## Updated at UTC 2026-03-26T04:01:24.060018

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-4484 9.8 0.00% 2 0 2026-03-26T02:16:07.913000 The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in
CVE-2026-33526 0 0.00% 2 0 2026-03-26T01:16:27.877000 Squid is a caching proxy for the Web. Prior to version 7.5, due to heap Use-Afte
CVE-2026-33287 7.5 0.00% 2 0 2026-03-26T01:16:27.530000 LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScri
CVE-2026-33285 7.5 0.00% 2 0 2026-03-26T01:16:27.363000 LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScri
CVE-2026-4758 8.8 0.00% 2 0 2026-03-26T00:16:41.570000 The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion
CVE-2026-34056 7.7 0.00% 2 0 2026-03-26T00:16:41.400000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2026-33932 7.6 0.00% 2 0 2026-03-26T00:16:39.953000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2026-33918 7.6 0.00% 4 0 2026-03-26T00:16:39.627000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2026-33917 8.8 0.00% 4 0 2026-03-26T00:16:39.470000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2026-33913 7.7 0.00% 2 0 2026-03-25T23:17:10.660000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2026-33017 9.8 0.59% 2 3 2026-03-25T23:17:09.670000 Langflow is a tool for building and deploying AI-powered agents and workflows. I
CVE-2025-33247 7.8 0.28% 1 0 2026-03-25T21:58:57.220000 NVIDIA Megatron LM contains a vulnerability in quantization configuration loadin
CVE-2026-24150 7.8 0.06% 1 0 2026-03-25T21:58:12.560000 NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attac
CVE-2026-33286 9.1 0.04% 2 0 2026-03-25T21:33:33 ### Summary An arbitrary method execution vulnerability has been found which af
CVE-2026-33282 7.5 0.02% 1 0 2026-03-25T21:32:53 ## Summary Ella Core panics when processing a malformed NGAP LocationReport mes
CVE-2026-32536 10.0 0.00% 2 0 2026-03-25T21:31:40 Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green
CVE-2026-32537 7.5 0.00% 2 0 2026-03-25T21:31:39 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-25001 8.6 0.00% 2 0 2026-03-25T21:31:38 Improper Control of Generation of Code ('Code Injection') vulnerability in Saad
CVE-2026-32534 8.5 0.00% 2 0 2026-03-25T21:30:36 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-32539 9.3 0.00% 2 0 2026-03-25T21:30:36 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-32573 9.1 0.00% 2 0 2026-03-25T21:30:36 Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio
CVE-2026-32513 8.8 0.00% 2 0 2026-03-25T21:30:35 Deserialization of Untrusted Data vulnerability in Miguel Useche JS Archive List
CVE-2026-27044 10.0 0.00% 4 0 2026-03-25T21:30:35 Improper Control of Generation of Code ('Code Injection') vulnerability in Total
CVE-2026-25366 10.0 0.00% 2 0 2026-03-25T21:30:35 Improper Control of Generation of Code ('Code Injection') vulnerability in Theme
CVE-2026-4719 7.5 0.01% 1 0 2026-03-25T21:30:28 Incorrect boundary conditions in the Graphics: Text component. This vulnerabilit
CVE-2026-4704 7.5 0.01% 1 0 2026-03-25T21:30:27 Denial-of-service in the WebRTC: Signaling component. This vulnerability affects
CVE-2026-33680 7.5 0.03% 1 0 2026-03-25T21:18:09 ## Summary The `LinkSharing.ReadAll()` method allows link share authenticated u
CVE-2026-33678 8.1 0.03% 2 0 2026-03-25T21:17:43 ## Summary `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id
CVE-2026-32538 7.5 0.00% 2 0 2026-03-25T21:16:46.347000 Insertion of Sensitive Information Into Sent Data vulnerability in Noor Alam SMT
CVE-2026-32531 8.1 0.00% 2 0 2026-03-25T21:16:44.300000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-30976 8.6 0.00% 2 0 2026-03-25T21:16:41.623000 Sonarr is a PVR for Usenet and BitTorrent users. In versions on the 4.x branch p
CVE-2026-33497 None 0.01% 1 0 2026-03-25T20:54:06 ### Summary In the download_profile_picture function of the /profile_pictures/{f
CVE-2026-33418 7.5 0.04% 1 0 2026-03-25T20:53:42 ## Summary The `ensureSize()` function in `@dicebear/converter` used a regex-ba
CVE-2026-33316 8.1 0.03% 2 0 2026-03-25T20:53:33 ### Summary A flaw in Vikunja’s password reset logic allows disabled users to r
CVE-2026-29839 8.8 0.02% 1 0 2026-03-25T20:53:05.983000 DedeCMS v5.7.118 was discovered to contain a Cross-Site Request Forgery (CSRF) v
CVE-2026-33310 8.8 0.05% 1 0 2026-03-25T20:52:31 ### Summary The shell() syntax within parameter default values appears to be aut
CVE-2026-33242 7.5 0.01% 1 0 2026-03-25T20:48:35 ### Details A Path Traversal and Access Control Bypass vulnerability was discov
CVE-2026-32300 8.1 0.03% 1 0 2026-03-25T20:46:17 # Security Advisory — My Page Profile Update (Improper Authorization) ## Summar
CVE-2026-32299 7.5 0.03% 1 0 2026-03-25T20:46:07 # Security Advisory — Page Content Retrieval (Improper Authorization) ## Summar
CVE-2026-32278 8.2 0.04% 2 0 2026-03-25T20:45:22 # Security Advisory — Form Plugin (Stored XSS) ## Summary A Stored Cross-site
CVE-2026-32277 8.7 0.03% 2 0 2026-03-25T20:45:12 # Security Advisory — Cabinet Plugin (DOM-based XSS) ## Summary A DOM-based Cr
CVE-2026-4715 9.1 0.02% 1 0 2026-03-25T20:16:36.837000 Uninitialized memory in the Graphics: Canvas2D component. This vulnerability aff
CVE-2026-4705 9.8 0.01% 1 0 2026-03-25T20:16:36.273000 Undefined behavior in the WebRTC: Signaling component. This vulnerability affect
CVE-2026-33218 7.5 0.00% 4 0 2026-03-25T20:16:32.623000 NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me
CVE-2026-32546 7.5 0.00% 4 0 2026-03-25T20:16:31.527000 Missing Authorization vulnerability in StellarWP Restrict Content restrict-conte
CVE-2026-32525 9.9 0.00% 2 0 2026-03-25T20:16:30.967000 Improper Control of Generation of Code ('Code Injection') vulnerability in jetmo
CVE-2026-25447 9.1 0.00% 4 0 2026-03-25T20:16:26.740000 Improper Control of Generation of Code ('Code Injection') vulnerability in Jonat
CVE-2026-20687 7.1 0.02% 1 1 2026-03-25T20:07:15.087000 A use after free issue was addressed with improved memory management. This issue
CVE-2026-4712 7.5 0.01% 1 0 2026-03-25T19:16:52.517000 Information disclosure in the Widget: Cocoa component. This vulnerability affect
CVE-2026-3988 7.5 0.00% 6 0 2026-03-25T18:32:08 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5
CVE-2026-3857 8.1 0.00% 6 0 2026-03-25T18:32:07 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10
CVE-2026-20012 8.6 0.00% 2 0 2026-03-25T18:31:51 A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco
CVE-2026-20125 7.7 0.00% 2 0 2026-03-25T18:31:51 A vulnerability in the HTTP Server feature of Cisco IOS Software and Cisco IOS X
CVE-2026-26832 9.8 0.00% 2 1 2026-03-25T18:31:51 node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tessera
CVE-2025-32991 9.1 0.00% 2 0 2026-03-25T18:31:46 In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful AP
CVE-2026-3608 7.5 0.02% 1 0 2026-03-25T18:31:43 Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea-
CVE-2026-33660 0 0.00% 2 0 2026-03-25T18:16:32.080000 n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.
CVE-2026-2995 7.7 0.00% 4 0 2026-03-25T17:16:58.347000 GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 bef
CVE-2026-27889 7.5 0.00% 2 0 2026-03-25T17:07:53 ### Background NATS.io is a high performance open source pub-sub distributed co
CVE-2026-20086 8.6 0.00% 2 0 2026-03-25T16:16:13.920000 A vulnerability in the processing of Control and Provisioning of Wireless Access
CVE-2026-20084 8.6 0.00% 2 0 2026-03-25T16:16:13.563000 A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allo
CVE-2026-24157 7.8 0.12% 1 0 2026-03-25T15:41:58.280000 NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an at
CVE-2026-22559 8.8 0.07% 1 0 2026-03-25T15:41:58.280000 An Improper Input Validation vulnerability in UniFi Network Server may allow una
CVE-2026-33329 8.1 0.05% 1 0 2026-03-25T15:41:58.280000 FileRise is a self-hosted web file manager / WebDAV server. From version 1.0.1 t
CVE-2026-2343 5.3 0.02% 1 0 2026-03-25T15:41:33.977000 The PeproDev Ultimate Invoice WordPress plugin through 2.2.5 has a bulk download
CVE-2026-28864 3.3 0.02% 1 0 2026-03-25T15:32:30 This issue was addressed with improved permissions checking. This issue is fixed
CVE-2026-3104 7.5 0.00% 2 0 2026-03-25T15:31:37 A specially crafted domain can be used to cause a memory leak in a BIND resolver
CVE-2026-26830 9.8 0.00% 2 2 2026-03-25T15:31:37 pdf-image (npm package) through version 2.0.0 allows OS command injection via th
CVE-2026-1519 7.5 0.00% 2 0 2026-03-25T15:31:36 If a BIND resolver is performing DNSSEC validation and encounters a maliciously
CVE-2026-33634 0 0.04% 1 1 2026-03-25T15:16:49.230000 Trivy is a security scanner. On March 19, 2026, a threat actor used compromised
CVE-2026-26306 7.8 0.02% 1 0 2026-03-25T06:30:35 The installer for OM Workspace (Windows Edition) Ver 2.4 and earlier insecurely
CVE-2026-2072 8.2 0.04% 1 0 2026-03-25T03:31:40 Cross-Site Scripting vulnerability in Hitachi Infrastructure Analytics Advisor (
CVE-2026-28877 None 0.02% 1 0 2026-03-25T03:31:39 An authorization issue was addressed with improved state management. This issue
CVE-2026-3909 8.8 4.79% 1 0 2026-03-25T00:31:11 Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a re
CVE-2026-33216 8.6 0.00% 4 0 2026-03-24T21:42:11 ### Background NATS.io is a high performance open source pub-sub distributed co
CVE-2026-4725 10.0 0.02% 1 0 2026-03-24T21:32:29 Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This v
CVE-2026-4723 9.8 0.01% 1 0 2026-03-24T21:32:29 Use-after-free in the JavaScript Engine component. This vulnerability affects Fi
CVE-2026-4701 9.8 0.02% 1 0 2026-03-24T21:32:28 Use-after-free in the JavaScript Engine component. This vulnerability affects Fi
CVE-2026-4717 9.8 0.02% 1 0 2026-03-24T21:32:28 Privilege escalation in the Netmonitor component. This vulnerability affects Fir
CVE-2026-4716 9.1 0.02% 1 0 2026-03-24T21:32:28 Incorrect boundary conditions, uninitialized memory in the JavaScript Engine com
CVE-2026-4714 7.5 0.01% 1 0 2026-03-24T21:32:28 Incorrect boundary conditions in the Audio/Video component. This vulnerability a
CVE-2026-4713 7.5 0.01% 1 0 2026-03-24T21:32:28 Incorrect boundary conditions in the Graphics component. This vulnerability affe
CVE-2026-4711 9.8 0.02% 1 0 2026-03-24T21:32:28 Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefo
CVE-2026-4722 8.8 0.02% 1 0 2026-03-24T21:32:28 Privilege escalation in the IPC component. This vulnerability affects Firefox <
CVE-2025-33254 7.5 0.03% 1 0 2026-03-24T21:31:36 NVIDIA Triton Inference Server contains a vulnerability where an attacker may ca
CVE-2025-33248 7.8 0.06% 1 0 2026-03-24T21:31:35 NVIDIA Megatron-LM contains a vulnerability in the hybrid conversion script wher
CVE-2025-33244 9.1 0.03% 2 0 2026-03-24T21:31:35 NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker co
CVE-2025-33238 7.5 0.03% 1 0 2026-03-24T21:31:35 NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability wh
CVE-2026-24158 7.5 0.04% 1 0 2026-03-24T21:31:35 NVIDIA Triton Inference Server contains a vulnerability in the HTTP endpoint whe
CVE-2026-24152 7.8 0.06% 1 0 2026-03-24T21:31:35 NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attac
CVE-2026-24151 7.8 0.06% 1 0 2026-03-24T21:31:35 NVIDIA Megatron-LM contains a vulnerability in inferencing where an Attacker may
CVE-2026-24141 7.8 0.06% 1 0 2026-03-24T21:31:35 NVIDIA Model Optimizer for Windows and Linux contains a vulnerability in the ONN
CVE-2026-24159 7.8 0.12% 1 0 2026-03-24T21:31:35 NVIDIA NeMo Framework contains a vulnerability where an attacker may cause remot
CVE-2026-2417 None 0.10% 1 0 2026-03-24T21:31:30 A Missing Authentication for Critical Function vulnerability in Pharos Controls
CVE-2026-4702 9.8 0.02% 1 0 2026-03-24T21:31:22 JIT miscompilation in the JavaScript Engine component. This vulnerability affect
CVE-2026-29785 7.5 0.00% 4 0 2026-03-24T21:29:09 ### Background NATS.io is a high performance open source pub-sub distributed co
CVE-2026-4700 9.8 0.02% 1 0 2026-03-24T21:16:31.800000 Mitigation bypass in the Networking: HTTP component. This vulnerability affects
CVE-2026-33554 7.5 0.04% 1 0 2026-03-24T20:16:30.357000 ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response
CVE-2026-30653 7.5 0.18% 1 0 2026-03-24T20:16:26.650000 An issue in Free5GC v.4.2.0 and before allows a remote attacker to cause a denia
CVE-2026-32276 8.8 0.07% 1 0 2026-03-24T19:58:16.700000 Connect-CMS is a content management system. In versions on the 1.x series up to
CVE-2026-33484 7.5 0.02% 1 0 2026-03-24T19:20:13.567000 Langflow is a tool for building and deploying AI-powered agents and workflows. I
CVE-2025-71275 9.8 0.46% 1 0 2026-03-24T18:31:36 Zimbra Collaboration Suite (ZCS) PostJournal service version 8.8.15 contains a c
CVE-2026-4673 8.8 0.07% 2 0 2026-03-24T18:31:34 Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowe
CVE-2026-4679 8.8 0.08% 1 0 2026-03-24T18:31:34 Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a rem
CVE-2026-4675 8.8 0.07% 1 0 2026-03-24T18:31:34 Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a
CVE-2026-4674 8.8 0.08% 2 0 2026-03-24T16:53:14.987000 Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a rem
CVE-2026-4677 8.8 0.07% 1 0 2026-03-24T16:47:49.867000 Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.16
CVE-2026-4368 0 0.02% 2 0 2026-03-24T15:54:09.400000 Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configur
CVE-2025-60946 8.8 0.12% 1 0 2026-03-24T15:54:09.400000 Census CSWeb 8.0.1 allows arbitrary file path input. A remote, authenticated att
CVE-2026-4283 9.1 0.10% 2 0 2026-03-24T15:53:48.067000 The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized acc
CVE-2026-27654 8.2 0.02% 1 0 2026-03-24T15:53:48.067000 NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module
CVE-2025-41660 8.8 0.21% 1 0 2026-03-24T15:53:48.067000 A low-privileged remote attacker may be able to replace the boot application of
CVE-2026-4750 9.1 0.04% 1 0 2026-03-24T15:53:48.067000 Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof
CVE-2026-4640 7.5 0.07% 1 0 2026-03-24T15:53:48.067000 Vitals ESP developed by Galaxy Software Services has a Missing Authentication vu
CVE-2026-33298 7.8 0.04% 2 0 2026-03-24T15:53:48.067000 llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an int
CVE-2026-33211 9.6 0.02% 2 0 2026-03-24T15:53:48.067000 Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style
CVE-2026-3533 8.8 0.22% 1 0 2026-03-24T15:53:48.067000 The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads du
CVE-2026-27651 7.5 0.03% 2 0 2026-03-24T15:30:36 When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open
CVE-2026-27784 7.8 0.01% 2 0 2026-03-24T15:30:36 The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_ht
CVE-2026-32647 7.8 0.01% 2 0 2026-03-24T15:30:36 NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module
CVE-2026-4775 7.8 0.06% 1 0 2026-03-24T15:30:36 A flaw was found in the libtiff library. A remote attacker could exploit a signe
CVE-2026-22739 8.6 0.02% 1 0 2026-03-24T15:30:27 Vulnerability in Spring Cloud when substituting the profile parameter from a req
CVE-2026-3509 7.5 0.08% 1 0 2026-03-24T09:30:41 An unauthenticated remote attacker may be able to control the format string of m
CVE-2026-4755 9.8 0.06% 1 0 2026-03-24T09:30:41 CWE-20 vulnerability in MolotovCherry Android-ImageMagick7.This issue affects An
CVE-2026-4745 None 0.05% 1 0 2026-03-24T06:31:25 Improper Control of Generation of Code ('Code Injection') vulnerability in dendi
CVE-2026-4753 9.1 0.04% 1 0 2026-03-24T06:31:25 Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects Re
CVE-2026-4746 None 0.04% 1 0 2026-03-24T06:31:25 Out-of-bounds Write vulnerability in timeplus-io proton (base/poco/Foundation/sr
CVE-2026-4662 7.5 0.08% 1 0 2026-03-24T06:31:25 The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listi
CVE-2026-4639 8.8 0.10% 2 0 2026-03-24T06:31:14 Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization v
CVE-2026-4744 None 0.01% 1 0 2026-03-24T06:31:14 Out-of-bounds Read vulnerability in rizonesoft Notepad3 (‎scintilla/oniguruma/sr
CVE-2026-4739 None 0.04% 2 0 2026-03-24T06:31:13 Integer Overflow or Wraparound vulnerability in InsightSoftwareConsortium ITK (‎
CVE-2026-4678 8.8 0.11% 1 0 2026-03-24T03:31:25 Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remo
CVE-2026-4676 8.8 0.11% 1 0 2026-03-24T03:31:25 Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote
CVE-2026-4680 8.8 0.13% 1 0 2026-03-24T03:31:25 Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remot
CVE-2026-4021 8.1 0.12% 1 0 2026-03-24T00:30:34 The Contest Gallery plugin for WordPress is vulnerable to an authentication bypa
CVE-2026-4001 9.8 0.14% 1 0 2026-03-24T00:30:33 The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to
CVE-2026-4306 7.5 0.07% 1 0 2026-03-24T00:30:33 The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'r
CVE-2026-4681 None 0.38% 1 0 2026-03-24T00:30:28 A critical remote code execution (RCE) vulnerability has been reported in PTC Wi
CVE-2025-60947 8.8 0.19% 1 0 2026-03-24T00:30:28 Census CSWeb 8.0.1 allows arbitrary file upload. A remote, authenticated attacke
CVE-2025-60949 9.1 0.03% 1 0 2026-03-24T00:30:28 Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployme
CVE-2026-32902 None 0.00% 1 0 2026-03-24T00:30:28 Rejected reason: This CVE ID has been rejected.
CVE-2026-32907 None 0.00% 1 0 2026-03-24T00:30:28 Rejected reason: This CVE ID has been rejected.
CVE-2026-32066 0 0.00% 1 0 2026-03-23T23:17:11.653000 Rejected reason: This CVE ID has been rejected.
CVE-2026-32913 7.5 0.03% 1 1 2026-03-23T21:54:50 OpenClaw's `fetchWithSsrFGuard(...)` followed cross-origin redirects while prese
CVE-2026-32845 8.4 0.01% 1 0 2026-03-23T21:31:53 cgltf version 1.15 and prior contain an integer overflow vulnerability in the cg
CVE-2026-3055 None 0.02% 3 0 2026-03-23T21:30:58 Insufficient input validation in NetScaler ADC and NetScaler Gateway when config
CVE-2026-33143 7.5 0.02% 2 0 2026-03-23T20:48:27.347000 OneUptime is a solution for monitoring and managing online services. Prior to ve
CVE-2026-33228 9.8 0.03% 1 0 2026-03-23T19:14:31.040000 flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function
CVE-2026-32746 9.8 0.03% 3 4 2026-03-23T15:31:40 telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMO
CVE-2026-21992 9.8 0.04% 1 0 2026-03-23T15:30:30.950000 Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware
CVE-2026-33509 7.5 0.06% 1 0 2026-03-20T21:50:31 ## Summary The `set_config_value()` API endpoint allows users with the non-admi
CVE-2025-31277 8.8 0.27% 1 0 2026-03-20T18:53:35.083000 The issue was addressed with improved memory handling. This issue is fixed in Sa
CVE-2025-43520 5.5 0.47% 8 0 2026-03-20T18:32:19 A memory corruption issue was addressed with improved memory handling. This issu
CVE-2026-33331 8.2 0.01% 1 0 2026-03-20T17:25:56 A Stored Cross-Site Scripting (XSS) vulnerability exists in the OpenAPI document
CVE-2026-33344 8.1 0.02% 1 0 2026-03-19T19:25:46 The fix for CVE-2026-27598 (commit e2ed589, PR #1691) added `ValidateDAGName` to
CVE-2026-20131 10.0 0.65% 3 3 2026-03-19T18:32:21 A vulnerability in the web-based management interface of Cisco Secure Firewall M
CVE-2026-3888 7.9 0.01% 1 5 2026-03-18T06:31:20 Local privilege escalation in snapd on Linux allows local attackers to get root
CVE-2026-32116 None 0.08% 2 0 2026-03-13T15:40:24 ### Impact _What kind of vulnerability is it? Who is impacted?_ Receiving a fil
CVE-2026-30839 4.3 0.03% 1 0 2026-03-11T18:48:29.450000 Wallos is an open-source, self-hostable personal subscription tracker. Prior to
CVE-2026-26123 5.5 0.05% 2 0 2026-03-10T21:32:18 Cwe is not in rca categories in Microsoft Authenticator allows an unauthorized a
CVE-2026-27598 None 0.11% 1 0 2026-02-27T20:40:25 The `CreateNewDAG` API endpoint (`POST /api/v1/dags`) does not validate the DAG
CVE-2026-27210 None 0.03% 1 0 2026-02-23T22:27:55 ### Impact The hot spot `attributes` configuration property allowed any attribut
CVE-2025-43529 8.8 0.20% 1 8 2025-12-17T21:31:01 A use-after-free issue was addressed with improved memory management. This issue
CVE-2025-24201 7.1 0.10% 1 3 2025-11-13T21:31:15 An out-of-bounds write issue was addressed with improved checks to prevent unaut
CVE-2026-34055 0 0.00% 2 0 N/A
CVE-2026-33696 0 0.00% 2 0 N/A
CVE-2026-23514 0 0.00% 2 0 N/A
CVE-2026-29187 0 0.00% 4 0 N/A
CVE-2026-33348 0 0.00% 2 0 N/A
CVE-2026-24750 0 0.00% 2 0 N/A
CVE-2026-30975 0 0.00% 2 0 N/A
CVE-2026-33656 0 0.00% 1 1 N/A
CVE-2026-28373 0 0.00% 1 0 N/A
CVE-2026-33870 0 0.00% 1 0 N/A
CVE-2026-33871 0 0.00% 1 0 N/A
CVE-2026-33340 0 0.04% 1 0 N/A
CVE-2026-33399 0 0.03% 1 0 N/A
CVE-2026-30840 0 0.05% 1 0 N/A
CVE-2026-33307 0 0.03% 1 0 N/A
CVE-2026-33250 0 0.21% 1 0 N/A
CVE-2026-33164 0 0.05% 1 0 N/A

CVE-2026-4484
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-26T02:16:07.913000

2 posts

The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.6. This is due to the plugin allowing a user to update the user role through the 'InstructorsController::prepare_object_for_database' function. This makes it possible for authenticated attackers, with Student-level access and above, to elevate their privileges to that of an admini

thehackerwire@mastodon.social at 2026-03-26T03:00:03.000Z ##

🔴 CVE-2026-4484 - Critical (9.8)

The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.6. This is due to the plugin allowing a user to update the user role through the 'InstructorsController::prepare_object_for_data...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T03:00:03.000Z ##

🔴 CVE-2026-4484 - Critical (9.8)

The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.6. This is due to the plugin allowing a user to update the user role through the 'InstructorsController::prepare_object_for_data...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33526
(0 None)

EPSS: 0.00%

updated 2026-03-26T01:16:27.877000

2 posts

Squid is a caching proxy for the Web. Prior to version 7.5, due to heap Use-After-Free, Squid is vulnerable to Denial of Service when handling ICP traffic. This problem allows a remote attacker to perform a reliable and repeatable Denial of Service attack against the Squid service using ICP protocol. This attack is limited to Squid deployments that explicitly enable ICP support (i.e. configure non

offseq at 2026-03-26T01:30:27.610Z ##

🚨 CVE-2026-33526: Critical Use-After-Free in Squid (<7.5) allows remote attackers to crash Squid via ICP traffic. icp_access rules are ineffective. Upgrade to 7.5+ or disable ICP (icp_port=0) ASAP! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-26T01:30:27.000Z ##

🚨 CVE-2026-33526: Critical Use-After-Free in Squid (<7.5) allows remote attackers to crash Squid via ICP traffic. icp_access rules are ineffective. Upgrade to 7.5+ or disable ICP (icp_port=0) ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Squid #Vuln #DoS

##

CVE-2026-33287
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-26T01:16:27.530000

2 posts

LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, the `replace_first` filter in LiquidJS uses JavaScript's `String.prototype.replace()` which interprets `$&` as a back reference to the matched substring. The filter only charges `memoryLimit` for the input string length, not the amplified output. An attacker can achieve exponential memory

thehackerwire@mastodon.social at 2026-03-26T01:36:13.000Z ##

🟠 CVE-2026-33287 - High (7.5)

LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, the `replace_first` filter in LiquidJS uses JavaScript's `String.prototype.replace()` which interprets `$&` as a back reference to the ma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:36:13.000Z ##

🟠 CVE-2026-33287 - High (7.5)

LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, the `replace_first` filter in LiquidJS uses JavaScript's `String.prototype.replace()` which interprets `$&` as a back reference to the ma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33285
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-26T01:16:27.363000

2 posts

LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, LiquidJS's `memoryLimit` security mechanism can be completely bypassed by using reverse range expressions (e.g., `(100000000..1)`), allowing an attacker to allocate unlimited memory. Combined with a string flattening operation (e.g., `replace` filter), this causes a V8 Fatal error that cra

thehackerwire@mastodon.social at 2026-03-26T01:18:13.000Z ##

🟠 CVE-2026-33285 - High (7.5)

LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, LiquidJS's `memoryLimit` security mechanism can be completely bypassed by using reverse range expressions (e.g., `(100000000..1)`), allow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:18:13.000Z ##

🟠 CVE-2026-33285 - High (7.5)

LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, LiquidJS's `memoryLimit` security mechanism can be completely bypassed by using reverse range expressions (e.g., `(100000000..1)`), allow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4758
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-26T00:16:41.570000

2 posts

The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code exec

thehackerwire@mastodon.social at 2026-03-26T01:00:42.000Z ##

🟠 CVE-2026-4758 - High (8.8)

The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possibl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:00:42.000Z ##

🟠 CVE-2026-4758 - High (8.8)

The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possibl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34056
(7.7 HIGH)

EPSS: 0.00%

updated 2026-03-26T00:16:41.400000

2 posts

OpenEMR is a free and open source electronic health records and medical practice management application. A Broken Access Control vulnerability in OpenEMR up to and including version 8.0.0.3 allows low-privilege users to view and download Ensora eRx error logs without proper authorization checks. This flaw compromises system confidentiality by exposing sensitive information, potentially leading to

thehackerwire@mastodon.social at 2026-03-26T01:00:33.000Z ##

🟠 CVE-2026-34056 - High (7.7)

OpenEMR is a free and open source electronic health records and medical practice management application. A Broken Access Control vulnerability in OpenEMR up to and including version 8.0.0.3 allows low-privilege users to view and download Ensora eR...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:00:33.000Z ##

🟠 CVE-2026-34056 - High (7.7)

OpenEMR is a free and open source electronic health records and medical practice management application. A Broken Access Control vulnerability in OpenEMR up to and including version 8.0.0.3 allows low-privilege users to view and download Ensora eR...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33932
(7.6 HIGH)

EPSS: 0.00%

updated 2026-03-26T00:16:39.953000

2 posts

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a stored cross-site scripting vulnerability in the CCDA document preview allows an attacker who can upload or send a CCDA document to execute arbitrary JavaScript in a clinician's browser session when the document is previewed. The XSL stylesheet sanitizes attributes f

thehackerwire@mastodon.social at 2026-03-26T01:01:16.000Z ##

🟠 CVE-2026-33932 - High (7.6)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a stored cross-site scripting vulnerability in the CCDA document preview allows an attacker who can upload or send a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:01:16.000Z ##

🟠 CVE-2026-33932 - High (7.6)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a stored cross-site scripting vulnerability in the CCDA document preview allows an attacker who can upload or send a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33918
(7.6 HIGH)

EPSS: 0.00%

updated 2026-03-26T00:16:39.627000

4 posts

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid session and CSRF token, but does not check any ACL permissions. This allows any authenticated OpenEMR user — regardless of whether they have billing priv

thehackerwire@mastodon.social at 2026-03-26T01:03:46.000Z ##

🟠 CVE-2026-33918 - High (7.6)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:01:14.000Z ##

🟠 CVE-2026-33918 - High (7.6)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:03:46.000Z ##

🟠 CVE-2026-33918 - High (7.6)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:01:14.000Z ##

🟠 CVE-2026-33918 - High (7.6)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33917
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-26T00:16:39.470000

4 posts

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. The vulnerability exists due to insufficient input validation in the ajax_save page in the CAMOS form. Version 8.0.0.3 patches the issue.

thehackerwire@mastodon.social at 2026-03-26T01:03:36.000Z ##

🟠 CVE-2026-33917 - High (8.8)

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:01:04.000Z ##

🟠 CVE-2026-33917 - High (8.8)

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:03:36.000Z ##

🟠 CVE-2026-33917 - High (8.8)

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:01:04.000Z ##

🟠 CVE-2026-33917 - High (8.8)

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33913
(7.7 HIGH)

EPSS: 0.00%

updated 2026-03-25T23:17:10.660000

2 posts

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated user with access to the Carecoordination module can upload a crafted CCDA document containing `<xi:include href="file:///etc/passwd" parse="text"/>` to read arbitrary files from the server. Version 8.0.0.3 patches the issue.

thehackerwire@mastodon.social at 2026-03-25T23:20:25.000Z ##

🟠 CVE-2026-33913 - High (7.7)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated user with access to the Carecoordination module can upload a crafted CCDA document containing `` to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:20:25.000Z ##

🟠 CVE-2026-33913 - High (7.7)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated user with access to the Carecoordination module can upload a crafted CCDA document containing `` to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33017
(9.8 CRITICAL)

EPSS: 0.59%

updated 2026-03-25T23:17:09.670000

2 posts

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored f

3 repos

https://github.com/MaxMnMl/langflow-CVE-2026-33017-poc

https://github.com/omer-efe-curkus/CVE-2026-33017-Langflow-RCE-PoC

https://github.com/SimoesCTT/Sovereign-Echo-33017

CVE-2025-33247
(7.8 HIGH)

EPSS: 0.28%

updated 2026-03-25T21:58:57.220000

1 posts

NVIDIA Megatron LM contains a vulnerability in quantization configuration loading, which could allow remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-03-24T22:06:23.000Z ##

🟠 CVE-2025-33247 - High (7.8)

NVIDIA Megatron LM contains a vulnerability in quantization configuration loading, which could allow remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24150
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-25T21:58:12.560000

1 posts

NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-03-24T22:00:15.000Z ##

🟠 CVE-2026-24150 - High (7.8)

NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of priv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33286
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-25T21:33:33

2 posts

### Summary An arbitrary method execution vulnerability has been found which affects Graphiti's JSONAPI write functionality. An attacker can craft a malicious JSONAPI payload with arbitrary relationship names to invoke any public method on the underlying model instance, class or its associations. ### Impact Any application exposing Graphiti write endpoints (create/update/delete) to untrusted us

offseq@infosec.exchange at 2026-03-24T03:00:31.000Z ##

🚨 CRITICAL: CVE-2026-33286 in Graphiti (<1.10.2) lets unauthenticated attackers invoke arbitrary public methods via JSONAPI write requests. Patch to v1.10.2, restrict access, and validate inputs! radar.offseq.com/threat/cve-20 #OffSeq #CVE202633286 #Ruby #APIsecurity

##

thehackerwire@mastodon.social at 2026-03-24T00:23:11.000Z ##

🔴 CVE-2026-33286 - Critical (9.1)

Graphiti is a framework that sits on top of models and exposes them via a JSON:API-compliant interface. Versions prior to 1.10.2 have an arbitrary method execution vulnerability that affects Graphiti's JSONAPI write functionality. An attacker can ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33282
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-25T21:32:53

1 posts

## Summary Ella Core panics when processing a malformed NGAP LocationReport message with `ue-presence-in-area-of-interest` event type and omitting the optional `UEPresenceInAreaOfInterestList` IE. ## Impact An attacker able to send crafted NGAP messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No authentication is required. ## Fix Added IE p

thehackerwire@mastodon.social at 2026-03-24T00:19:18.000Z ##

🟠 CVE-2026-33282 - High (7.5)

Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 panic when processing a malformed NGAP LocationReport message with `ue-presence-in-area-of-interest` event type and omitting the optional `UEPresenceInAreaOfInterestLis...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32536
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-03-25T21:31:40

2 posts

Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green Downloads halfdata-paypal-green-downloads allows Using Malicious Files.This issue affects Green Downloads: from n/a through <= 2.08.

thehackerwire@mastodon.social at 2026-03-25T21:43:40.000Z ##

🔴 CVE-2026-32536 - Critical (9.9)

Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green Downloads halfdata-paypal-green-downloads allows Using Malicious Files.This issue affects Green Downloads: from n/a through &lt;= 2.08.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:43:40.000Z ##

🔴 CVE-2026-32536 - Critical (9.9)

Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green Downloads halfdata-paypal-green-downloads allows Using Malicious Files.This issue affects Green Downloads: from n/a through &lt;= 2.08.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32537
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-25T21:31:39

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nK Visual Portfolio, Photo Gallery & Post Grid visual-portfolio allows PHP Local File Inclusion.This issue affects Visual Portfolio, Photo Gallery & Post Grid: from n/a through <= 3.5.1.

thehackerwire@mastodon.social at 2026-03-25T21:43:49.000Z ##

🟠 CVE-2026-32537 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nK Visual Portfolio, Photo Gallery & Post Grid visual-portfolio allows PHP Local File Inclusion.This issue affects Visual Port...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:43:49.000Z ##

🟠 CVE-2026-32537 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nK Visual Portfolio, Photo Gallery & Post Grid visual-portfolio allows PHP Local File Inclusion.This issue affects Visual Port...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25001
(8.6 HIGH)

EPSS: 0.00%

updated 2026-03-25T21:31:38

2 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in Saad Iqbal Post Snippets post-snippets allows Remote Code Inclusion.This issue affects Post Snippets: from n/a through <= 4.0.12.

thehackerwire@mastodon.social at 2026-03-25T21:00:28.000Z ##

🟠 CVE-2026-25001 - High (8.5)

Improper Control of Generation of Code ('Code Injection') vulnerability in Saad Iqbal Post Snippets post-snippets allows Remote Code Inclusion.This issue affects Post Snippets: from n/a through &lt;= 4.0.12.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:00:28.000Z ##

🟠 CVE-2026-25001 - High (8.5)

Improper Control of Generation of Code ('Code Injection') vulnerability in Saad Iqbal Post Snippets post-snippets allows Remote Code Inclusion.This issue affects Post Snippets: from n/a through &lt;= 4.0.12.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32534
(8.5 HIGH)

EPSS: 0.00%

updated 2026-03-25T21:30:36

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk js-support-ticket allows Blind SQL Injection.This issue affects JS Help Desk: from n/a through <= 3.0.3.

thehackerwire@mastodon.social at 2026-03-25T21:43:30.000Z ##

🟠 CVE-2026-32534 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk js-support-ticket allows Blind SQL Injection.This issue affects JS Help Desk: from n/a through &lt;= 3.0.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:43:30.000Z ##

🟠 CVE-2026-32534 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk js-support-ticket allows Blind SQL Injection.This issue affects JS Help Desk: from n/a through &lt;= 3.0.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32539
(9.3 CRITICAL)

EPSS: 0.00%

updated 2026-03-25T21:30:36

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PublishPress PublishPress Revisions revisionary allows Blind SQL Injection.This issue affects PublishPress Revisions: from n/a through <= 3.7.23.

thehackerwire@mastodon.social at 2026-03-25T20:42:49.000Z ##

🔴 CVE-2026-32539 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PublishPress PublishPress Revisions revisionary allows Blind SQL Injection.This issue affects PublishPress Revisions: from n/a through &lt;= 3.7.23.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:42:49.000Z ##

🔴 CVE-2026-32539 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PublishPress PublishPress Revisions revisionary allows Blind SQL Injection.This issue affects PublishPress Revisions: from n/a through &lt;= 3.7.23.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32573
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-03-25T21:30:36

2 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Code Injection.This issue affects Nelio AB Testing: from n/a through <= 8.2.7.

thehackerwire@mastodon.social at 2026-03-25T20:42:40.000Z ##

🔴 CVE-2026-32573 - Critical (9.1)

Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Code Injection.This issue affects Nelio AB Testing: from n/a through &lt;= 8.2.7.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:42:40.000Z ##

🔴 CVE-2026-32573 - Critical (9.1)

Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Code Injection.This issue affects Nelio AB Testing: from n/a through &lt;= 8.2.7.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32513
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-25T21:30:35

2 posts

Deserialization of Untrusted Data vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows Object Injection.This issue affects JS Archive List: from n/a through <= 6.1.7.

thehackerwire@mastodon.social at 2026-03-25T21:44:41.000Z ##

🟠 CVE-2026-32513 - High (8.8)

Deserialization of Untrusted Data vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows Object Injection.This issue affects JS Archive List: from n/a through &lt;= 6.1.7.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:44:41.000Z ##

🟠 CVE-2026-32513 - High (8.8)

Deserialization of Untrusted Data vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows Object Injection.This issue affects JS Archive List: from n/a through &lt;= 6.1.7.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27044
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-03-25T21:30:35

4 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in TotalSuite Total Poll Lite totalpoll-lite allows Remote Code Inclusion.This issue affects Total Poll Lite: from n/a through <= 4.12.0.

thehackerwire@mastodon.social at 2026-03-25T21:02:33.000Z ##

🔴 CVE-2026-27044 - Critical (9.9)

Improper Control of Generation of Code ('Code Injection') vulnerability in TotalSuite Total Poll Lite totalpoll-lite allows Remote Code Inclusion.This issue affects Total Poll Lite: from n/a through &lt;= 4.12.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:00:06.000Z ##

🔴 CVE-2026-27044 - Critical (9.9)

Improper Control of Generation of Code ('Code Injection') vulnerability in TotalSuite Total Poll Lite totalpoll-lite allows Remote Code Inclusion.This issue affects Total Poll Lite: from n/a through &lt;= 4.12.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:02:33.000Z ##

🔴 CVE-2026-27044 - Critical (9.9)

Improper Control of Generation of Code ('Code Injection') vulnerability in TotalSuite Total Poll Lite totalpoll-lite allows Remote Code Inclusion.This issue affects Total Poll Lite: from n/a through &lt;= 4.12.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:00:06.000Z ##

🔴 CVE-2026-27044 - Critical (9.9)

Improper Control of Generation of Code ('Code Injection') vulnerability in TotalSuite Total Poll Lite totalpoll-lite allows Remote Code Inclusion.This issue affects Total Poll Lite: from n/a through &lt;= 4.12.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25366
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-03-25T21:30:35

2 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in Themeisle Woody ad snippets insert-php allows Code Injection.This issue affects Woody ad snippets: from n/a through <= 2.7.1.

thehackerwire@mastodon.social at 2026-03-25T21:00:18.000Z ##

🔴 CVE-2026-25366 - Critical (9.9)

Improper Control of Generation of Code ('Code Injection') vulnerability in Themeisle Woody ad snippets insert-php allows Code Injection.This issue affects Woody ad snippets: from n/a through &lt;= 2.7.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:00:18.000Z ##

🔴 CVE-2026-25366 - Critical (9.9)

Improper Control of Generation of Code ('Code Injection') vulnerability in Themeisle Woody ad snippets insert-php allows Code Injection.This issue affects Woody ad snippets: from n/a through &lt;= 2.7.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4719
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-25T21:30:28

1 posts

Incorrect boundary conditions in the Graphics: Text component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T23:00:10.000Z ##

🟠 CVE-2026-4719 - High (7.5)

Incorrect boundary conditions in the Graphics: Text component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4704
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-25T21:30:27

1 posts

Denial-of-service in the WebRTC: Signaling component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T23:02:43.000Z ##

🟠 CVE-2026-4704 - High (7.5)

Denial-of-service in the WebRTC: Signaling component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33680
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-25T21:18:09

1 posts

## Summary The `LinkSharing.ReadAll()` method allows link share authenticated users to list all link shares for a project, including their secret hashes. While `LinkSharing.CanRead()` correctly blocks link share users from reading individual shares via `ReadOne`, the `ReadAllWeb` handler bypasses this check by never calling `CanRead()`. An attacker with a read-only link share can retrieve hashes

thehackerwire@mastodon.social at 2026-03-24T20:13:32.000Z ##

🟠 CVE-2026-33680 - High (7.5)

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.2, the `LinkSharing.ReadAll()` method allows link share authenticated users to list all link shares for a project, including their secret hashes. While `LinkShari...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33678
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-25T21:17:43

2 posts

## Summary `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id = ?`), ignoring the task ID from the URL path. The permission check in `CanRead()` validates access to the task specified in the URL, but `ReadOne()` loads a different attachment that may belong to a task in another project. This allows any authenticated user to download or delete any attachment in the system by provi

ivycyber@privacysafe.social at 2026-03-24T20:45:55.000Z ##

🛡️ #Cybersecurity news & tips across the #fediverse

“🟠 CVE-2026-33678 - High (8.1) Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id = ?`), ignoring the task ID fro...”

mastodon.social/@thehackerwire

🤖 via RSS feed. Not an endorsement.

##

thehackerwire@mastodon.social at 2026-03-24T20:12:57.000Z ##

🟠 CVE-2026-33678 - High (8.1)

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id = ?`), ignoring the task ID from the URL path. The permission check in `CanRead()` validat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32538
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-25T21:16:46.347000

2 posts

Insertion of Sensitive Information Into Sent Data vulnerability in Noor Alam SMTP Mailer smtp-mailer allows Retrieve Embedded Sensitive Data.This issue affects SMTP Mailer: from n/a through <= 1.1.24.

thehackerwire@mastodon.social at 2026-03-25T21:44:23.000Z ##

🟠 CVE-2026-32538 - High (7.5)

Insertion of Sensitive Information Into Sent Data vulnerability in Noor Alam SMTP Mailer smtp-mailer allows Retrieve Embedded Sensitive Data.This issue affects SMTP Mailer: from n/a through &lt;= 1.1.24.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:44:23.000Z ##

🟠 CVE-2026-32538 - High (7.5)

Insertion of Sensitive Information Into Sent Data vulnerability in Noor Alam SMTP Mailer smtp-mailer allows Retrieve Embedded Sensitive Data.This issue affects SMTP Mailer: from n/a through &lt;= 1.1.24.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32531
(8.1 HIGH)

EPSS: 0.00%

updated 2026-03-25T21:16:44.300000

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in gavias Kunco kunco allows PHP Local File Inclusion.This issue affects Kunco: from n/a through < 1.4.5.

thehackerwire@mastodon.social at 2026-03-25T21:44:32.000Z ##

🟠 CVE-2026-32531 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in gavias Kunco kunco allows PHP Local File Inclusion.This issue affects Kunco: from n/a through &lt; 1.4.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:44:32.000Z ##

🟠 CVE-2026-32531 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in gavias Kunco kunco allows PHP Local File Inclusion.This issue affects Kunco: from n/a through &lt; 1.4.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30976
(8.6 HIGH)

EPSS: 0.00%

updated 2026-03-25T21:16:41.623000

2 posts

Sonarr is a PVR for Usenet and BitTorrent users. In versions on the 4.x branch prior to 4.0.17.2950, an unauthenticated remote attacker can potentially read any file readable by the Sonarr process. These include application configuration files (containing API keys and database credentials), Windows system files, and any user-accessible files on the same drive This issue only impacts Windows system

thehackerwire@mastodon.social at 2026-03-25T21:40:45.000Z ##

🟠 CVE-2026-30976 - High (8.6)

Sonarr is a PVR for Usenet and BitTorrent users. In versions on the 4.x branch prior to 4.0.17.2950, an unauthenticated remote attacker can potentially read any file readable by the Sonarr process. These include application configuration files (co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:40:45.000Z ##

🟠 CVE-2026-30976 - High (8.6)

Sonarr is a PVR for Usenet and BitTorrent users. In versions on the 4.x branch prior to 4.0.17.2950, an unauthenticated remote attacker can potentially read any file readable by the Sonarr process. These include application configuration files (co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33497(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-03-25T20:54:06

1 posts

### Summary In the download_profile_picture function of the /profile_pictures/{folder_name}/{file_name} endpoint, the folder_name and file_name parameters are not strictly filtered, which allows the secret_key to be read across directories. ### Details src/backend/base/langflow/api/v1/files.py ![image](https://github.com/user-attachments/assets/19bc387c-93d8-475b-bab0-2675669c1c36) storage loca

thehackerwire@mastodon.social at 2026-03-24T21:00:15.000Z ##

🟠 CVE-2026-33497 - High (7.5)

Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.1, in the download_profile_picture function of the /profile_pictures/{folder_name}/{file_name} endpoint, the folder_name and file_name parameters a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33418
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-25T20:53:42

1 posts

## Summary The `ensureSize()` function in `@dicebear/converter` used a regex-based approach to rewrite SVG `width`/`height` attributes, capping them at 2048px to prevent denial of service. This size capping could be bypassed by crafting SVG input that causes the regex to match a non-functional occurrence of `<svg` before the actual SVG root element. When the SVG is subsequently rendered via `@res

thehackerwire@mastodon.social at 2026-03-24T20:15:52.000Z ##

🟠 CVE-2026-33418 - High (7.5)

DiceBear is an avatar library for designers and developers. Prior to version 9.4.2, the `ensureSize()` function in `@dicebear/converter` used a regex-based approach to rewrite SVG `width`/`height` attributes, capping them at 2048px to prevent deni...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33316
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-25T20:53:33

2 posts

### Summary A flaw in Vikunja’s password reset logic allows disabled users to regain access to their accounts. The `ResetPassword()` function sets the user’s status to `StatusActive` after a successful password reset without verifying whether the account was previously disabled. By requesting a reset token through `/api/v1/user/password/token` and completing the reset via `/api/v1/user/password/r

thehackerwire@mastodon.social at 2026-03-24T20:29:39.000Z ##

🟠 CVE-2026-33316 - High (8.1)

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, a flaw in Vikunja’s password reset logic allows disabled users to regain access to their accounts. The `ResetPassword()` function sets the user’s status to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T20:15:23.000Z ##

🟠 CVE-2026-33316 - High (8.1)

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, a flaw in Vikunja’s password reset logic allows disabled users to regain access to their accounts. The `ResetPassword()` function sets the user’s status to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29839
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-25T20:53:05.983000

1 posts

DedeCMS v5.7.118 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability in /sys_task_add.php.

thehackerwire@mastodon.social at 2026-03-24T20:13:42.000Z ##

🟠 CVE-2026-29839 - High (8.8)

DedeCMS v5.7.118 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability in /sys_task_add.php.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33310
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-25T20:52:31

1 posts

### Summary The shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contains a parameter default such as shell(<command>), the command may be executed when the catalog source is accessed. This means that if a user loads a malicious catalog YAML, embedded commands could execute on the host system. This behavior could p

thehackerwire@mastodon.social at 2026-03-24T20:15:43.000Z ##

🟠 CVE-2026-33310 - High (8.8)

Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contai...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33242
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-25T20:48:35

1 posts

### Details A Path Traversal and Access Control Bypass vulnerability was discovered in the salvo-proxy component of the Salvo Rust framework (v0.89.2). The vulnerability allows an unauthenticated external attacker to bypass proxy routing constraints and access unintended backend paths (e.g., protected endpoints or administrative dashboards). This issue stems from the encode_url_path function, whi

thehackerwire@mastodon.social at 2026-03-24T00:39:10.000Z ##

🟠 CVE-2026-33242 - High (7.5)

Salvo is a Rust web framework. Versions 0.39.0 through 0.89.2 have a Path Traversal and Access Control Bypass vulnerability in the salvo-proxy component. The vulnerability allows an unauthenticated external attacker to bypass proxy routing constra...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32300
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-25T20:46:17

1 posts

# Security Advisory — My Page Profile Update (Improper Authorization) ## Summary An improper authorization issue in the My Page profile update feature may allow modification of arbitrary user information. ## Affected Versions - 1.x series: <= 1.41.0 - 2.x series: <= 2.41.0 ## Patched Versions - 1.41.1 - 2.41.1 ## Description In part of the My Page profile update feature, another user's pro

thehackerwire@mastodon.social at 2026-03-23T22:30:57.000Z ##

🟠 CVE-2026-32300 - High (8.1)

Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, an improper authorization issue in the My Page profile update feature may allow modific...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32299
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-25T20:46:07

1 posts

# Security Advisory — Page Content Retrieval (Improper Authorization) ## Summary An improper authorization issue in the page content retrieval feature may allow retrieval of non-public information. ## Affected Versions - 1.x series: <= 1.41.0 - 2.x series: <= 2.41.0 ## Patched Versions - 1.41.1 - 2.41.1 ## Description In part of the page content retrieval feature, insufficient authorizatio

thehackerwire@mastodon.social at 2026-03-23T22:30:48.000Z ##

🟠 CVE-2026-32299 - High (7.5)

Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, an improper authorization issue in the page content retrieval feature may allow retriev...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32278
(8.2 HIGH)

EPSS: 0.04%

updated 2026-03-25T20:45:22

2 posts

# Security Advisory — Form Plugin (Stored XSS) ## Summary A Stored Cross-site Scripting (XSS) issue exists in the file field of the Form Plugin. ## Affected Versions - 1.x series: <= 1.41.0 - 2.x series: <= 2.41.0 ## Patched Versions - 1.41.1 - 2.41.1 ## Description In the file field of the Form Plugin, Stored Cross-site Scripting (XSS) could occur. If exploited, arbitrary script could run

thehackerwire@mastodon.social at 2026-03-23T22:41:12.000Z ##

🟠 CVE-2026-32278 - High (8.2)

Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, a Stored Cross-site Scripting (XSS) issue exists in the file field of the Form Plugin. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T22:30:41.000Z ##

🟠 CVE-2026-32278 - High (8.2)

Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, a Stored Cross-site Scripting (XSS) issue exists in the file field of the Form Plugin. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32277
(8.7 HIGH)

EPSS: 0.03%

updated 2026-03-25T20:45:12

2 posts

# Security Advisory — Cabinet Plugin (DOM-based XSS) ## Summary A DOM-based Cross-Site Scripting (XSS) issue exists in the Cabinet Plugin list view. ## Affected Versions - 1.x series: >= 1.35.0, <= 1.41.0 - 2.x series: >= 2.35.0, <= 2.41.0 ## Patched Versions - 1.41.1 - 2.41.1 ## Description In the Cabinet Plugin list view, DOM-based Cross-Site Scripting (XSS) could occur due to how saved

thehackerwire@mastodon.social at 2026-03-23T22:41:02.000Z ##

🟠 CVE-2026-32277 - High (8.7)

Connect-CMS is a content management system. In versions 1.35.0 through 1.41.0 and 2.35.0 through 2.41.0, a DOM-based Cross-Site Scripting (XSS) issue exists in the Cabinet Plugin list view. Versions 1.41.1 and 2.41.1 contain a patch.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T22:30:31.000Z ##

🟠 CVE-2026-32277 - High (8.7)

Connect-CMS is a content management system. In versions 1.35.0 through 1.41.0 and 2.35.0 through 2.41.0, a DOM-based Cross-Site Scripting (XSS) issue exists in the Cabinet Plugin list view. Versions 1.41.1 and 2.41.1 contain a patch.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4715
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-03-25T20:16:36.837000

1 posts

Uninitialized memory in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

thehackerwire@mastodon.social at 2026-03-24T22:52:58.000Z ##

🔴 CVE-2026-4715 - Critical (9.1)

Uninitialized memory in the Graphics: Canvas2D component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4705
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-03-25T20:16:36.273000

1 posts

Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

thehackerwire@mastodon.social at 2026-03-24T23:15:09.000Z ##

🔴 CVE-2026-4705 - Critical (9.8)

Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33218
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-25T20:16:32.623000

4 posts

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, a client which can connect to the leafnode port can crash the nats-server with a certain malformed message pre-authentication. Versions 2.11.15 and 2.12.6 contain a fix. As a workaround, disable leafnode support if not needed or restrict network connections to the l

thehackerwire@mastodon.social at 2026-03-25T20:21:31.000Z ##

🟠 CVE-2026-33218 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, a client which can connect to the leafnode port can crash the nats-server with a certain malformed message pre-au...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:20:45.000Z ##

🟠 CVE-2026-33218 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, a client which can connect to the leafnode port can crash the nats-server with a certain malformed message pre-au...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:21:31.000Z ##

🟠 CVE-2026-33218 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, a client which can connect to the leafnode port can crash the nats-server with a certain malformed message pre-au...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:20:45.000Z ##

🟠 CVE-2026-33218 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, a client which can connect to the leafnode port can crash the nats-server with a certain malformed message pre-au...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32546
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-25T20:16:31.527000

4 posts

Missing Authorization vulnerability in StellarWP Restrict Content restrict-content allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Content: from n/a through <= 3.2.22.

thehackerwire@mastodon.social at 2026-03-25T20:44:00.000Z ##

🟠 CVE-2026-32546 - High (7.5)

Missing Authorization vulnerability in StellarWP Restrict Content restrict-content allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Content: from n/a through &lt;= 3.2.22.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:42:31.000Z ##

🟠 CVE-2026-32546 - High (7.5)

Missing Authorization vulnerability in StellarWP Restrict Content restrict-content allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Content: from n/a through &lt;= 3.2.22.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:44:00.000Z ##

🟠 CVE-2026-32546 - High (7.5)

Missing Authorization vulnerability in StellarWP Restrict Content restrict-content allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Content: from n/a through &lt;= 3.2.22.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:42:31.000Z ##

🟠 CVE-2026-32546 - High (7.5)

Missing Authorization vulnerability in StellarWP Restrict Content restrict-content allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Content: from n/a through &lt;= 3.2.22.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32525
(9.9 CRITICAL)

EPSS: 0.00%

updated 2026-03-25T20:16:30.967000

2 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in jetmonsters JetFormBuilder jetformbuilder allows Code Injection.This issue affects JetFormBuilder: from n/a through <= 3.5.6.1.

thehackerwire@mastodon.social at 2026-03-25T20:42:58.000Z ##

🔴 CVE-2026-32525 - Critical (9.9)

Improper Control of Generation of Code ('Code Injection') vulnerability in jetmonsters JetFormBuilder jetformbuilder allows Code Injection.This issue affects JetFormBuilder: from n/a through &lt;= 3.5.6.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:42:58.000Z ##

🔴 CVE-2026-32525 - Critical (9.9)

Improper Control of Generation of Code ('Code Injection') vulnerability in jetmonsters JetFormBuilder jetformbuilder allows Code Injection.This issue affects JetFormBuilder: from n/a through &lt;= 3.5.6.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25447
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-03-25T20:16:26.740000

4 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in Jonathan Daggerhart Widget Wrangler widget-wrangler allows Code Injection.This issue affects Widget Wrangler: from n/a through <= 2.3.9.

thehackerwire@mastodon.social at 2026-03-25T21:02:44.000Z ##

🔴 CVE-2026-25447 - Critical (9.1)

Improper Control of Generation of Code ('Code Injection') vulnerability in Jonathan Daggerhart Widget Wrangler widget-wrangler allows Code Injection.This issue affects Widget Wrangler: from n/a through &lt;= 2.3.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:00:16.000Z ##

🔴 CVE-2026-25447 - Critical (9.1)

Improper Control of Generation of Code ('Code Injection') vulnerability in Jonathan Daggerhart Widget Wrangler widget-wrangler allows Code Injection.This issue affects Widget Wrangler: from n/a through &lt;= 2.3.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:02:44.000Z ##

🔴 CVE-2026-25447 - Critical (9.1)

Improper Control of Generation of Code ('Code Injection') vulnerability in Jonathan Daggerhart Widget Wrangler widget-wrangler allows Code Injection.This issue affects Widget Wrangler: from n/a through &lt;= 2.3.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:00:16.000Z ##

🔴 CVE-2026-25447 - Critical (9.1)

Improper Control of Generation of Code ('Code Injection') vulnerability in Jonathan Daggerhart Widget Wrangler widget-wrangler allows Code Injection.This issue affects Widget Wrangler: from n/a through &lt;= 2.3.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20687
(7.1 HIGH)

EPSS: 0.02%

updated 2026-03-25T20:07:15.087000

1 posts

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, tvOS 26.4, watchOS 26.4. An app may be able to cause unexpected system termination or write kernel memory.

1 repos

https://github.com/zeroxjf/CVE-2026-20687-AppleSEPKeyStore-UAF

offseq@infosec.exchange at 2026-03-25T03:00:30.000Z ##

CVE-2026-20687 (CRITICAL): Use-after-free in Apple iOS/iPadOS/macOS/tvOS/watchOS lets malicious apps crash devices or write kernel memory. Patch to iOS/iPadOS 18.7.7/26.4, macOS Sequoia 15.7.5, Tahoe 26.4+ ASAP. radar.offseq.com/threat/cve-20 #OffSeq #AppleSecurity #InfoSec

##

CVE-2026-4712
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-25T19:16:52.517000

1 posts

Information disclosure in the Widget: Cocoa component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

thehackerwire@mastodon.social at 2026-03-24T22:19:54.000Z ##

🟠 CVE-2026-4712 - High (7.5)

Information disclosure in the Widget: Cocoa component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3988
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-25T18:32:08

6 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance unresponsive due to improper input validation in GraphQL request processing.

thehackerwire@mastodon.social at 2026-03-25T20:43:51.000Z ##

🟠 CVE-2026-3988 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:42:22.000Z ##

🟠 CVE-2026-3988 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:21:17.000Z ##

🟠 CVE-2026-3988 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:43:51.000Z ##

🟠 CVE-2026-3988 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:42:22.000Z ##

🟠 CVE-2026-3988 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:21:17.000Z ##

🟠 CVE-2026-3988 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3857
(8.1 HIGH)

EPSS: 0.00%

updated 2026-03-25T18:32:07

6 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authenticated users due to insufficient CSRF protection.

thehackerwire@mastodon.social at 2026-03-25T20:43:42.000Z ##

🟠 CVE-2026-3857 - High (8.1)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:42:13.000Z ##

🟠 CVE-2026-3857 - High (8.1)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:21:07.000Z ##

🟠 CVE-2026-3857 - High (8.1)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:43:42.000Z ##

🟠 CVE-2026-3857 - High (8.1)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:42:13.000Z ##

🟠 CVE-2026-3857 - High (8.1)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:21:07.000Z ##

🟠 CVE-2026-3857 - High (8.1)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20012
(8.6 HIGH)

EPSS: 0.00%

updated 2026-03-25T18:31:51

2 posts

A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco IOS Software, Cisco IOS XE Software, Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition on an affected device. This vulnerab

thehackerwire@mastodon.social at 2026-03-25T23:00:33.000Z ##

🟠 CVE-2026-20012 - High (8.6)

A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco IOS Software, Cisco IOS XE Software, Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, and Cisco Secure Firewall Threat Defense (FTD) Software could al...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:00:33.000Z ##

🟠 CVE-2026-20012 - High (8.6)

A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco IOS Software, Cisco IOS XE Software, Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, and Cisco Secure Firewall Threat Defense (FTD) Software could al...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20125
(7.7 HIGH)

EPSS: 0.00%

updated 2026-03-25T18:31:51

2 posts

A vulnerability in the HTTP Server feature of Cisco IOS Software and Cisco IOS XE Software Release 3E could allow an authenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malformed HTTP requ

thehackerwire@mastodon.social at 2026-03-25T22:00:32.000Z ##

🟠 CVE-2026-20125 - High (7.7)

A vulnerability in the HTTP Server feature of Cisco IOS Software and Cisco IOS XE Software Release 3E could allow an authenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) conditio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T22:00:32.000Z ##

🟠 CVE-2026-20125 - High (7.7)

A vulnerability in the HTTP Server feature of Cisco IOS Software and Cisco IOS XE Software Release 3E could allow an authenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) conditio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26832
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-25T18:31:51

2 posts

node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tesseract OCR. In all versions through 2.2.1, the recognize() function in src/index.js is vulnerable to OS Command Injection. The file path parameter is concatenated into a shell command string and passed to child_process.exec() without proper sanitization

1 repos

https://github.com/zebbernCVE/CVE-2026-26832

thehackerwire@mastodon.social at 2026-03-25T21:00:38.000Z ##

🔴 CVE-2026-26832 - Critical (9.8)

node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tesseract OCR. In all versions through 2.2.1, the recognize() function in src/index.js is vulnerable to OS Command Injection. The file path parameter is concatenated into a s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:00:38.000Z ##

🔴 CVE-2026-26832 - Critical (9.8)

node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tesseract OCR. In all versions through 2.2.1, the recognize() function in src/index.js is vulnerable to OS Command Injection. The file path parameter is concatenated into a s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-32991
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-03-25T18:31:46

2 posts

In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful API results in remote code execution.

thehackerwire@mastodon.social at 2026-03-26T00:00:25.000Z ##

🔴 CVE-2025-32991 - Critical (9)

In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful API results in remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T00:00:25.000Z ##

🔴 CVE-2025-32991 - Critical (9)

In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful API results in remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3608
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-25T18:31:43

1 posts

Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, or kea-dhcp6 daemons over any configured API socket or HA listener can cause the receiving daemon to exit with a stack overflow error. This issue affects Kea versions 2.6.0 through 2.6.4 and 3.0.0 through 3.0.2.

offseq@infosec.exchange at 2026-03-25T10:30:31.000Z ##

🚨 CVE-2026-3608: HIGH-severity vuln in ISC Kea DHCP (2.6.0 – 2.6.4, 3.0.0 – 3.0.2). Remote attackers can crash daemons, causing DoS. Restrict API/HA access, monitor traffic, and prep failover. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE #DHCP #Infosec

##

CVE-2026-33660
(0 None)

EPSS: 0.00%

updated 2026-03-25T18:16:32.080000

2 posts

n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.26, an authenticated user with permission to create or modify workflows could use the Merge node's "Combine by SQL" mode to read local files on the n8n host and achieve remote code execution. The AlaSQL sandbox did not sufficiently restrict certain SQL statements, allowing an attacker to access sensitiv

offseq at 2026-03-26T03:00:33.476Z ##

⚠️ CRITICAL RCE in n8n (CVE-2026-33660): Auth'd users can exploit Merge node SQL to read files & execute code on n8n host. Patch to 2.14.1/2.13.3/1.123.26 ASAP. Limit permissions if you can't patch yet. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-26T03:00:33.000Z ##

⚠️ CRITICAL RCE in n8n (CVE-2026-33660): Auth'd users can exploit Merge node SQL to read files & execute code on n8n host. Patch to 2.14.1/2.13.3/1.123.26 ASAP. Limit permissions if you can't patch yet. radar.offseq.com/threat/cve-20 #OffSeq #n8n #infosec #CVE202633660

##

CVE-2026-2995
(7.7 HIGH)

EPSS: 0.00%

updated 2026-03-25T17:16:58.347000

4 posts

GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper sanitization of HTML content.

thehackerwire@mastodon.social at 2026-03-25T21:02:24.000Z ##

🟠 CVE-2026-2995 - High (7.7)

GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:59:57.000Z ##

🟠 CVE-2026-2995 - High (7.7)

GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:02:24.000Z ##

🟠 CVE-2026-2995 - High (7.7)

GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:59:57.000Z ##

🟠 CVE-2026-2995 - High (7.7)

GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27889
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-25T17:07:53

2 posts

### Background NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. When using WebSockets, a malicious client can trigger a server crash with crafted frames, before authentication. ### Problem Description A missing sanity check on a WebSockets frame could trigger a server panic in the nats-server. Th

thehackerwire@mastodon.social at 2026-03-25T20:20:56.000Z ##

🟠 CVE-2026-27889 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Starting in version 2.2.0 and prior to versions 2.11.14 and 2.12.5, a missing sanity check on a WebSockets frame could trigger a server panic in the na...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:20:56.000Z ##

🟠 CVE-2026-27889 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Starting in version 2.2.0 and prior to versions 2.11.14 and 2.12.5, a missing sanity check on a WebSockets frame could trigger a server panic in the na...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20086
(8.6 HIGH)

EPSS: 0.00%

updated 2026-03-25T16:16:13.920000

2 posts

A vulnerability in the processing of Control and Provisioning of Wireless Access Points (CAPWAP) packets of Cisco IOS XE Wireless Controller Software for the Catalyst CW9800 Family could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of a malformed CAPWAP packet. An attacker could explo

thehackerwire@mastodon.social at 2026-03-25T23:00:24.000Z ##

🟠 CVE-2026-20086 - High (8.6)

A vulnerability in the processing of Control and Provisioning of Wireless Access Points (CAPWAP) packets of Cisco IOS XE Wireless Controller Software for the Catalyst CW9800 Family could allow an unauthenticated, remote attacker to cause a denial ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:00:24.000Z ##

🟠 CVE-2026-20086 - High (8.6)

A vulnerability in the processing of Control and Provisioning of Wireless Access Points (CAPWAP) packets of Cisco IOS XE Wireless Controller Software for the Catalyst CW9800 Family could allow an unauthenticated, remote attacker to cause a denial ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20084
(8.6 HIGH)

EPSS: 0.00%

updated 2026-03-25T16:16:13.563000

2 posts

A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause BOOTP packets to be forwarded between VLANs, resulting in a denial of service (DoS) condition. This vulnerability is due to improper handling of BOOTP packets on Cisco Catalyst 9000 Series Switches. An attacker could exploit this vulnerability by sending BOOTP request

thehackerwire@mastodon.social at 2026-03-25T22:00:41.000Z ##

🟠 CVE-2026-20084 - High (8.6)

A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause BOOTP packets to be forwarded between VLANs, resulting in a denial of service (DoS) condition.

This vulnerability is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T22:00:41.000Z ##

🟠 CVE-2026-20084 - High (8.6)

A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause BOOTP packets to be forwarded between VLANs, resulting in a denial of service (DoS) condition.

This vulnerability is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24157
(7.8 HIGH)

EPSS: 0.12%

updated 2026-03-25T15:41:58.280000

1 posts

NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and data tampering.

thehackerwire@mastodon.social at 2026-03-24T22:01:47.000Z ##

🟠 CVE-2026-24157 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22559
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-25T15:41:58.280000

1 posts

An Improper Input Validation vulnerability in UniFi Network Server may allow unauthorized access to an account if the account owner is socially engineered into clicking a malicious link. Affected Products: UniFi Network Server (Version 10.1.85 and earlier) Mitigation: Update UniFi Network Server to Version 10.1.89 or later.

thehackerwire@mastodon.social at 2026-03-24T20:29:30.000Z ##

🟠 CVE-2026-22559 - High (8.8)

An Improper Input Validation vulnerability in UniFi Network Server may allow unauthorized access to an account if the account owner is socially engineered into clicking a malicious link.

Affected Products:
UniFi Network Server (Version 10.1....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33329
(8.1 HIGH)

EPSS: 0.05%

updated 2026-03-25T15:41:58.280000

1 posts

FileRise is a self-hosted web file manager / WebDAV server. From version 1.0.1 to before version 3.10.0, the resumableIdentifier parameter in the Resumable.js chunked upload handler (UploadModel::handleUpload()) is concatenated directly into filesystem paths without any sanitization. An authenticated user with upload permission can exploit this to write files to arbitrary directories on the server

thehackerwire@mastodon.social at 2026-03-24T20:26:29.000Z ##

🟠 CVE-2026-33329 - High (8.1)

FileRise is a self-hosted web file manager / WebDAV server. From version 1.0.1 to before version 3.10.0, the resumableIdentifier parameter in the Resumable.js chunked upload handler (UploadModel::handleUpload()) is concatenated directly into files...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2343
(5.3 MEDIUM)

EPSS: 0.02%

updated 2026-03-25T15:41:33.977000

1 posts

The PeproDev Ultimate Invoice WordPress plugin through 2.2.5 has a bulk download invoices action that generates ZIP archives containing exported invoice PDFs. The ZIP files are named predictably making it possible to brute force and retreive PII.

offseq@infosec.exchange at 2026-03-25T07:30:29.000Z ##

⚠️ HIGH: CVE-2026-2343 in PeproDev Ultimate Invoice ≤2.2.5 exposes PII via predictable ZIP archive names in bulk downloads. No auth needed — risk of mass data leaks! Disable feature, restrict access, monitor logs. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

CVE-2026-28864
(3.3 LOW)

EPSS: 0.02%

updated 2026-03-25T15:32:30

1 posts

This issue was addressed with improved permissions checking. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS 26.4, watchOS 26.4. A local attacker may gain access to user's Keychain items.

offseq@infosec.exchange at 2026-03-25T06:00:31.000Z ##

🔒 CVE-2026-28864 (HIGH): Local attackers can access Apple Keychain items on iOS, iPadOS, macOS, visionOS, watchOS. Patch to latest OS releases now to protect credentials. No known exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #Apple #Security #Keychain

##

CVE-2026-3104
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-25T15:31:37

2 posts

A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1. BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.

thehackerwire@mastodon.social at 2026-03-26T00:00:35.000Z ##

🟠 CVE-2026-3104 - High (7.5)

A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain.
This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1.
BIND 9 versions 9...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T00:00:35.000Z ##

🟠 CVE-2026-3104 - High (7.5)

A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain.
This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1.
BIND 9 versions 9...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26830
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-25T15:31:37

2 posts

pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shell command strings that are executed via child_process.exec()

2 repos

https://github.com/zebbernCVE/CVE-2026-26830

https://github.com/zebbernCVE/npm-cve-2026-26830-26833

thehackerwire@mastodon.social at 2026-03-25T23:00:41.000Z ##

🔴 CVE-2026-26830 - Critical (9.8)

pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shel...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:00:41.000Z ##

🔴 CVE-2026-26830 - Critical (9.8)

pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shel...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1519
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-25T15:31:36

2 posts

If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers may make recursive queries (see: https://kb.isc.org/docs/why-does-my-authoritative-server-make-recursive-queries). This issue affects BIND 9 versions 9.

thehackerwire@mastodon.social at 2026-03-26T00:01:34.000Z ##

🟠 CVE-2026-1519 - High (7.5)

If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T00:01:34.000Z ##

🟠 CVE-2026-1519 - High (7.5)

If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33634
(0 None)

EPSS: 0.04%

updated 2026-03-25T15:16:49.230000

1 posts

Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credential-stealing malware, and replace all 7 tags in `aquasecurity/setup-trivy` with malicious commits. This incident is a continuation of the supply chain attack that began in late February 20

1 repos

https://github.com/ugurrates/teampcp-supply-chain-attack

offseq@infosec.exchange at 2026-03-24T00:00:39.000Z ##

CVE-2026-33634: CRITICAL supply chain vuln in aquasecurity Trivy & GitHub Actions (<0.2.6) — credential-stealing malware deployed. Rotate all secrets, use safe versions, audit logs for 'tpcp-docs'. Full details: radar.offseq.com/threat/cve-20 #OffSeq #SupplyChain #CVE2026_33634

##

CVE-2026-26306
(7.8 HIGH)

EPSS: 0.02%

updated 2026-03-25T06:30:35

1 posts

The installer for OM Workspace (Windows Edition) Ver 2.4 and earlier insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to execute arbitrary code with the privileges of the user invoking the installer.

offseq@infosec.exchange at 2026-03-25T09:00:28.000Z ##

⚠️ CVE-2026-26306 (HIGH): OM Workspace (Windows ≤2.4) vulnerable to DLL hijacking. Local attackers can execute code via unsafe installer DLL loading. Patch urgently or restrict installs & use Safe DLL Search Mode. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Windows

##

CVE-2026-2072
(8.2 HIGH)

EPSS: 0.04%

updated 2026-03-25T03:31:40

1 posts

Cross-Site Scripting vulnerability in Hitachi Infrastructure Analytics Advisor (Analytics probe component), Hitachi Ops Center Analyzer.This issue affects Hitachi Infrastructure Analytics Advisor:; Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.5-00.

offseq@infosec.exchange at 2026-03-25T04:30:30.000Z ##

⚠️ HIGH-severity XSS (CVE-2026-2072, CVSS 8.2) in Hitachi Infrastructure Analytics Advisor & Ops Center Analyzer <11.0.5-00. Exploitable by low-privilege users. Patch when available, restrict access, enable WAF. radar.offseq.com/threat/cve-20 #OffSeq #XSS #Vuln #Hitachi

##

CVE-2026-28877(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-03-25T03:31:39

1 posts

An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, visionOS 26.4, watchOS 26.4. An app may be able to access sensitive user data.

rosyna@mastodon.social at 2026-03-25T02:11:10.000Z ##

I updated the “Device Name” section of my “How to Fingerprint iOS Users” article to note that iOS 26.4 fixes CVE-2026-28877, which leaked the device name without needing a proper entitlement.

paradisefacade.com/blog/2026/3

##

CVE-2026-3909
(8.8 HIGH)

EPSS: 4.79%

updated 2026-03-25T00:31:11

1 posts

Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

youranonnewsirc@nerdculture.de at 2026-03-24T00:27:11.000Z ##

Global cybersecurity alerts include active exploitation of Chrome Zero-Days (CVE-2026-3909/3910) and a Quest KACE SMA flaw for credential harvesting. Advanced threats like Android haptic keyloggers and deepfake identity fraud are emerging. Geopolitically, Persian Gulf tensions remain high, while the US announced a new cyber strategy to defend companies from foreign adversaries. In tech, NVIDIA Nemotron 3 Super is now on Amazon Bedrock.

#Cybersecurity #GeopoliticalNews #TechBrief

##

CVE-2026-33216
(8.6 HIGH)

EPSS: 0.00%

updated 2026-03-24T21:42:11

4 posts

### Background NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The nats-server provides an MQTT client interface. ### Problem Description For MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating identity statement (JWT) and exposed via monit

thehackerwire@mastodon.social at 2026-03-25T20:21:22.000Z ##

🟠 CVE-2026-33216 - High (8.6)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, for MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:20:35.000Z ##

🟠 CVE-2026-33216 - High (8.6)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, for MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:21:22.000Z ##

🟠 CVE-2026-33216 - High (8.6)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, for MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:20:35.000Z ##

🟠 CVE-2026-33216 - High (8.6)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, for MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4725
(10.0 CRITICAL)

EPSS: 0.02%

updated 2026-03-24T21:32:29

1 posts

Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149.

thehackerwire@mastodon.social at 2026-03-24T21:11:03.000Z ##

🔴 CVE-2026-4725 - Critical (10)

Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This vulnerability affects Firefox &lt; 149.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4723
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-03-24T21:32:29

1 posts

Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 149.

thehackerwire@mastodon.social at 2026-03-24T21:10:54.000Z ##

🔴 CVE-2026-4723 - Critical (9.8)

Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox &lt; 149.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4701
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-24T21:32:28

1 posts

Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T23:02:23.000Z ##

🔴 CVE-2026-4701 - Critical (9.8)

Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4717
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-24T21:32:28

1 posts

Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T23:00:00.000Z ##

🔴 CVE-2026-4717 - Critical (9.8)

Privilege escalation in the Netmonitor component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4716
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-03-24T21:32:28

1 posts

Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T22:53:07.000Z ##

🔴 CVE-2026-4716 - Critical (9.1)

Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4714
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-24T21:32:28

1 posts

Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T22:52:47.000Z ##

🟠 CVE-2026-4714 - High (7.5)

Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4713
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-24T21:32:28

1 posts

Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T22:20:03.000Z ##

🟠 CVE-2026-4713 - High (7.5)

Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4711
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-24T21:32:28

1 posts

Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T22:19:44.000Z ##

🔴 CVE-2026-4711 - Critical (9.8)

Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4722
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-24T21:32:28

1 posts

Privilege escalation in the IPC component. This vulnerability affects Firefox < 149.

thehackerwire@mastodon.social at 2026-03-24T21:10:46.000Z ##

🟠 CVE-2026-4722 - High (8.8)

Privilege escalation in the IPC component. This vulnerability affects Firefox &lt; 149.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33254
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-24T21:31:36

1 posts

NVIDIA Triton Inference Server contains a vulnerability where an attacker may cause internal state corruption. A successful exploit of this vulnerability may lead to a denial of service.

thehackerwire@mastodon.social at 2026-03-24T22:06:41.000Z ##

🟠 CVE-2025-33254 - High (7.5)

NVIDIA Triton Inference Server contains a vulnerability where an attacker may cause internal state corruption. A successful exploit of this vulnerability may lead to a denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33248
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-24T21:31:35

1 posts

NVIDIA Megatron-LM contains a vulnerability in the hybrid conversion script where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-03-24T22:06:32.000Z ##

🟠 CVE-2025-33248 - High (7.8)

NVIDIA Megatron-LM contains a vulnerability in the hybrid conversion script where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33244
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-03-24T21:31:35

2 posts

NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker could cause a deserialization of untrusted data. This vulnerability affects environments that use PyTorch versions earlier than 2.6. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, data tampering, and information disclosure.

thehackerwire@mastodon.social at 2026-03-24T22:05:06.000Z ##

🔴 CVE-2025-33244 - Critical (9)

NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker could cause a deserialization of untrusted data. This vulnerability affects environments that use PyTorch versions earlier than 2.6. A successful exploit of this vulnera...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-03-24T16:07:04.000Z ##

New Nvidia advisories. This is a long list of vulnerabilities with varying severity.

Of note is the critical CVE-2025-33244: Security Bulletin: NVIDIA Apex - March 2026 nvidia.custhelp.com/app/answer

The rest: nvidia.com/en-us/product-secur #infosec #Nvidia #vulnerability

##

CVE-2025-33238
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-24T21:31:35

1 posts

NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability where an attacker may cause an exception. A successful exploit of this vulnerability may lead to denial of service.

thehackerwire@mastodon.social at 2026-03-24T22:04:56.000Z ##

🟠 CVE-2025-33238 - High (7.5)

NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability where an attacker may cause an exception. A successful exploit of this vulnerability may lead to denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24158
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-24T21:31:35

1 posts

NVIDIA Triton Inference Server contains a vulnerability in the HTTP endpoint where an attacker may cause a denial of service by providing a large compressed payload. A successful exploit of this vulnerability may lead to denial of service.

thehackerwire@mastodon.social at 2026-03-24T22:04:46.000Z ##

🟠 CVE-2026-24158 - High (7.5)

NVIDIA Triton Inference Server contains a vulnerability in the HTTP endpoint where an attacker may cause a denial of service by providing a large compressed payload. A successful exploit of this vulnerability may lead to denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24152
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-24T21:31:35

1 posts

NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-03-24T22:01:37.000Z ##

🟠 CVE-2026-24152 - High (7.8)

NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of priv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24151
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-24T21:31:35

1 posts

NVIDIA Megatron-LM contains a vulnerability in inferencing where an Attacker may cause an RCE by convincing a user to load a maliciously crafted input. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-03-24T22:01:27.000Z ##

🟠 CVE-2026-24151 - High (7.8)

NVIDIA Megatron-LM contains a vulnerability in inferencing where an Attacker may cause an RCE by convincing a user to load a maliciously crafted input. A successful exploit of this vulnerability may lead to code execution, escalation of privileges...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24141
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-24T21:31:35

1 posts

NVIDIA Model Optimizer for Windows and Linux contains a vulnerability in the ONNX quantization feature, where a user could cause unsafe deserialization by providing a specially crafted input file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, and information disclosure.

thehackerwire@mastodon.social at 2026-03-24T22:00:02.000Z ##

🟠 CVE-2026-24141 - High (7.8)

NVIDIA Model Optimizer for Windows and Linux contains a vulnerability in the ONNX quantization feature, where a user could cause unsafe deserialization by providing a specially crafted input file. A successful exploit of this vulnerability might l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24159
(7.8 HIGH)

EPSS: 0.12%

updated 2026-03-24T21:31:35

1 posts

NVIDIA NeMo Framework contains a vulnerability where an attacker may cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and data tampering.

thehackerwire@mastodon.social at 2026-03-24T21:59:51.000Z ##

🟠 CVE-2026-24159 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker may cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2417(CVSS UNKNOWN)

EPSS: 0.10%

updated 2026-03-24T21:31:30

1 posts

A Missing Authentication for Critical Function vulnerability in Pharos Controls Mosaic Show Controller firmware version 2.15.3 could allow an unauthenticated attacker to bypass authentication and execute arbitrary commands with root privileges.

beyondmachines1@infosec.exchange at 2026-03-25T09:01:25.000Z ##

Pharos Controls Patches Critical Root Access Flaw in Mosaic Show Controllers

Pharos Controls patched a critical vulnerability (CVE-2026-2417) in its Mosaic Show Controller that allows unauthenticated attackers to execute arbitrary commands with root privileges.

**Make sure all Pharos Mosaic Show Controllers are isolated from the internet and accessible from trusted networks only. Check your version, if you are running 2.15.3, you are at risk. Plan an update the firmware to version 2.16 or later.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-4702
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-24T21:31:22

1 posts

JIT miscompilation in the JavaScript Engine component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T23:02:33.000Z ##

🔴 CVE-2026-4702 - Critical (9.8)

JIT miscompilation in the JavaScript Engine component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29785
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-24T21:29:09

4 posts

### Background NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. When configured to accept leafnode connections (for a hub/spoke topology of multiple nats-servers), then the default configuration allows for negotiating compression; a malicious remote NATS server can trigger a server panic via that com

thehackerwire@mastodon.social at 2026-03-25T20:21:39.000Z ##

🟠 CVE-2026-29785 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:20:55.000Z ##

🟠 CVE-2026-29785 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:21:39.000Z ##

🟠 CVE-2026-29785 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:20:55.000Z ##

🟠 CVE-2026-29785 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4700
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-24T21:16:31.800000

1 posts

Mitigation bypass in the Networking: HTTP component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

thehackerwire@mastodon.social at 2026-03-24T23:00:21.000Z ##

🔴 CVE-2026-4700 - Critical (9.8)

Mitigation bypass in the Networking: HTTP component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33554
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-24T20:16:30.357000

1 posts

ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors comm

thehackerwire@mastodon.social at 2026-03-24T20:58:32.000Z ##

🟠 CVE-2026-33554 - High (7.5)

ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30653
(7.5 HIGH)

EPSS: 0.18%

updated 2026-03-24T20:16:26.650000

1 posts

An issue in Free5GC v.4.2.0 and before allows a remote attacker to cause a denial of service via the function HandleAuthenticationFailure of the component AMF

thehackerwire@mastodon.social at 2026-03-24T20:15:29.000Z ##

🟠 CVE-2026-30653 - High (7.5)

An issue in Free5GC v.4.2.0 and before allows a remote attacker to cause a denial of service via the function HandleAuthenticationFailure of the component AMF

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32276
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-24T19:58:16.700000

1 posts

Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, an authenticated user may be able to execute arbitrary code in the Code Study Plugin. Versions 1.41.1 and 2.41.1 contain a patch.

thehackerwire@mastodon.social at 2026-03-23T22:30:22.000Z ##

🟠 CVE-2026-32276 - High (8.8)

Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, an authenticated user may be able to execute arbitrary code in the Code Study Plugin. V...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33484
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-24T19:20:13.567000

1 posts

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions 1.0.0 through 1.8.1, the `/api/v1/files/images/{flow_id}/{file_name}` endpoint serves image files without any authentication or ownership check. Any unauthenticated request with a known flow_id and file_name returns the image with HTTP 200. In a multi-tenant deployment, any attacker who can discover or guess

thehackerwire@mastodon.social at 2026-03-24T21:00:04.000Z ##

🟠 CVE-2026-33484 - High (7.5)

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions 1.0.0 through 1.8.1, the `/api/v1/files/images/{flow_id}/{file_name}` endpoint serves image files without any authentication or ownership check. Any unauthe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71275
(9.8 CRITICAL)

EPSS: 0.46%

updated 2026-03-24T18:31:36

1 posts

Zimbra Collaboration Suite (ZCS) PostJournal service version 8.8.15 contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary system commands by exploiting improper sanitization of the RCPT TO parameter via SMTP injection. Attackers can inject shell expansion syntax through the RCPT TO parameter to achieve remote code execution under the Zimbra service c

thehackerwire@mastodon.social at 2026-03-24T20:13:51.000Z ##

🔴 CVE-2025-71275 - Critical (9.8)

Zimbra Collaboration Suite (ZCS) PostJournal service version 8.8.15 contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary system commands by exploiting improper sanitization of the RCPT TO parameter ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4673
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-24T18:31:34

2 posts

Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:43:42.000Z ##

🟠 CVE-2026-4673 - High (8.8)

Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:43:12.000Z ##

🟠 CVE-2026-4673 - High (8.8)

Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4679
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-24T18:31:34

1 posts

Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:24:05.000Z ##

🟠 CVE-2026-4679 - High (8.8)

Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4675
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-24T18:31:34

1 posts

Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:17:14.000Z ##

🟠 CVE-2026-4675 - High (8.8)

Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4674
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-24T16:53:14.987000

2 posts

Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:43:52.000Z ##

🟠 CVE-2026-4674 - High (8.8)

Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:43:21.000Z ##

🟠 CVE-2026-4674 - High (8.8)

Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4677
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-24T16:47:49.867000

1 posts

Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:23:47.000Z ##

🟠 CVE-2026-4677 - High (8.8)

Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4368
(0 None)

EPSS: 0.02%

updated 2026-03-24T15:54:09.400000

2 posts

Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configured as Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server leading to User Session Mixup

AAKL@infosec.exchange at 2026-03-24T16:22:25.000Z ##

Citrix patched this yesterday.

Arctic Wolf: CVE‑2026‑3055: Critical Unauthenticated Memory-Read Vulnerability in Citrix NetScaler ADC and Gateway arcticwolf.com/resources/blog/

Citrix: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368 support.citrix.com/support-hom #infosec #vulnerability

##

beyondmachines1@infosec.exchange at 2026-03-24T15:01:25.000Z ##

Critical Memory Leak and Session Hijacking Vulnerabilities Patched in Citrix NetScaler

Citrix patched a critical memory overread (CVE-2026-3055) and a high-severity session-swapping race condition (CVE-2026-4368) in NetScaler ADC and Gateway. These vulnerabilities allow unauthenticated attackers to leak sensitive memory data or hijack user sessions in environments configured for SAML or VPN services.

**If possible, make sure your NetScaler ADC and Gateway appliances are isolated from the internet and accessible from trusted networks only. Them plan a quick update. If you can't isolate from the internet, this is urgent. Update the firmware to the fixed versions (14.1-66.59, 13.1-62.23, or 13.1-37.262 for FIPS/NDcPP). Attackers have previously exploited similar flaws via the CitrixBleed exploit.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-60946
(8.8 HIGH)

EPSS: 0.12%

updated 2026-03-24T15:54:09.400000

1 posts

Census CSWeb 8.0.1 allows arbitrary file path input. A remote, authenticated attacker could access unintended file directories. Fixed in 8.1.0 alpha.

thehackerwire@mastodon.social at 2026-03-23T22:42:54.000Z ##

🟠 CVE-2025-60946 - High (8.8)

Census CSWeb 8.0.1 allows arbitrary file path input. A remote, authenticated attacker could access unintended file directories. Fixed in 8.1.0 alpha.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4283
(9.1 CRITICAL)

EPSS: 0.10%

updated 2026-03-24T15:53:48.067000

2 posts

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthenticated users, which bypasses the intended email-confirmation flow and immediately triggers irreversible account anonymization. This makes it possible for un

offseq@infosec.exchange at 2026-03-25T01:30:30.000Z ##

🚨 CRITICAL: CVE-2026-4283 in WP DSGVO Tools (GDPR) plugin allows unauthenticated attackers to irreversibly destroy non-admin accounts via 'super-unsubscribe' AJAX. All versions ≤3.1.38 affected. Remove '[unsubscribe_form]' & monitor for abuse. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec

##

thehackerwire@mastodon.social at 2026-03-24T05:26:09.000Z ##

🔴 CVE-2026-4283 - Critical (9.1)

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthentica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27654
(8.2 HIGH)

EPSS: 0.02%

updated 2026-03-24T15:53:48.067000

1 posts

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process or modification of source or destination file names outside the document root. This issue affects NGINX Open Source and NGINX Plus when the configuratio

thehackerwire@mastodon.social at 2026-03-24T20:15:34.000Z ##

🟠 CVE-2026-27654 - High (8.2)

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41660
(8.8 HIGH)

EPSS: 0.21%

updated 2026-03-24T15:53:48.067000

1 posts

A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution.

certvde@infosec.exchange at 2026-03-24T07:47:49.000Z ##

#OT #Advisory VDE-2026-011
CODESYS Control V3 - Untrusted boot application

The CODESYS Control runtime system provides a user management mechanism with multiple privilege groups. While only the privileged Administrators and Developer groups are intended to load or debug applications on the controller, users in the restricted Service group are allowed to perform maintenance operations, including explicitly replacing the boot application.
#CVE CVE-2025-41660

certvde.com/en/advisories/vde-

#CSAF codesys.csaf-tp.certvde.com/.w

##

CVE-2026-4750
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-24T15:53:48.067000

1 posts

Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof: before woof_15.3.0.

thehackerwire@mastodon.social at 2026-03-24T06:23:20.000Z ##

🔴 CVE-2026-4750 - Critical (9.1)

Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof: before woof_15.3.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4640
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-24T15:53:48.067000

1 posts

Vitals ESP developed by Galaxy Software Services has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to execute certain functions to obtain sensitive information.

thehackerwire@mastodon.social at 2026-03-24T05:25:11.000Z ##

🟠 CVE-2026-4640 - High (7.5)

Vitals ESP developed by Galaxy Software Services has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to execute certain functions to obtain sensitive information.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33298
(7.8 HIGH)

EPSS: 0.04%

updated 2026-03-24T15:53:48.067000

2 posts

llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an integer overflow vulnerability in the `ggml_nbytes` function allows an attacker to bypass memory validation by crafting a GGUF file with specific tensor dimensions. This causes `ggml_nbytes` to return a significantly smaller size than required (e.g., 4MB instead of Exabytes), leading to a heap-based buffer overflow when t

thehackerwire@mastodon.social at 2026-03-24T01:48:19.000Z ##

🟠 CVE-2026-33298 - High (7.8)

llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an integer overflow vulnerability in the `ggml_nbytes` function allows an attacker to bypass memory validation by crafting a GGUF file with specific tensor dimensions. This ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T01:30:32.000Z ##

🟠 CVE-2026-33298 - High (7.8)

llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an integer overflow vulnerability in the `ggml_nbytes` function allows an attacker to bypass memory validation by crafting a GGUF file with specific tensor dimensions. This ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33211
(9.6 CRITICAL)

EPSS: 0.02%

updated 2026-03-24T15:53:48.067000

2 posts

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 1.0.0 and prior to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, the Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter. A tenant with permission to create `ResolutionRequests` (e.g. by creating `TaskRuns` or `PipelineRuns` that use the git res

offseq@infosec.exchange at 2026-03-24T01:30:27.000Z ##

🚨 CRITICAL: CVE-2026-33211 in Tekton Pipelines (git resolver) enables path traversal attacks via pathInRepo, exposing sensitive files (like ServiceAccount tokens). Upgrade to fixed versions immediately. Details: radar.offseq.com/threat/cve-20 #OffSeq #Tekton #Kubernetes #Infosec

##

thehackerwire@mastodon.social at 2026-03-24T00:23:30.000Z ##

🔴 CVE-2026-33211 - Critical (9.6)

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 1.0.0 and prior to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, the Tekton Pipelines git resolver is vulnerable to path traversal vi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3533
(8.8 HIGH)

EPSS: 0.22%

updated 2026-03-24T15:53:48.067000

1 posts

The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads due to missing authorization on import_popup_templates() function as well as insufficient file type validation in the upload_files() function in all versions up to, and including, 4.14.1. This makes it possible for Authenticated attackers with Subscriber-level access and above, to upload files with dangerous types that c

thehackerwire@mastodon.social at 2026-03-24T00:23:20.000Z ##

🟠 CVE-2026-3533 - High (8.8)

The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads due to missing authorization on import_popup_templates() function as well as insufficient file type validation in the upload_files() function in all versions up to, and ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27651
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-24T15:30:36

2 posts

When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not

thehackerwire@mastodon.social at 2026-03-24T20:59:53.000Z ##

🟠 CVE-2026-27651 - High (7.5)

When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T20:15:41.000Z ##

🟠 CVE-2026-27651 - High (7.5)

When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27784
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-24T15:30:36

2 posts

The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file.

thehackerwire@mastodon.social at 2026-03-24T20:58:49.000Z ##

🟠 CVE-2026-27784 - High (7.8)

The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T20:15:39.000Z ##

🟠 CVE-2026-27784 - High (7.8)

The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32647
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-24T15:30:36

2 posts

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 di

thehackerwire@mastodon.social at 2026-03-24T20:58:40.000Z ##

🟠 CVE-2026-32647 - High (7.8)

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T20:15:32.000Z ##

🟠 CVE-2026-32647 - High (7.8)

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4775
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-24T15:30:36

1 posts

A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.

thehackerwire@mastodon.social at 2026-03-24T20:15:20.000Z ##

🟠 CVE-2026-4775 - High (7.8)

A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22739
(8.6 HIGH)

EPSS: 0.02%

updated 2026-03-24T15:30:27

1 posts

Vulnerability in Spring Cloud when substituting the profile parameter from a request made to the Spring Cloud Config Server configured to the native file system as a backend, because it was possible to access files outside of the configured search directories.This issue affects Spring Cloud: from 3.1.X before 3.1.13, from 4.1.X before 4.1.9, from 4.2.X before 4.2.3, from 4.3.X before 4.3.2, from 5

thehackerwire@mastodon.social at 2026-03-24T01:30:39.000Z ##

🟠 CVE-2026-22739 - High (8.6)

Vulnerability in Spring Cloud when substituting the profile parameter from a request made to the Spring Cloud Config Server configured to the native file system as a backend, because it was possible to access files outside of the configured search...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3509
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-24T09:30:41

1 posts

An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denial‑of‑service (DoS) condition.

certvde@infosec.exchange at 2026-03-24T07:48:12.000Z ##

#OT #Advisory VDE-2026-018
CODESYS Control V3 - Externally-controlled format string in Auditlog

The CODESYS Control runtime system's CmpAuditLog component allows potentially unauthenticated remote attackers to control the format string of processed log messages. Due to the internal processing logic, the impact is limited to a crash of the CODESYS Control runtime.
#CVE CVE-2026-3509

certvde.com/en/advisories/vde-

#CSAF codesys.csaf-tp.certvde.com/.w

##

CVE-2026-4755
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-24T09:30:41

1 posts

CWE-20 vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-11.

offseq@infosec.exchange at 2026-03-24T07:30:27.000Z ##

⚠️ CVE-2026-4755: Critical vuln in MolotovCherry Android-ImageMagick7 (<7.1.2-11). Remote, unauthenticated RCE possible due to improper input validation. Patch ASAP & enforce input checks. Details: radar.offseq.com/threat/cve-20 #OffSeq #Android #Vuln #ImageMagick #CVE2026_4755

##

CVE-2026-4745(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-03-24T06:31:25

1 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in dendibakh perf-ninja (labs/misc/pgo/lua modules). This vulnerability is associated with program files ldo.C. This issue affects perf-ninja.

offseq@infosec.exchange at 2026-03-24T09:00:29.000Z ##

🚨 CRITICAL: CVE-2026-4745 in dendibakh perf-ninja (CVSS 10) — remote code injection flaw in labs/misc/pgo/lua & ldo.C. No exploits yet, but restrict access, monitor logs, and prep for urgent patches. Full system compromise risk. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #AppSec

##

CVE-2026-4753
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-24T06:31:25

1 posts

Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects RetroDebugger: before v0.64.72.

thehackerwire@mastodon.social at 2026-03-24T06:23:29.000Z ##

🔴 CVE-2026-4753 - Critical (9.1)

Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects RetroDebugger: before v0.64.72.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4746(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-03-24T06:31:25

1 posts

Out-of-bounds Write vulnerability in timeplus-io proton (base/poco/Foundation/src‎ modules). This vulnerability is associated with program files inflate.C. This issue affects proton: before 1.6.16.

offseq@infosec.exchange at 2026-03-24T06:00:30.000Z ##

🚨 CRITICAL: CVE-2026-4746 in timeplus-io proton (<1.6.16) allows remote out-of-bounds writes — risk of code execution, system takeover. No auth or user action needed. Patch when available, restrict access now. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE20264746 #Vuln

##

CVE-2026-4662
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-24T06:31:25

1 posts

The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listing_load_more` AJAX action in all versions up to, and including, 3.8.6.1. This is due to the `filtered_query` parameter being excluded from the HMAC signature validation (allowing attacker-controlled input to bypass security checks) combined with the `prepare_where_clause()` method in the SQL Query Builder not sanitizin

thehackerwire@mastodon.social at 2026-03-24T05:25:20.000Z ##

🟠 CVE-2026-4662 - High (7.5)

The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listing_load_more` AJAX action in all versions up to, and including, 3.8.6.1. This is due to the `filtered_query` parameter being excluded from the HMAC signature validatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4639
(8.8 HIGH)

EPSS: 0.10%

updated 2026-03-24T06:31:14

2 posts

Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby escalating privileges.

ivycyber@privacysafe.social at 2026-03-24T06:02:18.000Z ##

🛡️ #Cybersecurity news & tips across the #fediverse 👇

“🟠 CVE-2026-4639 - High (8.8) Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby es...”

mastodon.social/@thehackerwire

🤖 via RSS feed. Not an endorsement.

##

thehackerwire@mastodon.social at 2026-03-24T05:25:01.000Z ##

🟠 CVE-2026-4639 - High (8.8)

Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby escalating privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4744(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-03-24T06:31:14

1 posts

Out-of-bounds Read vulnerability in rizonesoft Notepad3 (‎scintilla/oniguruma/src modules). This vulnerability is associated with program files regcomp.C‎. This issue affects Notepad3: before 6.25.714.1.

offseq@infosec.exchange at 2026-03-24T04:30:30.000Z ##

🛡️ CRITICAL: CVE-2026-4744 in rizonesoft Notepad3 (<6.25.714.1) enables out-of-bounds reads — possible data disclosure & crashes. Patch ASAP, restrict access, and avoid untrusted files. More info: radar.offseq.com/threat/cve-20 #OffSeq #CVE20264744 #infosec #vuln

##

CVE-2026-4739(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-03-24T06:31:13

2 posts

Integer Overflow or Wraparound vulnerability in InsightSoftwareConsortium ITK (‎Modules/ThirdParty/Expat/src/expat modules).This issue affects ITK: before 2.7.1.

ivycyber@privacysafe.social at 2026-03-24T12:02:16.000Z ##

🛡️ #Cybersecurity news & tips across the #fediverse 👇

“🚨 CVE-2026-4739 (CRITICAL, CVSS 9.4) in ITK: Integer overflow in Expat XML parser enables remote code execution or DoS in medical/scientific apps. Update to v2.7.1 now. User interaction required. Details: https:// ra...”

infosec.exchange/@offseq/11628

🤖 via RSS feed. Not an endorsement.

##

offseq@infosec.exchange at 2026-03-24T10:30:32.000Z ##

🚨 CVE-2026-4739 (CRITICAL, CVSS 9.4) in ITK: Integer overflow in Expat XML parser enables remote code execution or DoS in medical/scientific apps. Update to v2.7.1 now. User interaction required. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #ITK #Infosec

##

CVE-2026-4678
(8.8 HIGH)

EPSS: 0.11%

updated 2026-03-24T03:31:25

1 posts

Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:23:56.000Z ##

🟠 CVE-2026-4678 - High (8.8)

Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4676
(8.8 HIGH)

EPSS: 0.11%

updated 2026-03-24T03:31:25

1 posts

Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:17:24.000Z ##

🟠 CVE-2026-4676 - High (8.8)

Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4680
(8.8 HIGH)

EPSS: 0.13%

updated 2026-03-24T03:31:25

1 posts

Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T01:30:30.000Z ##

🟠 CVE-2026-4680 - High (8.8)

Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4021
(8.1 HIGH)

EPSS: 0.12%

updated 2026-03-24T00:30:34

1 posts

The Contest Gallery plugin for WordPress is vulnerable to an authentication bypass leading to admin account takeover in all versions up to, and including, 28.1.5. This is due to the email confirmation handler in `users-registry-check-after-email-or-pin-confirmation.php` using the user's email string in a `WHERE ID = %s` clause instead of the numeric user ID, combined with an unauthenticated key-ba

thehackerwire@mastodon.social at 2026-03-24T00:19:08.000Z ##

🟠 CVE-2026-4021 - High (8.1)

The Contest Gallery plugin for WordPress is vulnerable to an authentication bypass leading to admin account takeover in all versions up to, and including, 28.1.5. This is due to the email confirmation handler in `users-registry-check-after-email-o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4001
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-03-24T00:30:33

1 posts

The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.4.1 via the custom pricing formula eval() in the process_custom_formula() function within includes/process/price.php. This is due to insufficient sanitization and validation of user-submitted field values before passing them to PHP's eval() function. The san

thehackerwire@mastodon.social at 2026-03-24T00:18:58.000Z ##

🔴 CVE-2026-4001 - Critical (9.8)

The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.4.1 via the custom pricing formula eval() in the process_custom_formula() function within includes/proces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4306
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-24T00:30:33

1 posts

The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter in all versions up to, and including, 2.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to e

thehackerwire@mastodon.social at 2026-03-23T23:18:06.000Z ##

🟠 CVE-2026-4306 - High (7.5)

The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter in all versions up to, and including, 2.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the exis...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4681(CVSS UNKNOWN)

EPSS: 0.38%

updated 2026-03-24T00:30:28

1 posts

A critical remote code execution (RCE) vulnerability has been reported in PTC Windchill and PTC FlexPLM. The vulnerability may be exploited through the deserialization of untrusted data. This issue affects Windchill PDMLink: 11.0 M030, 11.1 M020, 11.2.1.0, 12.0.2.0, 12.1.2.0, 13.0.2.0, 13.1.0.0, 13.1.1.0, 13.1.2.0, 13.1.3.0; FlexPLM: 11.0 M030, 11.1 M020, 11.2.1.0, 12.0.0.0, 12.0.2.0, 12.0.3.0, 1

beyondmachines1@infosec.exchange at 2026-03-25T12:01:46.000Z ##

PTC Warns of Imminent RCE Threat in Windchill and FlexPLM Systems

PTC reports a critical RCE vulnerability (CVE-2026-4681) in Windchill and FlexPLM software, leading to emergency warnings from German police due to an imminent threat of exploitation.

**If you're running PTC Windchill or FlexPLM, make sure these systems are isolated from the internet and accessible from trusted networks only. This one is a perfect 10.0 severity with no patch yet, so apply the recommended rewrite rules to block the WindchillGW and WindchillAuthGW servlet paths immediately. Also check your servers for signs of compromise like GW.class, payload.bin, or dpr_*.jsp files, and if you can't apply the workarounds, shut down the affected services until PTC releases an official patch.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2025-60947
(8.8 HIGH)

EPSS: 0.19%

updated 2026-03-24T00:30:28

1 posts

Census CSWeb 8.0.1 allows arbitrary file upload. A remote, authenticated attacker could upload a malicious file, possibly leading to remote code execution. Fixed in 8.1.0 alpha.

thehackerwire@mastodon.social at 2026-03-23T22:43:04.000Z ##

🟠 CVE-2025-60947 - High (8.8)

Census CSWeb 8.0.1 allows arbitrary file upload. A remote, authenticated attacker could upload a malicious file, possibly leading to remote code execution. Fixed in 8.1.0 alpha.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60949
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-03-24T00:30:28

1 posts

Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployments. A remote, unauthenticated attacker could send requests to configuration files and obtain leaked secrets. Fixed in 8.1.0 alpha.

thehackerwire@mastodon.social at 2026-03-23T22:42:46.000Z ##

🔴 CVE-2025-60949 - Critical (9.1)

Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployments. A remote, unauthenticated attacker could send requests to configuration files and obtain leaked secrets. Fixed in 8.1.0 alpha.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32902(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-03-24T00:30:28

1 posts

Rejected reason: This CVE ID has been rejected.

thehackerwire@mastodon.social at 2026-03-23T22:29:13.000Z ##

🟠 CVE-2026-32902 - High (8.3)

OpenClaw before 2026.3.1 contains a server-side request forgery vulnerability in web_search citation redirect resolution that allows attackers to target private-network destinations. Attackers who influence citation redirect targets can trigger in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32907(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-03-24T00:30:28

1 posts

Rejected reason: This CVE ID has been rejected.

thehackerwire@mastodon.social at 2026-03-23T22:29:04.000Z ##

🟠 CVE-2026-32907 - High (7.8)

OpenClaw before 2026.2.19 contains a local command injection vulnerability in Windows scheduled task script generation that allows attackers to execute arbitrary commands by injecting cmd metacharacters into unsafe gateway.cmd arguments. Attackers...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32066
(0 None)

EPSS: 0.00%

updated 2026-03-23T23:17:11.653000

1 posts

Rejected reason: This CVE ID has been rejected.

thehackerwire@mastodon.social at 2026-03-23T22:31:07.000Z ##

🟠 CVE-2026-32066 - High (7.5)

OpenClaw before 2026.3.1 contains an unbounded memory growth vulnerability in the Zalo webhook endpoint that allows unauthenticated attackers to trigger memory exhaustion by varying query strings. Attackers can send repeated requests with differen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32913
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-23T21:54:50

1 posts

OpenClaw's `fetchWithSsrFGuard(...)` followed cross-origin redirects while preserving arbitrary caller-supplied headers except for a narrow denylist (`Authorization`, `Proxy-Authorization`, `Cookie`, `Cookie2`). This allowed custom authorization headers such as `X-Api-Key`, `Private-Token`, and similar sensitive headers to be forwarded to a different origin after a redirect. The fix switches cros

1 repos

https://github.com/Rickidevs/CVE-2026-32913

thehackerwire@mastodon.social at 2026-03-23T22:28:54.000Z ##

🔴 CVE-2026-32913 - Critical (9.3)

OpenClaw before 2026.3.7 contains an improper header validation vulnerability in fetchWithSsrFGuard that forwards custom authorization headers across cross-origin redirects. Attackers can trigger redirects to different origins to intercept sensiti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32845
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-23T21:31:53

1 posts

cgltf version 1.15 and prior contain an integer overflow vulnerability in the cgltf_validate() function when validating sparse accessors that allows attackers to trigger out-of-bounds reads by supplying crafted glTF/GLB input files with attacker-controlled size values. Attackers can exploit unchecked arithmetic operations in sparse accessor validation to cause heap buffer over-reads in cgltf_calc_

thehackerwire@mastodon.social at 2026-03-23T21:00:12.000Z ##

🟠 CVE-2026-32845 - High (8.4)

cgltf version 1.15 and prior contain an integer overflow vulnerability in the cgltf_validate() function when validating sparse accessors that allows attackers to trigger out-of-bounds reads by supplying crafted glTF/GLB input files with attacker-c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3055(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-03-23T21:30:58

3 posts

Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread

mttaggart@infosec.exchange at 2026-03-25T16:44:59.000Z ##

Aww yiss another critical Citrix vuln.

bleepingcomputer.com/news/secu

Detection/remediation details here: docs.netscaler.com/en-us/netsc

##

AAKL@infosec.exchange at 2026-03-24T16:22:25.000Z ##

Citrix patched this yesterday.

Arctic Wolf: CVE‑2026‑3055: Critical Unauthenticated Memory-Read Vulnerability in Citrix NetScaler ADC and Gateway arcticwolf.com/resources/blog/

Citrix: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368 support.citrix.com/support-hom #infosec #vulnerability

##

beyondmachines1@infosec.exchange at 2026-03-24T15:01:25.000Z ##

Critical Memory Leak and Session Hijacking Vulnerabilities Patched in Citrix NetScaler

Citrix patched a critical memory overread (CVE-2026-3055) and a high-severity session-swapping race condition (CVE-2026-4368) in NetScaler ADC and Gateway. These vulnerabilities allow unauthenticated attackers to leak sensitive memory data or hijack user sessions in environments configured for SAML or VPN services.

**If possible, make sure your NetScaler ADC and Gateway appliances are isolated from the internet and accessible from trusted networks only. Them plan a quick update. If you can't isolate from the internet, this is urgent. Update the firmware to the fixed versions (14.1-66.59, 13.1-62.23, or 13.1-37.262 for FIPS/NDcPP). Attackers have previously exploited similar flaws via the CitrixBleed exploit.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-33143
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-23T20:48:27.347000

2 posts

OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.34, the WhatsApp POST webhook handler (/notification/whatsapp/webhook) processes incoming status update events without verifying the Meta/WhatsApp X-Hub-Signature-256 HMAC signature, allowing any unauthenticated attacker to send forged webhook payloads that manipulate notification delivery status records, su

ivycyber@privacysafe.social at 2026-03-23T22:24:37.000Z ##

🛡️ #Cybersecurity news & tips across the #fediverse 👇

“🟠 CVE-2026-33143 - High (7.5) OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.34, the WhatsApp POST webhook handler (/notification/whatsapp/webhook) processes incoming status ...”

mastodon.social/@thehackerwire

🤖 via RSS feed. Not an endorsement.

##

thehackerwire@mastodon.social at 2026-03-23T22:00:02.000Z ##

🟠 CVE-2026-33143 - High (7.5)

OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.34, the WhatsApp POST webhook handler (/notification/whatsapp/webhook) processes incoming status update events without verifying the Meta/WhatsApp X-Hub-Sig...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33228
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-23T19:14:31.040000

1 posts

flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function in flatted can use attacker-controlled string values from the parsed JSON as direct array index keys, without validating that they are numeric. Since the internal input buffer is a JavaScript Array, accessing it with the key "__proto__" returns Array.prototype via the inherited getter. This object is then treated as a

thehackerwire@mastodon.social at 2026-03-23T21:00:24.000Z ##

🔴 CVE-2026-33228 - Critical (9.8)

flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function in flatted can use attacker-controlled string values from the parsed JSON as direct array index keys, without validating that they are numeric. Since the internal inpu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32746
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-23T15:31:40

3 posts

telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.

4 repos

https://github.com/chosenonehacks/CVE-2026-32746

https://github.com/jeffaf/cve-2026-32746

https://github.com/danindiana/cve-2026-32746-mitigation

https://github.com/watchtowrlabs/watchtowr-vs-telnetd-CVE-2026-32746

lobsters@mastodon.social at 2026-03-25T10:30:12.000Z ##

A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils CVE-2026-32746) lobste.rs/s/udbivp #c #security
labs.watchtowr.com/a-32-year-o

##

whitequark@treehouse.systems at 2026-03-25T05:58:33.000Z ##

Yes, the vulnerability is so old, it dates from a time when networks charged on a ‘per-packet basis’.

labs.watchtowr.com/a-32-year-o

##

0xabad1dea@infosec.exchange at 2026-03-25T05:56:26.000Z ##

enjoyed this telnetd analysis. (if you can’t believe anyone has a legitimate operational reason to run telnet, you live in a cozy world indeed) labs.watchtowr.com/a-32-year-o

##

CVE-2026-21992
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-23T15:30:30.950000

1 posts

Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) and Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle

jbhall56@infosec.exchange at 2026-03-24T12:28:46.000Z ##

CVE-2026-21992 can be used without authentication for remote code execution and it may have been exploited in the wild. securityweek.com/oracle-releas

##

CVE-2026-33509
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-20T21:50:31

1 posts

## Summary The `set_config_value()` API endpoint allows users with the non-admin `SETTINGS` permission to modify any configuration option without restriction. The `reconnect.script` config option controls a file path that is passed directly to `subprocess.run()` in the thread manager's reconnect logic. A SETTINGS user can set this to any executable file on the system, achieving Remote Code Execut

thehackerwire@mastodon.social at 2026-03-24T20:26:20.000Z ##

🟠 CVE-2026-33509 - High (7.5)

pyLoad is a free and open-source download manager written in Python. From version 0.4.0 to before version 0.5.0b3.dev97, the set_config_value() API endpoint allows users with the non-admin SETTINGS permission to modify any configuration option wit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-31277
(8.8 HIGH)

EPSS: 0.27%

updated 2026-03-20T18:53:35.083000

1 posts

The issue was addressed with improved memory handling. This issue is fixed in Safari 18.6, watchOS 11.6, visionOS 2.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6. Processing maliciously crafted web content may lead to memory corruption.

mttaggart@infosec.exchange at 2026-03-24T21:48:09.000Z ##

@gknauss I think the thing is to move to 18.7.3, which is patched.

For devices running versions of iOS prior to 18.6, DarkSword uses CVE-2025-31277, a JIT optimization/type confusion bug which was patched by Apple in iOS 18.6. For devices running iOS 18.6-18.7, DarkSword uses CVE-2025-43529, a garbage collection bug in the Data Flow Graph (DFG) JIT layer of JavaScriptCore which was patched by Apple in iOS 18.7.3 and 26.2 after it was reported by GTIG. Both exploits develop their own fakeobj/addrof primitives, and then build arbitrary read/write primitives the same way on top of them.

I'm unaware of a compelling reason or hardware limitation to not upgrade from 18.6 to 18.7

cloud.google.com/blog/topics/t

##

CVE-2025-43520
(5.5 MEDIUM)

EPSS: 0.47%

updated 2026-03-20T18:32:19

8 posts

A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.

jjtech@infosec.exchange at 2026-03-24T13:45:52.000Z ##

Unfortunately it looks like CVE-2025-43520 was patched in iOS 26.1b4, the exact build I happened to leave my test device on...

I might play around with it on my Mac or in one of the new iOS pccvre VMs though.

##

fmarini@mastodon.social at 2026-03-24T09:09:10.000Z ##

There has been a lot of sloppy reporting regarding DarkSword, with basically every news outlet saying that iOS 18 is vulnerable. It’s not, if you have the latest 18.7.3.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

#iOS #DarkSword

##

fmarini@mastodon.social at 2026-03-24T09:06:55.000Z ##

@peternlewis sloppy reporting, as usual.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:54:03.000Z ##

@mackuba

Google has a more in-depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:52:15.000Z ##

@helge the reporting on DarkSword is incredibly sloppy.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:50:52.000Z ##

@slightlyoff @owa
Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:41:46.000Z ##

@9to5Mac sloppy reporting, as usual.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:35:44.000Z ##

@evacide

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

CVE-2026-33331
(8.2 HIGH)

EPSS: 0.01%

updated 2026-03-20T17:25:56

1 posts

A Stored Cross-Site Scripting (XSS) vulnerability exists in the OpenAPI documentation generation of orpc. If an attacker can control any field within the OpenAPI specification (such as info.description), they can break out of the JSON context and execute arbitrary JavaScript when a user views the generated API documentation. In the packages/openapi/src/plugins/openapi-reference.ts file, the render

thehackerwire@mastodon.social at 2026-03-24T20:26:39.000Z ##

🟠 CVE-2026-33331 - High (8.2)

oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.9, a stored cross-site scripting (XSS) vulnerability exists in the OpenAPI documentation generation of orpc. If an attacker ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33344
(8.1 HIGH)

EPSS: 0.02%

updated 2026-03-19T19:25:46

1 posts

The fix for CVE-2026-27598 (commit e2ed589, PR #1691) added `ValidateDAGName` to `CreateNewDAG` and rewrote `generateFilePath` to use `filepath.Base`. This patched the CREATE path. The remaining API endpoints - GET, DELETE, RENAME, EXECUTE - all pass the `{fileName}` URL path parameter to `locateDAG` without calling `ValidateDAGName`. `%2F`-encoded forward slashes in the `{fileName}` segment trave

thehackerwire@mastodon.social at 2026-03-24T20:29:21.000Z ##

🟠 CVE-2026-33344 - High (8.1)

Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0 to before version 2.3.1, the fix for CVE-2026-27598 added ValidateDAGName to CreateNewDAG and rewrote generateFilePath to use filepath.Base. This patched the CREATE p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20131
(10.0 CRITICAL)

EPSS: 0.65%

updated 2026-03-19T18:32:21

3 posts

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java obj

3 repos

https://github.com/p3Nt3st3r-sTAr/CVE-2026-20131-POC

https://github.com/Sushilsin/CVE-2026-20131

https://github.com/sak110/CVE-2026-20131

AAKL@infosec.exchange at 2026-03-25T17:50:52.000Z ##

Grab a coffee. Cisco has a long list of advisories today, one is critical, several are high-severity.

This was first published on March 4:

Critical: CVE-2026-20131: Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

More: sec.cloudapps.cisco.com/securi @TalosSecurity

Also, Cisco has tagged GeoVision and MediaArea for zero-day reports talosintelligence.com/vulnerab #Zeroday #Cisco #infosec #vulnerability

@cR0w

##

LLMs@activitypub.awakari.com at 2026-03-25T12:04:33.000Z ## Ransomware Interlock explota Zero-Day crítico en Cisco FMC (CVE-2026-20131) El equipo de respuesta a incidentes de Cisco (PSIRT) ha emitido un parche de emergencia extraordinario para abordar una ...

#Seguridad

Origin | Interest | Match ##

steelefortress@infosec.exchange at 2026-03-24T11:00:30.000Z ##

Critical patch alert: The US government has ordered a maximum severity patch for a Cisco vulnerability (CVE-2026-20131) that's being exploited in ransomware campaigns.

Read more: steelefortress.com/86cy1e

#Encryption #ThreatIntel #Security #DataPrivacy #CyberDefense

##

CVE-2026-3888
(7.9 HIGH)

EPSS: 0.01%

updated 2026-03-18T06:31:20

1 posts

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

5 repos

https://github.com/netw0rk7/CVE-2026-3888-PoC

https://github.com/Many-Hat-Group/Ubuntu-CVE-2026-3888-patcher

https://github.com/TheCyberGeek/CVE-2026-3888-snap-confine-systemd-tmpfiles-LPE

https://github.com/nomaisthere/CVE-2026-3888

https://github.com/fevar54/CVE-2026-3888-POC-all-from-the-Qualys-platform.

knoppix95@mastodon.social at 2026-03-24T19:37:47.000Z ##

A new Ubuntu vulnerability (CVE-2026-3888) allows local users to escalate privileges to root via a timing-based exploit in Ubuntu Desktop 24.04 and newer. ⏱️
The flaw affects systems using older versions of snapd and requires immediate patching. 🔐

🔗 infosecurity-magazine.com/news

#TechNews #Ubuntu #Linux #SecurityFlaw #CVE #PrivilegeEscalation #RootAccess #Cybersecurity #LinuxSecurity #PatchNow #Snap #SystemVulnerabilities #DataProtection #TechUpdates #Privacy #OpenSource #Canonical

##

CVE-2026-32116(CVSS UNKNOWN)

EPSS: 0.08%

updated 2026-03-13T15:40:24

2 posts

### Impact _What kind of vulnerability is it? Who is impacted?_ Receiving a file (`wormhole receive`) from a malicious party could result in overwriting critical local files, including `~/.ssh/authorized_keys` and `.bashrc`. This could be used to compromise the receiver's computer. Only the sender of the file (the party who runs `wormhole send`) can mount the attack. Other parties (including the

magicwormhole@fosstodon.org at 2026-03-25T19:58:28.000Z ##

This month's exciting release fixes our first official[1] CVE for magic wormhole!

To improve your local machine's safety, please upgrade to magic wormhole 0.23.0

pypi.org/project/magic-wormhol

[1] nvd.nist.gov/vuln/detail/CVE-2

##

magicwormhole@fosstodon.org at 2026-03-25T19:58:28.000Z ##

This month's exciting release fixes our first official[1] CVE for magic wormhole!

To improve your local machine's safety, please upgrade to magic wormhole 0.23.0

pypi.org/project/magic-wormhol

[1] nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-30839
(4.3 MEDIUM)

EPSS: 0.03%

updated 2026-03-11T18:48:29.450000

1 posts

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, testwebhooknotifications.php does not validate the target URL against private/reserved IP ranges, enabling full-read SSRF. The server response is returned to the caller. This issue has been patched in version 4.6.2.

thehackerwire@mastodon.social at 2026-03-24T20:12:37.000Z ##

🟠 CVE-2026-33399 - High (7.7)

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, the SSRF fix applied in version 4.6.2 for CVE-2026-30839 and CVE-2026-30840 is incomplete. The validate_webhook_url_for_ssrf() protection was added to t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26123
(5.5 MEDIUM)

EPSS: 0.05%

updated 2026-03-10T21:32:18

2 posts

Cwe is not in rca categories in Microsoft Authenticator allows an unauthorized attacker to disclose information locally.

BugBountyShorts at 2026-03-25T23:40:25.636Z ##

Microsoft Authenticator’s Unclaimed Deep Link: A Full Account Takeover Story (CVE-2026–26123)
This vulnerability is an Authentication Bypass, specifically a session hijacking issue affecting the Microsoft Authenticator app. The root cause was improper handling of deep links within the application, which allowed malicious actors to craft unclaimed deep links containing account tokens. When users clicked these links, their active sessions were hijacked, resulting in full account takeover without requiring any user interaction other than clicking a link. To exploit this, an attacker could generate a malicious deep link with an embedded account token and share it via SMS or email. The session hijack occurred due to the application's failure to verify the authenticity of deep links before processing them. This vulnerability has been assigned CVE-2026–26123. Microsoft rewarded $50,000 for this find and immediately patched the issue. To prevent similar vulnerabilities, it is crucial to thoroughly validate and sanitize all user-controlled inputs, including deep links. Key lesson: Always verify the authenticity of user-supplied data before processing it.

infosecwriteups.com/microsoft-

##

BugBountyShorts@infosec.exchange at 2026-03-25T23:40:25.000Z ##

Microsoft Authenticator’s Unclaimed Deep Link: A Full Account Takeover Story (CVE-2026–26123)
This vulnerability is an Authentication Bypass, specifically a session hijacking issue affecting the Microsoft Authenticator app. The root cause was improper handling of deep links within the application, which allowed malicious actors to craft unclaimed deep links containing account tokens. When users clicked these links, their active sessions were hijacked, resulting in full account takeover without requiring any user interaction other than clicking a link. To exploit this, an attacker could generate a malicious deep link with an embedded account token and share it via SMS or email. The session hijack occurred due to the application's failure to verify the authenticity of deep links before processing them. This vulnerability has been assigned CVE-2026–26123. Microsoft rewarded $50,000 for this find and immediately patched the issue. To prevent similar vulnerabilities, it is crucial to thoroughly validate and sanitize all user-controlled inputs, including deep links. Key lesson: Always verify the authenticity of user-supplied data before processing it. #BugBounty #Cybersecurity #AuthenticationBypass #SessionHijacking #Infosec

infosecwriteups.com/microsoft-

##

CVE-2026-27598(CVSS UNKNOWN)

EPSS: 0.11%

updated 2026-02-27T20:40:25

1 posts

The `CreateNewDAG` API endpoint (`POST /api/v1/dags`) does not validate the DAG name before passing it to the file store. While `RenameDAG` calls `core.ValidateDAGName()` to reject names containing path separators (line 273 in `dags.go`), `CreateNewDAG` skips this validation entirely and passes user input directly to `dagStore.Create()`. In `internal/persis/filedag/store.go`, the `generateFilePat

thehackerwire@mastodon.social at 2026-03-24T20:29:21.000Z ##

🟠 CVE-2026-33344 - High (8.1)

Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0 to before version 2.3.1, the fix for CVE-2026-27598 added ValidateDAGName to CreateNewDAG and rewrote generateFilePath to use filepath.Base. This patched the CREATE p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27210(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-02-23T22:27:55

1 posts

### Impact The hot spot `attributes` configuration property allowed any attribute to be set, including HTML event handler attributes, allowing for potential XSS attacks. This affects websites hosting the standalone viewer HTML file and any other use of untrusted JSON config files (bypassing the protections of the `escapeHTML` parameter). As certain events fire without any additional user interacti

InfobloxThreatIntel@infosec.exchange at 2026-03-24T15:00:51.000Z ##

Dios mio! While researching a particular type of Colombian folk music, we stumbled across a .edu domain selling... accordions? Our first thought was potentially domain hijacking, but it appears to be more likely an exploitation of CVE-2026-27210 (TLDR; cross-site scripting). While the vulnerability has been patched in the plugin itself, not all pages have updated their plugins, and search engines have already indexed the poisoned pages! Pivoting led to 50+ additional domains found spread across three risky TLDs: .sbs, .pics, and .shop. The domains on .sbs and .pics appear to be config servers to exploit the vulnerability; the domains on .shop are the landing pages where victims can be scammed.

IOCs:
000o[.]sbs,0pen[.]sbs,123buys[.]shop,123me[.]shop,1bg[.]pics,1ki[.]pics,1mage[.]sbs,1ql[.]pics,1ty[.]pics,1vi[.]pics,1wr[.]pics,2ty[.]pics,569oagri[.]shop,66buys[.]shop,6ip[.]pics,6ym[.]pics,7rt[.]pics,8pi[.]pics,99buys[.]shop,99i[.]pics,9gwe[.]shop,a25n[.]shop,bk2[.]pics,bk59t[.]shop,buysok[.]shop,c68k[.]shop,cc1[.]pics,doo[.]pics,ep7[.]pics,estore-1[.]com,g9gvv[.]sbs,gaer896[.]shop,gm5[.]pics,gosok[.]shop,gt3[.]pics,h66p[.]shop,hh6[.]pics,iilvw[.]sbs,im9[.]pics,img1[.]sbs,in6[.]pics,jj3[.]pics,kk9[.]pics,lilil[.]sbs,llvvw[.]sbs,m66p6[.]shop,mebuys[.]shop,mg6[.]pics,mh8f6k[.]shop,mkk[.]pics,ms1[.]pics,nn6[.]pics,onsgs[.]com,p6[.]pics,p888p[.]shop,pan1[.]top,pic1[.]sbs,pic2[.]sbs,pt11[.]sbs,py3y[.]com,qq1[.]pics,rey89p[.]shop,shop56[.]shop,t88t8[.]shop,tp1[.]pics,tp9[.]pics,trues[.]sbs,up9[.]pics,upimg[.]sbs,uu2[.]pics,vt5[.]pics,vteyu[.]shop,vvf1[.]sbs,vvp1[.]sbs,w2w[.]pics,w88p[.]shop,wp59q[.]shop,wvlll[.]sbs,wvv1[.]sbs,wvvvv[.]sbs,x2p[.]pics,xyaer548[.]shop,yi1[.]pics

#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #seo_poisoning #seopoisoning

##

CVE-2025-43529
(8.8 HIGH)

EPSS: 0.20%

updated 2025-12-17T21:31:01

1 posts

A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, tvOS 26.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated at

8 repos

https://github.com/SimoesCTT/CTT-Apple-Silicon-Refraction

https://github.com/kmeps4/bugtest

https://github.com/SgtBattenHA/Analysis

https://github.com/zeroxjf/WebKit-UAF-ANGLE-OOB-Analysis

https://github.com/jir4vv1t/CVE-2025-43529

https://github.com/bjrjk/CVE-2025-43529

https://github.com/SimoesCTT/Convergent-Time-Theory-Enhanced-iOS-Safari-RCE-CVE-2025-43529-

https://github.com/sakyu7/sakyu7.github.io

mttaggart@infosec.exchange at 2026-03-24T21:48:09.000Z ##

@gknauss I think the thing is to move to 18.7.3, which is patched.

For devices running versions of iOS prior to 18.6, DarkSword uses CVE-2025-31277, a JIT optimization/type confusion bug which was patched by Apple in iOS 18.6. For devices running iOS 18.6-18.7, DarkSword uses CVE-2025-43529, a garbage collection bug in the Data Flow Graph (DFG) JIT layer of JavaScriptCore which was patched by Apple in iOS 18.7.3 and 26.2 after it was reported by GTIG. Both exploits develop their own fakeobj/addrof primitives, and then build arbitrary read/write primitives the same way on top of them.

I'm unaware of a compelling reason or hardware limitation to not upgrade from 18.6 to 18.7

cloud.google.com/blog/topics/t

##

CVE-2025-24201
(7.1 HIGH)

EPSS: 0.10%

updated 2025-11-13T21:31:15

1 posts

An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been e

3 repos

https://github.com/The-Maxu/CVE-2025-24201-WebKit-Vulnerability-Detector-PoC-

https://github.com/5ky9uy/glass-cage-i18-2025-24085-and-cve-2025-24201

https://github.com/JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201

Mozilla@activitypub.awakari.com at 2026-03-24T17:59:15.000Z ## Your iPhone Has a Security Hole That Hackers Already Found — And Apple Needs You to Act Now Apple issued emergency patches for a WebKit zero-day vulnerability already exploited in sophisticated t...

#CybersecurityUpdate #MobileDevPro #Apple #security #update #CVE-2025-24201 #iOS #18.3.2 #iPhone #zero-day #exploit

Origin | Interest | Match ##

CVE-2026-34055
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-26T01:00:23.000Z ##

🟠 CVE-2026-34055 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the legacy patient notes functions in `library/pnotes.inc.php` perform updates and deletes using `WHERE id = ?` with...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:00:23.000Z ##

🟠 CVE-2026-34055 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the legacy patient notes functions in `library/pnotes.inc.php` perform updates and deletes using `WHERE id = ?` with...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33696
(0 None)

EPSS: 0.00%

2 posts

N/A

offseq at 2026-03-26T00:00:42.821Z ##

🚩 CRITICAL: CVE-2026-33696 in n8n-io n8n (CVSS 9.4) - Prototype pollution enables remote code execution via XML/GSuiteAdmin nodes. Patch to 2.14.1, 2.13.3, or 1.123.27+. Restrict permissions & disable XML node as temp fix. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-26T00:00:42.000Z ##

🚩 CRITICAL: CVE-2026-33696 in n8n-io n8n (CVSS 9.4) - Prototype pollution enables remote code execution via XML/GSuiteAdmin nodes. Patch to 2.14.1, 2.13.3, or 1.123.27+. Restrict permissions & disable XML node as temp fix. radar.offseq.com/threat/cve-20 #OffSeq #n8n #CVE2026_33696

##

CVE-2026-23514
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-26T00:00:17.000Z ##

🟠 CVE-2026-23514 - High (8.8)

Kiteworks is a private data network (PDN). Versions 9.2.0 and 9.2.1 of Kiteworks Core have an access control vulnerability that allows authenticated users to access unauthorized content. Upgrade Kiteworks Core to version 9.2.2 or later to receive ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T00:00:17.000Z ##

🟠 CVE-2026-23514 - High (8.8)

Kiteworks is a private data network (PDN). Versions 9.2.0 and 9.2.1 of Kiteworks Core have an access control vulnerability that allows authenticated users to access unauthorized content. Upgrade Kiteworks Core to version 9.2.2 or later to receive ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29187
(0 None)

EPSS: 0.00%

4 posts

N/A

thehackerwire@mastodon.social at 2026-03-25T23:35:39.000Z ##

🟠 CVE-2026-29187 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:20:27.000Z ##

🟠 CVE-2026-29187 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:35:39.000Z ##

🟠 CVE-2026-29187 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:20:27.000Z ##

🟠 CVE-2026-29187 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33348
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-25T23:20:35.000Z ##

🟠 CVE-2026-33348 - High (8.7)

OpenEMR is a free and open source electronic health records and medical practice management application. Users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form are displayed on the en...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:20:35.000Z ##

🟠 CVE-2026-33348 - High (8.7)

OpenEMR is a free and open source electronic health records and medical practice management application. Users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form are displayed on the en...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24750
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-25T22:00:21.000Z ##

🟠 CVE-2026-24750 - High (7.6)

Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior to version 9.2.1, an authenticated attacker could exploit an Improper Neutralization of Input During Web Page Generation as Stored XSS when modifying forms. Upgrade Ki...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T22:00:21.000Z ##

🟠 CVE-2026-24750 - High (7.6)

Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior to version 9.2.1, an authenticated attacker could exploit an Improper Neutralization of Input During Web Page Generation as Stored XSS when modifying forms. Upgrade Ki...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30975
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-25T21:40:35.000Z ##

🟠 CVE-2026-30975 - High (8.1)

Sonarr is a PVR for Usenet and BitTorrent users. Versions prior to 4.0.16.2942 have an authentication bypass that affected users that had disabled authentication for local addresses (Authentication Required set to: `Disabled for Local Addresses`) ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:40:35.000Z ##

🟠 CVE-2026-30975 - High (8.1)

Sonarr is a PVR for Usenet and BitTorrent users. Versions prior to 4.0.16.2942 have an authentication bypass that affected users that had disabled authentication for local addresses (Authentication Required set to: `Disabled for Local Addresses`) ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

_r_netsec@infosec.exchange at 2026-03-25T12:58:05.000Z ##

CVE-2026-33656: EspoCRM ≤ 9.3.3 — Formula engine ACL gap + path traversal → authenticated RCE (full write-up + PoC) jivasecurity.com/writeups/espo

##

CVE-2026-28373
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2026-33870
(0 None)

EPSS: 0.00%

1 posts

N/A

chrisvest@mastodon.social at 2026-03-25T00:33:41.000Z ##

We're released Netty 4.2.11 and 4.1.132. These contain many bug fixes, and fixes for two CVEs both rated *high*:

- CVE-2026-33871: HTTP/2 CONTINUATION frame flood Denial of Service.
- CVE-2026-33870: HTTP/1.1 Request Smuggling vulnerability in chunked encoding parsing.

Release notes for 4.2.11: netty.io/news/2026/03/24/4-2-1
Release notes for 4.1.132: netty.io/news/2026/03/24/4-1-1

Also of note: We had 17 people contribute to Netty 4.2.11, of which 5 are new first time contributors 😲

#netty #java

##

CVE-2026-33871
(0 None)

EPSS: 0.00%

1 posts

N/A

chrisvest@mastodon.social at 2026-03-25T00:33:41.000Z ##

We're released Netty 4.2.11 and 4.1.132. These contain many bug fixes, and fixes for two CVEs both rated *high*:

- CVE-2026-33871: HTTP/2 CONTINUATION frame flood Denial of Service.
- CVE-2026-33870: HTTP/1.1 Request Smuggling vulnerability in chunked encoding parsing.

Release notes for 4.2.11: netty.io/news/2026/03/24/4-2-1
Release notes for 4.1.132: netty.io/news/2026/03/24/4-1-1

Also of note: We had 17 people contribute to Netty 4.2.11, of which 5 are new first time contributors 😲

#netty #java

##

CVE-2026-33340
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-24T20:12:47.000Z ##

🔴 CVE-2026-33340 - Critical (9.1)

LoLLMs WEBUI provides the Web user interface for Lord of Large Language and Multi modal Systems. A critical Server-Side Request Forgery (SSRF) vulnerability has been identified in all known existing versions of `lollms-webui`. The `@router.post("/...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33399
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-24T20:12:37.000Z ##

🟠 CVE-2026-33399 - High (7.7)

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, the SSRF fix applied in version 4.6.2 for CVE-2026-30839 and CVE-2026-30840 is incomplete. The validate_webhook_url_for_ssrf() protection was added to t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30840
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-24T20:12:37.000Z ##

🟠 CVE-2026-33399 - High (7.7)

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, the SSRF fix applied in version 4.6.2 for CVE-2026-30839 and CVE-2026-30840 is incomplete. The validate_webhook_url_for_ssrf() protection was added to t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33307
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-24T02:17:05.000Z ##

🟠 CVE-2026-33307 - High (7.5)

Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. In versions prior to 0.12.3 and 0.13.0, code for client certificate verification imported the certificate chain sent by the client into a fixed size `gnutls_x509_crt_t x509[]` array with...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33250
(0 None)

EPSS: 0.21%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-24T00:39:20.000Z ##

🟠 CVE-2026-33250 - High (7.5)

Freeciv21 is a free open source, turn-based, empire-building strategy game. Versions prior to 3.1.1 crash with a stack overflow when receiving specially-crafted packets. A remote attacker can use this to take down any public server. A malicious se...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33164
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-23T21:59:52.000Z ##

🟠 CVE-2026-33164 - High (7.5)

libde265 is an open source implementation of the h.265 video codec. Prior to version 1.0.17, a malformed H.265 PPS NAL unit causes a segmentation fault in pic_parameter_set::set_derived_values(). This issue has been patched in version 1.0.17.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites