## Updated at UTC 2026-03-11T23:16:47.696002

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-1717 5.5 0.00% 1 0 2026-03-11T21:31:10 An input validation vulnerability was reported in the LenovoProductivitySystemAd
CVE-2026-1715 7.1 0.00% 1 0 2026-03-11T21:31:10 An input validation vulnerability was reported in the DeviceSettingsSystemAddin
CVE-2026-1716 7.1 0.00% 1 0 2026-03-11T21:16:15.017000 An input validation vulnerability was reported in the DeviceSettingsSystemAddin
CVE-2026-26801 7.5 0.04% 1 0 2026-03-11T21:12:10 Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.
CVE-2026-26127 7.5 0.04% 1 0 2026-03-11T21:11:46 # Microsoft Security Advisory CVE-2026-26127 – .NET Denial of Service Vulnerabil
CVE-2026-26130 7.5 1.27% 3 0 2026-03-11T21:11:31 # Microsoft Security Advisory CVE-2026-26130 – .NET Denial of Service Vulnerabil
CVE-2026-31866 7.5 0.00% 2 0 2026-03-11T20:57:38 ## Details flagd exposes OFREP (`/ofrep/v1/evaluate/...`) and gRPC (`evaluation
CVE-2026-31862 9.1 0.00% 2 0 2026-03-11T20:45:27 ### Summary Multiple Git-related API endpoints use execAsync() with string inter
CVE-2026-31839 8.2 0.00% 2 0 2026-03-11T20:43:42 ## Summary A high-severity integrity bypass vulnerability existed in Striae's d
CVE-2026-28229 7.5 0.00% 4 0 2026-03-11T20:43:32 ### Summary Workflow templates endpoints allow any client to retrieve WorkflowTe
CVE-2026-30933 7.5 0.05% 4 0 2026-03-11T20:40:06 ### Summary The remediation for CVE-2026-27611 appears incomplete. Password pro
CVE-2026-32059 8.8 0.00% 2 0 2026-03-11T20:38:42 ### Summary In OpenClaw, `tools.exec.safeBins` validation for `sort` could be by
CVE-2026-32062 7.5 0.00% 2 0 2026-03-11T20:38:31 ### Summary `@openclaw/voice-call` (and the bundled copy shipped in `openclaw`)
CVE-2026-27273 7.8 0.03% 2 0 2026-03-11T20:27:05.240000 Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds
CVE-2026-27274 7.8 0.03% 1 0 2026-03-11T20:26:36.670000 Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds
CVE-2026-26118 8.8 0.06% 1 0 2026-03-11T19:59:55 Server-Side Request Forgery (SSRF) in Azure MCP Server allows an authorized atta
CVE-2026-26131 7.8 0.04% 1 0 2026-03-11T19:53:25 # Microsoft Security Advisory CVE-2026-26131 – .NET Elevation of Privilege Vulne
CVE-2026-30966 10.0 0.04% 1 0 2026-03-11T19:50:29.950000 Parse Server is an open source backend that can be deployed to any infrastructur
CVE-2025-68613 9.9 78.98% 4 31 template 2026-03-11T19:40:09.533000 n8n is an open source workflow automation platform. Versions starting with 0.211
CVE-2026-31881 7.7 0.00% 2 0 2026-03-11T19:16:04.787000 Runtipi is a personal homeserver orchestrator. Prior to 4.8.0, an unauthenticate
CVE-2026-31874 9.8 0.00% 4 0 2026-03-11T19:16:03.970000 Taskosaur is an open source project management platform with conversational AI f
CVE-2025-70082 9.8 0.00% 2 0 2026-03-11T19:16:03.607000 An issue in Lantronix EDS3000PS v.3.1.0.0R2 allows an attacker to execute arbitr
CVE-2025-68623 8.8 0.00% 2 0 2026-03-11T19:16:03.420000 In Microsoft DirectX End-User Runtime Web Installer 9.29.1974.0, a low-privilege
CVE-2026-3805 7.5 0.02% 3 0 2026-03-11T18:31:35 When doing a second SMB request to the same host again, curl would wrongly use a
CVE-2025-67298 8.1 0.00% 2 0 2026-03-11T18:31:35 An issue in ClasroomIO before v.0.2.6 allows a remote attacker to escalate privi
CVE-2026-0230 None 0.00% 2 0 2026-03-11T18:30:40 A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent
CVE-2026-20046 8.8 0.00% 4 0 2026-03-11T18:30:40 A vulnerability in task group assignment for a specific CLI command in Cisco IOS
CVE-2026-20116 6.1 0.00% 2 0 2026-03-11T18:30:40 A vulnerability in the web-based management interface of  Cisco Finesse, Ci
CVE-2026-20117 6.1 0.00% 2 0 2026-03-11T18:30:40 A vulnerability in the web-based management interface of Cisco Unified Contact C
CVE-2026-20118 6.8 0.00% 2 0 2026-03-11T18:30:40 A vulnerability in the handling of an Egress Packet Network Interface (EPNI) Ali
CVE-2026-1069 7.5 0.00% 2 0 2026-03-11T18:30:40 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9
CVE-2025-13929 7.5 0.00% 2 0 2026-03-11T18:30:39 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.0
CVE-2026-1090 8.7 0.00% 2 0 2026-03-11T18:30:39 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6
CVE-2026-0124 7.8 0.03% 1 0 2026-03-11T18:30:29 There is a possible out of bounds write due to a missing bounds check. This coul
CVE-2026-21289 7.5 0.13% 2 0 2026-03-11T18:21:50.817000 Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15,
CVE-2026-21290 8.7 0.04% 2 0 2026-03-11T18:21:47.207000 Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15,
CVE-2026-30226 0 0.00% 2 0 2026-03-11T18:16:22.937000 Svelte devalue is a JavaScript library that serializes values into strings when
CVE-2026-20074 7.4 0.00% 2 0 2026-03-11T17:16:55.470000 A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) multi-
CVE-2026-20040 8.8 0.00% 4 0 2026-03-11T17:16:54.747000 A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated
CVE-2026-27271 7.8 0.03% 2 0 2026-03-11T17:11:22.460000 Illustrator versions 29.8.4, 30.1 and earlier are affected by a Heap-based Buffe
CVE-2026-3784 6.5 0.02% 1 0 2026-03-11T16:16:46.583000 curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a se
CVE-2026-27897 10.0 0.00% 4 0 2026-03-11T16:16:40.133000 Vociferous provides cross-platform, offline speech-to-text with local AI refinem
CVE-2026-22248 8.0 0.00% 2 0 2026-03-11T16:16:24.103000 GLPI is an open-source asset and IT management software package that provides IT
CVE-2025-14513 7.5 0.00% 2 0 2026-03-11T16:16:19.223000 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11
CVE-2026-3847 8.8 0.04% 2 0 2026-03-11T15:55:51.477000 Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidenc
CVE-2026-2631 9.8 0.08% 3 0 2026-03-11T15:32:59 The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an una
CVE-2026-3783 5.3 0.02% 1 0 2026-03-11T15:32:59 When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer p
CVE-2026-1965 6.5 0.04% 1 0 2026-03-11T15:32:59 libcurl can in some circumstances reuse the wrong connection when asked to do an
CVE-2025-70027 7.5 0.00% 2 0 2026-03-11T15:31:58 An issue pertaining to CWE-918: Server-Side Request Forgery was discovered in Su
CVE-2026-30900 7.8 0.00% 2 0 2026-03-11T15:31:58 Improper Check of minimum version in update functionality of certain Zoom Client
CVE-2026-30903 9.7 0.00% 2 0 2026-03-11T15:31:58 External Control of File Name or Path in the Mail feature of Zoom Workplace for
CVE-2026-3496 7.5 0.00% 2 0 2026-03-11T15:31:58 The JetBooking plugin for WordPress is vulnerable to SQL Injection via the 'chec
CVE-2026-2626 8.1 0.01% 2 0 2026-03-11T15:31:52 The divi-booster WordPress plugin before 5.0.2 does not have authorization and C
CVE-2026-23814 8.8 0.11% 2 0 2026-03-11T15:31:51 A vulnerability in the command parameters of a certain AOS-CX CLI command could
CVE-2026-23813 9.8 0.05% 3 0 2026-03-11T15:31:51 A vulnerability has been identified in the web-based management interface of AOS
CVE-2026-30902 7.8 0.00% 2 0 2026-03-11T15:16:30.103000 Improper Privilege Management in certain Zoom Clients for Windows may allow an a
CVE-2026-32060 8.8 0.00% 2 0 2026-03-11T14:16:27.943000 OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in a
CVE-2026-3585 7.5 0.06% 2 0 2026-03-11T13:53:47.157000 The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in
CVE-2025-11158 9.1 0.04% 1 0 2026-03-11T13:53:47.157000 Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.6, i
CVE-2026-1261 7.2 0.07% 1 0 2026-03-11T13:53:47.157000 The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scriptin
CVE-2026-30929 7.7 0.01% 1 0 2026-03-11T13:53:47.157000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2025-41709 9.8 0.05% 2 0 2026-03-11T13:53:47.157000 [PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allo
CVE-2026-30862 9.0 0.04% 1 1 2026-03-11T13:53:47.157000 Appsmith is a platform to build admin panels, internal tools, and dashboards. Pr
CVE-2026-3288 8.8 0.04% 2 1 2026-03-11T13:53:47.157000 A security issue was discovered in ingress-nginx where the `nginx.ingress.kubern
CVE-2026-0846 8.6 0.08% 2 0 2026-03-11T13:53:47.157000 A vulnerability in the `filestring()` function of the `nltk.util` module in nltk
CVE-2026-24289 7.8 0.06% 1 0 2026-03-11T13:53:20.707000 Use after free in Windows Kernel allows an authorized attacker to elevate privil
CVE-2026-26113 8.4 0.04% 1 0 2026-03-11T13:53:20.707000 Untrusted pointer dereference in Microsoft Office allows an unauthorized attacke
CVE-2026-26121 7.5 0.10% 1 0 2026-03-11T13:53:20.707000 Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized
CVE-2026-27269 7.8 0.03% 1 0 2026-03-11T13:53:20.707000 Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vul
CVE-2026-26141 7.8 0.04% 1 0 2026-03-11T13:53:20.707000 Improper authentication in Azure Arc allows an authorized attacker to elevate pr
CVE-2026-30957 9.9 0.27% 3 0 2026-03-11T13:53:20.707000 OneUptime is a solution for monitoring and managing online services. Prior to 10
CVE-2026-30944 8.8 0.04% 2 1 2026-03-11T13:53:20.707000 StudioCMS is a server-side-rendered, Astro native, headless content management s
CVE-2026-30956 9.9 0.04% 1 0 2026-03-11T13:53:20.707000 OneUptime is a solution for monitoring and managing online services. Prior to 10
CVE-2026-30978 7.8 0.01% 1 0 2026-03-11T13:53:20.707000 iccDEV provides a set of libraries and tools for working with ICC color manageme
CVE-2026-3843 9.8 0.44% 2 0 2026-03-11T13:53:20.707000 Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux conta
CVE-2026-31792 7.8 0.01% 1 0 2026-03-11T13:53:20.707000 iccDEV provides a set of libraries and tools for working with ICC color manageme
CVE-2026-3483 7.8 0.03% 1 0 2026-03-11T13:53:20.707000 An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local
CVE-2026-1708 7.5 0.12% 2 0 2026-03-11T13:52:47.683000 The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin p
CVE-2026-1993 8.8 0.04% 2 0 2026-03-11T12:31:30 The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable
CVE-2026-1992 8.8 0.07% 2 0 2026-03-11T12:31:29 The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable
CVE-2026-31844 8.8 0.04% 2 0 2026-03-11T09:32:00 An authenticated SQL Injection vulnerability (CWE-89) exists in the Koha staff i
CVE-2026-3826 9.8 0.20% 3 0 2026-03-11T09:32:00 IFTOP developed by WellChoose has a Local File Inclusion vulnerability, allowing
CVE-2025-13067 8.8 0.10% 2 0 2026-03-11T06:31:47 The Royal Addons for Elementor plugin for WordPress is vulnerable to arbitrary f
CVE-2026-2413 7.5 0.08% 2 2 2026-03-11T06:31:47 The Ally – Web Accessibility & Usability plugin for WordPress is vulnerable to S
CVE-2026-24448 9.8 0.04% 3 0 2026-03-11T06:31:47 Use of hard-coded credentials issue exists in MR-GM5L-S1 and MR-GM5A-L1, which m
CVE-2026-3222 7.5 0.16% 2 0 2026-03-11T06:31:47 The WP Maps plugin for WordPress is vulnerable to time-based blind SQL Injection
CVE-2026-29515 None 0.07% 1 0 2026-03-11T06:31:47 MiCode FileExplorer contains an authentication bypass vulnerability in the embed
CVE-2026-27842 9.8 0.10% 3 0 2026-03-11T06:31:41 Authentication bypass issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow
CVE-2026-21311 8.0 0.10% 2 0 2026-03-11T03:31:39 Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15,
CVE-2026-21309 7.5 0.13% 2 0 2026-03-11T03:31:39 Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15,
CVE-2026-3453 8.1 0.04% 2 0 2026-03-11T03:31:39 The ProfilePress plugin for WordPress is vulnerable to Insecure Direct Object Re
CVE-2026-21361 8.1 0.09% 2 0 2026-03-11T03:31:39 Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15,
CVE-2026-21284 8.1 0.09% 2 0 2026-03-11T03:31:38 Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15,
CVE-2026-26738 7.8 0.05% 1 0 2026-03-10T21:33:20 Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows
CVE-2026-3823 8.8 0.14% 1 0 2026-03-10T21:33:19 EHG2408 series switch developed by Atop Technologies has a Stack-based Buffer Ov
CVE-2026-27276 7.8 0.03% 1 0 2026-03-10T21:32:24 Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free
CVE-2026-27275 7.8 0.03% 1 0 2026-03-10T21:32:24 Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds
CVE-2026-27280 7.8 0.03% 1 0 2026-03-10T21:32:24 DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write v
CVE-2026-27277 7.8 0.03% 1 0 2026-03-10T21:32:17 Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free
CVE-2026-27279 7.8 0.03% 2 0 2026-03-10T21:32:17 Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds
CVE-2025-69219 8.8 0.05% 1 2 2026-03-10T18:58:35.607000 A user with access to the DB could craft a database entry that would result in e
CVE-2026-3630 9.8 0.05% 1 0 2026-03-10T18:48:52.193000 Delta Electronics COMMGR2 has Stack-based Buffer Overflow vulnerability.
CVE-2026-27826 8.2 0.04% 2 1 2026-03-10T18:48:50 ### Summary An unauthenticated attacker who can reach the mcp-atlassian HTTP end
CVE-2026-30934 8.9 0.04% 1 0 2026-03-10T18:44:35 ## Summary Stored XSS is possible via share metadata fields (e.g., `title`, `des
CVE-2026-30921 10.0 0.01% 2 0 2026-03-10T18:44:25 Summary OneUptime Synthetic Monitors allow low-privileged project users to subm
CVE-2026-30920 8.6 0.01% 2 0 2026-03-10T18:44:15 ### Summary OneUptime's GitHub App callback trusts attacker-controlled `state`
CVE-2026-30869 9.3 0.43% 1 0 2026-03-10T18:43:20 ### Summary A path traversal vulnerability in the `/export` endpoint allows an a
CVE-2026-28292 9.8 0.14% 4 0 2026-03-10T18:38:58 ### Summary The `blockUnsafeOperationsPlugin` in `simple-git` fails to block gi
CVE-2026-30910 7.5 0.02% 1 0 2026-03-10T18:32:20 Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overf
CVE-2026-26128 7.8 0.04% 1 0 2026-03-10T18:31:31 Improper authentication in Windows SMB Server allows an authorized attacker to e
CVE-2026-26134 7.8 0.06% 1 0 2026-03-10T18:31:31 Integer overflow or wraparound in Microsoft Office allows an authorized attacker
CVE-2026-3845 8.8 0.04% 2 0 2026-03-10T18:31:31 Heap buffer overflow in the Audio/Video: Playback component in Firefox for Andro
CVE-2026-26117 7.8 0.04% 5 0 2026-03-10T18:31:30 Authentication bypass using an alternate path or channel in Azure Windows Virtua
CVE-2026-26144 7.5 0.10% 5 0 2026-03-10T18:31:30 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2026-26132 7.8 0.06% 1 0 2026-03-10T18:31:30 Use after free in Windows Kernel allows an authorized attacker to elevate privil
CVE-2026-26148 8.2 0.08% 1 0 2026-03-10T18:31:30 External initialization of trusted variables or data stores in Azure Entra ID al
CVE-2026-2339 7.5 0.22% 1 0 2026-03-10T18:31:30 Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Sof
CVE-2025-54820 8.1 0.04% 2 0 2026-03-10T18:31:25 A Stack-based Buffer Overflow vulnerability [CWE-121] vulnerability in Fortinet
CVE-2026-24291 7.8 0.06% 1 0 2026-03-10T18:31:25 Incorrect permission assignment for critical resource in Windows Accessibility I
CVE-2026-21262 8.8 0.08% 1 0 2026-03-10T18:31:25 Improper access control in SQL Server allows an authorized attacker to elevate p
CVE-2026-2364 7.3 0.01% 2 0 2026-03-10T18:31:24 If a legitimate user confirms a self-update prompt or initiate an installation o
CVE-2026-1508 4.3 0.01% 1 0 2026-03-10T18:31:24 The Court Reservation WordPress plugin before 1.10.9 does not have CSRF check i
CVE-2025-41711 5.3 0.02% 2 0 2026-03-10T18:31:24 An unauthenticated remote attacker can use firmware images to extract password h
CVE-2025-41712 6.5 0.03% 2 0 2026-03-10T18:31:24 An unauthenticated remote attacker who tricks a user to upload a manipulated HTM
CVE-2025-41710 6.5 0.03% 2 0 2026-03-10T18:31:24 An unauthenticated remote attacker may use hardcodes credentials to get access t
CVE-2026-0953 9.8 0.04% 1 0 2026-03-10T18:31:24 The Tutor LMS Pro plugin for WordPress is vulnerable to authentication bypass in
CVE-2026-27685 9.1 0.04% 1 0 2026-03-10T18:31:24 SAP NetWeaver Enterprise Portal Administration is vulnerable if a privileged use
CVE-2026-1603 8.6 43.88% 5 0 template 2026-03-10T15:31:30 An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allo
CVE-2026-27005 9.8 0.12% 1 0 2026-03-10T14:04:01.353000 Chartbrew is an open-source web application that can connect directly to databas
CVE-2025-70238 7.5 0.04% 1 0 2026-03-09T21:32:45 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2026-3638 5.9 0.03% 1 0 2026-03-09T21:31:49 Improper access control in user and role restore API endpoints in Devolutions Se
CVE-2025-26399 9.8 23.31% 5 1 2026-03-09T21:31:33 SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxP
CVE-2021-22054 7.5 93.79% 3 1 template 2026-03-09T21:31:33 VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.
CVE-2026-28802 9.8 0.04% 1 0 2026-03-09T21:20:56.980000 Authlib is a Python library which builds OAuth and OpenID Connect servers. From
CVE-2025-70363 7.5 0.05% 1 0 2026-03-09T19:16:00.890000 Incorrect access control in the REST API of Ibexa & Ciril GROUP eZ Platform / Ci
CVE-2026-3038 7.5 0.04% 1 0 2026-03-09T18:32:49 The rtsock_msg_buffer() function serializes routing information into a buffer.
CVE-2026-3588 7.5 0.02% 1 0 2026-03-09T18:31:50 A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 all
CVE-2025-70047 7.5 0.04% 1 0 2026-03-09T18:31:49 An issue pertaining to CWE-400: Uncontrolled Resource Consumption was discovered
CVE-2026-25866 7.8 0.01% 1 0 2026-03-09T18:31:49 MobaXterm versions prior to 26.1 contain an uncontrolled search path element vul
CVE-2026-30863 None 0.07% 1 1 2026-03-09T17:42:26 ### Impact The Google, Apple, and Facebook authentication adapters use JWT veri
CVE-2026-29191 9.3 0.03% 1 0 2026-03-09T15:48:28 ### Summary A vulnerability was discovered in Zitadel's login V2 interface that
CVE-2026-2919 4.3 0.01% 1 0 2026-03-09T15:30:48 Malicious scripts could display attacker-controlled web content under spoofed do
CVE-2026-2219 7.5 0.01% 1 0 2026-03-09T15:30:43 It was discovered that dpkg-deb (a component of dpkg, the Debian package managem
CVE-2026-27944 9.8 1.03% 1 3 template 2026-03-05T22:37:22 ## Summary The `/api/backup` endpoint is accessible without authentication and
CVE-2026-25921 9.3 0.02% 1 0 2026-03-05T22:28:33 ### Summary Overwritable LFS object across different repos leads to supply-chain
CVE-2026-21385 7.8 0.38% 2 1 2026-03-03T21:31:13 Memory corruption while using alignments for memory allocation.
CVE-2026-27611 6.5 0.03% 4 0 2026-02-27T19:12:25.640000 FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to ver
CVE-2026-27739 None 0.05% 1 1 2026-02-25T22:42:37 A [Server-Side Request Forgery (SSRF)](https://developer.mozilla.org/en-US/docs/
CVE-2026-20127 10.0 2.60% 2 6 2026-02-25T18:31:45 A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controlle
CVE-2026-20841 8.8 0.11% 1 12 2026-02-11T15:31:25 Improper neutralization of special elements used in a command ('command injectio
CVE-2026-2138 8.8 0.08% 1 0 2026-02-10T19:28:57.427000 A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the
CVE-2026-24307 9.3 0.15% 2 0 2026-01-23T00:31:24 Improper validation of specified type of input in M365 Copilot allows an unautho
CVE-2025-13154 5.5 0.02% 1 0 2026-01-15T00:31:44 An improper link following vulnerability was reported in the SmartPerformanceAdd
CVE-2025-66005 0 0.02% 1 0 2026-01-14T16:25:12.057000 Lack of authorization of the InputManager D-Bus interface in InputPlumber versio
CVE-2025-14338 None 0.01% 1 0 2026-01-14T12:31:48 Polkit authentication dis isabled by default and a race condition in the Polkit
CVE-2026-0628 8.8 0.04% 2 2 2026-01-12T16:48:33.560000 Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7
CVE-2025-11126 9.8 0.18% 2 0 2025-09-29T00:30:35 A security flaw has been discovered in Apeman ID71 218.53.203.117. This vulnerab
CVE-2025-0037 6.6 0.03% 1 0 2025-06-10T00:30:36 In AMD Versal Adaptive SoC devices, the lack of address validation when executin
CVE-2022-25860 9.8 41.35% 1 0 2025-04-01T23:03:12 Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code E
CVE-2022-25912 8.1 43.30% 1 0 2023-08-17T05:02:31 The package simple-git before 3.15.0 is vulnerable to Remote Code Execution (RCE
CVE-2026-0866 0 0.00% 4 0 N/A
CVE-2026-31870 0 0.00% 2 0 N/A
CVE-2026-31852 0 0.00% 2 0 N/A
CVE-2026-21888 0 0.00% 4 0 N/A
CVE-2026-3611 0 0.00% 1 0 N/A
CVE-2026-28806 0 0.04% 1 0 N/A
CVE-2026-28514 0 0.11% 2 0 N/A
CVE-2026-30983 0 0.01% 2 0 N/A
CVE-2026-30979 0 0.01% 1 0 N/A
CVE-2026-30985 0 0.01% 1 0 N/A
CVE-2026-30987 0 0.01% 1 0 N/A
CVE-2026-31795 0 0.01% 1 0 N/A
CVE-2026-31796 0 0.01% 1 0 N/A
CVE-2026-30918 0 0.04% 1 0 N/A
CVE-2026-27603 0 0.05% 1 0 N/A
CVE-2026-28693 0 0.04% 1 0 N/A
CVE-2026-28691 0 0.04% 1 0 N/A
CVE-2026-28431 0 0.04% 1 0 N/A
CVE-2026-30240 0 0.03% 2 0 N/A
CVE-2026-31816 0 0.10% 2 0 N/A
CVE-2026-25737 0 0.05% 1 0 N/A
CVE-2025-62166 0 0.08% 1 0 N/A

CVE-2026-1717
(5.5 MEDIUM)

EPSS: 0.00%

updated 2026-03-11T21:31:10

1 posts

An input validation vulnerability was reported in the LenovoProductivitySystemAddin used in Lenovo Vantage and Lenovo Baiying that could allow a local authenticated user to terminate arbitrary processes with elevated privileges.

rtfmkiesel@infosec.exchange at 2026-03-11T10:54:29.000Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

CVE-2026-1715
(7.1 HIGH)

EPSS: 0.00%

updated 2026-03-11T21:31:10

1 posts

An input validation vulnerability was reported in the DeviceSettingsSystemAddin used in Lenovo Vantage and Lenovo Baiying that could allow a local authenticated user to modify arbitrary registry keys with elevated privileges.

rtfmkiesel@infosec.exchange at 2026-03-11T10:54:29.000Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

CVE-2026-1716
(7.1 HIGH)

EPSS: 0.00%

updated 2026-03-11T21:16:15.017000

1 posts

An input validation vulnerability was reported in the DeviceSettingsSystemAddin used in Lenovo Vantage and Lenovo Baiying that could allow a local authenticated user to delete arbitrary registry keys with elevated privileges.

rtfmkiesel@infosec.exchange at 2026-03-11T10:54:29.000Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

CVE-2026-26801
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-11T21:12:10

1 posts

Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.2 through 0.3.5 allows a remote attacker to obtain sensitive information via the src/URLResolver.js component. The fix was released in version 0.3.6 which introduces the setUrlAccessPolicy() method allowing server operators to define URL access rules. A warning is now logged when pdfmake is used server-side without a p

thehackerwire@mastodon.social at 2026-03-10T20:01:18.000Z ##

🟠 CVE-2026-26801 - High (7.5)

Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.2 through 0.3.5 allows a remote attacker to obtain sensitive information via the src/URLResolver.js component. The fix was released in version 0.3.6 which introduces t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26127
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-11T21:11:46

1 posts

# Microsoft Security Advisory CVE-2026-26127 – .NET Denial of Service Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 9.0 and .NET 10.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A denial of service vulnerability exists in .NET and

thehackerwire@mastodon.social at 2026-03-10T20:02:19.000Z ##

🟠 CVE-2026-26127 - High (7.5)

Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26130
(7.5 HIGH)

EPSS: 1.27%

updated 2026-03-11T21:11:31

3 posts

# Microsoft Security Advisory CVE-2026-26130 – .NET Denial of Service Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0, .NET 9.0, and .NET 10.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A denial of service vulnerability exists

thehackerwire@mastodon.social at 2026-03-10T19:18:03.000Z ##

🟠 CVE-2026-26130 - High (7.5)

Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:16:14.000Z ##

🟠 CVE-2026-26130 - High (7.5)

Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

blowdart.me@bsky.brid.gy at 2026-03-10T17:43:04.084Z ##

CVE-2026-26130 - A denial of service attack against SignalR. Update your runtime, restart your SignalR apps. github.com/dotnet/annou... (2/5)

Microsoft Security Advisory CV...

##

CVE-2026-31866
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-11T20:57:38

2 posts

## Details flagd exposes OFREP (`/ofrep/v1/evaluate/...`) and gRPC (`evaluation.v1`, `evaluation.v2`) endpoints for feature flag evaluation. These endpoints are designed to be publicly accessible by client applications. The evaluation context included in request payloads is read into memory without any size restriction. An attacker can send a single HTTP request with an arbitrarily large body, c

thehackerwire@mastodon.social at 2026-03-11T18:33:57.000Z ##

🟠 CVE-2026-31866 - High (7.5)

flagd is a feature flag daemon with a Unix philosophy. Prior to 0.14.2, flagd exposes OFREP (/ofrep/v1/evaluate/...) and gRPC (evaluation.v1, evaluation.v2) endpoints for feature flag evaluation. These endpoints are designed to be publicly accessi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T18:33:57.000Z ##

🟠 CVE-2026-31866 - High (7.5)

flagd is a feature flag daemon with a Unix philosophy. Prior to 0.14.2, flagd exposes OFREP (/ofrep/v1/evaluate/...) and gRPC (evaluation.v1, evaluation.v2) endpoints for feature flag evaluation. These endpoints are designed to be publicly accessi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31862
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-03-11T20:45:27

2 posts

### Summary Multiple Git-related API endpoints use execAsync() with string interpolation of user-controlled parameters (file, branch, message, commit), allowing authenticated attackers to execute arbitrary OS commands. ### Details The claudecodeui application provides Git integration through various API endpoints. These endpoints accept user-controlled parameters such as file paths, branch names,

thehackerwire@mastodon.social at 2026-03-11T18:33:48.000Z ##

🔴 CVE-2026-31862 - Critical (9.1)

Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.24.0, multiple Git-related API endpoints use execAsync() with string interpolation of user-controlled parameters (file, branch...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T18:33:48.000Z ##

🔴 CVE-2026-31862 - Critical (9.1)

Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.24.0, multiple Git-related API endpoints use execAsync() with string interpolation of user-controlled parameters (file, branch...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31839
(8.2 HIGH)

EPSS: 0.00%

updated 2026-03-11T20:43:42

2 posts

## Summary A high-severity integrity bypass vulnerability existed in Striae's digital confirmation workflow prior to v3.0.0. Hash-only validation trusted manifest hash fields that could be modified together with package content, allowing tampered confirmation packages to pass integrity checks. ## Impact Confirmation package integrity could be bypassed because both content and hash values were m

thehackerwire@mastodon.social at 2026-03-11T17:18:21.000Z ##

🟠 CVE-2026-31839 - High (8.2)

Striae is a firearms examiner's comparison companion. A high-severity integrity bypass vulnerability existed in Striae's digital confirmation workflow prior to v3.0.0. Hash-only validation trusted manifest hash fields that could be modified togeth...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T17:18:21.000Z ##

🟠 CVE-2026-31839 - High (8.2)

Striae is a firearms examiner's comparison companion. A high-severity integrity bypass vulnerability existed in Striae's digital confirmation workflow prior to v3.0.0. Hash-only validation trusted manifest hash fields that could be modified togeth...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28229
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-11T20:43:32

4 posts

### Summary Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates). Any request with a `Authorization: Bearer nothing` token can leak sensitive template content, including embedded Secret manifests. ### Details https://github.com/argoproj/argo-workflows/blob/b519c9054e66b2f0a25eec06709717bd1362f72e/server/workflowtemplate/workflow_template_serv

thehackerwire@mastodon.social at 2026-03-11T16:30:18.000Z ##

🔴 CVE-2026-28229 - Critical (9.8)

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to 4.0.2 and 3.7.11, Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates)....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:18:39.000Z ##

🔴 CVE-2026-28229 - Critical (9.8)

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to 4.0.2 and 3.7.11, Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates)....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:30:18.000Z ##

🔴 CVE-2026-28229 - Critical (9.8)

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to 4.0.2 and 3.7.11, Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates)....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:18:39.000Z ##

🔴 CVE-2026-28229 - Critical (9.8)

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to 4.0.2 and 3.7.11, Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates)....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30933
(7.5 HIGH)

EPSS: 0.05%

updated 2026-03-11T20:40:06

4 posts

### Summary The remediation for CVE-2026-27611 appears incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info in docker image gtstef/filebrowser:1.3.1-webdav-2. ### Details The issue stems from two flaws: 1. Tokenized download URLs are written into the persistent share model ``` backend/http/share.go convertToFrontendShareResponse(line 63) s.Down

thehackerwire@mastodon.social at 2026-03-10T19:17:55.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:16:04.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:01:49.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:44:44.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32059
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-11T20:38:42

2 posts

### Summary In OpenClaw, `tools.exec.safeBins` validation for `sort` could be bypassed via GNU long-option abbreviations in allowlist mode, allowing approval-free execution paths that should require approval. ### Affected Packages / Versions - Ecosystem: npm - Package: `openclaw` - Latest published version checked: `2026.2.22-2` - Affected range: `<= 2026.2.22-2` - Fixed version: `2026.2.23` ###

thehackerwire@mastodon.social at 2026-03-11T15:06:39.000Z ##

🟠 CVE-2026-32059 - High (8.8)

OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag checks via abbreviated options. Remote attackers can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T15:06:39.000Z ##

🟠 CVE-2026-32059 - High (8.8)

OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag checks via abbreviated options. Remote attackers can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32062
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-11T20:38:31

2 posts

### Summary `@openclaw/voice-call` (and the bundled copy shipped in `openclaw`) accepted media-stream WebSocket upgrades before stream validation. In reachable deployments, unauthenticated pre-start sockets could be held open and increase resource pressure. ### Affected Packages / Versions - `openclaw` (npm): vulnerable `<= 2026.2.21-2`, patched in `2026.2.22`. - `@openclaw/voice-call` (npm): vul

thehackerwire@mastodon.social at 2026-03-11T15:06:19.000Z ##

🟠 CVE-2026-32062 - High (7.5)

OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call versions 2026.2.21 prior to 2026.2.22 accept media-stream WebSocket upgrades before stream validation, allowing unauthenticated clients to establish connections. Remote attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T15:06:19.000Z ##

🟠 CVE-2026-32062 - High (7.5)

OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call versions 2026.2.21 prior to 2026.2.22 accept media-stream WebSocket upgrades before stream validation, allowing unauthenticated clients to establish connections. Remote attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27273
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-11T20:27:05.240000

2 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:23.000Z ##

🟠 CVE-2026-27273 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:30:29.000Z ##

🟠 CVE-2026-27273 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27274
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-11T20:26:36.670000

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:30:31.000Z ##

🟠 CVE-2026-27274 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26118
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-11T19:59:55

1 posts

Server-Side Request Forgery (SSRF) in Azure MCP Server allows an authorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-03-10T20:02:00.000Z ##

🟠 CVE-2026-26118 - High (8.8)

Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26131
(7.8 HIGH)

EPSS: 0.04%

updated 2026-03-11T19:53:25

1 posts

# Microsoft Security Advisory CVE-2026-26131 – .NET Elevation of Privilege Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 10.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. An elevation of privilege vulnerability exists in .NET due

thehackerwire@mastodon.social at 2026-03-10T19:16:24.000Z ##

🟠 CVE-2026-26131 - High (7.8)

Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30966
(10.0 CRITICAL)

EPSS: 0.04%

updated 2026-03-11T19:50:29.950000

1 posts

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.7 and 8.6.20, Parse Server's internal tables, which store Relation field mappings such as role memberships, can be directly accessed via the REST API or GraphQL API by any client using only the application key. No master key is required. An attacker can create, read, update,

offseq@infosec.exchange at 2026-03-11T03:00:29.000Z ##

🚨 CRITICAL: CVE-2026-30966 in parse-server (<9.5.2-alpha.7, <8.6.20) lets attackers gain any role via REST/GraphQL with just the app key. Upgrade now and restrict API access! Full details: radar.offseq.com/threat/cve-20 #OffSeq #parseServer #CVE202630966 #infosec

##

CVE-2025-68613
(9.9 CRITICAL)

EPSS: 78.98%

updated 2026-03-11T19:40:09.533000

4 posts

n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently

Nuclei template

31 repos

https://github.com/nehkark/CVE-2025-68613

https://github.com/GnuTLam/POC-CVE-2025-68613

https://github.com/ali-py3/Exploit-CVE-2025-68613

https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613

https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis

https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab

https://github.com/Rishi-kaul/n8n-CVE-2025-68613

https://github.com/sahilccras/Blackash-CVE-2025-68613

https://github.com/gagaltotal/n8n-cve-2025-68613

https://github.com/manyaigdtuw/CVE-2025-68613_Scanner

https://github.com/intelligent-ears/CVE-2025-68613

https://github.com/TheStingR/CVE-2025-68613-POC

https://github.com/secjoker/CVE-2025-68613

https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit

https://github.com/cv-sai-kamesh/n8n-CVE-2025-68613

https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613

https://github.com/reem-012/poc_CVE-2025-68613

https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate

https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613

https://github.com/Dlanang/homelab-CVE-2025-68613

https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe

https://github.com/wioui/n8n-CVE-2025-68613-exploit

https://github.com/AbdulRKB/n8n-RCE

https://github.com/shibaaa204/CVE-2025-68613

https://github.com/Victorhugofariasvieir66/relatorio-n8n.md

https://github.com/h3raklez/CVE-2025-68613

https://github.com/Khin-96/n8n-cve-2025-68613-thm

https://github.com/rxerium/CVE-2025-68613

https://github.com/TheInterception/n8n_CVE-2025-68613_exploit_payloads

https://github.com/intbjw/CVE-2025-68613-poc-via-copilot

https://github.com/LingerANR/n8n-CVE-2025-68613

secdb at 2026-03-11T20:00:14.168Z ##

🚨 [CISA-2026:0311] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-68613 (secdb.nttzen.cloud/cve/detail/)
- Name: n8n Improper Control of Dynamically-Managed Code Resources Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: n8n
- Product: n8n
- Notes: github.com/n8n-io/n8n/security ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-03-11T18:00:48.000Z ##

CVE ID: CVE-2025-68613
Vendor: n8n
Product: n8n
Date Added: 2026-03-11
Notes: github.com/n8n-io/n8n/security ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-03-11T20:00:14.000Z ##

🚨 [CISA-2026:0311] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-68613 (secdb.nttzen.cloud/cve/detail/)
- Name: n8n Improper Control of Dynamically-Managed Code Resources Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: n8n
- Product: n8n
- Notes: github.com/n8n-io/n8n/security ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260311 #cisa20260311 #cve_2025_68613 #cve202568613

##

cisakevtracker@mastodon.social at 2026-03-11T18:00:48.000Z ##

CVE ID: CVE-2025-68613
Vendor: n8n
Product: n8n
Date Added: 2026-03-11
Notes: github.com/n8n-io/n8n/security ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-31881
(7.7 HIGH)

EPSS: 0.00%

updated 2026-03-11T19:16:04.787000

2 posts

Runtipi is a personal homeserver orchestrator. Prior to 4.8.0, an unauthenticated attacker can reset the operator (admin) password when a password-reset request is active, resulting in full account takeover. The endpoint POST /api/auth/reset-password is exposed without authentication/authorization checks. During the 15-minute reset window, any remote user can set a new operator password and log in

thehackerwire@mastodon.social at 2026-03-11T19:19:37.000Z ##

🟠 CVE-2026-31881 - High (7.7)

Runtipi is a personal homeserver orchestrator. Prior to 4.8.0, an unauthenticated attacker can reset the operator (admin) password when a password-reset request is active, resulting in full account takeover. The endpoint POST /api/auth/reset-passw...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T19:19:37.000Z ##

🟠 CVE-2026-31881 - High (7.7)

Runtipi is a personal homeserver orchestrator. Prior to 4.8.0, an unauthenticated attacker can reset the operator (admin) password when a password-reset request is active, resulting in full account takeover. The endpoint POST /api/auth/reset-passw...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31874
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-11T19:16:03.970000

4 posts

Taskosaur is an open source project management platform with conversational AI for task execution in-app. In 1.0.0, the application does not properly validate or restrict the role parameter during the user registration process. An attacker can manually modify the request payload and assign themselves elevated privileges. Because the backend does not enforce role assignment restrictions or ignore c

thehackerwire@mastodon.social at 2026-03-11T19:20:33.000Z ##

🔴 CVE-2026-31874 - Critical (9.8)

Taskosaur is an open source project management platform with conversational AI for task execution in-app. In 1.0.0, the application does not properly validate or restrict the role parameter during the user registration process. An attacker can man...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T19:19:47.000Z ##

🔴 CVE-2026-31874 - Critical (9.8)

Taskosaur is an open source project management platform with conversational AI for task execution in-app. In 1.0.0, the application does not properly validate or restrict the role parameter during the user registration process. An attacker can man...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T19:20:33.000Z ##

🔴 CVE-2026-31874 - Critical (9.8)

Taskosaur is an open source project management platform with conversational AI for task execution in-app. In 1.0.0, the application does not properly validate or restrict the role parameter during the user registration process. An attacker can man...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T19:19:47.000Z ##

🔴 CVE-2026-31874 - Critical (9.8)

Taskosaur is an open source project management platform with conversational AI for task execution in-app. In 1.0.0, the application does not properly validate or restrict the role parameter during the user registration process. An attacker can man...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70082
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-11T19:16:03.607000

2 posts

An issue in Lantronix EDS3000PS v.3.1.0.0R2 allows an attacker to execute arbitrary code and obtain sensitive information via the ltrx_evo component

thehackerwire@mastodon.social at 2026-03-11T19:19:56.000Z ##

🔴 CVE-2025-70082 - Critical (9.8)

An issue in Lantronix EDS3000PS v.3.1.0.0R2 allows an attacker to execute arbitrary code and obtain sensitive information via the ltrx_evo component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T19:19:56.000Z ##

🔴 CVE-2025-70082 - Critical (9.8)

An issue in Lantronix EDS3000PS v.3.1.0.0R2 allows an attacker to execute arbitrary code and obtain sensitive information via the ltrx_evo component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-68623
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-11T19:16:03.420000

2 posts

In Microsoft DirectX End-User Runtime Web Installer 9.29.1974.0, a low-privilege user can replace an executable file during the installation process, which may result in unintended elevation of privileges. During installation, the installer runs with HIGH integrity and downloads executables and DLLs to the %TEMP% folder - writable by standard users. Subsequently, the installer executes the downloa

thehackerwire@mastodon.social at 2026-03-11T19:20:17.000Z ##

🟠 CVE-2025-68623 - High (8.8)

In Microsoft DirectX End-User Runtime Web Installer 9.29.1974.0, a low-privilege user can replace an executable file during the installation process, which may result in unintended elevation of privileges. During installation, the installer runs w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T19:20:17.000Z ##

🟠 CVE-2025-68623 - High (8.8)

In Microsoft DirectX End-User Runtime Web Installer 9.29.1974.0, a low-privilege user can replace an executable file during the installation process, which may result in unintended elevation of privileges. During installation, the installer runs w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3805
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-11T18:31:35

3 posts

When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

thehackerwire@mastodon.social at 2026-03-11T16:40:44.000Z ##

🟠 CVE-2026-3805 - High (7.5)

When doing a second SMB request to the same host again, curl would wrongly use
a data pointer pointing into already freed memory.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:40:44.000Z ##

🟠 CVE-2026-3805 - High (7.5)

When doing a second SMB request to the same host again, curl would wrongly use
a data pointer pointing into already freed memory.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

bagder@mastodon.social at 2026-03-11T06:56:43.000Z ##

CVE-2026-3805: use after free in SMB connection reuse

When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

curl.se/docs/CVE-2026-3805.html

##

CVE-2025-67298
(8.1 HIGH)

EPSS: 0.00%

updated 2026-03-11T18:31:35

2 posts

An issue in ClasroomIO before v.0.2.6 allows a remote attacker to escalate privileges via the endpoints /api/verify and /rest/v1/profile

thehackerwire@mastodon.social at 2026-03-11T16:40:35.000Z ##

🟠 CVE-2025-67298 - High (8.1)

An issue in ClasroomIO before v.0.2.6 allows a remote attacker to escalate privileges via the endpoints /api/verify and /rest/v1/profile

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:40:35.000Z ##

🟠 CVE-2025-67298 - High (8.1)

An issue in ClasroomIO before v.0.2.6 allows a remote attacker to escalate privileges via the endpoints /api/verify and /rest/v1/profile

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0230(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-03-11T18:30:40

2 posts

A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on macOS allows a local administrator to disable the agent. This issue could be leveraged by malware to perform malicious activity without detection.

CVE-2026-20046
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-11T18:30:40

4 posts

A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local attacker to elevate privileges and gain full administrative control of an affected device. This vulnerability is due to incorrect mapping of a command to task groups within the source code. An attacker with a low-privileged account could exploit this vulnerability by us

thehackerwire@mastodon.social at 2026-03-11T17:25:58.000Z ##

🟠 CVE-2026-20046 - High (8.8)

A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local attacker to elevate privileges and gain full administrative control of an affected device.

This vulnerability is du...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL at 2026-03-11T16:37:38.175Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

@cR0w

##

thehackerwire@mastodon.social at 2026-03-11T17:25:58.000Z ##

🟠 CVE-2026-20046 - High (8.8)

A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local attacker to elevate privileges and gain full administrative control of an affected device.

This vulnerability is du...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-03-11T16:37:38.000Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

@cR0w

##

CVE-2026-20116
(6.1 MEDIUM)

EPSS: 0.00%

updated 2026-03-11T18:30:40

2 posts

A vulnerability in the web-based management interface of&nbsp; Cisco Finesse, Cisco Packaged Contact Center Enterprise (Packaged CCE), Cisco Unified Contact Center Enterprise (Unified CCE), Cisco Unified Contact Center Express (Unified CCX), and Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the inte

AAKL at 2026-03-11T16:37:38.175Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

@cR0w

##

AAKL@infosec.exchange at 2026-03-11T16:37:38.000Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

@cR0w

##

CVE-2026-20117
(6.1 MEDIUM)

EPSS: 0.00%

updated 2026-03-11T18:30:40

2 posts

A vulnerability in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability exists because the web-based management interface of an affected system does not sufficiently validate user-supplied input. An attacker could exp

AAKL at 2026-03-11T16:37:38.175Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

@cR0w

##

AAKL@infosec.exchange at 2026-03-11T16:37:38.000Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

@cR0w

##

CVE-2026-20118
(6.8 MEDIUM)

EPSS: 0.00%

updated 2026-03-11T18:30:40

2 posts

A vulnerability in the handling of an Egress Packet Network Interface (EPNI) Aligner interrupt in Cisco IOS XR Software for Cisco Network Convergence System (NCS) 5500 Series with NC57 line cards and Cisco NCS 5700 Routers and Cisco IOS XR Software for Third Party Software could allow an unauthenticated, remote attacker to cause the network processing unit (NPU) and ASIC to stop processing, preven

AAKL at 2026-03-11T16:37:38.175Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

@cR0w

##

AAKL@infosec.exchange at 2026-03-11T16:37:38.000Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

@cR0w

##

CVE-2026-1069
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-11T18:30:40

2 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service by sending specially crafted GraphQL requests due to uncontrolled recursion under certain circumstances.

thehackerwire@mastodon.social at 2026-03-11T16:18:54.000Z ##

🟠 CVE-2026-1069 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service by sending specially crafted GraphQL requests due to uncontrolled recursion ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:18:54.000Z ##

🟠 CVE-2026-1069 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service by sending specially crafted GraphQL requests due to uncontrolled recursion ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13929
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-11T18:30:39

2 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.0 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service by issuing specially crafted requests to repository archive endpoints under certain conditions.

thehackerwire@mastodon.social at 2026-03-11T16:30:39.000Z ##

🟠 CVE-2025-13929 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.0 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service by issuing specially crafted req...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:30:39.000Z ##

🟠 CVE-2025-13929 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.0 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service by issuing specially crafted req...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1090
(8.7 HIGH)

EPSS: 0.00%

updated 2026-03-11T18:30:39

2 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user, when the `markdown_placeholders` feature flag was enabled, to inject JavaScript in a browser due to improper sanitization of placeholder content in markdown processing.

thehackerwire@mastodon.social at 2026-03-11T16:19:03.000Z ##

🟠 CVE-2026-1090 - High (8.7)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user, when the `markdown_placeholders` feature flag was enabled, to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:19:03.000Z ##

🟠 CVE-2026-1090 - High (8.7)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user, when the `markdown_placeholders` feature flag was enabled, to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0124
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-11T18:30:29

1 posts

There is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

offseq@infosec.exchange at 2026-03-11T01:30:26.000Z ##

⚠️ CVE-2026-0124 (CRITICAL, CVSS 10) hits Google Pixel devices: local out-of-bounds write means privilege escalation — no user interaction needed. Restrict access, monitor now, patch ASAP when available. radar.offseq.com/threat/cve-20 #OffSeq #Android #Vuln #MobileSecurity

##

CVE-2026-21289
(7.5 HIGH)

EPSS: 0.13%

updated 2026-03-11T18:21:50.817000

2 posts

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized view access of data. Exploitation of this issue does not require user interaction.

thehackerwire@mastodon.social at 2026-03-11T19:02:05.000Z ##

🟠 CVE-2026-21289 - High (7.5)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T19:02:05.000Z ##

🟠 CVE-2026-21289 - High (7.5)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21290
(8.7 HIGH)

EPSS: 0.04%

updated 2026-03-11T18:21:47.207000

2 posts

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A su

thehackerwire@mastodon.social at 2026-03-11T19:02:15.000Z ##

🟠 CVE-2026-21290 - High (8.7)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T19:02:15.000Z ##

🟠 CVE-2026-21290 - High (8.7)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30226
(0 None)

EPSS: 0.00%

updated 2026-03-11T18:16:22.937000

2 posts

Svelte devalue is a JavaScript library that serializes values into strings when JSON.stringify isn't sufficient for the job. In devalue v5.6.3 and earlier, devalue.parse and devalue.unflatten were susceptible to prototype pollution via maliciously crafted payloads. Successful exploitation could lead to Denial of Service (DoS) or type confusion. This vulnerability is fixed in 5.6.4.

jviide at 2026-03-11T20:30:04.871Z ##

Okay, so it turns out that this is really, really slow.

Which led to CVE-2026-30226: github.com/sveltejs/devalue/se

##

jviide@infosec.exchange at 2026-03-11T20:30:04.000Z ##

Okay, so it turns out that this is really, really slow.

Which led to CVE-2026-30226: github.com/sveltejs/devalue/se

##

CVE-2026-20074
(7.4 HIGH)

EPSS: 0.00%

updated 2026-03-11T17:16:55.470000

2 posts

A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) multi-instance routing feature of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the IS-IS process to restart unexpectedly. This vulnerability is due to insufficient input validation of ingress IS-IS packets. An attacker could exploit this vulnerability by sending crafted IS-IS packets to

AAKL at 2026-03-11T16:37:38.175Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

@cR0w

##

AAKL@infosec.exchange at 2026-03-11T16:37:38.000Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

@cR0w

##

CVE-2026-20040
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-11T17:16:54.747000

4 posts

A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker with a low-privileged account could exploit this vulnerability by using crafted

thehackerwire@mastodon.social at 2026-03-11T17:26:16.000Z ##

🟠 CVE-2026-20040 - High (8.8)

A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device.

This vulnerability is due to insufficient validatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL at 2026-03-11T16:37:38.175Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

@cR0w

##

thehackerwire@mastodon.social at 2026-03-11T17:26:16.000Z ##

🟠 CVE-2026-20040 - High (8.8)

A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device.

This vulnerability is due to insufficient validatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-03-11T16:37:38.000Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

@cR0w

##

CVE-2026-27271
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-11T17:11:22.460000

2 posts

Illustrator versions 29.8.4, 30.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-11T19:02:24.000Z ##

🟠 CVE-2026-27271 - High (7.8)

Illustrator versions 29.8.4, 30.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T19:02:24.000Z ##

🟠 CVE-2026-27271 - High (7.8)

Illustrator versions 29.8.4, 30.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3784
(6.5 MEDIUM)

EPSS: 0.02%

updated 2026-03-11T16:16:46.583000

1 posts

curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.

bagder@mastodon.social at 2026-03-11T06:56:32.000Z ##

CVE-2026-3784: wrong proxy connection reuse with credentials

curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.

curl.se/docs/CVE-2026-3784.html

##

CVE-2026-27897
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-03-11T16:16:40.133000

4 posts

Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and content. While the developer intended for a native UI dialog to handle the file path, the API does not validate the filename string before it is processed by

thehackerwire@mastodon.social at 2026-03-11T16:27:57.000Z ##

🔴 CVE-2026-27897 - Critical (10)

Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and conte...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:18:30.000Z ##

🔴 CVE-2026-27897 - Critical (10)

Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and conte...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:27:57.000Z ##

🔴 CVE-2026-27897 - Critical (10)

Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and conte...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:18:30.000Z ##

🔴 CVE-2026-27897 - Critical (10)

Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and conte...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22248
(8.0 HIGH)

EPSS: 0.00%

updated 2026-03-11T16:16:24.103000

2 posts

GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. From 11.0.0 to before 11.0.5, an authenticated technician user can upload a malicious file and trigger its execution through an unsafe PHP instantiation. This vulnerability is fixed in 11.0.5.

thehackerwire@mastodon.social at 2026-03-11T16:18:44.000Z ##

🟠 CVE-2026-22248 - High (8)

GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. From 11.0.0 to before 11.0.5, an authenticated technician user can upload a malicious file and trigg...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:18:44.000Z ##

🟠 CVE-2026-22248 - High (8)

GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. From 11.0.0 to before 11.0.5, an authenticated technician user can upload a malicious file and trigg...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14513
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-11T16:16:19.223000

2 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service condition due to improper input validation when processing specially crafted JSON payloads in the protected branches API.

thehackerwire@mastodon.social at 2026-03-11T16:40:25.000Z ##

🟠 CVE-2025-14513 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service condition due to improper input...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:40:25.000Z ##

🟠 CVE-2025-14513 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service condition due to improper input...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3847
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-11T15:55:51.477000

2 posts

Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148.0.2.

thehackerwire@mastodon.social at 2026-03-10T18:40:39.000Z ##

🟠 CVE-2026-3847 - High (8.8)

Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 14...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:21:09.000Z ##

🟠 CVE-2026-3847 - High (8.8)

Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 14...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2631
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-03-11T15:32:59

3 posts

The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an unauthenticated REST endpoint that allows any remote user to modify the option `datalogics_token` without verification. This token is subsequently used for authentication in a protected endpoint that allows users to perform arbitrary WordPress `update_option()` operations. Attackers can use this to enable registartion and

thehackerwire@mastodon.social at 2026-03-11T17:11:56.000Z ##

🔴 CVE-2026-2631 - Critical (9.8)

The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an unauthenticated REST endpoint that allows any remote user to modify the option `datalogics_token` without verification. This token is subsequently used for authentication...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T17:11:56.000Z ##

🔴 CVE-2026-2631 - Critical (9.8)

The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an unauthenticated REST endpoint that allows any remote user to modify the option `datalogics_token` without verification. This token is subsequently used for authentication...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-11T09:00:32.000Z ##

🛑 CVE-2026-2631 (CRITICAL): Datalogics Ecommerce Delivery WP plugin (<2.6.60) lets unauthenticated attackers gain admin via REST endpoint. Patch or restrict access now! Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #Infosec

##

CVE-2026-3783
(5.3 MEDIUM)

EPSS: 0.02%

updated 2026-03-11T15:32:59

1 posts

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances. If the hostname that the first request is redirected to has information in the used .netrc file, with either of the `machine` or `default` keywords, curl would pass on the bearer token set for the first host

bagder@mastodon.social at 2026-03-11T06:56:22.000Z ##

CVE-2026-3783: token leak with redirect and netrc

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances.

##

CVE-2026-1965
(6.5 MEDIUM)

EPSS: 0.04%

updated 2026-03-11T15:32:59

1 posts

libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request. libcurl features a pool of recent connections so that subsequent requests can reuse an existing connection to avoid overhead. When reusing a connection a range of criterion must first be met. Due to a logical error in the code, a request that was issued by an applicatio

bagder@mastodon.social at 2026-03-11T06:56:11.000Z ##

CVE-2026-1965: bad reuse of HTTP Negotiate connection

libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request.

curl.se/docs/CVE-2026-1965.html

##

CVE-2025-70027
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-11T15:31:58

2 posts

An issue pertaining to CWE-918: Server-Side Request Forgery was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4. This allows attackers to obtain sensitive information

thehackerwire@mastodon.social at 2026-03-11T15:48:51.000Z ##

🟠 CVE-2025-70027 - High (7.5)

An issue pertaining to CWE-918: Server-Side Request Forgery was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4. This allows attackers to obtain sensitive information

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T15:48:51.000Z ##

🟠 CVE-2025-70027 - High (7.5)

An issue pertaining to CWE-918: Server-Side Request Forgery was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4. This allows attackers to obtain sensitive information

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30900
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-11T15:31:58

2 posts

Improper Check of minimum version in update functionality of certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

thehackerwire@mastodon.social at 2026-03-11T15:22:51.000Z ##

🟠 CVE-2026-30900 - High (7.8)

Improper Check of minimum version in update functionality of certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T15:22:51.000Z ##

🟠 CVE-2026-30900 - High (7.8)

Improper Check of minimum version in update functionality of certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30903
(9.7 CRITICAL)

EPSS: 0.00%

updated 2026-03-11T15:31:58

2 posts

External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access.

thehackerwire@mastodon.social at 2026-03-11T15:22:42.000Z ##

🔴 CVE-2026-30903 - Critical (9.6)

External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T15:22:42.000Z ##

🔴 CVE-2026-30903 - Critical (9.6)

External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3496
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-11T15:31:58

2 posts

The JetBooking plugin for WordPress is vulnerable to SQL Injection via the 'check_in_date' parameter in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can

thehackerwire@mastodon.social at 2026-03-11T15:06:29.000Z ##

🟠 CVE-2026-3496 - High (7.5)

The JetBooking plugin for WordPress is vulnerable to SQL Injection via the 'check_in_date' parameter in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T15:06:29.000Z ##

🟠 CVE-2026-3496 - High (7.5)

The JetBooking plugin for WordPress is vulnerable to SQL Injection via the 'check_in_date' parameter in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2626
(8.1 HIGH)

EPSS: 0.01%

updated 2026-03-11T15:31:52

2 posts

The divi-booster WordPress plugin before 5.0.2 does not have authorization and CSRF checks in one of its fixing function, allowing unauthenticated users to modify stored divi-booster WordPress plugin before 5.0.2 options. Furthermore, due to the use of unserialize() on the data, this could be further exploited when combined with a PHP gadget chain to achieve PHP Object Injection

thehackerwire@mastodon.social at 2026-03-11T17:11:47.000Z ##

🟠 CVE-2026-2626 - High (8.1)

The divi-booster WordPress plugin before 5.0.2 does not have authorization and CSRF checks in one of its fixing function, allowing unauthenticated users to modify stored divi-booster WordPress plugin before 5.0.2 options. Furthermore, due to the u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T17:11:47.000Z ##

🟠 CVE-2026-2626 - High (8.1)

The divi-booster WordPress plugin before 5.0.2 does not have authorization and CSRF checks in one of its fixing function, allowing unauthenticated users to modify stored divi-booster WordPress plugin before 5.0.2 options. Furthermore, due to the u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23814
(8.8 HIGH)

EPSS: 0.11%

updated 2026-03-11T15:31:51

2 posts

A vulnerability in the command parameters of a certain AOS-CX CLI command could allow a low-privilege authenticated remote attacker to inject malicious commands resulting in unwanted behavior.

thehackerwire@mastodon.social at 2026-03-11T18:34:20.000Z ##

🟠 CVE-2026-23814 - High (8.8)

A vulnerability in the command parameters of a certain AOS-CX CLI command could allow a low-privilege authenticated remote attacker to inject malicious commands resulting in unwanted behavior.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T18:34:20.000Z ##

🟠 CVE-2026-23814 - High (8.8)

A vulnerability in the command parameters of a certain AOS-CX CLI command could allow a low-privilege authenticated remote attacker to inject malicious commands resulting in unwanted behavior.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23813
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-11T15:31:51

3 posts

A vulnerability has been identified in the web-based management interface of AOS-CX switches that could potentially allow an unauthenticated remote actor to circumvent existing authentication controls. In some cases this could enable resetting the admin password.

thehackerwire@mastodon.social at 2026-03-11T18:12:59.000Z ##

🔴 CVE-2026-23813 - Critical (9.8)

A vulnerability has been identified in the web-based management interface of AOS-CX switches that could potentially allow an unauthenticated remote actor to circumvent existing authentication controls. In some cases this could enable resetting the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T18:12:59.000Z ##

🔴 CVE-2026-23813 - Critical (9.8)

A vulnerability has been identified in the web-based management interface of AOS-CX switches that could potentially allow an unauthenticated remote actor to circumvent existing authentication controls. In some cases this could enable resetting the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-03-11T11:01:11.000Z ##

HPE Patches Multiple Flaws Aruba AOS-CX Including Critical Allowing Admin Password Resets

HPE patched five vulnerabilities in Aruba AOS-CX, including a critical authentication bypass (CVE-2026-23813) that allows unauthenticated remote attackers to reset administrator passwords and take full control of switches.

**Isolate your switch management interfaces on a separate VLAN that's only accessible from trusted networks. Then plan a patch cycle for your AOS-CX devices. For good measure, disable the web interface on all ports where it is not strictly necessary.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-30902
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-11T15:16:30.103000

2 posts

Improper Privilege Management in certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

thehackerwire@mastodon.social at 2026-03-11T15:22:32.000Z ##

🟠 CVE-2026-30902 - High (7.8)

Improper Privilege Management in certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T15:22:32.000Z ##

🟠 CVE-2026-30902 - High (7.8)

Improper Privilege Management in certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32060
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-11T14:16:27.943000

2 posts

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in apply_patch that allows attackers to write or delete files outside the configured workspace directory. When apply_patch is enabled without filesystem sandbox containment, attackers can exploit crafted paths including directory traversal sequences or absolute paths to escape workspace boundaries and modify arbitrary file

thehackerwire@mastodon.social at 2026-03-11T15:08:04.000Z ##

🟠 CVE-2026-32060 - High (8.8)

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in apply_patch that allows attackers to write or delete files outside the configured workspace directory. When apply_patch is enabled without filesystem sandbox containmen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T15:08:04.000Z ##

🟠 CVE-2026-32060 - High (8.8)

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in apply_patch that allows attackers to write or delete files outside the configured workspace directory. When apply_patch is enabled without filesystem sandbox containmen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3585
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-11T13:53:47.157000

2 posts

The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.17 via the 'ajax_create_import' function. This makes it possible for authenticated attackers, with Author-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

thehackerwire@mastodon.social at 2026-03-10T18:00:39.000Z ##

🟠 CVE-2026-3585 - High (7.5)

The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.17 via the 'ajax_create_import' function. This makes it possible for authenticated attackers, with Author-level access and abov...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-10T04:30:27.000Z ##

🚨 CVE-2026-3585 (HIGH): Path traversal in stellarwp The Events Calendar plugin lets Author+ users read any files on WordPress servers up to v6.15.17. Restrict access, monitor logs, and patch ASAP. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #Cybersecurity

##

CVE-2025-11158
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-11T13:53:47.157000

1 posts

Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.6, including 9.3.x and 8.3.x, do not restrict Groovy scripts in new PRPT reports published by users, allowing insertion of arbitrary scripts and leading to a RCE.

thehackerwire@mastodon.social at 2026-03-10T16:39:08.000Z ##

🔴 CVE-2025-11158 - Critical (9.1)

Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.6, including 9.3.x and 8.3.x, do not restrict Groovy scripts in new PRPT reports published by users, allowing insertion of arbitrary scripts and leading to a RCE.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1261
(7.2 HIGH)

EPSS: 0.07%

updated 2026-03-11T13:53:47.157000

1 posts

The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Quiz feature in all versions up to, and including, 3.9.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

offseq@infosec.exchange at 2026-03-10T10:30:27.000Z ##

🚨 CVE-2026-1261: HIGH-severity stored XSS in all Wpmet MetForm Pro versions (Quiz feature). Unauthenticated attackers can inject persistent scripts, risking user data and site integrity. Disable Quiz & monitor for patches. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS

##

CVE-2026-30929
(7.7 HIGH)

EPSS: 0.01%

updated 2026-03-11T13:53:47.157000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

thehackerwire@mastodon.social at 2026-03-10T08:00:00.000Z ##

🟠 CVE-2026-30929 - High (7.7)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41709
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-11T13:53:47.157000

2 posts

[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]

certvde@infosec.exchange at 2026-03-10T07:24:46.000Z ##

#OT #Advisory VDE-2025-096
Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230

An unauthenticated remote attacker can exploit several vulnerabilities in Weidmueller devices Energy Meter 750-24 and Energy Meter 750-230 to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711
#oCSAF
certvde.com/en/advisories/vde-

#CSAF weidmueller.csaf-tp.certvde.co

##

certvde@infosec.exchange at 2026-03-10T07:23:00.000Z ##

#OT #Advisory VDE-2025-079
Janitza: Multiple vulnerabilities in UMG 96RM-E

An unauthenticated remote attacker can exploit several vulnerabilities in Janitza UMG 96RM-E devices to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711

certvde.com/en/advisories/vde-
#oCSAF
#CSAF janitza.csaf-tp.certvde.com/.w

##

CVE-2026-30862
(9.0 CRITICAL)

EPSS: 0.04%

updated 2026-03-11T13:53:47.157000

1 posts

Appsmith is a platform to build admin panels, internal tools, and dashboards. Prior to 1.96, a Critical Stored XSS vulnerability exists in the Table Widget (TableWidgetV2). The root cause is a lack of HTML sanitization in the React component rendering pipeline, allowing malicious attributes to be interpolated into the DOM. By leveraging the "Invite Users" feature, an attacker with a regular user a

1 repos

https://github.com/drkim-dev/CVE-2026-30862

offseq@infosec.exchange at 2026-03-10T03:00:29.000Z ##

⚠️ CRITICAL: CVE-2026-30862 in Appsmith <1.96 enables stored XSS via TableWidgetV2. Attackers can leverage 'Invite Users' for admin takeover. Patch to 1.96+ ASAP! No active exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #XSS #Appsmith #CVE2026_30862

##

CVE-2026-3288
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-11T13:53:47.157000

2 posts

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/rewrite-target` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets clust

1 repos

https://github.com/SnailSploit/CVE-2026-3288

ChrisShort@hachyderm.io at 2026-03-09T23:06:10.000Z ##

[Security Advisory] CVE-2026-3288: ingress-nginx rewrite-target nginx configuration injection #devopsish groups.google.com/a/kubernetes

##

thehackerwire@mastodon.social at 2026-03-09T21:17:09.000Z ##

🟠 CVE-2026-3288 - High (8.8)

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/rewrite-target` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-ngin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0846
(8.6 HIGH)

EPSS: 0.08%

updated 2026-03-11T13:53:47.157000

2 posts

A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely

offseq@infosec.exchange at 2026-03-09T21:00:16.000Z ##

🚨 CVE-2026-0846: HIGH severity absolute path traversal in nltk v3.9.2 (filestring()). Remote attackers can read files if user input isn’t sanitized. Patch when available & validate inputs! radar.offseq.com/threat/cve-20 #OffSeq #nltk #vuln #infosec

##

thehackerwire@mastodon.social at 2026-03-09T20:22:05.000Z ##

🟠 CVE-2026-0846 - High (8.6)

A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, en...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24289
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-11T13:53:20.707000

1 posts

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.

Mozilla@activitypub.awakari.com at 2026-03-11T00:32:51.000Z ## Microsoft Patch Tuesday, March 2026 Edition Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressi...

#Security #Bloggers #Network #Adam #Barnett #adobe #Ben #McCarthy #CVE-2026-21262 #CVE-2026-24289 #CVE-2026-24291

Origin | Interest | Match ##

CVE-2026-26113
(8.4 HIGH)

EPSS: 0.04%

updated 2026-03-11T13:53:20.707000

1 posts

Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.

thehackerwire@mastodon.social at 2026-03-10T20:04:19.000Z ##

🟠 CVE-2026-26113 - High (8.4)

Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26121
(7.5 HIGH)

EPSS: 0.10%

updated 2026-03-11T13:53:20.707000

1 posts

Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network.

thehackerwire@mastodon.social at 2026-03-10T20:02:09.000Z ##

🟠 CVE-2026-26121 - High (7.5)

Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27269
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-11T13:53:20.707000

1 posts

Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:32:50.000Z ##

🟠 CVE-2026-27269 - High (7.8)

Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26141
(7.8 HIGH)

EPSS: 0.04%

updated 2026-03-11T13:53:20.707000

1 posts

Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T19:18:12.000Z ##

🟠 CVE-2026-26141 - High (7.8)

Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30957
(9.9 CRITICAL)

EPSS: 0.27%

updated 2026-03-11T13:53:20.707000

3 posts

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, OneUptime Synthetic Monitors allow a low-privileged authenticated project user to execute arbitrary commands on the oneuptime-probe server/container. The root cause is that untrusted Synthetic Monitor code is executed inside Node's vm while live host-realm Playwright browser and page objects are exposed to it. A

thehackerwire@mastodon.social at 2026-03-10T19:15:55.000Z ##

🔴 CVE-2026-30957 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, OneUptime Synthetic Monitors allow a low-privileged authenticated project user to execute arbitrary commands on the oneuptime-probe server/container. The root c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:01:40.000Z ##

🔴 CVE-2026-30957 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, OneUptime Synthetic Monitors allow a low-privileged authenticated project user to execute arbitrary commands on the oneuptime-probe server/container. The root c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:44:35.000Z ##

🔴 CVE-2026-30957 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, OneUptime Synthetic Monitors allow a low-privileged authenticated project user to execute arbitrary commands on the oneuptime-probe server/container. The root c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30944
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-11T13:53:20.707000

2 posts

StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user (at least Editor) to generate API tokens for any other user, including owner and admin accounts. The endpoint fails to validate whether the requesting user is authorized to create tokens on behalf of the target user ID

1 repos

https://github.com/FilipeGaudard/CVE-2026-30944-PoC

thehackerwire@mastodon.social at 2026-03-10T19:01:30.000Z ##

🟠 CVE-2026-30944 - High (8.8)

StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user (at least Editor) to generate API tokens for any other user, incl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:44:25.000Z ##

🟠 CVE-2026-30944 - High (8.8)

StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user (at least Editor) to generate API tokens for any other user, incl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30956
(9.9 CRITICAL)

EPSS: 0.04%

updated 2026-03-11T13:53:20.707000

1 posts

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, a low‑privileged user can bypass authorization and tenant isolation in OneUptime v10.0.20 and earlier by sending a forged is-multi-tenant-query header together with a controlled projectid header. Because the server trusts this client-supplied header, internal permission checks in BasePermission are skipped and t

thehackerwire@mastodon.social at 2026-03-10T18:44:34.000Z ##

🔴 CVE-2026-30956 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, a low‑privileged user can bypass authorization and tenant isolation in OneUptime v10.0.20 and earlier by sending a forged is-multi-tenant-query header togethe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30978
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-11T13:53:20.707000

1 posts

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-use-after-free in CIccCmm::AddXform() causing invalid vptr dereference and crash. This vulnerability is fixed in 2.3.1.5.

thehackerwire@mastodon.social at 2026-03-10T18:43:47.000Z ##

🟠 CVE-2026-30978 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-use-after-free in CIccCmm::AddXform() causing invalid vptr dereference and crash. This vulnerability is fixed in 2.3.1.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3843
(9.8 CRITICAL)

EPSS: 0.44%

updated 2026-03-11T13:53:20.707000

2 posts

Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux contains a SQL Injection vulnerability (CWE-89) in the system configuration module. A remote attacker can send specially crafted HTTP POST requests to the /php/request.php endpoint via the sql parameter in application/x-www-form-urlencoded data (e.g., action=do&sql=<query_here>&reload_driver=0) to execute arbitrary SQL comm

thehackerwire@mastodon.social at 2026-03-10T18:24:44.000Z ##

🔴 CVE-2026-3843 - Critical (9.8)

Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux contains a SQL Injection vulnerability (CWE-89) in the system configuration module. A remote attacker can send specially crafted HTTP POST requests to the /php/request.php ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:20:50.000Z ##

🔴 CVE-2026-3843 - Critical (9.8)

Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux contains a SQL Injection vulnerability (CWE-89) in the system configuration module. A remote attacker can send specially crafted HTTP POST requests to the /php/request.php ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31792
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-11T13:53:20.707000

1 posts

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a null pointer dereference in CIccTagXmlStruct::ParseTag() causing a segmentation fault or denial of service. This vulnerability is fixed in 2.3.1.5.

thehackerwire@mastodon.social at 2026-03-10T18:21:41.000Z ##

🟠 CVE-2026-31792 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a null pointer dereference in CIccTagXmlStruct::ParseTag() causing a segmentation fault or denial of service. This vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3483
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-11T13:53:20.707000

1 posts

An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local authenticated attacker to escalate their privileges.

thehackerwire@mastodon.social at 2026-03-10T18:21:22.000Z ##

🟠 CVE-2026-3483 - High (7.8)

An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local authenticated attacker to escalate their privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1708
(7.5 HIGH)

EPSS: 0.12%

updated 2026-03-11T13:52:47.683000

2 posts

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection in all versions up to, and including, 1.6.9.27. This is due to the `db_where_conditions` method in the `TD_DB_Model` class failing to prevent the `append_where_sql` parameter from being passed through JSON request bodies, while only checking for its presence in t

thehackerwire@mastodon.social at 2026-03-11T17:00:17.000Z ##

🟠 CVE-2026-1708 - High (7.5)

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection in all versions up to, and including, 1.6.9.27. This is due to the `db_where_conditions` method in the `TD_D...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T17:00:17.000Z ##

🟠 CVE-2026-1708 - High (7.5)

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection in all versions up to, and including, 1.6.9.27. This is due to the `db_where_conditions` method in the `TD_D...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1993
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-11T12:31:30

2 posts

The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Improper Privilege Management in versions 7.1.0 through 9.0.2. This is due to the `update_settings()` function accepting arbitrary plugin setting names without a whitelist of allowed settings. This makes it possible for authenticated attackers with the `exactmetrics_save_settings` capability to modify any plugin se

thehackerwire@mastodon.social at 2026-03-11T15:08:25.000Z ##

🟠 CVE-2026-1993 - High (8.8)

The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Improper Privilege Management in versions 7.1.0 through 9.0.2. This is due to the `update_settings()` function accepting arbitrary plugin setting names without a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T15:08:25.000Z ##

🟠 CVE-2026-1993 - High (8.8)

The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Improper Privilege Management in versions 7.1.0 through 9.0.2. This is due to the `update_settings()` function accepting arbitrary plugin setting names without a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1992
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-11T12:31:29

2 posts

The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Insecure Direct Object Reference in versions 8.6.0 through 9.0.2. This is due to the `store_settings()` method in the `ExactMetrics_Onboarding` class accepting a user-supplied `triggered_by` parameter that is used instead of the current user's ID to check permissions. This makes it possible for authenticated attack

thehackerwire@mastodon.social at 2026-03-11T15:08:14.000Z ##

🟠 CVE-2026-1992 - High (8.8)

The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Insecure Direct Object Reference in versions 8.6.0 through 9.0.2. This is due to the `store_settings()` method in the `ExactMetrics_Onboarding` class accepting a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T15:08:14.000Z ##

🟠 CVE-2026-1992 - High (8.8)

The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Insecure Direct Object Reference in versions 8.6.0 through 9.0.2. This is due to the `store_settings()` method in the `ExactMetrics_Onboarding` class accepting a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31844
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-11T09:32:00

2 posts

An authenticated SQL Injection vulnerability (CWE-89) exists in the Koha staff interface in the /cgi-bin/koha/suggestion/suggestion.pl endpoint due to improper validation of the displayby parameter used by the GetDistinctValues functionality. A low-privileged staff user can inject arbitrary SQL queries via crafted requests to this parameter, allowing execution of unintended SQL statements and expo

thehackerwire@mastodon.social at 2026-03-11T17:00:39.000Z ##

🟠 CVE-2026-31844 - High (8.8)

An authenticated SQL Injection vulnerability (CWE-89) exists in the Koha staff interface in the /cgi-bin/koha/suggestion/suggestion.pl endpoint due to improper validation of the displayby parameter used by the GetDistinctValues functionality. A lo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T17:00:39.000Z ##

🟠 CVE-2026-31844 - High (8.8)

An authenticated SQL Injection vulnerability (CWE-89) exists in the Koha staff interface in the /cgi-bin/koha/suggestion/suggestion.pl endpoint due to improper validation of the displayby parameter used by the GetDistinctValues functionality. A lo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3826
(9.8 CRITICAL)

EPSS: 0.20%

updated 2026-03-11T09:32:00

3 posts

IFTOP developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server.

thehackerwire@mastodon.social at 2026-03-11T17:00:28.000Z ##

🔴 CVE-2026-3826 - Critical (9.8)

IFTOP developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T17:00:28.000Z ##

🔴 CVE-2026-3826 - Critical (9.8)

IFTOP developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-11T07:32:34.000Z ##

🚨 CVE-2026-3826 (CRITICAL): WellChoose IFTOP PHP LFI lets unauthenticated attackers execute remote code. No patch yet. Isolate affected systems & monitor for LFI attempts. Act now to avoid full compromise! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #PHP #Vulnerability

##

CVE-2025-13067
(8.8 HIGH)

EPSS: 0.10%

updated 2026-03-11T06:31:47

2 posts

The Royal Addons for Elementor plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 1.7.1049. This is due to insufficient file type validation detecting files named main.php, allowing a file with such a name to bypass sanitization. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the af

thehackerwire@mastodon.social at 2026-03-11T18:12:50.000Z ##

🟠 CVE-2025-13067 - High (8.8)

The Royal Addons for Elementor plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 1.7.1049. This is due to insufficient file type validation detecting files named main.php, allowing a file with such a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T18:12:50.000Z ##

🟠 CVE-2025-13067 - High (8.8)

The Royal Addons for Elementor plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 1.7.1049. This is due to insufficient file type validation detecting files named main.php, allowing a file with such a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2413
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-11T06:31:47

2 posts

The Ally – Web Accessibility & Usability plugin for WordPress is vulnerable to SQL Injection via the URL path in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user-supplied URL parameter in the `get_global_remediations()` method, where it is directly concatenated into an SQL JOIN clause without proper sanitization for SQL context. While `esc_url_raw()` is ap

2 repos

https://github.com/FilipeGaudard/CVE-2026-24134-PoC

https://github.com/reschjonas/CVE-2026-24135

thehackerwire@mastodon.social at 2026-03-11T18:12:40.000Z ##

🟠 CVE-2026-2413 - High (7.5)

The Ally – Web Accessibility & Usability plugin for WordPress is vulnerable to SQL Injection via the URL path in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user-supplied URL parameter in the `get_global...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T18:12:40.000Z ##

🟠 CVE-2026-2413 - High (7.5)

The Ally – Web Accessibility & Usability plugin for WordPress is vulnerable to SQL Injection via the URL path in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user-supplied URL parameter in the `get_global...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24448
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-11T06:31:47

3 posts

Use of hard-coded credentials issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker to obtain administrative access.

thehackerwire@mastodon.social at 2026-03-11T17:26:26.000Z ##

🔴 CVE-2026-24448 - Critical (9.8)

Use of hard-coded credentials issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker to obtain administrative access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T17:26:26.000Z ##

🔴 CVE-2026-24448 - Critical (9.8)

Use of hard-coded credentials issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker to obtain administrative access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-11T10:30:28.000Z ##

🔴 CVE-2026-24448 (CRITICAL, CVSS 9.8): Micro Research MR-GM5L-S1/MR-GM5A-L1 devices contain hard-coded credentials, allowing admin access w/o authentication. Update firmware to v2.01.04N1_02 ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CVE #IoTSecurity #Vuln

##

CVE-2026-3222
(7.5 HIGH)

EPSS: 0.16%

updated 2026-03-11T06:31:47

2 posts

The WP Maps plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'location_id' parameter in all versions up to, and including, 4.9.1. This is due to the plugin's database abstraction layer (`FlipperCode_Model_Base::is_column()`) treating user input wrapped in backticks as column names, bypassing the `esc_sql()` escaping function. Additionally, the `wpgmp_ajax_call` AJAX han

thehackerwire@mastodon.social at 2026-03-11T17:12:05.000Z ##

🟠 CVE-2026-3222 - High (7.5)

The WP Maps plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'location_id' parameter in all versions up to, and including, 4.9.1. This is due to the plugin's database abstraction layer (`FlipperCode_Model_Base::is_colum...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T17:12:05.000Z ##

🟠 CVE-2026-3222 - High (7.5)

The WP Maps plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'location_id' parameter in all versions up to, and including, 4.9.1. This is due to the plugin's database abstraction layer (`FlipperCode_Model_Base::is_colum...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29515(CVSS UNKNOWN)

EPSS: 0.07%

updated 2026-03-11T06:31:47

1 posts

MiCode FileExplorer contains an authentication bypass vulnerability in the embedded SwiFTP FTP server component that allows network attackers to log in without valid credentials. Attackers can send arbitrary username and password combinations to the PASS command handler, which unconditionally grants access and allows listing, reading, writing, and deleting files exposed by the FTP server. The MiCo

offseq@infosec.exchange at 2026-03-11T04:32:41.000Z ##

🚨 CRITICAL vuln: CVE-2026-29515 in MiCode FileExplorer (all versions). FTP auth bypass via SwiFTP — any credentials grant access to read, write, or delete files. No patch; restrict FTP access ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #MiCode #CVE202629515

##

CVE-2026-27842
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-03-11T06:31:41

3 posts

Authentication bypass issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker to bypass authentication and change the device configuration.

thehackerwire@mastodon.social at 2026-03-11T17:26:34.000Z ##

🔴 CVE-2026-27842 - Critical (9.8)

Authentication bypass issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker to bypass authentication and change the device configuration.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T17:26:34.000Z ##

🔴 CVE-2026-27842 - Critical (9.8)

Authentication bypass issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker to bypass authentication and change the device configuration.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-11T06:00:30.000Z ##

🚩 CVE-2026-27842 (CRITICAL, CVSS 9.8): Auth bypass in Micro Research MR-GM5L-S1 & MR-GM5A-L1 (pre-v2.01.04N1_02). Remote attackers can reconfigure devices. Patch ASAP & segment networks! Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #IoTSecurity

##

CVE-2026-21311
(8.0 HIGH)

EPSS: 0.10%

updated 2026-03-11T03:31:39

2 posts

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A s

thehackerwire@mastodon.social at 2026-03-11T19:01:26.000Z ##

🟠 CVE-2026-21311 - High (8)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T19:01:26.000Z ##

🟠 CVE-2026-21311 - High (8)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21309
(7.5 HIGH)

EPSS: 0.13%

updated 2026-03-11T03:31:39

2 posts

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized view access of data. Exploitation of this issue does not require user interaction.

thehackerwire@mastodon.social at 2026-03-11T19:01:15.000Z ##

🟠 CVE-2026-21309 - High (7.5)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T19:01:15.000Z ##

🟠 CVE-2026-21309 - High (7.5)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3453
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-11T03:31:39

2 posts

The ProfilePress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.16.11. This is due to missing ownership validation on the change_plan_sub_id parameter in the process_checkout() function. The ppress_process_checkout AJAX handler accepts a user-controlled subscription ID intended for plan upgrades, loads the subscription record, and can

thehackerwire@mastodon.social at 2026-03-11T18:34:40.000Z ##

🟠 CVE-2026-3453 - High (8.1)

The ProfilePress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.16.11. This is due to missing ownership validation on the change_plan_sub_id parameter in the process_checkout() functi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T18:34:40.000Z ##

🟠 CVE-2026-3453 - High (8.1)

The ProfilePress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.16.11. This is due to missing ownership validation on the change_plan_sub_id parameter in the process_checkout() functi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21361
(8.1 HIGH)

EPSS: 0.09%

updated 2026-03-11T03:31:39

2 posts

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vvulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A

thehackerwire@mastodon.social at 2026-03-11T18:34:31.000Z ##

🟠 CVE-2026-21361 - High (8.1)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vvulnerability that could be abused by a high-privileged attacker to inject malicious scripts...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T18:34:31.000Z ##

🟠 CVE-2026-21361 - High (8.1)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vvulnerability that could be abused by a high-privileged attacker to inject malicious scripts...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21284
(8.1 HIGH)

EPSS: 0.09%

updated 2026-03-11T03:31:38

2 posts

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A s

thehackerwire@mastodon.social at 2026-03-11T19:01:36.000Z ##

🟠 CVE-2026-21284 - High (8.1)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T19:01:36.000Z ##

🟠 CVE-2026-21284 - High (8.1)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26738
(7.8 HIGH)

EPSS: 0.05%

updated 2026-03-10T21:33:20

1 posts

Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows a remote attacker to execute arbitrary code via a crafted .sns snapshot file.

thehackerwire@mastodon.social at 2026-03-10T20:01:29.000Z ##

🟠 CVE-2026-26738 - High (7.8)

Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows a remote attacker to execute arbitrary code via a crafted .sns snapshot file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3823
(8.8 HIGH)

EPSS: 0.14%

updated 2026-03-10T21:33:19

1 posts

EHG2408 series switch developed by Atop Technologies has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and execute arbitrary code.

offseq@infosec.exchange at 2026-03-09T16:30:30.000Z ##

🚨 CRITICAL: CVE-2026-3823 exposes Atop EHG2408 switches to unauthenticated RCE via stack-based buffer overflow. No patch yet — segment, restrict access, and monitor traffic. Full device compromise risk. radar.offseq.com/threat/cve-20 #OffSeq #ICS #Vuln #OTSecurity

##

CVE-2026-27276
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-10T21:32:24

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:44.000Z ##

🟠 CVE-2026-27276 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27275
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-10T21:32:24

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:34.000Z ##

🟠 CVE-2026-27275 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27280
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-10T21:32:24

1 posts

DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:30:12.000Z ##

🟠 CVE-2026-27280 - High (7.8)

DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim mu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27277
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-10T21:32:17

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:54.000Z ##

🟠 CVE-2026-27277 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27279
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-10T21:32:17

2 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:04.000Z ##

🟠 CVE-2026-27279 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:30:08.000Z ##

🟠 CVE-2026-27279 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69219
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-10T18:58:35.607000

1 posts

A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low. You should upgrade to version 6.0.0 of the provider to avoid even that risk.

2 repos

https://github.com/sak110/CVE-2025-69219

https://github.com/ahmetartuc/poc-cve-2025-69219

thehackerwire@mastodon.social at 2026-03-09T16:38:29.000Z ##

🟠 CVE-2025-69219 - High (8.8)

A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airfl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3630
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-10T18:48:52.193000

1 posts

Delta Electronics COMMGR2 has Stack-based Buffer Overflow vulnerability.

offseq@infosec.exchange at 2026-03-09T18:00:15.000Z ##

🔔 CVE-2026-3630: CRITICAL stack-based buffer overflow in DeltaWW COMMGR2 (CVSS 9.8). Remote, unauthenticated RCE risk — no patch yet. Segment & restrict network access, monitor for exploits. More: radar.offseq.com/threat/cve-20 #OffSeq #ICS #Vulnerability #OTsecurity

##

CVE-2026-27826
(8.2 HIGH)

EPSS: 0.04%

updated 2026-03-10T18:48:50

2 posts

### Summary An unauthenticated attacker who can reach the mcp-atlassian HTTP endpoint can force the server process to make outbound HTTP requests to an arbitrary attacker-controlled URL by supplying two custom HTTP headers without an `Authorization` header. No authentication is required. The vulnerability exists in the HTTP middleware and dependency injection layer — not in any MCP tool handler -

1 repos

https://github.com/plutosecurity/MCPwnfluence

thehackerwire@mastodon.social at 2026-03-10T19:31:14.000Z ##

🟠 CVE-2026-27826 - High (8.2)

MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (Confluence and Jira). Prior to version 0.17.0, an unauthenticated attacker who can reach the mcp-atlassian HTTP endpoint can force the server process to make outbound H...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:30:19.000Z ##

🟠 CVE-2026-27826 - High (8.2)

MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (Confluence and Jira). Prior to version 0.17.0, an unauthenticated attacker who can reach the mcp-atlassian HTTP endpoint can force the server process to make outbound H...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30934
(8.9 HIGH)

EPSS: 0.04%

updated 2026-03-10T18:44:35

1 posts

## Summary Stored XSS is possible via share metadata fields (e.g., `title`, `description`) that are rendered into HTML for `/public/share/<hash>` without context-aware escaping. The server uses `text/template` instead of `html/template`, allowing injected scripts to execute when victims visit the share URL. ## Details The server renders `public/index.html` using `text/template` and injects user-c

thehackerwire@mastodon.social at 2026-03-10T18:44:44.000Z ##

🟠 CVE-2026-30934 - High (8.9)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, Stored XSS is possible via share metadata fields (e.g., title, description) that are rendered into HTML for /public/share/ without context-aw...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30921
(10.0 CRITICAL)

EPSS: 0.01%

updated 2026-03-10T18:44:25

2 posts

Summary OneUptime Synthetic Monitors allow low-privileged project users to submit custom Playwright code that is executed on the `oneuptime-probe` service. In the current implementation, this untrusted code is run inside Node's `vm` and is given live host Playwright objects such as `browser` and `page`. This creates a distinct server-side RCE primitive: the attacker does not need the classic `th

thehackerwire@mastodon.social at 2026-03-10T18:01:18.000Z ##

🔴 CVE-2026-30921 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.20, OneUptime Synthetic Monitors allow low-privileged project users to submit custom Playwright code that is executed on the oneuptime-probe service. In the current...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:00:58.000Z ##

🔴 CVE-2026-30921 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.20, OneUptime Synthetic Monitors allow low-privileged project users to submit custom Playwright code that is executed on the oneuptime-probe service. In the current...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30920
(8.6 HIGH)

EPSS: 0.01%

updated 2026-03-10T18:44:15

2 posts

### Summary OneUptime's GitHub App callback trusts attacker-controlled `state` and `installation_id` values and updates `Project.gitHubAppInstallationId` with `isRoot: true` without validating that the caller is authorized for the target project. This allows an attacker to overwrite another project's GitHub App installation binding. Related GitHub endpoints also lack effective authorization, so

thehackerwire@mastodon.social at 2026-03-10T18:01:09.000Z ##

🟠 CVE-2026-30920 - High (8.6)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.19, OneUptime's GitHub App callback trusts attacker-controlled state and installation_id values and updates Project.gitHubAppInstallationId with isRoot: true withou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:00:48.000Z ##

🟠 CVE-2026-30920 - High (8.6)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.19, OneUptime's GitHub App callback trusts attacker-controlled state and installation_id values and updates Project.gitHubAppInstallationId with isRoot: true withou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30869
(9.3 CRITICAL)

EPSS: 0.43%

updated 2026-03-10T18:43:20

1 posts

### Summary A path traversal vulnerability in the `/export` endpoint allows an attacker to read arbitrary files from the server filesystem. By exploiting double‑encoded traversal sequences, an attacker can access sensitive files such as `conf/conf.json`, which contains secrets including the API token, cookie signing key, and workspace access authentication code. Leaking these secrets may enable a

offseq@infosec.exchange at 2026-03-10T00:00:44.000Z ##

🚨 CRITICAL: CVE-2026-30869 affects SiYuan (< 3.5.10) — path traversal via /export lets attackers read sensitive files (API tokens, keys). Patch to 3.5.10+ now! No auth needed. All admins review configs. radar.offseq.com/threat/cve-20 #OffSeq #CVE202630869 #infosec

##

CVE-2026-28292
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-03-10T18:38:58

4 posts

### Summary The `blockUnsafeOperationsPlugin` in `simple-git` fails to block git protocol override arguments when the config key is passed in uppercase or mixed case. An attacker who controls arguments passed to git operations can enable the `ext::` protocol by passing `-c PROTOCOL.ALLOW=always`, which executes an arbitrary OS command on the host machine. --- ### Details The `preventProtocolOv

hackerworkspace at 2026-03-11T18:30:29.252Z ##

CVE-2026-28292: simple-git Remote Code Execution - Case-Sensitivity Bypass (CVSS 9.8)

codeant.ai/security-research/s

Short summary: hackerworkspace.com/article/cv

##

hackerworkspace@infosec.exchange at 2026-03-11T18:30:29.000Z ##

CVE-2026-28292: simple-git Remote Code Execution - Case-Sensitivity Bypass (CVSS 9.8)

codeant.ai/security-research/s

Short summary: hackerworkspace.com/article/cv

#cybersecurity #vulnerability #exploit

##

_r_netsec@infosec.exchange at 2026-03-11T07:13:05.000Z ##

CVE-2026-28292: RCE in simple-git via case-sensitivity bypass (CVSS 9.8) codeant.ai/security-research/s

##

thehackerwire@mastodon.social at 2026-03-10T19:30:22.000Z ##

🔴 CVE-2026-28292 - Critical (9.8)

`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30910
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-10T18:32:20

1 posts

Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows. Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryp

thehackerwire@mastodon.social at 2026-03-10T17:16:38.000Z ##

🟠 CVE-2026-30910 - High (7.5)

Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows.

Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26128
(7.8 HIGH)

EPSS: 0.04%

updated 2026-03-10T18:31:31

1 posts

Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T20:04:09.000Z ##

🟠 CVE-2026-26128 - High (7.8)

Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26134
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-10T18:31:31

1 posts

Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T19:16:42.000Z ##

🟠 CVE-2026-26134 - High (7.8)

Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3845
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-10T18:31:31

2 posts

Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android. This vulnerability affects Firefox < 148.0.2.

thehackerwire@mastodon.social at 2026-03-10T18:24:53.000Z ##

🟠 CVE-2026-3845 - High (8.8)

Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android. This vulnerability affects Firefox &lt; 148.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:20:59.000Z ##

🟠 CVE-2026-3845 - High (8.8)

Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android. This vulnerability affects Firefox &lt; 148.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26117
(7.8 HIGH)

EPSS: 0.04%

updated 2026-03-10T18:31:30

5 posts

Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.

hackerworkspace at 2026-03-11T18:29:41.641Z ##

CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation & Cloud Identity Takeover 

cymulate.com/blog/cve-2026-261

Short summary: hackerworkspace.com/article/cv

##

hackerworkspace@infosec.exchange at 2026-03-11T18:29:41.000Z ##

CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation & Cloud Identity Takeover 

cymulate.com/blog/cve-2026-261

Short summary: hackerworkspace.com/article/cv

#cybersecurity #vulnerability #securitypatch

##

obivan@infosec.exchange at 2026-03-11T07:02:21.000Z ##

CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation & Cloud Identity Takeover cymulate.com/blog/cve-2026-261

##

_r_netsec@infosec.exchange at 2026-03-11T06:28:06.000Z ##

CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation & Cloud Identity Takeover cymulate.com/blog/cve-2026-261

##

thehackerwire@mastodon.social at 2026-03-10T20:01:40.000Z ##

🟠 CVE-2026-26117 - High (7.8)

Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26144
(7.5 HIGH)

EPSS: 0.10%

updated 2026-03-10T18:31:30

5 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office Excel allows an unauthorized attacker to disclose information over a network.

_r_netsec at 2026-03-11T14:13:05.417Z ##

Common architectural pattern across four Q1 2026 AI assistant vulnerabilities (CVE-2026-26144, CVE-2026-0628, CVE-2026-24307, PleaseFix) blog.barrack.ai/ai-copilot-att

##

_r_netsec@infosec.exchange at 2026-03-11T14:13:05.000Z ##

Common architectural pattern across four Q1 2026 AI assistant vulnerabilities (CVE-2026-26144, CVE-2026-0628, CVE-2026-24307, PleaseFix) blog.barrack.ai/ai-copilot-att

##

PC_Fluesterer@social.tchncs.de at 2026-03-11T10:23:47.000Z ##

Microsoft Flickentag 2026-03

Nach dem fetten Flickentag im Februar ist der für März wieder auf "normales" Maß geschrumpft. Mit den aktuellen Updates adressiert Microsoft (MS) 83 Sicherheitslücken. Von denen sind 8 als kritisch eingestuft. Von denen wiederum sticht eine (CVE-2026-26144) heraus. Ein führender Sicherheitsfachmann findet sie faszinierend. Es handelt sich um einen Fehler in Excel, nämlich "unzureichende Bereinigung von Eingaben". Der Leckerbissen besteht darin, dass ein Angreifer den Fehler nutzen kann, um mit Hilfe der KI Copilot von Ferne Informationen abzusaugen. Dafür sind keine Anmeldung oder Benutzerrechte

pc-fluesterer.info/wordpress/2

#Empfehlung #Hintergrund #Warnung #0day #datenschutz #Microsoft #office #privacy #sicherheit #UnplugTrump #vorbeugen #unplugmicrosoft

##

thezdi@infosec.exchange at 2026-03-10T22:18:05.000Z ##

And don't miss our bug of the month! Each patch Tuesday we'll be selecting our very favorite patch to highlight. This month, it CVE-2026-26144 - a Critical-rated info disclosure in Excel that uses the Copilot Agent to exfiltrate data. Neat! youtube.com/shorts/r4EjP3JxYRk

##

thehackerwire@mastodon.social at 2026-03-10T19:02:21.000Z ##

🟠 CVE-2026-26144 - High (7.5)

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office Excel allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26132
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-10T18:31:30

1 posts

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T19:16:33.000Z ##

🟠 CVE-2026-26132 - High (7.8)

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26148
(8.2 HIGH)

EPSS: 0.08%

updated 2026-03-10T18:31:30

1 posts

External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T19:02:30.000Z ##

🟠 CVE-2026-26148 - High (8.1)

External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2339
(7.5 HIGH)

EPSS: 0.22%

updated 2026-03-10T18:31:30

1 posts

Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Liderahenk allows Remote Code Inclusion, Privilege Abuse, Command Injection.This issue affects Liderahenk: before v3.4.0.

thehackerwire@mastodon.social at 2026-03-10T19:02:12.000Z ##

🟠 CVE-2026-2339 - High (7.5)

Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Liderahenk allows Remote Code Inclusion, Privilege Abuse, Command Injection.This issue affects Liderahenk: before v3.4.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-54820
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-10T18:31:25

2 posts

A Stack-based Buffer Overflow vulnerability [CWE-121] vulnerability in Fortinet FortiManager 7.4.0 through 7.4.2, FortiManager 7.2.0 through 7.2.10, FortiManager 6.4 all versions may allow a remote unauthenticated attacker to execute unauthorized commands via crafted requests, if the service is enabled. The success of the attack depends on the ability to bypass the stack protection mechanisms.

beyondmachines1 at 2026-03-11T18:01:11.941Z ##

Fortinet FortiManager vulnerability allows remote command execution

Fortinet has patched a high-severity stack-based buffer overflow in FortiManager (CVE-2025-54820) that allows remote unauthenticated attackers to execute unauthorized commands by sending crafted requests to the fgtupdates service.

**If you are using Fortinet FortiManager, plan a quick patch. In the interim, make sure the HTTP/HTTPS interface is isolated from the internet or disable fgtupdates in the system interface settings to close the attack vector.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-03-11T18:01:11.000Z ##

Fortinet FortiManager vulnerability allows remote command execution

Fortinet has patched a high-severity stack-based buffer overflow in FortiManager (CVE-2025-54820) that allows remote unauthenticated attackers to execute unauthorized commands by sending crafted requests to the fgtupdates service.

**If you are using Fortinet FortiManager, plan a quick patch. In the interim, make sure the HTTP/HTTPS interface is isolated from the internet or disable fgtupdates in the system interface settings to close the attack vector.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24291
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-10T18:31:25

1 posts

Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to elevate privileges locally.

Mozilla@activitypub.awakari.com at 2026-03-11T00:32:51.000Z ## Microsoft Patch Tuesday, March 2026 Edition Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressi...

#Security #Bloggers #Network #Adam #Barnett #adobe #Ben #McCarthy #CVE-2026-21262 #CVE-2026-24289 #CVE-2026-24291

Origin | Interest | Match ##

CVE-2026-21262
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-10T18:31:25

1 posts

Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.

Mozilla@activitypub.awakari.com at 2026-03-11T00:32:51.000Z ## Microsoft Patch Tuesday, March 2026 Edition Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressi...

#Security #Bloggers #Network #Adam #Barnett #adobe #Ben #McCarthy #CVE-2026-21262 #CVE-2026-24289 #CVE-2026-24291

Origin | Interest | Match ##

CVE-2026-2364
(7.3 HIGH)

EPSS: 0.01%

updated 2026-03-10T18:31:24

2 posts

If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low privileged local attacker can gain elevated rights due to a TOCTOU vulnerability in the CODESYS installer.

offseq@infosec.exchange at 2026-03-10T09:00:28.000Z ##

🚩 CVE-2026-2364: HIGH severity TOCTOU flaw in CODESYS Installer (all versions) lets local attackers escalate privileges via user-initiated updates. Restrict access & monitor until patch. No active exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #CODESYS #ICS #Vuln

##

certvde@infosec.exchange at 2026-03-10T07:44:02.000Z ##

#OT #Advisory VDE-2026-012
CODESYS Installer - Possible Privilege Escalation

Exploitation of this vulnerability can lead to a privilege escalation on the host system.
#CVE CVE-2026-2364

certvde.com/en/advisories/vde-

#CSAF codesys.csaf-tp.certvde.com/.w

##

CVE-2026-1508
(4.3 MEDIUM)

EPSS: 0.01%

updated 2026-03-10T18:31:24

1 posts

The Court Reservation WordPress plugin before 1.10.9 does not have CSRF check in place when deleting events, which could allow attackers to make a logged in admin delete them via a CSRF attack

offseq@infosec.exchange at 2026-03-10T07:30:26.000Z ##

🔒 CVE-2026-1508 (HIGH): Court Reservation WordPress plugin <1.10.9 has a CSRF flaw — admins can be tricked into deleting events via crafted requests. No live exploits yet. Update ASAP or add nonce checks! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CSRF #Infosec

##

CVE-2025-41711
(5.3 MEDIUM)

EPSS: 0.02%

updated 2026-03-10T18:31:24

2 posts

An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.

certvde@infosec.exchange at 2026-03-10T07:24:46.000Z ##

#OT #Advisory VDE-2025-096
Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230

An unauthenticated remote attacker can exploit several vulnerabilities in Weidmueller devices Energy Meter 750-24 and Energy Meter 750-230 to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711
#oCSAF
certvde.com/en/advisories/vde-

#CSAF weidmueller.csaf-tp.certvde.co

##

certvde@infosec.exchange at 2026-03-10T07:23:00.000Z ##

#OT #Advisory VDE-2025-079
Janitza: Multiple vulnerabilities in UMG 96RM-E

An unauthenticated remote attacker can exploit several vulnerabilities in Janitza UMG 96RM-E devices to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711

certvde.com/en/advisories/vde-
#oCSAF
#CSAF janitza.csaf-tp.certvde.com/.w

##

CVE-2025-41712
(6.5 MEDIUM)

EPSS: 0.03%

updated 2026-03-10T18:31:24

2 posts

An unauthenticated remote attacker who tricks a user to upload a manipulated HTML file can get access to sensitive information on the device. This is a result of incorrect permission assignment for the web server.

certvde@infosec.exchange at 2026-03-10T07:24:46.000Z ##

#OT #Advisory VDE-2025-096
Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230

An unauthenticated remote attacker can exploit several vulnerabilities in Weidmueller devices Energy Meter 750-24 and Energy Meter 750-230 to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711
#oCSAF
certvde.com/en/advisories/vde-

#CSAF weidmueller.csaf-tp.certvde.co

##

certvde@infosec.exchange at 2026-03-10T07:23:00.000Z ##

#OT #Advisory VDE-2025-079
Janitza: Multiple vulnerabilities in UMG 96RM-E

An unauthenticated remote attacker can exploit several vulnerabilities in Janitza UMG 96RM-E devices to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711

certvde.com/en/advisories/vde-
#oCSAF
#CSAF janitza.csaf-tp.certvde.com/.w

##

CVE-2025-41710
(6.5 MEDIUM)

EPSS: 0.03%

updated 2026-03-10T18:31:24

2 posts

An unauthenticated remote attacker may use hardcodes credentials to get access to the previously activated FTP Server with limited read and write privileges.

certvde@infosec.exchange at 2026-03-10T07:24:46.000Z ##

#OT #Advisory VDE-2025-096
Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230

An unauthenticated remote attacker can exploit several vulnerabilities in Weidmueller devices Energy Meter 750-24 and Energy Meter 750-230 to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711
#oCSAF
certvde.com/en/advisories/vde-

#CSAF weidmueller.csaf-tp.certvde.co

##

certvde@infosec.exchange at 2026-03-10T07:23:00.000Z ##

#OT #Advisory VDE-2025-079
Janitza: Multiple vulnerabilities in UMG 96RM-E

An unauthenticated remote attacker can exploit several vulnerabilities in Janitza UMG 96RM-E devices to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711

certvde.com/en/advisories/vde-
#oCSAF
#CSAF janitza.csaf-tp.certvde.com/.w

##

CVE-2026-0953
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-10T18:31:24

1 posts

The Tutor LMS Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.9.5 via the Social Login addon. This is due to the plugin failing to verify that the email provided in the authentication request matches the email from the validated OAuth token. This makes it possible for unauthenticated attackers to log in as any existing user, including adminis

offseq@infosec.exchange at 2026-03-10T06:02:26.000Z ##

🚨 CRITICAL: CVE-2026-0953 impacts all versions of themeum Tutor LMS Pro for WordPress. Flawed Social Login lets attackers bypass authentication using valid OAuth tokens + victim’s email. Admin accounts at risk. Patch or restrict access! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec

##

CVE-2026-27685
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-10T18:31:24

1 posts

SAP NetWeaver Enterprise Portal Administration is vulnerable if a privileged user uploads untrusted or malicious content that, upon deserialization, could result in a high impact on the confidentiality, integrity, and availability of the host system.

offseq@infosec.exchange at 2026-03-10T01:30:28.000Z ##

🚨 CRITICAL: CVE-2026-27685 in SAP NetWeaver EP-RUNTIME 7.50 (Admin) enables privileged users to upload malicious serialized data — risking full system compromise. Restrict uploads, monitor privileged actions, patch ASAP! radar.offseq.com/threat/cve-20 #OffSeq #SAP #CVE #InfoSec

##

CVE-2026-1603
(8.6 HIGH)

EPSS: 43.88%

updated 2026-03-10T15:31:30

5 posts

An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data.

Nuclei template

thecybermind@infosec.exchange at 2026-03-11T11:39:10.000Z ##

CISA flips the switch: Ivanti EPM (CVE-2026-1603) is under active exploit. A low-complexity XSS allows total authentication bypass with zero user interaction. If your EPM is internet-facing, the "Master Key" is compromised. Get the Strategic Arsenal now. #CyberSecurity #Ivanti #KEV

thecybermind.co/2026/03/11/dec

##

beyondmachines1@infosec.exchange at 2026-03-11T10:01:11.000Z ##

CISA Warns of Active Exploitation in Ivanti Endpoint Manager Authentication Bypass

CISA added an Ivanti Endpoint Manager authentication bypass vulnerability (CVE-2026-1603) to its catalog of known exploited flaws after reports of active use by threat actors.

**If you use Ivanti Endpoint Manager, now patching is urgent. Update to 2024 SU5 immediately because attackers are already using this flaw to take over management servers.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-03-09T22:00:20.000Z ##

🚨 [CISA-2026:0309] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22054 (secdb.nttzen.cloud/cve/detail/)
- Name: Omnissa Workspace ONE Server-Side Request Forgery
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Omnissa
- Product: Workspace One UEM
- Notes: web.archive.org/web/2021122215 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-26399 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: solarwinds.com/trust-center/se ; documentation.solarwinds.com/e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-1603 (secdb.nttzen.cloud/cve/detail/)
- Name: Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager (EPM)
- Notes: hub.ivanti.com/s/article/Secur ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260309 #cisa20260309 #cve_2021_22054 #cve_2025_26399 #cve_2026_1603 #cve202122054 #cve202526399 #cve20261603

##

cisakevtracker@mastodon.social at 2026-03-09T20:01:27.000Z ##

CVE ID: CVE-2026-1603
Vendor: Ivanti
Product: Endpoint Manager (EPM)
Date Added: 2026-03-09
Notes: hub.ivanti.com/s/article/Secur ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-09T19:16:13.000Z ##

CISA has updated the KEV catalogue cisa.gov/news-events/alerts/20

- CVE-2021-22054: Omnissa Workspace ONE Server-Side Request Forgery

- CVE-2025-26399 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

- CVE-2026-1603 Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability #CISA #infosec #vulnerability

##

CVE-2026-27005
(9.8 CRITICAL)

EPSS: 0.12%

updated 2026-03-10T14:04:01.353000

1 posts

Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.3, an unauthenticated attacker can inject arbitrary SQL into queries executed against databases connected to Chartbrew (MySQL, PostgreSQL). This allows reading, modifying, or deleting data in those databases depending on the database user's privileges.

thehackerwire@mastodon.social at 2026-03-10T15:00:13.000Z ##

🔴 CVE-2026-27005 - Critical (9.8)

Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.3, an unauthenticated attacker can inject arbitrary SQL into queries executed against databases con...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70238
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-09T21:32:45

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard52.

thehackerwire@mastodon.social at 2026-03-09T20:43:56.000Z ##

🟠 CVE-2025-70238 - High (7.5)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard52.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3638
(5.9 MEDIUM)

EPSS: 0.03%

updated 2026-03-09T21:31:49

1 posts

Improper access control in user and role restore API endpoints in Devolutions Server 2025.3.11.0 and earlier allows a low-privileged authenticated user to restore deleted users and roles via crafted API requests.

offseq@infosec.exchange at 2026-03-09T19:30:12.000Z ##

CVE-2026-3638 (HIGH): Devolutions Server ≤ 2025.3.11.0 has missing authorization in restore APIs — low-priv users can reinstate deleted accounts, risking privilege escalation. Restrict API access & monitor logs! radar.offseq.com/threat/cve-20 #OffSeq #Devolutions #AppSec

##

CVE-2025-26399
(9.8 CRITICAL)

EPSS: 23.31%

updated 2026-03-09T21:31:33

5 posts

SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.

1 repos

https://github.com/rxerium/CVE-2025-26399

beyondmachines1@infosec.exchange at 2026-03-11T09:01:11.000Z ##

CISA Mandates Emergency Patching for SolarWinds Web Help Desk Vulnerabilities

CISA has shortened the patch deadline for an actively exploited critical SolarWinds Web Help Desk vulnerabilities, including CVE-2025-26399.

**When a federal agency shortens a patch deadline to just a few days, it means the product is actively and successfuly hacked. Treat your SolarWinds as an immediate priority, patch and ideally if possible isolate your help desk software from the public internet.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

oversecurity@mastodon.social at 2026-03-10T14:10:35.000Z ##

CISA shortens patch deadline for critical Ivanti, SolarWinds bugs

The Cybersecurity and Infrastructure Security Agency (CISA) gave all federal civilian agencies until Thursday to patch CVE-2025-26399 — a critical...

🔗️ [Therecord] link.is.it/pp8jNp

##

secdb@infosec.exchange at 2026-03-09T22:00:20.000Z ##

🚨 [CISA-2026:0309] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22054 (secdb.nttzen.cloud/cve/detail/)
- Name: Omnissa Workspace ONE Server-Side Request Forgery
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Omnissa
- Product: Workspace One UEM
- Notes: web.archive.org/web/2021122215 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-26399 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: solarwinds.com/trust-center/se ; documentation.solarwinds.com/e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-1603 (secdb.nttzen.cloud/cve/detail/)
- Name: Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager (EPM)
- Notes: hub.ivanti.com/s/article/Secur ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260309 #cisa20260309 #cve_2021_22054 #cve_2025_26399 #cve_2026_1603 #cve202122054 #cve202526399 #cve20261603

##

cisakevtracker@mastodon.social at 2026-03-09T20:01:11.000Z ##

CVE ID: CVE-2025-26399
Vendor: SolarWinds
Product: Web Help Desk
Date Added: 2026-03-09
Notes: solarwinds.com/trust-center/se ; documentation.solarwinds.com/e ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-09T19:16:13.000Z ##

CISA has updated the KEV catalogue cisa.gov/news-events/alerts/20

- CVE-2021-22054: Omnissa Workspace ONE Server-Side Request Forgery

- CVE-2025-26399 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

- CVE-2026-1603 Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability #CISA #infosec #vulnerability

##

CVE-2021-22054
(7.5 HIGH)

EPSS: 93.79%

updated 2026-03-09T21:31:33

3 posts

VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain an SSRF vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.

Nuclei template

1 repos

https://github.com/MKSx/CVE-2021-22054

secdb@infosec.exchange at 2026-03-09T22:00:20.000Z ##

🚨 [CISA-2026:0309] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22054 (secdb.nttzen.cloud/cve/detail/)
- Name: Omnissa Workspace ONE Server-Side Request Forgery
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Omnissa
- Product: Workspace One UEM
- Notes: web.archive.org/web/2021122215 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-26399 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: solarwinds.com/trust-center/se ; documentation.solarwinds.com/e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-1603 (secdb.nttzen.cloud/cve/detail/)
- Name: Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager (EPM)
- Notes: hub.ivanti.com/s/article/Secur ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260309 #cisa20260309 #cve_2021_22054 #cve_2025_26399 #cve_2026_1603 #cve202122054 #cve202526399 #cve20261603

##

cisakevtracker@mastodon.social at 2026-03-09T20:00:56.000Z ##

CVE ID: CVE-2021-22054
Vendor: Omnissa
Product: Workspace One UEM
Date Added: 2026-03-09
Notes: web.archive.org/web/2021122215 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-09T19:16:13.000Z ##

CISA has updated the KEV catalogue cisa.gov/news-events/alerts/20

- CVE-2021-22054: Omnissa Workspace ONE Server-Side Request Forgery

- CVE-2025-26399 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

- CVE-2026-1603 Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability #CISA #infosec #vulnerability

##

CVE-2026-28802
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-09T21:20:56.980000

1 posts

Authlib is a Python library which builds OAuth and OpenID Connect servers. From version 1.6.5 to before version 1.6.7, previous tests involving passing a malicious JWT containing alg: none and an empty signature was passing the signature verification step without any changes to the application code when a failure was expected.. This issue has been patched in version 1.6.7.

thehackerwire@mastodon.social at 2026-03-09T21:25:39.000Z ##

🔴 CVE-2026-28802 - Critical (9.8)

Authlib is a Python library which builds OAuth and OpenID Connect servers. From version 1.6.5 to before version 1.6.7, previous tests involving passing a malicious JWT containing alg: none and an empty signature was passing the signature verificat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70363
(7.5 HIGH)

EPSS: 0.05%

updated 2026-03-09T19:16:00.890000

1 posts

Incorrect access control in the REST API of Ibexa & Ciril GROUP eZ Platform / Ciril Platform 2.x allows unauthenticated attackers to access sensitive data via enumerating object IDs.

thehackerwire@mastodon.social at 2026-03-09T19:40:09.000Z ##

🟠 CVE-2025-70363 - High (7.5)

Incorrect access control in the REST API of Ibexa & Ciril GROUP eZ Platform / Ciril Platform 2.x allows unauthenticated attackers to access sensitive data via enumerating object IDs.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3038
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-09T18:32:49

1 posts

The rtsock_msg_buffer() function serializes routing information into a buffer. As a part of this, it copies sockaddr structures into a sockaddr_storage structure on the stack. It assumes that the source sockaddr length field had already been validated, but this is not necessarily the case, and it's possible for a malicious userspace program to craft a request which triggers a 127-byte overflow.

thehackerwire@mastodon.social at 2026-03-09T17:32:35.000Z ##

🟠 CVE-2026-3038 - High (7.5)

The rtsock_msg_buffer() function serializes routing information into a buffer. As a part of this, it copies sockaddr structures into a sockaddr_storage structure on the stack. It assumes that the source sockaddr length field had already been val...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3588
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-09T18:31:50

1 posts

A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 allows an attacker to exfiltrate private keys by sending a crafted request.

thehackerwire@mastodon.social at 2026-03-09T16:38:10.000Z ##

🟠 CVE-2026-3588 - High (7.5)

A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 allows an attacker to exfiltrate private keys by sending a crafted request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70047
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-09T18:31:49

1 posts

An issue pertaining to CWE-400: Uncontrolled Resource Consumption was discovered in Nexusoft NexusInterface v3.2.0-beta.2.

thehackerwire@mastodon.social at 2026-03-09T17:32:25.000Z ##

🟠 CVE-2025-70047 - High (7.5)

An issue pertaining to CWE-400: Uncontrolled Resource Consumption was discovered in Nexusoft NexusInterface v3.2.0-beta.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25866
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-09T18:31:49

1 posts

MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search path behavior by placing a malicious executable earlier in the search order, resulting in arbitrary code execution in the context of the affected user.

thehackerwire@mastodon.social at 2026-03-09T16:38:20.000Z ##

🟠 CVE-2026-25866 - High (7.8)

MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30863(CVSS UNKNOWN)

EPSS: 0.07%

updated 2026-03-09T17:42:26

1 posts

### Impact The Google, Apple, and Facebook authentication adapters use JWT verification to validate identity tokens. When the adapter's audience configuration option is not set (`clientId` for Google/Apple, `appIds` for Facebook), JWT verification silently skips audience claim validation. This allows an attacker to use a validly signed JWT issued for a different application to authenticate as any

1 repos

https://github.com/Worthes/CVE-2026-30863-Exploit

thehackerwire@mastodon.social at 2026-03-10T17:16:47.000Z ##

🔴 CVE-2026-30863 - Critical (9.8)

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.10 and 9.5.0-alpha.11, the Google, Apple, and Facebook authentication adapters use JWT verification to validate identity ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29191
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-03-09T15:48:28

1 posts

### Summary A vulnerability was discovered in Zitadel's login V2 interface that allowed a possible account takeover. ### Impact Zitadel exposes an HTTP endpoint named /saml-post. This endpoint is used for handling requests to SAML IdPs and accepts two HTTP GET parameters: url and id. When these parameters are supplied, users’ browsers auto-submit an HTTP POST request to the provided url paramet

beyondmachines1@infosec.exchange at 2026-03-10T11:01:11.000Z ##

Critical 1-Click Account Takeover Vulnerability Patched in ZITADEL IAM Platform

ZITADEL patched a critical XSS vulnerability (CVE-2026-29191) that allows unauthenticated attackers to take over user accounts via a single-click malicious link. The flaw can lead to unauthorized password resets.

**If you are using ZITADEL, this is important. Plan a very quick update to version 4.12.0 because your users will be hacked, the full exploit instruction is already public. If you cannot patch today, block the /saml-post endpoint at your firewall and ensure MFA is active for all users.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-2919
(4.3 MEDIUM)

EPSS: 0.01%

updated 2026-03-09T15:30:48

1 posts

Malicious scripts could display attacker-controlled web content under spoofed domains in Focus for iOS by stalling a _self navigation to an invalid port and triggering an iframe redirect, causing the UI to display a trusted domain without user interaction. This vulnerability affects Focus for iOS < 148.2.

0x3e4@cyberplace.social at 2026-03-09T18:35:38.000Z ##

Mozilla Firefox Focus for iOS.. interesting version jump from 143.0 to 148.2 today

current release fixes CVE-2026-2919

Malicious scripts could display attacker-controlled web content under spoofed domains in Focus for iOS by stalling a _self navigation to an invalid port and triggering an iframe redirect, causing the UI to display a trusted domain without user interaction. This vulnerability affects Focus for iOS < 148.2.

mozilla.org/en-US/security/adv
hecate.pw/vulnerability/CVE-20

##

CVE-2026-2219
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-09T15:30:43

1 posts

It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).

thehackerwire@mastodon.social at 2026-03-09T16:45:11.000Z ##

🟠 CVE-2026-2219 - High (7.5)

It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite lo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27944
(9.8 CRITICAL)

EPSS: 1.03%

updated 2026-03-05T22:37:22

1 posts

## Summary The `/api/backup` endpoint is accessible without authentication and discloses the encryption keys required to decrypt the backup in the `X-Backup-Security` response header. This allows an unauthenticated attacker to download a full system backup containing sensitive data (user credentials, session tokens, SSL private keys, Nginx configurations) and decrypt it immediately. ## Vulnerabi

Nuclei template

3 repos

https://github.com/weefunker/CVE-2026-27944-Lab

https://github.com/NULL200OK/CVE-2026-27944

https://github.com/NULL200OK/-nginxui_discover

CVE-2026-25921
(9.3 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T22:28:33

1 posts

### Summary Overwritable LFS object across different repos leads to supply-chain attack, all LFS objects are vulnerable to be maliciously overwritten by malicious attackers. ### Details Gogs store all LFS objects in the same place, no isolation between different repositories. (repo id not concatenated to storage path) https://github.com/gogs/gogs/blob/7a2dffa95ac64f31c8322cb50d32694b05610144/inte

beyondmachines1@infosec.exchange at 2026-03-10T16:01:11.000Z ##

Critical Gogs Vulnerability Enables Silent Supply-Chain Attacks via LFS Overwrites

Gogs patched a critical vulnerability (CVE-2026-25921) that allows unauthenticated attackers to overwrite Git Large File Storage (LFS) objects across repositories, enabling silent supply-chain attacks.

**If you are using Gogs, this is important, and if you have public access or registration to Gogs, it's urgent. Attackers can exploit this flaw to inject their malicious versions of binaries. You should not only update to version 0.14.2 ASAP and verify the integrity of your existing large files to ensure they haven't been replaced with malicious versions.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-21385
(7.8 HIGH)

EPSS: 0.38%

updated 2026-03-03T21:31:13

2 posts

Memory corruption while using alignments for memory allocation.

1 repos

https://github.com/automate-it0/qualcomm-vulnerability-scanner

hackmag@infosec.exchange at 2026-03-10T08:00:03.000Z ##

⚪️ Android patches 0‑day vulnerability linked to Qualcomm components

🗨️ Google experts have released the March security updates for Android, fixing a total of 129 vulnerabilities. Among them is a 0‑day issue in a Qualcomm component that is already being used in real-world attacks. The vulnerability has been assigned the…

🔗 hackmag.com/news/cve-2026-2138

#news

##

youranonnewsirc@nerdculture.de at 2026-03-09T20:29:19.000Z ##

Latest Geopolitical, Technology, and Cybersecurity Update (March 6-7, 2026):

Russia is reportedly sharing intelligence with Iran to target US forces in the Middle East, escalating tensions. Cybersecurity faces critical threats as a Cisco SD-WAN flaw (CVE-2026-20127) has been exploited since 2023, and a Qualcomm zero-day (CVE-2026-21385) affects 234 chipsets. Meanwhile, rapid AI advancements are intensifying regulatory debates globally.

#Cybersecurity #Geopolitics #TechNews

##

CVE-2026-27611
(6.5 MEDIUM)

EPSS: 0.03%

updated 2026-02-27T19:12:25.640000

4 posts

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to versions 1.1.3-stable and 1.2.6-beta, when users share password-protected files, the recipient can completely bypass the password and still download the file. This happens because the API returns a direct download link in the details of the share, which is accessible to anyone with JUST THE SHARE LINK, even without the pa

thehackerwire@mastodon.social at 2026-03-10T19:17:55.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:16:04.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:01:49.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:44:44.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27739(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-02-25T22:42:37

1 posts

A [Server-Side Request Forgery (SSRF)](https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/SSRF) vulnerability has been identified in the Angular SSR request handling pipeline. The vulnerability exists because Angular’s internal URL reconstruction logic directly trusts and consumes user-controlled HTTP headers specifically the Host and `X-Forwarded-*` family to determine the application'

1 repos

https://github.com/bankerke/-CVE-2026-27739-poc

beyondmachines1@infosec.exchange at 2026-03-09T20:01:10.000Z ##

Critical SSRF Vulnerability Patched in Angular Server-Side Rendering

Angular patched a critical SSRF vulnerability (CVE-2026-27739) in its SSR framework that allows attackers to redirect server-side requests to malicious or internal destinations by manipulating HTTP headers.

**If you are using Angular, this is important and urgent. Check your package.json for the possibly risky versions of the libraries, and either patch or sanitize the headers. Always validate incoming headers against a strict allowlist and avoid using client-provided data to build internal request URLs.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-20127
(10.0 CRITICAL)

EPSS: 2.60%

updated 2026-02-25T18:31:45

2 posts

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not

6 repos

https://github.com/zerozenxlabs/CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE

https://github.com/abrahamsurf/sdwan-scanner-CVE-2026-20127

https://github.com/leemuun/CVE-2026-20127

https://github.com/sfewer-r7/CVE-2026-20127

https://github.com/BugFor-Pings/CVE-2026-20127_EXP

https://github.com/yonathanpy/CVE-2026-20127-Cisco-SD-WAN-Preauth-RCE

jbhall56@infosec.exchange at 2026-03-10T13:03:22.000Z ##

WatchTowr reports seeing exploitation attempts for CVE-2026-20127 from numerous unique IP addresses. securityweek.com/recent-cisco-

##

youranonnewsirc@nerdculture.de at 2026-03-09T20:29:19.000Z ##

Latest Geopolitical, Technology, and Cybersecurity Update (March 6-7, 2026):

Russia is reportedly sharing intelligence with Iran to target US forces in the Middle East, escalating tensions. Cybersecurity faces critical threats as a Cisco SD-WAN flaw (CVE-2026-20127) has been exploited since 2023, and a Qualcomm zero-day (CVE-2026-21385) affects 234 chipsets. Meanwhile, rapid AI advancements are intensifying regulatory debates globally.

#Cybersecurity #Geopolitics #TechNews

##

bdking71@mastodon.social at 2026-03-10T11:33:09.000Z ##

Microsoft turned Notepad into a "smart" AI assistant and accidentally handed hackers a "one-click" execution engine. Here is the technical breakdown of CVE-2026-20841 and why feature creep is killing your security. 🛑💻

#CyberSecurity #Windows11 #Infosec

bdking71.wordpress.com/2026/03

##

CVE-2026-2138
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-10T19:28:57.427000

1 posts

A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the function sub_42D03C of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. The attack can be launched remotely. The exploit has been made public and could be used.

hackmag@infosec.exchange at 2026-03-10T08:00:03.000Z ##

⚪️ Android patches 0‑day vulnerability linked to Qualcomm components

🗨️ Google experts have released the March security updates for Android, fixing a total of 129 vulnerabilities. Among them is a 0‑day issue in a Qualcomm component that is already being used in real-world attacks. The vulnerability has been assigned the…

🔗 hackmag.com/news/cve-2026-2138

#news

##

CVE-2026-24307
(9.3 CRITICAL)

EPSS: 0.15%

updated 2026-01-23T00:31:24

2 posts

Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.

_r_netsec at 2026-03-11T14:13:05.417Z ##

Common architectural pattern across four Q1 2026 AI assistant vulnerabilities (CVE-2026-26144, CVE-2026-0628, CVE-2026-24307, PleaseFix) blog.barrack.ai/ai-copilot-att

##

_r_netsec@infosec.exchange at 2026-03-11T14:13:05.000Z ##

Common architectural pattern across four Q1 2026 AI assistant vulnerabilities (CVE-2026-26144, CVE-2026-0628, CVE-2026-24307, PleaseFix) blog.barrack.ai/ai-copilot-att

##

CVE-2025-13154
(5.5 MEDIUM)

EPSS: 0.02%

updated 2026-01-15T00:31:44

1 posts

An improper link following vulnerability was reported in the SmartPerformanceAddin for Lenovo Vantage that could allow an authenticated local user to perform an arbitrary file deletion with elevated privileges.

rtfmkiesel@infosec.exchange at 2026-03-11T10:54:29.000Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

CVE-2025-66005
(0 None)

EPSS: 0.02%

updated 2026-01-14T16:25:12.057000

1 posts

Lack of authorization of the InputManager D-Bus interface in InputPlumber versions before v0.63.0 can lead to local Denial-of-Service, information leak or even privilege escalation in the context of the currently active user session.

GamingNews@meta.masto.host at 2026-03-09T23:25:43.000Z ##

Steam Deck just posted:

SteamOS 3.7.20

SteamOS 3.7.20 has just been released for all users with the following changes previously in Beta:GeneralAdded ntsync driverNon-DeckEnabled polkit for the InputPlumber dbus interface and resolved a potential race condition for the InputPlumber interface, addressing CVE-2025-66005 and CVE-2025-14338

store.steampowered.com/news/ap

#gamingNews #SteamDeck

##

CVE-2025-14338(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-01-14T12:31:48

1 posts

Polkit authentication dis isabled by default and a race condition in the Polkit authorization check in versions before v0.69.0 can lead to the same issues as in CVE-2025-66005.

GamingNews@meta.masto.host at 2026-03-09T23:25:43.000Z ##

Steam Deck just posted:

SteamOS 3.7.20

SteamOS 3.7.20 has just been released for all users with the following changes previously in Beta:GeneralAdded ntsync driverNon-DeckEnabled polkit for the InputPlumber dbus interface and resolved a potential race condition for the InputPlumber interface, addressing CVE-2025-66005 and CVE-2025-14338

store.steampowered.com/news/ap

#gamingNews #SteamDeck

##

CVE-2026-0628
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-12T16:48:33.560000

2 posts

Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High)

2 repos

https://github.com/sastraadiwiguna-purpleeliteteaming/Dissecting-CVE-2026-0628-Chromium-Extension-Privilege-Escalation

https://github.com/fevar54/CVE-2026-0628-POC

_r_netsec at 2026-03-11T14:13:05.417Z ##

Common architectural pattern across four Q1 2026 AI assistant vulnerabilities (CVE-2026-26144, CVE-2026-0628, CVE-2026-24307, PleaseFix) blog.barrack.ai/ai-copilot-att

##

_r_netsec@infosec.exchange at 2026-03-11T14:13:05.000Z ##

Common architectural pattern across four Q1 2026 AI assistant vulnerabilities (CVE-2026-26144, CVE-2026-0628, CVE-2026-24307, PleaseFix) blog.barrack.ai/ai-copilot-att

##

CVE-2025-11126
(9.8 CRITICAL)

EPSS: 0.18%

updated 2025-09-29T00:30:35

2 posts

A security flaw has been discovered in Apeman ID71 218.53.203.117. This vulnerability affects unknown code of the file /system/www/system.ini. The manipulation results in hard-coded credentials. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

beyondmachines1 at 2026-03-11T14:01:12.170Z ##

Critical Vulnerabilities in Apeman ID71 Cameras Allow Remote Takeover

CISA warned of three vulnerabilities in Apeman ID71 cameras, including a critical credential exposure (CVE-2025-11126), that allow remote attackers to take full control of devices and view private feeds.

**If you are using Apeman ID71, this is urgent - there's a PoC exploit already available so hackers are probably already looking for these devices. Isolate these cameras from the internet immediately and use a VPN for any necessary remote access. Because the vendor is not providing patches, you should consider replacing these devices with a more secure, supported brand.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-03-11T14:01:12.000Z ##

Critical Vulnerabilities in Apeman ID71 Cameras Allow Remote Takeover

CISA warned of three vulnerabilities in Apeman ID71 cameras, including a critical credential exposure (CVE-2025-11126), that allow remote attackers to take full control of devices and view private feeds.

**If you are using Apeman ID71, this is urgent - there's a PoC exploit already available so hackers are probably already looking for these devices. Isolate these cameras from the internet immediately and use a VPN for any necessary remote access. Because the vendor is not providing patches, you should consider replacing these devices with a more secure, supported brand.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-0037
(6.6 MEDIUM)

EPSS: 0.03%

updated 2025-06-10T00:30:36

1 posts

In AMD Versal Adaptive SoC devices, the lack of address validation when executing PLM runtime services through the PLM firmware can allow access to isolated or protected memory spaces, resulting in the loss of integrity and confidentiality.

AAKL@infosec.exchange at 2026-03-10T16:05:40.000Z ##

Medium-severity advisory from AMD:

CVE-2025-0037: Versal Adaptive SoC – Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

A long list of advisories from Adobe: helpx.adobe.com/security/secur

Dell patches for multiple vulnerabilities:

Security Update for Dell Connectrix B-Series SANnav Vulnerabilities dell.com/support/kbdoc/en-us/0

Security Update for Dell Connectrix B-Series FOS and SANnav Vulnerabilities dell.com/support/kbdoc/en-us/0

Security Update for Dell Avamar Data Store Gen5A Multiple Third-Party Component Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell
#infosec #vulnerability #AMD #Adobe

##

CVE-2022-25860
(9.8 CRITICAL)

EPSS: 41.35%

updated 2025-04-01T23:03:12

1 posts

Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of CVE-2022-25912.

thehackerwire@mastodon.social at 2026-03-10T19:30:22.000Z ##

🔴 CVE-2026-28292 - Critical (9.8)

`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2022-25912
(8.1 HIGH)

EPSS: 43.30%

updated 2023-08-17T05:02:31

1 posts

The package simple-git before 3.15.0 is vulnerable to Remote Code Execution (RCE) when enabling the `ext` transport protocol, which makes it exploitable via `clone()` method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306).

thehackerwire@mastodon.social at 2026-03-10T19:30:22.000Z ##

🔴 CVE-2026-28292 - Critical (9.8)

`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0866
(0 None)

EPSS: 0.00%

4 posts

N/A

threatcodex at 2026-03-11T19:22:09.364Z ##

Analyzing "Zombie Zip" Files (CVE-2026-0866)

isc.sans.edu/diary/rss/32786

##

threatcodex@infosec.exchange at 2026-03-11T19:22:09.000Z ##

Analyzing "Zombie Zip" Files (CVE-2026-0866)
#CVE_2026_0866
isc.sans.edu/diary/rss/32786

##

sans_isc@infosec.exchange at 2026-03-11T10:01:45.000Z ##

Analyzing "Zombie Zip" (CVE-2026-0866) isc.sans.edu/diary/32786

##

decio@infosec.exchange at 2026-03-11T09:36:00.000Z ##

[ #VULN ] "Zombie ZIP : cette technique d'évasion rend aveugles les antivirus"
CVE-2026-0866
⬇️
"Découverte par Chris Aziz, chercheur en sécurité chez Bombadil Systems, la technique Zombie ZIP abuse de la confiance accordée aux moteurs d'analyse à l'en-tête des fichiers ZIP. En effet, cette attaque consiste à manipuler l'en-tête du fichier ZIP de façon à altérer le champ déterminant la méthode de compression au sein de l'archive.

La technique Zombie ZIP consiste à indiquer que les données sont stockées sans aucune compression (méthode STORED ou Method=0), alors que c'est faux ! Le fichier malveillant est bel et bien compressé via l'algorithme standard DEFLATE."
👇
it-connect.fr/zombie-zip-cette

(NDR yet another) " #ZIP format confusion technique that evades 98% of #antivirus engines."
⬇️
CVE-2026-0866 | VU#976247 | Published March 10, 2026
👇
github.com/bombadil-systems/zo

💬
⬇️
infosec.pub/post/43258263

#CyberVeille #CVE_2026_0866

##

CVE-2026-31870
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-11T18:33:39.000Z ##

🟠 CVE-2026-31870 - High (7.5)

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.1, when a cpp-httplib client uses the streaming API (httplib::stream::Get, httplib::stream::Post, etc.), the library calls std::stoull() directly on th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T18:33:39.000Z ##

🟠 CVE-2026-31870 - High (7.5)

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.1, when a cpp-httplib client uses the streaming API (httplib::stream::Get, httplib::stream::Post, etc.), the library calls std::stoull() directly on th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31852
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-11T17:18:30.000Z ##

🔴 CVE-2026-31852 - Critical (10)

Jellyfin is an open-source media system. The code-quality.yml GitHub Actions workflow in jellyfin/jellyfin-ios is vulnerable to arbitrary code execution via pull requests from forked repositories. Due to the workflow's elevated permissions (nearly...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T17:18:30.000Z ##

🔴 CVE-2026-31852 - Critical (10)

Jellyfin is an open-source media system. The code-quality.yml GitHub Actions workflow in jellyfin/jellyfin-ios is vulnerable to arbitrary code execution via pull requests from forked repositories. Due to the workflow's elevated permissions (nearly...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21888
(0 None)

EPSS: 0.00%

4 posts

N/A

thehackerwire@mastodon.social at 2026-03-11T16:30:28.000Z ##

🟠 CVE-2026-21888 - High (7.5)

NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. MQTT v5 Variable Byte Integer parsing out-of-bounds: get_var_integer() accepts 5-byte varints without bounds checks; reliably triggers OOB read / crash when built with ASan. Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:18:49.000Z ##

🟠 CVE-2026-21888 - High (7.5)

NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. MQTT v5 Variable Byte Integer parsing out-of-bounds: get_var_integer() accepts 5-byte varints without bounds checks; reliably triggers OOB read / crash when built with ASan. Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:30:28.000Z ##

🟠 CVE-2026-21888 - High (7.5)

NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. MQTT v5 Variable Byte Integer parsing out-of-bounds: get_var_integer() accepts 5-byte varints without bounds checks; reliably triggers OOB read / crash when built with ASan. Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:18:49.000Z ##

🟠 CVE-2026-21888 - High (7.5)

NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. MQTT v5 Variable Byte Integer parsing out-of-bounds: get_var_integer() accepts 5-byte varints without bounds checks; reliably triggers OOB read / crash when built with ASan. Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3611
(0 None)

EPSS: 0.00%

1 posts

N/A

beyondmachines1@infosec.exchange at 2026-03-11T12:01:26.000Z ##

Critical Authentication Bypass in Honeywell IQ4x BMS Controllers Allows Remote Takeover

Honeywell IQ4x BMS controllers contain a maximum severity critical vulnerability (CVE-2026-3611) that allows unauthenticated attackers to create administrative accounts and take full control of building management systems.

**If you are using Honeywell IQ4x Building Management System (or any BMS), make sure it's isolated from the internet and accessible only from trusted networks. Then reach out to Honeywell for updates. Don't wait to isolate your systems. This is maximum severity flaw, and it will be exploited very soon.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-28806
(0 None)

EPSS: 0.04%

1 posts

N/A

offseq@infosec.exchange at 2026-03-11T00:00:41.000Z ##

🚨 CRITICAL: CVE-2026-28806 in nerves_hub_web ≤2.3.x allows authenticated users to take over devices/orgs via improper authorization. Upgrade to 2.4.0+ ASAP! Remote console: high risk of full compromise. radar.offseq.com/threat/cve-20 #OffSeq #nerveshub #infosec #CVE202628806

##

CVE-2026-28514
(0 None)

EPSS: 0.11%

2 posts

N/A

harrysintonen@infosec.exchange at 2026-03-10T23:10:53.000Z ##

#RocketChat has a critical authentication bypass vulnerability due to forgetting await keyword ("Users can login with any password via the EE ddp-streamer-servic" CVE-2026-28514):

github.com/RocketChat/Rocket.C

The vulnerability has been patched in RocketChat 8.0.0, 7.13.3, 7.12.4, 7.11.4, 7.10.7, 7.9.8 and 7.8.6.

These issues were discovered by an AI agent developed by the GitHub Security Lab and reviewed by GHSL team members Peter Stöckli and Man Yue Mo.

I often voice my dislike of misguided AI use. This right here is actually good use of AI.

#CVE_2026_28514 #infosec #cybersecurity

##

_r_netsec@infosec.exchange at 2026-03-09T16:28:05.000Z ##

Sign in with ANY password into Rocket.Chat EE (CVE-2026-28514) and other vulnerabilities we’ve found with our open source AI framework github.blog/security/how-to-sc

##

CVE-2026-30983
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:44:25.000Z ##

🟠 CVE-2026-30983 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow in icFixXml() (strcpy) causing stack memory corruption or crash. This vulnerability is fixed in 2.3.1.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:43:10.000Z ##

🟠 CVE-2026-30983 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow in icFixXml() (strcpy) causing stack memory corruption or crash. This vulnerability is fixed in 2.3.1.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30979
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:43:57.000Z ##

🟠 CVE-2026-30979 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow in CIccCalculatorFunc::InitSelectOp() triggered with local user interaction causing memory corrupt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30985
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:43:38.000Z ##

🟠 CVE-2026-30985 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow write in CIccMatrixMath::SetRange() causing memory corruption or crash. This vulnerability is fixe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30987
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:40:59.000Z ##

🟠 CVE-2026-30987 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow in CIccTagNum::GetValues() causing stack memory corruption or crash. This vulnerability is fixed in 2.3...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31795
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:40:49.000Z ##

🟠 CVE-2026-31795 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow write in CIccXform3DLut::Apply() corrupting stack memory or crash. This vulnerability is fixed in 2.3.1.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31796
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:21:31.000Z ##

🟠 CVE-2026-31796 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow in icCurvesFromXml() causing heap memory corruption or crash. This vulnerability is fixed in 2.3.1.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30918
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:01:28.000Z ##

🟠 CVE-2026-30918 - High (7.6)

facileManager is a modular suite of web apps built with the sysadmin in mind. Prior to 6.0.4 , a reflected XSS occurs when an application receives data from an untrusted source and uses it in its HTTP responses in a way that could lead to vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27603
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T15:00:23.000Z ##

🟠 CVE-2026-27603 - High (7.5)

Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.4, the chart filter endpoint POST /project/:project_id/chart/:chart_id/filter is missing both verif...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28693
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T08:00:21.000Z ##

🟠 CVE-2026-28693 - High (8.1)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28691
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T08:00:11.000Z ##

🟠 CVE-2026-28691 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vul...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28431
(0 None)

EPSS: 0.04%

1 posts

N/A

offseq@infosec.exchange at 2026-03-09T22:30:12.000Z ##

🚨 CVE-2026-28431 (CRITICAL, CVSS 9.2) in Misskey (8.45.0 – <2026.3.1): Improper authorization allows unauthenticated data access. Patch to 2026.3.1 now! Review access controls and monitor logs. radar.offseq.com/threat/cve-20 #OffSeq #Misskey #Vuln #InfoSec

##

CVE-2026-30240
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-09T21:18:02.000Z ##

🔴 CVE-2026-30240 - Critical (9.6)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.5 and earlier, a path traversal vulnerability in the PWA (Progressive Web App) ZIP processing endpoint (POST /api/pwa/process-zip) allows an authenti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-09T21:17:10.000Z ##

🔴 CVE-2026-30240 - Critical (9.6)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.5 and earlier, a path traversal vulnerability in the PWA (Progressive Web App) ZIP processing endpoint (POST /api/pwa/process-zip) allows an authenti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31816
(0 None)

EPSS: 0.10%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-09T21:17:52.000Z ##

🔴 CVE-2026-31816 - Critical (9.1)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.4 and earlier, the Budibase server's authorized() middleware that protects every server-side API endpoint can be completely bypassed by appending a w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-09T21:17:00.000Z ##

🔴 CVE-2026-31816 - Critical (9.1)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.4 and earlier, the Budibase server's authorized() middleware that protects every server-side API endpoint can be completely bypassed by appending a w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25737
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-09T21:17:18.000Z ##

🟠 CVE-2026-25737 - High (8.9)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.24.0 and earlier, an arbitrary file upload vulnerability exists even though file extension restrictions are configured. The restriction is enforced only...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-62166
(0 None)

EPSS: 0.08%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-09T20:22:15.000Z ##

🟠 CVE-2025-62166 - High (7.5)

FreshRSS is a free, self-hostable RSS aggregator. Prior 1.28.0, a bug in the auth logic related to master authentication tokens, this restriction is bypassed. Usually only the default user's feed should be viewable if anonymous viewing is enabled,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites