## Updated at UTC 2026-03-10T23:22:29.033723

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-27269 7.8 0.00% 1 0 2026-03-10T21:32:24 Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vul
CVE-2026-27275 7.8 0.00% 1 0 2026-03-10T21:32:24 Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds
CVE-2026-27273 7.8 0.00% 2 0 2026-03-10T21:32:24 Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds
CVE-2026-27274 7.8 0.00% 1 0 2026-03-10T21:32:24 Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds
CVE-2026-27277 7.8 0.00% 1 0 2026-03-10T21:32:17 Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free
CVE-2025-13476 9.8 0.05% 1 0 2026-03-10T21:32:12 Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 u
CVE-2026-24457 9.1 0.19% 1 0 2026-03-10T19:52:11.887000 An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read ar
CVE-2025-45691 7.5 0.05% 1 0 2026-03-10T19:38:22.443000 An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in
CVE-2025-14675 7.2 0.68% 1 0 2026-03-10T19:34:20 The Meta Box plugin for WordPress is vulnerable to arbitrary file deletion due t
CVE-2026-27280 7.8 0.00% 1 0 2026-03-10T19:17:20.250000 DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write v
CVE-2026-27279 7.8 0.00% 2 0 2026-03-10T19:17:20.080000 Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds
CVE-2026-27276 7.8 0.00% 1 0 2026-03-10T19:17:19.740000 Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free
CVE-2026-26801 7.5 0.00% 1 0 2026-03-10T19:17:17.430000 Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.
CVE-2026-26738 7.8 0.00% 1 0 2026-03-10T19:17:16.893000 Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows
CVE-2025-11158 9.1 0.04% 1 0 2026-03-10T19:17:08.173000 Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.6, i
CVE-2026-3703 9.8 0.07% 2 0 2026-03-10T18:55:10.750000 A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_4
CVE-2026-3630 9.8 0.04% 3 0 2026-03-10T18:48:52.193000 Delta Electronics COMMGR2 has Stack-based Buffer Overflow vulnerability.
CVE-2026-27826 8.2 0.00% 2 1 2026-03-10T18:48:50 ### Summary An unauthenticated attacker who can reach the mcp-atlassian HTTP end
CVE-2026-3823 8.8 0.14% 3 0 2026-03-10T18:46:53.270000 EHG2408 series switch developed by Atop Technologies has a Stack-based Buffer Ov
CVE-2026-30944 8.8 0.00% 2 0 2026-03-10T18:45:50 ## Summary The /studiocms_api/dashboard/api-tokens endpoint allows any authentic
CVE-2026-30957 10.0 0.00% 3 0 2026-03-10T18:45:14 ### Summary OneUptime Synthetic Monitors allow a low-privileged authenticated p
CVE-2026-30956 10.0 0.00% 1 0 2026-03-10T18:45:04 ### Summary A low‑privileged user can bypass authorization and tenant isolation
CVE-2026-30921 10.0 0.01% 2 0 2026-03-10T18:44:25 Summary OneUptime Synthetic Monitors allow low-privileged project users to subm
CVE-2026-30869 9.3 0.43% 1 0 2026-03-10T18:43:20 ### Summary A path traversal vulnerability in the `/export` endpoint allows an a
CVE-2026-28292 9.8 0.00% 1 0 2026-03-10T18:38:58 ### Summary The `blockUnsafeOperationsPlugin` in `simple-git` fails to block gi
CVE-2026-30910 7.5 0.01% 1 0 2026-03-10T18:32:20 Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overf
CVE-2026-26130 7.5 0.00% 3 0 2026-03-10T18:31:31 Allocation of resources without limits or throttling in ASP.NET Core allows an u
CVE-2026-26134 7.8 0.00% 1 0 2026-03-10T18:31:31 Integer overflow or wraparound in Microsoft Office allows an authorized attacker
CVE-2026-3845 8.8 0.00% 2 0 2026-03-10T18:31:31 Heap buffer overflow in the Audio/Video: Playback component in Firefox for Andro
CVE-2026-26141 7.8 0.00% 1 0 2026-03-10T18:31:30 Improper authentication in Azure Arc allows an authorized attacker to elevate pr
CVE-2026-26132 7.8 0.00% 1 0 2026-03-10T18:31:30 Use after free in Windows Kernel allows an authorized attacker to elevate privil
CVE-2026-26148 8.2 0.00% 1 0 2026-03-10T18:31:30 External initialization of trusted variables or data stores in Azure Entra ID al
CVE-2026-3847 8.8 0.00% 2 1 2026-03-10T18:31:30 Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidenc
CVE-2026-1261 7.2 0.07% 1 0 2026-03-10T18:31:26 The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scriptin
CVE-2026-3585 7.5 0.06% 2 0 2026-03-10T18:31:24 The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in
CVE-2026-2364 7.3 0.01% 2 0 2026-03-10T18:31:24 If a legitimate user confirms a self-update prompt or initiate an installation o
CVE-2026-1508 4.3 0.00% 1 0 2026-03-10T18:31:24 The Court Reservation WordPress plugin before 1.10.9 does not have CSRF check i
CVE-2025-41712 6.5 0.03% 2 0 2026-03-10T18:31:24 An unauthenticated remote attacker who tricks a user to upload a manipulated HTM
CVE-2025-41711 5.3 0.02% 2 0 2026-03-10T18:31:24 An unauthenticated remote attacker can use firmware images to extract password h
CVE-2026-0953 9.8 0.04% 1 0 2026-03-10T18:31:24 The Tutor LMS Pro plugin for WordPress is vulnerable to authentication bypass in
CVE-2026-3843 9.8 0.46% 2 0 2026-03-10T18:19:05.287000 Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux conta
CVE-2026-3483 7.8 0.00% 1 0 2026-03-10T18:19:01.720000 An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local
CVE-2026-30987 7.8 0.00% 1 0 2026-03-10T18:18:58.003000 iccDEV provides a set of libraries and tools for working with ICC color manageme
CVE-2026-30979 7.8 0.00% 1 0 2026-03-10T18:18:56.700000 iccDEV provides a set of libraries and tools for working with ICC color manageme
CVE-2026-30934 8.9 0.00% 1 0 2026-03-10T18:18:53.257000 FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3
CVE-2026-30933 7.5 0.00% 4 0 2026-03-10T18:18:53.070000 FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3
CVE-2026-30240 9.6 0.03% 2 0 2026-03-10T18:18:50.127000 Budibase is a low code platform for creating internal tools, workflows, and admi
CVE-2026-2339 7.5 0.00% 1 0 2026-03-10T18:18:48.393000 Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Sof
CVE-2026-26144 7.5 0.00% 3 0 2026-03-10T18:18:43.110000 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2026-26131 7.8 0.00% 1 0 2026-03-10T18:18:42.393000 Incorrect default permissions in .NET allows an authorized attacker to elevate p
CVE-2026-26128 7.8 0.00% 1 0 2026-03-10T18:18:41.903000 Improper authentication in Windows SMB Server allows an authorized attacker to e
CVE-2026-26127 7.5 0.00% 1 0 2026-03-10T18:18:41.713000 Out-of-bounds read in .NET allows an unauthorized attacker to deny service over
CVE-2026-26121 7.5 0.00% 1 0 2026-03-10T18:18:41.347000 Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized
CVE-2026-26118 8.8 0.00% 1 0 2026-03-10T18:18:41.180000 Server-side request forgery (ssrf) in Azure MCP Server allows an authorized atta
CVE-2026-26117 7.8 0.00% 1 0 2026-03-10T18:18:41.017000 Authentication bypass using an alternate path or channel in Azure Windows Virtua
CVE-2026-26113 8.4 0.00% 1 0 2026-03-10T18:18:40.177000 Untrusted pointer dereference in Microsoft Office allows an unauthorized attacke
CVE-2025-41710 6.5 0.03% 2 0 2026-03-10T18:17:56.187000 An unauthenticated remote attacker may use hardcodes credentials to get access t
CVE-2025-41709 9.8 0.05% 2 0 2026-03-10T18:17:55.980000 [PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allo
CVE-2026-27944 9.8 0.05% 4 3 template 2026-03-10T18:11:27.450000 Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.
CVE-2026-30920 8.6 0.01% 2 0 2026-03-10T17:40:16 OneUptime is a solution for monitoring and managing online services. Prior to 10
CVE-2026-27685 9.1 0.04% 1 0 2026-03-10T17:38:10.980000 SAP NetWeaver Enterprise Portal Administration is vulnerable if a privileged use
CVE-2026-1603 8.6 67.72% 3 0 template 2026-03-10T15:31:30 An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allo
CVE-2026-3698 8.8 0.04% 1 0 2026-03-10T15:21:52.560000 A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. This affect
CVE-2026-27603 7.5 0.07% 1 0 2026-03-10T14:02:36.263000 Chartbrew is an open-source web application that can connect directly to databas
CVE-2026-3288 8.8 0.04% 2 1 2026-03-10T09:32:52 A security issue was discovered in ingress-nginx where the `nginx.ingress.kubern
CVE-2026-28693 8.1 0.04% 1 0 2026-03-10T07:43:44.577000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-28431 0 0.04% 1 0 2026-03-10T07:43:35.600000 Misskey is an open source, federated social media platform. All Misskey servers
CVE-2025-69219 8.8 0.03% 1 1 2026-03-10T01:21:25 A user with access to the DB could craft a database entry that would result in e
CVE-2025-70238 7.5 0.04% 1 0 2026-03-09T21:32:45 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2026-3638 5.9 0.03% 1 0 2026-03-09T21:31:49 Improper access control in user and role restore API endpoints in Devolutions Se
CVE-2025-61612 7.5 0.15% 1 0 2026-03-09T21:31:37 In nr modem, there is a possible system crash due to improper input validation.
CVE-2025-69278 7.5 0.15% 1 0 2026-03-09T21:31:37 In nr modem, there is a possible system crash due to improper input validation.
CVE-2025-61616 7.5 0.15% 1 0 2026-03-09T21:31:37 In nr modem, there is a possible system crash due to improper input validation.
CVE-2025-61614 7.5 0.15% 1 0 2026-03-09T21:31:37 In nr modem, there is a possible system crash due to improper input validation.
CVE-2025-61613 7.5 0.15% 1 0 2026-03-09T21:31:37 In nr modem, there is a possible system crash due to improper input validation.
CVE-2025-26399 9.8 34.23% 4 1 2026-03-09T21:31:33 SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxP
CVE-2021-22054 7.5 93.74% 3 1 template 2026-03-09T21:31:33 VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.
CVE-2025-61615 7.5 0.15% 1 0 2026-03-09T21:16:12.193000 In nr modem, there is a possible system crash due to improper input validation.
CVE-2025-61611 7.5 0.28% 1 0 2026-03-09T21:16:11.650000 In modem, there is a possible improper input validation. This could lead to remo
CVE-2026-0846 8.6 0.08% 2 0 2026-03-09T20:16:05.703000 A vulnerability in the `filestring()` function of the `nltk.util` module in nltk
CVE-2025-69279 7.5 0.15% 1 0 2026-03-09T20:16:02.263000 In nr modem, there is a possible system crash due to improper input validation.
CVE-2026-29784 7.5 0.02% 1 0 2026-03-09T20:06:23.960000 Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, in
CVE-2025-70363 7.5 0.05% 1 0 2026-03-09T19:16:00.890000 Incorrect access control in the REST API of Ibexa & Ciril GROUP eZ Platform / Ci
CVE-2026-3038 7.5 0.04% 1 0 2026-03-09T18:32:49 The rtsock_msg_buffer() function serializes routing information into a buffer.
CVE-2026-3588 7.5 0.02% 1 0 2026-03-09T18:31:50 A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 all
CVE-2025-70047 7.5 0.04% 1 0 2026-03-09T18:31:49 An issue pertaining to CWE-400: Uncontrolled Resource Consumption was discovered
CVE-2026-25866 7.8 0.01% 1 0 2026-03-09T18:31:49 MobaXterm versions prior to 26.1 contain an uncontrolled search path element vul
CVE-2026-30863 None 0.07% 1 1 2026-03-09T17:42:26 ### Impact The Google, Apple, and Facebook authentication adapters use JWT veri
CVE-2026-30860 9.9 0.16% 1 0 2026-03-09T17:35:41.243000 WeKnora is an LLM-powered framework designed for deep document understanding and
CVE-2026-3807 8.8 0.08% 1 0 2026-03-09T16:20:08.637000 A security vulnerability has been detected in Tenda FH1202 1.2.0.14(408). Impact
CVE-2026-3678 8.8 0.07% 1 0 2026-03-09T16:16:21.987000 A vulnerability was determined in Tenda FH451 1.0.0.9. Affected is the function
CVE-2026-30851 8.1 0.01% 1 0 2026-03-09T15:50:55 ## Summary Caddy's `forward_auth` directive with `copy_headers` generates condi
CVE-2026-30832 9.1 0.04% 2 0 2026-03-09T15:50:39 While auditing the codebase in the wake of the webhook SSRF fix shipped in v0.11
CVE-2026-30834 7.5 0.03% 1 0 2026-03-09T15:50:20 # SSRF with Full Response Exfiltration via Download Handler ### Summary A Serve
CVE-2026-29191 9.3 0.03% 1 0 2026-03-09T15:48:28 ### Summary A vulnerability was discovered in Zitadel's login V2 interface that
CVE-2026-2919 4.3 0.01% 1 0 2026-03-09T15:30:48 Malicious scripts could display attacker-controlled web content under spoofed do
CVE-2025-14769 7.5 0.01% 1 0 2026-03-09T15:30:47 In some cases, the `tcp-setmss` handler may free the packet data and throw an er
CVE-2026-3811 8.8 0.08% 2 0 2026-03-09T15:26:21.790000 A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the functi
CVE-2026-3728 8.8 0.08% 1 0 2026-03-09T15:24:28.950000 A vulnerability was determined in Tenda F453 1.0.0.3/1.If. This issue affects th
CVE-2026-3729 8.8 0.08% 1 0 2026-03-09T15:24:21.043000 A vulnerability was identified in Tenda F453 1.0.0.3/3.As. Impacted is the funct
CVE-2026-3768 8.8 0.08% 2 0 2026-03-09T15:17:08.960000 A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by th
CVE-2026-2219 7.5 0.01% 1 0 2026-03-09T15:15:57.870000 It was discovered that dpkg-deb (a component of dpkg, the Debian package managem
CVE-2026-3802 8.8 0.08% 1 0 2026-03-09T15:09:44.737000 A vulnerability was determined in Tenda i3 1.0.0.6(2204). Affected by this issue
CVE-2026-3803 8.8 0.08% 1 0 2026-03-09T15:09:33.580000 A vulnerability was identified in Tenda i3 1.0.0.6(2204). This affects the funct
CVE-2026-30227 0 1.01% 1 0 2026-03-09T13:35:34.633000 MimeKit is a C# library which may be used for the creation and parsing of messag
CVE-2025-41758 8.8 0.18% 1 0 2026-03-09T13:35:07.393000 A low-privileged remote attacker can exploit an arbitrary file write vulnerabili
CVE-2025-41761 7.8 0.02% 2 0 2026-03-09T13:35:07.393000 A low‑privileged local attacker who gains access to the UBR service account (e.g
CVE-2025-41756 8.1 0.10% 1 0 2026-03-09T13:35:07.393000 A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.c
CVE-2026-29779 7.5 0.03% 1 0 2026-03-09T13:35:07.393000 UptimeFlare is a serverless uptime monitoring & status page solution, powered by
CVE-2026-28678 8.1 0.03% 1 0 2026-03-09T13:35:07.393000 DSA Study Hub is an interactive educational web application. Prior to commit d52
CVE-2026-30855 9.8 0.11% 1 0 2026-03-09T13:21:39 ### Summary An authorization bypass in tenant management endpoints of WeKnora ap
CVE-2026-30861 10.0 0.22% 1 0 2026-03-09T13:14:29 ### Summary A critical unauthenticated remote code execution (RCE) vulnerabilit
CVE-2026-3814 8.8 0.04% 2 0 2026-03-09T12:31:50 A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected
CVE-2026-3815 8.8 0.04% 2 0 2026-03-09T12:31:49 A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects
CVE-2025-41764 9.1 0.10% 2 0 2026-03-09T09:30:37 Due to insufficient authorization enforcement, an unauthorized remote attacker c
CVE-2025-41765 9.1 0.06% 1 0 2026-03-09T09:30:37 Due to insufficient authorization enforcement, an unauthorized remote attacker c
CVE-2025-41772 7.5 0.03% 1 0 2026-03-09T09:30:37 An unauthenticated remote attacker can obtain valid session tokens because they
CVE-2025-41766 8.8 0.39% 1 0 2026-03-09T09:30:37 A low-privileged remote attacker can trigger a stack-based buffer overflow via a
CVE-2025-41757 8.8 0.22% 1 0 2026-03-09T09:30:36 A low-privileged remote attacker can abuse the backup restore functionality of U
CVE-2026-3810 8.8 0.08% 1 0 2026-03-09T09:30:36 A vulnerability has been found in Tenda FH1202 1.2.0.14(408). This affects the f
CVE-2026-3809 8.8 0.08% 1 0 2026-03-09T09:30:30 A flaw has been found in Tenda FH1202 1.2.0.14(408). The impacted element is the
CVE-2026-3808 8.8 0.09% 1 0 2026-03-09T09:30:30 A vulnerability was detected in Tenda FH1202 1.2.0.14(408). The affected element
CVE-2026-30896 7.8 0.01% 1 0 2026-03-09T06:31:19 The installer for Qsee Client versions 1.0.1 and prior insecurely load Dynamic L
CVE-2026-3804 8.8 0.08% 2 0 2026-03-09T06:31:19 A security flaw has been discovered in Tenda i3 1.0.0.6(2204). This vulnerabilit
CVE-2026-3631 7.5 0.04% 1 0 2026-03-09T06:31:19 Delta Electronics COMMGR2 has Buffer Over-read DoS vulnerability.
CVE-2026-3799 8.8 0.08% 1 0 2026-03-09T06:31:19 A flaw has been found in Tenda i3 1.0.0.6(2204). This impacts the function formS
CVE-2026-3801 8.8 0.09% 1 0 2026-03-09T06:31:19 A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerabil
CVE-2026-3787 7.0 0.01% 1 0 2026-03-09T00:30:19 A weakness has been identified in UltraVNC 1.6.4.0 on Windows. This affects an u
CVE-2026-3769 8.8 0.08% 2 0 2026-03-08T21:30:22 A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is th
CVE-2026-3732 8.8 0.08% 2 0 2026-03-08T12:30:35 A security vulnerability has been detected in Tenda F453 1.0.0.3. This affects t
CVE-2026-3727 8.8 0.03% 1 0 2026-03-08T12:30:27 A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the
CVE-2026-3726 8.8 0.09% 2 0 2026-03-08T09:30:27 A vulnerability has been found in Tenda F453 1.0.0.3. This affects the function
CVE-2026-3715 8.8 0.04% 2 0 2026-03-08T09:30:21 A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the funct
CVE-2026-3701 8.8 0.04% 1 0 2026-03-08T06:31:15 A security vulnerability has been detected in H3C Magic B1 up to 100R004. Affect
CVE-2026-3699 8.8 0.04% 1 0 2026-03-08T03:30:34 A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-171114. This i
CVE-2026-3700 8.8 0.04% 1 0 2026-03-08T03:30:34 A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. Affected is
CVE-2026-3677 8.8 0.08% 1 0 2026-03-08T00:31:58 A vulnerability was found in Tenda FH451 1.0.0.9. This impacts the function from
CVE-2026-3679 8.8 0.07% 1 0 2026-03-08T00:31:58 A vulnerability was identified in Tenda FH451 1.0.0.9. Affected by this vulnerab
CVE-2026-25070 None 1.03% 1 0 2026-03-07T03:30:29 XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain
CVE-2026-28802 None 0.04% 1 0 2026-03-06T21:56:56 ### Summary After upgrading the library from 1.5.2 to 1.6.0 (and the latest 1.6.
CVE-2026-29058 9.8 0.10% 1 0 2026-03-06T21:56:51 ## Impact An unauthenticated attacker can execute arbitrary OS commands on the
CVE-2026-24105 9.8 1.69% 1 0 2026-03-06T21:05:36.243000 An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.1
CVE-2025-70230 9.8 0.06% 1 0 2026-03-06T17:37:58.670000 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2018-25181 7.5 0.57% 1 0 2026-03-06T15:31:36 Musicco 2.0.0 contains a path traversal vulnerability that allows unauthenticate
CVE-2026-26417 8.1 0.03% 1 1 2026-03-06T12:31:37 A broken access control vulnerability in the password reset functionality of Tat
CVE-2025-70231 9.8 0.08% 1 0 2026-03-06T12:31:36 D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When proces
CVE-2025-70229 9.8 0.06% 1 0 2026-03-06T12:31:36 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2025-70616 7.8 0.01% 1 0 2026-03-06T12:31:36 A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys
CVE-2026-26418 7.5 0.06% 1 1 2026-03-06T12:31:36 Missing authentication and authorization in the web API of Tata Consultancy Serv
CVE-2025-70233 9.8 0.06% 1 0 2026-03-06T12:30:31 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2025-70232 9.8 0.06% 1 0 2026-03-06T12:30:31 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2026-25921 9.3 0.02% 2 0 2026-03-05T22:28:33 ### Summary Overwritable LFS object across different repos leads to supply-chain
CVE-2026-26478 9.8 1.22% 1 0 2026-03-04T18:32:01 A shell command injection vulnerability in Mobvoi Tichome Mini smart speaker 012
CVE-2026-21385 7.8 0.38% 2 1 2026-03-04T18:13:00.207000 Memory corruption while using alignments for memory allocation.
CVE-2026-2256 6.5 2.31% 1 1 2026-03-03T21:52:29.877000 A command injection vulnerability in ModelScope's ms-agent versions v1.6.0rc1 an
CVE-2024-47886 7.2 0.89% 1 0 2026-03-03T19:11:21.227000 Chamilo is a learning management system. Chamillo is affected by a post-authenti
CVE-2026-24107 9.8 1.13% 1 0 2026-03-03T03:33:44 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the
CVE-2026-24101 9.8 1.13% 1 0 2026-03-02T18:31:44 An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_mul
CVE-2026-27611 6.5 0.03% 4 0 2026-02-27T21:42:55 ### Summary When users share password-protected files, the recipient can complet
CVE-2026-27739 None 0.05% 1 0 2026-02-25T22:42:37 A [Server-Side Request Forgery (SSRF)](https://developer.mozilla.org/en-US/docs/
CVE-2026-20127 10.0 2.60% 3 6 2026-02-25T18:31:45 A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controlle
CVE-2026-20841 7.8 0.11% 1 12 2026-02-25T14:32:14.467000 Improper neutralization of special elements used in a command ('command injectio
CVE-2026-25253 8.8 0.05% 1 7 2026-02-13T17:41:02.987000 OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value f
CVE-2026-2138 8.8 0.08% 1 0 2026-02-08T06:31:53 A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the
CVE-2025-14338 0 0.01% 1 0 2026-01-14T16:25:12.057000 Polkit authentication dis isabled by default and a race condition in the Polkit
CVE-2025-66005 None 0.02% 1 0 2026-01-14T12:31:39 Lack of authorization of the InputManager D-Bus interface in InputPlumber versio
CVE-2025-0037 6.6 0.03% 1 0 2025-06-10T00:30:36 In AMD Versal Adaptive SoC devices, the lack of address validation when executin
CVE-2022-25912 8.1 43.30% 11 0 2025-04-22T21:15:42.690000 The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RC
CVE-2022-25860 8.1 41.35% 11 0 2025-04-01T16:15:15.807000 Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code E
CVE-2026-30983 0 0.00% 2 0 N/A
CVE-2026-30978 0 0.00% 1 0 N/A
CVE-2026-30985 0 0.00% 1 0 N/A
CVE-2026-31795 0 0.00% 1 0 N/A
CVE-2026-31792 0 0.00% 1 0 N/A
CVE-2026-31796 0 0.00% 1 0 N/A
CVE-2026-30918 0 0.04% 1 0 N/A
CVE-2026-27005 0 0.12% 1 0 N/A
CVE-2026-30929 0 0.01% 1 0 N/A
CVE-2026-28691 0 0.04% 1 0 N/A
CVE-2026-30862 0 0.04% 1 1 N/A
CVE-2026-31816 0 0.10% 2 0 N/A
CVE-2026-25737 0 0.05% 1 0 N/A
CVE-2025-62166 0 0.08% 1 0 N/A
CVE-2026-28514 0 0.11% 1 0 N/A

CVE-2026-27269
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T21:32:24

1 posts

Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:32:50.000Z ##

🟠 CVE-2026-27269 - High (7.8)

Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to ex...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27275
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T21:32:24

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:34.000Z ##

🟠 CVE-2026-27275 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27273
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T21:32:24

2 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:23.000Z ##

🟠 CVE-2026-27273 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:30:29.000Z ##

🟠 CVE-2026-27273 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27274
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T21:32:24

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:30:31.000Z ##

🟠 CVE-2026-27274 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27277
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T21:32:17

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:54.000Z ##

🟠 CVE-2026-27277 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13476
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-10T21:32:12

1 posts

Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block proxy traffic, undermining censorship circumvention. (CWE-327)

thehackerwire@mastodon.social at 2026-03-08T13:00:37.000Z ##

πŸ”΄ CVE-2025-13476 - Critical (9.8)

Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block p...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24457
(9.1 CRITICAL)

EPSS: 0.19%

updated 2026-03-10T19:52:11.887000

1 posts

An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read arbitrary files from a MQ Broker's server. A full exploitation could read unauthorized files of the OpenMQ’s host OS. In some scenarios RCE could be achieved.

thehackerwire@mastodon.social at 2026-03-08T12:00:32.000Z ##

πŸ”΄ CVE-2026-24457 - Critical (9.1)

An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read arbitrary files from a MQ Broker's server. A full exploitation could read unauthorized files of the OpenMQ’s host OS. In some scenarios RCE could be achieved.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-45691
(7.5 HIGH)

EPSS: 0.05%

updated 2026-03-10T19:38:22.443000

1 posts

An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter when handling multimodal inputs.

thehackerwire@mastodon.social at 2026-03-08T12:31:26.000Z ##

🟠 CVE-2025-45691 - High (7.5)

An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter wh...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14675
(7.2 HIGH)

EPSS: 0.68%

updated 2026-03-10T19:34:20

1 posts

The Meta Box plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajax_delete_file' function in all versions up to, and including, 5.11.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-27280
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T19:17:20.250000

1 posts

DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:30:12.000Z ##

🟠 CVE-2026-27280 - High (7.8)

DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim mu...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27279
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T19:17:20.080000

2 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:04.000Z ##

🟠 CVE-2026-27279 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:30:08.000Z ##

🟠 CVE-2026-27279 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27276
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T19:17:19.740000

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:44.000Z ##

🟠 CVE-2026-27276 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26801
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-10T19:17:17.430000

1 posts

Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.2 through 0.3.5 allows a remote attacker to obtain sensitive information via the src/URLResolver.js component. The fix was released in version 0.3.6 which introduces the setUrlAccessPolicy() method allowing server operators to define URL access rules. A warning is now logged when pdfmake is used server-side without a p

thehackerwire@mastodon.social at 2026-03-10T20:01:18.000Z ##

🟠 CVE-2026-26801 - High (7.5)

Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.2 through 0.3.5 allows a remote attacker to obtain sensitive information via the src/URLResolver.js component. The fix was released in version 0.3.6 which introduces t...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26738
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T19:17:16.893000

1 posts

Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows a remote attacker to execute arbitrary code via a crafted .sns snapshot file.

thehackerwire@mastodon.social at 2026-03-10T20:01:29.000Z ##

🟠 CVE-2026-26738 - High (7.8)

Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows a remote attacker to execute arbitrary code via a crafted .sns snapshot file.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-11158
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-10T19:17:08.173000

1 posts

Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.6, including 9.3.x andΒ 8.3.x, do not restrict Groovy scripts in new PRPT reports published by users, allowing insertion ofΒ arbitrary scripts and leading to a RCE.

thehackerwire@mastodon.social at 2026-03-10T16:39:08.000Z ##

πŸ”΄ CVE-2025-11158 - Critical (9.1)

Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.6, including 9.3.x and 8.3.x, do not restrict Groovy scripts in new PRPT reports published by users, allowing insertion of arbitrary scripts and leading to a RCE.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3703
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-03-10T18:55:10.750000

2 posts

A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_401A10 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to out-of-bounds write. The attack may be performed from remote. The exploit has been published and may be used. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professiona

thehackerwire@mastodon.social at 2026-03-08T08:15:09.000Z ##

πŸ”΄ CVE-2026-3703 - Critical (9.8)

A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_401A10 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to out-of-bounds write. The attack may be performed from remote. The exp...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-08T05:30:26.000Z ##

🚨 CRITICAL: CVE-2026-3703 in Wavlink NU516U1 (firmware 251208) allows remote, unauthenticated out-of-bounds write via /cgi-bin/login.cgi. Public exploit available β€” patch immediately! Monitor for abnormal ipaddr activity. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #RouterSecurity #Wavlink

##

CVE-2026-3630
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-10T18:48:52.193000

3 posts

Delta Electronics COMMGR2 has Stack-based Buffer Overflow vulnerability.

offseq@infosec.exchange at 2026-03-09T18:00:15.000Z ##

πŸ”” CVE-2026-3630: CRITICAL stack-based buffer overflow in DeltaWW COMMGR2 (CVSS 9.8). Remote, unauthenticated RCE risk β€” no patch yet. Segment & restrict network access, monitor for exploits. More: radar.offseq.com/threat/cve-20 #OffSeq #ICS #Vulnerability #OTsecurity

##

offseq@infosec.exchange at 2026-03-09T04:30:28.000Z ##

πŸ”΄ CVE-2026-3630: CRITICAL stack-based buffer overflow in DeltaWW COMMGR2 (ver 0) enables unauthenticated RCE. No patch available. Segment networks, enable IDS/IPS, & monitor for exploitation. Details: radar.offseq.com/threat/cve-20 #OffSeq #ICS #Vuln #CyberSecurity

##

thehackerwire@mastodon.social at 2026-03-09T04:19:28.000Z ##

πŸ”΄ CVE-2026-3630 - Critical (9.8)

Delta Electronics COMMGR2 has

Stack-based Buffer Overflow vulnerability.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27826
(8.2 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:48:50

2 posts

### Summary An unauthenticated attacker who can reach the mcp-atlassian HTTP endpoint can force the server process to make outbound HTTP requests to an arbitrary attacker-controlled URL by supplying two custom HTTP headers without an `Authorization` header. No authentication is required. The vulnerability exists in the HTTP middleware and dependency injection layer β€” not in any MCP tool handler -

1 repos

https://github.com/plutosecurity/MCPwnfluence

thehackerwire@mastodon.social at 2026-03-10T19:31:14.000Z ##

🟠 CVE-2026-27826 - High (8.2)

MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (Confluence and Jira). Prior to version 0.17.0, an unauthenticated attacker who can reach the mcp-atlassian HTTP endpoint can force the server process to make outbound H...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:30:19.000Z ##

🟠 CVE-2026-27826 - High (8.2)

MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (Confluence and Jira). Prior to version 0.17.0, an unauthenticated attacker who can reach the mcp-atlassian HTTP endpoint can force the server process to make outbound H...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3823
(8.8 HIGH)

EPSS: 0.14%

updated 2026-03-10T18:46:53.270000

3 posts

EHG2408 series switch developed by Atop Technologies has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and execute arbitrary code.

offseq@infosec.exchange at 2026-03-09T16:30:30.000Z ##

🚨 CRITICAL: CVE-2026-3823 exposes Atop EHG2408 switches to unauthenticated RCE via stack-based buffer overflow. No patch yet β€” segment, restrict access, and monitor traffic. Full device compromise risk. radar.offseq.com/threat/cve-20 #OffSeq #ICS #Vuln #OTSecurity

##

thehackerwire@mastodon.social at 2026-03-09T08:01:20.000Z ##

🟠 CVE-2026-3823 - High (8.8)

EHG2408 series switch developed by Atop Technologies has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and execute arbitrary code.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-09T07:30:30.000Z ##

CRITICAL: CVE-2026-3823 in Atop EHG2408 switches β€” stack-based buffer overflow allows unauth'd remote code exec. No patch yet. Segment, monitor & restrict access ASAP! πŸ›‘οΈ radar.offseq.com/threat/cve-20 #OffSeq #CVE20263823 #ICS #Vulnerability

##

CVE-2026-30944
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:45:50

2 posts

## Summary The /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user (at least Editor) to generate API tokens for any other user, including owner and admin accounts. The endpoint fails to validate whether the requesting user is authorized to create tokens on behalf of the target user ID, resulting in a full privilege escalation. ## Details The API token generation endpoint ac

thehackerwire@mastodon.social at 2026-03-10T19:01:30.000Z ##

🟠 CVE-2026-30944 - High (8.8)

StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user (at least Editor) to generate API tokens for any other user, incl...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:44:25.000Z ##

🟠 CVE-2026-30944 - High (8.8)

StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user (at least Editor) to generate API tokens for any other user, incl...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30957
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-03-10T18:45:14

3 posts

### Summary OneUptime Synthetic Monitors allow a low-privileged authenticated project user to execute arbitrary commands on the `oneuptime-probe` server/container. The root cause is that untrusted Synthetic Monitor code is executed inside Node's `vm` while live host-realm Playwright `browser` and `page` objects are exposed to it. A malicious user can call Playwright APIs on the injected `browser

thehackerwire@mastodon.social at 2026-03-10T19:15:55.000Z ##

πŸ”΄ CVE-2026-30957 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, OneUptime Synthetic Monitors allow a low-privileged authenticated project user to execute arbitrary commands on the oneuptime-probe server/container. The root c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:01:40.000Z ##

πŸ”΄ CVE-2026-30957 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, OneUptime Synthetic Monitors allow a low-privileged authenticated project user to execute arbitrary commands on the oneuptime-probe server/container. The root c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:44:35.000Z ##

πŸ”΄ CVE-2026-30957 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, OneUptime Synthetic Monitors allow a low-privileged authenticated project user to execute arbitrary commands on the oneuptime-probe server/container. The root c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30956
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-03-10T18:45:04

1 posts

### Summary A low‑privileged user can bypass authorization and tenant isolation in OneUptime `v10.0.20` by sending a forged `is-multi-tenant-query` header together with a controlled `projectid` header. Because the server trusts this client-supplied header, internal permission checks in `BasePermission` are skipped and tenant scoping is disabled. This allows attackers to: 1. Access project data

thehackerwire@mastodon.social at 2026-03-10T18:44:34.000Z ##

πŸ”΄ CVE-2026-30956 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, a low‑privileged user can bypass authorization and tenant isolation in OneUptime v10.0.20 and earlier by sending a forged is-multi-tenant-query header togethe...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30921
(10.0 CRITICAL)

EPSS: 0.01%

updated 2026-03-10T18:44:25

2 posts

Summary OneUptime Synthetic Monitors allow low-privileged project users to submit custom Playwright code that is executed on the `oneuptime-probe` service. In the current implementation, this untrusted code is run inside Node's `vm` and is given live host Playwright objects such as `browser` and `page`. This creates a distinct server-side RCE primitive: the attacker does not need the classic `th

thehackerwire@mastodon.social at 2026-03-10T18:01:18.000Z ##

πŸ”΄ CVE-2026-30921 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.20, OneUptime Synthetic Monitors allow low-privileged project users to submit custom Playwright code that is executed on the oneuptime-probe service. In the current...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:00:58.000Z ##

πŸ”΄ CVE-2026-30921 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.20, OneUptime Synthetic Monitors allow low-privileged project users to submit custom Playwright code that is executed on the oneuptime-probe service. In the current...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30869
(9.3 CRITICAL)

EPSS: 0.43%

updated 2026-03-10T18:43:20

1 posts

### Summary A path traversal vulnerability in the `/export` endpoint allows an attacker to read arbitrary files from the server filesystem. By exploiting double‑encoded traversal sequences, an attacker can access sensitive files such as `conf/conf.json`, which contains secrets including the API token, cookie signing key, and workspace access authentication code. Leaking these secrets may enable a

offseq@infosec.exchange at 2026-03-10T00:00:44.000Z ##

🚨 CRITICAL: CVE-2026-30869 affects SiYuan (< 3.5.10) β€” path traversal via /export lets attackers read sensitive files (API tokens, keys). Patch to 3.5.10+ now! No auth needed. All admins review configs. radar.offseq.com/threat/cve-20 #OffSeq #CVE202630869 #infosec

##

CVE-2026-28292
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-10T18:38:58

1 posts

### Summary The `blockUnsafeOperationsPlugin` in `simple-git` fails to block git protocol override arguments when the config key is passed in uppercase or mixed case. An attacker who controls arguments passed to git operations can enable the `ext::` protocol by passing `-c PROTOCOL.ALLOW=always`, which executes an arbitrary OS command on the host machine. --- ### Details The `preventProtocolOv

thehackerwire@mastodon.social at 2026-03-10T19:30:22.000Z ##

πŸ”΄ CVE-2026-28292 - Critical (9.8)

`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code e...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30910
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-10T18:32:20

1 posts

Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows. Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryp

thehackerwire@mastodon.social at 2026-03-10T17:16:38.000Z ##

🟠 CVE-2026-30910 - High (7.5)

Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows.

Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26130
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:31

3 posts

Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.

thehackerwire@mastodon.social at 2026-03-10T19:18:03.000Z ##

🟠 CVE-2026-26130 - High (7.5)

Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:16:14.000Z ##

🟠 CVE-2026-26130 - High (7.5)

Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

blowdart.me@bsky.brid.gy at 2026-03-10T17:43:04.084Z ##

CVE-2026-26130 - A denial of service attack against SignalR. Update your runtime, restart your SignalR apps. github.com/dotnet/annou... (2/5)

Microsoft Security Advisory CV...

##

CVE-2026-26134
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:31

1 posts

Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T19:16:42.000Z ##

🟠 CVE-2026-26134 - High (7.8)

Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3845
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:31

2 posts

Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android. This vulnerability affects Firefox < 148.0.2.

thehackerwire@mastodon.social at 2026-03-10T18:24:53.000Z ##

🟠 CVE-2026-3845 - High (8.8)

Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android. This vulnerability affects Firefox &lt; 148.0.2.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:20:59.000Z ##

🟠 CVE-2026-3845 - High (8.8)

Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android. This vulnerability affects Firefox &lt; 148.0.2.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26141
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:30

1 posts

Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T19:18:12.000Z ##

🟠 CVE-2026-26141 - High (7.8)

Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26132
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:30

1 posts

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T19:16:33.000Z ##

🟠 CVE-2026-26132 - High (7.8)

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26148
(8.2 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:30

1 posts

External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T19:02:30.000Z ##

🟠 CVE-2026-26148 - High (8.1)

External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized attacker to elevate privileges locally.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3847
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:30

2 posts

Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148.0.2.

1 repos

https://github.com/HiZisec/CVE-2026-3847-Poc

thehackerwire@mastodon.social at 2026-03-10T18:40:39.000Z ##

🟠 CVE-2026-3847 - High (8.8)

Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 14...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:21:09.000Z ##

🟠 CVE-2026-3847 - High (8.8)

Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 14...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1261
(7.2 HIGH)

EPSS: 0.07%

updated 2026-03-10T18:31:26

1 posts

The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Quiz feature in all versions up to, and including, 3.9.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

offseq@infosec.exchange at 2026-03-10T10:30:27.000Z ##

🚨 CVE-2026-1261: HIGH-severity stored XSS in all Wpmet MetForm Pro versions (Quiz feature). Unauthenticated attackers can inject persistent scripts, risking user data and site integrity. Disable Quiz & monitor for patches. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS

##

CVE-2026-3585
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-10T18:31:24

2 posts

The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.17 via the 'ajax_create_import' function. This makes it possible for authenticated attackers, with Author-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

thehackerwire@mastodon.social at 2026-03-10T18:00:39.000Z ##

🟠 CVE-2026-3585 - High (7.5)

The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.17 via the 'ajax_create_import' function. This makes it possible for authenticated attackers, with Author-level access and abov...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-10T04:30:27.000Z ##

🚨 CVE-2026-3585 (HIGH): Path traversal in stellarwp The Events Calendar plugin lets Author+ users read any files on WordPress servers up to v6.15.17. Restrict access, monitor logs, and patch ASAP. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #Cybersecurity

##

CVE-2026-2364
(7.3 HIGH)

EPSS: 0.01%

updated 2026-03-10T18:31:24

2 posts

If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low privileged local attacker can gain elevated rights due to a TOCTOU vulnerability in the CODESYS installer.

offseq@infosec.exchange at 2026-03-10T09:00:28.000Z ##

🚩 CVE-2026-2364: HIGH severity TOCTOU flaw in CODESYS Installer (all versions) lets local attackers escalate privileges via user-initiated updates. Restrict access & monitor until patch. No active exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #CODESYS #ICS #Vuln

##

certvde@infosec.exchange at 2026-03-10T07:44:02.000Z ##

#OT #Advisory VDE-2026-012
CODESYS Installer - Possible Privilege Escalation

Exploitation of this vulnerability can lead to a privilege escalation on the host system.
#CVE CVE-2026-2364

certvde.com/en/advisories/vde-

#CSAF codesys.csaf-tp.certvde.com/.w

##

CVE-2026-1508
(4.3 MEDIUM)

EPSS: 0.00%

updated 2026-03-10T18:31:24

1 posts

The Court Reservation WordPress plugin before 1.10.9 does not have CSRF check in place when deleting events, which could allow attackers to make a logged in admin delete them via a CSRF attack

offseq@infosec.exchange at 2026-03-10T07:30:26.000Z ##

πŸ”’ CVE-2026-1508 (HIGH): Court Reservation WordPress plugin <1.10.9 has a CSRF flaw β€” admins can be tricked into deleting events via crafted requests. No live exploits yet. Update ASAP or add nonce checks! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CSRF #Infosec

##

CVE-2025-41712
(6.5 MEDIUM)

EPSS: 0.03%

updated 2026-03-10T18:31:24

2 posts

An unauthenticated remote attacker who tricks a user to upload a manipulated HTML file can get access to sensitive information on the device. This is a result of incorrect permission assignment for the web server.

certvde@infosec.exchange at 2026-03-10T07:24:46.000Z ##

#OT #Advisory VDE-2025-096
Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230

An unauthenticated remote attacker can exploit several vulnerabilities in Weidmueller devices Energy Meter 750-24 and Energy Meter 750-230 to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711
#oCSAF
certvde.com/en/advisories/vde-

#CSAF weidmueller.csaf-tp.certvde.co

##

certvde@infosec.exchange at 2026-03-10T07:23:00.000Z ##

#OT #Advisory VDE-2025-079
Janitza: Multiple vulnerabilities in UMG 96RM-E

An unauthenticated remote attacker can exploit several vulnerabilities in Janitza UMG 96RM-E devices to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711

certvde.com/en/advisories/vde-
#oCSAF
#CSAF janitza.csaf-tp.certvde.com/.w

##

CVE-2025-41711
(5.3 MEDIUM)

EPSS: 0.02%

updated 2026-03-10T18:31:24

2 posts

An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.

certvde@infosec.exchange at 2026-03-10T07:24:46.000Z ##

#OT #Advisory VDE-2025-096
Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230

An unauthenticated remote attacker can exploit several vulnerabilities in Weidmueller devices Energy Meter 750-24 and Energy Meter 750-230 to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711
#oCSAF
certvde.com/en/advisories/vde-

#CSAF weidmueller.csaf-tp.certvde.co

##

certvde@infosec.exchange at 2026-03-10T07:23:00.000Z ##

#OT #Advisory VDE-2025-079
Janitza: Multiple vulnerabilities in UMG 96RM-E

An unauthenticated remote attacker can exploit several vulnerabilities in Janitza UMG 96RM-E devices to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711

certvde.com/en/advisories/vde-
#oCSAF
#CSAF janitza.csaf-tp.certvde.com/.w

##

CVE-2026-0953
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-10T18:31:24

1 posts

The Tutor LMS Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.9.5 via the Social Login addon. This is due to the plugin failing to verify that the email provided in the authentication request matches the email from the validated OAuth token. This makes it possible for unauthenticated attackers to log in as any existing user, including adminis

offseq@infosec.exchange at 2026-03-10T06:02:26.000Z ##

🚨 CRITICAL: CVE-2026-0953 impacts all versions of themeum Tutor LMS Pro for WordPress. Flawed Social Login lets attackers bypass authentication using valid OAuth tokens + victim’s email. Admin accounts at risk. Patch or restrict access! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec

##

CVE-2026-3843
(9.8 CRITICAL)

EPSS: 0.46%

updated 2026-03-10T18:19:05.287000

2 posts

Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux contains a SQL Injection vulnerability (CWE-89) in the system configuration module. A remote attacker can send specially crafted HTTP POST requests to the /php/request.php endpoint via the sql parameter in application/x-www-form-urlencoded data (e.g., action=do&sql=<query_here>&reload_driver=0) to execute arbitrary SQL comm

thehackerwire@mastodon.social at 2026-03-10T18:24:44.000Z ##

πŸ”΄ CVE-2026-3843 - Critical (9.8)

Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux contains a SQL Injection vulnerability (CWE-89) in the system configuration module. A remote attacker can send specially crafted HTTP POST requests to the /php/request.php ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:20:50.000Z ##

πŸ”΄ CVE-2026-3843 - Critical (9.8)

Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux contains a SQL Injection vulnerability (CWE-89) in the system configuration module. A remote attacker can send specially crafted HTTP POST requests to the /php/request.php ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3483
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:19:01.720000

1 posts

An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local authenticated attacker to escalate their privileges.

thehackerwire@mastodon.social at 2026-03-10T18:21:22.000Z ##

🟠 CVE-2026-3483 - High (7.8)

An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local authenticated attacker to escalate their privileges.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30987
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:58.003000

1 posts

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow in CIccTagNum<>::GetValues() causing stack memory corruption or crash. This vulnerability is fixed in 2.3.1.5.

thehackerwire@mastodon.social at 2026-03-10T18:40:59.000Z ##

🟠 CVE-2026-30987 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow in CIccTagNum::GetValues() causing stack memory corruption or crash. This vulnerability is fixed in 2.3...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30979
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:56.700000

1 posts

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow in CIccCalculatorFunc::InitSelectOp() triggered with local user interaction causing memory corruption/crash. This vulnerability is fixed in 2.3.1.5.

thehackerwire@mastodon.social at 2026-03-10T18:43:57.000Z ##

🟠 CVE-2026-30979 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow in CIccCalculatorFunc::InitSelectOp() triggered with local user interaction causing memory corrupt...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30934
(8.9 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:53.257000

1 posts

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, Stored XSS is possible via share metadata fields (e.g., title, description) that are rendered into HTML for /public/share/<hash> without context-aware escaping. The server uses text/template instead of html/template, allowing injected scripts to execute when victims visit the share URL. This v

thehackerwire@mastodon.social at 2026-03-10T18:44:44.000Z ##

🟠 CVE-2026-30934 - High (8.9)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, Stored XSS is possible via share metadata fields (e.g., title, description) that are rendered into HTML for /public/share/ without context-aw...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30933
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:53.070000

4 posts

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. This vulnerability is fixed in 1.3.1-beta and 1.2.2-stable.

thehackerwire@mastodon.social at 2026-03-10T19:17:55.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:16:04.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:01:49.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:44:44.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30240
(9.6 CRITICAL)

EPSS: 0.03%

updated 2026-03-10T18:18:50.127000

2 posts

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.5 and earlier, a path traversal vulnerability in the PWA (Progressive Web App) ZIP processing endpoint (POST /api/pwa/process-zip) allows an authenticated user with builder privileges to read arbitrary files from the server filesystem, including /proc/1/environ which contains all environment variables

thehackerwire@mastodon.social at 2026-03-09T21:18:02.000Z ##

πŸ”΄ CVE-2026-30240 - Critical (9.6)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.5 and earlier, a path traversal vulnerability in the PWA (Progressive Web App) ZIP processing endpoint (POST /api/pwa/process-zip) allows an authenti...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-09T21:17:10.000Z ##

πŸ”΄ CVE-2026-30240 - Critical (9.6)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.5 and earlier, a path traversal vulnerability in the PWA (Progressive Web App) ZIP processing endpoint (POST /api/pwa/process-zip) allows an authenti...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2339
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:48.393000

1 posts

Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Liderahenk allows Remote Code Inclusion, Privilege Abuse, Command Injection.This issue affects Liderahenk: before v3.4.0.

thehackerwire@mastodon.social at 2026-03-10T19:02:12.000Z ##

🟠 CVE-2026-2339 - High (7.5)

Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Liderahenk allows Remote Code Inclusion, Privilege Abuse, Command Injection.This issue affects Liderahenk: before v3.4.0.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26144
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:43.110000

3 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office Excel allows an unauthorized attacker to disclose information over a network.

thezdi at 2026-03-10T22:18:05.295Z ##

And don't miss our bug of the month! Each patch Tuesday we'll be selecting our very favorite patch to highlight. This month, it CVE-2026-26144 - a Critical-rated info disclosure in Excel that uses the Copilot Agent to exfiltrate data. Neat! youtube.com/shorts/r4EjP3JxYRk

##

thezdi@infosec.exchange at 2026-03-10T22:18:05.000Z ##

And don't miss our bug of the month! Each patch Tuesday we'll be selecting our very favorite patch to highlight. This month, it CVE-2026-26144 - a Critical-rated info disclosure in Excel that uses the Copilot Agent to exfiltrate data. Neat! youtube.com/shorts/r4EjP3JxYRk

##

thehackerwire@mastodon.social at 2026-03-10T19:02:21.000Z ##

🟠 CVE-2026-26144 - High (7.5)

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office Excel allows an unauthorized attacker to disclose information over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26131
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:42.393000

1 posts

Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T19:16:24.000Z ##

🟠 CVE-2026-26131 - High (7.8)

Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26128
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:41.903000

1 posts

Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T20:04:09.000Z ##

🟠 CVE-2026-26128 - High (7.8)

Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26127
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:41.713000

1 posts

Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.

thehackerwire@mastodon.social at 2026-03-10T20:02:19.000Z ##

🟠 CVE-2026-26127 - High (7.5)

Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26121
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:41.347000

1 posts

Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network.

thehackerwire@mastodon.social at 2026-03-10T20:02:09.000Z ##

🟠 CVE-2026-26121 - High (7.5)

Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26118
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:41.180000

1 posts

Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-03-10T20:02:00.000Z ##

🟠 CVE-2026-26118 - High (8.8)

Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26117
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:41.017000

1 posts

Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T20:01:40.000Z ##

🟠 CVE-2026-26117 - High (7.8)

Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26113
(8.4 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:40.177000

1 posts

Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.

thehackerwire@mastodon.social at 2026-03-10T20:04:19.000Z ##

🟠 CVE-2026-26113 - High (8.4)

Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41710
(6.5 MEDIUM)

EPSS: 0.03%

updated 2026-03-10T18:17:56.187000

2 posts

An unauthenticated remote attacker may use hardcodes credentials to get access to the previously activated FTP Server with limited read and write privileges.

certvde@infosec.exchange at 2026-03-10T07:24:46.000Z ##

#OT #Advisory VDE-2025-096
Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230

An unauthenticated remote attacker can exploit several vulnerabilities in Weidmueller devices Energy Meter 750-24 and Energy Meter 750-230 to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711
#oCSAF
certvde.com/en/advisories/vde-

#CSAF weidmueller.csaf-tp.certvde.co

##

certvde@infosec.exchange at 2026-03-10T07:23:00.000Z ##

#OT #Advisory VDE-2025-079
Janitza: Multiple vulnerabilities in UMG 96RM-E

An unauthenticated remote attacker can exploit several vulnerabilities in Janitza UMG 96RM-E devices to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711

certvde.com/en/advisories/vde-
#oCSAF
#CSAF janitza.csaf-tp.certvde.com/.w

##

CVE-2025-41709
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-10T18:17:55.980000

2 posts

[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]

certvde@infosec.exchange at 2026-03-10T07:24:46.000Z ##

#OT #Advisory VDE-2025-096
Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230

An unauthenticated remote attacker can exploit several vulnerabilities in Weidmueller devices Energy Meter 750-24 and Energy Meter 750-230 to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711
#oCSAF
certvde.com/en/advisories/vde-

#CSAF weidmueller.csaf-tp.certvde.co

##

certvde@infosec.exchange at 2026-03-10T07:23:00.000Z ##

#OT #Advisory VDE-2025-079
Janitza: Multiple vulnerabilities in UMG 96RM-E

An unauthenticated remote attacker can exploit several vulnerabilities in Janitza UMG 96RM-E devices to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711

certvde.com/en/advisories/vde-
#oCSAF
#CSAF janitza.csaf-tp.certvde.com/.w

##

CVE-2026-27944
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-10T18:11:27.450000

4 posts

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.3, the /api/backup endpoint is accessible without authentication and discloses the encryption keys required to decrypt the backup in the X-Backup-Security response header. This allows an unauthenticated attacker to download a full system backup containing sensitive data (user credentials, session tokens, SSL private ke

Nuclei template

3 repos

https://github.com/weefunker/CVE-2026-27944-Lab

https://github.com/NULL200OK/-nginxui_discover

https://github.com/NULL200OK/CVE-2026-27944

patrickcmiller@infosec.exchange at 2026-03-10T10:12:01.000Z ##

Critical Nginx UI flaw CVE-2026-27944 exposes server backups securityaffairs.com/189123/sec

##

rhudaur@flipboard.com at 2026-03-09T13:23:09.000Z ##

Critical Nginx UI Vulnerability Exposes Server Backups and Sensitive Data
thecyberexpress.com/cve-2026-2

Posted into Cybersecurity Today @cybersecurity-today-rhudaur

##

oversecurity@mastodon.social at 2026-03-09T11:00:12.000Z ##

Critical Nginx UI Vulnerability Exposes Server Backups and Sensitive Data

A newly disclosed vulnerability in Nginx UI, tracked as CVE-2026-27944, has raised major security concerns after researchers confirmed that...

πŸ”—οΈ [Thecyberexpress] link.is.it/HfceZC

##

beyondmachines1@infosec.exchange at 2026-03-09T09:01:11.000Z ##

Critical Nginx UI Flaw Allows Unauthenticated Backup Theft and Decryption

Nginx UI version 2.3.3 patches a critical vulnerability (CVE-2026-27944) that allows unauthenticated attackers to download and decrypt full server backups. The flaw exposes sensitive data including SSL private keys, admin credentials, and server configurations via an unprotected API endpoint.

**If you are using Nginx UI, first make sure they are isolated from the internet. Then patch to version 2.3.3 immediately because the exploit is trivial - especially if your Nginix UI is exposed to the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-30920
(8.6 HIGH)

EPSS: 0.01%

updated 2026-03-10T17:40:16

2 posts

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.19, OneUptime's GitHub App callback trusts attacker-controlled state and installation_id values and updates Project.gitHubAppInstallationId with isRoot: true without validating that the caller is authorized for the target project. This allows an attacker to overwrite another project's GitHub App installation binding

thehackerwire@mastodon.social at 2026-03-10T18:01:09.000Z ##

🟠 CVE-2026-30920 - High (8.6)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.19, OneUptime's GitHub App callback trusts attacker-controlled state and installation_id values and updates Project.gitHubAppInstallationId with isRoot: true withou...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:00:48.000Z ##

🟠 CVE-2026-30920 - High (8.6)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.19, OneUptime's GitHub App callback trusts attacker-controlled state and installation_id values and updates Project.gitHubAppInstallationId with isRoot: true withou...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27685
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-10T17:38:10.980000

1 posts

SAP NetWeaver Enterprise Portal Administration is vulnerable if a privileged user uploads untrusted or malicious content that, upon deserialization, could result in a high impact on the confidentiality, integrity, and availability of the host system.

offseq@infosec.exchange at 2026-03-10T01:30:28.000Z ##

🚨 CRITICAL: CVE-2026-27685 in SAP NetWeaver EP-RUNTIME 7.50 (Admin) enables privileged users to upload malicious serialized data β€” risking full system compromise. Restrict uploads, monitor privileged actions, patch ASAP! radar.offseq.com/threat/cve-20 #OffSeq #SAP #CVE #InfoSec

##

CVE-2026-1603
(8.6 HIGH)

EPSS: 67.72%

updated 2026-03-10T15:31:30

3 posts

An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data.

Nuclei template

secdb@infosec.exchange at 2026-03-09T22:00:20.000Z ##

🚨 [CISA-2026:0309] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22054 (secdb.nttzen.cloud/cve/detail/)
- Name: Omnissa Workspace ONE Server-Side Request Forgery
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Omnissa
- Product: Workspace One UEM
- Notes: web.archive.org/web/2021122215 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-26399 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: solarwinds.com/trust-center/se ; documentation.solarwinds.com/e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-1603 (secdb.nttzen.cloud/cve/detail/)
- Name: Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager (EPM)
- Notes: hub.ivanti.com/s/article/Secur ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260309 #cisa20260309 #cve_2021_22054 #cve_2025_26399 #cve_2026_1603 #cve202122054 #cve202526399 #cve20261603

##

cisakevtracker@mastodon.social at 2026-03-09T20:01:27.000Z ##

CVE ID: CVE-2026-1603
Vendor: Ivanti
Product: Endpoint Manager (EPM)
Date Added: 2026-03-09
Notes: hub.ivanti.com/s/article/Secur ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-09T19:16:13.000Z ##

CISA has updated the KEV catalogue cisa.gov/news-events/alerts/20

- CVE-2021-22054: Omnissa Workspace ONE Server-Side Request Forgery

- CVE-2025-26399 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

- CVE-2026-1603 Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability #CISA #infosec #vulnerability

##

CVE-2026-3698
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-10T15:21:52.560000

1 posts

A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. This affects the function strcpy of the file /goform/NTP. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-03-08T08:23:30.000Z ##

🟠 CVE-2026-3698 - High (8.8)

A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. This affects the function strcpy of the file /goform/NTP. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and m...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27603
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-10T14:02:36.263000

1 posts

Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.4, the chart filter endpoint POST /project/:project_id/chart/:chart_id/filter is missing both verifyToken and checkPermissions middleware, allowing unauthenticated users to access chart data from any team/project. This issue has been patched in version

thehackerwire@mastodon.social at 2026-03-10T15:00:23.000Z ##

🟠 CVE-2026-27603 - High (7.5)

Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.4, the chart filter endpoint POST /project/:project_id/chart/:chart_id/filter is missing both verif...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3288
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-10T09:32:52

2 posts

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/rewrite-target` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets clust

1 repos

https://github.com/SnailSploit/CVE-2026-3288

ChrisShort@hachyderm.io at 2026-03-09T23:06:10.000Z ##

[Security Advisory] CVE-2026-3288: ingress-nginx rewrite-target nginx configuration injection #devopsish groups.google.com/a/kubernetes

##

thehackerwire@mastodon.social at 2026-03-09T21:17:09.000Z ##

🟠 CVE-2026-3288 - High (8.8)

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/rewrite-target` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-ngin...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28693
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-10T07:43:44.577000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

thehackerwire@mastodon.social at 2026-03-10T08:00:21.000Z ##

🟠 CVE-2026-28693 - High (8.1)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28431
(0 None)

EPSS: 0.04%

updated 2026-03-10T07:43:35.600000

1 posts

Misskey is an open source, federated social media platform. All Misskey servers running versions 8.45.0 and later, but prior to 2026.3.1, contain a vulnerability that allows bad actors access to data that they ordinarily wouldn't be able to access due to insufficient permission checks and proper input validation. This vulnerability occurs regardless of whether federation is enabled or not. This vu

offseq@infosec.exchange at 2026-03-09T22:30:12.000Z ##

🚨 CVE-2026-28431 (CRITICAL, CVSS 9.2) in Misskey (8.45.0 – <2026.3.1): Improper authorization allows unauthenticated data access. Patch to 2026.3.1 now! Review access controls and monitor logs. radar.offseq.com/threat/cve-20 #OffSeq #Misskey #Vuln #InfoSec

##

CVE-2025-69219
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-10T01:21:25

1 posts

A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low. Users should upgrade to version 6.0.0 of the provider to avoid even that risk.

1 repos

https://github.com/ahmetartuc/poc-cve-2025-69219

thehackerwire@mastodon.social at 2026-03-09T16:38:29.000Z ##

🟠 CVE-2025-69219 - High (8.8)

A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airfl...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70238
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-09T21:32:45

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard52.

thehackerwire@mastodon.social at 2026-03-09T20:43:56.000Z ##

🟠 CVE-2025-70238 - High (7.5)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard52.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3638
(5.9 MEDIUM)

EPSS: 0.03%

updated 2026-03-09T21:31:49

1 posts

Improper access control in user and role restore API endpoints in Devolutions Server 2025.3.11.0 and earlier allows a low-privileged authenticated user to restore deleted users and roles via crafted API requests.

offseq@infosec.exchange at 2026-03-09T19:30:12.000Z ##

CVE-2026-3638 (HIGH): Devolutions Server ≀ 2025.3.11.0 has missing authorization in restore APIs β€” low-priv users can reinstate deleted accounts, risking privilege escalation. Restrict API access & monitor logs! radar.offseq.com/threat/cve-20 #OffSeq #Devolutions #AppSec

##

CVE-2025-61612
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-09T21:31:37

1 posts

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

thehackerwire@mastodon.social at 2026-03-09T11:07:30.000Z ##

🟠 CVE-2025-61612 - High (7.5)

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69278
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-09T21:31:37

1 posts

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

thehackerwire@mastodon.social at 2026-03-09T10:01:38.000Z ##

🟠 CVE-2025-69278 - High (7.5)

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61616
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-09T21:31:37

1 posts

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

thehackerwire@mastodon.social at 2026-03-09T10:01:29.000Z ##

🟠 CVE-2025-61616 - High (7.5)

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61614
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-09T21:31:37

1 posts

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

thehackerwire@mastodon.social at 2026-03-09T10:00:51.000Z ##

🟠 CVE-2025-61614 - High (7.5)

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61613
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-09T21:31:37

1 posts

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

thehackerwire@mastodon.social at 2026-03-09T10:00:40.000Z ##

🟠 CVE-2025-61613 - High (7.5)

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-26399
(9.8 CRITICAL)

EPSS: 34.23%

updated 2026-03-09T21:31:33

4 posts

SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.

1 repos

https://github.com/rxerium/CVE-2025-26399

oversecurity@mastodon.social at 2026-03-10T14:10:35.000Z ##

CISA shortens patch deadline for critical Ivanti, SolarWinds bugs

The Cybersecurity and Infrastructure Security Agency (CISA) gave all federal civilian agencies until Thursday to patch CVE-2025-26399 β€” a critical...

πŸ”—οΈ [Therecord] link.is.it/pp8jNp

##

secdb@infosec.exchange at 2026-03-09T22:00:20.000Z ##

🚨 [CISA-2026:0309] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22054 (secdb.nttzen.cloud/cve/detail/)
- Name: Omnissa Workspace ONE Server-Side Request Forgery
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Omnissa
- Product: Workspace One UEM
- Notes: web.archive.org/web/2021122215 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-26399 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: solarwinds.com/trust-center/se ; documentation.solarwinds.com/e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-1603 (secdb.nttzen.cloud/cve/detail/)
- Name: Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager (EPM)
- Notes: hub.ivanti.com/s/article/Secur ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260309 #cisa20260309 #cve_2021_22054 #cve_2025_26399 #cve_2026_1603 #cve202122054 #cve202526399 #cve20261603

##

cisakevtracker@mastodon.social at 2026-03-09T20:01:11.000Z ##

CVE ID: CVE-2025-26399
Vendor: SolarWinds
Product: Web Help Desk
Date Added: 2026-03-09
Notes: solarwinds.com/trust-center/se ; documentation.solarwinds.com/e ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-09T19:16:13.000Z ##

CISA has updated the KEV catalogue cisa.gov/news-events/alerts/20

- CVE-2021-22054: Omnissa Workspace ONE Server-Side Request Forgery

- CVE-2025-26399 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

- CVE-2026-1603 Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability #CISA #infosec #vulnerability

##

CVE-2021-22054
(7.5 HIGH)

EPSS: 93.74%

updated 2026-03-09T21:31:33

3 posts

VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain an SSRF vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.

Nuclei template

1 repos

https://github.com/MKSx/CVE-2021-22054

secdb@infosec.exchange at 2026-03-09T22:00:20.000Z ##

🚨 [CISA-2026:0309] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22054 (secdb.nttzen.cloud/cve/detail/)
- Name: Omnissa Workspace ONE Server-Side Request Forgery
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Omnissa
- Product: Workspace One UEM
- Notes: web.archive.org/web/2021122215 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-26399 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: solarwinds.com/trust-center/se ; documentation.solarwinds.com/e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-1603 (secdb.nttzen.cloud/cve/detail/)
- Name: Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager (EPM)
- Notes: hub.ivanti.com/s/article/Secur ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260309 #cisa20260309 #cve_2021_22054 #cve_2025_26399 #cve_2026_1603 #cve202122054 #cve202526399 #cve20261603

##

cisakevtracker@mastodon.social at 2026-03-09T20:00:56.000Z ##

CVE ID: CVE-2021-22054
Vendor: Omnissa
Product: Workspace One UEM
Date Added: 2026-03-09
Notes: web.archive.org/web/2021122215 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-09T19:16:13.000Z ##

CISA has updated the KEV catalogue cisa.gov/news-events/alerts/20

- CVE-2021-22054: Omnissa Workspace ONE Server-Side Request Forgery

- CVE-2025-26399 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

- CVE-2026-1603 Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability #CISA #infosec #vulnerability

##

CVE-2025-61615
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-09T21:16:12.193000

1 posts

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

thehackerwire@mastodon.social at 2026-03-09T10:01:19.000Z ##

🟠 CVE-2025-61615 - High (7.5)

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61611
(7.5 HIGH)

EPSS: 0.28%

updated 2026-03-09T21:16:11.650000

1 posts

In modem, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed..

thehackerwire@mastodon.social at 2026-03-09T11:07:22.000Z ##

🟠 CVE-2025-61611 - High (7.5)

In modem, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed..

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0846
(8.6 HIGH)

EPSS: 0.08%

updated 2026-03-09T20:16:05.703000

2 posts

A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely

offseq@infosec.exchange at 2026-03-09T21:00:16.000Z ##

🚨 CVE-2026-0846: HIGH severity absolute path traversal in nltk v3.9.2 (filestring()). Remote attackers can read files if user input isn’t sanitized. Patch when available & validate inputs! radar.offseq.com/threat/cve-20 #OffSeq #nltk #vuln #infosec

##

thehackerwire@mastodon.social at 2026-03-09T20:22:05.000Z ##

🟠 CVE-2026-0846 - High (8.6)

A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, en...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69279
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-09T20:16:02.263000

1 posts

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

thehackerwire@mastodon.social at 2026-03-09T10:07:08.000Z ##

🟠 CVE-2025-69279 - High (7.5)

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29784
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-09T20:06:23.960000

1 posts

Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the requesting session. In some scenarios this might have made it easier for phishers to take over a Ghost site. This issue has been patched in version 6.19.3.

thehackerwire@mastodon.social at 2026-03-08T10:00:21.000Z ##

🟠 CVE-2026-29784 - High (7.5)

Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the requesting session. In some scenarios this might hav...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70363
(7.5 HIGH)

EPSS: 0.05%

updated 2026-03-09T19:16:00.890000

1 posts

Incorrect access control in the REST API of Ibexa & Ciril GROUP eZ Platform / Ciril Platform 2.x allows unauthenticated attackers to access sensitive data via enumerating object IDs.

thehackerwire@mastodon.social at 2026-03-09T19:40:09.000Z ##

🟠 CVE-2025-70363 - High (7.5)

Incorrect access control in the REST API of Ibexa & Ciril GROUP eZ Platform / Ciril Platform 2.x allows unauthenticated attackers to access sensitive data via enumerating object IDs.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3038
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-09T18:32:49

1 posts

The rtsock_msg_buffer() function serializes routing information into a buffer. As a part of this, it copies sockaddr structures into a sockaddr_storage structure on the stack. It assumes that the source sockaddr length field had already been validated, but this is not necessarily the case, and it's possible for a malicious userspace program to craft a request which triggers a 127-byte overflow.

thehackerwire@mastodon.social at 2026-03-09T17:32:35.000Z ##

🟠 CVE-2026-3038 - High (7.5)

The rtsock_msg_buffer() function serializes routing information into a buffer. As a part of this, it copies sockaddr structures into a sockaddr_storage structure on the stack. It assumes that the source sockaddr length field had already been val...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3588
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-09T18:31:50

1 posts

A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 allows an attacker to exfiltrate private keys by sending a crafted request.

thehackerwire@mastodon.social at 2026-03-09T16:38:10.000Z ##

🟠 CVE-2026-3588 - High (7.5)

A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 allows an attacker to exfiltrate private keys by sending a crafted request.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70047
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-09T18:31:49

1 posts

An issue pertaining to CWE-400: Uncontrolled Resource Consumption was discovered in Nexusoft NexusInterface v3.2.0-beta.2.

thehackerwire@mastodon.social at 2026-03-09T17:32:25.000Z ##

🟠 CVE-2025-70047 - High (7.5)

An issue pertaining to CWE-400: Uncontrolled Resource Consumption was discovered in Nexusoft NexusInterface v3.2.0-beta.2.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25866
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-09T18:31:49

1 posts

MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search path behavior by placing a malicious executable earlier in the search order, resulting in arbitrary code execution in the context of the affected user.

thehackerwire@mastodon.social at 2026-03-09T16:38:20.000Z ##

🟠 CVE-2026-25866 - High (7.8)

MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30863(CVSS UNKNOWN)

EPSS: 0.07%

updated 2026-03-09T17:42:26

1 posts

### Impact The Google, Apple, and Facebook authentication adapters use JWT verification to validate identity tokens. When the adapter's audience configuration option is not set (`clientId` for Google/Apple, `appIds` for Facebook), JWT verification silently skips audience claim validation. This allows an attacker to use a validly signed JWT issued for a different application to authenticate as any

1 repos

https://github.com/Worthes/CVE-2026-30863-Exploit

thehackerwire@mastodon.social at 2026-03-10T17:16:47.000Z ##

πŸ”΄ CVE-2026-30863 - Critical (9.8)

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.10 and 9.5.0-alpha.11, the Google, Apple, and Facebook authentication adapters use JWT verification to validate identity ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30860
(9.9 CRITICAL)

EPSS: 0.16%

updated 2026-03-09T17:35:41.243000

1 posts

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, a remote code execution (RCE) vulnerability exists in the application's database query functionality. The validation system fails to recursively inspect child nodes within PostgreSQL array expressions and row expressions, allowing attackers to bypass SQL injection protectio

thehackerwire@mastodon.social at 2026-03-08T09:20:03.000Z ##

πŸ”΄ CVE-2026-30860 - Critical (9.9)

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, a remote code execution (RCE) vulnerability exists in the application's database query functionality. The validation syst...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3807
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T16:20:08.637000

1 posts

A security vulnerability has been detected in Tenda FH1202 1.2.0.14(408). Impacted is the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Such manipulation of the argument mit_ssid/mit_ssid_index leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-03-09T08:01:11.000Z ##

🟠 CVE-2026-3807 - High (8.8)

A security vulnerability has been detected in Tenda FH1202 1.2.0.14(408). Impacted is the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Such manipulation of the argument mit_ssid/mit_ssid_index leads to stack-based buffer overflow....

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3678
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-09T16:16:21.987000

1 posts

A vulnerability was determined in Tenda FH451 1.0.0.9. Affected is the function sub_3C434 of the file /goform/AdvSetWan. This manipulation of the argument wanmode/PPPOEPassword causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-08T09:01:20.000Z ##

🟠 CVE-2026-3678 - High (8.8)

A vulnerability was determined in Tenda FH451 1.0.0.9. Affected is the function sub_3C434 of the file /goform/AdvSetWan. This manipulation of the argument wanmode/PPPOEPassword causes stack-based buffer overflow. It is possible to initiate the att...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30851
(8.1 HIGH)

EPSS: 0.01%

updated 2026-03-09T15:50:55

1 posts

## Summary Caddy's `forward_auth` directive with `copy_headers` generates conditional header-set operations that only fire when the upstream auth service includes the named header in its response. No delete or remove operation is generated for the original client-supplied request header with the same name. When an auth service returns `200 OK` without one of the configured `copy_headers` headers

thehackerwire@mastodon.social at 2026-03-08T09:38:38.000Z ##

🟠 CVE-2026-30851 - High (8.1)

Caddy is an extensible server platform that uses TLS by default. From version 2.10.0 to before version 2.11.2, forward_auth copy_headers does not strip client-supplied headers, allowing identity injection and privilege escalation. This issue has b...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30832
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-09T15:50:39

2 posts

While auditing the codebase in the wake of the webhook SSRF fix shipped in v0.11.1 (GHSA-vwq2-jx9q-9h9f), it was identified that the LFS import path was never given the same treatment. The webhook fix introduced dual-layer SSRF protection β€” ValidateWebhookURL() at creation time and secureHTTPClient with IP validation at dial time β€” but the LFS HTTP client still uses http.DefaultClient with no filt

thehackerwire@mastodon.social at 2026-03-08T10:00:34.000Z ##

πŸ”΄ CVE-2026-30832 - Critical (9.1)

Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.4, an authenticated SSH user can force the server to make HTTP requests to internal/private IP addresses by running repo import with a crafted...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-08T07:00:27.000Z ##

πŸ”” CRITICAL CVE-2026-30832: charmbracelet soft-serve (0.6.0 – 0.11.4) allows authenticated SSH users to exploit SSRF via repo import, exposing internal resources. Update to 0.11.4+ now. More: radar.offseq.com/threat/cve-20 #OffSeq #SSRF #Vulnerability

##

CVE-2026-30834
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-09T15:50:20

1 posts

# SSRF with Full Response Exfiltration via Download Handler ### Summary A Server-Side Request Forgery (SSRF) vulnerability in the `/download` endpoint allows any user with API access to induce the PinchTab server to make requests to arbitrary URLs, including internal network services and local system files, and exfiltrate the full response content. ### Details The `GET /download?url=<url>` handl

thehackerwire@mastodon.social at 2026-03-08T09:38:48.000Z ##

🟠 CVE-2026-30834 - High (7.5)

PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Prior to version 0.7.7, a Server-Side Request Forgery (SSRF) vulnerability in the /download endpoint allows any user with API access to induce the Pinc...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29191
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-03-09T15:48:28

1 posts

### Summary A vulnerability was discovered in Zitadel's login V2 interface that allowed a possible account takeover. ### Impact Zitadel exposes an HTTP endpoint named /saml-post. This endpoint is used for handling requests to SAML IdPs and accepts two HTTP GET parameters: url and id. When these parameters are supplied, users’ browsers auto-submit an HTTP POST request to the provided url paramet

beyondmachines1@infosec.exchange at 2026-03-10T11:01:11.000Z ##

Critical 1-Click Account Takeover Vulnerability Patched in ZITADEL IAM Platform

ZITADEL patched a critical XSS vulnerability (CVE-2026-29191) that allows unauthenticated attackers to take over user accounts via a single-click malicious link. The flaw can lead to unauthorized password resets.

**If you are using ZITADEL, this is important. Plan a very quick update to version 4.12.0 because your users will be hacked, the full exploit instruction is already public. If you cannot patch today, block the /saml-post endpoint at your firewall and ensure MFA is active for all users.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-2919
(4.3 MEDIUM)

EPSS: 0.01%

updated 2026-03-09T15:30:48

1 posts

Malicious scripts could display attacker-controlled web content under spoofed domains in Focus for iOS by stalling a _self navigation to an invalid port and triggering an iframe redirect, causing the UI to display a trusted domain without user interaction. This vulnerability affects Focus for iOS < 148.2.

0x3e4@cyberplace.social at 2026-03-09T18:35:38.000Z ##

Mozilla Firefox Focus for iOS.. interesting version jump from 143.0 to 148.2 today

current release fixes CVE-2026-2919

Malicious scripts could display attacker-controlled web content under spoofed domains in Focus for iOS by stalling a _self navigation to an invalid port and triggering an iframe redirect, causing the UI to display a trusted domain without user interaction. This vulnerability affects Focus for iOS < 148.2.

mozilla.org/en-US/security/adv
hecate.pw/vulnerability/CVE-20

##

CVE-2025-14769
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-09T15:30:47

1 posts

In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference. Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule w

thehackerwire@mastodon.social at 2026-03-09T14:25:32.000Z ##

🟠 CVE-2025-14769 - High (7.5)

In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference.

...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3811
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T15:26:21.790000

2 posts

A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-03-09T10:00:31.000Z ##

🟠 CVE-2026-3811 - High (8.8)

A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remote...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-09T09:00:32.000Z ##

⚠️ HIGH severity: Tenda FH1202 (1.2.0.14) vulnerable to stack-based buffer overflow (CVE-2026-3811). Remote exploit is public. No fix yet β€” monitor, isolate, and watch for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #IoTSecurity #CVE20263811

##

CVE-2026-3728
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T15:24:28.950000

1 posts

A vulnerability was determined in Tenda F453 1.0.0.3/1.If. This issue affects the function fromSetCfm of the file /goform/setcfm. This manipulation of the argument funcname/funcpara1 causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-08T10:18:18.000Z ##

🟠 CVE-2026-3728 - High (8.8)

A vulnerability was determined in Tenda F453 1.0.0.3/1.If. This issue affects the function fromSetCfm of the file /goform/setcfm. This manipulation of the argument funcname/funcpara1 causes stack-based buffer overflow. Remote exploitation of the a...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3729
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T15:24:21.043000

1 posts

A vulnerability was identified in Tenda F453 1.0.0.3/3.As. Impacted is the function fromPptpUserAdd of the file /goform/PPTPDClient. Such manipulation of the argument username/opttype leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-03-08T11:19:24.000Z ##

🟠 CVE-2026-3729 - High (8.8)

A vulnerability was identified in Tenda F453 1.0.0.3/3.As. Impacted is the function fromPptpUserAdd of the file /goform/PPTPDClient. Such manipulation of the argument username/opttype leads to stack-based buffer overflow. The attack can be execute...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3768
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T15:17:08.960000

2 posts

A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet. The manipulation of the argument GO leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

offseq@infosec.exchange at 2026-03-09T03:00:32.000Z ##

🚩 CVE-2026-3768 (HIGH, CVSS 8.7): Stack buffer overflow in Tenda F453 v1.0.0.3 β€” remote, unauthenticated exploit possible. Public exploit code released. Patch ASAP or restrict remote access! radar.offseq.com/threat/cve-20 #OffSeq #CVE20263768 #RouterSecurity #Infosec

##

thehackerwire@mastodon.social at 2026-03-08T21:27:19.000Z ##

🟠 CVE-2026-3768 - High (8.8)

A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet. The manipulation of the argument GO leads to stack-based buffer overflow. Remote expl...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2219
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-09T15:15:57.870000

1 posts

It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).

thehackerwire@mastodon.social at 2026-03-09T16:45:11.000Z ##

🟠 CVE-2026-2219 - High (7.5)

It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite lo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3802
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T15:09:44.737000

1 posts

A vulnerability was determined in Tenda i3 1.0.0.6(2204). Affected by this issue is the function formexeCommand of the file /goform/exeCommand. Executing a manipulation of the argument cmdinput can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-09T06:00:49.000Z ##

🟠 CVE-2026-3802 - High (8.8)

A vulnerability was determined in Tenda i3 1.0.0.6(2204). Affected by this issue is the function formexeCommand of the file /goform/exeCommand. Executing a manipulation of the argument cmdinput can lead to stack-based buffer overflow. The attack m...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3803
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T15:09:33.580000

1 posts

A vulnerability was identified in Tenda i3 1.0.0.6(2204). This affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-03-09T07:01:20.000Z ##

🟠 CVE-2026-3803 - High (8.8)

A vulnerability was identified in Tenda i3 1.0.0.6(2204). This affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to initiate ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30227
(0 None)

EPSS: 1.01%

updated 2026-03-09T13:35:34.633000

1 posts

MimeKit is a C# library which may be used for the creation and parsing of messages using the Multipurpose Internet Mail Extension (MIME), as defined by numerous IETF specifications. Prior to version 4.15.1, a CRLF injection vulnerability in MimeKit allows an attacker to embed \r\n into the SMTP envelope address local-part (when the local-part is a quoted-string). This is non-compliant with RFC 532

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-41758
(8.8 HIGH)

EPSS: 0.18%

updated 2026-03-09T13:35:07.393000

1 posts

A low-privileged remote attacker can exploit an arbitrary file write vulnerability in the wwupload.cgi endpoint. Due to path traversal this can lead to overwriting arbitrary files on the device and achieving a full system compromise.

thehackerwire@mastodon.social at 2026-03-09T12:48:24.000Z ##

🟠 CVE-2025-41758 - High (8.8)

A low-privileged remote attacker can exploit an arbitrary file write vulnerability in the wwupload.cgi endpoint. Due to path traversal this can lead to overwriting arbitrary files on the device and achieving a full system compromise.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41761
(7.8 HIGH)

EPSS: 0.02%

updated 2026-03-09T13:35:07.393000

2 posts

A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.

thehackerwire@mastodon.social at 2026-03-09T12:48:05.000Z ##

🟠 CVE-2025-41761 - High (7.8)

A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and i...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-09T12:00:45.000Z ##

🟠 CVE-2025-41761 - High (7.8)

A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and i...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41756
(8.1 HIGH)

EPSS: 0.10%

updated 2026-03-09T13:35:07.393000

1 posts

A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to write arbitrary files on the system.

thehackerwire@mastodon.social at 2026-03-09T12:01:34.000Z ##

🟠 CVE-2025-41756 - High (8.1)

A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to write arbitrary files on the system.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29779
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-09T13:35:07.393000

1 posts

UptimeFlare is a serverless uptime monitoring & status page solution, powered by Cloudflare Workers. Prior to commit 377a596, configuration file uptime.config.ts exports both pageConfig (safe for client use) and workerConfig (server-only, contains sensitive data) from the same module. Due to pages/incidents.tsx importing and using workerConfig directly inside client-side component code, the entire

thehackerwire@mastodon.social at 2026-03-08T10:18:37.000Z ##

🟠 CVE-2026-29779 - High (7.5)

UptimeFlare is a serverless uptime monitoring & status page solution, powered by Cloudflare Workers. Prior to commit 377a596, configuration file uptime.config.ts exports both pageConfig (safe for client use) and workerConfig (server-only, contains...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28678
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-09T13:35:07.393000

1 posts

DSA Study Hub is an interactive educational web application. Prior to commit d527fba, the user authentication system in server/routes/auth.js was found to be vulnerable to Insufficiently Protected Credentials. Authentication tokens (JWTs) were stored in HTTP cookies without cryptographic protection of the payload. This issue has been patched via commit d527fba.

thehackerwire@mastodon.social at 2026-03-08T10:00:45.000Z ##

🟠 CVE-2026-28678 - High (8.1)

DSA Study Hub is an interactive educational web application. Prior to commit d527fba, the user authentication system in server/routes/auth.js was found to be vulnerable to Insufficiently Protected Credentials. Authentication tokens (JWTs) were sto...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30855
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-03-09T13:21:39

1 posts

### Summary An authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modify, or delete any tenant by ID. Since account registration is open to the public, this vulnerability allows any unauthenticated attacker to register an account and subsequently exploit the system. This enables cross-tenant account takeover and destruction, making the

thehackerwire@mastodon.social at 2026-03-08T09:19:54.000Z ##

🟠 CVE-2026-30855 - High (8.8)

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.2, an authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modif...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30861
(10.0 CRITICAL)

EPSS: 0.22%

updated 2026-03-09T13:14:29

1 posts

### Summary A critical unauthenticated remote code execution (RCE) vulnerability exists in the MCP stdio configuration validation introduced in version 2.0.5. The application allows unrestricted user registration, meaning any attacker can create an account and exploit the command injection flaw. Despite implementing a whitelist for allowed commands (`npx`, `uvx`) and blacklists for dangerous ar

thehackerwire@mastodon.social at 2026-03-08T09:38:29.000Z ##

πŸ”΄ CVE-2026-30861 - Critical (9.9)

WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. From version 0.2.5 to before version 0.2.10, an unauthenticated remote code execution (RCE) vulnerability exists in the MCP stdio configuration va...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3814
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-09T12:31:50

2 posts

A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected by this issue is the function strcpy of the file /goform/getOneApConfTempEntry. Performing a manipulation results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-03-09T11:02:57.000Z ##

🟠 CVE-2026-3814 - High (8.8)

A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected by this issue is the function strcpy of the file /goform/getOneApConfTempEntry. Performing a manipulation results in buffer overflow. It is possible to initiate the a...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-09T10:32:40.000Z ##

🚨 HIGH severity (CVSS 8.7) buffer overflow in UTT HiPER 810G (≀1.7.7-1711), via strcpy in /goform/getOneApConfTempEntry. Public exploit released β€” urgent monitoring advised. CVE-2026-3814 radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #UTT #InfoSec

##

CVE-2026-3815
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-09T12:31:49

2 posts

A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects the function strcpy of the file /goform/formApMail. Executing a manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-03-09T12:03:49.000Z ##

🟠 CVE-2026-3815 - High (8.8)

A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects the function strcpy of the file /goform/formApMail. Executing a manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-09T12:00:35.000Z ##

🟠 CVE-2026-3815 - High (8.8)

A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects the function strcpy of the file /goform/formApMail. Executing a manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41764
(9.1 CRITICAL)

EPSS: 0.10%

updated 2026-03-09T09:30:37

2 posts

Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.

thehackerwire@mastodon.social at 2026-03-09T12:48:14.000Z ##

πŸ”΄ CVE-2025-41764 - Critical (9.1)

Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-09T12:00:54.000Z ##

πŸ”΄ CVE-2025-41764 - Critical (9.1)

Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41765
(9.1 CRITICAL)

EPSS: 0.06%

updated 2026-03-09T09:30:37

1 posts

Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupload.cgi endpoint to upload and apply arbitrary data. This includes, but is not limited to, contact images, HTTPS certificates, system backups for restoration, server peer configurations, and BACnet/SC server certificates and keys.

thehackerwire@mastodon.social at 2026-03-09T12:01:23.000Z ##

πŸ”΄ CVE-2025-41765 - Critical (9.1)

Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupload.cgi endpoint to upload and apply arbitrary data. This includes, but is not limited to, contact images, HTTPS certificates, system backups for ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41772
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-09T09:30:37

1 posts

An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.

thehackerwire@mastodon.social at 2026-03-09T10:07:27.000Z ##

🟠 CVE-2025-41772 - High (7.5)

An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41766
(8.8 HIGH)

EPSS: 0.39%

updated 2026-03-09T09:30:37

1 posts

A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise.

thehackerwire@mastodon.social at 2026-03-09T10:07:17.000Z ##

🟠 CVE-2025-41766 - High (8.8)

A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41757
(8.8 HIGH)

EPSS: 0.22%

updated 2026-03-09T09:30:36

1 posts

A low-privileged remote attacker can abuse the backup restore functionality of UBR (ubr-restore) which runs with elevated privileges and does not validate the contents of the backup archive to create or overwrite arbitrary files anywhere on the system.

thehackerwire@mastodon.social at 2026-03-09T12:01:43.000Z ##

🟠 CVE-2025-41757 - High (8.8)

A low-privileged remote attacker can abuse the backup restore functionality of UBR (ubr-restore) which runs with elevated privileges and does not validate the contents of the backup archive to create or overwrite arbitrary files anywhere on the sy...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3810
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T09:30:36

1 posts

A vulnerability has been found in Tenda FH1202 1.2.0.14(408). This affects the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-03-09T08:20:30.000Z ##

🟠 CVE-2026-3810 - High (8.8)

A vulnerability has been found in Tenda FH1202 1.2.0.14(408). This affects the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer overflow. Remote exploitation of the a...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3809
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T09:30:30

1 posts

A flaw has been found in Tenda FH1202 1.2.0.14(408). The impacted element is the function fromNatStaticSetting of the file /goform/NatSaticSetting. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-03-09T08:20:21.000Z ##

🟠 CVE-2026-3809 - High (8.8)

A flaw has been found in Tenda FH1202 1.2.0.14(408). The impacted element is the function fromNatStaticSetting of the file /goform/NatSaticSetting. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack m...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3808
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-09T09:30:30

1 posts

A vulnerability was detected in Tenda FH1202 1.2.0.14(408). The affected element is the function formWebTypeLibrary of the file /goform/webtypelibrary. Performing a manipulation of the argument webSiteId results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-03-09T08:20:11.000Z ##

🟠 CVE-2026-3808 - High (8.8)

A vulnerability was detected in Tenda FH1202 1.2.0.14(408). The affected element is the function formWebTypeLibrary of the file /goform/webtypelibrary. Performing a manipulation of the argument webSiteId results in stack-based buffer overflow. The...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30896
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-09T06:31:19

1 posts

The installer for Qsee Client versions 1.0.1 and prior insecurely load Dynamic Link Libraries (DLLs). When a user is directed to place some malicious DLL to the same directory and execute the affected installer, then arbitrary code may be executed with the administrative privilege.

thehackerwire@mastodon.social at 2026-03-09T07:01:10.000Z ##

🟠 CVE-2026-30896 - High (7.8)

The installer for Qsee Client versions 1.0.1 and prior insecurely load Dynamic Link Libraries (DLLs). When a user is directed to place some malicious DLL to the same directory and execute the affected installer, then arbitrary code may be executed...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3804
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T06:31:19

2 posts

A security flaw has been discovered in Tenda i3 1.0.0.6(2204). This vulnerability affects the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet. The manipulation of the argument index results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-03-09T07:00:58.000Z ##

🟠 CVE-2026-3804 - High (8.8)

A security flaw has been discovered in Tenda i3 1.0.0.6(2204). This vulnerability affects the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet. The manipulation of the argument index results in stack-based buffer overflow. It is ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-09T06:00:26.000Z ##

⚠️ HIGH severity: CVE-2026-3804 in Tenda i3 v1.0.0.6(2204) enables remote stack-based buffer overflow via /goform/WifiMacFilterSet. Exploit is public β€” prioritize mitigation or isolation. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Tenda #InfoSec

##

CVE-2026-3631
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-09T06:31:19

1 posts

Delta Electronics COMMGR2 has Buffer Over-read DoS vulnerability.

thehackerwire@mastodon.social at 2026-03-09T04:23:34.000Z ##

🟠 CVE-2026-3631 - High (7.5)

Delta Electronics COMMGR2 has

Buffer Over-read DoS vulnerability.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3799
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T06:31:19

1 posts

A flaw has been found in Tenda i3 1.0.0.6(2204). This impacts the function formSetCfm of the file /goform/setcfm. This manipulation of the argument funcpara1 causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-03-09T04:19:19.000Z ##

🟠 CVE-2026-3799 - High (8.8)

A flaw has been found in Tenda i3 1.0.0.6(2204). This impacts the function formSetCfm of the file /goform/setcfm. This manipulation of the argument funcpara1 causes stack-based buffer overflow. Remote exploitation of the attack is possible. The ex...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3801
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-09T06:31:19

1 posts

A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formSetAutoPing of the file /goform/setAutoPing. Performing a manipulation of the argument ping1/ping2 results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-03-09T04:19:09.000Z ##

🟠 CVE-2026-3801 - High (8.8)

A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formSetAutoPing of the file /goform/setAutoPing. Performing a manipulation of the argument ping1/ping2 results in stack-based buffer overflow. The ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3787
(7.0 None)

EPSS: 0.01%

updated 2026-03-09T00:30:19

1 posts

A weakness has been identified in UltraVNC 1.6.4.0 on Windows. This affects an unknown function in the library cryptbase.dll of the component Windows Service. This manipulation causes uncontrolled search path. The attack requires local access. A high degree of complexity is needed for the attack. The exploitability is reported as difficult. The vendor was contacted early about this disclosure but

offseq@infosec.exchange at 2026-03-09T00:00:39.000Z ##

UltraVNC 1.6.4.0 on Windows hit by HIGH-severity vuln (CVE-2026-3787): uncontrolled DLL search path in cryptbase.dll. Local attackers could escalate privileges. No patch yet β€” restrict access & monitor for DLL hijacking. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #UltraVNC

##

CVE-2026-3769
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-08T21:30:22

2 posts

A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function WrlclientSet of the file /goform/WrlclientSet. The manipulation of the argument GO results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-03-09T01:30:26.000Z ##

🚩 CVE-2026-3769: HIGH severity vuln in Tenda F453 (v1.0.0.3) β€” stack-based buffer overflow in /goform/WrlclientSet. Public exploit released! Limit remote access, monitor traffic, apply mitigations. Details: radar.offseq.com/threat/cve-20 #OffSeq #NetworkSecurity #Vuln

##

thehackerwire@mastodon.social at 2026-03-08T21:27:29.000Z ##

🟠 CVE-2026-3769 - High (8.8)

A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function WrlclientSet of the file /goform/WrlclientSet. The manipulation of the argument GO results in stack-based buffer overflow. The attack can be executed remote...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3732
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-08T12:30:35

2 posts

A security vulnerability has been detected in Tenda F453 1.0.0.3. This affects the function strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.

offseq@infosec.exchange at 2026-03-08T11:32:31.000Z ##

πŸ›‘ CVE-2026-3732: HIGH severity stack buffer overflow in Tenda F453 (v1.0.0.3). Remote, unauthenticated code execution risk β€” no patch yet. Block remote mgmt & monitor endpoints. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #RouterSecurity #CVE20263732

##

thehackerwire@mastodon.social at 2026-03-08T11:19:15.000Z ##

🟠 CVE-2026-3732 - High (8.8)

A security vulnerability has been detected in Tenda F453 1.0.0.3. This affects the function strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. It is possible to initiate the attac...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3727
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-08T12:30:27

1 posts

A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function sub_3C6C0 of the file /goform/QuickIndex. The manipulation of the argument mit_linktype/PPPOEPassword results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-03-08T10:18:28.000Z ##

🟠 CVE-2026-3727 - High (8.8)

A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function sub_3C6C0 of the file /goform/QuickIndex. The manipulation of the argument mit_linktype/PPPOEPassword results in stack-based buffer overflow. The attack may b...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3726
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-08T09:30:27

2 posts

A vulnerability has been found in Tenda F453 1.0.0.3. This affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

offseq@infosec.exchange at 2026-03-08T10:00:27.000Z ##

🚨 CVE-2026-3726 (HIGH, CVSS 8.7) in Tenda F453 (v1.0.0.3): Stack buffer overflow in /goform/webExcptypemanFilter enables remote, unauthenticated code execution. Public exploit code raises risk β€” restrict access & monitor now! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Infosec

##

thehackerwire@mastodon.social at 2026-03-08T09:19:45.000Z ##

🟠 CVE-2026-3726 - High (8.8)

A vulnerability has been found in Tenda F453 1.0.0.3. This affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initia...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3715
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-08T09:30:21

2 posts

A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the function sub_40139C of the file /cgi-bin/firewall.cgi. Performing a manipulation of the argument del_flag results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made public and could be used. Upgrading to version 20260226 is able to mitigate this issue. You should upgrad

offseq@infosec.exchange at 2026-03-08T08:30:28.000Z ##

πŸ›‘οΈ CVE-2026-3715: HIGH-severity stack overflow in Wavlink WL-WN579X3-C routers (v231124). Remote attackers can execute code w/o auth. Exploit code is public β€” patch to 20260226 now! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #RouterSecurity #Infosec

##

thehackerwire@mastodon.social at 2026-03-08T08:14:57.000Z ##

🟠 CVE-2026-3715 - High (8.8)

A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the function sub_40139C of the file /cgi-bin/firewall.cgi. Performing a manipulation of the argument del_flag results in stack-based buffer overflow. It is possible to initiate...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3701
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-08T06:31:15

1 posts

A security vulnerability has been detected in H3C Magic B1 up to 100R004. Affected by this vulnerability is the function Edit_BasicSSID_5G of the file /goform/aspForm. Such manipulation of the argument param leads to buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond

thehackerwire@mastodon.social at 2026-03-08T08:15:20.000Z ##

🟠 CVE-2026-3701 - High (8.8)

A security vulnerability has been detected in H3C Magic B1 up to 100R004. Affected by this vulnerability is the function Edit_BasicSSID_5G of the file /goform/aspForm. Such manipulation of the argument param leads to buffer overflow. The attack ca...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3699
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-08T03:30:34

1 posts

A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-171114. This impacts the function strcpy of the file /goform/formRemoteControl. The manipulation results in buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-03-08T08:18:38.000Z ##

🟠 CVE-2026-3699 - High (8.8)

A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-171114. This impacts the function strcpy of the file /goform/formRemoteControl. The manipulation results in buffer overflow. The attack may be launched remotely. The exploit has bee...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3700
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-08T03:30:34

1 posts

A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formConfigDnsFilterGlobal. This manipulation causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-03-08T08:15:29.000Z ##

🟠 CVE-2026-3700 - High (8.8)

A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formConfigDnsFilterGlobal. This manipulation causes buffer overflow. Remote exploitation of the attack is possible. The exploi...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3677
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-08T00:31:58

1 posts

A vulnerability was found in Tenda FH451 1.0.0.9. This impacts the function fromSetCfm of the file /goform/setcfm. The manipulation of the argument funcname/funcpara1 results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-03-08T09:01:30.000Z ##

🟠 CVE-2026-3677 - High (8.8)

A vulnerability was found in Tenda FH451 1.0.0.9. This impacts the function fromSetCfm of the file /goform/setcfm. The manipulation of the argument funcname/funcpara1 results in stack-based buffer overflow. The attack may be performed from remote....

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3679
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-08T00:31:58

1 posts

A vulnerability was identified in Tenda FH451 1.0.0.9. Affected by this vulnerability is the function formQuickIndex of the file /goform/QuickIndex. Such manipulation of the argument mit_linktype/PPPOEPassword leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-03-08T09:01:09.000Z ##

🟠 CVE-2026-3679 - High (8.8)

A vulnerability was identified in Tenda FH451 1.0.0.9. Affected by this vulnerability is the function formQuickIndex of the file /goform/QuickIndex. Such manipulation of the argument mit_linktype/PPPOEPassword leads to stack-based buffer overflow....

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25070(CVSS UNKNOWN)

EPSS: 1.03%

updated 2026-03-07T03:30:29

1 posts

XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain an OS command injection vulnerability in the /goform/PingTestSet endpoint that allows unauthenticated remote attackers to execute arbitrary operating system commands. Attackers can inject malicious commands through the destIp parameter to achieve remote code execution with root privileges on the network switch.

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-28802(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-03-06T21:56:56

1 posts

### Summary After upgrading the library from 1.5.2 to 1.6.0 (and the latest 1.6.5) it was noticed that previous tests involving passing a malicious JWT containing alg: none and an empty signature was passing the signature verification step without any changes to the application code when a failure was expected. ### Details It was likely introduced in this commit: https://github.com/authlib/authl

thehackerwire@mastodon.social at 2026-03-09T21:25:39.000Z ##

πŸ”΄ CVE-2026-28802 - Critical (9.8)

Authlib is a Python library which builds OAuth and OpenID Connect servers. From version 1.6.5 to before version 1.6.7, previous tests involving passing a malicious JWT containing alg: none and an empty signature was passing the signature verificat...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29058
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-03-06T21:56:51

1 posts

## Impact An unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the `base64Url` GET parameter. This can lead to full server compromise, data exfiltration (e.g., configuration secrets, internal keys, credentials), and service disruption. ## Root Cause The `base64Url` parameter is Base64-decoded and then interpolated directly into

beyondmachines1@infosec.exchange at 2026-03-08T20:01:11.000Z ##

Critical Zero-Click Command Injection in AVideo Platform Allows Stream Hijacking

AVideo version 6.0 contains a critical zero-click command injection vulnerability (CVE-2026-29058) that allows unauthenticated attackers to execute arbitrary OS commands and hijack video streams.

**If you are using AVideo platform this is urgent and important. Patch ASAP to version 7.0, because your server will be attacked. Until you update today, use a web application firewall or reverse proxy to block access to the getImage.php component.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24105
(9.8 CRITICAL)

EPSS: 1.69%

updated 2026-03-06T21:05:36.243000

1 posts

An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.18_multi. The value of `v1` was not checked, potentially leading to a command injection vulnerability if injected into doSystemCmd.

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-70230
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-06T17:37:58.670000

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDDNS.

thehackerwire@mastodon.social at 2026-03-08T13:00:15.000Z ##

πŸ”΄ CVE-2025-70230 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDDNS.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2018-25181
(7.5 HIGH)

EPSS: 0.57%

updated 2026-03-06T15:31:36

1 posts

Musicco 2.0.0 contains a path traversal vulnerability that allows unauthenticated attackers to download arbitrary directories by manipulating the parent parameter. Attackers can supply directory traversal sequences in the parent parameter of the getAlbum endpoint to access sensitive system directories and download them as ZIP files.

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-26417
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-06T12:31:37

1 posts

A broken access control vulnerability in the password reset functionality of Tata Consultancy Services Cognix Recon Client v3.0 allows authenticated users to reset passwords of arbitrary user accounts via crafted requests.

1 repos

https://github.com/aksalsalimi/CVE-2026-26417

thehackerwire@mastodon.social at 2026-03-08T11:00:18.000Z ##

🟠 CVE-2026-26417 - High (8.1)

A broken access control vulnerability in the password reset functionality of Tata Consultancy Services Cognix Recon Client v3.0 allows authenticated users to reset passwords of arbitrary user accounts via crafted requests.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70231
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-03-06T12:31:36

1 posts

D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When processing POST requests related to verification codes in /goform/formLogin, it enters /goform/getAuthCode but fails to filter the value of the FILECODE parameter, resulting in a path traversal vulnerability.

thehackerwire@mastodon.social at 2026-03-08T13:00:27.000Z ##

πŸ”΄ CVE-2025-70231 - Critical (9.8)

D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When processing POST requests related to verification codes in /goform/formLogin, it enters /goform/getAuthCode but fails to filter the value of the FILECODE parameter, resulting...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70229
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-06T12:31:36

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSchedule.

thehackerwire@mastodon.social at 2026-03-08T12:31:35.000Z ##

πŸ”΄ CVE-2025-70229 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSchedule.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70616
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-06T12:31:36

1 posts

A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys kernel driver (version 1.2.0.0) in the IOCTL handler for code 0x80102058. The vulnerability is caused by missing bounds checking on the user-controlled Options parameter before copying data into a 40-byte stack buffer (Src[40]) using memmove. An attacker with local access can exploit this vulnerability by sending a cra

thehackerwire@mastodon.social at 2026-03-08T12:00:21.000Z ##

🟠 CVE-2025-70616 - High (7.8)

A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys kernel driver (version 1.2.0.0) in the IOCTL handler for code 0x80102058. The vulnerability is caused by missing bounds checking on the user-controlled Options paramet...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26418
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-06T12:31:36

1 posts

Missing authentication and authorization in the web API of Tata Consultancy Services Cognix Recon Client v3.0 allows remote attackers to access application functionality without restriction via the network.

1 repos

https://github.com/aksalsalimi/CVE-2026-26418

thehackerwire@mastodon.social at 2026-03-08T11:00:29.000Z ##

🟠 CVE-2026-26418 - High (7.5)

Missing authentication and authorization in the web API of Tata Consultancy Services Cognix Recon Client v3.0 allows remote attackers to access application functionality without restriction via the network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70233
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-06T12:30:31

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetEnableWizard.

thehackerwire@mastodon.social at 2026-03-08T12:31:15.000Z ##

πŸ”΄ CVE-2025-70233 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetEnableWizard.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70232
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-06T12:30:31

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetMACFilter.

thehackerwire@mastodon.social at 2026-03-08T12:00:44.000Z ##

πŸ”΄ CVE-2025-70232 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetMACFilter.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25921
(9.3 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T22:28:33

2 posts

### Summary Overwritable LFS object across different repos leads to supply-chain attack, all LFS objects are vulnerable to be maliciously overwritten by malicious attackers. ### Details Gogs store all LFS objects in the same place, no isolation between different repositories. (repo id not concatenated to storage path) https://github.com/gogs/gogs/blob/7a2dffa95ac64f31c8322cb50d32694b05610144/inte

beyondmachines1@infosec.exchange at 2026-03-10T16:01:11.000Z ##

Critical Gogs Vulnerability Enables Silent Supply-Chain Attacks via LFS Overwrites

Gogs patched a critical vulnerability (CVE-2026-25921) that allows unauthenticated attackers to overwrite Git Large File Storage (LFS) objects across repositories, enabling silent supply-chain attacks.

**If you are using Gogs, this is important, and if you have public access or registration to Gogs, it's urgent. Attackers can exploit this flaw to inject their malicious versions of binaries. You should not only update to version 0.14.2 ASAP and verify the integrity of your existing large files to ensure they haven't been replaced with malicious versions.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-03-08T11:00:40.000Z ##

πŸ”΄ CVE-2026-25921 - Critical (9.3)

Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwritable LFS object across different repos leads to supply-chain attack, all LFS objects are vulnerable to be maliciously overwritten by malicious attackers. This issue h...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26478
(9.8 CRITICAL)

EPSS: 1.22%

updated 2026-03-04T18:32:01

1 posts

A shell command injection vulnerability in Mobvoi Tichome Mini smart speaker 012-18853 and 027-58389 allows remote attackers to send a specially crafted UDP datagram and execute arbitrary shell code as the root account.

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-21385
(7.8 HIGH)

EPSS: 0.38%

updated 2026-03-04T18:13:00.207000

2 posts

Memory corruption while using alignments for memory allocation.

1 repos

https://github.com/automate-it0/qualcomm-vulnerability-scanner

hackmag@infosec.exchange at 2026-03-10T08:00:03.000Z ##

βšͺ️ Android patches 0‑day vulnerability linked to Qualcomm components

πŸ—¨οΈ Google experts have released the March security updates for Android, fixing a total of 129 vulnerabilities. Among them is a 0‑day issue in a Qualcomm component that is already being used in real-world attacks. The vulnerability has been assigned the…

πŸ”— hackmag.com/news/cve-2026-2138

#news

##

youranonnewsirc@nerdculture.de at 2026-03-09T20:29:19.000Z ##

Latest Geopolitical, Technology, and Cybersecurity Update (March 6-7, 2026):

Russia is reportedly sharing intelligence with Iran to target US forces in the Middle East, escalating tensions. Cybersecurity faces critical threats as a Cisco SD-WAN flaw (CVE-2026-20127) has been exploited since 2023, and a Qualcomm zero-day (CVE-2026-21385) affects 234 chipsets. Meanwhile, rapid AI advancements are intensifying regulatory debates globally.

#Cybersecurity #Geopolitics #TechNews

##

CVE-2026-2256
(6.5 MEDIUM)

EPSS: 2.31%

updated 2026-03-03T21:52:29.877000

1 posts

A command injection vulnerability in ModelScope's ms-agent versions v1.6.0rc1 and earlier exists, allowing an attacker to execute arbitrary operating system commands through crafted prompt-derived input.

1 repos

https://github.com/Itamar-Yochpaz/CVE-2026-2256-PoC

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2024-47886
(7.2 HIGH)

EPSS: 0.89%

updated 2026-03-03T19:11:21.227000

1 posts

Chamilo is a learning management system. Chamillo is affected by a post-authentication phar unserialize which leads to a remote code execution (RCE) within versions 1.11.12 to 1.11.26. By abusing multiple supported features from the virtualization plugin vchamilo, the vulnerability allows an administrator to execute arbitrary code on the server. This issue has been patched in version 1.11.26.

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-24107
(9.8 CRITICAL)

EPSS: 1.13%

updated 2026-03-03T03:33:44

1 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the value of `usbPartitionName`, which is directly used in `doSystemCmd`, may lead to critical command injection vulnerabilities.

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-24101
(9.8 CRITICAL)

EPSS: 1.13%

updated 2026-03-02T18:31:44

1 posts

An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_multi. When the condition is met, `s1_1` will be passed into sub_B0488, concatenated into `doSystemCmd`. The value of s1_1 is not validated, potentially leading to a command injection vulnerability.

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-27611
(6.5 MEDIUM)

EPSS: 0.03%

updated 2026-02-27T21:42:55

4 posts

### Summary When users share password-protected files, the recipient can completely bypass the password and still download the file. ### Details This happens because the API returns a direct download link in the details of the share, which is accessible to anyone with JUST THE SHARE LINK, even without the password. ### PoC 1. As an authenticated user, create a share for a file, with a password s

thehackerwire@mastodon.social at 2026-03-10T19:17:55.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:16:04.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:01:49.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:44:44.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27739(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-02-25T22:42:37

1 posts

A [Server-Side Request Forgery (SSRF)](https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/SSRF) vulnerability has been identified in the Angular SSR request handling pipeline. The vulnerability exists because Angular’s internal URL reconstruction logic directly trusts and consumes user-controlled HTTP headers specifically the Host and `X-Forwarded-*` family to determine the application'

beyondmachines1@infosec.exchange at 2026-03-09T20:01:10.000Z ##

Critical SSRF Vulnerability Patched in Angular Server-Side Rendering

Angular patched a critical SSRF vulnerability (CVE-2026-27739) in its SSR framework that allows attackers to redirect server-side requests to malicious or internal destinations by manipulating HTTP headers.

**If you are using Angular, this is important and urgent. Check your package.json for the possibly risky versions of the libraries, and either patch or sanitize the headers. Always validate incoming headers against a strict allowlist and avoid using client-provided data to build internal request URLs.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-20127
(10.0 CRITICAL)

EPSS: 2.60%

updated 2026-02-25T18:31:45

3 posts

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not

6 repos

https://github.com/zerozenxlabs/CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE

https://github.com/bluefalconink/cisa-ed-26-03-tracker

https://github.com/abrahamsurf/sdwan-scanner-CVE-2026-20127

https://github.com/BugFor-Pings/CVE-2026-20127_EXP

https://github.com/leemuun/CVE-2026-20127

https://github.com/yonathanpy/CVE-2026-20127-Cisco-SD-WAN-Preauth-RCE

jbhall56@infosec.exchange at 2026-03-10T13:03:22.000Z ##

WatchTowr reports seeing exploitation attempts for CVE-2026-20127 from numerous unique IP addresses. securityweek.com/recent-cisco-

##

youranonnewsirc@nerdculture.de at 2026-03-09T20:29:19.000Z ##

Latest Geopolitical, Technology, and Cybersecurity Update (March 6-7, 2026):

Russia is reportedly sharing intelligence with Iran to target US forces in the Middle East, escalating tensions. Cybersecurity faces critical threats as a Cisco SD-WAN flaw (CVE-2026-20127) has been exploited since 2023, and a Qualcomm zero-day (CVE-2026-21385) affects 234 chipsets. Meanwhile, rapid AI advancements are intensifying regulatory debates globally.

#Cybersecurity #Geopolitics #TechNews

##

technadu@infosec.exchange at 2026-03-09T11:58:00.000Z ##

Critical Cisco Catalyst SD-WAN vulnerability (CVE-2026-20127, CVSS 10.0) is now under widespread exploitation.

Attackers are deploying webshells after the flaw moved from targeted zero-day use to global opportunistic campaigns.

technadu.com/cisco-catalyst-sd

Have your systems been patched?

#infosec #cybersecurity #cisco #zeroday #threatintel

##

bdking71@mastodon.social at 2026-03-10T11:33:09.000Z ##

Microsoft turned Notepad into a "smart" AI assistant and accidentally handed hackers a "one-click" execution engine. Here is the technical breakdown of CVE-2026-20841 and why feature creep is killing your security. πŸ›‘πŸ’»

#CyberSecurity #Windows11 #Infosec

bdking71.wordpress.com/2026/03

##

CVE-2026-25253
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-13T17:41:02.987000

1 posts

OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value from a query string and automatically makes a WebSocket connection without prompting, sending a token value.

7 repos

https://github.com/Ckokoski/moatbot-security

https://github.com/adibirzu/openclaw-security-monitor

https://github.com/FrigateCaptain/openclaw_vulnerabilities_and_solutions

https://github.com/Joseph19820124/openclaw-vuln-report

https://github.com/al4n4n/CVE-2026-25253-research

https://github.com/ethiack/moltbot-1click-rce

https://github.com/EQSTLab/CVE-2026-25253

TiamatEnity@mastodon.social at 2026-03-08T15:12:12.000Z ##

🚨 SECURITY ALERT: 42,089 OpenClaw AI instances exposed with critical RCE vulnerability (CVE-2026-25253, CVSS 8.8).

93% lack authentication. 1.5M API tokens compromised. One-click shell access via malicious websites.

Full analysis + protection strategies:
dev.to/tiamatenity/your-ai-ass

#infosec #privacy #cybersecurity #ai

##

CVE-2026-2138
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-08T06:31:53

1 posts

A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the function sub_42D03C of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. The attack can be launched remotely. The exploit has been made public and could be used.

hackmag@infosec.exchange at 2026-03-10T08:00:03.000Z ##

βšͺ️ Android patches 0‑day vulnerability linked to Qualcomm components

πŸ—¨οΈ Google experts have released the March security updates for Android, fixing a total of 129 vulnerabilities. Among them is a 0‑day issue in a Qualcomm component that is already being used in real-world attacks. The vulnerability has been assigned the…

πŸ”— hackmag.com/news/cve-2026-2138

#news

##

CVE-2025-14338
(0 None)

EPSS: 0.01%

updated 2026-01-14T16:25:12.057000

1 posts

Polkit authentication dis isabled by default and a race condition in the Polkit authorization check in versions before v0.69.0 can lead to the same issues as in CVE-2025-66005.

GamingNews@meta.masto.host at 2026-03-09T23:25:43.000Z ##

Steam Deck just posted:

SteamOS 3.7.20

SteamOS 3.7.20 has just been released for all users with the following changes previously in Beta:GeneralAdded ntsync driverNon-DeckEnabled polkit for the InputPlumber dbus interface and resolved a potential race condition for the InputPlumber interface, addressing CVE-2025-66005 and CVE-2025-14338

store.steampowered.com/news/ap

#gamingNews #SteamDeck

##

CVE-2025-66005(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-01-14T12:31:39

1 posts

Lack of authorization of the InputManager D-Bus interface in InputPlumber versions before v0.63.0 can lead to local Denial-of-Service, information leak or even privilege escalation in the context of the currently active user session.

GamingNews@meta.masto.host at 2026-03-09T23:25:43.000Z ##

Steam Deck just posted:

SteamOS 3.7.20

SteamOS 3.7.20 has just been released for all users with the following changes previously in Beta:GeneralAdded ntsync driverNon-DeckEnabled polkit for the InputPlumber dbus interface and resolved a potential race condition for the InputPlumber interface, addressing CVE-2025-66005 and CVE-2025-14338

store.steampowered.com/news/ap

#gamingNews #SteamDeck

##

CVE-2025-0037
(6.6 MEDIUM)

EPSS: 0.03%

updated 2025-06-10T00:30:36

1 posts

In AMD Versal Adaptive SoC devices, the lack of address validation when executing PLM runtime services through the PLM firmware can allow access to isolated or protected memory spaces, resulting in the loss of integrity and confidentiality.

AAKL@infosec.exchange at 2026-03-10T16:05:40.000Z ##

Medium-severity advisory from AMD:

CVE-2025-0037:β€―Versal Adaptive SoC – Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

A long list of advisories from Adobe: helpx.adobe.com/security/secur

Dell patches for multiple vulnerabilities:

Security Update for Dell Connectrix B-Series SANnav Vulnerabilities dell.com/support/kbdoc/en-us/0

Security Update forβ€―Dell Connectrix B-Series FOSβ€―and SANnav Vulnerabilities dell.com/support/kbdoc/en-us/0

Security Update for Dell Avamar Data Store Gen5A Multiple Third-Party Component Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell
#infosec #vulnerability #AMD #Adobe

##

CVE-2022-25912
(8.1 HIGH)

EPSS: 43.30%

updated 2025-04-22T21:15:42.690000

11 posts

The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306).

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:02.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

thehackerwire@mastodon.social at 2026-03-10T19:30:22.000Z ##

πŸ”΄ CVE-2026-28292 - Critical (9.8)

`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code e...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2022-25860
(8.1 HIGH)

EPSS: 41.35%

updated 2025-04-01T16:15:15.807000

11 posts

Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:02.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-10T21:00:03.000Z ##

🚨 EUVD-2026-10791

πŸ“Š Score: 9.8/10 (CVSS v3.1)
πŸ“¦ Product: simple-git
🏒 Vendor: steveukx
πŸ“… Updated: 2026-03-10

πŸ“ `simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code executio...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

thehackerwire@mastodon.social at 2026-03-10T19:30:22.000Z ##

πŸ”΄ CVE-2026-28292 - Critical (9.8)

`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code e...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30983
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:44:25.000Z ##

🟠 CVE-2026-30983 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow in icFixXml() (strcpy) causing stack memory corruption or crash. This vulnerability is fixed in 2.3.1.5.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:43:10.000Z ##

🟠 CVE-2026-30983 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow in icFixXml() (strcpy) causing stack memory corruption or crash. This vulnerability is fixed in 2.3.1.5.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30978
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:43:47.000Z ##

🟠 CVE-2026-30978 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-use-after-free in CIccCmm::AddXform() causing invalid vptr dereference and crash. This vulnerability is fixed in 2.3.1.5.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30985
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:43:38.000Z ##

🟠 CVE-2026-30985 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow write in CIccMatrixMath::SetRange() causing memory corruption or crash. This vulnerability is fixe...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31795
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:40:49.000Z ##

🟠 CVE-2026-31795 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow write in CIccXform3DLut::Apply() corrupting stack memory or crash. This vulnerability is fixed in 2.3.1.5.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31792
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:21:41.000Z ##

🟠 CVE-2026-31792 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a null pointer dereference in CIccTagXmlStruct::ParseTag() causing a segmentation fault or denial of service. This vulnerabilit...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31796
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:21:31.000Z ##

🟠 CVE-2026-31796 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow in icCurvesFromXml() causing heap memory corruption or crash. This vulnerability is fixed in 2.3.1.5.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30918
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:01:28.000Z ##

🟠 CVE-2026-30918 - High (7.6)

facileManager is a modular suite of web apps built with the sysadmin in mind. Prior to 6.0.4 , a reflected XSS occurs when an application receives data from an untrusted source and uses it in its HTTP responses in a way that could lead to vulnerab...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27005
(0 None)

EPSS: 0.12%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T15:00:13.000Z ##

πŸ”΄ CVE-2026-27005 - Critical (9.8)

Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.3, an unauthenticated attacker can inject arbitrary SQL into queries executed against databases con...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30929
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T08:00:00.000Z ##

🟠 CVE-2026-30929 - High (7.7)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffe...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28691
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T08:00:11.000Z ##

🟠 CVE-2026-28691 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vul...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30862
(0 None)

EPSS: 0.04%

1 posts

N/A

1 repos

https://github.com/drkim-dev/CVE-2026-30862

offseq@infosec.exchange at 2026-03-10T03:00:29.000Z ##

⚠️ CRITICAL: CVE-2026-30862 in Appsmith <1.96 enables stored XSS via TableWidgetV2. Attackers can leverage 'Invite Users' for admin takeover. Patch to 1.96+ ASAP! No active exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #XSS #Appsmith #CVE2026_30862

##

CVE-2026-31816
(0 None)

EPSS: 0.10%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-09T21:17:52.000Z ##

πŸ”΄ CVE-2026-31816 - Critical (9.1)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.4 and earlier, the Budibase server's authorized() middleware that protects every server-side API endpoint can be completely bypassed by appending a w...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-09T21:17:00.000Z ##

πŸ”΄ CVE-2026-31816 - Critical (9.1)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.4 and earlier, the Budibase server's authorized() middleware that protects every server-side API endpoint can be completely bypassed by appending a w...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25737
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-09T21:17:18.000Z ##

🟠 CVE-2026-25737 - High (8.9)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.24.0 and earlier, an arbitrary file upload vulnerability exists even though file extension restrictions are configured. The restriction is enforced only...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-62166
(0 None)

EPSS: 0.08%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-09T20:22:15.000Z ##

🟠 CVE-2025-62166 - High (7.5)

FreshRSS is a free, self-hostable RSS aggregator. Prior 1.28.0, a bug in the auth logic related to master authentication tokens, this restriction is bypassed. Usually only the default user's feed should be viewable if anonymous viewing is enabled,...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28514
(0 None)

EPSS: 0.11%

1 posts

N/A

_r_netsec@infosec.exchange at 2026-03-09T16:28:05.000Z ##

Sign in with ANY password into Rocket.Chat EE (CVE-2026-28514) and other vulnerabilities we’ve found with our open source AI framework github.blog/security/how-to-sc

##

Visit counter For Websites