## Updated at UTC 2026-03-23T09:46:32.422856

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-3587 10.0 0.00% 6 0 2026-03-23T08:16:17.360000 An unauthenticated remote attacker can exploit a hidden function in the CLI prom
CVE-2026-4602 7.5 0.00% 4 0 2026-03-23T06:16:22.070000 Versions of the package jsrsasign before 11.1.1 are vulnerable to Incorrect Conv
CVE-2026-4601 8.7 0.00% 4 0 2026-03-23T06:16:21.893000 Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Crypto
CVE-2026-4599 9.1 0.00% 4 0 2026-03-23T06:16:21.513000 Versions of the package jsrsasign from 7.0.0 and before 11.1.1 are vulnerable to
CVE-2026-4598 7.5 0.00% 4 0 2026-03-23T06:16:21.300000 Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop
CVE-2026-4565 8.8 0.00% 4 0 2026-03-23T03:31:45 A vulnerability was detected in Tenda AC21 16.03.08.16. Impacted is the function
CVE-2026-4567 9.8 0.00% 5 0 2026-03-23T03:16:00.387000 A vulnerability has been found in Tenda A15 15.13.07.13. The impacted element is
CVE-2026-4566 8.8 0.00% 4 0 2026-03-23T03:16:00.083000 A flaw has been found in Belkin F9K1122 1.00.33. The affected element is the fun
CVE-2026-4606 0 0.00% 2 0 2026-03-23T02:16:05.213000 GV Edge Recording Manager (ERM) v2.3.1 improperly runs application components wi
CVE-2026-2580 7.5 0.00% 4 1 2026-03-23T00:31:08 The WP Maps โ€“ Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory &
CVE-2026-4555 8.8 0.00% 2 0 2026-03-22T18:30:22 A weakness has been identified in D-Link DIR-513 1.10. The impacted element is t
CVE-2026-4558 8.8 0.00% 2 0 2026-03-22T18:16:06.023000 A flaw has been found in Linksys MR9600 2.0.6.206937. Affected is the function s
CVE-2026-33293 8.1 0.00% 2 0 2026-03-22T17:17:08.950000 WWBN AVideo is an open source video platform. Prior to version 26.0, the `delete
CVE-2026-4553 8.8 0.00% 2 0 2026-03-22T16:16:04.300000 A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is the function f
CVE-2026-4552 8.8 0.00% 2 0 2026-03-22T15:31:39 A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the fun
CVE-2026-4551 8.8 0.00% 2 0 2026-03-22T15:31:39 A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the
CVE-2026-4540 7.3 0.03% 2 0 2026-03-22T13:16:20.653000 A vulnerability was detected in projectworlds Online Notes Sharing System 1.0. T
CVE-2026-4543 6.3 0.18% 2 0 2026-03-22T12:32:35 A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is
CVE-2026-4314 8.8 0.04% 2 0 2026-03-22T06:30:22 The 'The Ultimate WordPress Toolkit โ€“ WP Extended' plugin for WordPress is vulne
CVE-2026-4535 8.8 0.05% 4 0 2026-03-22T06:30:22 A vulnerability has been found in Tenda FH451 1.0.0.9. This vulnerability affect
CVE-2026-4534 8.8 0.05% 5 0 2026-03-22T05:16:19.273000 A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlE
CVE-2026-4533 6.3 0.03% 2 0 2026-03-22T03:16:01.587000 A vulnerability was detected in code-projects Simple Food Ordering System 1.0. A
CVE-2026-4529 8.8 0.04% 4 0 2026-03-21T23:16:51.577000 A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the fu
CVE-2026-3629 8.1 0.04% 4 0 2026-03-21T23:16:51.393000 The Import and export users and customers plugin for WordPress is vulnerable to
CVE-2026-4373 7.5 0.10% 3 0 2026-03-21T07:16:10.380000 The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via
CVE-2026-4261 8.8 0.04% 3 0 2026-03-21T06:30:39 The Expire Users plugin for WordPress is vulnerable to Privilege Escalation in a
CVE-2026-3478 7.2 0.07% 1 0 2026-03-21T06:30:38 The Content Syndication Toolkit plugin for WordPress is vulnerable to Server-Sid
CVE-2026-3334 8.8 0.03% 2 0 2026-03-21T06:30:36 The CMS Commander plugin for WordPress is vulnerable to SQL Injection via the 'o
CVE-2026-1648 7.2 0.04% 1 0 2026-03-21T06:30:32 The Performance Monitor plugin for WordPress is vulnerable to Server-Side Reques
CVE-2026-2941 8.8 0.04% 2 0 2026-03-21T06:30:25 The Linksy Search and Replace plugin for WordPress is vulnerable to unauthorized
CVE-2025-14037 8.1 0.04% 2 0 2026-03-21T06:30:23 The Invelity Product Feeds plugin for WordPress is vulnerable to arbitrary file
CVE-2026-2468 7.5 0.07% 2 1 2026-03-21T04:17:02.577000 The Quentn WP plugin for WordPress is vulnerable to SQL Injection via the 'qntn_
CVE-2026-1800 7.5 0.07% 2 0 2026-03-21T04:16:54.520000 The Fonts Manager | Custom Fonts plugin for WordPress is vulnerable to time-base
CVE-2026-1313 8.3 0.04% 3 0 2026-03-21T04:16:52.630000 The MimeTypes Link Icons plugin for WordPress is vulnerable to Server-Side Reque
CVE-2026-32042 8.8 0.10% 2 0 2026-03-21T03:31:17 OpenClaw versions 2026.2.22 prior to 2026.2.25 contain a privilege escalation vu
CVE-2026-32055 7.6 0.06% 2 0 2026-03-21T03:31:15 OpenClaw versions prior to 2026.2.26 contain a path traversal vulnerability in w
CVE-2026-32064 7.7 0.04% 2 0 2026-03-21T03:31:15 OpenClaw versions prior to 2026.2.21 sandbox browser entrypoint launches x11vnc
CVE-2026-32049 7.5 0.10% 2 0 2026-03-21T03:31:14 OpenClaw versions prior to 2026.2.22 fail to consistently enforce configured inb
CVE-2026-32051 8.8 0.06% 2 0 2026-03-21T03:31:14 OpenClaw versions prior to 2026.3.1 contain an authorization mismatch vulnerabil
CVE-2026-32056 7.5 0.15% 2 0 2026-03-21T01:17:09.103000 OpenClaw versions prior to 2026.2.22 fail to sanitize shell startup environment
CVE-2026-32048 7.5 0.04% 2 0 2026-03-21T01:17:07.510000 OpenClaw versions prior to 2026.3.1 fail to enforce sandbox inheritance during c
CVE-2026-24060 9.1 0.02% 4 0 2026-03-21T00:32:49 Service information is not encrypted when transmitted as BACnet packets over th
CVE-2026-3584 9.8 0.22% 2 0 2026-03-21T00:32:48 The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in al
CVE-2026-25192 9.4 0.13% 4 0 2026-03-21T00:32:47 WebSocket endpoints lack proper authentication mechanisms, enabling attackers to
CVE-2026-29796 9.4 0.10% 4 0 2026-03-21T00:31:52 WebSocket endpoints lack proper authentication mechanisms, enabling attackers to
CVE-2026-31904 7.5 0.08% 2 0 2026-03-21T00:31:51 The WebSocket Application Programming Interface lacks restrictions on the number
CVE-2026-25086 7.7 0.01% 2 0 2026-03-21T00:31:51 Under certain conditions, an attacker could bind to the same port used by WebCT
CVE-2026-23536 7.5 0.07% 1 0 2026-03-21T00:31:45 A security issue was discovered in the Feast Feature Server's `/read-document` e
CVE-2026-32666 7.5 0.04% 2 0 2026-03-21T00:16:26.220000 WebCTRL systems that communicate over BACnet inherit the protocol's lack of net
CVE-2026-33476 7.5 0.89% 2 0 2026-03-20T23:16:48.137000 SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Si
CVE-2026-33236 8.1 0.04% 2 0 2026-03-20T23:16:47.007000 NLTK (Natural Language Toolkit) is a suite of open source Python modules, data s
CVE-2026-33203 7.5 0.10% 2 0 2026-03-20T23:16:45.520000 SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Si
CVE-2026-33186 9.1 0.01% 2 0 2026-03-20T23:16:45.180000 gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have
CVE-2026-33180 7.5 0.03% 2 0 2026-03-20T23:16:45.020000 HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare i
CVE-2026-31903 7.5 0.07% 2 0 2026-03-20T23:16:43.813000 The WebSocket Application Programming Interface lacks restrictions on the number
CVE-2026-33172 8.7 0.01% 2 0 2026-03-20T22:16:28.973000 Statamic is a Laravel and Git powered content management system (CMS). Prior to
CVE-2026-33166 8.6 0.01% 2 0 2026-03-20T22:16:28.660000 Allure 2 is the version 2.x branch of Allure Report, a multi-language test repor
CVE-2026-21992 9.8 0.03% 11 1 2026-03-20T22:16:26.933000 Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware
CVE-2026-33154 7.5 0.04% 1 0 2026-03-20T21:34:04 ### Summary Dynaconf is vulnerable to Server-Side Template Injection (SSTI) due
CVE-2026-33142 8.1 0.03% 1 0 2026-03-20T21:33:29 The fix for GHSA-p5g2-jm85-8g35 (ClickHouse SQL injection via aggregate query pa
CVE-2026-33010 8.1 0.03% 1 0 2026-03-20T21:32:24 ### Summary When the HTTP server is enabled (`MCP_HTTP_ENABLED=true`), the appli
CVE-2026-4497 7.3 1.91% 2 0 2026-03-20T21:31:34 A vulnerability was determined in Totolink WA300 5.2cu.7112_B20190227. Affected
CVE-2025-54068 9.8 48.85% 3 5 template 2026-03-20T21:28:57 ### Impact In Livewire v3 (โ‰ค 3.6.3), a vulnerability allows unauthenticated atta
CVE-2025-32432 10.0 89.44% 3 4 template 2026-03-20T21:28:38 ### Impact This is an additional fix for https://github.com/craftcms/cms/securi
CVE-2026-33068 None 0.14% 2 0 2026-03-20T21:24:22 Claude Code resolved the permission mode from settings files, including the repo
CVE-2026-33057 9.8 0.12% 1 0 2026-03-20T21:23:52 #### Summary An explicit web endpoint inside the `ai/` testing module infrastruc
CVE-2026-33054 10.0 0.02% 1 0 2026-03-20T21:23:23 #### Summary A Path Traversal vulnerability allows any user (or attacker) supply
CVE-2026-33043 8.1 0.03% 2 0 2026-03-20T21:23:01 ### Summary `/objects/phpsessionid.json.php` exposes the current PHP session ID
CVE-2026-33039 8.6 0.01% 1 0 2026-03-20T21:22:41 ## Summary The `plugin/LiveLinks/proxy.php` endpoint validates user-supplied URL
CVE-2026-33038 8.1 0.04% 1 0 2026-03-20T21:22:32 ## Summary The `install/checkConfiguration.php` endpoint performs full applicati
CVE-2026-33012 7.5 0.10% 1 0 2026-03-20T21:21:56 `DefaultHtmlErrorResponseBodyProvider` in `io.micronaut:micronaut-http-server` s
CVE-2026-32940 9.3 0.05% 1 0 2026-03-20T21:21:11 # SanitizeSVG bypass via data:text/xml in getDynamicIcon (incomplete fix for CVE
CVE-2026-32938 9.9 0.09% 1 0 2026-03-20T21:21:06 ### Summary In SiYuan, `/api/lute/html2BlockDOM` on the desktop copies local fi
CVE-2026-32025 7.5 0.05% 1 0 2026-03-20T21:13:30 This issue is a browser-origin WebSocket auth chain on local loopback deployment
CVE-2026-32011 7.5 0.04% 1 0 2026-03-20T21:13:05 ## Impact OpenClaw webhook handlers for BlueBubbles and Google Chat accepted an
CVE-2026-22731 8.2 0.04% 1 0 2026-03-20T20:41:31 Spring Boot applications with Actuator can be vulnerable to an "Authentication B
CVE-2026-33128 7.5 0.02% 1 0 2026-03-20T20:00:21.330000 H3 is a minimal H(TTP) framework. In versions prior to 1.15.6 and between 2.0.0
CVE-2026-33053 8.8 0.02% 2 0 2026-03-20T19:39:11.410000 Langflow is a tool for building and deploying AI-powered agents and workflows. I
CVE-2026-4444 8.8 0.06% 2 0 2026-03-20T19:32:16.683000 Stack buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed
CVE-2026-33017 0 0.46% 8 3 2026-03-20T19:16:17.980000 Langflow is a tool for building and deploying AI-powered agents and workflows. I
CVE-2026-32318 7.6 0.01% 1 0 2026-03-20T19:16:16.277000 Cryptomator for IOS offers multi-platform transparent client-side encryption for
CVE-2026-4447 8.8 0.09% 2 0 2026-03-20T19:02:02.303000 Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allo
CVE-2025-31277 8.8 0.39% 3 0 2026-03-20T18:53:35.083000 The issue was addressed with improved memory handling. This issue is fixed in Sa
CVE-2025-43510 7.8 0.40% 3 0 2026-03-20T18:39:56.413000 A memory corruption issue was addressed with improved lock state checking. This
CVE-2025-43520 7.1 0.41% 3 0 2026-03-20T18:39:07.610000 A memory corruption issue was addressed with improved memory handling. This issu
CVE-2026-4491 8.8 0.05% 1 0 2026-03-20T18:31:30 A vulnerability has been found in Tenda A18 Pro 02.03.02.28. Impacted is the fun
CVE-2026-4493 8.8 0.05% 1 0 2026-03-20T18:31:30 A vulnerability was determined in Tenda A18 Pro 02.03.02.28. The impacted elemen
CVE-2026-4490 8.8 0.05% 1 0 2026-03-20T18:31:29 A flaw has been found in Tenda A18 Pro 02.03.02.28. This issue affects the funct
CVE-2026-4492 8.8 0.05% 1 0 2026-03-20T18:31:28 A vulnerability was found in Tenda A18 Pro 02.03.02.28. The affected element is
CVE-2026-32989 8.8 0.05% 1 0 2026-03-20T18:31:27 Precurio Intranet Portal 4.4 contains a cross-site request forgery vulnerability
CVE-2026-4489 8.8 0.05% 1 0 2026-03-20T18:31:27 A vulnerability was detected in Tenda A18 Pro 02.03.02.28. This vulnerability af
CVE-2026-4464 8.8 0.07% 2 0 2026-03-20T18:31:18 Integer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a rem
CVE-2026-32303 7.6 0.02% 1 0 2026-03-20T18:16:14.593000 Cryptomator encrypts data being stored on cloud infrastructure. Prior to version
CVE-2026-31836 8.1 0.03% 1 0 2026-03-20T18:16:13.540000 Checkmate is an open-source, self-hosted tool designed to track and monitor serv
CVE-2026-33001 8.8 0.11% 1 0 2026-03-20T18:08:15.507000 Jenkins 2.554 and earlier, LTS 2.541.2 and earlier does not safely handle symbol
CVE-2026-4452 8.8 0.07% 2 0 2026-03-20T18:07:58.067000 Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.153 al
CVE-2026-4457 8.8 0.07% 2 0 2026-03-20T17:58:59.643000 Type Confusion in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote a
CVE-2026-4458 8.8 0.03% 2 0 2026-03-20T17:58:37.903000 Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an
CVE-2026-4459 8.8 0.07% 2 0 2026-03-20T17:58:07.797000 Out of bounds read and write in WebAudio in Google Chrome prior to 146.0.7680.15
CVE-2026-4463 8.8 0.06% 2 0 2026-03-20T17:57:06.217000 Heap buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed
CVE-2026-4488 8.8 0.04% 1 0 2026-03-20T16:16:19.093000 A vulnerability was identified in UTT HiPER 1250GW up to 3.2.7-210907-180535. Af
CVE-2026-32701 7.5 0.02% 1 0 2026-03-20T15:56:45 **Summary** Qwik City improperly inferred arrays from dotted form field names d
CVE-2026-4462 8.8 0.07% 2 0 2026-03-20T15:32:14 Out of bounds read in Blink in Google Chrome prior to 146.0.7680.153 allowed a r
CVE-2026-4446 8.8 0.09% 2 0 2026-03-20T15:32:13 Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remo
CVE-2026-4445 8.8 0.09% 2 0 2026-03-20T15:32:13 Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remo
CVE-2026-4456 8.8 0.10% 2 0 2026-03-20T15:32:13 Use after free in Digital Credentials API in Google Chrome prior to 146.0.7680.1
CVE-2026-4455 8.8 0.07% 2 0 2026-03-20T15:32:13 Heap buffer overflow in PDFium in Google Chrome prior to 146.0.7680.153 allowed
CVE-2026-4451 8.8 0.10% 2 0 2026-03-20T15:32:13 Insufficient validation of untrusted input in Navigation in Google Chrome prior
CVE-2026-4486 8.8 0.08% 1 0 2026-03-20T15:31:20 A vulnerability was found in D-Link DIR-513 1.10. This affects the function form
CVE-2026-4454 8.8 0.10% 2 0 2026-03-20T15:31:12 Use after free in Network in Google Chrome prior to 146.0.7680.153 allowed a rem
CVE-2026-4461 8.8 0.07% 2 0 2026-03-20T15:31:12 Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allo
CVE-2026-4460 8.8 0.07% 2 0 2026-03-20T15:31:12 Out of bounds read in Skia in Google Chrome prior to 146.0.7680.153 allowed a re
CVE-2026-4487 8.8 0.04% 1 0 2026-03-20T15:16:23.850000 A vulnerability was determined in UTT HiPER 1200GW up to 2.5.3-170306. This impa
CVE-2026-32767 9.8 0.02% 1 0 2026-03-20T15:16:17.220000 SiYuan is a personal knowledge management system. Versions 3.6.0 and below conta
CVE-2026-22732 9.1 0.01% 2 0 2026-03-20T15:16:15.670000 When applications specify HTTP response headers for servlet applications using S
CVE-2026-22172 9.9 0.01% 1 0 2026-03-20T15:16:15.490000 OpenClaw versions prior to 2026.3.12 contain an authorization bypass vulnerabili
CVE-2025-71260 8.8 6.54% 2 1 2026-03-20T13:39:46.493000 BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserializa
CVE-2025-71259 4.3 1.87% 2 0 template 2026-03-20T13:39:46.493000 BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind serve
CVE-2026-4428 7.4 0.02% 1 0 2026-03-20T13:39:46.493000 A logic error in CRL distribution point validation in AWS-LC before 1.71.0 cause
CVE-2026-32014 8.0 0.02% 1 0 2026-03-20T13:39:46.493000 OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability w
CVE-2026-32013 8.8 0.08% 1 0 2026-03-20T13:39:46.493000 OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability i
CVE-2026-32194 9.8 0.10% 1 1 2026-03-20T13:39:46.493000 Improper neutralization of special elements used in a command ('command injectio
CVE-2026-33056 0 0.02% 4 0 2026-03-20T13:37:50.737000 tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and
CVE-2026-32933 7.5 0.04% 2 0 2026-03-20T13:37:50.737000 AutoMapper is a convention-based object-object mapper in .NET. Versions prior to
CVE-2026-33037 8.1 0.23% 2 0 2026-03-20T13:37:50.737000 WWBN AVideo is an open source video platform. In versions 25.0 and below, the of
CVE-2026-4038 9.8 0.06% 2 0 2026-03-20T13:37:50.737000 The Aimogen Pro plugin for WordPress is vulnerable to Arbitrary Function Call th
CVE-2026-33036 7.5 0.04% 1 0 2026-03-20T13:37:50.737000 fast-xml-parser allows users to process XML from JS object without C/C++ based l
CVE-2026-4478 8.1 0.01% 2 0 2026-03-20T13:37:50.737000 A vulnerability was identified in Yi Technology YI Home Camera 2 2.1.1_201710241
CVE-2026-27625 8.1 0.06% 1 0 2026-03-20T13:37:50.737000 Stirling-PDF is a locally hosted web application that performs various operation
CVE-2026-32721 8.6 0.01% 1 0 2026-03-20T13:37:50.737000 LuCI is the OpenWrt Configuration Interface. Versions prior to both 24.10.5 and
CVE-2026-22324 8.1 0.11% 1 0 2026-03-20T12:31:12 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-4475 8.8 0.02% 3 0 2026-03-20T09:32:16 A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_201710241
CVE-2026-32985 9.8 0.64% 1 0 2026-03-20T00:31:34 Xerte Online Toolkits versions 3.14 and earlier contain an unauthenticated arbit
CVE-2026-32038 None 0.04% 1 0 2026-03-19T22:29:35 ### Summary In `openclaw@2026.2.23`, sandbox network hardening blocks `network=h
CVE-2026-32596 None 3.03% 2 0 template 2026-03-19T21:01:58 ### Summary Glances web server runs without authentication by default when start
CVE-2026-28500 8.6 0.01% 2 0 2026-03-19T18:36:41 ### Summary A security control bypass exists in onnx.hub.load() due to improper
CVE-2026-20131 10.0 0.88% 5 3 2026-03-19T18:32:21 A vulnerability in the web-based management interface of Cisco Secure Firewall M
CVE-2026-24291 7.8 0.06% 2 2 2026-03-19T17:16:22.987000 Incorrect permission assignment for critical resource in Windows Accessibility I
CVE-2026-33292 7.5 0.00% 2 0 2026-03-19T16:43:07 ## Summary The HLS streaming endpoint (`view/hls.php`) is vulnerable to a path
CVE-2025-71258 4.3 1.87% 2 0 template 2026-03-19T15:31:28 BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind serve
CVE-2026-22557 10.0 0.03% 4 1 2026-03-19T15:31:22 A malicious actor with access to the network could exploit a Path Traversal vuln
CVE-2025-71257 7.3 3.58% 2 1 template 2026-03-19T15:31:21 BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentica
CVE-2026-20963 8.8 9.14% 3 0 2026-03-19T13:09:24.293000 Deserialization of untrusted data in Microsoft Office SharePoint allows an autho
CVE-2026-33231 7.5 0.04% 2 0 2026-03-19T12:42:23 ### Summary `nltk.app.wordnet_app` allows unauthenticated remote shutdown of the
CVE-2026-33226 8.7 0.01% 2 0 2026-03-18T20:22:12 ### Summary The REST datasource query preview endpoint (`POST /api/queries/previ
CVE-2026-33204 7.5 0.04% 2 0 2026-03-18T20:16:59 ## Summary An unauthenticated attacker can perform a Denial of Service via JWE
CVE-2025-66376 7.2 11.43% 1 0 2026-03-18T20:13:37.087000 Zimbra Collaboration (ZCS) 10 before 10.0.18 and 10.1 before 10.1.13 allows Clas
CVE-2026-22730 8.8 0.02% 1 1 2026-03-18T16:16:26.157000 A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionCon
CVE-2026-32746 9.8 0.03% 2 4 2026-03-18T15:30:44 telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMO
CVE-2026-3564 9.0 0.06% 1 0 2026-03-18T14:52:44.227000 A condition in ScreenConnect may allow an actor with access to server-level cryp
CVE-2026-3888 7.8 0.01% 2 3 2026-03-18T04:17:30.720000 Local privilege escalation in snapd on Linux allows local attackers to get root
CVE-2026-32306 9.9 0.40% 1 0 2026-03-17T20:08:56.733000 OneUptime is a solution for monitoring and managing online services. Prior to 10
CVE-2026-32583 5.3 2.73% 2 0 template 2026-03-16T18:32:14 Missing Authorization vulnerability in Webnus Inc. Modern Events Calendar allows
CVE-2026-31979 8.8 0.02% 2 0 2026-03-16T18:18:34.750000 Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune.
CVE-2026-3838 8.8 1.57% 2 0 2026-03-16T15:30:56 Unraid Update Request Path Traversal Remote Code Execution Vulnerability. This v
CVE-2026-2493 7.5 15.24% 2 0 2026-03-16T15:30:55 IceWarp collaboration Directory Traversal Information Disclosure Vulnerability.
CVE-2025-15060 9.8 1.71% 2 0 2026-03-16T15:30:53 claude-hovercraft executeClaudeCode Command Injection Remote Code Execution Vuln
CVE-2026-25896 9.3 0.01% 1 0 2026-03-02T14:54:02.760000 fast-xml-parser allows users to validate XML, parse XML to JS object, or build X
CVE-2025-32711 9.3 3.89% 1 1 2026-02-20T17:25:10.630000 Ai command injection in M365 Copilot allows an unauthorized attacker to disclose
CVE-2026-1581 7.5 11.33% 2 1 template 2026-02-19T18:32:09 The wpForo Forum plugin for WordPress is vulnerable to time-based SQL Injection
CVE-2026-20817 7.8 0.02% 3 1 2026-01-13T18:31:17 Improper handling of insufficient permissions or privileges in Windows Error Rep
CVE-2025-32975 10.0 0.13% 3 0 2025-11-03T20:18:29.263000 Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef
CVE-2025-20720 8.8 0.03% 2 0 2025-10-15T21:31:40 In wlan AP driver, there is a possible out of bounds write due to an incorrect b
CVE-2025-41241 4.4 0.05% 1 0 2025-07-29T14:14:29.590000 VMware vCenter contains a denial-of-service vulnerability.ย A malicious actor who
CVE-2024-13448 9.8 3.02% 1 0 2025-01-30T18:01:07.080000 The ThemeREX Addons plugin for WordPress is vulnerable to arbitrary file uploads
CVE-2023-4567 0 0.00% 1 0 2023-11-07T04:22:45.730000 Rejected reason: Issue has been found to be non-reproducible, therefore not a vi
CVE-2018-0204 7.5 1.69% 2 0 2023-02-01T05:08:53 A vulnerability in the web portal of the Cisco Prime Collaboration Provisioning
CVE-2026-33134 0 0.03% 5 0 N/A
CVE-2026-32888 0 0.03% 2 0 N/A
CVE-2026-33243 0 0.01% 2 0 N/A
CVE-2026-33135 0 0.03% 2 0 N/A
CVE-2026-33250 0 0.00% 1 0 N/A
CVE-2026-32891 0 0.03% 1 0 N/A
CVE-2026-32890 0 0.05% 1 0 N/A
CVE-2026-33072 0 0.01% 1 0 N/A
CVE-2026-33136 0 0.03% 1 0 N/A
CVE-2026-33150 0 0.01% 1 0 N/A
CVE-2026-33156 0 0.01% 1 0 N/A
CVE-2026-32710 0 0.26% 1 0 N/A
CVE-2026-32317 0 0.01% 1 0 N/A
CVE-2026-33308 0 0.00% 1 0 N/A
CVE-2026-33307 0 0.00% 1 0 N/A
CVE-2026-33075 0 0.03% 1 0 N/A
CVE-2026-33024 0 0.08% 1 0 N/A
CVE-2026-29103 0 0.20% 1 0 N/A

CVE-2026-3587
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-03-23T08:16:17.360000

6 posts

An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface and gain root access to the underlying Linux based OS, leading to full compromise of the device.

offseq at 2026-03-23T09:00:32.856Z ##

WAGO 852-1812 switch hit with CRITICAL CVE-2026-3587 (CVSS 10.0): hidden CLI lets remote attackers gain root with no auth. No patch yet. Isolate, restrict access, & monitor closely. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-23T08:16:56.000Z ##

๐Ÿ”ด CVE-2026-3587 - Critical (10)

An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface and gain root access to the underlying Linux based OS, leading to full compromise of the device.

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

certvde at 2026-03-23T08:02:01.058Z ##

VDE-2026-020
WAGO: Vulnerability in managed switches

A vulnerability has been found affecting the Managed Switches of WAGO. An unauthenticated attacker can fully compromise the device via an undocumented function.
CVE-2026-3587

certvde.com/en/advisories/vde-

wago.csaf-tp.certvde.com/.well

##

offseq@infosec.exchange at 2026-03-23T09:00:32.000Z ##

WAGO 852-1812 switch hit with CRITICAL CVE-2026-3587 (CVSS 10.0): hidden CLI lets remote attackers gain root with no auth. No patch yet. Isolate, restrict access, & monitor closely. radar.offseq.com/threat/cve-20 #OffSeq #ICS #Infosec #Vulnerability

##

thehackerwire@mastodon.social at 2026-03-23T08:16:56.000Z ##

๐Ÿ”ด CVE-2026-3587 - Critical (10)

An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface and gain root access to the underlying Linux based OS, leading to full compromise of the device.

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

certvde@infosec.exchange at 2026-03-23T08:02:01.000Z ##

#OT #Advisory VDE-2026-020
WAGO: Vulnerability in managed switches

A vulnerability has been found affecting the Managed Switches of WAGO. An unauthenticated attacker can fully compromise the device via an undocumented function.
#CVE CVE-2026-3587

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-4602
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-23T06:16:22.070000

4 posts

Versions of the package jsrsasign before 11.1.1 are vulnerable to Incorrect Conversion between Numeric Types due to handling negative exponents in ext/jsbn2.js. An attacker can force the computation of incorrect modular inverses and break signature verification by calling modPow with a negative exponent.

thehackerwire@mastodon.social at 2026-03-23T06:32:47.000Z ##

๐ŸŸ  CVE-2026-4602 - High (7.5)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Incorrect Conversion between Numeric Types due to handling negative exponents in ext/jsbn2.js. An attacker can force the computation of incorrect modular inverses and break signatur...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T06:17:55.000Z ##

๐ŸŸ  CVE-2026-4602 - High (7.5)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Incorrect Conversion between Numeric Types due to handling negative exponents in ext/jsbn2.js. An attacker can force the computation of incorrect modular inverses and break signatur...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T06:32:47.000Z ##

๐ŸŸ  CVE-2026-4602 - High (7.5)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Incorrect Conversion between Numeric Types due to handling negative exponents in ext/jsbn2.js. An attacker can force the computation of incorrect modular inverses and break signatur...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T06:17:55.000Z ##

๐ŸŸ  CVE-2026-4602 - High (7.5)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Incorrect Conversion between Numeric Types due to handling negative exponents in ext/jsbn2.js. An attacker can force the computation of incorrect modular inverses and break signatur...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4601
(8.7 HIGH)

EPSS: 0.00%

updated 2026-03-23T06:16:21.893000

4 posts

Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Cryptographic Step via the KJUR.crypto.DSA.signWithMessageHash process in the DSA signing implementation. An attacker can recover the private key by forcing r or s to be zero, so the library emits an invalid signature without retrying, and then solves for x from the resulting signature.

offseq at 2026-03-23T07:30:30.334Z ##

๐Ÿ›ก๏ธ CVE-2026-4601: CRITICAL bug in jsrsasign <11.1.1 misses a vital DSA signing step, letting attackers recover private keys if exploited. No active attacks yet, but update ASAP! Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-23T06:18:16.000Z ##

๐ŸŸ  CVE-2026-4601 - High (8.7)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Cryptographic Step via the KJUR.crypto.DSA.signWithMessageHash process in the DSA signing implementation. An attacker can recover the private key by forcing r or s to be zer...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-23T07:30:30.000Z ##

๐Ÿ›ก๏ธ CVE-2026-4601: CRITICAL bug in jsrsasign <11.1.1 misses a vital DSA signing step, letting attackers recover private keys if exploited. No active attacks yet, but update ASAP! Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE20264601 #Crypto #Vuln

##

thehackerwire@mastodon.social at 2026-03-23T06:18:16.000Z ##

๐ŸŸ  CVE-2026-4601 - High (8.7)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Cryptographic Step via the KJUR.crypto.DSA.signWithMessageHash process in the DSA signing implementation. An attacker can recover the private key by forcing r or s to be zer...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4599
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-03-23T06:16:21.513000

4 posts

Versions of the package jsrsasign from 7.0.0 and before 11.1.1 are vulnerable to Incomplete Comparison with Missing Factors via the getRandomBigIntegerZeroToMax and getRandomBigIntegerMinToMax functions in src/crypto-1.1.js; an attacker can recover the private key by exploiting the incorrect compareTo checks that accept out-of-range candidates and thus bias DSA nonces during signature generation.

thehackerwire@mastodon.social at 2026-03-23T06:33:05.000Z ##

๐Ÿ”ด CVE-2026-4599 - Critical (9.1)

Versions of the package jsrsasign from 7.0.0 and before 11.1.1 are vulnerable to Incomplete Comparison with Missing Factors via the getRandomBigIntegerZeroToMax and getRandomBigIntegerMinToMax functions in src/crypto-1.1.js; an attacker can recove...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T06:18:14.000Z ##

๐Ÿ”ด CVE-2026-4599 - Critical (9.1)

Versions of the package jsrsasign from 7.0.0 and before 11.1.1 are vulnerable to Incomplete Comparison with Missing Factors via the getRandomBigIntegerZeroToMax and getRandomBigIntegerMinToMax functions in src/crypto-1.1.js; an attacker can recove...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T06:33:05.000Z ##

๐Ÿ”ด CVE-2026-4599 - Critical (9.1)

Versions of the package jsrsasign from 7.0.0 and before 11.1.1 are vulnerable to Incomplete Comparison with Missing Factors via the getRandomBigIntegerZeroToMax and getRandomBigIntegerMinToMax functions in src/crypto-1.1.js; an attacker can recove...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T06:18:14.000Z ##

๐Ÿ”ด CVE-2026-4599 - Critical (9.1)

Versions of the package jsrsasign from 7.0.0 and before 11.1.1 are vulnerable to Incomplete Comparison with Missing Factors via the getRandomBigIntegerZeroToMax and getRandomBigIntegerMinToMax functions in src/crypto-1.1.js; an attacker can recove...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4598
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-23T06:16:21.300000

4 posts

Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop via the bnModInverse function in ext/jsbn2.js when the BigInteger.modInverse implementation receives zero or negative inputs, allowing an attacker to hang the process permanently by supplying such crafted values (e.g., modInverse(0, m) or modInverse(-1, m)).

thehackerwire@mastodon.social at 2026-03-23T06:32:56.000Z ##

๐ŸŸ  CVE-2026-4598 - High (7.5)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop via the bnModInverse function in ext/jsbn2.js when the BigInteger.modInverse implementation receives zero or negative inputs, allowing an attacker to hang the process ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T06:18:05.000Z ##

๐ŸŸ  CVE-2026-4598 - High (7.5)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop via the bnModInverse function in ext/jsbn2.js when the BigInteger.modInverse implementation receives zero or negative inputs, allowing an attacker to hang the process ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T06:32:56.000Z ##

๐ŸŸ  CVE-2026-4598 - High (7.5)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop via the bnModInverse function in ext/jsbn2.js when the BigInteger.modInverse implementation receives zero or negative inputs, allowing an attacker to hang the process ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T06:18:05.000Z ##

๐ŸŸ  CVE-2026-4598 - High (7.5)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop via the bnModInverse function in ext/jsbn2.js when the BigInteger.modInverse implementation receives zero or negative inputs, allowing an attacker to hang the process ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4565
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-23T03:31:45

4 posts

A vulnerability was detected in Tenda AC21 16.03.08.16. Impacted is the function formSetQosBand of the file /goform/SetNetControlList. Performing a manipulation of the argument list results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

offseq at 2026-03-23T01:30:28.815Z ##

๐Ÿšจ HIGH: CVE-2026-4565 โ€” Tenda AC21 (16.03.08.16) has a remote buffer overflow in /goform/SetNetControlList. Public exploit out; full device compromise possible. Disable WAN admin, monitor, and segment networks ASAP. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-23T01:26:57.000Z ##

๐ŸŸ  CVE-2026-4565 - High (8.8)

A vulnerability was detected in Tenda AC21 16.03.08.16. Impacted is the function formSetQosBand of the file /goform/SetNetControlList. Performing a manipulation of the argument list results in buffer overflow. The attack can be initiated remotely....

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-23T01:30:28.000Z ##

๐Ÿšจ HIGH: CVE-2026-4565 โ€” Tenda AC21 (16.03.08.16) has a remote buffer overflow in /goform/SetNetControlList. Public exploit out; full device compromise possible. Disable WAN admin, monitor, and segment networks ASAP. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #NetSec #Router

##

thehackerwire@mastodon.social at 2026-03-23T01:26:57.000Z ##

๐ŸŸ  CVE-2026-4565 - High (8.8)

A vulnerability was detected in Tenda AC21 16.03.08.16. Impacted is the function formSetQosBand of the file /goform/SetNetControlList. Performing a manipulation of the argument list results in buffer overflow. The attack can be initiated remotely....

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4567
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-23T03:16:00.387000

5 posts

A vulnerability has been found in Tenda A15 15.13.07.13. The impacted element is the function UploadCfg of the file /cgi-bin/UploadCfg. The manipulation of the argument File leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Matchbook3469@mastodon.social at 2026-03-23T07:45:35.000Z ##

๐Ÿ”ด New security advisory:

CVE-2026-4567 affects multiple systems.

โ€ข Impact: Remote code execution or complete system compromise possible
โ€ข Risk: Attackers can gain full control of affected systems
โ€ข Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

thehackerwire@mastodon.social at 2026-03-23T03:18:40.000Z ##

๐Ÿ”ด CVE-2026-4567 - Critical (9.8)

A vulnerability has been found in Tenda A15 15.13.07.13. The impacted element is the function UploadCfg of the file /cgi-bin/UploadCfg. The manipulation of the argument File leads to stack-based buffer overflow. The attack may be initiated remotel...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-03-23T03:00:27.381Z ##

๐Ÿ”ฅ CVE-2026-4567: Critical stack buffer overflow in Tenda A15 (v15.13.07.13). Remote, unauthenticated code execution possible via /cgi-bin/UploadCfg. Patch or restrict access immediately! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-23T03:18:40.000Z ##

๐Ÿ”ด CVE-2026-4567 - Critical (9.8)

A vulnerability has been found in Tenda A15 15.13.07.13. The impacted element is the function UploadCfg of the file /cgi-bin/UploadCfg. The manipulation of the argument File leads to stack-based buffer overflow. The attack may be initiated remotel...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-23T03:00:27.000Z ##

๐Ÿ”ฅ CVE-2026-4567: Critical stack buffer overflow in Tenda A15 (v15.13.07.13). Remote, unauthenticated code execution possible via /cgi-bin/UploadCfg. Patch or restrict access immediately! radar.offseq.com/threat/cve-20 #OffSeq #infosec #routersecurity #CVE20264567

##

CVE-2026-4566
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-23T03:16:00.083000

4 posts

A flaw has been found in Belkin F9K1122 1.00.33. The affected element is the function formWISP5G of the file /goform/formWISP5G. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-03-23T03:19:00.000Z ##

๐ŸŸ  CVE-2026-4566 - High (8.8)

A flaw has been found in Belkin F9K1122 1.00.33. The affected element is the function formWISP5G of the file /goform/formWISP5G. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched r...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T03:18:33.000Z ##

๐ŸŸ  CVE-2026-4566 - High (8.8)

A flaw has been found in Belkin F9K1122 1.00.33. The affected element is the function formWISP5G of the file /goform/formWISP5G. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched r...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T03:19:00.000Z ##

๐ŸŸ  CVE-2026-4566 - High (8.8)

A flaw has been found in Belkin F9K1122 1.00.33. The affected element is the function formWISP5G of the file /goform/formWISP5G. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched r...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T03:18:33.000Z ##

๐ŸŸ  CVE-2026-4566 - High (8.8)

A flaw has been found in Belkin F9K1122 1.00.33. The affected element is the function formWISP5G of the file /goform/formWISP5G. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched r...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4606
(0 None)

EPSS: 0.00%

updated 2026-03-23T02:16:05.213000

2 posts

GV Edge Recording Manager (ERM) v2.3.1 improperly runs application components with SYSTEM-level privileges, allowing any local user to gain full control of the operating system.ย  During installation, ERM creates a Windows service that runs under the LocalSystem account.ย  When the ERM application is launched, related processes are spawned under SYSTEM privileges rather than the security context o

offseq at 2026-03-23T04:30:28.054Z ##

๐Ÿšจ CRITICAL: CVE-2026-4606 in GeoVision GV-Edge Recording Manager 2.3.1 allows any local user to escalate to SYSTEM privileges (CVSS 10.0). Patch or restrict local access now! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-23T04:30:28.000Z ##

๐Ÿšจ CRITICAL: CVE-2026-4606 in GeoVision GV-Edge Recording Manager 2.3.1 allows any local user to escalate to SYSTEM privileges (CVSS 10.0). Patch or restrict local access now! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #WindowsSecurity #GeoVision

##

CVE-2026-2580
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-23T00:31:08

4 posts

The WP Maps โ€“ Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to time-based SQL Injection via the โ€˜orderbyโ€™ parameter in all versions up to, and including, 4.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers

1 repos

https://github.com/ibrahmsql/CVE-2026-25807-Exploit

thehackerwire@mastodon.social at 2026-03-23T00:44:52.000Z ##

๐ŸŸ  CVE-2026-2580 - High (7.5)

The WP Maps โ€“ Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to time-based SQL Injection via the โ€˜orderbyโ€™ parameter in all versions up to, and including, 4.9.1 due to insufficie...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-03-23T00:00:38.315Z ##

โš ๏ธ HIGH severity alert: CVE-2026-2580 โ€“ SQL Injection in flippercode WP Maps plugin for WordPress (all versions). Unauthenticated attackers can exfiltrate data via 'orderby'. Patch or mitigate ASAP. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-23T00:44:52.000Z ##

๐ŸŸ  CVE-2026-2580 - High (7.5)

The WP Maps โ€“ Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to time-based SQL Injection via the โ€˜orderbyโ€™ parameter in all versions up to, and including, 4.9.1 due to insufficie...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-23T00:00:38.000Z ##

โš ๏ธ HIGH severity alert: CVE-2026-2580 โ€“ SQL Injection in flippercode WP Maps plugin for WordPress (all versions). Unauthenticated attackers can exfiltrate data via 'orderby'. Patch or mitigate ASAP. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #SQLi

##

CVE-2026-4555
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-22T18:30:22

2 posts

A weakness has been identified in D-Link DIR-513 1.10. The impacted element is the function formEasySetTimezone of the file /goform/formEasySetTimezone of the component boa. This manipulation of the argument curTime causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. This vulnerability only affec

thehackerwire@mastodon.social at 2026-03-22T20:03:32.000Z ##

๐ŸŸ  CVE-2026-4555 - High (8.8)

A weakness has been identified in D-Link DIR-513 1.10. The impacted element is the function formEasySetTimezone of the file /goform/formEasySetTimezone of the component boa. This manipulation of the argument curTime causes stack-based buffer overf...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T20:03:32.000Z ##

๐ŸŸ  CVE-2026-4555 - High (8.8)

A weakness has been identified in D-Link DIR-513 1.10. The impacted element is the function formEasySetTimezone of the file /goform/formEasySetTimezone of the component boa. This manipulation of the argument curTime causes stack-based buffer overf...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4558
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-22T18:16:06.023000

2 posts

A flaw has been found in Linksys MR9600 2.0.6.206937. Affected is the function smartConnectConfigure of the file SmartConnect.lua. Executing a manipulation of the argument configApSsid/configApPassphrase/srpLogin/srpPassword can lead to os command injection. The attack may be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but

thehackerwire@mastodon.social at 2026-03-22T20:03:22.000Z ##

๐ŸŸ  CVE-2026-4558 - High (8.8)

A flaw has been found in Linksys MR9600 2.0.6.206937. Affected is the function smartConnectConfigure of the file SmartConnect.lua. Executing a manipulation of the argument configApSsid/configApPassphrase/srpLogin/srpPassword can lead to os command...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T20:03:22.000Z ##

๐ŸŸ  CVE-2026-4558 - High (8.8)

A flaw has been found in Linksys MR9600 2.0.6.206937. Affected is the function smartConnectConfigure of the file SmartConnect.lua. Executing a manipulation of the argument configApSsid/configApPassphrase/srpLogin/srpPassword can lead to os command...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33293
(8.1 HIGH)

EPSS: 0.00%

updated 2026-03-22T17:17:08.950000

2 posts

WWBN AVideo is an open source video platform. Prior to version 26.0, the `deleteDump` parameter in `plugin/CloneSite/cloneServer.json.php` is passed directly to `unlink()` without any path sanitization. An attacker with valid clone credentials can use path traversal sequences (e.g., `../../`) to delete arbitrary files on the server, including critical application files such as `configuration.php`,

thehackerwire@mastodon.social at 2026-03-22T20:20:03.000Z ##

๐ŸŸ  CVE-2026-33293 - High (8.1)

WWBN AVideo is an open source video platform. Prior to version 26.0, the `deleteDump` parameter in `plugin/CloneSite/cloneServer.json.php` is passed directly to `unlink()` without any path sanitization. An attacker with valid clone credentials can...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T20:20:03.000Z ##

๐ŸŸ  CVE-2026-33293 - High (8.1)

WWBN AVideo is an open source video platform. Prior to version 26.0, the `deleteDump` parameter in `plugin/CloneSite/cloneServer.json.php` is passed directly to `unlink()` without any path sanitization. An attacker with valid clone credentials can...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4553
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-22T16:16:04.300000

2 posts

A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is the function fromNatlimit of the file /goform/Natlimit of the component Parameters Handler. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-03-22T20:20:14.000Z ##

๐ŸŸ  CVE-2026-4553 - High (8.8)

A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is the function fromNatlimit of the file /goform/Natlimit of the component Parameters Handler. The manipulation of the argument page leads to stack-based buffer overflow. It is possibl...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T20:20:14.000Z ##

๐ŸŸ  CVE-2026-4553 - High (8.8)

A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is the function fromNatlimit of the file /goform/Natlimit of the component Parameters Handler. The manipulation of the argument page leads to stack-based buffer overflow. It is possibl...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4552
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-22T15:31:39

2 posts

A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component Parameters Handler. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-22T20:59:47.000Z ##

๐ŸŸ  CVE-2026-4552 - High (8.8)

A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component Parameters Handler. Executing a manipulation of the argument page can lead to stack-based buffer o...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T20:59:47.000Z ##

๐ŸŸ  CVE-2026-4552 - High (8.8)

A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component Parameters Handler. Executing a manipulation of the argument page can lead to stack-based buffer o...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4551
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-22T15:31:39

2 posts

A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSafeClientFilter of the file /goform/SafeClientFilter of the component Parameters Handler. Performing a manipulation of the argument menufacturer/Go results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-03-22T20:20:23.000Z ##

๐ŸŸ  CVE-2026-4551 - High (8.8)

A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSafeClientFilter of the file /goform/SafeClientFilter of the component Parameters Handler. Performing a manipulation of the argument menufacturer/Go resul...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T20:20:23.000Z ##

๐ŸŸ  CVE-2026-4551 - High (8.8)

A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSafeClientFilter of the file /goform/SafeClientFilter of the component Parameters Handler. Performing a manipulation of the argument menufacturer/Go resul...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4540
(7.3 HIGH)

EPSS: 0.03%

updated 2026-03-22T13:16:20.653000

2 posts

A vulnerability was detected in projectworlds Online Notes Sharing System 1.0. This issue affects some unknown processing of the file /login.php of the component Parameters Handler. The manipulation of the argument User results in sql injection. The attack can be executed remotely. The exploit is now public and may be used.

offseq at 2026-03-22T09:00:27.529Z ##

๐Ÿ›ก๏ธ CVE-2026-4540: MEDIUM-severity SQL Injection in projectworlds Online Notes Sharing System v1.0. Exploit code is public, no active attacks yet. Patch or mitigate โ€” focus on the 'Benutzer' param in /login.php. More info: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-22T09:00:27.000Z ##

๐Ÿ›ก๏ธ CVE-2026-4540: MEDIUM-severity SQL Injection in projectworlds Online Notes Sharing System v1.0. Exploit code is public, no active attacks yet. Patch or mitigate โ€” focus on the 'Benutzer' param in /login.php. More info: radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Vuln

##

CVE-2026-4543
(6.3 MEDIUM)

EPSS: 0.18%

updated 2026-03-22T12:32:35

2 posts

A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is an unknown function of the file /cgi-bin/firewall.cgi of the component POST Request Handler. Performing a manipulation of the argument dmz_flag/del_flag results in command injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about

offseq at 2026-03-22T10:30:28.190Z ##

โš ๏ธ CVE-2026-4543: Wavlink WL-WN578W2 (v221110) has a MEDIUM severity command injection flaw in /cgi-bin/firewall.cgi. No patch; public exploit exists. Isolate, restrict access, and monitor traffic urgently. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-22T10:30:28.000Z ##

โš ๏ธ CVE-2026-4543: Wavlink WL-WN578W2 (v221110) has a MEDIUM severity command injection flaw in /cgi-bin/firewall.cgi. No patch; public exploit exists. Isolate, restrict access, and monitor traffic urgently. radar.offseq.com/threat/cve-20 #OffSeq #Infosec #Vulnerability #Router

##

CVE-2026-4314
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-22T06:30:22

2 posts

The 'The Ultimate WordPress Toolkit โ€“ WP Extended' plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.4. This is due to the `isDashboardOrProfileRequest()` method in the Menu Editor module using an insecure `strpos()` check against `$_SERVER['REQUEST_URI']` to determine if a request targets the dashboard or profile page. The `grantVirtualCaps()` me

thehackerwire@mastodon.social at 2026-03-22T21:00:19.000Z ##

๐ŸŸ  CVE-2026-4314 - High (8.8)

The 'The Ultimate WordPress Toolkit โ€“ WP Extended' plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.4. This is due to the `isDashboardOrProfileRequest()` method in the Menu Editor module using ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T21:00:19.000Z ##

๐ŸŸ  CVE-2026-4314 - High (8.8)

The 'The Ultimate WordPress Toolkit โ€“ WP Extended' plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.4. This is due to the `isDashboardOrProfileRequest()` method in the Menu Editor module using ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4535
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-22T06:30:22

4 posts

A vulnerability has been found in Tenda FH451 1.0.0.9. This vulnerability affects the function WrlclientSet of the file /goform/WrlclientSet. Such manipulation of the argument GO leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-03-22T21:00:09.000Z ##

๐ŸŸ  CVE-2026-4535 - High (8.8)

A vulnerability has been found in Tenda FH451 1.0.0.9. This vulnerability affects the function WrlclientSet of the file /goform/WrlclientSet. Such manipulation of the argument GO leads to stack-based buffer overflow. The attack can be launched rem...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-03-22T06:00:29.544Z ##

โš ๏ธ HIGH severity: CVE-2026-4535 in Tenda FH451 (v1.0.0.9) โ€” stack-based buffer overflow in /goform/WrlclientSet. Remote, unauthenticated code execution possible. Patch or mitigate now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-22T21:00:09.000Z ##

๐ŸŸ  CVE-2026-4535 - High (8.8)

A vulnerability has been found in Tenda FH451 1.0.0.9. This vulnerability affects the function WrlclientSet of the file /goform/WrlclientSet. Such manipulation of the argument GO leads to stack-based buffer overflow. The attack can be launched rem...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-22T06:00:29.000Z ##

โš ๏ธ HIGH severity: CVE-2026-4535 in Tenda FH451 (v1.0.0.9) โ€” stack-based buffer overflow in /goform/WrlclientSet. Remote, unauthenticated code execution possible. Patch or mitigate now! radar.offseq.com/threat/cve-20 #OffSeq #vulnerability #IoT #bufferOverflow

##

CVE-2026-4534
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-22T05:16:19.273000

5 posts

A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-03-22T20:59:59.000Z ##

๐ŸŸ  CVE-2026-4534 - High (8.8)

A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Matchbook3469@mastodon.social at 2026-03-22T15:18:07.000Z ##

โš ๏ธ New security advisory:

CVE-2026-4534 affects multiple systems.

โ€ข Impact: Significant security breach potential
โ€ข Risk: Unauthorized access or data exposure
โ€ข Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

offseq at 2026-03-22T07:30:26.921Z ##

๐Ÿ”Ž CVE-2026-4534 (HIGH, CVSS 8.7): Stack-based buffer overflow in Tenda FH451 (v1.0.0.9) lets remote attackers execute code. PoC exploit published. Patch/mitigate now โ€” restrict access & monitor for attacks. Info: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-22T20:59:59.000Z ##

๐ŸŸ  CVE-2026-4534 - High (8.8)

A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-22T07:30:26.000Z ##

๐Ÿ”Ž CVE-2026-4534 (HIGH, CVSS 8.7): Stack-based buffer overflow in Tenda FH451 (v1.0.0.9) lets remote attackers execute code. PoC exploit published. Patch/mitigate now โ€” restrict access & monitor for attacks. Info: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Tenda #InfoSec

##

CVE-2026-4533
(6.3 MEDIUM)

EPSS: 0.03%

updated 2026-03-22T03:16:01.587000

2 posts

A vulnerability was detected in code-projects Simple Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file all-tickets.php. The manipulation of the argument Status results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used.

offseq at 2026-03-22T04:30:27.651Z ##

โš ๏ธ MEDIUM: CVE-2026-4533 in code-projects Simple Food Ordering System v1.0 allows unauthenticated SQL injection via 'Status' in all-tickets.php. Public exploit code exists โ€” patch or mitigate now! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-22T04:30:27.000Z ##

โš ๏ธ MEDIUM: CVE-2026-4533 in code-projects Simple Food Ordering System v1.0 allows unauthenticated SQL injection via 'Status' in all-tickets.php. Public exploit code exists โ€” patch or mitigate now! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #SQLInjection #CVE2026_4533

##

CVE-2026-4529
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-21T23:16:51.577000

4 posts

A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

offseq at 2026-03-22T01:30:27.982Z ##

๐Ÿšจ CVE-2026-4529: HIGH severity stack-based buffer overflow in D-Link DHP-1320 (1.00WWB04) via SOAP Handler. Public exploit out. Device is EOL, no patch โ€” isolate or replace now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-21T23:17:53.000Z ##

๐ŸŸ  CVE-2026-4529 - High (8.8)

A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. The attack can be executed remotely. The exploit...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-22T01:30:27.000Z ##

๐Ÿšจ CVE-2026-4529: HIGH severity stack-based buffer overflow in D-Link DHP-1320 (1.00WWB04) via SOAP Handler. Public exploit out. Device is EOL, no patch โ€” isolate or replace now! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #DLink #BufferOverflow #InfoSec

##

thehackerwire@mastodon.social at 2026-03-21T23:17:53.000Z ##

๐ŸŸ  CVE-2026-4529 - High (8.8)

A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. The attack can be executed remotely. The exploit...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3629
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-21T23:16:51.393000

4 posts

The Import and export users and customers plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.29.7. This is due to the 'save_extra_user_profile_fields' function not properly restricting which user meta keys can be updated via profile fields. The 'get_restricted_fields' method does not include sensitive meta keys such as 'wp_capabilities'. This makes i

offseq at 2026-03-22T03:00:27.555Z ##

โš ๏ธ CVE-2026-3629: HIGH severity in carazo's 'Import and export users and customers' WP plugin (โ‰ค1.29.7). Privilege escalation to admin possible if 'Show fields in profile' is on and CSV with 'wp_capabilities' imported. Mitigate now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-21T23:17:43.000Z ##

๐ŸŸ  CVE-2026-3629 - High (8.1)

The Import and export users and customers plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.29.7. This is due to the 'save_extra_user_profile_fields' function not properly restricting which user met...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-22T03:00:27.000Z ##

โš ๏ธ CVE-2026-3629: HIGH severity in carazo's 'Import and export users and customers' WP plugin (โ‰ค1.29.7). Privilege escalation to admin possible if 'Show fields in profile' is on and CSV with 'wp_capabilities' imported. Mitigate now! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec

##

thehackerwire@mastodon.social at 2026-03-21T23:17:43.000Z ##

๐ŸŸ  CVE-2026-3629 - High (8.1)

The Import and export users and customers plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.29.7. This is due to the 'save_extra_user_profile_fields' function not properly restricting which user met...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4373
(7.5 HIGH)

EPSS: 0.10%

updated 2026-03-21T07:16:10.380000

3 posts

The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via path traversal in all versions up to, and including, 3.5.6.2. This is due to the 'Uploaded_File::set_from_array' method accepting user-supplied file paths from the Media Field preset JSON payload without validating that the path belongs to the WordPress uploads directory. Combined with an insufficient same-file check

thehackerwire@mastodon.social at 2026-03-21T20:00:35.000Z ##

๐ŸŸ  CVE-2026-4373 - High (7.5)

The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via path traversal in all versions up to, and including, 3.5.6.2. This is due to the 'Uploaded_File::set_from_array' method accepting user-supplied file paths from the Me...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T20:00:35.000Z ##

๐ŸŸ  CVE-2026-4373 - High (7.5)

The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via path traversal in all versions up to, and including, 3.5.6.2. This is due to the 'Uploaded_File::set_from_array' method accepting user-supplied file paths from the Me...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-21T07:30:25.000Z ##

๐Ÿšจ JetFormBuilder for WordPress is HIGH risk (CVE-2026-4373): Absolute path traversal in all versions allows unauth attackers to exfiltrate files via crafted Media Field form. Review & secure deployments! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #infosec

##

CVE-2026-4261
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-21T06:30:39

3 posts

The Expire Users plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2.2. This is due to the plugin allowing a user to update the 'on_expire_default_to_role' meta through the 'save_extra_user_profile_fields' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an a

thehackerwire@mastodon.social at 2026-03-21T20:00:45.000Z ##

๐ŸŸ  CVE-2026-4261 - High (8.8)

The Expire Users plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2.2. This is due to the plugin allowing a user to update the 'on_expire_default_to_role' meta through the 'save_extra_user_profile_...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T20:00:45.000Z ##

๐ŸŸ  CVE-2026-4261 - High (8.8)

The Expire Users plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2.2. This is due to the plugin allowing a user to update the 'on_expire_default_to_role' meta through the 'save_extra_user_profile_...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-21T06:00:30.000Z ##

๐Ÿ”ฅ HIGH severity: CVE-2026-4261 in Expire Users (WordPress, all versions) lets Subscribers escalate to Admin via missing authorization in 'save_extra_user_profile_fields'. Patch urgently or mitigate! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #Security

##

CVE-2026-3478
(7.2 HIGH)

EPSS: 0.07%

updated 2026-03-21T06:30:38

1 posts

The Content Syndication Toolkit plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3 via the redux_p AJAX action in the bundled ReduxFramework library. The plugin registers a proxy endpoint (wp_ajax_nopriv_redux_p) that is accessible to unauthenticated users. The proxy() method in the Redux_P class takes a URL directly from $_GET['url'] withou

offseq@infosec.exchange at 2026-03-21T04:30:27.000Z ##

๐Ÿ”Ž CVE-2026-3478: HIGH severity SSRF in benmoody Content Syndication Toolkit (WordPress, all versions). Unauthenticated AJAX endpoint lets attackers proxy requests, risking internal data exposure. Disable plugin or block endpoint! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #SSRF

##

CVE-2026-3334
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-21T06:30:36

2 posts

The CMS Commander plugin for WordPress is vulnerable to SQL Injection via the 'or_blogname', 'or_blogdescription', and 'or_admin_email' parameters in all versions up to, and including, 2.288. This is due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL queries in the restore workflow. This makes it possible for authenticated attackers,

thehackerwire@mastodon.social at 2026-03-21T20:00:56.000Z ##

๐ŸŸ  CVE-2026-3334 - High (8.8)

The CMS Commander plugin for WordPress is vulnerable to SQL Injection via the 'or_blogname', 'or_blogdescription', and 'or_admin_email' parameters in all versions up to, and including, 2.288. This is due to insufficient escaping on the user suppli...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T20:00:56.000Z ##

๐ŸŸ  CVE-2026-3334 - High (8.8)

The CMS Commander plugin for WordPress is vulnerable to SQL Injection via the 'or_blogname', 'or_blogdescription', and 'or_admin_email' parameters in all versions up to, and including, 2.288. This is due to insufficient escaping on the user suppli...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1648
(7.2 HIGH)

EPSS: 0.04%

updated 2026-03-21T06:30:32

1 posts

The Performance Monitor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.6. This is due to insufficient validation of the 'url' parameter in the '/wp-json/performance-monitor/v1/curl_data' REST API endpoint. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations, including internal services, via th

offseq@infosec.exchange at 2026-03-21T09:00:28.000Z ##

๐Ÿ”Ž HIGH severity SSRF in qrolic Performance Monitor (WordPress, all versions). Unauthenticated attackers can craft internal requests via REST API โ€” RCE possible if chained with Redis. Urgent patch/mitigation needed! CVE-2026-1648. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #SSRF

##

CVE-2026-2941
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-21T06:30:25

2 posts

The Linksy Search and Replace plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'linksy_search_and_replace_item_details' function in all versions up to, and including, 1.0.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to update any database table, any value, including the wp_capabilities

thehackerwire@mastodon.social at 2026-03-21T20:18:13.000Z ##

๐ŸŸ  CVE-2026-2941 - High (8.8)

The Linksy Search and Replace plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'linksy_search_and_replace_item_details' function in all versions up to, and including, 1.0.4. This make...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T20:18:13.000Z ##

๐ŸŸ  CVE-2026-2941 - High (8.8)

The Linksy Search and Replace plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'linksy_search_and_replace_item_details' function in all versions up to, and including, 1.0.4. This make...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14037
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-21T06:30:23

2 posts

The Invelity Product Feeds plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 1.2.6. This is due to missing validation and sanitization in the 'createManageFeedPage' function. This makes it possible for authenticated administrator-level attackers to delete arbitrary files on the server via specially crafted requests that include p

thehackerwire@mastodon.social at 2026-03-21T21:00:22.000Z ##

๐ŸŸ  CVE-2025-14037 - High (8.1)

The Invelity Product Feeds plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 1.2.6. This is due to missing validation and sanitization in the 'createManageFeedPage' function. Thi...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T21:00:22.000Z ##

๐ŸŸ  CVE-2025-14037 - High (8.1)

The Invelity Product Feeds plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 1.2.6. This is due to missing validation and sanitization in the 'createManageFeedPage' function. Thi...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2468
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-21T04:17:02.577000

2 posts

The Quentn WP plugin for WordPress is vulnerable to SQL Injection via the 'qntn_wp_access' cookie in all versions up to, and including, 1.2.12. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query in the `get_user_access()` method. This makes it possible for unauthenticated attackers to append additional SQL queries into a

1 repos

https://github.com/JoakimBulow/CVE-2026-24688

thehackerwire@mastodon.social at 2026-03-21T20:18:23.000Z ##

๐ŸŸ  CVE-2026-2468 - High (7.5)

The Quentn WP plugin for WordPress is vulnerable to SQL Injection via the 'qntn_wp_access' cookie in all versions up to, and including, 1.2.12. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T20:18:23.000Z ##

๐ŸŸ  CVE-2026-2468 - High (7.5)

The Quentn WP plugin for WordPress is vulnerable to SQL Injection via the 'qntn_wp_access' cookie in all versions up to, and including, 1.2.12. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1800
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-21T04:16:54.520000

2 posts

The Fonts Manager | Custom Fonts plugin for WordPress is vulnerable to time-based SQL Injection via the โ€˜fmcfIdSelectedFntโ€™ parameter in all versions up to, and including, 1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already ex

thehackerwire@mastodon.social at 2026-03-21T20:18:33.000Z ##

๐ŸŸ  CVE-2026-1800 - High (7.5)

The Fonts Manager | Custom Fonts plugin for WordPress is vulnerable to time-based SQL Injection via the โ€˜fmcfIdSelectedFntโ€™ parameter in all versions up to, and including, 1.2 due to insufficient escaping on the user supplied parameter and lac...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T20:18:33.000Z ##

๐ŸŸ  CVE-2026-1800 - High (7.5)

The Fonts Manager | Custom Fonts plugin for WordPress is vulnerable to time-based SQL Injection via the โ€˜fmcfIdSelectedFntโ€™ parameter in all versions up to, and including, 1.2 due to insufficient escaping on the user supplied parameter and lac...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1313
(8.3 HIGH)

EPSS: 0.04%

updated 2026-03-21T04:16:52.630000

3 posts

The MimeTypes Link Icons plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.2.20. This is due to the plugin making outbound HTTP requests to user-controlled URLs without proper validation when the "Show file size" option is enabled. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web request

thehackerwire@mastodon.social at 2026-03-21T21:00:13.000Z ##

๐ŸŸ  CVE-2026-1313 - High (8.3)

The MimeTypes Link Icons plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.2.20. This is due to the plugin making outbound HTTP requests to user-controlled URLs without proper validation when...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T21:00:13.000Z ##

๐ŸŸ  CVE-2026-1313 - High (8.3)

The MimeTypes Link Icons plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.2.20. This is due to the plugin making outbound HTTP requests to user-controlled URLs without proper validation when...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-21T10:30:28.000Z ##

MimeTypes Link Icons plugin (โ‰ค3.2.20) hit by HIGH severity SSRF (CVE-2026-1313, CVSS 8.3). Contributor+ users can abuse "Show file size" to access internal resources. Disable the feature & check user roles. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #SSRF #CVE20261313

##

CVE-2026-32042
(8.8 HIGH)

EPSS: 0.10%

updated 2026-03-21T03:31:17

2 posts

OpenClaw versions 2026.2.22 prior to 2026.2.25 contain a privilege escalation vulnerability allowing unpaired device identities to bypass operator pairing requirements and self-assign elevated operator scopes including operator.admin. Attackers with valid shared gateway authentication can present a self-signed unpaired device identity to request and obtain higher operator scopes before pairing app

thehackerwire@mastodon.social at 2026-03-21T22:15:48.000Z ##

๐ŸŸ  CVE-2026-32042 - High (8.8)

OpenClaw versions 2026.2.22 prior to 2026.2.25 contain a privilege escalation vulnerability allowing unpaired device identities to bypass operator pairing requirements and self-assign elevated operator scopes including operator.admin. Attackers wi...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T22:15:48.000Z ##

๐ŸŸ  CVE-2026-32042 - High (8.8)

OpenClaw versions 2026.2.22 prior to 2026.2.25 contain a privilege escalation vulnerability allowing unpaired device identities to bypass operator pairing requirements and self-assign elevated operator scopes including operator.admin. Attackers wi...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32055
(7.6 HIGH)

EPSS: 0.06%

updated 2026-03-21T03:31:15

2 posts

OpenClaw versions prior to 2026.2.26 contain a path traversal vulnerability in workspace boundary validation that allows attackers to write files outside the workspace through in-workspace symlinks pointing to non-existent out-of-root targets. The vulnerability exists because the boundary check improperly resolves aliases, permitting the first write operation to escape the workspace boundary and c

thehackerwire@mastodon.social at 2026-03-21T22:00:46.000Z ##

๐ŸŸ  CVE-2026-32055 - High (7.6)

OpenClaw versions prior to 2026.2.26 contain a path traversal vulnerability in workspace boundary validation that allows attackers to write files outside the workspace through in-workspace symlinks pointing to non-existent out-of-root targets. The...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T22:00:46.000Z ##

๐ŸŸ  CVE-2026-32055 - High (7.6)

OpenClaw versions prior to 2026.2.26 contain a path traversal vulnerability in workspace boundary validation that allows attackers to write files outside the workspace through in-workspace symlinks pointing to non-existent out-of-root targets. The...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32064
(7.7 HIGH)

EPSS: 0.04%

updated 2026-03-21T03:31:15

2 posts

OpenClaw versions prior to 2026.2.21 sandbox browser entrypoint launches x11vnc without authentication for noVNC observer sessions, allowing unauthenticated access to the VNC interface. Remote attackers on the host loopback interface can connect to the exposed noVNC port to observe or interact with the sandbox browser without credentials.

thehackerwire@mastodon.social at 2026-03-21T22:00:22.000Z ##

๐ŸŸ  CVE-2026-32064 - High (7.7)

OpenClaw versions prior to 2026.2.21 sandbox browser entrypoint launches x11vnc without authentication for noVNC observer sessions, allowing unauthenticated access to the VNC interface. Remote attackers on the host loopback interface can connect t...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T22:00:22.000Z ##

๐ŸŸ  CVE-2026-32064 - High (7.7)

OpenClaw versions prior to 2026.2.21 sandbox browser entrypoint launches x11vnc without authentication for noVNC observer sessions, allowing unauthenticated access to the VNC interface. Remote attackers on the host loopback interface can connect t...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32049
(7.5 HIGH)

EPSS: 0.10%

updated 2026-03-21T03:31:14

2 posts

OpenClaw versions prior to 2026.2.22 fail to consistently enforce configured inbound media byte limits before buffering remote media across multiple channel ingestion paths. Remote attackers can send oversized media payloads to trigger elevated memory usage and potential process instability.

thehackerwire@mastodon.social at 2026-03-21T22:15:38.000Z ##

๐ŸŸ  CVE-2026-32049 - High (7.5)

OpenClaw versions prior to 2026.2.22 fail to consistently enforce configured inbound media byte limits before buffering remote media across multiple channel ingestion paths. Remote attackers can send oversized media payloads to trigger elevated me...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T22:15:38.000Z ##

๐ŸŸ  CVE-2026-32049 - High (7.5)

OpenClaw versions prior to 2026.2.22 fail to consistently enforce configured inbound media byte limits before buffering remote media across multiple channel ingestion paths. Remote attackers can send oversized media payloads to trigger elevated me...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32051
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-21T03:31:14

2 posts

OpenClaw versions prior to 2026.3.1 contain an authorization mismatch vulnerability that allows authenticated callers with operator.write scope to invoke owner-only tool surfaces including gateway and cron through agent runs in scoped-token deployments. Attackers with write-scope access can perform control-plane actions beyond their intended authorization level by exploiting inconsistent owner-onl

thehackerwire@mastodon.social at 2026-03-21T22:00:35.000Z ##

๐ŸŸ  CVE-2026-32051 - High (8.8)

OpenClaw versions prior to 2026.3.1 contain an authorization mismatch vulnerability that allows authenticated callers with operator.write scope to invoke owner-only tool surfaces including gateway and cron through agent runs in scoped-token deploy...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T22:00:35.000Z ##

๐ŸŸ  CVE-2026-32051 - High (8.8)

OpenClaw versions prior to 2026.3.1 contain an authorization mismatch vulnerability that allows authenticated callers with operator.write scope to invoke owner-only tool surfaces including gateway and cron through agent runs in scoped-token deploy...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32056
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-21T01:17:09.103000

2 posts

OpenClaw versions prior to 2026.2.22 fail to sanitize shell startup environment variables HOME and ZDOTDIR in the system.run function, allowing attackers to bypass command allowlist protections. Remote attackers can inject malicious startup files such as .bash_profile or .zshenv to achieve arbitrary code execution before allowlist-evaluated commands are executed.

thehackerwire@mastodon.social at 2026-03-21T21:00:31.000Z ##

๐ŸŸ  CVE-2026-32056 - High (7.5)

OpenClaw versions prior to 2026.2.22 fail to sanitize shell startup environment variables HOME and ZDOTDIR in the system.run function, allowing attackers to bypass command allowlist protections. Remote attackers can inject malicious startup files ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T21:00:31.000Z ##

๐ŸŸ  CVE-2026-32056 - High (7.5)

OpenClaw versions prior to 2026.2.22 fail to sanitize shell startup environment variables HOME and ZDOTDIR in the system.run function, allowing attackers to bypass command allowlist protections. Remote attackers can inject malicious startup files ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32048
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-21T01:17:07.510000

2 posts

OpenClaw versions prior to 2026.3.1 fail to enforce sandbox inheritance during cross-agent sessions_spawn operations, allowing sandboxed sessions to create child processes under unsandboxed agents. An attacker with a sandboxed session can exploit this to spawn child runtimes with sandbox.mode set to off, bypassing runtime confinement restrictions.

thehackerwire@mastodon.social at 2026-03-21T22:15:28.000Z ##

๐ŸŸ  CVE-2026-32048 - High (7.5)

OpenClaw versions prior to 2026.3.1 fail to enforce sandbox inheritance during cross-agent sessions_spawn operations, allowing sandboxed sessions to create child processes under unsandboxed agents. An attacker with a sandboxed session can exploit ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T22:15:28.000Z ##

๐ŸŸ  CVE-2026-32048 - High (7.5)

OpenClaw versions prior to 2026.3.1 fail to enforce sandbox inheritance during cross-agent sessions_spawn operations, allowing sandboxed sessions to create child processes under unsandboxed agents. An attacker with a sandboxed session can exploit ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24060
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-03-21T00:32:49

4 posts

Service information is not encrypted when transmitted as BACnet packets over the wire, and can be sniffed, intercepted, and modified by an attacker. Valuable information such as the File Start Position and File Data can be sniffed from network traffic using Wireshark's BACnet dissector filter. The proprietary format used by WebCTRL to receive updates from the PLC can also be sniffed and rever

thehackerwire@mastodon.social at 2026-03-21T23:00:22.000Z ##

๐Ÿ”ด CVE-2026-24060 - Critical (9.1)

Service information is not encrypted when transmitted as BACnet packets
over the wire, and can be sniffed, intercepted, and modified by an
attacker. Valuable information such as the File Start Position and File
Data can be sniffed from network ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T23:00:22.000Z ##

๐Ÿ”ด CVE-2026-24060 - Critical (9.1)

Service information is not encrypted when transmitted as BACnet packets
over the wire, and can be sniffed, intercepted, and modified by an
attacker. Valuable information such as the File Start Position and File
Data can be sniffed from network ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-21T00:00:38.000Z ##

CVE-2026-24060 (CRITICAL): WebCTRL Premium Server sends BACnet data in cleartext, risking interception & modification. No patch yet โ€” segment OT networks & use VPNs for BACnet traffic. Monitor for sniffing, restrict access. Details: radar.offseq.com/threat/cve-20 #OffSeq #ICS #Vuln #BACnet

##

beyondmachines1@infosec.exchange at 2026-03-20T10:01:49.000Z ##

Multiple Flaws Reported in Automated Logic WebCTRL Premium Server

Automated Logic patched three vulnerabilities in its WebCTRL Premium Server, including a critical cleartext flaw (CVE-2026-24060), that allow attackers to intercept sensitive data and spoof commands in building automation systems.

**If you are using Automated Logic WebCTRL, make sure it's isolated from the internet and your office network. Then plan a patch. Legacy versions 7.x will not be updated so plan an upgrade.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-3584
(9.8 CRITICAL)

EPSS: 0.22%

updated 2026-03-21T00:32:48

2 posts

The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into internal placeholder storage, combined with the use of 'call_user_func' on these placeholder values. This makes it possible for unauthenticated attackers to ex

thehackerwire@mastodon.social at 2026-03-20T22:20:38.000Z ##

๐Ÿ”ด CVE-2026-3584 - Critical (9.8)

The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into intern...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:17:11.000Z ##

๐Ÿ”ด CVE-2026-3584 - Critical (9.8)

The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into intern...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25192
(9.4 CRITICAL)

EPSS: 0.13%

updated 2026-03-21T00:32:47

4 posts

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this

thehackerwire@mastodon.social at 2026-03-22T01:00:50.000Z ##

๐Ÿ”ด CVE-2026-25192 - Critical (9.4)

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a kno...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T01:00:50.000Z ##

๐Ÿ”ด CVE-2026-25192 - Critical (9.4)

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a kno...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-21T03:00:28.000Z ##

โš ๏ธ CVE-2026-25192 (CRITICAL, CVSS 9.4): All CTEK Chargeportal versions lack authentication on OCPP WebSocket endpoints. Enables remote station impersonation & command injection. Restrict network access and monitor closely! radar.offseq.com/threat/cve-20 #OffSeq #EVSecurity #CVE202625192

##

beyondmachines1@infosec.exchange at 2026-03-20T09:01:48.000Z ##

CTEK Chargeportal Vulnerabilities Enable Unauthorized Control of EV Infrastructure

CISA reports four vulnerabilities in the Chargeportal platform by CTEK, including a critical authentication bypass (CVE-2026-25192), that allow attackers to impersonate charging stations and gain unauthorized control. The product is scheduled for sunset in April 2026, leaving network isolation as the primary defense for current users.

**Since CTEK is sunsetting Chargeportal without a patch, make sure you isolate the systems as much as possible from public access and the public internet. Then planning a migration to a supported charging management platform.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-29796
(9.4 CRITICAL)

EPSS: 0.10%

updated 2026-03-21T00:31:52

4 posts

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this

thehackerwire@mastodon.social at 2026-03-22T01:00:31.000Z ##

๐Ÿ”ด CVE-2026-29796 - Critical (9.4)

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a kno...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T01:00:31.000Z ##

๐Ÿ”ด CVE-2026-29796 - Critical (9.4)

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a kno...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-21T01:30:28.000Z ##

โš ๏ธ CRITICAL: CVE-2026-29796 affects all IGL-Technologies eParking.fi versions. Missing WebSocket auth allows attackers to impersonate charging stations, disrupt operations, and corrupt data. Restrict access, monitor traffic, and secure now! radar.offseq.com/threat/cve-20 #OffSeq #EVCharging #Infosec

##

beyondmachines1@infosec.exchange at 2026-03-20T16:01:48.000Z ##

IGL-Technologies Patches Critical Authentication Bypass in eParking.fi Platform

IGL-Technologies patched four vulnerabilities in its eParking.fi platform, including a critical authentication bypass (CVE-2026-29796) that allows attackers to impersonate EV charging stations and gain administrative control.

**Isolate your EV charging infrastructure as much as possible from the public internet and public network access. Verify that your hardware supports the vendor's new security profiles. Since station identifiers were leaked on public maps, you should treat existing IDs as compromised and implement device whitelisting.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-31904
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-21T00:31:51

2 posts

The WebSocket Application Programming Interface lacks restrictions on the number ofย authentication requests. This absence of rate limiting may allow an attacker to conductย denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access.

thehackerwire@mastodon.social at 2026-03-22T00:01:41.000Z ##

๐ŸŸ  CVE-2026-31904 - High (7.5)

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charge...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T00:01:41.000Z ##

๐ŸŸ  CVE-2026-31904 - High (7.5)

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charge...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25086
(7.7 HIGH)

EPSS: 0.01%

updated 2026-03-21T00:31:51

2 posts

Under certain conditions, an attacker could bind to the same port used by WebCTRL. This could allow the attacker to craft and send malicious packets and impersonate the WebCTRL service without requiring code injection into the WebCTRL software.

thehackerwire@mastodon.social at 2026-03-21T23:00:32.000Z ##

๐ŸŸ  CVE-2026-25086 - High (7.7)

Under certain conditions, an attacker could bind to the same port used
by WebCTRL. This could allow the attacker to craft and send malicious
packets and impersonate the WebCTRL service without requiring code
injection into the WebCTRL software.

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T23:00:32.000Z ##

๐ŸŸ  CVE-2026-25086 - High (7.7)

Under certain conditions, an attacker could bind to the same port used
by WebCTRL. This could allow the attacker to craft and send malicious
packets and impersonate the WebCTRL service without requiring code
injection into the WebCTRL software.

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23536
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-21T00:31:45

1 posts

A security issue was discovered in the Feast Feature Server's `/read-document` endpoint that allows an unauthenticated remote attacker to read any file accessible to the server process. By sending a specially crafted HTTP POST request, an attacker can bypass intended access restrictions to potentially retrieve sensitive system files, application configurations, and credentials.

thehackerwire@mastodon.social at 2026-03-20T22:17:32.000Z ##

๐ŸŸ  CVE-2026-23536 - High (7.5)

A security issue was discovered in the Feast Feature Server's `/read-document` endpoint that allows an unauthenticated remote attacker to read any file accessible to the server process. By sending a specially crafted HTTP POST request, an attacker...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32666
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-21T00:16:26.220000

2 posts

WebCTRL systems that communicate over BACnet inherit the protocol's lack of network layer authentication. WebCTRL does not implement additional validation of BACnet traffic so an attacker with network access could spoof BACnet packets directed at either the WebCTRL server or associated AutomatedLogic controllers. Spoofed packets may be processed as legitimate.

thehackerwire@mastodon.social at 2026-03-21T23:00:11.000Z ##

๐ŸŸ  CVE-2026-32666 - High (7.5)

WebCTRL systems that communicate over BACnet inherit the protocol's lack
of network layer authentication. WebCTRL does not implement additional
validation of BACnet traffic so an attacker with network access could
spoof BACnet packets directed ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T23:00:11.000Z ##

๐ŸŸ  CVE-2026-32666 - High (7.5)

WebCTRL systems that communicate over BACnet inherit the protocol's lack
of network layer authentication. WebCTRL does not implement additional
validation of BACnet traffic so an attacker with network access could
spoof BACnet packets directed ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33476
(7.5 HIGH)

EPSS: 0.89%

updated 2026-03-20T23:16:48.137000

2 posts

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Siyuan kernel exposes an unauthenticated file-serving endpoint under `/appearance/*filepath.` Due to improper path sanitization, attackers can perform directory traversal and read arbitrary files accessible to the server process. Authentication checks explicitly exclude this endpoint, allowing exploitation without valid

thehackerwire@mastodon.social at 2026-03-21T23:16:43.000Z ##

๐ŸŸ  CVE-2026-33476 - High (7.5)

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Siyuan kernel exposes an unauthenticated file-serving endpoint under `/appearance/*filepath.` Due to improper path sanitization, attackers can perform directory traversa...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T23:16:43.000Z ##

๐ŸŸ  CVE-2026-33476 - High (7.5)

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Siyuan kernel exposes an unauthenticated file-serving endpoint under `/appearance/*filepath.` Due to improper path sanitization, attackers can perform directory traversa...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33236
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-20T23:16:47.007000

2 posts

NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, the NLTK downloader does not validate the `subdir` and `id` attributes when processing remote XML index files. Attackers can control a remote XML index server to provide malicious values containing path t

thehackerwire@mastodon.social at 2026-03-21T23:16:52.000Z ##

๐ŸŸ  CVE-2026-33236 - High (8.1)

NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, the NLTK downloader does not validate the `subdir` ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T23:16:52.000Z ##

๐ŸŸ  CVE-2026-33236 - High (8.1)

NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, the NLTK downloader does not validate the `subdir` ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33203
(7.5 HIGH)

EPSS: 0.10%

updated 2026-03-20T23:16:45.520000

2 posts

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the SiYuan kernel WebSocket server accepts unauthenticated connections when a specific "auth keepalive" query parameter is present. After connection, incoming messages are parsed using unchecked type assertions on attacker-controlled JSON. A remote attacker can send malformed messages that trigger a runtime panic, potentiall

thehackerwire@mastodon.social at 2026-03-22T00:01:23.000Z ##

๐ŸŸ  CVE-2026-33203 - High (7.5)

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the SiYuan kernel WebSocket server accepts unauthenticated connections when a specific "auth keepalive" query parameter is present. After connection, incoming messages are p...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T00:01:23.000Z ##

๐ŸŸ  CVE-2026-33203 - High (7.5)

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the SiYuan kernel WebSocket server accepts unauthenticated connections when a specific "auth keepalive" query parameter is present. After connection, incoming messages are p...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33186
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-03-20T23:16:45.180000

2 posts

gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully ro

thehackerwire@mastodon.social at 2026-03-22T00:00:38.000Z ##

๐Ÿ”ด CVE-2026-33186 - Critical (9.1)

gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepti...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T00:00:38.000Z ##

๐Ÿ”ด CVE-2026-33186 - Critical (9.1)

gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepti...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33180
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-20T23:16:45.020000

2 posts

HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.0, when setting headers in HTTP requests, the internal HTTP client sends headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the Location: response header value. Sendin

thehackerwire@mastodon.social at 2026-03-22T00:00:23.000Z ##

๐ŸŸ  CVE-2026-33180 - High (7.5)

HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.0, when setting headers in HTTP requests, the internal HTTP client sends headers first to the host in the initial URL but...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T00:00:23.000Z ##

๐ŸŸ  CVE-2026-33180 - High (7.5)

HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.0, when setting headers in HTTP requests, the internal HTTP client sends headers first to the host in the initial URL but...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31903
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-20T23:16:43.813000

2 posts

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access.

thehackerwire@mastodon.social at 2026-03-22T01:00:41.000Z ##

๐ŸŸ  CVE-2026-31903 - High (7.5)

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T01:00:41.000Z ##

๐ŸŸ  CVE-2026-31903 - High (7.5)

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33172
(8.7 HIGH)

EPSS: 0.01%

updated 2026-03-20T22:16:28.973000

2 posts

Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, a stored XSS vulnerability in SVG asset reuploads allows authenticated users with asset upload permissions to bypass SVG sanitization and inject malicious JavaScript that executes when the asset is viewed. This has been fixed in 5.73.14 and 6.7.0.

thehackerwire@mastodon.social at 2026-03-20T22:23:31.000Z ##

๐ŸŸ  CVE-2026-33172 - High (8.7)

Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, a stored XSS vulnerability in SVG asset reuploads allows authenticated users with asset upload permissions to bypass SVG sanitization and i...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:17:30.000Z ##

๐ŸŸ  CVE-2026-33172 - High (8.7)

Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, a stored XSS vulnerability in SVG asset reuploads allows authenticated users with asset upload permissions to bypass SVG sanitization and i...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33166
(8.6 HIGH)

EPSS: 0.01%

updated 2026-03-20T22:16:28.660000

2 posts

Allure 2 is the version 2.x branch of Allure Report, a multi-language test reporting tool. The Allure report generator prior to version 2.38.0 is vulnerable to an arbitrary file read via path traversal when processing test results. An attacker can craft a malicious result file (-result.json, -container.json, or .plist) that points an attachment source to a sensitive file on the host system. During

thehackerwire@mastodon.social at 2026-03-20T22:23:21.000Z ##

๐ŸŸ  CVE-2026-33166 - High (8.6)

Allure 2 is the version 2.x branch of Allure Report, a multi-language test reporting tool. The Allure report generator prior to version 2.38.0 is vulnerable to an arbitrary file read via path traversal when processing test results. An attacker can...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:17:20.000Z ##

๐ŸŸ  CVE-2026-33166 - High (8.6)

Allure 2 is the version 2.x branch of Allure Report, a multi-language test reporting tool. The Allure report generator prior to version 2.38.0 is vulnerable to an arbitrary file read via path traversal when processing test results. An attacker can...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21992
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-20T22:16:26.933000

11 posts

Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) and Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle

1 repos

https://github.com/TEXploited/CVE-2026-21992

offseq at 2026-03-23T06:00:26.155Z ##

๐Ÿ”ด CRITICAL: Oracle Identity Manager RCE (CVE-2026-21992) allows unauthenticated remote code execution. No active exploitation reported yet, but patch now to avoid full compromise. Review deployments and restrict access. radar.offseq.com/threat/oracle

##

cyberveille@mastobot.ping.moi at 2026-03-23T06:00:12.000Z ##

๐Ÿ“ข Oracle publie un correctif d'urgence pour une faille RCE critique dans Identity Manager
๐Ÿ“ ## ๐Ÿ” Correctif d'urgence Oracle โ€“ CVE-2026-21992

**Source :** BleepingComputer...
๐Ÿ“– cyberveille : cyberveille.ch/posts/2026-03-2
๐ŸŒ source : bleepingcomputer.com/news/secu
#CVE_2026_21992 #IOC #Cyberveille

##

571906@ap.podcastindex.org at 2026-03-23T02:00:02.000Z ##

New Episode: SANS Stormcast Monday, March 23rd, 2026: GSocket Backdoor in Bash; Oracle Security Alert; Rockwell Attacks

Shownotes:

GSocket Backdoor Delivered Through Bash Script
https://isc.sans.edu/diary/GSocket+Backdoor+Delivered+Through+Bash+Script/32816/#comments
Oracle Security Alert CVE-2026-21992 Released
https://blogs.oracle.com/security/alert-cve-2026-219

Transcript

AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans

Or Listen right here.

##

thehackerwire@mastodon.social at 2026-03-22T01:41:03.000Z ##

๐Ÿ”ด CVE-2026-21992 - Critical (9.8)

Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) and Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security). Supported versions that are aff...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

hackerworkspace at 2026-03-21T17:47:47.977Z ##

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

thehackernews.com/2026/03/orac

Short summary: hackerworkspace.com/article/or

##

offseq@infosec.exchange at 2026-03-23T06:00:26.000Z ##

๐Ÿ”ด CRITICAL: Oracle Identity Manager RCE (CVE-2026-21992) allows unauthenticated remote code execution. No active exploitation reported yet, but patch now to avoid full compromise. Review deployments and restrict access. radar.offseq.com/threat/oracle #OffSeq #Oracle #Vuln #Patch

##

thehackerwire@mastodon.social at 2026-03-22T01:41:03.000Z ##

๐Ÿ”ด CVE-2026-21992 - Critical (9.8)

Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) and Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security). Supported versions that are aff...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

hackerworkspace@infosec.exchange at 2026-03-21T17:47:47.000Z ##

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

thehackernews.com/2026/03/orac

Short summary: hackerworkspace.com/article/or

#cybersecurity #vulnerability #exploit

##

youranonnewsirc@nerdculture.de at 2026-03-21T16:17:40.000Z ##

Geopolitical tensions remain high as the Iran conflict disrupts the Strait of Hormuz, impacting oil prices and global tech supply chains due to halted helium output from Qatar (Mar 20-21, 2026). In technology, Google introduced a mandatory 24-hour wait for Android sideloading from unverified developers (Mar 20, 2026), while Nvidia showcased new AI chips at GTC 2026 (Mar 20, 2026). Cybersecurity saw Oracle patch a critical RCE vulnerability (CVE-2026-21992) (Mar 21, 2026), and Iranian-linked hackers targeted medical tech firm Stryker, wiping devices (Mar 20, 2026). A Trivy supply chain attack also deployed 'CanisterWorm' across npm packages (Mar 20, 2026).

#Cybersecurity #Geopolitics #TechNews

##

beyondmachines1@infosec.exchange at 2026-03-21T09:01:48.000Z ##

Oracle Issues Emergency Patch for Critical Vulnerability in Identity Manager, Web Services Manager

Oracle released an emergency patch for a critical remote code execution vulnerability (CVE-2026-21992) in Identity Manager and Web Services Manager that allows unauthenticated attackers to take over systems.

**If you're running Oracle Fusion Middleware , Oracle Identity Manager or Oracle Web Services Manager, this is important and probably urgent. If posssible, isolate the system to trusted networks only and use a Web Application Firewall with custom rules for this endoint. Then patch ASAP, because this flaw will be exploited, very soon.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

campuscodi@mastodon.social at 2026-03-20T15:48:39.000Z ##

Oracle issues an out-of-band security update for a pre-auth RCE in Oracle Identity Manager

oracle.com/security-alerts/ale

##

CVE-2026-33154
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-20T21:34:04

1 posts

### Summary Dynaconf is vulnerable to Server-Side Template Injection (SSTI) due to unsafe template evaluation in the @jinja resolver. When the jinja2 package is installed, Dynaconf evaluates template expressions embedded in configuration values without a sandboxed environment. If an attacker can influence configuration sources such as: environment variables .env files container environment config

thehackerwire@mastodon.social at 2026-03-20T21:22:24.000Z ##

๐ŸŸ  CVE-2026-33154 - High (7.5)

dynaconf is a configuration management tool for Python. Prior to version 3.2.13, Dynaconf is vulnerable to Server-Side Template Injection (SSTI) due to unsafe template evaluation in the @Jinja resolver. When the jinja2 package is installed, Dynaco...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33142
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-20T21:33:29

1 posts

The fix for GHSA-p5g2-jm85-8g35 (ClickHouse SQL injection via aggregate query parameters) added column name validation to the `_aggregateBy` method but did not apply the same validation to three other query construction paths in `StatementGenerator`. The `toSortStatement`, `toSelectStatement`, and `toGroupByStatement` methods accept user-controlled object keys from API request bodies and interpola

thehackerwire@mastodon.social at 2026-03-20T21:22:33.000Z ##

๐ŸŸ  CVE-2026-33142 - High (8.1)

OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.34, the fix for CVE-2026-32306 (ClickHouse SQL injection via aggregate query parameters) added column name validation to the _aggregateBy method but did not...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33010
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-20T21:32:24

1 posts

### Summary When the HTTP server is enabled (`MCP_HTTP_ENABLED=true`), the application configures FastAPI's CORSMiddleware with `allow_origins=['*']`, `allow_credentials=True`, `allow_methods=["*"]`, and `allow_headers=["*"]`. The wildcard `Access-Control-Allow-Origin: *` header permits any website to read API responses cross-origin. When combined with anonymous access (`MCP_ALLOW_ANONYMOUS_ACCESS

thehackerwire@mastodon.social at 2026-03-20T20:00:16.000Z ##

๐ŸŸ  CVE-2026-33010 - High (8.1)

mcp-memory-service is an open-source memory backend for multi-agent systems. Prior to version 10.25.1, when the HTTP server is enabled (MCP_HTTP_ENABLED=true), the application configures FastAPI's CORSMiddleware with allow_origins=['*'], allow_cre...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4497
(7.3 HIGH)

EPSS: 1.91%

updated 2026-03-20T21:31:34

2 posts

A vulnerability was determined in Totolink WA300 5.2cu.7112_B20190227. Affected by this issue is the function recvUpgradeNewFw of the file /cgi-bin/cstecgi.cgi. This manipulation causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

secdb at 2026-03-23T00:01:26.705Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-54068
(9.8 CRITICAL)

EPSS: 48.85%

updated 2026-03-20T21:28:57

3 posts

### Impact In Livewire v3 (โ‰ค 3.6.3), a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does no

Nuclei template

5 repos

https://github.com/synacktiv/Livepyre

https://github.com/flame-11/CVE-2025-54068-livewire

https://github.com/z0d131482700x/Livewire2025CVE

https://github.com/haxorstars/CVE-2025-54068

https://github.com/Jenderal92/livewire-vuln-scanner

secdb@infosec.exchange at 2026-03-20T18:00:21.000Z ##

๐Ÿšจ [CISA-2026:0320] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

โš ๏ธ CVE-2025-31277 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/124147 ; support.apple.com/en-us/124149 ; support.apple.com/en-us/124152 ; support.apple.com/en-us/124153 ; support.apple.com/en-us/124155 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-32432 (secdb.nttzen.cloud/cve/detail/)
- Name: Craft CMS Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Craft CMS
- Product: Craft CMS
- Notes: craftcms.com/knowledge-base/cr ; github.com/craftcms/cms/securi ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-43510 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Improper Locking Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-43520 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Classic Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-54068 (secdb.nttzen.cloud/cve/detail/)
- Name: Laravel Livewire Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Laravel
- Product: Livewire
- Notes: github.com/livewire/livewire/s ; github.com/livewire/livewire/c ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260320 #cisa20260320 #cve_2025_31277 #cve_2025_32432 #cve_2025_43510 #cve_2025_43520 #cve_2025_54068 #cve202531277 #cve202532432 #cve202543510 #cve202543520 #cve202554068

##

cisakevtracker@mastodon.social at 2026-03-20T16:01:28.000Z ##

CVE ID: CVE-2025-54068
Vendor: Laravel
Product: Livewire
Date Added: 2026-03-20
Notes: github.com/livewire/livewire/s ; github.com/livewire/livewire/c ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-20T16:01:15.000Z ##

Looks like CISA has added to the KEV catalogue. Today's winner is Apple.

- CVE-2025-31277: Apple Multiple Products Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43520: Apple Multiple Products Classic Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-54068: Laravel Livewire Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-32432: Craft CMS Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Apple #infosec #vulnerability

##

CVE-2025-32432
(10.0 CRITICAL)

EPSS: 89.44%

updated 2026-03-20T21:28:38

3 posts

### Impact This is an additional fix for https://github.com/craftcms/cms/security/advisories/GHSA-4w8r-3xrw-v25g This is a high-impact, low-complexity attack vector. To mitigate the issue, users running Craft installations before the fixed versions are encouraged to update to at least that version. ### Details https://craftcms.com/knowledge-base/craft-cms-cve-2025-32432 ### References https

Nuclei template

4 repos

https://github.com/Chocapikk/CVE-2025-32432

https://github.com/CTY-Research-1/CVE-2025-32432-PoC

https://github.com/Sachinart/CVE-2025-32432

https://github.com/bambooqj/CVE-2025-32432

secdb@infosec.exchange at 2026-03-20T18:00:21.000Z ##

๐Ÿšจ [CISA-2026:0320] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

โš ๏ธ CVE-2025-31277 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/124147 ; support.apple.com/en-us/124149 ; support.apple.com/en-us/124152 ; support.apple.com/en-us/124153 ; support.apple.com/en-us/124155 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-32432 (secdb.nttzen.cloud/cve/detail/)
- Name: Craft CMS Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Craft CMS
- Product: Craft CMS
- Notes: craftcms.com/knowledge-base/cr ; github.com/craftcms/cms/securi ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-43510 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Improper Locking Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-43520 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Classic Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-54068 (secdb.nttzen.cloud/cve/detail/)
- Name: Laravel Livewire Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Laravel
- Product: Livewire
- Notes: github.com/livewire/livewire/s ; github.com/livewire/livewire/c ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260320 #cisa20260320 #cve_2025_31277 #cve_2025_32432 #cve_2025_43510 #cve_2025_43520 #cve_2025_54068 #cve202531277 #cve202532432 #cve202543510 #cve202543520 #cve202554068

##

AAKL@infosec.exchange at 2026-03-20T16:01:15.000Z ##

Looks like CISA has added to the KEV catalogue. Today's winner is Apple.

- CVE-2025-31277: Apple Multiple Products Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43520: Apple Multiple Products Classic Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-54068: Laravel Livewire Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-32432: Craft CMS Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Apple #infosec #vulnerability

##

cisakevtracker@mastodon.social at 2026-03-20T16:01:13.000Z ##

CVE ID: CVE-2025-32432
Vendor: Craft CMS
Product: Craft CMS
Date Added: 2026-03-20
Notes: craftcms.com/knowledge-base/cr ; github.com/craftcms/cms/securi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-33068(CVSS UNKNOWN)

EPSS: 0.14%

updated 2026-03-20T21:24:22

2 posts

Claude Code resolved the permission mode from settings files, including the repo-controlled `.claude/settings.json`, before determining whether to display the workspace trust confirmation dialog. A malicious repository could set `permissions.defaultMode` to `bypassPermissions` in its committed `.claude/settings.json`, causing the trust dialog to be silently skipped on first open. This allowed a us

hackerworkspace@infosec.exchange at 2026-03-20T20:54:34.000Z ##

RAXE-2026-040: Claude Code Workspace Trust Dialog Bypass via Repository Settings (CVE-2026-33068) | RAXE Labs

raxe.ai/labs/advisories/RAXE-2

Short summary: hackerworkspace.com/article/ra

#cybersecurity #vulnerability #exploit

##

_r_netsec@infosec.exchange at 2026-03-20T17:43:05.000Z ##

Claude Code workspace trust dialog bypass via repository settings loading order [CVE-2026-33068, CVSS 7.7]. Settings resolved before trust dialog shown. raxe.ai/labs/advisories/RAXE-2

##

CVE-2026-33057
(9.8 CRITICAL)

EPSS: 0.12%

updated 2026-03-20T21:23:52

1 posts

#### Summary An explicit web endpoint inside the `ai/` testing module infrastructure directly ingests untrusted Python code strings unconditionally without authentication measures, yielding standard Unrestricted Remote Code Execution. Any individual capable of routing HTTP logic to this server block will gain explicit host-machine command rights. #### Details The AI codebase package includes a li

thehackerwire@mastodon.social at 2026-03-20T22:16:46.000Z ##

๐Ÿ”ด CVE-2026-33057 - Critical (9.8)

Mesop is a Python-based UI framework that allows users to build web applications. In versions 1.2.2 and below, an explicit web endpoint inside the ai/ testing module infrastructure directly ingests untrusted Python code strings unconditionally wit...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33054
(10.0 CRITICAL)

EPSS: 0.02%

updated 2026-03-20T21:23:23

1 posts

#### Summary A Path Traversal vulnerability allows any user (or attacker) supplying an untrusted `state_token` through the UI stream payload to arbitrarily target files on the disk under the standard file-based runtime backend. This can result in application denial of service (via crash loops when reading non-msgpack target files as configurations), or arbitrary file manipulation. #### Details Wh

thehackerwire@mastodon.social at 2026-03-20T22:17:57.000Z ##

๐Ÿ”ด CVE-2026-33054 - Critical (10)

Mesop is a Python-based UI framework that allows users to build web applications. Versions 1.2.2 and below contain a Path Traversal vulnerability that allows any user supplying an untrusted state_token through the UI stream payload to arbitrarily ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33043
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-20T21:23:01

2 posts

### Summary `/objects/phpsessionid.json.php` exposes the current PHP session ID to any unauthenticated request. The `allowOrigin()` function reflects any `Origin` header back in `Access-Control-Allow-Origin` with `Access-Control-Allow-Credentials: true`, enabling cross-origin session theft and full account takeover. ### Details **File:** `objects/phpsessionid.json.php` ```php allowOrigin(); $o

thehackerwire@mastodon.social at 2026-03-20T23:03:57.000Z ##

๐ŸŸ  CVE-2026-33043 - High (8.1)

WWBN AVideo is an open source video platform. In versions 25.0 and below, /objects/phpsessionid.json.php exposes the current PHP session ID to any unauthenticated request. The allowOrigin() function reflects any Origin header back in Access-Contro...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:00:37.000Z ##

๐ŸŸ  CVE-2026-33043 - High (8.1)

WWBN AVideo is an open source video platform. In versions 25.0 and below, /objects/phpsessionid.json.php exposes the current PHP session ID to any unauthenticated request. The allowOrigin() function reflects any Origin header back in Access-Contro...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33039
(8.6 HIGH)

EPSS: 0.01%

updated 2026-03-20T21:22:41

1 posts

## Summary The `plugin/LiveLinks/proxy.php` endpoint validates user-supplied URLs against internal/private networks using `isSSRFSafeURL()`, but only checks the initial URL. When the initial URL responds with an HTTP redirect (`Location` header), the redirect target is fetched via `fakeBrowser()` without re-validation, allowing an attacker to reach internal services (cloud metadata, RFC1918 addres

thehackerwire@mastodon.social at 2026-03-20T22:18:05.000Z ##

๐ŸŸ  CVE-2026-33039 - High (8.6)

WWBN AVideo is an open source video platform. In versions 25.0 and below, the plugin/LiveLinks/proxy.php endpoint validates user-supplied URLs against internal/private networks using isSSRFSafeURL(), but only checks the initial URL. When the initi...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33038
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-20T21:22:32

1 posts

## Summary The `install/checkConfiguration.php` endpoint performs full application initialization โ€” database setup, admin account creation, and configuration file write โ€” from unauthenticated POST input. The only guard is checking whether `videos/configuration.php` already exists. On uninitialized deployments, any remote attacker can complete the installation with attacker-controlled credentials a

thehackerwire@mastodon.social at 2026-03-20T23:00:52.000Z ##

๐ŸŸ  CVE-2026-33038 - High (8.1)

WWBN AVideo is an open source video platform. Versions 25.0 and below are vulnerable to unauthenticated application takeover through the install/checkConfiguration.php endpoint. install/checkConfiguration.php performs full application initializati...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33012
(7.5 HIGH)

EPSS: 0.10%

updated 2026-03-20T21:21:56

1 posts

`DefaultHtmlErrorResponseBodyProvider` in `io.micronaut:micronaut-http-server` since `4.7.0` and until `4.10.7` used an unbounded `ConcurrentHashMap` cache with no eviction policy. If the application throws an exception whose message may be influenced by an attacker, for example, including request query value parameters, this could be used by remote attackers to cause a denial of service (unbound

thehackerwire@mastodon.social at 2026-03-20T23:01:13.000Z ##

๐ŸŸ  CVE-2026-33012 - High (7.5)

Micronaut Framework is a JVM-based full stack Java framework designed for building modular, easily testable JVM applications. Versions 4.7.0 through 4.10.16 used an unbounded ConcurrentHashMap cache with no eviction policy in its DefaultHtmlError...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32940
(9.3 CRITICAL)

EPSS: 0.05%

updated 2026-03-20T21:21:11

1 posts

# SanitizeSVG bypass via data:text/xml in getDynamicIcon (incomplete fix for CVE-2026-29183) `SanitizeSVG` blocks `data:text/html` and `data:image/svg+xml` in href attributes but misses `data:text/xml` and `data:application/xml`. Both render SVG with `onload` JavaScript execution (confirmed in Chromium 136, other browsers untested). `/api/icon/getDynamicIcon` is unauthenticated and serves SVG as

thehackerwire@mastodon.social at 2026-03-20T23:01:31.000Z ##

๐Ÿ”ด CVE-2026-32940 - Critical (9.3)

SiYuan is a personal knowledge management system. In versions 3.6.0 and below, SanitizeSVG has an incomplete blocklist โ€” it blocks data:text/html and data:image/svg+xml in href attributes but misses data:text/xml and data:application/xml, both o...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32938
(9.9 CRITICAL)

EPSS: 0.09%

updated 2026-03-20T21:21:06

1 posts

### Summary In SiYuan, `/api/lute/html2BlockDOM` on the desktop copies local files pointed to by `file://` links in pasted HTML into the workspace assets directory without validating paths against a sensitive-path list. Together with `GET /assets/*path`, which only requires authentication, a publish-service visitor can cause the desktop kernel to copy any readable sensitive file and then read it

thehackerwire@mastodon.social at 2026-03-20T23:14:49.000Z ##

๐Ÿ”ด CVE-2026-32938 - Critical (9.9)

SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the /api/lute/html2BlockDOM on the desktop copies local files pointed to by file:// links in pasted HTML into the workspace assets directory without validating paths ag...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32025
(7.5 HIGH)

EPSS: 0.05%

updated 2026-03-20T21:13:30

1 posts

This issue is a browser-origin WebSocket auth chain on local loopback deployments using password auth. It is serious, but conditional: an attacker must get the user to open a malicious page and then successfully guess the gateway password. ## Context and Preconditions OpenClawโ€™s web/gateway surface is designed for local use and trusted-operator workflows. In affected versions, a browser-origin c

thehackerwire@mastodon.social at 2026-03-19T23:00:23.000Z ##

๐ŸŸ  CVE-2026-32025 - High (7.5)

OpenClaw versions prior to 2026.2.25 contain an authentication hardening gap in browser-origin WebSocket clients that allows attackers to bypass origin checks and auth throttling on loopback deployments. An attacker can trick a user into opening a...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32011
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-20T21:13:05

1 posts

## Impact OpenClaw webhook handlers for BlueBubbles and Google Chat accepted and parsed request bodies before authentication and signature checks on vulnerable releases. This allowed unauthenticated clients to hold parser work open with slow/oversized request bodies and degrade availability (slow-request DoS). ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected releases: `<=

thehackerwire@mastodon.social at 2026-03-19T23:00:33.000Z ##

๐ŸŸ  CVE-2026-32011 - High (7.5)

OpenClaw versions prior to 2026.3.2 contain a denial of service vulnerability in webhook handlers for BlueBubbles and Google Chat that parse request bodies before performing authentication and signature validation. Unauthenticated attackers can ex...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22731
(8.2 HIGH)

EPSS: 0.04%

updated 2026-03-20T20:41:31

1 posts

Spring Boot applications with Actuator can be vulnerable to an "Authentication Bypass" vulnerability when an application endpoint that requires authentication is declared under a specific path, already configured for a Health Group additional path. This issue affects Spring Boot: from 4.0 before 4.0.3, from 3.5 before 3.5.11, from 3.4 before 3.4.15. This CVE is similar but not equivalent to CVE-20

thehackerwire@mastodon.social at 2026-03-19T23:23:42.000Z ##

๐ŸŸ  CVE-2026-22731 - High (8.2)

Spring Boot applications with Actuator can be vulnerable to an "Authentication Bypass" vulnerability when an application endpoint that requires authentication is declared under a specific path, already configured for a Health Group additional path...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33128
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-20T20:00:21.330000

1 posts

H3 is a minimal H(TTP) framework. In versions prior to 1.15.6 and between 2.0.0 through 2.0.1-rc.14, createEventStream is vulnerable to Server-Sent Events (SSE) injection due to missing newline sanitization in formatEventStreamMessage() and formatEventStreamComment(). An attacker who controls any part of an SSE message field (id, event, data, or comment) can inject arbitrary SSE events to connecte

thehackerwire@mastodon.social at 2026-03-20T22:00:19.000Z ##

๐ŸŸ  CVE-2026-33128 - High (7.5)

H3 is a minimal H(TTP) framework. In versions prior to 1.15.6 and between 2.0.0 through 2.0.1-rc.14, createEventStream is vulnerable to Server-Sent Events (SSE) injection due to missing newline sanitization in formatEventStreamMessage() and format...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33053
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-20T19:39:11.410000

2 posts

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id path parameter and deletes it with only a generic authentication check (get_current_active_user dependency). However, the delete_api_key() CRUD function does NOT verify that the API key belongs to the current user before deletion.

thehackerwire@mastodon.social at 2026-03-20T23:00:31.000Z ##

๐ŸŸ  CVE-2026-33053 - High (8.8)

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id path parameter and deletes it with only a generic authentication check (get_curren...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:17:50.000Z ##

๐ŸŸ  CVE-2026-33053 - High (8.8)

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id path parameter and deletes it with only a generic authentication check (get_curren...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4444
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-20T19:32:16.683000

2 posts

Stack buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T04:00:24.000Z ##

๐ŸŸ  CVE-2026-4444 - High (8.8)

Stack buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T04:00:24.000Z ##

๐ŸŸ  CVE-2026-4444 - High (8.8)

Stack buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33017
(0 None)

EPSS: 0.46%

updated 2026-03-20T19:16:17.980000

8 posts

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored f

3 repos

https://github.com/MaxMnMl/langflow-CVE-2026-33017-poc

https://github.com/SimoesCTT/Sovereign-Echo-33017

https://github.com/omer-efe-curkus/CVE-2026-33017-Langflow-RCE-PoC

cyberveille@mastobot.ping.moi at 2026-03-23T03:30:12.000Z ##

๐Ÿ“ข CVE-2026-33017 : exploitation de Langflow en moins de 20h sans PoC public
๐Ÿ“ ## ๐Ÿ—“๏ธ Contexte

Source : Infosecurity Magazine, article de Phil Muncaster publiรฉ le 20 mars 2026, basรฉ sur un blog post de Sysdig.
๐Ÿ“– cyberveille : cyberveille.ch/posts/2026-03-2
๐ŸŒ source : infosecurity-magazine.com/news
#CVE_2026_33017 #IOC #Cyberveille

##

_r_netsec at 2026-03-22T16:58:05.910Z ##

Langflow Got Hacked Twice Through the Same exec() Call - CVE-2026-33017 (CVSS 9.3) exploited in 20 hours with no public PoC blog.barrack.ai/langflow-exec-

##

threatcodex at 2026-03-22T00:29:59.011Z ##

CVE-2026โ€“33017: How I Found an Unauthenticated RCE in Langflow by Reading the Code They Already Fixed
โ€“33017
medium.com/@aviral23/cve-2026-

##

_r_netsec@infosec.exchange at 2026-03-22T16:58:05.000Z ##

Langflow Got Hacked Twice Through the Same exec() Call - CVE-2026-33017 (CVSS 9.3) exploited in 20 hours with no public PoC blog.barrack.ai/langflow-exec-

##

threatcodex@infosec.exchange at 2026-03-22T00:29:59.000Z ##

CVE-2026โ€“33017: How I Found an Unauthenticated RCE in Langflow by Reading the Code They Already Fixed
#CVE_2026โ€“33017
medium.com/@aviral23/cve-2026-

##

beyondmachines1@infosec.exchange at 2026-03-21T10:01:49.000Z ##

Critical Langflow RCE Vulnerability CVE-2026-33017 Exploited Within Hours

Researchers report active exploitation of a critical RCE vulnerability (CVE-2026-33017) in Langflow that allows unauthenticated attackers to execute arbitrary Python code and steal sensitive API keys. The flaw was weaponized within 20 hours of disclosure, targeting exposed AI orchestration pipelines to harvest credentials and environment variables.

**If you're running Langflow, this is urgent. Update immediately to version 1.9.0.dev8 or later to patch CVE-2026-33017, and disable the AUTO_LOGIN=true default setting. Until you can update, restrict network access to the vulnerable endpoint, place Langflow behind a reverse proxy with authentication. Regardless if you patch or isolate, make sure to rotate all API keys and credentials the platform uses after isolating.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

hackerworkspace@infosec.exchange at 2026-03-20T20:51:29.000Z ##

Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure

thehackernews.com/2026/03/crit

Short summary: hackerworkspace.com/article/cr

#cybersecurity #threatintelligence #vulnerability

##

AAKL@infosec.exchange at 2026-03-20T14:56:47.000Z ##

From yesterday. Langflow is "an open-source visual framework for building AI agents and retrieval-augmented generation (RAG) pipelines."

Sysdig: CVE-2026-33017: How attackers compromised Langflow AI pipelines in 20 hours sysdig.com/blog/cve-2026-33017

More:

Infosecurity-Magazine: infosecurity-magazine.com/news #infosec

##

CVE-2026-32318
(7.6 HIGH)

EPSS: 0.01%

updated 2026-03-20T19:16:16.277000

1 posts

Cryptomator for IOS offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 2.8.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which

thehackerwire@mastodon.social at 2026-03-20T20:00:35.000Z ##

๐ŸŸ  CVE-2026-32318 - High (7.6)

Cryptomator for IOS offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 2.8.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middl...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4447
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-20T19:02:02.303000

2 posts

Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T04:01:59.000Z ##

๐ŸŸ  CVE-2026-4447 - High (8.8)

Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T04:01:59.000Z ##

๐ŸŸ  CVE-2026-4447 - High (8.8)

Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-31277
(8.8 HIGH)

EPSS: 0.39%

updated 2026-03-20T18:53:35.083000

3 posts

The issue was addressed with improved memory handling. This issue is fixed in Safari 18.6, watchOS 11.6, visionOS 2.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6. Processing maliciously crafted web content may lead to memory corruption.

secdb@infosec.exchange at 2026-03-20T18:00:21.000Z ##

๐Ÿšจ [CISA-2026:0320] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

โš ๏ธ CVE-2025-31277 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/124147 ; support.apple.com/en-us/124149 ; support.apple.com/en-us/124152 ; support.apple.com/en-us/124153 ; support.apple.com/en-us/124155 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-32432 (secdb.nttzen.cloud/cve/detail/)
- Name: Craft CMS Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Craft CMS
- Product: Craft CMS
- Notes: craftcms.com/knowledge-base/cr ; github.com/craftcms/cms/securi ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-43510 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Improper Locking Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-43520 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Classic Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-54068 (secdb.nttzen.cloud/cve/detail/)
- Name: Laravel Livewire Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Laravel
- Product: Livewire
- Notes: github.com/livewire/livewire/s ; github.com/livewire/livewire/c ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260320 #cisa20260320 #cve_2025_31277 #cve_2025_32432 #cve_2025_43510 #cve_2025_43520 #cve_2025_54068 #cve202531277 #cve202532432 #cve202543510 #cve202543520 #cve202554068

##

cisakevtracker@mastodon.social at 2026-03-20T16:02:15.000Z ##

CVE ID: CVE-2025-31277
Vendor: Apple
Product: Multiple Products
Date Added: 2026-03-20
Notes: support.apple.com/en-us/124147 ; support.apple.com/en-us/124149 ; support.apple.com/en-us/124152 ; support.apple.com/en-us/124153 ; support.apple.com/en-us/124155 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-20T16:01:15.000Z ##

Looks like CISA has added to the KEV catalogue. Today's winner is Apple.

- CVE-2025-31277: Apple Multiple Products Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43520: Apple Multiple Products Classic Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-54068: Laravel Livewire Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-32432: Craft CMS Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Apple #infosec #vulnerability

##

CVE-2025-43510
(7.8 HIGH)

EPSS: 0.40%

updated 2026-03-20T18:39:56.413000

3 posts

A memory corruption issue was addressed with improved lock state checking. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may cause unexpected changes in memory shared between processes.

secdb@infosec.exchange at 2026-03-20T18:00:21.000Z ##

๐Ÿšจ [CISA-2026:0320] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

โš ๏ธ CVE-2025-31277 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/124147 ; support.apple.com/en-us/124149 ; support.apple.com/en-us/124152 ; support.apple.com/en-us/124153 ; support.apple.com/en-us/124155 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-32432 (secdb.nttzen.cloud/cve/detail/)
- Name: Craft CMS Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Craft CMS
- Product: Craft CMS
- Notes: craftcms.com/knowledge-base/cr ; github.com/craftcms/cms/securi ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-43510 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Improper Locking Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-43520 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Classic Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-54068 (secdb.nttzen.cloud/cve/detail/)
- Name: Laravel Livewire Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Laravel
- Product: Livewire
- Notes: github.com/livewire/livewire/s ; github.com/livewire/livewire/c ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260320 #cisa20260320 #cve_2025_31277 #cve_2025_32432 #cve_2025_43510 #cve_2025_43520 #cve_2025_54068 #cve202531277 #cve202532432 #cve202543510 #cve202543520 #cve202554068

##

cisakevtracker@mastodon.social at 2026-03-20T16:01:44.000Z ##

CVE ID: CVE-2025-43510
Vendor: Apple
Product: Multiple Products
Date Added: 2026-03-20
Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-20T16:01:15.000Z ##

Looks like CISA has added to the KEV catalogue. Today's winner is Apple.

- CVE-2025-31277: Apple Multiple Products Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43520: Apple Multiple Products Classic Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-54068: Laravel Livewire Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-32432: Craft CMS Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Apple #infosec #vulnerability

##

CVE-2025-43520
(7.1 HIGH)

EPSS: 0.41%

updated 2026-03-20T18:39:07.610000

3 posts

A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.

secdb@infosec.exchange at 2026-03-20T18:00:21.000Z ##

๐Ÿšจ [CISA-2026:0320] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

โš ๏ธ CVE-2025-31277 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/124147 ; support.apple.com/en-us/124149 ; support.apple.com/en-us/124152 ; support.apple.com/en-us/124153 ; support.apple.com/en-us/124155 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-32432 (secdb.nttzen.cloud/cve/detail/)
- Name: Craft CMS Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Craft CMS
- Product: Craft CMS
- Notes: craftcms.com/knowledge-base/cr ; github.com/craftcms/cms/securi ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-43510 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Improper Locking Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-43520 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Classic Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

โš ๏ธ CVE-2025-54068 (secdb.nttzen.cloud/cve/detail/)
- Name: Laravel Livewire Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Laravel
- Product: Livewire
- Notes: github.com/livewire/livewire/s ; github.com/livewire/livewire/c ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260320 #cisa20260320 #cve_2025_31277 #cve_2025_32432 #cve_2025_43510 #cve_2025_43520 #cve_2025_54068 #cve202531277 #cve202532432 #cve202543510 #cve202543520 #cve202554068

##

cisakevtracker@mastodon.social at 2026-03-20T16:01:59.000Z ##

CVE ID: CVE-2025-43520
Vendor: Apple
Product: Multiple Products
Date Added: 2026-03-20
Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-20T16:01:15.000Z ##

Looks like CISA has added to the KEV catalogue. Today's winner is Apple.

- CVE-2025-31277: Apple Multiple Products Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43520: Apple Multiple Products Classic Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-54068: Laravel Livewire Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-32432: Craft CMS Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Apple #infosec #vulnerability

##

CVE-2026-4491
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-20T18:31:30

1 posts

A vulnerability has been found in Tenda A18 Pro 02.03.02.28. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-03-20T21:00:14.000Z ##

๐ŸŸ  CVE-2026-4491 - High (8.8)

A vulnerability has been found in Tenda A18 Pro 02.03.02.28. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack can be executed remote...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4493
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-20T18:31:30

1 posts

A vulnerability was determined in Tenda A18 Pro 02.03.02.28. The impacted element is the function sub_423B50 of the file /goform/setMacFilterCfg of the component MAC Filtering Configuration Endpoint. Executing a manipulation of the argument deviceList can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-20T20:01:30.000Z ##

๐ŸŸ  CVE-2026-4493 - High (8.8)

A vulnerability was determined in Tenda A18 Pro 02.03.02.28. The impacted element is the function sub_423B50 of the file /goform/setMacFilterCfg of the component MAC Filtering Configuration Endpoint. Executing a manipulation of the argument device...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4490
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-20T18:31:29

1 posts

A flaw has been found in Tenda A18 Pro 02.03.02.28. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. This manipulation causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-03-20T20:20:47.000Z ##

๐ŸŸ  CVE-2026-4490 - High (8.8)

A flaw has been found in Tenda A18 Pro 02.03.02.28. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. This manipulation causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit ha...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4492
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-20T18:31:28

1 posts

A vulnerability was found in Tenda A18 Pro 02.03.02.28. The affected element is the function set_qosMib_list of the file /goform/formSetQosBand. Performing a manipulation of the argument list results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-03-20T20:01:20.000Z ##

๐ŸŸ  CVE-2026-4492 - High (8.8)

A vulnerability was found in Tenda A18 Pro 02.03.02.28. The affected element is the function set_qosMib_list of the file /goform/formSetQosBand. Performing a manipulation of the argument list results in stack-based buffer overflow. The attack is p...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32989
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-20T18:31:27

1 posts

Precurio Intranet Portal 4.4 contains a cross-site request forgery vulnerability that allows attackers to induce authenticated users to submit crafted requests to a profile update endpoint handling file uploads. Attackers can exploit this to upload executable files to web-accessible locations, leading to arbitrary code execution in the context of the web server.

thehackerwire@mastodon.social at 2026-03-20T21:00:47.000Z ##

๐ŸŸ  CVE-2026-32989 - High (8.8)

Precurio Intranet Portal 4.4 contains a cross-site request forgery vulnerability that allows attackers to induce authenticated users to submit crafted requests to a profile update endpoint handling file uploads. Attackers can exploit this to uploa...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4489
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-20T18:31:27

1 posts

A vulnerability was detected in Tenda A18 Pro 02.03.02.28. This vulnerability affects the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. The manipulation results in stack-based buffer overflow. The attack may be launched remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-03-20T21:00:33.000Z ##

๐ŸŸ  CVE-2026-4489 - High (8.8)

A vulnerability was detected in Tenda A18 Pro 02.03.02.28. This vulnerability affects the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. The manipulation results in stack-based buffer overflow. The attack may be lau...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4464
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T18:31:18

2 posts

Integer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-03-22T02:33:52.000Z ##

๐ŸŸ  CVE-2026-4464 - High (8.8)

Integer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T02:33:52.000Z ##

๐ŸŸ  CVE-2026-4464 - High (8.8)

Integer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32303
(7.6 HIGH)

EPSS: 0.02%

updated 2026-03-20T18:16:14.593000

1 posts

Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.1, an integrity check vulnerability allows an attacker to tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration b

thehackerwire@mastodon.social at 2026-03-20T20:20:27.000Z ##

๐ŸŸ  CVE-2026-32303 - High (7.6)

Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.1, an integrity check vulnerability allows an attacker to tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loadin...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31836
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-20T18:16:13.540000

1 posts

Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations. In versions from 3.5.1 and prior, a mass assignment vulnerability in Checkmate's user profile update endpoint allows any authenticated user to escalate their privileges to superadmin, bypassing all role-based access controls.

thehackerwire@mastodon.social at 2026-03-20T20:20:37.000Z ##

๐ŸŸ  CVE-2026-31836 - High (8.1)

Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations. In versions from 3.5.1 and prior, a mass assignment vulnerability in Che...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33001
(8.8 HIGH)

EPSS: 0.11%

updated 2026-03-20T18:08:15.507000

1 posts

Jenkins 2.554 and earlier, LTS 2.541.2 and earlier does not safely handle symbolic links during the extraction of .tar and .tar.gz archives, allowing crafted archives to write files to arbitrary locations on the filesystem, restricted only by file system access permissions of the user running Jenkins. This can be exploited to deploy malicious scripts or plugins on the controller by attackers with

CVE-2026-4452
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T18:07:58.067000

2 posts

Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:34:11.000Z ##

๐ŸŸ  CVE-2026-4452 - High (8.8)

Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T02:34:11.000Z ##

๐ŸŸ  CVE-2026-4452 - High (8.8)

Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4457
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T17:58:59.643000

2 posts

Type Confusion in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T04:00:13.000Z ##

๐ŸŸ  CVE-2026-4457 - High (8.8)

Type Confusion in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T04:00:13.000Z ##

๐ŸŸ  CVE-2026-4457 - High (8.8)

Type Confusion in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4458
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-20T17:58:37.903000

2 posts

Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:00:15.000Z ##

๐ŸŸ  CVE-2026-4458 - High (8.8)

Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T02:00:15.000Z ##

๐ŸŸ  CVE-2026-4458 - High (8.8)

Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4459
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T17:58:07.797000

2 posts

Out of bounds read and write in WebAudio in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:00:25.000Z ##

๐ŸŸ  CVE-2026-4459 - High (8.8)

Out of bounds read and write in WebAudio in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T02:00:25.000Z ##

๐ŸŸ  CVE-2026-4459 - High (8.8)

Out of bounds read and write in WebAudio in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4463
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-20T17:57:06.217000

2 posts

Heap buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:33:31.000Z ##

๐ŸŸ  CVE-2026-4463 - High (8.8)

Heap buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T02:33:31.000Z ##

๐ŸŸ  CVE-2026-4463 - High (8.8)

Heap buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4488
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-20T16:16:19.093000

1 posts

A vulnerability was identified in UTT HiPER 1250GW up to 3.2.7-210907-180535. Affected is the function strcpy of the file /goform/setSysAdm. Such manipulation of the argument GroupName leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-03-20T21:00:23.000Z ##

๐ŸŸ  CVE-2026-4488 - High (8.8)

A vulnerability was identified in UTT HiPER 1250GW up to 3.2.7-210907-180535. Affected is the function strcpy of the file /goform/setSysAdm. Such manipulation of the argument GroupName leads to buffer overflow. It is possible to launch the attack ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32701
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-20T15:56:45

1 posts

**Summary** Qwik City improperly inferred arrays from dotted form field names during `FormData` parsing. By submitting mixed array-index and object-property keys for the same path, an attacker could cause user-controlled properties to be written onto values that application code expected to be arrays. **Description** When processing `application/x-www-form-urlencoded` or `multipart/form-data` r

thehackerwire@mastodon.social at 2026-03-20T22:16:27.000Z ##

๐ŸŸ  CVE-2026-32701 - High (7.5)

Qwik is a performance-focused JavaScript framework. Versions prior to 1.19.2 improperly inferred arrays from dotted form field names during FormData parsing. By submitting mixed array-index and object-property keys for the same path, an attacker c...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4462
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T15:32:14

2 posts

Out of bounds read in Blink in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:33:22.000Z ##

๐ŸŸ  CVE-2026-4462 - High (8.8)

Out of bounds read in Blink in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T02:33:22.000Z ##

๐ŸŸ  CVE-2026-4462 - High (8.8)

Out of bounds read in Blink in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4446
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-20T15:32:13

2 posts

Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T04:01:50.000Z ##

๐ŸŸ  CVE-2026-4446 - High (8.8)

Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T04:01:50.000Z ##

๐ŸŸ  CVE-2026-4446 - High (8.8)

Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4445
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-20T15:32:13

2 posts

Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T04:00:33.000Z ##

๐ŸŸ  CVE-2026-4445 - High (8.8)

Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T04:00:33.000Z ##

๐ŸŸ  CVE-2026-4445 - High (8.8)

Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4456
(8.8 HIGH)

EPSS: 0.10%

updated 2026-03-20T15:32:13

2 posts

Use after free in Digital Credentials API in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T03:00:59.000Z ##

๐ŸŸ  CVE-2026-4456 - High (8.8)

Use after free in Digital Credentials API in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T03:00:59.000Z ##

๐ŸŸ  CVE-2026-4456 - High (8.8)

Use after free in Digital Credentials API in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4455
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T15:32:13

2 posts

Heap buffer overflow in PDFium in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T03:00:49.000Z ##

๐ŸŸ  CVE-2026-4455 - High (8.8)

Heap buffer overflow in PDFium in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T03:00:49.000Z ##

๐ŸŸ  CVE-2026-4455 - High (8.8)

Heap buffer overflow in PDFium in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4451
(8.8 HIGH)

EPSS: 0.10%

updated 2026-03-20T15:32:13

2 posts

Insufficient validation of untrusted input in Navigation in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:34:01.000Z ##

๐ŸŸ  CVE-2026-4451 - High (8.8)

Insufficient validation of untrusted input in Navigation in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium securit...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T02:34:01.000Z ##

๐ŸŸ  CVE-2026-4451 - High (8.8)

Insufficient validation of untrusted input in Navigation in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium securit...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4486
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-20T15:31:20

1 posts

A vulnerability was found in D-Link DIR-513 1.10. This affects the function formEasySetPassword of the file /goform/formEasySetPassword of the component Web Service. The manipulation of the argument curTime results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer

thehackerwire@mastodon.social at 2026-03-20T21:22:43.000Z ##

๐ŸŸ  CVE-2026-4486 - High (8.8)

A vulnerability was found in D-Link DIR-513 1.10. This affects the function formEasySetPassword of the file /goform/formEasySetPassword of the component Web Service. The manipulation of the argument curTime results in stack-based buffer overflow. ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4454
(8.8 HIGH)

EPSS: 0.10%

updated 2026-03-20T15:31:12

2 posts

Use after free in Network in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T03:00:40.000Z ##

๐ŸŸ  CVE-2026-4454 - High (8.8)

Use after free in Network in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T03:00:40.000Z ##

๐ŸŸ  CVE-2026-4454 - High (8.8)

Use after free in Network in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4461
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T15:31:12

2 posts

Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:33:13.000Z ##

๐ŸŸ  CVE-2026-4461 - High (8.8)

Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T02:33:13.000Z ##

๐ŸŸ  CVE-2026-4461 - High (8.8)

Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4460
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T15:31:12

2 posts

Out of bounds read in Skia in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:00:35.000Z ##

๐ŸŸ  CVE-2026-4460 - High (8.8)

Out of bounds read in Skia in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T02:00:35.000Z ##

๐ŸŸ  CVE-2026-4460 - High (8.8)

Out of bounds read in Skia in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4487
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-20T15:16:23.850000

1 posts

A vulnerability was determined in UTT HiPER 1200GW up to 2.5.3-170306. This impacts the function strcpy of the file /goform/websHostFilter. This manipulation causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-20T21:00:56.000Z ##

๐ŸŸ  CVE-2026-4487 - High (8.8)

A vulnerability was determined in UTT HiPER 1200GW up to 2.5.3-170306. This impacts the function strcpy of the file /goform/websHostFilter. This manipulation causes buffer overflow. It is possible to initiate the attack remotely. The exploit has b...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32767
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-20T15:16:17.220000

1 posts

SiYuan is a personal knowledge management system. Versions 3.6.0 and below contain an authorization bypass vulnerability in the /api/search/fullTextSearchBlock endpoint. When the method parameter is set to 2, the endpoint passes user-supplied input directly as a raw SQL statement to the underlying SQLite database without any authorization or read-only checks. This allows any authenticated user โ€” i

offseq@infosec.exchange at 2026-03-20T01:30:29.000Z ##

โš ๏ธ CVE-2026-32767: SiYuan (<3.6.1) has a CRITICAL SQL injection flaw in /api/search/fullTextSearchBlock. Any authenticated user can run SQL, risking full data compromise. Upgrade to 3.6.1+ ASAP. radar.offseq.com/threat/cve-20 #OffSeq #SiYuan #SQLInjection #Vuln

##

CVE-2026-22732
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-03-20T15:16:15.670000

2 posts

When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written.ย  This issue affects Spring Security: from 5.7.0 through 5.7.21, from 5.8.0 through 5.8.23, from 6.3.0 through 6.3.14, from 6.4.0 through 6.4.14, from 6.5.0 through 6.5.8, from 7.0.0 through 7.0.3.

offseq@infosec.exchange at 2026-03-20T00:00:54.000Z ##

๐Ÿšจ CVE-2026-22732 (CRITICAL, CVSS 9.1): Spring Security 5.7.0 โ€“ 7.0.3 vulnerability lets HTTP headers go unwritten, risking CSP/HSTS bypass. No auth needed, remote exploit possible. Upgrade urgently & enforce headers via WAF/CDN! radar.offseq.com/threat/cve-20 #OffSeq #SpringSecurity #CVE202622732

##

thehackerwire@mastodon.social at 2026-03-19T23:25:14.000Z ##

๐Ÿ”ด CVE-2026-22732 - Critical (9.1)

When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written. 
This issue affects Spring Security: from 5.7.0 through 5.7.21, from 5.8.0 through...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22172
(9.9 CRITICAL)

EPSS: 0.01%

updated 2026-03-20T15:16:15.490000

1 posts

OpenClaw versions prior to 2026.3.12 contain an authorization bypass vulnerability in the WebSocket connect path that allows shared-token or password-authenticated connections to self-declare elevated scopes without server-side binding. Attackers can exploit this logic flaw to present unauthorized scopes such as operator.admin and perform admin-only gateway operations.

thehackerwire@mastodon.social at 2026-03-20T21:01:06.000Z ##

๐Ÿ”ด CVE-2026-22172 - Critical (9.9)

OpenClaw versions prior to 2026.3.12 contain an authorization bypass vulnerability in the WebSocket connect path that allows shared-token or password-authenticated connections to self-declare elevated scopes without server-side binding. Attackers ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71260
(8.8 HIGH)

EPSS: 6.54%

updated 2026-03-20T13:39:46.493000

2 posts

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserialization of untrusted data vulnerability in the ASP.NET servlet's VIEWSTATE handling that allows authenticated attackers to execute arbitrary code. Attackers can supply crafted serialized objects to the VIEWSTATE parameter to achieve remote code execution and fully compromise the application.ย The following hotfixes remedia

1 repos

https://github.com/watchtowrlabs/watchTowr-vs-BMC-Footprints-RCE-CVE-2025-71257-CVE-2025-71260

secdb at 2026-03-23T00:01:26.705Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-71259
(4.3 MEDIUM)

EPSS: 1.87%

updated 2026-03-20T13:39:46.493000

2 posts

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind server-side request forgery vulnerability in the externalfeed/RSS API component that allows authenticated attackers to trigger arbitrary outbound requests from the server. Attackers can exploit insufficient validation of externally supplied resource references to interact with internal services or cause resource exhaustion

Nuclei template

secdb at 2026-03-23T00:01:26.705Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-4428
(7.4 HIGH)

EPSS: 0.02%

updated 2026-03-20T13:39:46.493000

1 posts

A logic error in CRL distribution point validation in AWS-LC before 1.71.0 causes partitioned CRLs to be incorrectly rejected as out of scope, which allows a revoked certificate to bypass certificate revocation checks. To remediate this issue, users should upgrade to AWS-LC 1.71.0 or AWS-LC-FIPS-3.3.0.

CVE-2026-32014
(8.0 HIGH)

EPSS: 0.02%

updated 2026-03-20T13:39:46.493000

1 posts

OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability where reconnect platform and deviceFamily fields are accepted from the client without being bound into the device-auth signature. An attacker with a paired node identity on the trusted network can spoof reconnect metadata to bypass platform-based node command policies and gain access to restricted commands.

thehackerwire@mastodon.social at 2026-03-19T23:01:02.000Z ##

๐ŸŸ  CVE-2026-32014 - High (8)

OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability where reconnect platform and deviceFamily fields are accepted from the client without being bound into the device-auth signature. An attacker with a paired node identit...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32013
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-20T13:39:46.493000

1 posts

OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted files to access arbitrary host files within gateway process permissions, potentially enabling code execution through file overwrite attacks.

thehackerwire@mastodon.social at 2026-03-19T23:00:42.000Z ##

๐ŸŸ  CVE-2026-32013 - High (8.8)

OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted file...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32194
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-03-20T13:39:46.493000

1 posts

Improper neutralization of special elements used in a command ('command injection') in Microsoft Bing Images allows an unauthorized attacker to execute code over a network.

1 repos

https://github.com/z3r0h3ro/CVE-2026-32194-POC

thehackerwire@mastodon.social at 2026-03-19T22:19:02.000Z ##

๐Ÿ”ด CVE-2026-32194 - Critical (9.8)

Improper neutralization of special elements used in a command ('command injection') in Microsoft Bing Images allows an unauthorized attacker to execute code over a network.

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33056
(0 None)

EPSS: 0.02%

updated 2026-03-20T13:37:50.737000

4 posts

tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and below, when unpacking a tar archive, the tar crate's unpack_dir function uses fs::metadata() to check whether a path that already exists is a directory. Because fs::metadata() follows symbolic links, a crafted tarball containing a symlink entry followed by a directory entry with the same name causes the crate to treat

alip@mastodon.online at 2026-03-22T22:04:44.000Z ##

Code does not become better out of thin air just because you rewrite it in #rustlang. TOCTOUs are typically language agnostic. Here's one for tar: blog.rust-lang.org/2026/03/21/ #security

##

lobsters@mastodon.social at 2026-03-22T09:05:10.000Z ##

Security advisory for Cargo lobste.rs/s/hmb3mz #rust #security
blog.rust-lang.org/2026/03/21/

##

alip@mastodon.online at 2026-03-22T22:04:44.000Z ##

Code does not become better out of thin air just because you rewrite it in #rustlang. TOCTOUs are typically language agnostic. Here's one for tar: blog.rust-lang.org/2026/03/21/ #security

##

lobsters@mastodon.social at 2026-03-22T09:05:10.000Z ##

Security advisory for Cargo lobste.rs/s/hmb3mz #rust #security
blog.rust-lang.org/2026/03/21/

##

CVE-2026-32933
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-20T13:37:50.737000

2 posts

AutoMapper is a convention-based object-object mapper in .NET. Versions prior to 15.1.1 and 16.1.1 are vulnerable to a Denial of Service (DoS) attack. When mapping deeply nested object graphs, the library uses recursive method calls without enforcing a default maximum depth limit. This allows an attacker to provide a specially crafted object graph that exhausts the thread's stack memory, triggerin

thehackerwire@mastodon.social at 2026-03-22T01:40:45.000Z ##

๐ŸŸ  CVE-2026-32933 - High (7.5)

AutoMapper is a convention-based object-object mapper in .NET. Versions prior to 15.1.1 and 16.1.1 are vulnerable to a Denial of Service (DoS) attack. When mapping deeply nested object graphs, the library uses recursive method calls without enforc...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T01:40:45.000Z ##

๐ŸŸ  CVE-2026-32933 - High (7.5)

AutoMapper is a convention-based object-object mapper in .NET. Versions prior to 15.1.1 and 16.1.1 are vulnerable to a Denial of Service (DoS) attack. When mapping deeply nested object graphs, the library uses recursive method calls without enforc...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33037
(8.1 HIGH)

EPSS: 0.23%

updated 2026-03-20T13:37:50.737000

2 posts

WWBN AVideo is an open source video platform. In versions 25.0 and below, the official Docker deployment files (docker-compose.yml, env.example) ship with the admin password set to "password", which is automatically used to seed the admin account during installation, meaning any instance deployed without overriding SYSTEM_ADMIN_PASSWORD is immediately vulnerable to trivial administrative takeover.

thehackerwire@mastodon.social at 2026-03-20T23:04:06.000Z ##

๐ŸŸ  CVE-2026-33037 - High (8.1)

WWBN AVideo is an open source video platform. In versions 25.0 and below, the official Docker deployment files (docker-compose.yml, env.example) ship with the admin password set to "password", which is automatically used to seed the admin account ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:00:46.000Z ##

๐ŸŸ  CVE-2026-33037 - High (8.1)

WWBN AVideo is an open source video platform. In versions 25.0 and below, the official Docker deployment files (docker-compose.yml, env.example) ship with the admin password set to "password", which is automatically used to seed the admin account ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4038
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-20T13:37:50.737000

2 posts

The Aimogen Pro plugin for WordPress is vulnerable to Arbitrary Function Call that can lead to privilege escalation due to a missing capability check on the 'aiomatic_call_ai_function_realtime' function in all versions up to, and including, 2.7.5. This makes it possible for unauthenticated attackers to call arbitrary WordPress functions such as 'update_option' to update the default role for regist

thehackerwire@mastodon.social at 2026-03-20T23:01:23.000Z ##

๐Ÿ”ด CVE-2026-4038 - Critical (9.8)

The Aimogen Pro plugin for WordPress is vulnerable to Arbitrary Function Call that can lead to privilege escalation due to a missing capability check on the 'aiomatic_call_ai_function_realtime' function in all versions up to, and including, 2.7.5....

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-20T04:30:27.000Z ##

โš ๏ธ CVE-2026-4038 (CRITICAL): Aimogen Pro WP plugin lets unauthenticated attackers gain admin via missing auth in aiomatic_call_ai_function_realtime. All versions affected. Disable plugin & monitor site integrity! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE20264038

##

CVE-2026-33036
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-20T13:37:50.737000

1 posts

fast-xml-parser allows users to process XML from JS object without C/C++ based libraries or callbacks. Versions 4.0.0-beta.3 through 5.5.5 contain a bypass vulnerability where numeric character references (&#NNN;, &#xHH;) and standard XML entities completely evade the entity expansion limits (e.g., maxTotalExpansions, maxExpandedLength) added to fix CVE-2026-26278, enabling XML entity expansion De

thehackerwire@mastodon.social at 2026-03-20T23:00:42.000Z ##

๐ŸŸ  CVE-2026-33036 - High (7.5)

fast-xml-parser allows users to process XML from JS object without C/C++ based libraries or callbacks. Versions 4.0.0-beta.3 through 5.5.5 contain a bypass vulnerability where numeric character references (&#NNN;, &#xHH;) and standard XML entities...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4478
(8.1 HIGH)

EPSS: 0.01%

updated 2026-03-20T13:37:50.737000

2 posts

A vulnerability was identified in Yi Technology YI Home Camera 2 2.1.1_20171024151200. This impacts an unknown function of the file home/web/ipc of the component HTTP Firmware Update Handler. The manipulation leads to improper verification of cryptographic signature. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is said to be diff

thehackerwire@mastodon.social at 2026-03-20T22:17:48.000Z ##

๐ŸŸ  CVE-2026-4478 - High (8.1)

A vulnerability was identified in Yi Technology YI Home Camera 2 2.1.1_20171024151200. This impacts an unknown function of the file home/web/ipc of the component HTTP Firmware Update Handler. The manipulation leads to improper verification of cryp...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-20T07:30:28.000Z ##

โš ๏ธ CVE-2026-4478 (CRITICAL, CVSS 9.2) hits Yi Home Camera 2 (2.1.1_20171024151200): Improper signature verification in HTTP firmware update handler. Public exploit, no vendor response. Monitor & segment affected devices. radar.offseq.com/threat/cve-20 #OffSeq #IoTSecurity #Vuln

##

CVE-2026-27625
(8.1 HIGH)

EPSS: 0.06%

updated 2026-03-20T13:37:50.737000

1 posts

Stirling-PDF is a locally hosted web application that performs various operations on PDF files. In versions prior to 2.5.2, the /api/v1/convert/markdown/pdf endpoint extracts user-supplied ZIP entries without path checks. Any authenticated user can write files outside the intended temporary working directory, leading to arbitrary file write with the privileges of the Stirling-PDF process user (sti

thehackerwire@mastodon.social at 2026-03-20T22:16:37.000Z ##

๐ŸŸ  CVE-2026-27625 - High (8.1)

Stirling-PDF is a locally hosted web application that performs various operations on PDF files. In versions prior to 2.5.2, the /api/v1/convert/markdown/pdf endpoint extracts user-supplied ZIP entries without path checks. Any authenticated user ca...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32721
(8.6 HIGH)

EPSS: 0.01%

updated 2026-03-20T13:37:50.737000

1 posts

LuCI is the OpenWrt Configuration Interface. Versions prior to both 24.10.5 and 25.12.0, contain a stored XSS vulnerability in the wireless scan modal, where SSID values from scan results are rendered as raw HTML without any sanitization. The wireless.js file in the luci-mod-network package passes SSIDs via a template literal to dom.append(), which processes them through innerHTML, allowing an att

thehackerwire@mastodon.social at 2026-03-19T23:23:23.000Z ##

๐ŸŸ  CVE-2026-32721 - High (8.6)

LuCI is the OpenWrt Configuration Interface. Versions prior to both 24.10.5 and 25.12.0, contain a stored XSS vulnerability in the wireless scan modal, where SSID values from scan results are rendered as raw HTML without any sanitization. The wire...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22324
(8.1 HIGH)

EPSS: 0.11%

updated 2026-03-20T12:31:12

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Melania allows PHP Local File Inclusion.This issue affects Melania: from n/a through 2.5.0.

thehackerwire@mastodon.social at 2026-03-20T22:00:31.000Z ##

๐ŸŸ  CVE-2026-22324 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Melania allows PHP Local File Inclusion.This issue affects Melania: from n/a through 2.5.0.

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4475
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-20T09:32:16

3 posts

A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did n

thehackerwire@mastodon.social at 2026-03-20T23:03:47.000Z ##

๐ŸŸ  CVE-2026-4475 - High (8.8)

A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:00:27.000Z ##

๐ŸŸ  CVE-2026-4475 - High (8.8)

A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:17:41.000Z ##

๐ŸŸ  CVE-2026-4475 - High (8.8)

A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32985
(9.8 CRITICAL)

EPSS: 0.64%

updated 2026-03-20T00:31:34

1 posts

Xerte Online Toolkits versions 3.14 and earlier contain an unauthenticated arbitrary file upload vulnerability in the template import functionality. The issue exists in /website_code/php/import/import.php where missing authentication checks allow an attacker to upload a crafted ZIP archive disguised as a project template. The archive can contain a malicious PHP payload placed in the media/ directo

offseq@infosec.exchange at 2026-03-20T03:00:25.000Z ##

๐Ÿ”ด CRITICAL: CVE-2026-32985 in Xerte Online Toolkits โ‰ค3.14 lets attackers upload PHP via import.php and gain RCE โ€” no auth needed! Patch ASAP or restrict access, disable PHP in user dirs. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202632985 #infosec #RCE

##

CVE-2026-32038(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-03-19T22:29:35

1 posts

### Summary In `openclaw@2026.2.23`, sandbox network hardening blocks `network=host` but still allows `network=container:<id>`. This can let a sandbox join another container's network namespace and reach services available in that namespace. ### Preconditions and Trust Model Context This issue requires a trusted-operator configuration path (for example setting `agents.defaults.sandbox.docker.net

thehackerwire@mastodon.social at 2026-03-19T22:19:12.000Z ##

๐Ÿ”ด CVE-2026-32038 - Critical (9.8)

OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.network parameter with container: values to reach s...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32596(CVSS UNKNOWN)

EPSS: 3.03%

updated 2026-03-19T21:01:58

2 posts

### Summary Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process command-lines containing credentials (passwords, API keys, tokens) to any network client. ### Details Root Cause: Authentication is optional and disabled by default. When no password is provided, the API router initializes with

Nuclei template

secdb at 2026-03-23T00:01:26.705Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-28500
(8.6 HIGH)

EPSS: 0.01%

updated 2026-03-19T18:36:41

2 posts

### Summary A security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification mechanism. While the function is designed to warn users when loading models from non-official sources, the use of the silent=True parameter completely suppresses all security warnings and confirmation prompts. ### The Technical Flaw The vulnerability is located in onnx/hub.py

_r_netsec at 2026-03-21T20:58:05.446Z ##

ONNX Hub silent=True suppresses all trust verification, enabling supply chain attacks on ML model loading (CVE-2026-28500, CVSS 9.1, no patch available) raxe.ai/labs/advisories/RAXE-2

##

_r_netsec@infosec.exchange at 2026-03-21T20:58:05.000Z ##

ONNX Hub silent=True suppresses all trust verification, enabling supply chain attacks on ML model loading (CVE-2026-28500, CVSS 9.1, no patch available) raxe.ai/labs/advisories/RAXE-2

##

CVE-2026-20131
(10.0 CRITICAL)

EPSS: 0.88%

updated 2026-03-19T18:32:21

5 posts

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java obj

3 repos

https://github.com/Sushilsin/CVE-2026-20131

https://github.com/p3Nt3st3r-sTAr/CVE-2026-20131-POC

https://github.com/sak110/CVE-2026-20131

cyberveille@mastobot.ping.moi at 2026-03-21T22:30:12.000Z ##

๐Ÿ“ข Interlock Ransomware exploite un zero-day Cisco FMC (CVE-2026-20131) 36 jours avant divulgation
๐Ÿ“ *Amazon Threat Intelligence a dรฉ...
๐Ÿ“– cyberveille : cyberveille.ch/posts/2026-03-2
๐ŸŒ source : aws.amazon.com/fr/blogs/securi
#CVE_2026_20131 #Certify #Cyberveille

##

PC_Fluesterer@social.tchncs.de at 2026-03-21T13:30:30.000Z ##

Cisco Zero-Day 36 Tage vor Update ausgenutzt

Am 2026-03-04 hat Cisco ein Update gegen die Sicherheitslรผcke CVE-2026-20131 verรถffentlicht. Sie hat die Einstufung 10 von 10 erhalten: die schlimmste aller vorstellbaren Schwachstellen. Fallsยน die Verwaltungs-Oberflรคche (Management Interface) der Secure Firewall Management Center (FMC) Software und Security Cloud Control (SCC) Firewall Management Software aus dem Internet erreichbar ist, kann ein entfernter Angreifer ohne Autorisierung beliebigen Code mit Administrator-Rechten auf den betroffenen Gerรคten ausfรผhren (RCE). Sehr angemessen fรผr Gerรคte, die

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Warnung #0day #closedsource #cybercrime #erpresser #exploits #firewall #hersteller #hintertรผr #sicherheit #UnplugTrump #vorfรคlle

##

gtronix@infosec.exchange at 2026-03-20T18:00:42.000Z ##

"CISA orders feds to patch max-severity Cisco flaw by Sunday"

"[...] The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to patch a maximum-severity vulnerability, CVE-2026-20131, in Cisco Secure Firewall Management Center (FMC) by Sunday, March 22."

bleepingcomputer.com/news/secu

#Cybersecurity

##

AAKL@infosec.exchange at 2026-03-20T16:26:29.000Z ##

The campaign is exploiting "critical vulnerability (CVE-2026-20131) in Cisco Secure Firewall Management Center (FMC), enabling unauthenticated remote code execution as root. The campaign combines edge-device exploitation, custom malware tooling, and double extortion tactics, indicating a mature and targeted ransomware operation."

FortiGuard's outbreak alerts listed a critical Interlock ransomware attack yesterday: fortiguard.fortinet.com/outbre @FortiGuardLabs #infosec #ransomware #Cisco #cyberattack

##

oversecurity@mastodon.social at 2026-03-20T15:20:05.000Z ##

CISA orders feds to patch max-severity Cisco flaw by Sunday

The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to patch a maximum-severity vulnerability, CVE-2026-20131,...

๐Ÿ”—๏ธ [Bleepingcomputer] link.is.it/eSynqa

##

CVE-2026-24291
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-19T17:16:22.987000

2 posts

Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to elevate privileges locally.

2 repos

https://github.com/n0isegat3/RegPwnBRc4BOF

https://github.com/lennertdefauw/CVE-2026-24291

secdb at 2026-03-21T21:16:43.840Z ##

๐Ÿšจ CVE-2026-24291 (RegPwn)
Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability

Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to elevate privileges locally.

secdb.nttzen.cloud/cve/detail/

##

secdb@infosec.exchange at 2026-03-21T21:16:43.000Z ##

๐Ÿšจ CVE-2026-24291 (RegPwn)
Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability

Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to elevate privileges locally.

secdb.nttzen.cloud/cve/detail/

#ZEN #SecDB #InfoSec #RegPwn #CVE202624291

##

CVE-2026-33292
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-19T16:43:07

2 posts

## Summary The HLS streaming endpoint (`view/hls.php`) is vulnerable to a path traversal attack that allows an unauthenticated attacker to stream any private or paid video on the platform. The `videoDirectory` GET parameter is used in two divergent code paths โ€” one for authorization (which truncates at the first `/` segment) and one for file access (which preserves `..` traversal sequences) โ€” cre

thehackerwire@mastodon.social at 2026-03-22T20:03:42.000Z ##

๐ŸŸ  CVE-2026-33292 - High (7.5)

WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS streaming endpoint (`view/hls.php`) is vulnerable to a path traversal attack that allows an unauthenticated attacker to stream any private or paid video on the platform. ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T20:03:42.000Z ##

๐ŸŸ  CVE-2026-33292 - High (7.5)

WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS streaming endpoint (`view/hls.php`) is vulnerable to a path traversal attack that allows an unauthenticated attacker to stream any private or paid video on the platform. ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71258
(4.3 MEDIUM)

EPSS: 1.87%

updated 2026-03-19T15:31:28

2 posts

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind server-side request forgery vulnerability in the searchWeb API component that allows authenticated attackers to cause the server to initiate arbitrary outbound requests. Attackers can exploit improper URL validation to perform internal network scanning or interact with internal services, impacting system availability.ย The f

Nuclei template

secdb at 2026-03-23T00:01:26.705Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-22557
(10.0 CRITICAL)

EPSS: 0.03%

updated 2026-03-19T15:31:22

4 posts

A malicious actor with access to the network could exploit a Path Traversal vulnerability found in the UniFi Network Application to access files on the underlying system that could be manipulated to access an underlying account.

1 repos

https://github.com/GarethMSheldon/cve-2026-22557-unifi-detection

cyberveille@mastobot.ping.moi at 2026-03-22T22:00:11.000Z ##

๐Ÿ“ข Ubiquiti : faille critique CVE-2026-22557 (CVSS 10) dans UniFi Network โ€” patch disponible
๐Ÿ“ ## ๐Ÿ“ฐ Contexte

Publiรฉ le 20 mars 2026 sur IT-Connect par Florian Burnel, cet article ra...
๐Ÿ“– cyberveille : cyberveille.ch/posts/2026-03-2
๐ŸŒ source : it-connect.fr/ubiquiti-cve-202
#CVE_2026_22557 #CVE_2026_22558 #Cyberveille

##

benzogaga33@mamot.fr at 2026-03-20T16:40:03.000Z ##

Ubiquiti โ€“ CVE-2026-22557 : cette faille critique menace votre rรฉseau UniFi it-connect.fr/ubiquiti-cve-202 #ActuCybersรฉcuritรฉ #Cybersรฉcuritรฉ #Vulnรฉrabilitรฉ

##

beyondmachines1@infosec.exchange at 2026-03-20T11:01:48.000Z ##

Ubiquiti Patches Critical Account Takeover Flaw in UniFi Network Application

Ubiquiti patched a critical path traversal vulnerability (CVE-2026-22557) and a high-severity NoSQL injection flaw in its UniFi Network Application. These bugs allow attackers to hijack accounts or escalate privileges, potentially compromising entire networking environments.

**If you are using Ubiquiti products, update your UniFi Network Application and UniFi Express firmware ASAP. As usual, first make sure all management interfaces are not exposed to the public internet and are accessible only from trusted networks.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

youranonnewsirc@nerdculture.de at 2026-03-19T23:56:20.000Z ##

Geopolitical tensions surged as Iran targeted Gulf energy after Israeli strikes, spiking oil prices to $118/barrel (March 18-19). In cybersecurity, CISA warned of actively exploited SharePoint flaws (CVE-2026-20963), critical Ubiquiti UniFi (CVE-2026-22557), and Telnetd root-access vulnerabilities (CVE-2026-32746). NVIDIA forecasts $1T AI demand by 2027.
#AnonNews_irc #Cybersecurity #News

##

CVE-2025-71257
(7.3 HIGH)

EPSS: 3.58%

updated 2026-03-19T15:31:21

2 posts

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentication bypass vulnerability due to improper enforcement of security filters on restricted REST API endpoints and servlets. Unauthenticated remote attackers can bypass access controls to invoke restricted functionality and gain unauthorized access to application data and modify system resources.ย The following hotfixes rem

Nuclei template

1 repos

https://github.com/watchtowrlabs/watchTowr-vs-BMC-Footprints-RCE-CVE-2025-71257-CVE-2025-71260

secdb at 2026-03-23T00:01:26.705Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-20963
(8.8 HIGH)

EPSS: 9.14%

updated 2026-03-19T13:09:24.293000

3 posts

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

christopherkunz@chaos.social at 2026-03-20T13:53:15.000Z ##

CVE-2026-20963 Sharepoint Insecure Deserialization 8.8/10

Weekend soon. Where @watchTowr blog? Need lolz. I can has?

##

beyondmachines1@infosec.exchange at 2026-03-20T12:01:48.000Z ##

Critical Microsoft SharePoint RCE Vulnerability CVE-2026-20963 Under Active Exploitation

Microsoft SharePoint is under active exploitation of a critical RCE vulnerability (CVE-2026-20963) that allows unauthenticated attackers to take over servers via a deserialization flaw.

**Your SharePoint servers are under attack. Ideally, isolate them from the internet and make them accessible only from internal networks. Them apply the January 2026 patch ASAP. If you are still using SharePoint 2013 or older, isolate them and upgrade to a newer version. Those old systems are permanently vulnerable.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

youranonnewsirc@nerdculture.de at 2026-03-19T23:56:20.000Z ##

Geopolitical tensions surged as Iran targeted Gulf energy after Israeli strikes, spiking oil prices to $118/barrel (March 18-19). In cybersecurity, CISA warned of actively exploited SharePoint flaws (CVE-2026-20963), critical Ubiquiti UniFi (CVE-2026-22557), and Telnetd root-access vulnerabilities (CVE-2026-32746). NVIDIA forecasts $1T AI demand by 2027.
#AnonNews_irc #Cybersecurity #News

##

CVE-2026-33231
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-19T12:42:23

2 posts

### Summary `nltk.app.wordnet_app` allows unauthenticated remote shutdown of the local WordNet Browser HTTP server when it is started in its default mode. A simple `GET /SHUTDOWN%20THE%20SERVER` request causes the process to terminate immediately via `os._exit(0)`, resulting in a denial of service. ### Details The vulnerable logic is in `nltk/app/wordnet_app.py`: - [`nltk/app/wordnet_app.py:242`

thehackerwire@mastodon.social at 2026-03-22T00:00:13.000Z ##

๐ŸŸ  CVE-2026-33231 - High (7.5)

NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, `nltk.app.wordnet_app` allows unauthenticated remot...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T00:00:13.000Z ##

๐ŸŸ  CVE-2026-33231 - High (7.5)

NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, `nltk.app.wordnet_app` allows unauthenticated remot...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33226
(8.7 HIGH)

EPSS: 0.01%

updated 2026-03-18T20:22:12

2 posts

### Summary The REST datasource query preview endpoint (`POST /api/queries/preview`) makes server-side HTTP requests to any URL supplied by the user in `fields.path` with no validation. An authenticated admin can reach internal services that are not exposed to the internet โ€” including cloud metadata endpoints (AWS/GCP/Azure), internal databases, Kubernetes APIs, and other pods on the internal netw

thehackerwire@mastodon.social at 2026-03-21T23:18:03.000Z ##

๐ŸŸ  CVE-2026-33226 - High (8.7)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In versions from 3.30.6 and prior, the REST datasource query preview endpoint (POST /api/queries/preview) makes server-side HTTP requests to any URL supplied...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T23:18:03.000Z ##

๐ŸŸ  CVE-2026-33226 - High (8.7)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In versions from 3.30.6 and prior, the REST datasource query preview endpoint (POST /api/queries/preview) makes server-side HTTP requests to any URL supplied...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33204
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-18T20:16:59

2 posts

## Summary An unauthenticated attacker can perform a Denial of Service via JWE header tampering when PBES2 algorithms are used. Applications that call `JWE::decrypt()` on attacker-controlled JWEs using PBES2 algorithms are affected. ## Details PHP version: `PHP 8.4.11` SimpleJWT version: `v1.1.0` The relevant portion of the vulnerable implementation is shown below ([PBES2.php](https://github

thehackerwire@mastodon.social at 2026-03-22T00:01:32.000Z ##

๐ŸŸ  CVE-2026-33204 - High (7.5)

SimpleJWT is a simple JSON web token library written in PHP. Prior to version 1.1.1, an unauthenticated attacker can perform a Denial of Service via JWE header tampering when PBES2 algorithms are used. Applications that call JWE::decrypt() on atta...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T00:01:32.000Z ##

๐ŸŸ  CVE-2026-33204 - High (7.5)

SimpleJWT is a simple JSON web token library written in PHP. Prior to version 1.1.1, an unauthenticated attacker can perform a Denial of Service via JWE header tampering when PBES2 algorithms are used. Applications that call JWE::decrypt() on atta...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66376
(7.2 HIGH)

EPSS: 11.43%

updated 2026-03-18T20:13:37.087000

1 posts

Zimbra Collaboration (ZCS) 10 before 10.0.18 and 10.1 before 10.1.13 allows Classic UI stored XSS via Cascading Style Sheets (CSS) @import directives in an HTML e-mail message.

cyberveille@mastobot.ping.moi at 2026-03-23T05:00:11.000Z ##

๐Ÿ“ข APT28 exploite la faille XSS Zimbra CVE-2025-66376 contre des entitรฉs ukrainiennes
๐Ÿ“ ## ๐Ÿ—“๏ธ Contexte

Selon un rapport publiรฉ par **Seqrite Labs** et relayรฉ par Security Affairs...
๐Ÿ“– cyberveille : cyberveille.ch/posts/2026-03-2
๐ŸŒ source : securityaffairs.com/189673/sec
#APT28 #CVE_2025_66376 #Cyberveille

##

CVE-2026-22730
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-18T16:16:26.157000

1 posts

A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attackers to bypass metadata-based access controls and execute arbitrary SQL commands. The vulnerability exists due to missing input sanitization.

1 repos

https://github.com/NULL200OK/CVE-2026-22730-Scanner

cyberveille@mastobot.ping.moi at 2026-03-23T04:00:11.000Z ##

๐Ÿ“ข CVE-2026-22730 : Injection SQL dans Spring AI MariaDB permettant un contournement du contrรดle d'accรจs
๐Ÿ“ ## ๐Ÿ” Contexte

Publiรฉ le 19 mars 2026 par SecureLayer7 (Sandeep Kamble, outil Bugdazz /...
๐Ÿ“– cyberveille : cyberveille.ch/posts/2026-03-2
๐ŸŒ source : blog.securelayer7.net/cve-2026
#Bugdazz #CVE_2026_22730 #Cyberveille

##

CVE-2026-32746
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-18T15:30:44

2 posts

telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.

4 repos

https://github.com/danindiana/cve-2026-32746-mitigation

https://github.com/chosenonehacks/CVE-2026-32746

https://github.com/watchtowrlabs/watchtowr-vs-telnetd-CVE-2026-32746

https://github.com/jeffaf/cve-2026-32746

AAKL@infosec.exchange at 2026-03-20T16:46:17.000Z ##

Posted yesterday, if you missed it:

WatchTower: A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746 Pre-Auth RCE) labs.watchtowr.com/a-32-year-o #infosec #threatresearch

##

youranonnewsirc@nerdculture.de at 2026-03-19T23:56:20.000Z ##

Geopolitical tensions surged as Iran targeted Gulf energy after Israeli strikes, spiking oil prices to $118/barrel (March 18-19). In cybersecurity, CISA warned of actively exploited SharePoint flaws (CVE-2026-20963), critical Ubiquiti UniFi (CVE-2026-22557), and Telnetd root-access vulnerabilities (CVE-2026-32746). NVIDIA forecasts $1T AI demand by 2027.
#AnonNews_irc #Cybersecurity #News

##

CVE-2026-3564
(9.0 CRITICAL)

EPSS: 0.06%

updated 2026-03-18T14:52:44.227000

1 posts

A condition in ScreenConnect may allow an actor with access to server-level cryptographic material used for authentication to obtain unauthorized access, including elevated privileges, in certain scenarios.

beyondmachines1@infosec.exchange at 2026-03-20T15:01:48.000Z ##

ConnectWise Patches Critical ScreenConnect Cryptographic Flaw

ConnectWise patched a critical vulnerability (CVE-2026-3564) in ScreenConnect that allows attackers to extract cryptographic machine keys and bypass session authentication. The flaw enables unauthorized access and privilege escalation, which is a significant risk to MSPs and their downstream clients.

**Treat this update as an emergency change because remote access tools are primary targets for lateral movement and supply chain attacks. If you run on-premises ScreenConnect, verify your version immediately, patch ASAP.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-3888
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-18T04:17:30.720000

2 posts

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

3 repos

https://github.com/fevar54/CVE-2026-3888-POC-all-from-the-Qualys-platform.

https://github.com/netw0rk7/CVE-2026-3888-PoC

https://github.com/Many-Hat-Group/Ubuntu-CVE-2026-3888-patcher

linux@activitypub.awakari.com at 2026-03-19T22:32:26.000Z ## Debian DSA-6170-1 snapd Local Escalation CVE-2026-3888 Advisory The Qualys Threat Research Unit (TRU) discovered a local privilege escalation vulnerability in snapd, a daemon and tooling that enabl...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

patrickcmiller@infosec.exchange at 2026-03-19T22:42:00.000Z ##

Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit thehackernews.com/2026/03/ubun

##

CVE-2026-32306
(9.9 CRITICAL)

EPSS: 0.40%

updated 2026-03-17T20:08:56.733000

1 posts

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the telemetry aggregation API accepts user-controlled aggregationType, aggregateColumnName, and aggregationTimestampColumnName parameters and interpolates them directly into ClickHouse SQL queries via the .append() method (documented as "trusted SQL"). There is no allowlist, no parameterized query binding, and n

thehackerwire@mastodon.social at 2026-03-20T21:22:33.000Z ##

๐ŸŸ  CVE-2026-33142 - High (8.1)

OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.34, the fix for CVE-2026-32306 (ClickHouse SQL injection via aggregate query parameters) added column name validation to the _aggregateBy method but did not...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32583
(5.3 MEDIUM)

EPSS: 2.73%

updated 2026-03-16T18:32:14

2 posts

Missing Authorization vulnerability in Webnus Inc. Modern Events Calendar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Modern Events Calendar: from n/a through 7.29.0.

Nuclei template

secdb at 2026-03-23T00:01:26.705Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-31979
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-16T18:18:34.750000

2 posts

Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Prior to 3.1.0 and 2.3.8, the himmelblaud-tasks daemon, running as root, writes Kerberos cache files under /tmp/krb5cc_<uid> without symlink protections. Since commit 87a51ee, PrivateTmp is explicitly removed from the tasks daemon's systemd hardening, exposing it to the host /tmp. A local user can exploit this via sym

campuscodi@mastodon.social at 2026-03-22T12:01:18.000Z ##

A vulnerability in a Linux enterprise app can allow attackers root access over devices

The issue impacts Himmelblau, an interoperability suite to integrate Linux with Entra ID and Intune networks.

akamai.com/blog/security-resea

##

campuscodi@mastodon.social at 2026-03-22T12:01:18.000Z ##

A vulnerability in a Linux enterprise app can allow attackers root access over devices

The issue impacts Himmelblau, an interoperability suite to integrate Linux with Entra ID and Intune networks.

akamai.com/blog/security-resea

##

CVE-2026-3838
(8.8 HIGH)

EPSS: 1.57%

updated 2026-03-16T15:30:56

2 posts

Unraid Update Request Path Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unraid. Authentication is required to exploit this vulnerability. The specific flaw exists within the update.php file. The issue results from the lack of proper validation of a user-supplied path prior to using it in file opera

secdb at 2026-03-23T00:01:26.705Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-2493
(7.5 HIGH)

EPSS: 15.24%

updated 2026-03-16T15:30:55

2 posts

IceWarp collaboration Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of IceWarp. Authentication is not required to exploit this vulnerability. The specific flaw exists within handling of the ticket parameter provided to the collaboration endpoint. The issue results from the lack of pr

secdb at 2026-03-23T00:01:26.705Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-15060
(9.8 CRITICAL)

EPSS: 1.71%

updated 2026-03-16T15:30:53

2 posts

claude-hovercraft executeClaudeCode Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of claude-hovercraft. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the executeClaudeCode method. The issue results from the lack of proper val

secdb at 2026-03-23T00:01:26.705Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

๐Ÿ“ˆ CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-25896
(9.3 CRITICAL)

EPSS: 0.01%

updated 2026-03-02T14:54:02.760000

1 posts

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (&lt;, &gt;, &amp;, &quot;, &apos;) with arbitrary values. This bypasses entity en

AAKL@infosec.exchange at 2026-03-20T16:16:56.000Z ##

New advisory. Login is needed for details.

Broadcom: Critical: Software Toolkit Plugin for z/OSMF 1.0 - Vulnerability in fast-xml-parser (CVE-2026-25896) support.broadcom.com/web/ecx/s #infosec #vulnerability #Broadcom

##

CVE-2025-32711
(9.3 CRITICAL)

EPSS: 3.89%

updated 2026-02-20T17:25:10.630000

1 posts

Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.

1 repos

https://github.com/daryllundy/cve-2025-32711

LLMs@activitypub.awakari.com at 2026-03-19T00:00:00.000Z ## The next layer of AI security Identity establishes trust. The next problem is how that trust is used. In June 2025, Microsoft patched EchoLeak (CVE-2025-32711), a zero-click vulnerability in Micros...


Origin | Interest | Match ##

CVE-2026-1581
(7.5 HIGH)

EPSS: 11.33%

updated 2026-02-19T18:32:09

2 posts

The wpForo Forum plugin for WordPress is vulnerable to time-based SQL Injection via the 'wpfob' parameter in all versions up to, and including, 2.4.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be

Nuclei template

1 repos

https://github.com/rootdirective-sec/CVE-2026-1581-Analysis-Lab

CVE-2026-20817
(7.8 HIGH)

EPSS: 0.02%

updated 2026-01-13T18:31:17

3 posts

Improper handling of insufficient permissions or privileges in Windows Error Reporting allows an authorized attacker to elevate privileges locally.

1 repos

https://github.com/oxfemale/CVE-2026-20817

glitterbean@wehavecookies.social at 2026-03-22T18:38:45.000Z ##

CVE-2026-20817 - Windows Error Reporting Service EoP itm4n.github.io/cve-2026-20817

##

itm4n at 2026-03-22T16:30:29.234Z ##

This is my analysis (and PoC) for CVE-2026-20817, a privilege escalation in the Windows Error Reporting service.

๐Ÿ‘‰ itm4n.github.io/cve-2026-20817

Credit goes to Denis Faiustov and Ruslan Sayfiev for the discovery.

TL;DR A low privilege user could send an ALPC message to the WER service and coerce it to start a WerFault.exe process as SYSTEM with user-controlled arguments and options. I did not achieve arbitrary code execution, but perhaps someone knows how this can be done? ๐Ÿคทโ€โ™‚๏ธ

##

itm4n@infosec.exchange at 2026-03-22T16:30:29.000Z ##

This is my analysis (and PoC) for CVE-2026-20817, a privilege escalation in the Windows Error Reporting service.

๐Ÿ‘‰ itm4n.github.io/cve-2026-20817

Credit goes to Denis Faiustov and Ruslan Sayfiev for the discovery.

TL;DR A low privilege user could send an ALPC message to the WER service and coerce it to start a WerFault.exe process as SYSTEM with user-controlled arguments and options. I did not achieve arbitrary code execution, but perhaps someone knows how this can be done? ๐Ÿคทโ€โ™‚๏ธ

##

CVE-2025-32975
(10.0 CRITICAL)

EPSS: 0.13%

updated 2025-11-03T20:18:29.263000

3 posts

Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead

offseq at 2026-03-22T00:00:39.641Z ##

โš ๏ธ CRITICAL: Quest KACE vuln (CVE-2025-32975) under active exploitation, mainly in education. No patch yet โ€” segment networks, monitor KACE activity, and restrict access. Global risk. Details: radar.offseq.com/threat/critic

##

offseq@infosec.exchange at 2026-03-22T00:00:39.000Z ##

โš ๏ธ CRITICAL: Quest KACE vuln (CVE-2025-32975) under active exploitation, mainly in education. No patch yet โ€” segment networks, monitor KACE activity, and restrict access. Global risk. Details: radar.offseq.com/threat/critic #OffSeq #Vulnerability #QuestKACE #Education

##

beyondmachines1@infosec.exchange at 2026-03-20T13:01:49.000Z ##

Attackers Exploit Critical Quest KACE SMA Authentication Bypass

Arctic Wolf reports attacks exploiting a critical authentication bypass (CVE-2025-32975) in Quest KACE SMA to gain administrative control and move laterally into domain controllers and backup systems.

**If you are using Quest KACE SMA, this is urgent. Make sure your Quest KACE SMA is off the public internet and behind a VPN immediately. Check your logs for new unknown admin accounts, as these are signs that attackers have already taken over your management system. Then patch ASAP.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2025-20720
(8.8 HIGH)

EPSS: 0.03%

updated 2025-10-15T21:31:40

2 posts

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418954; Issue ID: MSV-3569.

beyondmachines1 at 2026-03-22T11:01:25.772Z ##

PolyShell Vulnerability Exposes Adobe Commerce and Magento to Remote Code Execution

Sansec reports "PolyShell," an unrestricted file upload vulnerability (CVE-2025-20720) in Magento and Adobe Commerce that allows unauthenticated attackers to achieve remote code execution via the REST API.

**If you are using Adobe Commerce and Magento Open Source, restrict web server access to the pub/media/custom_options/ directory to prevent the execution of uploaded malicious scripts. Since a production patch is currently not afailable, deploy a web application firewall to block exploit attempts in real-time.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-03-22T11:01:25.000Z ##

PolyShell Vulnerability Exposes Adobe Commerce and Magento to Remote Code Execution

Sansec reports "PolyShell," an unrestricted file upload vulnerability (CVE-2025-20720) in Magento and Adobe Commerce that allows unauthenticated attackers to achieve remote code execution via the REST API.

**If you are using Adobe Commerce and Magento Open Source, restrict web server access to the pub/media/custom_options/ directory to prevent the execution of uploaded malicious scripts. Since a production patch is currently not afailable, deploy a web application firewall to block exploit attempts in real-time.**
#cybersecurity #infosec #advisory #databreach
beyondmachines.net/event_detai

##

CVE-2025-41241
(4.4 MEDIUM)

EPSS: 0.05%

updated 2025-07-29T14:14:29.590000

1 posts

VMware vCenter contains a denial-of-service vulnerability.ย A malicious actor who is authenticated through vCenter and has permission to perform API calls for guest OS customisation may trigger this vulnerability to create a denial-of-service condition.

mastokukei@social.josko.org at 2026-03-23T09:02:04.000Z ##

Svelte best practices, Next.js AI integration.
- **Security vulnerabilities**: VMware vCenter DoS (CVE-2025-41241), Trivy supply-chain attack (47 npm packages), McKinsey AI platform hack (SQL injection), OpenClaw security flaws.
- **Open-source tools**: Librebootโ€™s `mkhtemp` hardening, libdvd-package for DVD playback, Floci (AWS emulator), Grafeo (graph database), Regex Blaster, human.json protocol.
- **Retro computing & niche projects**: AmigaOS updates (atrace, amigactl), [2/3]

##

CVE-2024-13448
(9.8 CRITICAL)

EPSS: 3.02%

updated 2025-01-30T18:01:07.080000

1 posts

The ThemeREX Addons plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'trx_addons_uploads_save_data' function in all versions up to, and including, 2.32.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

EUVD_Bot@mastodon.social at 2026-03-23T07:01:06.000Z ##

๐Ÿšจ EUVD-2026-14361

๐Ÿ“Š Score: n/a
๐Ÿ“ฆ Product: trx_addons
๐Ÿข Vendor: Unknown
๐Ÿ“… Updated: 2026-03-23

๐Ÿ“ The trx_addons WordPress plugin before 2.38.5 does not correctly validate file types in one of its AJAX action, allowing unauthenticated users to upload arbitrary file. This is due to an incorrect fix of CVE-2024-13448

๐Ÿ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

CVE-2023-4567
(0 None)

EPSS: 0.00%

updated 2023-11-07T04:22:45.730000

1 posts

Rejected reason: Issue has been found to be non-reproducible, therefore not a viable flaw.

linux@activitypub.awakari.com at 2026-03-22T09:40:34.000Z ## Ubuntu Jammy SPIP Security Vulnerability Identified as CVE-2023-4567 Jul Blobul discovered that SPIP, a website engine for publishing, is prone to a privilege escalation vulnerability. For the stab...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2018-0204
(7.5 HIGH)

EPSS: 1.69%

updated 2023-02-01T05:08:53

2 posts

A vulnerability in the web portal of the Cisco Prime Collaboration Provisioning Tool could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition for individual users. The vulnerability is due to weak login controls. An attacker could exploit this vulnerability by using a brute-force attack (Repeated Bad Login Attempts). A successful exploit could allow the attacke

BugBountyShorts at 2026-03-22T22:07:22.594Z ##

From a Silent Math Error to Certificate Bypass: Uncovering an Integer Overflow in a TLS Parser
This article details an integer overflow vulnerability within a Transport Layer Security (TLS) parser. The flaw allowed attackers to bypass certificate checks due to improper validation of parsed values. When the server received maliciously crafted client hello messages containing excessively large extensions, it failed to handle the unexpected data size. As a result, an integer overflow occurred, leading to buffer overflows and arbitrary code execution. The researcher exploited this vulnerability by sending a specially crafted TLS handshake request with extended client hello payloads that contained large, incorrectly parsed values. By modifying the length of extension fields, they tricked the parser into interpreting non-existent data as valid, causing unintended execution of malicious code and certificate bypass. The exploit resulted in a high severity vulnerability (CVE-2018-0204) with a CVSS score of 9.8. The researcher was awarded $36,000 for their findings, and the vendor promptly released patches to address this issue. To prevent similar issues, developers should perform rigorous input validation and limit the size of parsed values during TLS handshake processing. Key lesson: Proper input validation is crucial in TLS parsing to avoid buffer overflows and other security vulnerabilities

medium.com/@HackerMD/from-a-si

##

BugBountyShorts@infosec.exchange at 2026-03-22T22:07:22.000Z ##

From a Silent Math Error to Certificate Bypass: Uncovering an Integer Overflow in a TLS Parser
This article details an integer overflow vulnerability within a Transport Layer Security (TLS) parser. The flaw allowed attackers to bypass certificate checks due to improper validation of parsed values. When the server received maliciously crafted client hello messages containing excessively large extensions, it failed to handle the unexpected data size. As a result, an integer overflow occurred, leading to buffer overflows and arbitrary code execution. The researcher exploited this vulnerability by sending a specially crafted TLS handshake request with extended client hello payloads that contained large, incorrectly parsed values. By modifying the length of extension fields, they tricked the parser into interpreting non-existent data as valid, causing unintended execution of malicious code and certificate bypass. The exploit resulted in a high severity vulnerability (CVE-2018-0204) with a CVSS score of 9.8. The researcher was awarded $36,000 for their findings, and the vendor promptly released patches to address this issue. To prevent similar issues, developers should perform rigorous input validation and limit the size of parsed values during TLS handshake processing. Key lesson: Proper input validation is crucial in TLS parsing to avoid buffer overflows and other security vulnerabilities #BugBounty #Cryptography #TLS #IntegerOverflow #BufferOverFlow

medium.com/@HackerMD/from-a-si

##

CVE-2026-33134
(0 None)

EPSS: 0.03%

5 posts

N/A

Matchbook3469@mastodon.social at 2026-03-22T11:17:10.000Z ##

๐Ÿšจ New security advisory:

CVE-2026-33134 affects Wegia Wegia.

โ€ข Impact: Remote code execution or complete system compromise possible
โ€ข Risk: Attackers can gain full control of affected systems
โ€ข Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

hbrpgm@adalta.social at 2026-03-21T11:46:52.000Z ##

๐Ÿ“บ peer.adalta.social/w/wg6KobEvv
๐Ÿ”— [๐Ÿ‡ฉ๐Ÿ‡ช๐Ÿ‡บ๐Ÿ‡ธ๐Ÿ‡ซ๐Ÿ‡ท](adalta.info/articles/prstn_sec)
๐Ÿ”— [โ„น๏ธ](redpacketsecurity.com/cve-aler")

Une injection SQL authentifiรฉe dans WeGIA compromet l'intรฉgralitรฉ des bases de donnรฉes des institutions.

#cybersecurity #security #osint #threatintel #cve

##

hbrpgm@adalta.social at 2026-03-21T11:39:47.000Z ##

๐Ÿ“บ peer.adalta.social/w/vUPVbxbki
๐Ÿ”— [๐Ÿ‡ฉ๐Ÿ‡ช๐Ÿ‡บ๐Ÿ‡ธ๐Ÿ‡ซ๐Ÿ‡ท](adalta.info/articles/prstn_sec)
๐Ÿ”— [โ„น๏ธ](redpacketsecurity.com/cve-aler")

An authenticated SQL injection in WeGIA enables full database compromise, demanding immediate remediation for high-risk organizations.

#cybersecurity #security #osint #threatintel #cve

##

hbrpgm@adalta.social at 2026-03-21T11:35:44.000Z ##

๐Ÿ“บ peer.adalta.social/w/gG6Eiykme
๐Ÿ”— [๐Ÿ‡ฉ๐Ÿ‡ช๐Ÿ‡บ๐Ÿ‡ธ๐Ÿ‡ซ๐Ÿ‡ท](adalta.info/articles/prstn_sec)
๐Ÿ”— [โ„น๏ธ](redpacketsecurity.com/cve-aler")

Authentifizierte SQL-Injektion in einer Wohltรคtigkeitssoftware ermรถglicht vollstรคndige Datenbankkompromittierung.

#cybersecurity #security #osint #threatintel #cve

##

thehackerwire@mastodon.social at 2026-03-20T21:26:31.000Z ##

๐Ÿ”ด CVE-2026-33134 - Critical (9.3)

WeGIA is a web manager for charitable institutions. Versions 3.6.5 and below contain an authenticated SQL Injection vulnerability in the html/matPat/restaurar_produto.php endpoint. The vulnerability allows an authenticated attacker to inject arbit...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32888
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-22T01:40:54.000Z ##

๐ŸŸ  CVE-2026-32888 - High (8.8)

Open Source Point of Sale is a web based point-of-sale application written in PHP using CodeIgniter framework. Versions contain an SQL Injection in the Items search functionality. When the custom attribute search feature is enabled (search_custom ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-22T01:40:54.000Z ##

๐ŸŸ  CVE-2026-32888 - High (8.8)

Open Source Point of Sale is a web based point-of-sale application written in PHP using CodeIgniter framework. Versions contain an SQL Injection in the Items search functionality. When the custom attribute search feature is enabled (search_custom ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33243
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-21T23:17:02.000Z ##

๐ŸŸ  CVE-2026-33243 - High (8.2)

barebox is a bootloader. In barebox from version 2016.03.0 to before version 2025.09.3 and from version 2025.10.0 to before version 2026.03.1, when creating a FIT, mkimage(1) sets the hashed-nodes property of the FIT signature node to list which n...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-21T23:17:02.000Z ##

๐ŸŸ  CVE-2026-33243 - High (8.2)

barebox is a bootloader. In barebox from version 2016.03.0 to before version 2025.09.3 and from version 2025.10.0 to before version 2026.03.1, when creating a FIT, mkimage(1) sets the hashed-nodes property of the FIT signature node to list which n...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33135
(0 None)

EPSS: 0.03%

2 posts

N/A

Matchbook3469@mastodon.social at 2026-03-21T17:18:53.000Z ##

โ›” New security advisory:

CVE-2026-33135 affects Wegia Wegia.

โ€ข Impact: Remote code execution or complete system compromise possible
โ€ข Risk: Attackers can gain full control of affected systems
โ€ข Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

thehackerwire@mastodon.social at 2026-03-20T21:26:41.000Z ##

๐Ÿ”ด CVE-2026-33135 - Critical (9.3)

WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the novo_memorandoo.php endpoint. An attacker can inject arbitrary JavaScript into the sccs GET parameter, wh...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33250
(0 None)

EPSS: 0.00%

1 posts

N/A

linux@activitypub.awakari.com at 2026-03-21T20:07:16.000Z ## Debian Bookworm Freeciv Critical DoS Issue DSA-6173-1 CVE-2026-33250 Louis Moureaux discovered that incorrect packet processing in the game server of Freeciv, a free clone of the turn based strateg...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-32891
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T23:15:06.000Z ##

๐Ÿ”ด CVE-2026-32891 - Critical (9)

Anchorr is a Discord bot for requesting movies and TV shows and receiving notifications when items are added to a media server. Versions 1.4.1 and below contain a stored XSS vulnerability in the Jellyseerr user selector. Jellyseerr allows any acco...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32890
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T23:14:58.000Z ##

๐Ÿ”ด CVE-2026-32890 - Critical (9.6)

Anchorr is a Discord bot for requesting movies and TV shows and receiving notifications when items are added to a media server. In versions 1.4.1 and below, a stored Cross-site Scripting (XSS) vulnerability in the web dashboard's User Mapping drop...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33072
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T22:00:41.000Z ##

๐ŸŸ  CVE-2026-33072 - High (8.2)

FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.9.0, a hardcoded default encryption key (default_please_change_this_key) is used for all cryptographic operations โ€” HMAC token generation, AES config encryption, ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33136
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T21:26:50.000Z ##

๐Ÿ”ด CVE-2026-33136 - Critical (9.3)

WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the listar_memorandos_ativos.php endpoint. An attacker can inject arbitrary JavaScript or HTML tags into the ...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33150
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T21:17:35.000Z ##

๐ŸŸ  CVE-2026-33150 - High (7.8)

libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 to before version 3.18.2, a use-after-free vulnerability in the io_uring subsystem of libfuse allows a local attacker to crash FUSE filesystem processes and potentially...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33156
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T21:17:26.000Z ##

๐ŸŸ  CVE-2026-33156 - High (7.8)

ScreenToGif is a screen recording tool. In versions from 2.42.1 and prior, ScreenToGif is vulnerable to DLL sideloading via version.dll . When the portable executable is run from a user-writable directory, it loads version.dll from the application...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32710
(0 None)

EPSS: 0.26%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T20:01:10.000Z ##

๐ŸŸ  CVE-2026-32710 - High (8.5)

MariaDB server is a community developed fork of MySQL server. An authenticated user can crash MariaDB versions 11.4 before 11.4.10 and 11.8 before 11.8.6 via a bug in JSON_SCHEMA_VALID() function. Under certain conditions it might be possible to t...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32317
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T20:00:25.000Z ##

๐ŸŸ  CVE-2026-32317 - High (7.6)

Cryptomator for Android offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 1.12.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33308
(0 None)

EPSS: 0.00%

1 posts

N/A

AAKL@infosec.exchange at 2026-03-20T16:06:23.000Z ##

New.

Tenable research advisories: High-severity CVE-2026-33307 and CVE-2026-33308: mod_gnutls Multiple Vulnerabilities tenable.com/security/research/ @tenable #infosec #vulnerability

##

CVE-2026-33307
(0 None)

EPSS: 0.00%

1 posts

N/A

AAKL@infosec.exchange at 2026-03-20T16:06:23.000Z ##

New.

Tenable research advisories: High-severity CVE-2026-33307 and CVE-2026-33308: mod_gnutls Multiple Vulnerabilities tenable.com/security/research/ @tenable #infosec #vulnerability

##

CVE-2026-33075
(0 None)

EPSS: 0.03%

1 posts

N/A

offseq@infosec.exchange at 2026-03-20T10:30:29.000Z ##

๐Ÿšจ CRITICAL: CVE-2026-33075 affects labring FastGPT โ‰ค4.14.8.3. GitHub Actions workflow flaw enables attackers to run code & steal secrets, risking supply chain compromise. No patch โ€” audit workflows & restrict secrets now! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #SupplyChain

##

CVE-2026-33024
(0 None)

EPSS: 0.08%

1 posts

N/A

offseq@infosec.exchange at 2026-03-20T06:01:27.000Z ##

๐Ÿšจ CVE-2026-33024: CRITICAL SSRF in WWBN AVideo-Encoder <8.0. Public API allows blind SSRF, risking internal/cloud data exposure. Upgrade to v8.0 or restrict outbound traffic now! radar.offseq.com/threat/cve-20 #OffSeq #SSRF #Vulnerability #InfoSec

##

CVE-2026-29103
(0 None)

EPSS: 0.20%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-19T23:23:32.000Z ##

๐Ÿ”ด CVE-2026-29103 - Critical (9.1)

SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. A Critical Remote Code Execution (RCE) vulnerability exists in SuiteCRM 7.15.0 and 8.9.2, allowing authenticated administrators to execute ar...

๐Ÿ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites