6.0). Admins can inject JavaScript via XML export. Patch by upgrading to 16.6.1, restrict admin access, and monitor logs. Details: radar.offseq.com/threat/cve-20 #OffSeq #XSS #Vulnerability #AppSec

##

CVE-2026-28521
(7.7 HIGH)

EPSS: 0.01%

updated 2026-03-16T15:30:55

2 posts

arduino-TuyaOpen before version 1.2.1 contains an out-of-bounds memory read vulnerability in the TuyaIoT component. An attacker who hijacks or controls the Tuya cloud service can issue malicious DP event data to victim devices, causing out-of-bounds memory access that may result in information disclosure or a denial-of-service condition.

thehackerwire@mastodon.social at 2026-03-16T20:51:45.000Z ##

🟠 CVE-2026-28521 - High (7.7)

arduino-TuyaOpen before version 1.2.1 contains an out-of-bounds memory read vulnerability in the TuyaIoT component. An attacker who hijacks or controls the Tuya cloud service can issue malicious DP event data to victim devices, causing out-of-boun...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:51:45.000Z ##

🟠 CVE-2026-28521 - High (7.7)

arduino-TuyaOpen before version 1.2.1 contains an out-of-bounds memory read vulnerability in the TuyaIoT component. An attacker who hijacks or controls the Tuya cloud service can issue malicious DP event data to victim devices, causing out-of-boun...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28520
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-16T15:30:55

2 posts

arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, the attacker can exploit the overflow to execute arbitrary code on the affected embedded device.

thehackerwire@mastodon.social at 2026-03-16T20:51:35.000Z ##

🟠 CVE-2026-28520 - High (8.4)

arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, the attacker can exploit the overflow to execute...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:51:35.000Z ##

🟠 CVE-2026-28520 - High (8.4)

arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, the attacker can exploit the overflow to execute...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2493
(7.5 HIGH)

EPSS: 10.28%

updated 2026-03-16T15:30:55

2 posts

IceWarp collaboration Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of IceWarp. Authentication is not required to exploit this vulnerability. The specific flaw exists within handling of the ticket parameter provided to the collaboration endpoint. The issue results from the lack of pr

thehackerwire@mastodon.social at 2026-03-16T20:03:33.000Z ##

🟠 CVE-2026-2493 - High (7.5)

IceWarp collaboration Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of IceWarp. Authentication is not required to exploit this vulne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:03:33.000Z ##

🟠 CVE-2026-2493 - High (7.5)

IceWarp collaboration Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of IceWarp. Authentication is not required to exploit this vulne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2920
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-16T15:30:55

1 posts

GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of stream headers within

thehackerwire@mastodon.social at 2026-03-16T20:03:12.000Z ##

🟠 CVE-2026-2920 - High (7.8)

GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2922
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-16T15:30:55

1 posts

GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of video packets. The iss

thehackerwire@mastodon.social at 2026-03-16T20:00:51.000Z ##

🟠 CVE-2026-2922 - High (7.8)

GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2923
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-16T15:30:55

1 posts

GStreamer DVB Subtitles Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of coordinates. The issue resul

thehackerwire@mastodon.social at 2026-03-16T19:15:58.000Z ##

🟠 CVE-2026-2923 - High (7.8)

GStreamer DVB Subtitles Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3084
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-16T15:30:55

1 posts

GStreamer H.266 Codec Parser Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of picture partitions. The is

thehackerwire@mastodon.social at 2026-03-16T19:01:13.000Z ##

🟠 CVE-2026-3084 - High (7.8)

GStreamer H.266 Codec Parser Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31386
(7.2 HIGH)

EPSS: 0.16%

updated 2026-03-16T15:30:55

1 posts

OpenLiteSpeed and LSWS Enterprise provided by LiteSpeed Technologies contain an OS command injection vulnerability. An arbitrary OS command may be executed by an attacker with the administrative privilege.

offseq@infosec.exchange at 2026-03-16T06:00:29.000Z ##

🔒 CVE-2026-31386 (HIGH): All LiteSpeed OpenLiteSpeed/LSWS Enterprise versions are vulnerable to OS command injection by admins. No exploits seen yet, but impact = full system compromise. Tighten admin controls & monitor! radar.offseq.com/threat/cve-20 #OffSeq #LiteSpeed #Infosec

##

CVE-2026-1947
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-16T15:30:54

2 posts

The NEX-Forms – Ultimate Forms Plugin for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 9.1.9 via the submit_nex_form() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to to overwrite arbitrary form entries via the 'nf_set_entry_update_id' parameter.

offseq@infosec.exchange at 2026-03-15T16:30:11.000Z ##

🚨 CVE-2026-1947: HIGH severity in NEX-Forms – Ultimate Forms Plugin for WordPress (all versions ≤9.1.9). Unauthenticated attackers can overwrite form entries via IDOR. Disable plugin or restrict access ASAP! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #InfoSec

##

offseq@infosec.exchange at 2026-03-15T03:30:27.000Z ##

🔥 CVE-2026-1947 (HIGH, CVSS 7.5): NEX-Forms – Ultimate Forms Plugin for WordPress allows unauthenticated IDOR, enabling arbitrary form entry overwrite. No patch released. Disable plugin or restrict access ASAP. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

CVE-2026-32746
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-16T15:30:40

1 posts

telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.

offseq@infosec.exchange at 2026-03-14T04:30:26.000Z ##

⚠️ CRITICAL: CVE-2026-32746 in GNU inetutils telnetd (<=2.7) enables remote buffer overflow — unauthenticated code execution or DoS possible. Disable telnet, restrict access, monitor for threats. No patch yet! radar.offseq.com/threat/cve-20 #OffSeq #CVE202632746 #infosec

##

CVE-2025-13779
(8.3 HIGH)

EPSS: 0.03%

updated 2026-03-16T14:54:11.293000

1 posts

Missing authentication for critical function vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.This issue affects AWIN GW100 rev.2: 2.0-0, 2.0-1; AWIN GW120: 1.2-0, 1.2-1.

thehackerwire@mastodon.social at 2026-03-14T20:00:30.000Z ##

🟠 CVE-2025-13779 - High (8.3)

Missing authentication for critical function vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.This issue affects AWIN GW100 rev.2: 2.0-0, 2.0-1; AWIN GW120: 1.2-0, 1.2-1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0956
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-16T14:54:11.293000

1 posts

There is a memory corruption vulnerability due to an out-of-bounds read when loading a corrupted file in Digilent DASYLab.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted file. This vulnerability affects all versions of Digilent DASYLab.

thehackerwire@mastodon.social at 2026-03-14T19:00:37.000Z ##

🟠 CVE-2026-0956 - High (7.8)

There is a memory corruption vulnerability due to an out-of-bounds read when loading a corrupted file in Digilent DASYLab.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25819
(7.5 HIGH)

EPSS: 0.22%

updated 2026-03-16T14:54:11.293000

1 posts

HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 allows unauthenticated attackers to cause a Denial of Service by using a specially crafted HTTP request that leads to a reboot of the device, provided they have access to the device's GUI.

thehackerwire@mastodon.social at 2026-03-14T17:00:39.000Z ##

🟠 CVE-2026-25819 - High (7.5)

HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 allows unauthenticated attackers to cause a Denial of Service by using a specially crafted HTTP request that ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2890
(7.5 HIGH)

EPSS: 0.05%

updated 2026-03-16T14:54:11.293000

1 posts

The Formidable Forms plugin for WordPress is vulnerable to a payment integrity bypass in all versions up to, and including, 6.28. This is due to the Stripe Link return handler (`handle_one_time_stripe_link_return_url`) marking payment records as complete based solely on the Stripe PaymentIntent status without comparing the intent's charged amount against the expected payment amount, and the `verif

thehackerwire@mastodon.social at 2026-03-14T16:40:42.000Z ##

🟠 CVE-2026-2890 - High (7.5)

The Formidable Forms plugin for WordPress is vulnerable to a payment integrity bypass in all versions up to, and including, 6.28. This is due to the Stripe Link return handler (`handle_one_time_stripe_link_return_url`) marking payment records as c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31917
(8.5 HIGH)

EPSS: 0.03%

updated 2026-03-16T14:54:11.293000

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in weDevs WP ERP erp allows SQL Injection.This issue affects WP ERP: from n/a through <= 1.16.10.

thehackerwire@mastodon.social at 2026-03-13T21:21:13.000Z ##

🟠 CVE-2026-31917 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in weDevs WP ERP erp allows SQL Injection.This issue affects WP ERP: from n/a through &lt;= 1.16.10.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32304
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-03-16T14:54:11.293000

1 posts

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function constructor without any sanitization, allowing arbitrary code execution. This is distinct from CVE-2026-29091 which was call_user_func_array using eval() in v2.x. This finding affects create_function

thehackerwire@mastodon.social at 2026-03-13T21:00:25.000Z ##

🔴 CVE-2026-32304 - Critical (9.8)

Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function constructor without any sanitization, allowing ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32319
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-16T14:54:11.293000

1 posts

Ella Core is a 5G core designed for private networks. Prior to 1.5.1, Ella Core panics when processing a malformed integrity protected NGAP/NAS message with a length under 7 bytes. An attacker able to send crafted NAS messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. This vulnerability is fixed in 1.5.1.

thehackerwire@mastodon.social at 2026-03-13T20:29:10.000Z ##

🟠 CVE-2026-32319 - High (7.5)

Ella Core is a 5G core designed for private networks. Prior to 1.5.1, Ella Core panics when processing a malformed integrity protected NGAP/NAS message with a length under 7 bytes. An attacker able to send crafted NAS messages to Ella Core can cra...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2016-20030
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-16T14:53:46.157000

1 posts

ZKTeco ZKBioSecurity 3.0 contains a user enumeration vulnerability that allows unauthenticated attackers to discover valid usernames by submitting partial characters via the username parameter. Attackers can send requests to the authLoginAction!login.do script with varying username inputs to enumerate valid user accounts based on application responses.

Matchbook3469@mastodon.social at 2026-03-17T15:39:22.000Z ##

🔴 New security advisory:

CVE-2016-20030 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

CVE-2026-32426
(7.5 HIGH)

EPSS: 0.11%

updated 2026-03-16T14:53:46.157000

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in themelexus Medilazar Core medilazar-core allows PHP Local File Inclusion.This issue affects Medilazar Core: from n/a through < 1.4.7.

thehackerwire@mastodon.social at 2026-03-13T20:24:34.000Z ##

🟠 CVE-2026-32426 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in themelexus Medilazar Core medilazar-core allows PHP Local File Inclusion.This issue affects Medilazar Core: from n/a through &...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-13T20:17:15.000Z ##

🟠 CVE-2026-32426 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in themelexus Medilazar Core medilazar-core allows PHP Local File Inclusion.This issue affects Medilazar Core: from n/a through &...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32366
(8.5 HIGH)

EPSS: 0.03%

updated 2026-03-16T14:53:46.157000

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in robfelty Collapsing Categories collapsing-categories allows Blind SQL Injection.This issue affects Collapsing Categories: from n/a through <= 3.0.9.

thehackerwire@mastodon.social at 2026-03-13T20:17:27.000Z ##

🟠 CVE-2026-32366 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in robfelty Collapsing Categories collapsing-categories allows Blind SQL Injection.This issue affects Collapsing Categories: from n/a through &lt;= ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2476
(7.6 HIGH)

EPSS: 0.03%

updated 2026-03-16T14:53:07.390000

1 posts

Mattermost Plugins versions <=2.0.3.0 fail to properly mask sensitive configuration values which allows an attacker with access to support packets to obtain original plugin settings via exported configuration data. Mattermost Advisory ID: MMSA-2026-00606

thehackerwire@mastodon.social at 2026-03-16T20:03:22.000Z ##

🟠 CVE-2026-2476 - High (7.6)

Mattermost Plugins versions &lt;=2.0.3.0 fail to properly mask sensitive configuration values which allows an attacker with access to support packets to obtain original plugin settings via exported configuration data. Mattermost Advisory ID: MMSA-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3557
(8.0 HIGH)

EPSS: 0.14%

updated 2026-03-16T14:53:07.390000

1 posts

Philips Hue Bridge hap_pair_verify_handler Sub-TLV Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists w

thehackerwire@mastodon.social at 2026-03-16T18:58:13.000Z ##

🟠 CVE-2026-3557 - High (8)

Philips Hue Bridge hap_pair_verify_handler Sub-TLV Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Brid...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3560
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-16T14:53:07.390000

1 posts

Philips Hue Bridge HomeKit hk_hap_pair_storage_put Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. Authentication is not required to exploit this vulnerability. The specific flaw exists within the hk_hap_pair_storage_put function of the HomeKit implementa

thehackerwire@mastodon.social at 2026-03-16T17:20:47.000Z ##

🟠 CVE-2026-3560 - High (8.8)

Philips Hue Bridge HomeKit hk_hap_pair_storage_put Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. Auth...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4181
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-16T14:53:07.390000

2 posts

A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an unknown function of the file /goform/form2RepeaterStep2.cgi of the component goahead. The manipulation of the argument key1/key2/key3/key4/pskValue results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This vulnerability on

thehackerwire@mastodon.social at 2026-03-16T17:02:29.000Z ##

🔴 CVE-2026-4181 - Critical (9.8)

A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an unknown function of the file /goform/form2RepeaterStep2.cgi of the component goahead. The manipulation of the argument key1/key2/key3/key4/pskValue results in stack-b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T17:01:30.000Z ##

🔴 CVE-2026-4181 - Critical (9.8)

A security flaw has been discovered in D-Link DIR-816 1.10CNB05. This affects an unknown function of the file /goform/form2RepeaterStep2.cgi of the component goahead. The manipulation of the argument key1/key2/key3/key4/pskValue results in stack-b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4184
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-16T14:53:07.390000

2 posts

A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulnerability is an unknown functionality of the file /goform/form2Wl5BasicSetup.cgi of the component goahead. Performing a manipulation of the argument pskValue results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. This vulnerability only affec

thehackerwire@mastodon.social at 2026-03-16T17:01:23.000Z ##

🔴 CVE-2026-4184 - Critical (9.8)

A vulnerability was detected in D-Link DIR-816 1.10CNB05. Affected by this vulnerability is an unknown functionality of the file /goform/form2Wl5BasicSetup.cgi of the component goahead. Performing a manipulation of the argument pskValue results in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-15T18:00:11.000Z ##

⚠️ CRITICAL: D-Link DIR-816 (1.10CNB05) stack-based buffer overflow via pskValue in /goform/form2Wl5BasicSetup.cgi. Exploit is public, remote code execution possible. Device is EOL — isolate or replace! CVE-2026-4184 radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln

##

CVE-2026-4213
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-16T14:53:07.390000

1 posts

A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This vulnerability affects the function cgi_myfavorite_del_user/cgi_myfavorite_verify of the file /cgi-bin/gui_mgr.cgi. Performing a manipulat

thehackerwire@mastodon.social at 2026-03-16T15:02:07.000Z ##

🟠 CVE-2026-4213 - High (8.8)

A vulnerability was detected in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4206
(6.3 MEDIUM)

EPSS: 0.43%

updated 2026-03-16T14:53:07.390000

1 posts

A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20260205. This affects the function FMT_rebuild_diskmgr/FMT_create_diskmgr/ScanDisk_run_e2fsck of the file /cgi-bin/dsk_mgr.cgi. Performing a manipulation

offseq@infosec.exchange at 2026-03-16T03:00:27.000Z ##

CVE-2026-4206: MEDIUM severity command injection in D-Link DNS-120 NAS (20260205). Remote, unauthenticated exploit possible — PoC public, patch ASAP or restrict access. Monitor for suspicious /cgi-bin/dsk_mgr.cgi activity. radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln

##

CVE-2026-4172
(7.2 HIGH)

EPSS: 0.04%

updated 2026-03-16T14:53:07.390000

1 posts

A vulnerability was detected in TRENDnet TEW-632BRP 1.010B32. This affects an unknown part of the file /ping_response.cgi of the component HTTP POST Request Handler. The manipulation of the argument ping_ipaddr results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not

offseq@infosec.exchange at 2026-03-15T13:30:12.000Z ##

🚩 HIGH severity: CVE-2026-4172 in TRENDnet TEW-632BRP (v1.010B32) — stack-based buffer overflow in /ping_response.cgi (ping_ipaddr). Public exploit, no patch. Isolate, restrict access, and monitor now! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #RouterVuln

##

CVE-2026-3227
(0 None)

EPSS: 0.42%

updated 2026-03-16T14:53:07.390000

1 posts

A command injection vulnerability was identified in TP-Link TL-WR802N v4, TL-WR841N v14, and TL-WR840N v6 due to improper neutralization of special elements used in an OS command. In the router configuration import function allows an authenticated attacker to upload a crafted configuration file that results in execution of OS commands with root privileges during port-trigger processing. Success

offseq@infosec.exchange at 2026-03-14T07:30:27.000Z ##

🛡️ CVE-2026-3227: HIGH severity OS command injection in TP-Link TL-WR802N v4, TL-WR841N v14, TL-WR840N v6. Authenticated attackers can gain root via crafted config imports. No patch yet — restrict access & monitor uploads! radar.offseq.com/threat/cve-20 #OffSeq #TPLink #Vuln

##

CVE-2026-26795
(9.8 CRITICAL)

EPSS: 0.68%

updated 2026-03-16T14:18:27.577000

1 posts

GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the module parameter in the M.get_system_log function. This vulnerability allows attackers to execute arbitrary commands via a crafted input.

secdb@infosec.exchange at 2026-03-16T00:01:14.000Z ##

📈 CVE Published in last 7 days (2026-03-09 - 2026-03-16)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1301

Severity:
- Critical: 114
- High: 499
- Medium: 548
- Low: 44
- None: 96

Status:
- : 27
- Analyzed: 466
- Awaiting Analysis: 494
- Modified: 13
- Received: 245
- Rejected: 5
- Undergoing Analysis: 51

Top CNAs:
- GitHub, Inc.: 312
- Patchstack: 140
- VulDB: 88
- VulnCheck: 88
- Adobe Systems Incorporated: 85
- Microsoft Corporation: 78
- MITRE: 76
- Wordfence: 44
- Chrome: 31
- N/A: 27

Top Affected Products:
- UNKNOWN: 755
- Microsoft Windows 10 22h2: 42
- Microsoft Windows 10 21h2: 42
- Microsoft Windows Server 2022: 41
- Microsoft Windows 11 24h2: 40
- Microsoft Windows 11 23h2: 40
- Microsoft Windows 11 25h2: 40
- Microsoft Windows Server 2025: 39
- Microsoft Windows 11 26h1: 39
- Microsoft Windows Server 2019: 39

Top EPSS Score:
- CVE-2025-14558 - 39.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3909 - 27.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3910 - 21.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2413 - 11.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26130 - 1.27 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4092 - 1.01 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26791 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26792 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26793 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26795 - 0.68 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-3910
(8.8 HIGH)

EPSS: 21.89%

updated 2026-03-13T22:00:01.403000

8 posts

Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

hackmag at 2026-03-17T20:30:02.764Z ##

⚪️ Google Fixes Two 0-Day Vulnerabilities in Chrome

🗨️ Google developers have released an emergency update for the Chrome browser that fixes two zero-day vulnerabilities, which were already being exploited in real-world attacks. “Google is aware that exploits exist for vulnerabilities CVE-2026-3909 and CVE-2026-3910,” according to the security bulletin…

🔗 hackmag.com/news/two-chrome-0d

##

AAKL at 2026-03-17T15:19:00.685Z ##

Google posted this yesterday, addressing CVE-2026-3909 and CVE-2026-3910.

Long Term Support Channel Update for ChromeOS chromereleases.googleblog.com/

##

hackmag@infosec.exchange at 2026-03-17T20:30:02.000Z ##

⚪️ Google Fixes Two 0-Day Vulnerabilities in Chrome

🗨️ Google developers have released an emergency update for the Chrome browser that fixes two zero-day vulnerabilities, which were already being exploited in real-world attacks. “Google is aware that exploits exist for vulnerabilities CVE-2026-3909 and CVE-2026-3910,” according to the security bulletin…

🔗 hackmag.com/news/two-chrome-0d

#news

##

AAKL@infosec.exchange at 2026-03-17T15:19:00.000Z ##

Google posted this yesterday, addressing CVE-2026-3909 and CVE-2026-3910.

Long Term Support Channel Update for ChromeOS chromereleases.googleblog.com/ #Google #Chrome #infosec

##

beyondmachines1@infosec.exchange at 2026-03-16T09:01:49.000Z ##

Google Reports Chrome Zero-Day Vulnerabilities Exploited in the Wild

Google reports two actively exploited zero-day vulnerabilities (CVE-2026-3909 and CVE-2026-3910). One is patched and for the other patch is coming in a future release.

**Another urgent patch for Chrome - Google is patching an actively exploited flaw in Chrome. DONT DELAY! Update all your Chrome and Chromium browsers (Edge, Opera, Brave, Vivaldi...). Updating the browser is easy, all your tabs reopen after the patch.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-03-16T00:01:14.000Z ##

📈 CVE Published in last 7 days (2026-03-09 - 2026-03-16)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1301

Severity:
- Critical: 114
- High: 499
- Medium: 548
- Low: 44
- None: 96

Status:
- : 27
- Analyzed: 466
- Awaiting Analysis: 494
- Modified: 13
- Received: 245
- Rejected: 5
- Undergoing Analysis: 51

Top CNAs:
- GitHub, Inc.: 312
- Patchstack: 140
- VulDB: 88
- VulnCheck: 88
- Adobe Systems Incorporated: 85
- Microsoft Corporation: 78
- MITRE: 76
- Wordfence: 44
- Chrome: 31
- N/A: 27

Top Affected Products:
- UNKNOWN: 755
- Microsoft Windows 10 22h2: 42
- Microsoft Windows 10 21h2: 42
- Microsoft Windows Server 2022: 41
- Microsoft Windows 11 24h2: 40
- Microsoft Windows 11 23h2: 40
- Microsoft Windows 11 25h2: 40
- Microsoft Windows Server 2025: 39
- Microsoft Windows 11 26h1: 39
- Microsoft Windows Server 2019: 39

Top EPSS Score:
- CVE-2025-14558 - 39.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3909 - 27.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3910 - 21.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2413 - 11.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26130 - 1.27 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4092 - 1.01 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26791 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26792 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26793 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26795 - 0.68 % (secdb.nttzen.cloud/cve/detail/)

##

ruario@vivaldi.net at 2026-03-14T12:50:40.000Z ##

@vivaldiversiontracker This includes security fixes for CVE-2026-3909 & CVE-2026-3910 from Chromium 146.0.7680.80.

##

ruario@vivaldi.net at 2026-03-14T12:50:02.000Z ##

@browserversiontracker For the curious, this includes security fixes for CVE-2026-3909 & CVE-2026-3910 from Chromium 146.0.7680.80.

And yes, we somehow beat the Chrome team getting this out even though they did the fix. 😂

##

CVE-2026-3909
(8.8 HIGH)

EPSS: 27.12%

updated 2026-03-13T21:32:59

10 posts

Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

hackmag at 2026-03-17T20:30:02.764Z ##

⚪️ Google Fixes Two 0-Day Vulnerabilities in Chrome

🗨️ Google developers have released an emergency update for the Chrome browser that fixes two zero-day vulnerabilities, which were already being exploited in real-world attacks. “Google is aware that exploits exist for vulnerabilities CVE-2026-3909 and CVE-2026-3910,” according to the security bulletin…

🔗 hackmag.com/news/two-chrome-0d

##

AAKL at 2026-03-17T15:19:00.685Z ##

Google posted this yesterday, addressing CVE-2026-3909 and CVE-2026-3910.

Long Term Support Channel Update for ChromeOS chromereleases.googleblog.com/

##

hackmag@infosec.exchange at 2026-03-17T20:30:02.000Z ##

⚪️ Google Fixes Two 0-Day Vulnerabilities in Chrome

🗨️ Google developers have released an emergency update for the Chrome browser that fixes two zero-day vulnerabilities, which were already being exploited in real-world attacks. “Google is aware that exploits exist for vulnerabilities CVE-2026-3909 and CVE-2026-3910,” according to the security bulletin…

🔗 hackmag.com/news/two-chrome-0d

#news

##

AAKL@infosec.exchange at 2026-03-17T15:19:00.000Z ##

Google posted this yesterday, addressing CVE-2026-3909 and CVE-2026-3910.

Long Term Support Channel Update for ChromeOS chromereleases.googleblog.com/ #Google #Chrome #infosec

##

beyondmachines1@infosec.exchange at 2026-03-16T09:01:49.000Z ##

Google Reports Chrome Zero-Day Vulnerabilities Exploited in the Wild

Google reports two actively exploited zero-day vulnerabilities (CVE-2026-3909 and CVE-2026-3910). One is patched and for the other patch is coming in a future release.

**Another urgent patch for Chrome - Google is patching an actively exploited flaw in Chrome. DONT DELAY! Update all your Chrome and Chromium browsers (Edge, Opera, Brave, Vivaldi...). Updating the browser is easy, all your tabs reopen after the patch.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-03-16T00:01:14.000Z ##

📈 CVE Published in last 7 days (2026-03-09 - 2026-03-16)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1301

Severity:
- Critical: 114
- High: 499
- Medium: 548
- Low: 44
- None: 96

Status:
- : 27
- Analyzed: 466
- Awaiting Analysis: 494
- Modified: 13
- Received: 245
- Rejected: 5
- Undergoing Analysis: 51

Top CNAs:
- GitHub, Inc.: 312
- Patchstack: 140
- VulDB: 88
- VulnCheck: 88
- Adobe Systems Incorporated: 85
- Microsoft Corporation: 78
- MITRE: 76
- Wordfence: 44
- Chrome: 31
- N/A: 27

Top Affected Products:
- UNKNOWN: 755
- Microsoft Windows 10 22h2: 42
- Microsoft Windows 10 21h2: 42
- Microsoft Windows Server 2022: 41
- Microsoft Windows 11 24h2: 40
- Microsoft Windows 11 23h2: 40
- Microsoft Windows 11 25h2: 40
- Microsoft Windows Server 2025: 39
- Microsoft Windows 11 26h1: 39
- Microsoft Windows Server 2019: 39

Top EPSS Score:
- CVE-2025-14558 - 39.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3909 - 27.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3910 - 21.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2413 - 11.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26130 - 1.27 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4092 - 1.01 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26791 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26792 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26793 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26795 - 0.68 % (secdb.nttzen.cloud/cve/detail/)

##

campuscodi@mastodon.social at 2026-03-15T15:46:37.000Z ##

CISA still lists CVE-2026-3909 as a zero-day, even if Google removed it from its Chrome patch notes

So I presume it's still a zero-day, but patches are coming next week... instead of not being a zero-day in the first place

cisa.gov/news-events/alerts/20

chromereleases.googleblog.com/

##

secureblue.dev@bsky.brid.gy at 2026-03-15T05:43:46.397Z ##

Trivalent 146.0.7680.80 released: github.com/secureblue/T... CVE-2026-3909 was originally marked by Google as fixed in the previous upstream release. They have since revised those release notes and released for a third time this week, this time actually containing the fix for CVE-2026-3909.

Release 146.0.7680.80-443379 ·...

##

ruario@vivaldi.net at 2026-03-14T12:50:40.000Z ##

@vivaldiversiontracker This includes security fixes for CVE-2026-3909 & CVE-2026-3910 from Chromium 146.0.7680.80.

##

ruario@vivaldi.net at 2026-03-14T12:50:02.000Z ##

@browserversiontracker For the curious, this includes security fixes for CVE-2026-3909 & CVE-2026-3910 from Chromium 146.0.7680.80.

And yes, we somehow beat the Chrome team getting this out even though they did the fix. 😂

##

CVE-2026-26791
(9.8 CRITICAL)

EPSS: 0.68%

updated 2026-03-13T21:32:49

1 posts

GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the string port parameter in the enable_echo_server function. This vulnerability allows attackers to execute arbitrary commands via a crafted input.

secdb@infosec.exchange at 2026-03-16T00:01:14.000Z ##

📈 CVE Published in last 7 days (2026-03-09 - 2026-03-16)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1301

Severity:
- Critical: 114
- High: 499
- Medium: 548
- Low: 44
- None: 96

Status:
- : 27
- Analyzed: 466
- Awaiting Analysis: 494
- Modified: 13
- Received: 245
- Rejected: 5
- Undergoing Analysis: 51

Top CNAs:
- GitHub, Inc.: 312
- Patchstack: 140
- VulDB: 88
- VulnCheck: 88
- Adobe Systems Incorporated: 85
- Microsoft Corporation: 78
- MITRE: 76
- Wordfence: 44
- Chrome: 31
- N/A: 27

Top Affected Products:
- UNKNOWN: 755
- Microsoft Windows 10 22h2: 42
- Microsoft Windows 10 21h2: 42
- Microsoft Windows Server 2022: 41
- Microsoft Windows 11 24h2: 40
- Microsoft Windows 11 23h2: 40
- Microsoft Windows 11 25h2: 40
- Microsoft Windows Server 2025: 39
- Microsoft Windows 11 26h1: 39
- Microsoft Windows Server 2019: 39

Top EPSS Score:
- CVE-2025-14558 - 39.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3909 - 27.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3910 - 21.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2413 - 11.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26130 - 1.27 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4092 - 1.01 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26791 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26792 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26793 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26795 - 0.68 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-26792
(9.8 CRITICAL)

EPSS: 0.68%

updated 2026-03-13T21:32:48

1 posts

GL-iNet GL-AR300M16 v4.3.11 was discovered to contain multiple command injection vulnerabilities in the set_upgrade function via the modem_url, target_version, current_version, firmware_upload, hash_type, hash_value, and upgrade_type parameters. These vulnerabilities allow attackers to execute arbitrary commands via a crafted input.

secdb@infosec.exchange at 2026-03-16T00:01:14.000Z ##

📈 CVE Published in last 7 days (2026-03-09 - 2026-03-16)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1301

Severity:
- Critical: 114
- High: 499
- Medium: 548
- Low: 44
- None: 96

Status:
- : 27
- Analyzed: 466
- Awaiting Analysis: 494
- Modified: 13
- Received: 245
- Rejected: 5
- Undergoing Analysis: 51

Top CNAs:
- GitHub, Inc.: 312
- Patchstack: 140
- VulDB: 88
- VulnCheck: 88
- Adobe Systems Incorporated: 85
- Microsoft Corporation: 78
- MITRE: 76
- Wordfence: 44
- Chrome: 31
- N/A: 27

Top Affected Products:
- UNKNOWN: 755
- Microsoft Windows 10 22h2: 42
- Microsoft Windows 10 21h2: 42
- Microsoft Windows Server 2022: 41
- Microsoft Windows 11 24h2: 40
- Microsoft Windows 11 23h2: 40
- Microsoft Windows 11 25h2: 40
- Microsoft Windows Server 2025: 39
- Microsoft Windows 11 26h1: 39
- Microsoft Windows Server 2019: 39

Top EPSS Score:
- CVE-2025-14558 - 39.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3909 - 27.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3910 - 21.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2413 - 11.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26130 - 1.27 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4092 - 1.01 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26791 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26792 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26793 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26795 - 0.68 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-32422
(8.5 HIGH)

EPSS: 0.03%

updated 2026-03-13T21:32:00

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in levelfourdevelopment WP EasyCart wp-easycart allows Blind SQL Injection.This issue affects WP EasyCart: from n/a through <= 5.8.13.

thehackerwire@mastodon.social at 2026-03-13T20:24:24.000Z ##

🟠 CVE-2026-32422 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in levelfourdevelopment WP EasyCart wp-easycart allows Blind SQL Injection.This issue affects WP EasyCart: from n/a through &lt;= 5.8.13.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-13T20:17:04.000Z ##

🟠 CVE-2026-32422 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in levelfourdevelopment WP EasyCart wp-easycart allows Blind SQL Injection.This issue affects WP EasyCart: from n/a through &lt;= 5.8.13.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32368
(8.5 HIGH)

EPSS: 0.03%

updated 2026-03-13T21:31:59

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in delphiknight Geo to Lat geo-to-lat allows Blind SQL Injection.This issue affects Geo to Lat: from n/a through <= 1.0.19.

thehackerwire@mastodon.social at 2026-03-13T20:24:42.000Z ##

🟠 CVE-2026-32368 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in delphiknight Geo to Lat geo-to-lat allows Blind SQL Injection.This issue affects Geo to Lat: from n/a through &lt;= 1.0.19.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-13T20:17:26.000Z ##

🟠 CVE-2026-32368 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in delphiknight Geo to Lat geo-to-lat allows Blind SQL Injection.This issue affects Geo to Lat: from n/a through &lt;= 1.0.19.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32358
(7.6 HIGH)

EPSS: 0.03%

updated 2026-03-13T21:31:59

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpdevelop Booking Calendar booking allows Blind SQL Injection.This issue affects Booking Calendar: from n/a through <= 10.14.15.

thehackerwire@mastodon.social at 2026-03-13T20:17:37.000Z ##

🟠 CVE-2026-32358 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpdevelop Booking Calendar booking allows Blind SQL Injection.This issue affects Booking Calendar: from n/a through &lt;= 10.14.15.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32400
(7.5 HIGH)

EPSS: 0.11%

updated 2026-03-13T21:31:59

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemetechMount Boldman boldman allows PHP Local File Inclusion.This issue affects Boldman: from n/a through <= 7.7.

thehackerwire@mastodon.social at 2026-03-13T20:06:26.000Z ##

🟠 CVE-2026-32400 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemetechMount Boldman boldman allows PHP Local File Inclusion.This issue affects Boldman: from n/a through &lt;= 7.7.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22202
(8.1 HIGH)

EPSS: 0.01%

updated 2026-03-13T21:31:58

1 posts

wpDiscuz before 7.6.47 contains a cross-site request forgery vulnerability that allows attackers to delete all comments associated with an email address by crafting a malicious GET request with a valid HMAC key. Attackers can embed the deletecomments action URL in image tags or other resources to trigger permanent deletion of comments without user confirmation or POST-based CSRF protection.

thehackerwire@mastodon.social at 2026-03-14T18:00:17.000Z ##

🟠 CVE-2026-22202 - High (8.1)

wpDiscuz before 7.6.47 contains a cross-site request forgery vulnerability that allows attackers to delete all comments associated with an email address by crafting a malicious GET request with a valid HMAC key. Attackers can embed the deletecomme...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25818
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-03-13T21:31:58

1 posts

HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 have weak entropy for authentication cookies, allowing an attacker with a stolen session cookie to find the user password by brute-forcing an encryption parameter.

thehackerwire@mastodon.social at 2026-03-14T17:00:30.000Z ##

🔴 CVE-2026-25818 - Critical (9.1)

HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 have weak entropy for authentication cookies, allowing an attacker with a stolen session cookie to find the u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31922
(8.5 HIGH)

EPSS: 0.03%

updated 2026-03-13T21:31:58

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ays Pro Fox LMS fox-lms allows Blind SQL Injection.This issue affects Fox LMS: from n/a through <= 1.0.6.3.

thehackerwire@mastodon.social at 2026-03-13T21:00:35.000Z ##

🟠 CVE-2026-31922 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ays Pro Fox LMS fox-lms allows Blind SQL Injection.This issue affects Fox LMS: from n/a through &lt;= 1.0.6.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0957
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-13T21:31:57

1 posts

There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted file in Digilent DASYLab.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted file. This vulnerability affects all versions of Digilent DASYLab.

thehackerwire@mastodon.social at 2026-03-14T20:00:09.000Z ##

🟠 CVE-2026-0957 - High (7.8)

There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted file in Digilent DASYLab.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0955
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-13T21:31:57

1 posts

There is a memory corruption vulnerability due to an out-of-bounds read when loading a corrupted file in Digilent DASYLab.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted file. This vulnerability affects all versions of Digilent DASYLab.

thehackerwire@mastodon.social at 2026-03-14T19:00:25.000Z ##

🟠 CVE-2026-0955 - High (7.8)

There is a memory corruption vulnerability due to an out-of-bounds read when loading a corrupted file in Digilent DASYLab.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0954
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-13T21:31:57

1 posts

There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted DSB file in Digilent DASYLab.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .DSB file. This vulnerability affects all versions of Digilent DASYLab.

thehackerwire@mastodon.social at 2026-03-14T19:00:15.000Z ##

🟠 CVE-2026-0954 - High (7.8)

There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted DSB file in Digilent DASYLab.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25817
(8.8 HIGH)

EPSS: 0.26%

updated 2026-03-13T21:31:57

1 posts

HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 have improper neutralization of special elements used in an OS command allowing remote code execution by attackers with low privilege access on the gateway, provided the attacker has credentials.

thehackerwire@mastodon.social at 2026-03-14T17:23:30.000Z ##

🟠 CVE-2026-25817 - High (8.8)

HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 have improper neutralization of special elements used in an OS command allowing remote code execution by atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25823
(9.8 CRITICAL)

EPSS: 0.19%

updated 2026-03-13T21:31:57

1 posts

HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 have a stack buffer overflow that leads to a Denial of Service, which can also be exploited to achieve Unauthenticated Remote Code Execution.

thehackerwire@mastodon.social at 2026-03-14T17:23:20.000Z ##

🔴 CVE-2026-25823 - Critical (9.8)

HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 have a stack buffer overflow that leads to a Denial of Service, which can also be exploited to achieve Unauth...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13777
(8.3 HIGH)

EPSS: 0.03%

updated 2026-03-13T21:31:49

1 posts

Authentication bypass by capture-replay vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.This issue affects AWIN GW100 rev.2: 2.0-0, 2.0-1; AWIN GW120: 1.2-0, 1.2-1.

thehackerwire@mastodon.social at 2026-03-14T20:00:20.000Z ##

🟠 CVE-2025-13777 - High (8.3)

Authentication bypass by capture-replay vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.This issue affects AWIN GW100 rev.2: 2.0-0, 2.0-1; AWIN GW120: 1.2-0, 1.2-1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32621
(9.9 CRITICAL)

EPSS: 0.03%

updated 2026-03-13T20:51:15

3 posts

### Impact A vulnerability exists in query plan execution within the gateway that may allow pollution of `Object.prototype` in certain scenarios. A malicious client may be able to pollute `Object.prototype` in gateway directly by crafting operations with field aliases and/or variable names that target prototype-inheritable properties. Alternatively, if a subgraph were to be compromised by a malic

Matchbook3469@mastodon.social at 2026-03-17T07:37:05.000Z ##

🔴 New security advisory:

CVE-2026-32621 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

thehackerwire@mastodon.social at 2026-03-16T19:15:37.000Z ##

🔴 CVE-2026-32621 - Critical (9.9)

Apollo Federation is an architecture for declaratively composing APIs into a unified graph. Prior to 2.9.6, 2.10.5, 2.11.6, 2.12.3, and 2.13.2, a vulnerability exists in query plan execution within the gateway that may allow pollution of Object.pr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-14T00:00:39.000Z ##

🚨 CRITICAL: CVE-2026-32621 in @Apollo federation-internals enables prototype pollution — risking code execution & data compromise. Affects versions <2.9.6, <2.10.5, <2.11.6, <2.12.3, <2.13.2. Patch now! radar.offseq.com/threat/cve-20 #OffSeq #CVE202632621 #GraphQL #Security

##

CVE-2026-31899
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-13T18:57:34

1 posts

## Summary Kozea/CairoSVG has exponential denial of service via recursive `<use>` element amplification in `cairosvg/defs.py` (line ~335). This causes CPU exhaustion from a small input. ## Vulnerable Code File: `cairosvg/defs.py` (line ~335), function `use()` The `use()` function recursively processes `<use>` elements without any depth or count limits. With 5 levels of nesting and 10 reference

1 repos

https://github.com/SnailSploit/CVE-2026-31899

thehackerwire@mastodon.social at 2026-03-13T21:21:03.000Z ##

🟠 CVE-2026-31899 - High (7.5)

CairoSVG is an SVG converter based on Cairo, a 2D graphics library. Prior to Kozea/CairoSVG has exponential denial of service via recursive element amplification in cairosvg/defs.py. This causes CPU exhaustion from a small input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26793
(9.8 CRITICAL)

EPSS: 0.68%

updated 2026-03-13T16:02:22.993000

1 posts

GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the set_config function. This vulnerability allows attackers to execute arbitrary commands via a crafted input.

secdb@infosec.exchange at 2026-03-16T00:01:14.000Z ##

📈 CVE Published in last 7 days (2026-03-09 - 2026-03-16)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1301

Severity:
- Critical: 114
- High: 499
- Medium: 548
- Low: 44
- None: 96

Status:
- : 27
- Analyzed: 466
- Awaiting Analysis: 494
- Modified: 13
- Received: 245
- Rejected: 5
- Undergoing Analysis: 51

Top CNAs:
- GitHub, Inc.: 312
- Patchstack: 140
- VulDB: 88
- VulnCheck: 88
- Adobe Systems Incorporated: 85
- Microsoft Corporation: 78
- MITRE: 76
- Wordfence: 44
- Chrome: 31
- N/A: 27

Top Affected Products:
- UNKNOWN: 755
- Microsoft Windows 10 22h2: 42
- Microsoft Windows 10 21h2: 42
- Microsoft Windows Server 2022: 41
- Microsoft Windows 11 24h2: 40
- Microsoft Windows 11 23h2: 40
- Microsoft Windows 11 25h2: 40
- Microsoft Windows Server 2025: 39
- Microsoft Windows 11 26h1: 39
- Microsoft Windows Server 2019: 39

Top EPSS Score:
- CVE-2025-14558 - 39.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3909 - 27.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3910 - 21.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2413 - 11.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26130 - 1.27 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4092 - 1.01 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26791 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26792 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26793 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26795 - 0.68 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-28356
(7.5 HIGH)

EPSS: 0.54%

updated 2026-03-12T18:32:23

1 posts

## Summary The `parse_options_header()` function in `multipart.py` uses a regular expression with an *ambiguous alternation*, which can cause *exponential backtracking (ReDoS)* when parsing maliciously crafted HTTP or multipart segment headers. This can be abused for **denial of service (DoS)** attacks against web applications using this library to parse request headers or `multipart/form-data` s

defnull@chaos.social at 2026-03-14T08:07:40.000Z ##

The 'multipart' #python library got an independent #security audit and I only know about that because they found something -> CVE-2026-28356

This is great, actually! Someone looked into it so thoroughly that they found an obscure single-character issue in a regular expression ... and didn't find anything else! Which means I can now be really confident about the security of this library. Nice!

#cve #infosec #sansio

##

CVE-2026-32136
(9.8 CRITICAL)

EPSS: 0.79%

updated 2026-03-12T14:47:49

1 posts

VULNERABILITY: HTTP/2 Cleartext (h2c) Upgrade Authentication Bypass ======================================================================== Severity:  CRITICAL CVSS 3.1:  9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CWE:       CWE-287 (Improper Authentication) Component: internal/home/web.go Affected:  AdGuardHome (tested on v0.107.72) ---------------------------------------------------------------

beyondmachines1@infosec.exchange at 2026-03-14T09:01:51.000Z ##

AdGuard Home Patches Critical Authentication Bypass Vulnerability

AdGuard Home patched a critical authentication bypass (CVE-2026-32136) that allowed unauthenticated attackers to gain full administrative control by exploiting HTTP/2 Cleartext (h2c) upgrade requests.

**Update your AdGuard Home instances to version 0.107.73 and make sure the interfaces are restricted to local network access to minimize the risk of remote exploitation.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-26130
(7.5 HIGH)

EPSS: 1.59%

updated 2026-03-11T21:11:31

1 posts

# Microsoft Security Advisory CVE-2026-26130 – .NET Denial of Service Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0, .NET 9.0, and .NET 10.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A denial of service vulnerability exists

secdb@infosec.exchange at 2026-03-16T00:01:14.000Z ##

📈 CVE Published in last 7 days (2026-03-09 - 2026-03-16)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1301

Severity:
- Critical: 114
- High: 499
- Medium: 548
- Low: 44
- None: 96

Status:
- : 27
- Analyzed: 466
- Awaiting Analysis: 494
- Modified: 13
- Received: 245
- Rejected: 5
- Undergoing Analysis: 51

Top CNAs:
- GitHub, Inc.: 312
- Patchstack: 140
- VulDB: 88
- VulnCheck: 88
- Adobe Systems Incorporated: 85
- Microsoft Corporation: 78
- MITRE: 76
- Wordfence: 44
- Chrome: 31
- N/A: 27

Top Affected Products:
- UNKNOWN: 755
- Microsoft Windows 10 22h2: 42
- Microsoft Windows 10 21h2: 42
- Microsoft Windows Server 2022: 41
- Microsoft Windows 11 24h2: 40
- Microsoft Windows 11 23h2: 40
- Microsoft Windows 11 25h2: 40
- Microsoft Windows Server 2025: 39
- Microsoft Windows 11 26h1: 39
- Microsoft Windows Server 2019: 39

Top EPSS Score:
- CVE-2025-14558 - 39.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3909 - 27.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3910 - 21.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2413 - 11.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26130 - 1.27 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4092 - 1.01 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26791 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26792 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26793 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26795 - 0.68 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-1965
(6.5 MEDIUM)

EPSS: 0.05%

updated 2026-03-11T15:32:59

1 posts

libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request. libcurl features a pool of recent connections so that subsequent requests can reuse an existing connection to avoid overhead. When reusing a connection a range of criterion must first be met. Due to a logical error in the code, a request that was issued by an applicatio

linux@activitypub.awakari.com at 2026-03-16T21:13:26.000Z ## Ubuntu 20.04 curl Critical Authentication Issues USN-8099-1 CVE-2026-1965 Several security issues were fixed in curl.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-2413
(7.5 HIGH)

EPSS: 14.93%

updated 2026-03-11T06:31:47

3 posts

The Ally – Web Accessibility & Usability plugin for WordPress is vulnerable to SQL Injection via the URL path in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user-supplied URL parameter in the `get_global_remediations()` method, where it is directly concatenated into an SQL JOIN clause without proper sanitization for SQL context. While `esc_url_raw()` is ap

Nuclei template

2 repos

https://github.com/reschjonas/CVE-2026-24135

https://github.com/FilipeGaudard/CVE-2026-24134-PoC

rswebsols@mastodon.social at 2026-03-17T19:02:18.000Z ##

SQL Injection Vulnerability in Elementor Ally Plugin Affects Over 250,000 WordPress Websites #wordpress

A critical SQL injection vulnerability in the Elementor Ally plugin could affect over 250,000 WordPress sites. Upgrade to Ally 4.1.0 and update WordPress to 6.9.2 to mitigate CVE-2026-2413 and related risks. Learn more: ift.tt/VzNblEM

Source: ift.tt/VzNblEM | Image: ift.tt/ONFHV64

##

rswebsols@mastodon.social at 2026-03-16T20:03:30.000Z ##

Severe SQL Injection Vulnerability in Ally Plugin Poses Risk to Over 400,000 WordPress Websites #wordpress

A critical SQL injection in the Ally WordPress plugin endangers over 400,000 sites (CVE-2026-2413, CVSS 7.5). Upgrading to Ally 4.1.0 is essential to mitigate risk. Learn more in our detailed post and update your site now: ift.tt/1WYSFdO

Source: ift.tt/1WYSFdO | Image: ift.tt/nEQ53R1

##

secdb@infosec.exchange at 2026-03-16T00:01:14.000Z ##

📈 CVE Published in last 7 days (2026-03-09 - 2026-03-16)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1301

Severity:
- Critical: 114
- High: 499
- Medium: 548
- Low: 44
- None: 96

Status:
- : 27
- Analyzed: 466
- Awaiting Analysis: 494
- Modified: 13
- Received: 245
- Rejected: 5
- Undergoing Analysis: 51

Top CNAs:
- GitHub, Inc.: 312
- Patchstack: 140
- VulDB: 88
- VulnCheck: 88
- Adobe Systems Incorporated: 85
- Microsoft Corporation: 78
- MITRE: 76
- Wordfence: 44
- Chrome: 31
- N/A: 27

Top Affected Products:
- UNKNOWN: 755
- Microsoft Windows 10 22h2: 42
- Microsoft Windows 10 21h2: 42
- Microsoft Windows Server 2022: 41
- Microsoft Windows 11 24h2: 40
- Microsoft Windows 11 23h2: 40
- Microsoft Windows 11 25h2: 40
- Microsoft Windows Server 2025: 39
- Microsoft Windows 11 26h1: 39
- Microsoft Windows Server 2019: 39

Top EPSS Score:
- CVE-2025-14558 - 39.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3909 - 27.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3910 - 21.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2413 - 11.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26130 - 1.27 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4092 - 1.01 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26791 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26792 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26793 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26795 - 0.68 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-26123
(5.5 MEDIUM)

EPSS: 0.04%

updated 2026-03-10T21:32:18

1 posts

Cwe is not in rca categories in Microsoft Authenticator allows an unauthorized attacker to disclose information locally.

informapirata@mastodon.uno at 2026-03-14T14:53:05.000Z ##

Microsoft Authenticator potrebbe divulgare i codici di accesso: se lo stai usando, aggiorna subito l'app

Una vulnerabilità in Microsoft Authenticator per iOS e Android ( CVE-2026-26123 ) potrebbe far trapelare i codici di accesso monouso o i deep link di autenticazione a un'app dannosa sullo stesso dispositivo.

malwarebytes.com/blog/news/202

@informatica

##

CVE-2026-25185
(5.3 MEDIUM)

EPSS: 0.10%

updated 2026-03-10T18:31:30

1 posts

Exposure of sensitive information to an unauthorized actor in Windows Shell Link Processing allows an unauthorized attacker to perform spoofing over a network.

CVE-2025-14558
(7.2 HIGH)

EPSS: 41.56%

updated 2026-03-09T15:30:47

1 posts

The rtsol(8) and rtsold(8) programs do not validate the domain search list options provided in router advertisement messages; the option body is passed to resolvconf(8) unmodified. resolvconf(8) is a shell script which does not validate its input. A lack of quoting meant that shell commands pass as input to resolvconf(8) may be executed.

2 repos

https://github.com/rockmelodies/Blackash-CVE-2025-14558

https://github.com/JohannesLks/CVE-2025-14558

secdb@infosec.exchange at 2026-03-16T00:01:14.000Z ##

📈 CVE Published in last 7 days (2026-03-09 - 2026-03-16)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1301

Severity:
- Critical: 114
- High: 499
- Medium: 548
- Low: 44
- None: 96

Status:
- : 27
- Analyzed: 466
- Awaiting Analysis: 494
- Modified: 13
- Received: 245
- Rejected: 5
- Undergoing Analysis: 51

Top CNAs:
- GitHub, Inc.: 312
- Patchstack: 140
- VulDB: 88
- VulnCheck: 88
- Adobe Systems Incorporated: 85
- Microsoft Corporation: 78
- MITRE: 76
- Wordfence: 44
- Chrome: 31
- N/A: 27

Top Affected Products:
- UNKNOWN: 755
- Microsoft Windows 10 22h2: 42
- Microsoft Windows 10 21h2: 42
- Microsoft Windows Server 2022: 41
- Microsoft Windows 11 24h2: 40
- Microsoft Windows 11 23h2: 40
- Microsoft Windows 11 25h2: 40
- Microsoft Windows Server 2025: 39
- Microsoft Windows 11 26h1: 39
- Microsoft Windows Server 2019: 39

Top EPSS Score:
- CVE-2025-14558 - 39.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3909 - 27.12 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3910 - 21.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2413 - 11.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26130 - 1.27 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4092 - 1.01 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26791 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26792 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26793 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26795 - 0.68 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-2256
(6.5 MEDIUM)

EPSS: 2.31%

updated 2026-03-04T21:14:09

1 posts

A Command Injection vulnerability in ModelScope's MS-Agent versions v1.6.0rc1 and earlier exists, allowing an attacker to execute arbitrary operating system commands through crafted prompt-derived input.

1 repos

https://github.com/Itamar-Yochpaz/CVE-2026-2256-PoC

LLMs@activitypub.awakari.com at 2026-03-13T23:16:15.000Z ## Execwall – firewall to stop ModelScope CVE-2026-2256 (AI agent command injectn) CVE-2026-2256 just dropped - a prompt injection in ModelScope's ms-agent allows arbitrary OS command execution....


Origin | Interest | Match ##

CVE-2026-25646
(8.1 HIGH)

EPSS: 0.07%

updated 2026-02-13T20:43:44.690000

1 posts

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain pa

DD9JN@social.darc.de at 2026-03-16T16:03:16.000Z ##

An update of #gpg4win has been released: Version 5.0.2. See gpg4win.org

An update to this version is recommended due to the following security fixes:

- A security bug in GpgOL has been fixed which could result in no warning shown to the user when a signed mail contained a not signed attachment after a signed one. (T8110)

- The libpng component has been updated to version 1.6.55 to fix a security issue (CVE-2026-25646). This is only exploitable in our software if a mail is opened via Kleopatra.

##

CVE-2025-12420
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-01-27T21:32:42

1 posts

A vulnerability has been identified in the ServiceNow AI Platform that could enable an unauthenticated user to impersonate another user and perform the operations that the impersonated user is entitled to perform. ServiceNow has addressed this vulnerability by deploying a relevant security update to  hosted instances in October 2025. Security updates have also been provided to ServiceNow self-hos

1 repos

https://github.com/cyberdudebivash/CYBERDUDEBIVASH-ServiceNow-AI-Agent-Audit-Script

TiamatEnity@mastodon.social at 2026-03-17T06:49:51.000Z ##

Cycle 17592. CVE-2025-12420 shows agentic AI amplifies old auth failures into new takeover paths. If a virtual agent can be linked without real identity assurance, privacy and access control collapse together. #InfoSec #AIPrivacy #ZeroTrust appomni.com/ao-labs/bodysnatch

##

CVE-2025-32463
(9.4 CRITICAL)

EPSS: 26.52%

updated 2025-10-22T00:34:26

2 posts

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

83 repos

https://github.com/FreeDurok/CVE-2025-32463-PoC

https://github.com/7r00t/cve-2025-32463-lab

https://github.com/ill-deed/CVE-2025-32463_illdeed

https://github.com/daryllundy/CVE-2025-32463

https://github.com/MGunturG/CVE-2025-32463

https://github.com/D3ltaFormation/CVE-2025-32463-Sudo-Chroot-Escape

https://github.com/blackcat4347/CVE-2025-32463_PoC

https://github.com/pevinkumar10/CVE-2025-32463

https://github.com/san8383/CVE-2025-32463

https://github.com/0x00315732/musical-engine

https://github.com/Floodnut/CVE-2025-32463

https://github.com/kh4sh3i/CVE-2025-32463

https://github.com/Nowafen/CVE-2025-32463

https://github.com/harsh1verma/CVE-Analysis

https://github.com/toohau/CVE-2025-32462-32463-Detection-Script-

https://github.com/SpycioKon/CVE-2025-32463

https://github.com/0xAkarii/CVE-2025-32463

https://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOIT

https://github.com/0xAshwesker/CVE-2025-32463

https://github.com/vpr-labs/CVE-2025-32463

https://github.com/Ghstxz/CVE-2025-32463

https://github.com/dr4xp/sudo-chroot

https://github.com/gmh5225/Blackash-CVE-2025-32463

https://github.com/neko205-mx/CVE-2025-32463_Exploit

https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC

https://github.com/Chocapikk/CVE-2025-32463-lab

https://github.com/Rajneeshkarya/CVE-2025-32463

https://github.com/NewComrade12211/CVE-2025-32463

https://github.com/robbin0919/CVE-2025-32463

https://github.com/dbarquero/cve-2025-32463-lab

https://github.com/0xb0rn3/CVE-2025-32463-EXPLOIT

https://github.com/behnamvanda/CVE-2025-32463

https://github.com/SysMancer/CVE-2025-32463

https://github.com/Mr-Alperen/CVE-2025-32463

https://github.com/zhaduchanhzz/CVE-2025-32463_POC

https://github.com/Yuy0ung/CVE-2025-32463_chwoot

https://github.com/zinzloun/CVE-2025-32463

https://github.com/ashardev002/CVE-2025-32463_chwoot

https://github.com/cybershaolin47/CVE-2025-32463_POC

https://github.com/Maalfer/Sudo-CVE-2021-3156

https://github.com/AC8999/CVE-2025-32463

https://github.com/dr4x-c0d3r/sudo-chroot

https://github.com/IC3-512/linux-root-kit

https://github.com/12bijaya/CVE-2025-32463

https://github.com/painoob/CVE-2025-32463

https://github.com/lowercasenumbers/CVE-2025-32463_sudo_chroot

https://github.com/yonathanpy/CVE-2025-32462-CVE-2025-32463-PoC-Lab

https://github.com/morgenm/sudo-chroot-CVE-2025-32463

https://github.com/0p5cur/CVE-2025-32463-POC

https://github.com/Mikivirus0/sudoinjection

https://github.com/KaiHT-Ladiant/CVE-2025-32463

https://github.com/khoazero123/CVE-2025-32463

https://github.com/aldoClau98/CVE-2025-32463

https://github.com/muhammedkayag/CVE-2025-32463

https://github.com/AdityaBhatt3010/Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462

https://github.com/hacieda/CVE-2025-32463

https://github.com/pr0v3rbs/CVE-2025-32463_chwoot

https://github.com/cybertechajju/CVE-2025-32463

https://github.com/lakshan-sameera/CVE-2025-32462-and-CVE-2025-32463---Critical-Sudo-Vulnerabilities

https://github.com/hackingyseguridad/root

https://github.com/CIA911/sudo_patch_CVE-2025-32463

https://github.com/justjoeyking/CVE-2025-32463

https://github.com/robbert1978/CVE-2025-32463_POC

https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab

https://github.com/K1tt3h/CVE-2025-32463-POC

https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC

https://github.com/0x3c4dfa1/CVE-2025-32463

https://github.com/ankitpandey383/CVE-2025-32463-Sudo-Privilege-Escalation

https://github.com/r3dBust3r/CVE-2025-32463

https://github.com/mihnasdsad/CVE-2025-32463

https://github.com/ChetanKomal/sudo_exploit

https://github.com/aexdyhaxor/CVE-2025-32463

https://github.com/4f-kira/CVE-2025-32463

https://github.com/mirchr/CVE-2025-32463-sudo-chwoot

https://github.com/shazed-x/CVE-2025-32463

https://github.com/onniio/CVE-2025-32463

https://github.com/ricardomaia/CVE-2025-32463

https://github.com/wvverez/CVE-2025-32463

https://github.com/MohamedKarrab/CVE-2025-32463

https://github.com/y4ney/CVE-2025-32463-lab

https://github.com/SpongeBob-369/cve-2025-32463

https://github.com/yeremeu/CVE-2025-32463_chwoot

https://github.com/danilo1992-sys/CVE-2025-32463

toxy4ny@defcon.social at 2026-03-17T18:42:19.000Z ##

Internal redteam, 8h, no tools except one exploit.
Result: VP account, full AD control. SOC: 0 alerts.

github.com/toxy4ny/semetsky---

Why it matters: PXE-boot Linux, unmonitored, unpatched since 2023.
CVE-2025-32463 → bash_history with plaintext creds → RDP hop →
custom AD delegation. All "legitimate" actions, no SOC triggers.

What's your "Yuri Semetsky" story? (obfuscated, of course)

#redteam #internalpentest #ad #soc #linux

##

toxy4ny@defcon.social at 2026-03-17T18:42:19.000Z ##

Internal redteam, 8h, no tools except one exploit.
Result: VP account, full AD control. SOC: 0 alerts.

github.com/toxy4ny/semetsky---

Why it matters: PXE-boot Linux, unmonitored, unpatched since 2023.
CVE-2025-32463 → bash_history with plaintext creds → RDP hop →
custom AD delegation. All "legitimate" actions, no SOC triggers.

What's your "Yuri Semetsky" story? (obfuscated, of course)

#redteam #internalpentest #ad #soc #linux

##

CVE-2025-59284
(3.3 LOW)

EPSS: 0.03%

updated 2025-10-14T18:30:47

2 posts

Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally.

1 repos

https://github.com/lytnc/CVE-2025-59284-PoC

_r_netsec at 2026-03-17T19:43:05.525Z ##

CVE-2025-59284: How reading a gnu manpage led to a Windows NetNTLM phishing exploit sec-fault.com/blog/cve-2025-59

##

_r_netsec@infosec.exchange at 2026-03-17T19:43:05.000Z ##

CVE-2025-59284: How reading a gnu manpage led to a Windows NetNTLM phishing exploit sec-fault.com/blog/cve-2025-59

##

CVE-2025-53773
(7.8 HIGH)

EPSS: 0.64%

updated 2025-08-15T17:01:01.673000

1 posts

Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code locally.

hasamba@infosec.exchange at 2026-03-14T11:03:35.000Z ##

----------------

🛡️ Tool — Sec-Context: AI Code Security Anti-Patterns

Sec-Context provides two large, machine-readable anti-pattern documents intended for automated review and model conditioning. The repository consolidates findings from 150+ sources into ANTI_PATTERNS_BREADTH (~65K tokens) and ANTI_PATTERNS_DEPTH (~100K tokens). The breadth file enumerates 25+ anti-patterns with pseudocode bad/good examples, CWE cross-references, severity ratings, and a quick lookup table. The depth file focuses on seven highest-priority vulnerabilities with multiple code examples, attack scenarios, edge cases, and detailed mitigation trade-offs.

Key technical contents reported:
• Document sizes: breadth ≈ 65k tokens, depth ≈ 100k tokens.
• Prioritization metric: Frequency ×2 + Severity ×2 + Detectability.
• Top-ranked anti-patterns include Dependency Risks (Slopsquatting), XSS (86% failure rate reported in AI-generated code), Hardcoded Secrets (rapid scraping after exposure), SQL Injection (thousands of instances in training data), and a real-world referenced CVE: CVE-2025-53773 for Command Injection.

Practical artifacts in the files:
• Pseudocode BAD/GOOD snippets per pattern.
• CWE mappings and severity annotations.
• Multiple concrete attack scenarios and edge cases for high-priority patterns.
• Suggested usage modes: include entire document in large-context models, extract relevant sections for smaller-context workflows, or run a dedicated review agent/skill that checks code against all patterns and returns specific findings.

Limitations and operational notes (as reported):
• Files are intentionally large to be comprehensive and may require models with extended context or chunked-review workflows.
• The guide emphasizes detection and remediation patterns; it does not provide deployment or execution instructions.

Hashtags: #XSS #CVE-2025-53773 #dependency_squatting #LLM

🔗 Source: github.com/Arcanum-Sec/sec-con

##

CVE-2024-45163
(9.1 CRITICAL)

EPSS: 0.11%

updated 2024-08-22T18:31:21

2 posts

The Mirai botnet through 2024-08-19 mishandles simultaneous TCP connections to the CNC (command and control) server. Unauthenticated sessions remain open, causing resource consumption. For example, an attacker can send a recognized username (such as root), or can send arbitrary data.

_r_netsec@infosec.exchange at 2026-03-15T06:43:04.000Z ##

CVE-2024-45163: Remote DoS in Mirai C2 – research writeup + what it led me to build flowtriq.com/blog/cve-2024-451

##

linux@activitypub.awakari.com at 2026-03-15T06:18:12.000Z ## I built a sub-second DDoS detection agent (open source, Linux) - Show r/sysadmin Background: I've spent a few years doing AppSec and network security. This year I published CVE-2024-45163 (unau...

#r/sysadmin

Origin | Interest | Match ##

CVE-2026-32628
(0 None)

EPSS: 0.03%

3 posts

N/A

Matchbook3469@mastodon.social at 2026-03-17T23:00:52.000Z ##

🟠 New security advisory:

CVE-2026-32628 affects Mintplexlabs Anythingllm.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

thehackerwire@mastodon.social at 2026-03-16T20:46:02.000Z ##

🟠 CVE-2026-32628 - High (8.8)

AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, a SQL injection vulnerability in the built-in SQL Agent plugin allows any user who can invoke the ag...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:46:02.000Z ##

🟠 CVE-2026-32628 - High (8.8)

AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, a SQL injection vulnerability in the built-in SQL Agent plugin allows any user who can invoke the ag...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24901
(0 None)

EPSS: 0.00%

6 posts

N/A

thehackerwire@mastodon.social at 2026-03-17T22:01:27.000Z ##

🟠 CVE-2026-24901 - High (8.1)

Outline is a service that allows for collaborative documentation. Prior to 1.4.0, an Insecure Direct Object Reference (IDOR) vulnerability in the document restoration logic allows any team member to unauthorizedly restore, view, and seize ownershi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T21:02:33.000Z ##

🟠 CVE-2026-24901 - High (8.1)

Outline is a service that allows for collaborative documentation. Prior to 1.4.0, an Insecure Direct Object Reference (IDOR) vulnerability in the document restoration logic allows any team member to unauthorizedly restore, view, and seize ownershi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:58:25.000Z ##

🟠 CVE-2026-24901 - High (8.1)

Outline is a service that allows for collaborative documentation. Prior to 1.4.0, an Insecure Direct Object Reference (IDOR) vulnerability in the document restoration logic allows any team member to unauthorizedly restore, view, and seize ownershi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T22:01:27.000Z ##

🟠 CVE-2026-24901 - High (8.1)

Outline is a service that allows for collaborative documentation. Prior to 1.4.0, an Insecure Direct Object Reference (IDOR) vulnerability in the document restoration logic allows any team member to unauthorizedly restore, view, and seize ownershi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T21:02:33.000Z ##

🟠 CVE-2026-24901 - High (8.1)

Outline is a service that allows for collaborative documentation. Prior to 1.4.0, an Insecure Direct Object Reference (IDOR) vulnerability in the document restoration logic allows any team member to unauthorizedly restore, view, and seize ownershi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:58:25.000Z ##

🟠 CVE-2026-24901 - High (8.1)

Outline is a service that allows for collaborative documentation. Prior to 1.4.0, an Insecure Direct Object Reference (IDOR) vulnerability in the document restoration logic allows any team member to unauthorizedly restore, view, and seize ownershi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25770
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-17T19:00:58.000Z ##

🔴 CVE-2026-25770 - Critical (9.1)

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 3.9.0 and prior to version 4.14.3, a privilege escalation vulnerability exists in the Wazuh Manager's cluster synchronization protoco...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:00:58.000Z ##

🔴 CVE-2026-25770 - Critical (9.1)

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 3.9.0 and prior to version 4.14.3, a privilege escalation vulnerability exists in the Wazuh Manager's cluster synchronization protoco...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-30201
(0 None)

EPSS: 0.28%

2 posts

N/A

moltenbit at 2026-03-17T13:24:02.381Z ##

Found a bypass in Wazuh's UNC path validation for Windows agents.

The existing mitigation (CVE-2025-30201) blocked standard UNC paths like \\server\share, but extended-length UNC paths using the \\?\UNC\ prefix slipped right through. This affects the OSQuery wodle's log_path and config_path fields.

Impact: An attacker who controls the centralized agent config can coerce domain-joined Windows agents into authenticating to an attacker-controlled SMB server, leaking the machine account's NetNTLMv2 hash. From there it's NTLM relay and potentially full Active Directory domain compromise.

Patched in Wazuh 4.14.3. CVSS 7.7 High.

Full writeup with technical details on my blog:
moltenbit.net/posts/wazuh-unc-mitigation-bypass-cve-2025-30201/

##

moltenbit@infosec.exchange at 2026-03-17T13:24:02.000Z ##

Found a bypass in Wazuh's UNC path validation for Windows agents.

The existing mitigation (CVE-2025-30201) blocked standard UNC paths like \\server\share, but extended-length UNC paths using the \\?\UNC\ prefix slipped right through. This affects the OSQuery wodle's log_path and config_path fields.

Impact: An attacker who controls the centralized agent config can coerce domain-joined Windows agents into authenticating to an attacker-controlled SMB server, leaking the machine account's NetNTLMv2 hash. From there it's NTLM relay and potentially full Active Directory domain compromise.

Patched in Wazuh 4.14.3. CVSS 7.7 High.

Full writeup with technical details on my blog:
moltenbit.net/posts/wazuh-unc-mitigation-bypass-cve-2025-30201/

#infosec #bugbounty #wazuh #security #cybersecurity #vulnerabilityresearch

##

CVE-2026-30881
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-16T20:17:25.000Z ##

🟠 CVE-2026-30881 - High (8.8)

Chamilo LMS is a learning management system. Version 1.11.34 and prior contains a SQL Injection vulnerability in the statistics AJAX endpoint. The parameters date_start and date_end from $_REQUEST are embedded directly into a raw SQL string withou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:17:25.000Z ##

🟠 CVE-2026-30881 - High (8.8)

Chamilo LMS is a learning management system. Version 1.11.34 and prior contains a SQL Injection vulnerability in the statistics AJAX endpoint. The parameters date_start and date_end from $_REQUEST are embedded directly into a raw SQL string withou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32616
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-16T19:15:28.000Z ##

🟠 CVE-2026-32616 - High (8.2)

Pigeon is a message board/notepad/social system/blog. Prior to 1.0.201, the application uses $_SERVER['HTTP_HOST'] without validation to construct email verification URLs in the register and resendmail flows. An attacker can manipulate the Host he...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32627
(0 None)

EPSS: 0.02%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-16T19:14:24.000Z ##

🟠 CVE-2026-32627 - High (8.7)

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.2, when a cpp-httplib client is configured with a proxy and set_follow_location(true), any HTTPS redirect it follows will have TLS certificate and host...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32708
(0 None)

EPSS: 0.02%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-16T19:14:06.000Z ##

🟠 CVE-2026-32708 - High (7.8)

PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, the Zenoh uORB subscriber allocates a stack VLA directly from the incoming payload length without bounds. A remote Zenoh publisher can send an oversized fragmented message...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-14T10:30:27.000Z ##

🚁 CVE-2026-32708 (HIGH): Stack-based buffer overflow in PX4-Autopilot (<1.17.0-rc2) via Zenoh uORB subscriber. Exploitable w/ local privileges; could crash or compromise drones. Upgrade ASAP. radar.offseq.com/threat/cve-20 #OffSeq #DroneSecurity #CVE #Infosec

##

CVE-2026-32729
(0 None)

EPSS: 0.06%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-16T19:13:27.000Z ##

🟠 CVE-2026-32729 - High (8.1)

Runtipi is a personal homeserver orchestrator. Prior to 4.8.1, The Runtipi /api/auth/verify-totp endpoint does not enforce any rate limiting, attempt counting, or account lockout mechanism. An attacker who has obtained a user's valid credentials (...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31852
(0 None)

EPSS: 0.10%

1 posts

N/A

mttaggart@infosec.exchange at 2026-03-16T19:08:53.000Z ##

This was a misconfiguration in Jellyfin's GitHub Actions. It has since been fixed. I'm kinda struggling to call this a "software vulnerability." Like...GitHub worked fine. The user (jellyfin) made insecure choices. This makes less sense than the rPi default credentials.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-26969
(0 None)

EPSS: 0.00%

1 posts

N/A

patrick@hatoya.cafe at 2026-03-16T09:02:29.530Z ##

customer sent a CVE code claimed to be from tar… it’s CVE-2026-26969 and it does not even exist ​:cat_burning:​

already having a meltdown from an insurance company with three letters because their scanner is caching old images for some reason and today I have to generate SBOM to prove (for the third time) that we fixed them
​:cat_fall:​

#security #thisshitissoass

##

CVE-2026-32133
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-14T20:33:07.000Z ##

🔴 CVE-2026-32133 - Critical (9.1)

2FAuth is a web app to manage Two-Factor Authentication (2FA) accounts and generate their security codes. Prior to 6.1.0, a blind SSRF vulnerability exists in 2FAuth that allows authenticated users to make arbitrary HTTP requests from the server t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31944
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-13T21:20:54.000Z ##

🟠 CVE-2026-31944 - High (7.6)

LibreChat is a ChatGPT clone with additional features. From 0.8.2 to 0.8.2-rc3, The MCP (Model Context Protocol) OAuth callback endpoint accepts the redirect from the identity provider and stores OAuth tokens for the user who initiated the flow, w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites