##
Updated at UTC 2026-03-27T15:45:14.002961
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-33671 | 7.5 | 0.04% | 2 | 0 | 2026-03-27T12:14:49 | ### Impact `picomatch` is vulnerable to Regular Expression Denial of Service (Re | |
| CVE-2026-27858 | 7.5 | 0.05% | 2 | 0 | 2026-03-27T09:31:30 | Attacker can send a specifically crafted message before authentication that caus | |
| CVE-2026-22738 | 9.8 | 0.07% | 2 | 0 | 2026-03-27T06:31:54 | In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a | |
| CVE-2026-1961 | 8.0 | 0.12% | 2 | 0 | 2026-03-27T00:32:23 | A flaw was found in Foreman. A remote attacker could exploit a command injection | |
| CVE-2026-34352 | 8.4 | 0.01% | 2 | 0 | 2026-03-27T00:31:32 | In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observ | |
| CVE-2026-4903 | 8.8 | 0.05% | 2 | 0 | 2026-03-27T00:31:32 | A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the f | |
| CVE-2025-12805 | 8.1 | 0.03% | 2 | 0 | 2026-03-27T00:31:32 | A flaw was found in Red Hat OpenShift AI (RHOAI) llama-stack-operator. This vuln | |
| CVE-2026-4902 | 8.8 | 0.05% | 2 | 0 | 2026-03-26T23:16:21.090000 | A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function | |
| CVE-2026-3650 | 7.5 | 0.05% | 3 | 0 | 2026-03-26T22:16:31.370000 | A memory leak exists in the Grassroots DICOM library (GDCM). The bug occurs when | |
| CVE-2026-33687 | 8.8 | 0.04% | 2 | 0 | 2026-03-26T22:16:31.203000 | Sharp is a content management framework built for Laravel as a package. Versions | |
| CVE-2026-33673 | 7.6 | 0.04% | 4 | 0 | 2026-03-26T22:16:30.553000 | PrestaShop is an open source e-commerce web application. Versions prior to 8.2.5 | |
| CVE-2026-33670 | 9.8 | 0.06% | 4 | 0 | 2026-03-26T22:16:30.050000 | SiYuan is a personal knowledge management system. Prior to version 3.6.2, the /a | |
| CVE-2026-28377 | 7.5 | 0.02% | 2 | 0 | 2026-03-26T22:16:28.460000 | A vulnerability in Grafana Tempo exposes the S3 SSE-C encryption key in plaintex | |
| CVE-2026-32522 | 8.6 | 0.05% | 2 | 0 | 2026-03-26T21:32:31 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v | |
| CVE-2025-41359 | 7.8 | 0.02% | 2 | 0 | 2026-03-26T21:31:26 | Vulnerability related to an unquoted service path in Small HTTP Server 3.06.36, | |
| CVE-2025-41368 | 8.1 | 0.02% | 2 | 0 | 2026-03-26T21:07:45.300000 | Problem in the Small HTTP Server v3.06.36 service. An authenticated path travers | |
| CVE-2026-32748 | 7.5 | 0.98% | 2 | 0 | 2026-03-26T20:43:15.687000 | Squid is a caching proxy for the Web. Prior to version 7.5, due to premature rel | |
| CVE-2026-33396 | 9.9 | 0.76% | 2 | 0 | 2026-03-26T20:40:52.840000 | OneUptime is an open-source monitoring and observability platform. Prior to vers | |
| CVE-2025-32991 | 9.0 | 0.21% | 1 | 0 | 2026-03-26T20:36:42.620000 | In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful AP | |
| CVE-2026-33631 | 8.7 | 0.01% | 2 | 0 | 2026-03-26T20:16:16.110000 | ClearanceKit intercepts file-system access events on macOS and enforces per-proc | |
| CVE-2026-28877 | 5.5 | 0.01% | 1 | 0 | 2026-03-26T20:16:11.473000 | An authorization issue was addressed with improved state management. This issue | |
| CVE-2025-55262 | 8.3 | 0.03% | 2 | 0 | 2026-03-26T20:00:28.643000 | HCL Aftermarket DPC is affected by SQL Injection which allows attacker to exploi | |
| CVE-2026-33506 | 8.8 | 0.07% | 2 | 0 | 2026-03-26T19:17:05.680000 | Ory Polis, formerly known as BoxyHQ Jackson, bridges or proxies a SAML login flo | |
| CVE-2026-33152 | 9.1 | 0.06% | 4 | 0 | 2026-03-26T19:17:03.147000 | Tandoor Recipes is an application for managing recipes, planning meals, and buil | |
| CVE-2026-33870 | 7.5 | 0.00% | 1 | 0 | 2026-03-26T18:48:56 | ## Summary Netty incorrectly parses quoted strings in HTTP/1.1 chunked transfer | |
| CVE-2025-15101 | 8.8 | 0.02% | 2 | 0 | 2026-03-26T18:32:45 | A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the Web | |
| CVE-2026-33494 | 10.0 | 0.04% | 3 | 0 | 2026-03-26T18:16:30.400000 | ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision A | |
| CVE-2026-2995 | 7.7 | 0.06% | 2 | 2 | 2026-03-26T17:42:57.473000 | GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 bef | |
| CVE-2026-4867 | 7.5 | 0.04% | 2 | 0 | 2026-03-26T17:16:42.983000 | Impact: A bad regular expression is generated any time you have three or more p | |
| CVE-2026-3108 | 8.0 | 0.04% | 2 | 0 | 2026-03-26T17:16:41.797000 | Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11. | |
| CVE-2026-33636 | 7.6 | 0.03% | 3 | 0 | 2026-03-26T17:16:41.477000 | LIBPNG is a reference library for use in applications that read, create, and man | |
| CVE-2026-33468 | 8.1 | 0.05% | 2 | 0 | 2026-03-26T17:16:41.007000 | Kysely is a type-safe TypeScript SQL query builder. Prior to version 0.28.14, Ky | |
| CVE-2026-33009 | 8.2 | 0.04% | 2 | 0 | 2026-03-26T17:16:37.813000 | EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a dat | |
| CVE-2026-33218 | 7.5 | 0.11% | 2 | 0 | 2026-03-26T17:15:02.390000 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me | |
| CVE-2026-33728 | None | 0.57% | 2 | 0 | 2026-03-26T16:45:42 | In versions of dd-trace-java prior to 1.60.3, the RMI instrumentation registered | |
| CVE-2026-33918 | 7.6 | 0.03% | 2 | 0 | 2026-03-26T16:27:29.090000 | OpenEMR is a free and open source electronic health records and medical practice | |
| CVE-2026-33913 | 7.7 | 0.05% | 1 | 0 | 2026-03-26T16:25:24.290000 | OpenEMR is a free and open source electronic health records and medical practice | |
| CVE-2026-29187 | 8.1 | 0.00% | 2 | 1 | 2026-03-26T16:19:59.843000 | OpenEMR is a free and open source electronic health records and medical practice | |
| CVE-2026-22790 | 8.8 | 0.05% | 2 | 0 | 2026-03-26T16:16:04.967000 | EVerest is an EV charging software stack. Prior to version 2026.02.0, `HomeplugM | |
| CVE-2026-34056 | 7.7 | 0.02% | 1 | 0 | 2026-03-26T16:15:22.680000 | OpenEMR is a free and open source electronic health records and medical practice | |
| CVE-2026-33017 | 9.8 | 5.65% | 6 | 5 | 2026-03-26T15:41:23 | ## Summary The `POST /api/v1/build_public_tmp/{flow_id}/flow` endpoint allows b | |
| CVE-2026-24068 | 8.8 | 0.04% | 2 | 0 | 2026-03-26T15:31:40 | The VSL privileged helper does utilize NSXPC for IPC. The implementation of the | |
| CVE-2026-32523 | 10.0 | 0.04% | 2 | 0 | 2026-03-26T15:31:39 | Unrestricted Upload of File with Dangerous Type vulnerability in denishua WPJAM | |
| CVE-2026-32530 | 8.8 | 0.04% | 2 | 0 | 2026-03-26T15:31:39 | Incorrect Privilege Assignment vulnerability in WPFunnels Creator LMS creatorlms | |
| CVE-2026-4247 | 7.5 | 0.02% | 2 | 0 | 2026-03-26T15:31:39 | When a challenge ACK is to be sent tcp_respond() constructs and sends the challe | |
| CVE-2026-4652 | 7.5 | 0.05% | 2 | 0 | 2026-03-26T15:31:38 | On a system exposing an NVMe/TCP target, a remote client can trigger a kernel pa | |
| CVE-2025-55261 | 8.1 | 0.04% | 2 | 0 | 2026-03-26T15:30:48 | HCL Aftermarket DPC is affected by Missing Functional Level Access Control which | |
| CVE-2026-27664 | 7.5 | 0.04% | 2 | 0 | 2026-03-26T15:30:48 | A vulnerability has been identified in CPCI85 Central Processing/Communication ( | |
| CVE-2026-2511 | 7.5 | 0.07% | 2 | 0 | 2026-03-26T15:30:47 | The JS Help Desk – AI-Powered Support & Ticketing System plugin for WordPress is | |
| CVE-2026-4700 | 9.8 | 0.02% | 1 | 0 | 2026-03-26T15:30:31 | Mitigation bypass in the Networking: HTTP component. This vulnerability affects | |
| CVE-2026-33287 | 7.5 | 0.04% | 1 | 0 | 2026-03-26T15:16:38.133000 | LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScri | |
| CVE-2026-20012 | 8.6 | 0.10% | 1 | 0 | 2026-03-26T15:13:33.940000 | A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco | |
| CVE-2026-20086 | 8.6 | 0.10% | 1 | 0 | 2026-03-26T15:13:33.940000 | A vulnerability in the processing of Control and Provisioning of Wireless Access | |
| CVE-2026-33696 | 0 | 0.46% | 3 | 0 | 2026-03-26T15:13:15.790000 | n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2. | |
| CVE-2026-33660 | 0 | 0.11% | 3 | 0 | 2026-03-26T15:13:15.790000 | n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2. | |
| CVE-2026-4747 | 8.8 | 0.15% | 2 | 0 | 2026-03-26T15:13:15.790000 | Each RPCSEC_GSS data packet is validated by a routine which checks a signature i | |
| CVE-2026-28760 | 7.8 | 0.01% | 2 | 0 | 2026-03-26T15:13:15.790000 | The installer of RATOC RAID Monitoring Manager for Windows searches the current | |
| CVE-2026-30976 | 8.6 | 0.06% | 1 | 0 | 2026-03-26T15:13:15.790000 | Sonarr is a PVR for Usenet and BitTorrent users. In versions on the 4.x branch p | |
| CVE-2026-4862 | 8.8 | 0.04% | 2 | 0 | 2026-03-26T12:30:35 | A security vulnerability has been detected in UTT HiPER 1250GW up to 3.2.7-21090 | |
| CVE-2026-4809 | 9.8 | 0.39% | 4 | 0 | 2026-03-26T12:30:35 | plank/laravel-mediable through version 6.4.0 can allow upload of a dangerous fil | |
| CVE-2026-32680 | 7.8 | 0.01% | 2 | 0 | 2026-03-26T09:30:33 | The installer of RATOC RAID Monitoring Manager for Windows allows to customize t | |
| CVE-2026-4861 | 8.8 | 0.04% | 2 | 0 | 2026-03-26T09:16:06.720000 | A weakness has been identified in Wavlink WL-NU516U1 260227. This vulnerability | |
| CVE-2026-2931 | 8.8 | 0.04% | 1 | 0 | 2026-03-26T06:30:27 | The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object | |
| CVE-2026-4840 | 8.8 | 0.15% | 2 | 0 | 2026-03-26T05:16:40.840000 | A security flaw has been discovered in Netcore Power 15AX up to 3.0.0.6938. Affe | |
| CVE-2026-4484 | 9.8 | 0.04% | 1 | 0 | 2026-03-26T03:30:34 | The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in | |
| CVE-2026-4758 | 8.8 | 0.25% | 1 | 0 | 2026-03-26T00:16:41.570000 | The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion | |
| CVE-2025-33247 | 7.8 | 0.24% | 1 | 0 | 2026-03-25T21:58:57.220000 | NVIDIA Megatron LM contains a vulnerability in quantization configuration loadin | |
| CVE-2026-24150 | 7.8 | 0.05% | 1 | 0 | 2026-03-25T21:58:12.560000 | NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attac | |
| CVE-2026-33286 | 9.1 | 0.04% | 1 | 0 | 2026-03-25T21:33:33 | ### Summary An arbitrary method execution vulnerability has been found which af | |
| CVE-2026-32536 | 10.0 | 0.04% | 1 | 0 | 2026-03-25T21:31:40 | Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green | |
| CVE-2026-32538 | 7.5 | 0.03% | 1 | 0 | 2026-03-25T21:31:39 | Insertion of Sensitive Information Into Sent Data vulnerability in Noor Alam SMT | |
| CVE-2026-25447 | 9.1 | 0.04% | 2 | 0 | 2026-03-25T21:31:39 | Improper Control of Generation of Code ('Code Injection') vulnerability in Jonat | |
| CVE-2026-32546 | 7.5 | 0.03% | 2 | 0 | 2026-03-25T21:31:39 | Missing Authorization vulnerability in StellarWP Restrict Content restrict-conte | |
| CVE-2026-25001 | 8.6 | 0.05% | 1 | 0 | 2026-03-25T21:31:38 | Improper Control of Generation of Code ('Code Injection') vulnerability in Saad | |
| CVE-2026-20687 | 7.1 | 0.01% | 1 | 1 | 2026-03-25T21:31:33 | A use after free issue was addressed with improved memory management. This issue | |
| CVE-2026-32531 | 8.1 | 0.11% | 1 | 0 | 2026-03-25T21:30:36 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2026-32534 | 8.5 | 0.03% | 1 | 0 | 2026-03-25T21:30:36 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-32539 | 9.3 | 0.03% | 1 | 0 | 2026-03-25T21:30:36 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-27044 | 10.0 | 0.05% | 2 | 0 | 2026-03-25T21:30:35 | Improper Control of Generation of Code ('Code Injection') vulnerability in Total | |
| CVE-2026-4719 | 7.5 | 0.01% | 1 | 0 | 2026-03-25T21:30:28 | Incorrect boundary conditions in the Graphics: Text component. This vulnerabilit | |
| CVE-2026-4705 | 9.8 | 0.02% | 1 | 0 | 2026-03-25T21:30:27 | Undefined behavior in the WebRTC: Signaling component. This vulnerability affect | |
| CVE-2026-4704 | 7.5 | 0.01% | 1 | 0 | 2026-03-25T21:30:27 | Denial-of-service in the WebRTC: Signaling component. This vulnerability affects | |
| CVE-2026-33701 | None | 0.50% | 2 | 0 | 2026-03-25T21:27:44 | In versions prior to 2.26.1, the RMI instrumentation registered a custom endpoin | |
| CVE-2026-32537 | 7.5 | 0.11% | 1 | 0 | 2026-03-25T21:16:46.153000 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2026-32513 | 8.8 | 0.05% | 1 | 0 | 2026-03-25T21:16:42.990000 | Deserialization of Untrusted Data vulnerability in Miguel Useche JS Archive List | |
| CVE-2026-4716 | 9.1 | 0.02% | 1 | 0 | 2026-03-25T20:16:37.020000 | Incorrect boundary conditions, uninitialized memory in the JavaScript Engine com | |
| CVE-2026-4702 | 9.8 | 0.02% | 1 | 0 | 2026-03-25T20:16:36.063000 | JIT miscompilation in the JavaScript Engine component. This vulnerability affect | |
| CVE-2026-32573 | 9.1 | 0.04% | 2 | 0 | 2026-03-25T20:16:32.050000 | Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio | |
| CVE-2026-32525 | 9.9 | 0.05% | 1 | 0 | 2026-03-25T20:16:30.967000 | Improper Control of Generation of Code ('Code Injection') vulnerability in jetmo | |
| CVE-2026-25366 | 9.9 | 0.05% | 1 | 0 | 2026-03-25T20:16:26.550000 | Improper Control of Generation of Code ('Code Injection') vulnerability in Theme | |
| CVE-2026-33686 | 8.8 | 0.06% | 2 | 0 | 2026-03-25T20:01:05 | ### Summary A path traversal vulnerability exists in the FileUtil class of the c | |
| CVE-2026-33669 | 9.8 | 0.04% | 4 | 0 | 2026-03-25T19:36:23 | ### Details Document IDs were retrieved via the /api/file/readDir interface, an | |
| CVE-2026-33661 | 8.6 | 0.13% | 2 | 0 | 2026-03-25T19:30:09 | ## Summary The `verify_wechat_sign()` function in `src/Functions.php` unconditi | |
| CVE-2026-4712 | 7.5 | 0.01% | 1 | 0 | 2026-03-25T19:16:52.517000 | Information disclosure in the Widget: Cocoa component. This vulnerability affect | |
| CVE-2026-3988 | 7.5 | 0.04% | 3 | 0 | 2026-03-25T18:32:08 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 | |
| CVE-2026-3857 | 8.1 | 0.01% | 3 | 0 | 2026-03-25T18:32:07 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 | |
| CVE-2026-20084 | 8.6 | 0.11% | 1 | 0 | 2026-03-25T18:31:51 | A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allo | |
| CVE-2026-20125 | 7.7 | 0.14% | 1 | 0 | 2026-03-25T18:31:51 | A vulnerability in the HTTP Server feature of Cisco IOS Software and Cisco IOS X | |
| CVE-2026-26832 | 9.8 | 0.19% | 1 | 1 | 2026-03-25T18:31:51 | node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tessera | |
| CVE-2026-3608 | 7.5 | 0.02% | 1 | 0 | 2026-03-25T18:31:43 | Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea- | |
| CVE-2026-33285 | 7.5 | 0.04% | 1 | 0 | 2026-03-25T17:40:53 | ### Summary LiquidJS's `memoryLimit` security mechanism can be completely bypas | |
| CVE-2026-4713 | 7.5 | 0.01% | 1 | 0 | 2026-03-25T17:17:10.453000 | Incorrect boundary conditions in the Graphics component. This vulnerability affe | |
| CVE-2026-27889 | 7.5 | 0.07% | 1 | 0 | 2026-03-25T17:07:53 | ### Background NATS.io is a high performance open source pub-sub distributed co | |
| CVE-2025-33244 | 9.0 | 0.03% | 3 | 0 | 2026-03-25T15:41:58.280000 | NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker co | |
| CVE-2026-2417 | 0 | 0.10% | 1 | 0 | 2026-03-25T15:41:58.280000 | A Missing Authentication for Critical Function vulnerability in Pharos Controls | |
| CVE-2026-24157 | 7.8 | 0.12% | 1 | 0 | 2026-03-25T15:41:58.280000 | NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an at | |
| CVE-2026-24141 | 7.8 | 0.06% | 1 | 0 | 2026-03-25T15:41:58.280000 | NVIDIA Model Optimizer for Windows and Linux contains a vulnerability in the ONN | |
| CVE-2026-2343 | 5.3 | 0.03% | 1 | 0 | 2026-03-25T15:41:33.977000 | The PeproDev Ultimate Invoice WordPress plugin through 2.2.5 has a bulk download | |
| CVE-2026-28864 | 3.3 | 0.01% | 1 | 0 | 2026-03-25T15:32:30 | This issue was addressed with improved permissions checking. This issue is fixed | |
| CVE-2026-3104 | 7.5 | 0.03% | 1 | 0 | 2026-03-25T15:31:37 | A specially crafted domain can be used to cause a memory leak in a BIND resolver | |
| CVE-2026-26830 | 9.8 | 0.25% | 1 | 2 | 2026-03-25T15:31:37 | pdf-image (npm package) through version 2.0.0 allows OS command injection via th | |
| CVE-2026-1519 | 7.5 | 0.04% | 1 | 0 | 2026-03-25T15:31:36 | If a BIND resolver is performing DNSSEC validation and encounters a maliciously | |
| CVE-2026-4725 | 10.0 | 0.01% | 1 | 0 | 2026-03-25T14:16:39.213000 | Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This v | |
| CVE-2026-4717 | 9.8 | 0.02% | 1 | 0 | 2026-03-25T14:16:38.597000 | Privilege escalation in the Netmonitor component. This vulnerability affects Fir | |
| CVE-2026-26306 | 7.8 | 0.02% | 1 | 0 | 2026-03-25T06:30:35 | The installer for OM Workspace (Windows Edition) Ver 2.4 and earlier insecurely | |
| CVE-2026-2072 | 8.2 | 0.04% | 1 | 0 | 2026-03-25T03:31:40 | Cross-Site Scripting vulnerability in Hitachi Infrastructure Analytics Advisor ( | |
| CVE-2026-33216 | 8.6 | 0.03% | 2 | 0 | 2026-03-24T21:42:11 | ### Background NATS.io is a high performance open source pub-sub distributed co | |
| CVE-2026-4723 | 9.8 | 0.01% | 1 | 0 | 2026-03-24T21:32:29 | Use-after-free in the JavaScript Engine component. This vulnerability affects Fi | |
| CVE-2026-4701 | 9.8 | 0.02% | 1 | 0 | 2026-03-24T21:32:28 | Use-after-free in the JavaScript Engine component. This vulnerability affects Fi | |
| CVE-2026-4715 | 9.1 | 0.02% | 1 | 0 | 2026-03-24T21:32:28 | Uninitialized memory in the Graphics: Canvas2D component. This vulnerability aff | |
| CVE-2026-4714 | 7.5 | 0.01% | 1 | 0 | 2026-03-24T21:32:28 | Incorrect boundary conditions in the Audio/Video component. This vulnerability a | |
| CVE-2026-4711 | 9.8 | 0.02% | 1 | 0 | 2026-03-24T21:32:28 | Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefo | |
| CVE-2025-33254 | 7.5 | 0.03% | 1 | 0 | 2026-03-24T21:31:36 | NVIDIA Triton Inference Server contains a vulnerability where an attacker may ca | |
| CVE-2025-33248 | 7.8 | 0.05% | 1 | 0 | 2026-03-24T21:31:35 | NVIDIA Megatron-LM contains a vulnerability in the hybrid conversion script wher | |
| CVE-2025-33238 | 7.5 | 0.03% | 1 | 0 | 2026-03-24T21:31:35 | NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability wh | |
| CVE-2026-24158 | 7.5 | 0.04% | 1 | 0 | 2026-03-24T21:31:35 | NVIDIA Triton Inference Server contains a vulnerability in the HTTP endpoint whe | |
| CVE-2026-24152 | 7.8 | 0.05% | 1 | 0 | 2026-03-24T21:31:35 | NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attac | |
| CVE-2026-24151 | 7.8 | 0.05% | 1 | 0 | 2026-03-24T21:31:35 | NVIDIA Megatron-LM contains a vulnerability in inferencing where an Attacker may | |
| CVE-2026-24159 | 7.8 | 0.12% | 1 | 0 | 2026-03-24T21:31:35 | NVIDIA NeMo Framework contains a vulnerability where an attacker may cause remot | |
| CVE-2026-29785 | 7.5 | 0.08% | 2 | 0 | 2026-03-24T21:29:09 | ### Background NATS.io is a high performance open source pub-sub distributed co | |
| CVE-2026-33634 | None | 26.61% | 5 | 1 | 2026-03-24T17:53:15 | ## Summary On March 19, 2026, a threat actor used compromised credentials to pu | |
| CVE-2026-33056 | 6.5 | 0.01% | 1 | 0 | 2026-03-24T16:17:11.623000 | tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and | |
| CVE-2026-4368 | 0 | 0.01% | 1 | 0 | 2026-03-24T15:54:09.400000 | Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configur | |
| CVE-2026-3055 | 0 | 0.02% | 4 | 0 | 2026-03-24T15:54:09.400000 | Insufficient input validation in NetScaler ADC and NetScaler Gateway when config | |
| CVE-2026-33167 | 0 | 0.01% | 2 | 0 | 2026-03-24T15:53:48.067000 | Action Pack is a Rubygem for building web applications on the Rails framework. I | |
| CVE-2026-4681 | 0 | 0.38% | 3 | 0 | 2026-03-24T15:53:48.067000 | A critical remote code execution (RCE) vulnerability has been reported in PTC Wi | |
| CVE-2026-4283 | 9.1 | 0.10% | 1 | 0 | 2026-03-24T06:31:20 | The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized acc | |
| CVE-2026-25075 | 7.5 | 0.12% | 2 | 1 | 2026-03-23T21:30:57 | strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerabil | |
| CVE-2025-15605 | None | 0.01% | 1 | 0 | 2026-03-23T18:30:39 | A hardcoded cryptographic key within the configuration mechanism on TP-Link Arch | |
| CVE-2025-15517 | None | 0.04% | 1 | 0 | 2026-03-23T18:30:39 | A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210 | |
| CVE-2026-32746 | 9.8 | 0.03% | 3 | 5 | 2026-03-23T14:16:33.017000 | telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMO | |
| CVE-2026-3587 | 10.0 | 0.09% | 2 | 1 | 2026-03-23T09:30:29 | An unauthenticated remote attacker can exploit a hidden function in the CLI prom | |
| CVE-2026-33487 | 7.5 | 0.02% | 2 | 0 | 2026-03-20T21:02:35 | ### Details The `validateSignature` function in `validate.go` goes through the | |
| CVE-2026-33496 | 8.1 | 0.14% | 2 | 0 | 2026-03-20T20:51:08 | ## Description Ory Oathkeeper is vulnerable to authentication bypass due to cac | |
| CVE-2026-33442 | 8.1 | 0.05% | 2 | 0 | 2026-03-20T20:48:35 | ## Summary The `sanitizeStringLiteral` method in Kysely's query compiler escape | |
| CVE-2026-33413 | None | 0.05% | 2 | 0 | 2026-03-20T20:48:15 | ### Impact _What kind of vulnerability is it? Who is impacted?_ Multiple vulner | |
| CVE-2025-31277 | 8.8 | 0.27% | 1 | 0 | 2026-03-20T18:32:18 | The issue was addressed with improved memory handling. This issue is fixed in wa | |
| CVE-2026-20131 | 10.0 | 0.65% | 2 | 3 | 2026-03-19T18:32:21 | A vulnerability in the web-based management interface of Cisco Secure Firewall M | |
| CVE-2026-20963 | 8.8 | 7.10% | 1 | 0 | 2026-03-19T13:09:24.293000 | Deserialization of untrusted data in Microsoft Office SharePoint allows an autho | |
| CVE-2026-32116 | 8.1 | 0.08% | 1 | 0 | 2026-03-16T18:02:21.613000 | Magic Wormhole makes it possible to get arbitrary-sized files and directories fr | |
| CVE-2026-26123 | 5.5 | 0.05% | 1 | 0 | 2026-03-10T21:32:18 | Cwe is not in rca categories in Microsoft Authenticator allows an unauthorized a | |
| CVE-2026-20079 | 10.0 | 0.06% | 2 | 1 | 2026-03-05T19:39:11.967000 | A vulnerability in the web interface of Cisco Secure Firewall Management Center | |
| CVE-2026-21962 | 10.0 | 0.02% | 2 | 8 | 2026-02-03T00:30:18 | Vulnerability in the Oracle HTTP Server, Oracle Weblogic Server Proxy Plug-in pr | |
| CVE-2025-43529 | 8.8 | 0.17% | 1 | 8 | 2025-12-17T21:31:01 | A use-after-free issue was addressed with improved memory management. This issue | |
| CVE-2025-55182 | 10.0 | 71.17% | 1 | 100 | template | 2025-12-09T16:53:25 | ### Impact There is an unauthenticated remote code execution vulnerability in R |
| CVE-2023-46604 | 10.0 | 94.44% | 1 | 34 | template | 2025-11-04T00:30:41 | Apache ActiveMQ is vulnerable to Remote Code Execution.The vulnerability may all |
| CVE-2020-14882 | 9.8 | 94.45% | 2 | 41 | template | 2025-10-27T17:09:11.960000 | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware |
| CVE-2023-32434 | 7.8 | 61.25% | 2 | 2 | 2025-10-23T18:48:05.013000 | An integer overflow was addressed with improved input validation. This issue is | |
| CVE-2023-38606 | 5.5 | 0.12% | 1 | 0 | 2025-10-22T00:33:51 | This issue was addressed with improved state management. This issue is fixed in | |
| CVE-2017-10271 | 7.5 | 94.44% | 2 | 31 | template | 2025-10-22T00:31:29 | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar |
| CVE-2024-6387 | 8.1 | 48.06% | 1 | 95 | 2025-04-24T21:32:54 | A signal handler race condition was found in OpenSSH's server (sshd), where a cl | |
| CVE-2020-8561 | 4.1 | 0.18% | 2 | 0 | 2024-11-21T05:39:02.050000 | A security issue was discovered in Kubernetes where actors that control the resp | |
| CVE-2023-38646 | 9.8 | 94.25% | 1 | 41 | template | 2024-02-15T18:30:40 | Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 all |
| CVE-2026-33897 | 0 | 0.05% | 4 | 0 | N/A | ||
| CVE-2026-33945 | 0 | 0.06% | 2 | 0 | N/A | ||
| CVE-2026-33942 | 0 | 0.33% | 2 | 0 | N/A | ||
| CVE-2026-23995 | 0 | 0.01% | 4 | 0 | N/A | ||
| CVE-2026-22593 | 0 | 0.01% | 2 | 0 | N/A | ||
| CVE-2026-26008 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-33416 | 0 | 0.05% | 3 | 0 | N/A | ||
| CVE-2026-33149 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-33491 | 0 | 0.01% | 2 | 0 | N/A | ||
| CVE-2026-4926 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-33530 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-32628 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-15518 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-15519 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-33526 | 0 | 1.98% | 1 | 0 | N/A | ||
| CVE-2026-33917 | 0 | 0.00% | 2 | 1 | N/A | ||
| CVE-2026-33932 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-34055 | 0 | 0.02% | 1 | 0 | N/A | ||
| CVE-2026-23514 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-33348 | 0 | 0.07% | 1 | 0 | N/A | ||
| CVE-2026-24750 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-30975 | 0 | 0.06% | 1 | 0 | N/A | ||
| CVE-2026-33656 | 0 | 0.00% | 1 | 1 | N/A | ||
| CVE-2026-28373 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-33871 | 0 | 0.00% | 1 | 0 | N/A |
updated 2026-03-27T12:14:49
2 posts
🟠 CVE-2026-33671 - High (7.5)
Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns. Certain patterns using extglob quantifiers such as `...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33671/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33671 - High (7.5)
Picomatch is a glob matcher written JavaScript. Versions prior to 4.0.4, 3.0.2, and 2.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) when processing crafted extglob patterns. Certain patterns using extglob quantifiers such as `...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33671/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-27T09:31:30
2 posts
⚠️ CVE-2026-27858 (HIGH, 7.5): OX Dovecot Pro’s managesieve is at risk of remote DoS via unauthenticated memory exhaustion. Restrict access, monitor logs, and patch ASAP. No public exploits yet, but stay alert. https://radar.offseq.com/threat/cve-2026-27858-uncontrolled-resource-consumption-i-4ea18f33 #OffSeq #Dovecot #EmailSecurity
##⚠️ CVE-2026-27858 (HIGH, 7.5): OX Dovecot Pro’s managesieve is at risk of remote DoS via unauthenticated memory exhaustion. Restrict access, monitor logs, and patch ASAP. No public exploits yet, but stay alert. https://radar.offseq.com/threat/cve-2026-27858-uncontrolled-resource-consumption-i-4ea18f33 #OffSeq #Dovecot #EmailSecurity
##updated 2026-03-27T06:31:54
2 posts
🚨 CRITICAL: CVE-2026-22738 in Spring AI SimpleVectorStore allows unauth RCE via SpEL injection (1.0.0 – 1.0.4, 1.1.0 – 1.1.3). Patch to 1.0.5/1.1.4 when released. Validate input now! https://radar.offseq.com/threat/cve-2026-22738-vulnerability-in-spring-spring-ai-473dec2d #OffSeq #SpringAI #infosec #CVE202622738
##🚨 CRITICAL: CVE-2026-22738 in Spring AI SimpleVectorStore allows unauth RCE via SpEL injection (1.0.0 – 1.0.4, 1.1.0 – 1.1.3). Patch to 1.0.5/1.1.4 when released. Validate input now! https://radar.offseq.com/threat/cve-2026-22738-vulnerability-in-spring-spring-ai-473dec2d #OffSeq #SpringAI #infosec #CVE202622738
##updated 2026-03-27T00:32:23
2 posts
🟠 CVE-2026-1961 - High (8)
A flaw was found in Foreman. A remote attacker could exploit a command injection vulnerability in Foreman's WebSocket proxy implementation. This vulnerability arises from the system's use of unsanitized hostname values from compute resource provid...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1961/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1961 - High (8)
A flaw was found in Foreman. A remote attacker could exploit a command injection vulnerability in Foreman's WebSocket proxy implementation. This vulnerability arises from the system's use of unsanitized hostname values from compute resource provid...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1961/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-27T00:31:32
2 posts
🟠 CVE-2026-34352 - High (8.5)
In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34352/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34352 - High (8.5)
In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34352/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-27T00:31:32
2 posts
🟠 CVE-2026-4903 - High (8.8)
A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. This manipulation of the argument PPPOEPassword causes stack-based buffer ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4903/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4903 - High (8.8)
A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. This manipulation of the argument PPPOEPassword causes stack-based buffer ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4903/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-27T00:31:32
2 posts
🟠 CVE-2025-12805 - High (8.1)
A flaw was found in Red Hat OpenShift AI (RHOAI) llama-stack-operator. This vulnerability allows unauthorized access to Llama Stack services deployed in other namespaces via direct network requests, because no NetworkPolicy restricts access to the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-12805/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-12805 - High (8.1)
A flaw was found in Red Hat OpenShift AI (RHOAI) llama-stack-operator. This vulnerability allows unauthorized access to Llama Stack services deployed in other namespaces via direct network requests, because no NetworkPolicy restricts access to the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-12805/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T23:16:21.090000
2 posts
🟠 CVE-2026-4902 - High (8.8)
A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4902/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4902 - High (8.8)
A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4902/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T22:16:31.370000
3 posts
🟠 CVE-2026-3650 - High (7.5)
A memory leak exists in the Grassroots DICOM library (GDCM). The bug occurs when parsing malformed DICOM files with non-standard VR types in file meta information. The vulnerability leads to vast memory allocations and resource depletion, triggeri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3650/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3650 - High (7.5)
A memory leak exists in the Grassroots DICOM library (GDCM). The bug occurs when parsing malformed DICOM files with non-standard VR types in file meta information. The vulnerability leads to vast memory allocations and resource depletion, triggeri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3650/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##CVE-2026-3650 in Grassroots DICOM (GDCM):
• Memory leak via malformed DICOM parsing
• CVSS 7.5 → DoS risk
• No patch, no maintainer response
• Impacts healthcare imaging pipelines
Mitigate via isolation + strict input controls.
Source: https://www.hipaajournal.com/grassroots-dicom-vulnerability-march-2026/
Follow @technadu for more.
##updated 2026-03-26T22:16:31.203000
2 posts
🟠 CVE-2026-33687 - High (8.8)
Sharp is a content management framework built for Laravel as a package. Versions prior to 9.20.0 contain a vulnerability in the file upload endpoint that allows authenticated users to bypass all file type restrictions. The upload endpoint within t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33687/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33687 - High (8.8)
Sharp is a content management framework built for Laravel as a package. Versions prior to 9.20.0 contain a vulnerability in the file upload endpoint that allows authenticated users to bypass all file type restrictions. The upload endpoint within t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33687/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T22:16:30.553000
4 posts
🟠 CVE-2026-33673 - High (7.6)
PrestaShop is an open source e-commerce web application. Versions prior to 8.2.5 and 9.1.0 are vulnerable to stored Cross-Site Scripting (stored XSS) vulnerabilities in the BO. An attacker who can inject data into the database, via limited back-of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33673/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33673 - High (7.6)
PrestaShop is an open source e-commerce web application. Versions prior to 8.2.5 and 9.1.0 are vulnerable to stored Cross-Site Scripting (stored XSS) vulnerabilities in the BO. An attacker who can inject data into the database, via limited back-of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33673/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33673 - High (7.6)
PrestaShop is an open source e-commerce web application. Versions prior to 8.2.5 and 9.1.0 are vulnerable to stored Cross-Site Scripting (stored XSS) vulnerabilities in the BO. An attacker who can inject data into the database, via limited back-of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33673/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33673 - High (7.6)
PrestaShop is an open source e-commerce web application. Versions prior to 8.2.5 and 9.1.0 are vulnerable to stored Cross-Site Scripting (stored XSS) vulnerabilities in the BO. An attacker who can inject data into the database, via limited back-of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33673/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T22:16:30.050000
4 posts
🚨 CRITICAL: CVE-2026-33670 in SiYuan (<3.6.2) lets remote attackers exploit /api/file/readDir for path traversal, exposing sensitive files. Patch to 3.6.2+ ASAP! Details: https://radar.offseq.com/threat/cve-2026-33670-cwe-22-improper-limitation-of-a-pat-0880f67a #OffSeq #vuln #infosec #SiYuan
##🔴 CVE-2026-33670 - Critical (9.8)
SiYuan is a personal knowledge management system. Prior to version 3.6.2, the /api/file/readDir interface was used to traverse and retrieve the file names of all documents under a notebook. Version 3.6.2 patches the issue.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33670/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-33670 in SiYuan (<3.6.2) lets remote attackers exploit /api/file/readDir for path traversal, exposing sensitive files. Patch to 3.6.2+ ASAP! Details: https://radar.offseq.com/threat/cve-2026-33670-cwe-22-improper-limitation-of-a-pat-0880f67a #OffSeq #vuln #infosec #SiYuan
##🔴 CVE-2026-33670 - Critical (9.8)
SiYuan is a personal knowledge management system. Prior to version 3.6.2, the /api/file/readDir interface was used to traverse and retrieve the file names of all documents under a notebook. Version 3.6.2 patches the issue.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33670/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T22:16:28.460000
2 posts
🟠 CVE-2026-28377 - High (7.5)
A vulnerability in Grafana Tempo exposes the S3 SSE-C encryption key in plaintext through the /status/config endpoint, potentially allowing unauthorized users to obtain the key used to encrypt trace data stored in S3.
Thanks to william_goodfellow...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28377/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28377 - High (7.5)
A vulnerability in Grafana Tempo exposes the S3 SSE-C encryption key in plaintext through the /status/config endpoint, potentially allowing unauthorized users to obtain the key used to encrypt trace data stored in S3.
Thanks to william_goodfellow...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28377/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T21:32:31
2 posts
🟠 CVE-2026-32522 - High (8.6)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in vanquish WooCommerce Support Ticket System woocommerce-support-ticket-system allows Path Traversal.This issue affects WooCommerce Support Ticket System...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32522/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-32522 - High (8.6)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in vanquish WooCommerce Support Ticket System woocommerce-support-ticket-system allows Path Traversal.This issue affects WooCommerce Support Ticket System...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32522/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T21:31:26
2 posts
🟠 CVE-2025-41359 - High (7.8)
Vulnerability related to an unquoted service path in Small HTTP Server 3.06.36, specifically affecting the executable located at 'C:\Program Files (x86)\shttps_mg\http.exe service'. This misconfiguration allows a local attacker to place a maliciou...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41359/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-41359 - High (7.8)
Vulnerability related to an unquoted service path in Small HTTP Server 3.06.36, specifically affecting the executable located at 'C:\Program Files (x86)\shttps_mg\http.exe service'. This misconfiguration allows a local attacker to place a maliciou...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41359/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T21:07:45.300000
2 posts
🟠 CVE-2025-41368 - High (8.1)
Problem in the Small HTTP Server v3.06.36 service. An authenticated path traversal vulnerability in '/' allows remote users to bypass the intended restrictions of SecurityManager and display any file if they have the appropriate permissions outsid...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41368/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-41368 - High (8.1)
Problem in the Small HTTP Server v3.06.36 service. An authenticated path traversal vulnerability in '/' allows remote users to bypass the intended restrictions of SecurityManager and display any file if they have the appropriate permissions outsid...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41368/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T20:43:15.687000
2 posts
🟠 CVE-2026-32748 - High (7.5)
Squid is a caching proxy for the Web. Prior to version 7.5, due to premature release of resource during expected lifetime and heap Use-After-Free bugs, Squid is vulnerable to Denial of Service when handling ICP traffic. This problem allows a remot...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32748/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-32748 - High (7.5)
Squid is a caching proxy for the Web. Prior to version 7.5, due to premature release of resource during expected lifetime and heap Use-After-Free bugs, Squid is vulnerable to Denial of Service when handling ICP traffic. This problem allows a remot...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32748/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T20:40:52.840000
2 posts
🔴 CVE-2026-33396 - Critical (9.9)
OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.35, a low-privileged authenticated user (ProjectMember) can achieve remote command execution on the Probe container/host by abusing Synthetic Monitor Playwrig...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33396/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-33396 - Critical (9.9)
OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.35, a low-privileged authenticated user (ProjectMember) can achieve remote command execution on the Probe container/host by abusing Synthetic Monitor Playwrig...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33396/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T20:36:42.620000
1 posts
🔴 CVE-2025-32991 - Critical (9)
In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful API results in remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32991/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T20:16:16.110000
2 posts
🟠 CVE-2026-33631 - High (8.7)
ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. In versions on the 4.1 branch and earlier, the opfilter Endpoint Security system extension enforced file access policy exclusively by intercepting...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33631/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33631 - High (8.7)
ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. In versions on the 4.1 branch and earlier, the opfilter Endpoint Security system extension enforced file access policy exclusively by intercepting...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33631/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T20:16:11.473000
1 posts
I updated the “Device Name” section of my “How to Fingerprint iOS Users” article to note that iOS 26.4 fixes CVE-2026-28877, which leaked the device name without needing a proper entitlement.
https://paradisefacade.com/blog/2026/3/9/how-to-fingerprint-users
##updated 2026-03-26T20:00:28.643000
2 posts
🟠 CVE-2025-55262 - High (8.3)
HCL Aftermarket DPC is affected by SQL Injection which allows attacker to exploit this vulnerability to retrieve sensitive information from the database.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-55262/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-55262 - High (8.3)
HCL Aftermarket DPC is affected by SQL Injection which allows attacker to exploit this vulnerability to retrieve sensitive information from the database.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-55262/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T19:17:05.680000
2 posts
🟠 CVE-2026-33506 - High (8.8)
Ory Polis, formerly known as BoxyHQ Jackson, bridges or proxies a SAML login flow to OAuth 2.0 or OpenID Connect. Versions prior to 26.2.0 contain a DOM-based Cross-Site Scripting (XSS) vulnerability in Ory Polis's login functionality. The applica...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33506/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33506 - High (8.8)
Ory Polis, formerly known as BoxyHQ Jackson, bridges or proxies a SAML login flow to OAuth 2.0 or OpenID Connect. Versions prior to 26.2.0 contain a DOM-based Cross-Site Scripting (XSS) vulnerability in Ory Polis's login functionality. The applica...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33506/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T19:17:03.147000
4 posts
⛔ New security advisory:
CVE-2026-33152 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-33152-tandoor-recipes-authentication-bypass-update-now
🔴 CVE-2026-33152 - Critical (9.1)
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, Tandoor Recipes configures Django REST Framework with BasicAuthentication as one of the default authentication backend...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33152/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-33152 - Critical (9.1)
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. In versions prior to 2.6.0, Tandoor Recipes configures Django REST Framework with BasicAuthentication as one of the default authentication backend...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33152/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-33152: TandoorRecipes < 2.6.0 suffers CRITICAL vuln (CVSS 9.1). No rate limiting on API BasicAuth enables unlimited password guessing. Patch to 2.6.0 now! https://radar.offseq.com/threat/cve-2026-33152-cwe-307-improper-restriction-of-exc-e7cae15a #OffSeq #Vulnerability #TandoorRecipes #APIsecurity
##updated 2026-03-26T18:48:56
1 posts
We're released Netty 4.2.11 and 4.1.132. These contain many bug fixes, and fixes for two CVEs both rated *high*:
- CVE-2026-33871: HTTP/2 CONTINUATION frame flood Denial of Service.
- CVE-2026-33870: HTTP/1.1 Request Smuggling vulnerability in chunked encoding parsing.
Release notes for 4.2.11: https://netty.io/news/2026/03/24/4-2-11-Final.html
Release notes for 4.1.132: https://netty.io/news/2026/03/24/4-1-132-Final.html
Also of note: We had 17 people contribute to Netty 4.2.11, of which 5 are new first time contributors 😲
##updated 2026-03-26T18:32:45
2 posts
🟠 CVE-2025-15101 - High (8.8)
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the Web management interface of certain ASUS router models. This vulnerability potentially allows actions to be performed with the existing privileges of an authenticated use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15101/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-15101 - High (8.8)
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the Web management interface of certain ASUS router models. This vulnerability potentially allows actions to be performed with the existing privileges of an authenticated use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15101/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T18:16:30.400000
3 posts
🔴 CVE-2026-33494 - Critical (10)
ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Versions prior to 26.2.0 are vulnerable to an authorization bypass via HTTP path traversal. An attacker...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33494/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-33494 - Critical (10)
ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Versions prior to 26.2.0 are vulnerable to an authorization bypass via HTTP path traversal. An attacker...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33494/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##CRITICAL: ory oathkeeper (<26.2.0) vulnerable to path traversal (CVE-2026-33494). Attackers can bypass authorization via crafted URLs. Upgrade to 26.2.0+ immediately. https://radar.offseq.com/threat/cve-2026-33494-cwe-23-relative-path-traversal-in-o-d845cb54 #OffSeq #CVE202633494 #infosec #vulnerability
##updated 2026-03-26T17:42:57.473000
2 posts
2 repos
🟠 CVE-2026-2995 - High (7.7)
GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2995 - High (7.7)
GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T17:16:42.983000
2 posts
🟠 CVE-2026-4867 - High (7.5)
Impact:
A bad regular expression is generated any time you have three or more parameters within a single segment, separated by something that is not a period (.). For example, /:a-:b-:c or /:a-:b-:c-:d. The backtrack protection added in path-to-r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4867/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4867 - High (7.5)
Impact:
A bad regular expression is generated any time you have three or more parameters within a single segment, separated by something that is not a period (.). For example, /:a-:b-:c or /:a-:b-:c-:d. The backtrack protection added in path-to-r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4867/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T17:16:41.797000
2 posts
🟠 CVE-2026-3108 - High (8)
Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 fail to sanitize user-controlled post content in the mmctl commands terminal output which allows attackers to manipulate administrator termin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3108/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3108 - High (8)
Mattermost versions 11.2.x <= 11.2.2, 10.11.x <= 10.11.10, 11.4.x <= 11.4.0, 11.3.x <= 11.3.1 fail to sanitize user-controlled post content in the mmctl commands terminal output which allows attackers to manipulate administrator termin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3108/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T17:16:41.477000
3 posts
🟠 CVE-2026-33636 - High (7.6)
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write exists in libpng's ARM/AArch64 Neon-opti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33636/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33636 - High (7.6)
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write exists in libpng's ARM/AArch64 Neon-opti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33636/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
###libpng 1.6.56 fixes two high-severity vulnerabilities: CVE-2026-33416 and CVE-2026-33636.
Out of these CVE-2026-33416: Use-after-free via pointer aliasing in png_set_tRNS and png_set_PLTE is particularly serious as arbitrary code execution has been demonstrated. Applications that call png_free_data() to release memory between png_read_info() and png_read_update_info() are affected.
https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7j
The second vulnerability CVE-2026-33636: Out-of-bounds read/write in the palette expansion on ARM Neon is of more limited concern as only crashes has been demonstrated. More serious impacts have not been ruled out, however.
https://github.com/pnggroup/libpng/security/advisories/GHSA-wjr5-c57x-95m2
##updated 2026-03-26T17:16:41.007000
2 posts
🟠 CVE-2026-33468 - High (8.1)
Kysely is a type-safe TypeScript SQL query builder. Prior to version 0.28.14, Kysely's `DefaultQueryCompiler.sanitizeStringLiteral()` only escapes single quotes by doubling them (`'` → `''`) but does not escape backslashes. When used with the My...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33468/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33468 - High (8.1)
Kysely is a type-safe TypeScript SQL query builder. Prior to version 0.28.14, Kysely's `DefaultQueryCompiler.sanitizeStringLiteral()` only escapes single quotes by doubling them (`'` → `''`) but does not escape backslashes. When used with the My...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33468/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T17:16:37.813000
2 posts
🟠 CVE-2026-33009 - High (8.2)
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to C++ UB (potential memory corruption). This is triggered by an MQTT `everest_external/nodered/{connector}/cmd/switch_three_phases_while_charging` mess...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33009/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33009 - High (8.2)
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have a data race leading to C++ UB (potential memory corruption). This is triggered by an MQTT `everest_external/nodered/{connector}/cmd/switch_three_phases_while_charging` mess...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33009/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T17:15:02.390000
2 posts
🟠 CVE-2026-33218 - High (7.5)
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, a client which can connect to the leafnode port can crash the nats-server with a certain malformed message pre-au...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33218 - High (7.5)
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, a client which can connect to the leafnode port can crash the nats-server with a certain malformed message pre-au...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T16:45:42
2 posts
⚠️ CRITICAL: CVE-2026-33728 in DataDog dd-trace-java (0.40.0 - <1.60.3) allows unauth RCE via unsafe deserialization if JMX/RMI port is exposed on JDK ≤16. Upgrade to 1.60.3+ & restrict access! https://radar.offseq.com/threat/cve-2026-33728-cwe-502-deserialization-of-untruste-d41c376a #OffSeq #Java #Infosec #CVE202633728
##⚠️ CRITICAL: CVE-2026-33728 in DataDog dd-trace-java (0.40.0 - <1.60.3) allows unauth RCE via unsafe deserialization if JMX/RMI port is exposed on JDK ≤16. Upgrade to 1.60.3+ & restrict access! https://radar.offseq.com/threat/cve-2026-33728-cwe-502-deserialization-of-untruste-d41c376a #OffSeq #Java #Infosec #CVE202633728
##updated 2026-03-26T16:27:29.090000
2 posts
🟠 CVE-2026-33918 - High (7.6)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33918/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33918 - High (7.6)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33918/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T16:25:24.290000
1 posts
🟠 CVE-2026-33913 - High (7.7)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated user with access to the Carecoordination module can upload a crafted CCDA document containing `` to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33913/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T16:19:59.843000
2 posts
1 repos
https://github.com/ChrisSub08/CVE-2026-29187_SqlInjectionVulnerabilityOpenEMR7.0.4
🟠 CVE-2026-29187 - High (8.1)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29187/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29187 - High (8.1)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29187/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T16:16:04.967000
2 posts
🟠 CVE-2026-22790 - High (8.8)
EVerest is an EV charging software stack. Prior to version 2026.02.0, `HomeplugMessage::setup_payload` trusts `len` after an `assert`; in release builds the check is removed, so oversized SLAC payloads are `memcpy`'d into a ~1497-byte stack buffer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22790/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22790 - High (8.8)
EVerest is an EV charging software stack. Prior to version 2026.02.0, `HomeplugMessage::setup_payload` trusts `len` after an `assert`; in release builds the check is removed, so oversized SLAC payloads are `memcpy`'d into a ~1497-byte stack buffer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22790/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T16:15:22.680000
1 posts
🟠 CVE-2026-34056 - High (7.7)
OpenEMR is a free and open source electronic health records and medical practice management application. A Broken Access Control vulnerability in OpenEMR up to and including version 8.0.0.3 allows low-privilege users to view and download Ensora eR...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34056/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:41:23
6 posts
5 repos
https://github.com/z4yd3/PoC-CVE-2026-33017
https://github.com/MaxMnMl/langflow-CVE-2026-33017-poc
https://github.com/omer-efe-curkus/CVE-2026-33017-Langflow-RCE-PoC
CVE-2026-33017: Unauthenticated RCE in Langflow’s Public Flow Endpoint Explained | HackerNoon
https://hackernoon.com/cve-2026-33017-unauthenticated-rce-in-langflows-public-flow-endpoint-explained?utm_source=flipboard&utm_medium=activitypub
Posted into Hacker Noon @hacker-noon-HackerNoon
##🚨 [CISA-2026:0325] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0325)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-33017 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-33017)
- Name: Langflow Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Langflow
- Product: Langflow
- Notes: https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx ; https://nvd.nist.gov/vuln/detail/CVE-2026-33017
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260325 #cisa20260325 #cve_2026_33017 #cve202633017
##🚨 [CISA-2026:0325] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0325)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-33017 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-33017)
- Name: Langflow Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Langflow
- Product: Langflow
- Notes: https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx ; https://nvd.nist.gov/vuln/detail/CVE-2026-33017
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260325 #cisa20260325 #cve_2026_33017 #cve202633017
##"CISA: New Langflow flaw actively exploited to hijack AI workflows"
"[...] The Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are actively exploiting a critical vulnerability identified as CVE-2026-33017, which affects the Langflow framework for building AI agents."
##CVE ID: CVE-2026-33017
Vendor: Langflow
Product: Langflow
Date Added: 2026-03-25
Notes: https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx ; https://nvd.nist.gov/vuln/detail/CVE-2026-33017
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-33017
CISA has updated the KEV catalogue.
- CVE-2026-33017: Langflow Code Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-33017 #CISA #infosec #vulnerability
##updated 2026-03-26T15:31:40
2 posts
🟠 CVE-2026-24068 - High (8.8)
The VSL privileged helper does utilize NSXPC for IPC. The implementation of the "shouldAcceptNewConnection" function, which is used by the NSXPC framework to validate if a client should be allowed to connect to the XPC listener, does not validate ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24068/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24068 - High (8.8)
The VSL privileged helper does utilize NSXPC for IPC. The implementation of the "shouldAcceptNewConnection" function, which is used by the NSXPC framework to validate if a client should be allowed to connect to the XPC listener, does not validate ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24068/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:31:39
2 posts
🔴 CVE-2026-32523 - Critical (9.9)
Unrestricted Upload of File with Dangerous Type vulnerability in denishua WPJAM Basic wpjam-basic allows Using Malicious Files.This issue affects WPJAM Basic: from n/a through <= 6.9.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32523/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-32523 - Critical (9.9)
Unrestricted Upload of File with Dangerous Type vulnerability in denishua WPJAM Basic wpjam-basic allows Using Malicious Files.This issue affects WPJAM Basic: from n/a through <= 6.9.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32523/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:31:39
2 posts
🟠 CVE-2026-32530 - High (8.8)
Incorrect Privilege Assignment vulnerability in WPFunnels Creator LMS creatorlms allows Privilege Escalation.This issue affects Creator LMS: from n/a through <= 1.1.18.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32530/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-32530 - High (8.8)
Incorrect Privilege Assignment vulnerability in WPFunnels Creator LMS creatorlms allows Privilege Escalation.This issue affects Creator LMS: from n/a through <= 1.1.18.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32530/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:31:39
2 posts
🟠 CVE-2026-4247 - High (7.5)
When a challenge ACK is to be sent tcp_respond() constructs and sends the challenge ACK and consumes the mbuf that is passed in. When no challenge ACK should be sent the function returns and leaks the mbuf.
If an attacker is either on path with ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4247/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4247 - High (7.5)
When a challenge ACK is to be sent tcp_respond() constructs and sends the challenge ACK and consumes the mbuf that is passed in. When no challenge ACK should be sent the function returns and leaks the mbuf.
If an attacker is either on path with ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4247/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:31:38
2 posts
🟠 CVE-2026-4652 - High (7.5)
On a system exposing an NVMe/TCP target, a remote client can trigger a kernel panic by sending a CONNECT command for an I/O queue with a bogus or stale CNTLID.
An attacker with network access to the NVMe/TCP target can trigger an unauthenticated ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4652/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4652 - High (7.5)
On a system exposing an NVMe/TCP target, a remote client can trigger a kernel panic by sending a CONNECT command for an I/O queue with a bogus or stale CNTLID.
An attacker with network access to the NVMe/TCP target can trigger an unauthenticated ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4652/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:30:48
2 posts
🟠 CVE-2025-55261 - High (8.1)
HCL Aftermarket DPC is affected by Missing Functional Level Access Control which will allow attacker to escalate his privileges and may compromise the application and may steal and manipulate the data.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-55261/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-55261 - High (8.1)
HCL Aftermarket DPC is affected by Missing Functional Level Access Control which will allow attacker to escalate his privileges and may compromise the application and may steal and manipulate the data.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-55261/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:30:48
2 posts
🟠 CVE-2026-27664 - High (7.5)
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V26.10), SICORE Base system (All versions < V26.10.0). The affected application contains an out-of-bounds write vulnerability while parsing specia...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27664/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27664 - High (7.5)
A vulnerability has been identified in CPCI85 Central Processing/Communication (All versions < V26.10), SICORE Base system (All versions < V26.10.0). The affected application contains an out-of-bounds write vulnerability while parsing specia...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27664/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:30:47
2 posts
🟠 CVE-2026-2511 - High (7.5)
The JS Help Desk – AI-Powered Support & Ticketing System plugin for WordPress is vulnerable to SQL Injection via the `multiformid` parameter in the `storeTickets()` function in all versions up to, and including, 3.0.4. This is due to the user-su...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2511/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2511 - High (7.5)
The JS Help Desk – AI-Powered Support & Ticketing System plugin for WordPress is vulnerable to SQL Injection via the `multiformid` parameter in the `storeTickets()` function in all versions up to, and including, 3.0.4. This is due to the user-su...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2511/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:30:31
1 posts
🔴 CVE-2026-4700 - Critical (9.8)
Mitigation bypass in the Networking: HTTP component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4700/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:16:38.133000
1 posts
🟠 CVE-2026-33287 - High (7.5)
LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, the `replace_first` filter in LiquidJS uses JavaScript's `String.prototype.replace()` which interprets `$&` as a back reference to the ma...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33287/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:13:33.940000
1 posts
🟠 CVE-2026-20012 - High (8.6)
A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco IOS Software, Cisco IOS XE Software, Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, and Cisco Secure Firewall Threat Defense (FTD) Software could al...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20012/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:13:33.940000
1 posts
🟠 CVE-2026-20086 - High (8.6)
A vulnerability in the processing of Control and Provisioning of Wireless Access Points (CAPWAP) packets of Cisco IOS XE Wireless Controller Software for the Catalyst CW9800 Family could allow an unauthenticated, remote attacker to cause a denial ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20086/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:13:15.790000
3 posts
n8n Patches Critical Remote Code Execution and Credential Theft Vulnerabilities
n8n patched multiple vulnerabilities, including two critical RCE flaws (CVE-2026-33660 and CVE-2026-33696) and a credential theft issue that allow authenticated users to take over host systems or steal plaintext secrets.
**If you use n8n, update immediately to version 1.123.27, 2.13.3, or 2.14.1. These patches fix critical flaws that let anyone with workflow permissions take over your server and steal all stored credentials. If you can't update right away, restrict workflow creation permissions to only fully trusted users and disable the Merge and XML nodes via the NODES_EXCLUDE environment variable until you can patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/n8n-patches-critical-remote-code-execution-and-credential-theft-vulnerabilities-7-b-1-2-9/gD2P6Ple2L
n8n Patches Critical Remote Code Execution and Credential Theft Vulnerabilities
n8n patched multiple vulnerabilities, including two critical RCE flaws (CVE-2026-33660 and CVE-2026-33696) and a credential theft issue that allow authenticated users to take over host systems or steal plaintext secrets.
**If you use n8n, update immediately to version 1.123.27, 2.13.3, or 2.14.1. These patches fix critical flaws that let anyone with workflow permissions take over your server and steal all stored credentials. If you can't update right away, restrict workflow creation permissions to only fully trusted users and disable the Merge and XML nodes via the NODES_EXCLUDE environment variable until you can patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/n8n-patches-critical-remote-code-execution-and-credential-theft-vulnerabilities-7-b-1-2-9/gD2P6Ple2L
🚩 CRITICAL: CVE-2026-33696 in n8n-io n8n (CVSS 9.4) - Prototype pollution enables remote code execution via XML/GSuiteAdmin nodes. Patch to 2.14.1, 2.13.3, or 1.123.27+. Restrict permissions & disable XML node as temp fix. https://radar.offseq.com/threat/cve-2026-33696-cwe-1321-improperly-controlled-modi-9ddf2aba #OffSeq #n8n #CVE2026_33696
##updated 2026-03-26T15:13:15.790000
3 posts
n8n Patches Critical Remote Code Execution and Credential Theft Vulnerabilities
n8n patched multiple vulnerabilities, including two critical RCE flaws (CVE-2026-33660 and CVE-2026-33696) and a credential theft issue that allow authenticated users to take over host systems or steal plaintext secrets.
**If you use n8n, update immediately to version 1.123.27, 2.13.3, or 2.14.1. These patches fix critical flaws that let anyone with workflow permissions take over your server and steal all stored credentials. If you can't update right away, restrict workflow creation permissions to only fully trusted users and disable the Merge and XML nodes via the NODES_EXCLUDE environment variable until you can patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/n8n-patches-critical-remote-code-execution-and-credential-theft-vulnerabilities-7-b-1-2-9/gD2P6Ple2L
n8n Patches Critical Remote Code Execution and Credential Theft Vulnerabilities
n8n patched multiple vulnerabilities, including two critical RCE flaws (CVE-2026-33660 and CVE-2026-33696) and a credential theft issue that allow authenticated users to take over host systems or steal plaintext secrets.
**If you use n8n, update immediately to version 1.123.27, 2.13.3, or 2.14.1. These patches fix critical flaws that let anyone with workflow permissions take over your server and steal all stored credentials. If you can't update right away, restrict workflow creation permissions to only fully trusted users and disable the Merge and XML nodes via the NODES_EXCLUDE environment variable until you can patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/n8n-patches-critical-remote-code-execution-and-credential-theft-vulnerabilities-7-b-1-2-9/gD2P6Ple2L
⚠️ CRITICAL RCE in n8n (CVE-2026-33660): Auth'd users can exploit Merge node SQL to read files & execute code on n8n host. Patch to 2.14.1/2.13.3/1.123.26 ASAP. Limit permissions if you can't patch yet. https://radar.offseq.com/threat/cve-2026-33660-cwe-94-improper-control-of-generati-e1c73d20 #OffSeq #n8n #infosec #CVE202633660
##updated 2026-03-26T15:13:15.790000
2 posts
🟠 CVE-2026-4747 - High (8.8)
Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4747/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4747 - High (8.8)
Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4747/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:13:15.790000
2 posts
🛡️ HIGH-severity: CVE-2026-28760 in RATOC RAID Monitoring Manager for Windows (<2.00.009.260220) allows DLL hijacking — local attackers may run code as admin. Patch ASAP, restrict installer access, and audit installs. https://radar.offseq.com/threat/cve-2026-28760-uncontrolled-search-path-element-in-f4dfdefd #OffSeq #infosec #vuln #windows
##🟠 CVE-2026-28760 - High (7.8)
The installer of RATOC RAID Monitoring Manager for Windows searches the current directory to load certain DLLs. If a user is directed to place a crafted DLL with the installer, an arbitrary code may be executed with the administrator privilege.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28760/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:13:15.790000
1 posts
🟠 CVE-2026-30976 - High (8.6)
Sonarr is a PVR for Usenet and BitTorrent users. In versions on the 4.x branch prior to 4.0.17.2950, an unauthenticated remote attacker can potentially read any file readable by the Sonarr process. These include application configuration files (co...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30976/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T12:30:35
2 posts
🟠 CVE-2026-4862 - High (8.8)
A security vulnerability has been detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This issue affects the function strcpy of the file /goform/formConfigDnsFilterGlobal of the component Parameter Handler. Such manipulation of the argument Gr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4862/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4862 - High (8.8)
A security vulnerability has been detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This issue affects the function strcpy of the file /goform/formConfigDnsFilterGlobal of the component Parameter Handler. Such manipulation of the argument Gr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4862/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T12:30:35
4 posts
🔴 CVE-2026-4809 - Critical (9.8)
plank/laravel-mediable through version 6.4.0 can allow upload of a dangerous file type when an application using the package accepts or prefers a client-supplied MIME type during file upload handling. In that configuration, a remote attacker can s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4809/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL vuln in plank/laravel-mediable <=6.4.0 (CVE-2026-4809): attackers can upload malicious PHP files by spoofing MIME types. No patch yet. Disable client MIME trust & enforce server-side checks! Details: https://radar.offseq.com/threat/cve-2026-4809-cwe-434-unrestricted-upload-of-file--9d4d9e8e #OffSeq #CVE20264809 #Laravel #RCE
##🔴 CVE-2026-4809 - Critical (9.8)
plank/laravel-mediable through version 6.4.0 can allow upload of a dangerous file type when an application using the package accepts or prefers a client-supplied MIME type during file upload handling. In that configuration, a remote attacker can s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4809/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL vuln in plank/laravel-mediable <=6.4.0 (CVE-2026-4809): attackers can upload malicious PHP files by spoofing MIME types. No patch yet. Disable client MIME trust & enforce server-side checks! Details: https://radar.offseq.com/threat/cve-2026-4809-cwe-434-unrestricted-upload-of-file--9d4d9e8e #OffSeq #CVE20264809 #Laravel #RCE
##updated 2026-03-26T09:30:33
2 posts
HIGH severity alert: RATOC RAID Monitoring Manager for Windows (<2.00.009.260220) can leave custom install folders with insecure ACLs, letting non-admins run code as SYSTEM. Check permissions & update! CVE-2026-32680 https://radar.offseq.com/threat/cve-2026-32680-incorrect-default-permissions-in-ra-38982bf7 #OffSeq #Vuln #Windows #SysAdmin
##🟠 CVE-2026-32680 - High (7.8)
The installer of RATOC RAID Monitoring Manager for Windows allows to customize the installation folder. If the installation folder is customized to some non-default one, the folder may be left with un-secure ACLs and non-administrative users can a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32680/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T09:16:06.720000
2 posts
🟠 CVE-2026-4861 - High (8.8)
A weakness has been identified in Wavlink WL-NU516U1 260227. This vulnerability affects the function ftext of the file /cgi-bin/nas.cgi. This manipulation of the argument Content-Length causes stack-based buffer overflow. The attack can be initiat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4861/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4861 - High (8.8)
A weakness has been identified in Wavlink WL-NU516U1 260227. This vulnerability affects the function ftext of the file /cgi-bin/nas.cgi. This manipulation of the argument Content-Length causes stack-based buffer overflow. The attack can be initiat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4861/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T06:30:27
1 posts
🟠 CVE-2026-2931 - High (8.8)
The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 9.1.2. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and acce...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2931/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T05:16:40.840000
2 posts
🔥 CVE-2026-4840: HIGH-severity OS command injection in Netcore Power 15AX (≤3.0.0.6938). No patch, public exploit out. Remote code execution possible — immediate mitigation needed! Full compromise risk. Details: https://radar.offseq.com/threat/cve-2026-4840-os-command-injection-in-netcore-powe-abf3a5bc #OffSeq #Netcore #Security #CVE20264840
##🟠 CVE-2026-4840 - High (8.8)
A security flaw has been discovered in Netcore Power 15AX up to 3.0.0.6938. Affected by this issue is the function setTools of the file /bin/netis.cgi of the component Diagnostic Tool Interface. Performing a manipulation of the argument IpAddr res...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4840/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T03:30:34
1 posts
🔴 CVE-2026-4484 - Critical (9.8)
The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.6. This is due to the plugin allowing a user to update the user role through the 'InstructorsController::prepare_object_for_data...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4484/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T00:16:41.570000
1 posts
🟠 CVE-2026-4758 - High (8.8)
The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possibl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4758/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:58:57.220000
1 posts
🟠 CVE-2025-33247 - High (7.8)
NVIDIA Megatron LM contains a vulnerability in quantization configuration loading, which could allow remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33247/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:58:12.560000
1 posts
🟠 CVE-2026-24150 - High (7.8)
NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of priv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24150/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:33:33
1 posts
🔴 New security advisory:
CVE-2026-33286 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-33286-graphiti-arbitrary-method-execution
updated 2026-03-25T21:31:40
1 posts
🔴 CVE-2026-32536 - Critical (9.9)
Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green Downloads halfdata-paypal-green-downloads allows Using Malicious Files.This issue affects Green Downloads: from n/a through <= 2.08.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32536/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:31:39
1 posts
🟠 CVE-2026-32538 - High (7.5)
Insertion of Sensitive Information Into Sent Data vulnerability in Noor Alam SMTP Mailer smtp-mailer allows Retrieve Embedded Sensitive Data.This issue affects SMTP Mailer: from n/a through <= 1.1.24.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32538/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:31:39
2 posts
🔴 CVE-2026-25447 - Critical (9.1)
Improper Control of Generation of Code ('Code Injection') vulnerability in Jonathan Daggerhart Widget Wrangler widget-wrangler allows Code Injection.This issue affects Widget Wrangler: from n/a through <= 2.3.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25447/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25447 - Critical (9.1)
Improper Control of Generation of Code ('Code Injection') vulnerability in Jonathan Daggerhart Widget Wrangler widget-wrangler allows Code Injection.This issue affects Widget Wrangler: from n/a through <= 2.3.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25447/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:31:39
2 posts
🟠 CVE-2026-32546 - High (7.5)
Missing Authorization vulnerability in StellarWP Restrict Content restrict-content allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Content: from n/a through <= 3.2.22.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32546/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-32546 - High (7.5)
Missing Authorization vulnerability in StellarWP Restrict Content restrict-content allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Content: from n/a through <= 3.2.22.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32546/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:31:38
1 posts
🟠 CVE-2026-25001 - High (8.5)
Improper Control of Generation of Code ('Code Injection') vulnerability in Saad Iqbal Post Snippets post-snippets allows Remote Code Inclusion.This issue affects Post Snippets: from n/a through <= 4.0.12.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25001/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:31:33
1 posts
1 repos
https://github.com/zeroxjf/CVE-2026-20687-AppleSEPKeyStore-UAF
CVE-2026-20687 (CRITICAL): Use-after-free in Apple iOS/iPadOS/macOS/tvOS/watchOS lets malicious apps crash devices or write kernel memory. Patch to iOS/iPadOS 18.7.7/26.4, macOS Sequoia 15.7.5, Tahoe 26.4+ ASAP. https://radar.offseq.com/threat/cve-2026-20687-an-app-may-be-able-to-cause-unexpec-a39ac789 #OffSeq #AppleSecurity #InfoSec
##updated 2026-03-25T21:30:36
1 posts
🟠 CVE-2026-32531 - High (8.1)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in gavias Kunco kunco allows PHP Local File Inclusion.This issue affects Kunco: from n/a through < 1.4.5.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32531/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:36
1 posts
🟠 CVE-2026-32534 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk js-support-ticket allows Blind SQL Injection.This issue affects JS Help Desk: from n/a through <= 3.0.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32534/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:36
1 posts
🔴 CVE-2026-32539 - Critical (9.3)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PublishPress PublishPress Revisions revisionary allows Blind SQL Injection.This issue affects PublishPress Revisions: from n/a through <= 3.7.23.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32539/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:35
2 posts
🔴 CVE-2026-27044 - Critical (9.9)
Improper Control of Generation of Code ('Code Injection') vulnerability in TotalSuite Total Poll Lite totalpoll-lite allows Remote Code Inclusion.This issue affects Total Poll Lite: from n/a through <= 4.12.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27044/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-27044 - Critical (9.9)
Improper Control of Generation of Code ('Code Injection') vulnerability in TotalSuite Total Poll Lite totalpoll-lite allows Remote Code Inclusion.This issue affects Total Poll Lite: from n/a through <= 4.12.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27044/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:28
1 posts
🟠 CVE-2026-4719 - High (7.5)
Incorrect boundary conditions in the Graphics: Text component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4719/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:27
1 posts
🔴 CVE-2026-4705 - Critical (9.8)
Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4705/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:27
1 posts
🟠 CVE-2026-4704 - High (7.5)
Denial-of-service in the WebRTC: Signaling component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4704/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:27:44
2 posts
🚨 CRITICAL: CVE-2026-33701 affects opentelemetry-java-instrumentation <2.26.1. Unauthenticated RCE possible on Java ≤16 via unsafe RMI deserialization. Upgrade to 2.26.1+ or disable RMI now! Details: https://radar.offseq.com/threat/cve-2026-33701-cwe-502-deserialization-of-untruste-08578920 #OffSeq #Java #RCE #Vuln
##🚨 CRITICAL: CVE-2026-33701 affects opentelemetry-java-instrumentation <2.26.1. Unauthenticated RCE possible on Java ≤16 via unsafe RMI deserialization. Upgrade to 2.26.1+ or disable RMI now! Details: https://radar.offseq.com/threat/cve-2026-33701-cwe-502-deserialization-of-untruste-08578920 #OffSeq #Java #RCE #Vuln
##updated 2026-03-25T21:16:46.153000
1 posts
🟠 CVE-2026-32537 - High (7.5)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nK Visual Portfolio, Photo Gallery & Post Grid visual-portfolio allows PHP Local File Inclusion.This issue affects Visual Port...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32537/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:16:42.990000
1 posts
🟠 CVE-2026-32513 - High (8.8)
Deserialization of Untrusted Data vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows Object Injection.This issue affects JS Archive List: from n/a through <= 6.1.7.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32513/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T20:16:37.020000
1 posts
🔴 CVE-2026-4716 - Critical (9.1)
Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4716/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T20:16:36.063000
1 posts
🔴 CVE-2026-4702 - Critical (9.8)
JIT miscompilation in the JavaScript Engine component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4702/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T20:16:32.050000
2 posts
🚨 CRITICAL: CVE-2026-32573 in Nelio AB Testing plugin (≤8.2.7) enables code injection on WordPress sites. No active exploits, but risk of remote code execution. Monitor for patches & harden configs. https://radar.offseq.com/threat/cve-2026-32573-improper-control-of-generation-of-c-2c0edccd #OffSeq #WordPress #Vuln
##🔴 CVE-2026-32573 - Critical (9.1)
Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Code Injection.This issue affects Nelio AB Testing: from n/a through <= 8.2.7.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32573/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T20:16:30.967000
1 posts
🔴 CVE-2026-32525 - Critical (9.9)
Improper Control of Generation of Code ('Code Injection') vulnerability in jetmonsters JetFormBuilder jetformbuilder allows Code Injection.This issue affects JetFormBuilder: from n/a through <= 3.5.6.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32525/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T20:16:26.550000
1 posts
🔴 CVE-2026-25366 - Critical (9.9)
Improper Control of Generation of Code ('Code Injection') vulnerability in Themeisle Woody ad snippets insert-php allows Code Injection.This issue affects Woody ad snippets: from n/a through <= 2.7.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25366/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T20:01:05
2 posts
🟠 CVE-2026-33686 - High (8.8)
Sharp is a content management framework built for Laravel as a package. Versions prior to 9.20.0 have a path traversal vulnerability in the FileUtil class. The application fails to sanitize file extensions properly, allowing path separators to be...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33686/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33686 - High (8.8)
Sharp is a content management framework built for Laravel as a package. Versions prior to 9.20.0 have a path traversal vulnerability in the FileUtil class. The application fails to sanitize file extensions properly, allowing path separators to be...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33686/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T19:36:23
4 posts
🚨 CVE-2026-33669: SiYuan (<3.6.2) has a CRITICAL out-of-bounds read flaw (CVSS 9.8). No auth/user interaction needed — remote attackers can leak sensitive memory. Upgrade to 3.6.2 ASAP! https://radar.offseq.com/threat/cve-2026-33669-cwe-125-out-of-bounds-read-in-siyua-064aace2 #OffSeq #Vulnerability #SiYuan #Cybersecurity
##🔴 CVE-2026-33669 - Critical (9.8)
SiYuan is a personal knowledge management system. Prior to version 3.6.2, document IDs were retrieved via the /api/file/readDir interface, and then the /api/block/getChildBlocks interface was used to view the content of all documents. Version 3.6....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33669/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-33669: SiYuan (<3.6.2) has a CRITICAL out-of-bounds read flaw (CVSS 9.8). No auth/user interaction needed — remote attackers can leak sensitive memory. Upgrade to 3.6.2 ASAP! https://radar.offseq.com/threat/cve-2026-33669-cwe-125-out-of-bounds-read-in-siyua-064aace2 #OffSeq #Vulnerability #SiYuan #Cybersecurity
##🔴 CVE-2026-33669 - Critical (9.8)
SiYuan is a personal knowledge management system. Prior to version 3.6.2, document IDs were retrieved via the /api/file/readDir interface, and then the /api/block/getChildBlocks interface was used to view the content of all documents. Version 3.6....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33669/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T19:30:09
2 posts
🟠 CVE-2026-33661 - High (8.6)
Pay is an open-source payment SDK extension package for various Chinese payment services. Prior to version 3.7.20, the `verify_wechat_sign()` function in `src/Functions.php` unconditionally skips all signature verification when the PSR-7 request r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33661/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33661 - High (8.6)
Pay is an open-source payment SDK extension package for various Chinese payment services. Prior to version 3.7.20, the `verify_wechat_sign()` function in `src/Functions.php` unconditionally skips all signature verification when the PSR-7 request r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33661/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T19:16:52.517000
1 posts
🟠 CVE-2026-4712 - High (7.5)
Information disclosure in the Widget: Cocoa component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4712/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T18:32:08
3 posts
🟠 CVE-2026-3988 - High (7.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3988/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3988 - High (7.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3988/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3988 - High (7.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3988/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T18:32:07
3 posts
🟠 CVE-2026-3857 - High (8.1)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3857/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3857 - High (8.1)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3857/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3857 - High (8.1)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3857/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T18:31:51
1 posts
🟠 CVE-2026-20084 - High (8.6)
A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause BOOTP packets to be forwarded between VLANs, resulting in a denial of service (DoS) condition.
This vulnerability is...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20084/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T18:31:51
1 posts
🟠 CVE-2026-20125 - High (7.7)
A vulnerability in the HTTP Server feature of Cisco IOS Software and Cisco IOS XE Software Release 3E could allow an authenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) conditio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20125/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T18:31:51
1 posts
1 repos
🔴 CVE-2026-26832 - Critical (9.8)
node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tesseract OCR. In all versions through 2.2.1, the recognize() function in src/index.js is vulnerable to OS Command Injection. The file path parameter is concatenated into a s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26832/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T18:31:43
1 posts
🚨 CVE-2026-3608: HIGH-severity vuln in ISC Kea DHCP (2.6.0 – 2.6.4, 3.0.0 – 3.0.2). Remote attackers can crash daemons, causing DoS. Restrict API/HA access, monitor traffic, and prep failover. Details: https://radar.offseq.com/threat/cve-2026-3608-cwe-617-reachable-assertion-in-isc-k-fed4f439 #OffSeq #CVE #DHCP #Infosec
##updated 2026-03-25T17:40:53
1 posts
🟠 CVE-2026-33285 - High (7.5)
LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, LiquidJS's `memoryLimit` security mechanism can be completely bypassed by using reverse range expressions (e.g., `(100000000..1)`), allow...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33285/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T17:17:10.453000
1 posts
🟠 CVE-2026-4713 - High (7.5)
Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4713/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T17:07:53
1 posts
🟠 CVE-2026-27889 - High (7.5)
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Starting in version 2.2.0 and prior to versions 2.11.14 and 2.12.5, a missing sanity check on a WebSockets frame could trigger a server panic in the na...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27889/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T15:41:58.280000
3 posts
NVIDIA Patches Multiple Flaws Including Critical RCE Vulnerability in Apex AI Optimization Library
NVIDIA's March 2026 security bulletins address multiple vulnerabilities across its AI and infrastructure products including CVE-2025-33244, a critical deserialization flaw in NVIDIA Apex that could allow remote code execution, privilege escalation, and full compromise of AI training pipelines.
**If you're running NVIDIA AI tools like Apex, Triton, NeMo, or Megatron, check the March 2026 security bulletins and apply all available patches immediately — several of these flaws are high-severity and could let attackers take over your AI pipelines. Subscribe to NVIDIA's security advisories so you don't miss future updates, and prioritize patching any internet-facing or shared infrastructure components first.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/nvidia-patches-multiple-flaws-including-critical-rce-vulnerability-in-apex-ai-optimization-library-j-a-i-f-t/gD2P6Ple2L
NVIDIA Patches Multiple Flaws Including Critical RCE Vulnerability in Apex AI Optimization Library
NVIDIA's March 2026 security bulletins address multiple vulnerabilities across its AI and infrastructure products including CVE-2025-33244, a critical deserialization flaw in NVIDIA Apex that could allow remote code execution, privilege escalation, and full compromise of AI training pipelines.
**If you're running NVIDIA AI tools like Apex, Triton, NeMo, or Megatron, check the March 2026 security bulletins and apply all available patches immediately — several of these flaws are high-severity and could let attackers take over your AI pipelines. Subscribe to NVIDIA's security advisories so you don't miss future updates, and prioritize patching any internet-facing or shared infrastructure components first.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/nvidia-patches-multiple-flaws-including-critical-rce-vulnerability-in-apex-ai-optimization-library-j-a-i-f-t/gD2P6Ple2L
🔴 CVE-2025-33244 - Critical (9)
NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker could cause a deserialization of untrusted data. This vulnerability affects environments that use PyTorch versions earlier than 2.6. A successful exploit of this vulnera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33244/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T15:41:58.280000
1 posts
Pharos Controls Patches Critical Root Access Flaw in Mosaic Show Controllers
Pharos Controls patched a critical vulnerability (CVE-2026-2417) in its Mosaic Show Controller that allows unauthenticated attackers to execute arbitrary commands with root privileges.
**Make sure all Pharos Mosaic Show Controllers are isolated from the internet and accessible from trusted networks only. Check your version, if you are running 2.15.3, you are at risk. Plan an update the firmware to version 2.16 or later.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/pharos-controls-patches-critical-root-access-flaw-in-mosaic-show-controllers-1-6-s-3-0/gD2P6Ple2L
updated 2026-03-25T15:41:58.280000
1 posts
🟠 CVE-2026-24157 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24157/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T15:41:58.280000
1 posts
🟠 CVE-2026-24141 - High (7.8)
NVIDIA Model Optimizer for Windows and Linux contains a vulnerability in the ONNX quantization feature, where a user could cause unsafe deserialization by providing a specially crafted input file. A successful exploit of this vulnerability might l...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24141/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T15:41:33.977000
1 posts
⚠️ HIGH: CVE-2026-2343 in PeproDev Ultimate Invoice ≤2.2.5 exposes PII via predictable ZIP archive names in bulk downloads. No auth needed — risk of mass data leaks! Disable feature, restrict access, monitor logs. https://radar.offseq.com/threat/cve-2026-2343-cwe-200-information-exposure-in-pepr-b24bfe87 #OffSeq #WordPress #Vuln
##updated 2026-03-25T15:32:30
1 posts
🔒 CVE-2026-28864 (HIGH): Local attackers can access Apple Keychain items on iOS, iPadOS, macOS, visionOS, watchOS. Patch to latest OS releases now to protect credentials. No known exploits yet. https://radar.offseq.com/threat/cve-2026-28864-a-local-attacker-may-gain-access-to-881070fb #OffSeq #Apple #Security #Keychain
##updated 2026-03-25T15:31:37
1 posts
🟠 CVE-2026-3104 - High (7.5)
A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain.
This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1.
BIND 9 versions 9...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3104/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T15:31:37
1 posts
2 repos
🔴 CVE-2026-26830 - Critical (9.8)
pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shel...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T15:31:36
1 posts
🟠 CVE-2026-1519 - High (7.5)
If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1519/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T14:16:39.213000
1 posts
🔴 CVE-2026-4725 - Critical (10)
Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4725/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T14:16:38.597000
1 posts
🔴 CVE-2026-4717 - Critical (9.8)
Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T06:30:35
1 posts
⚠️ CVE-2026-26306 (HIGH): OM Workspace (Windows ≤2.4) vulnerable to DLL hijacking. Local attackers can execute code via unsafe installer DLL loading. Patch urgently or restrict installs & use Safe DLL Search Mode. https://radar.offseq.com/threat/cve-2026-26306-uncontrolled-search-path-element-in-ee774158 #OffSeq #Vulnerability #Windows
##updated 2026-03-25T03:31:40
1 posts
⚠️ HIGH-severity XSS (CVE-2026-2072, CVSS 8.2) in Hitachi Infrastructure Analytics Advisor & Ops Center Analyzer <11.0.5-00. Exploitable by low-privilege users. Patch when available, restrict access, enable WAF. https://radar.offseq.com/threat/cve-2026-2072-cwe-79-improper-neutralization-of-in-c6f3add7 #OffSeq #XSS #Vuln #Hitachi
##updated 2026-03-24T21:42:11
2 posts
🟠 CVE-2026-33216 - High (8.6)
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, for MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33216/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33216 - High (8.6)
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, for MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33216/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:32:29
1 posts
🔴 CVE-2026-4723 - Critical (9.8)
Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 149.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4723/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:32:28
1 posts
🔴 CVE-2026-4701 - Critical (9.8)
Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4701/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:32:28
1 posts
🔴 CVE-2026-4715 - Critical (9.1)
Uninitialized memory in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4715/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:32:28
1 posts
🟠 CVE-2026-4714 - High (7.5)
Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4714/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:32:28
1 posts
🔴 CVE-2026-4711 - Critical (9.8)
Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4711/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:36
1 posts
🟠 CVE-2025-33254 - High (7.5)
NVIDIA Triton Inference Server contains a vulnerability where an attacker may cause internal state corruption. A successful exploit of this vulnerability may lead to a denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33254/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:35
1 posts
🟠 CVE-2025-33248 - High (7.8)
NVIDIA Megatron-LM contains a vulnerability in the hybrid conversion script where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33248/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:35
1 posts
🟠 CVE-2025-33238 - High (7.5)
NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability where an attacker may cause an exception. A successful exploit of this vulnerability may lead to denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33238/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:35
1 posts
🟠 CVE-2026-24158 - High (7.5)
NVIDIA Triton Inference Server contains a vulnerability in the HTTP endpoint where an attacker may cause a denial of service by providing a large compressed payload. A successful exploit of this vulnerability may lead to denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24158/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:35
1 posts
🟠 CVE-2026-24152 - High (7.8)
NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of priv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24152/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:35
1 posts
🟠 CVE-2026-24151 - High (7.8)
NVIDIA Megatron-LM contains a vulnerability in inferencing where an Attacker may cause an RCE by convincing a user to load a maliciously crafted input. A successful exploit of this vulnerability may lead to code execution, escalation of privileges...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24151/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:35
1 posts
🟠 CVE-2026-24159 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where an attacker may cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and data tampering.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24159/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:29:09
2 posts
🟠 CVE-2026-29785 - High (7.5)
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29785/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29785 - High (7.5)
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29785/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T17:53:15
5 posts
1 repos
CISA adds CVE-2026-33634 (Trivy) to KEV - active exploitation confirmed.
If it’s in KEV, it’s already a threat.
💬 Is KEV your top patch priority?
🔔 Follow TechNadu
🚨 [CISA-2026:0326] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0326)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-33634 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-33634)
- Name: Aquasecurity Trivy Embedded Malicious Code Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Aquasecurity
- Product: Trivy
- Notes: This vulnerability involves a supply‑chain compromise in a product that may be used across multiple products and environments. Additional vendor‑provided guidance must be followed to ensure full remediation. For more information, please see: https://github.com/advisories/GHSA-69fq-xp46-6x23 ; https://nvd.nist.gov/vuln/detail/CVE-2026-33634
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260326 #cisa20260326 #cve_2026_33634 #cve202633634
##CISA adds CVE-2026-33634 (Trivy) to KEV - active exploitation confirmed.
If it’s in KEV, it’s already a threat.
💬 Is KEV your top patch priority?
🔔 Follow TechNadu
🚨 [CISA-2026:0326] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0326)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-33634 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-33634)
- Name: Aquasecurity Trivy Embedded Malicious Code Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Aquasecurity
- Product: Trivy
- Notes: This vulnerability involves a supply‑chain compromise in a product that may be used across multiple products and environments. Additional vendor‑provided guidance must be followed to ensure full remediation. For more information, please see: https://github.com/advisories/GHSA-69fq-xp46-6x23 ; https://nvd.nist.gov/vuln/detail/CVE-2026-33634
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260326 #cisa20260326 #cve_2026_33634 #cve202633634
##CVE ID: CVE-2026-33634
Vendor: Aquasecurity
Product: Trivy
Date Added: 2026-03-26
Notes: This vulnerability involves a supply‑chain compromise in a product that may be used across multiple products and environments. Additional vendor‑provided guidance must be followed to ensure full remediation. For more information, please see: https://github.com/advisories/GHSA-69fq-xp46-6x23 ; https://nvd.nist.gov/vuln/detail/CVE-2026-33634
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-33634
updated 2026-03-24T16:17:11.623000
1 posts
updated 2026-03-24T15:54:09.400000
1 posts
Zwei kritische Schwachstellen beherrschen die Lage für deutsche Unternehmen.
Das BSI warnt vor einer aktiv ausgenutzten Lücke in Microsoft SharePoint. Die CISA hatte die Schwachstelle am 18. März in ihren Katalog ausgenutzter Sicherheitslücken aufgenommen. CERT-EU veröffentlichte am 25. März ein Advisory und verwies auf Maßnahmen aus der ToolShell-Angriffskampagne des Vorjahres. Der CVSS-Score liegt bei 9.8 von 10 und wurde hochgestuft, nachdem sich herausstellte, dass eine Ausnutzung auch ohne Authentifizierung möglich ist.
Parallel dazu hat CERT-Bund am 24. März Alarm wegen zweier Schwachstellen in Citrix NetScaler ADC und NetScaler Gateway geschlagen. CVE-2026-3055 ermöglicht es nicht authentifizierten Angreifern, aktive Session-Token aus dem Speicher betroffener Geräte auszulesen. CVE-2026-4368 kann durch eine Race Condition zur Übernahme fremder Benutzersitzungen führen. Besonders gefährdet sind Systeme, die als SAML Identity Provider konfiguriert sind, also eine in Unternehmensumgebungen weit verbreitete Konfiguration für Single Sign-On. Sicherheitsforscher bewerten eine baldige aktive Ausnutzung als sehr wahrscheinlich.
Sofortmaßnahmen: SharePoint patchen, NetScaler aktualisieren und aktiven Sessions beenden.
Cybersicherheitswarnung 2026-238220-1032 (25.03.2026) | CERT-Bund WID-SEC-2026-0836 (24.03.2026)
CVE-2026-20963 | CVE-2026-3055 | CVE-2026-4368
#Informationssicherheit #CISO #BSI #SharePoint #Citrix #NetScaler #Patchmanagement #NIS2 #CyberSecurity #ITSicherheit
updated 2026-03-24T15:54:09.400000
4 posts
Zwei kritische Schwachstellen beherrschen die Lage für deutsche Unternehmen.
Das BSI warnt vor einer aktiv ausgenutzten Lücke in Microsoft SharePoint. Die CISA hatte die Schwachstelle am 18. März in ihren Katalog ausgenutzter Sicherheitslücken aufgenommen. CERT-EU veröffentlichte am 25. März ein Advisory und verwies auf Maßnahmen aus der ToolShell-Angriffskampagne des Vorjahres. Der CVSS-Score liegt bei 9.8 von 10 und wurde hochgestuft, nachdem sich herausstellte, dass eine Ausnutzung auch ohne Authentifizierung möglich ist.
Parallel dazu hat CERT-Bund am 24. März Alarm wegen zweier Schwachstellen in Citrix NetScaler ADC und NetScaler Gateway geschlagen. CVE-2026-3055 ermöglicht es nicht authentifizierten Angreifern, aktive Session-Token aus dem Speicher betroffener Geräte auszulesen. CVE-2026-4368 kann durch eine Race Condition zur Übernahme fremder Benutzersitzungen führen. Besonders gefährdet sind Systeme, die als SAML Identity Provider konfiguriert sind, also eine in Unternehmensumgebungen weit verbreitete Konfiguration für Single Sign-On. Sicherheitsforscher bewerten eine baldige aktive Ausnutzung als sehr wahrscheinlich.
Sofortmaßnahmen: SharePoint patchen, NetScaler aktualisieren und aktiven Sessions beenden.
Cybersicherheitswarnung 2026-238220-1032 (25.03.2026) | CERT-Bund WID-SEC-2026-0836 (24.03.2026)
CVE-2026-20963 | CVE-2026-3055 | CVE-2026-4368
#Informationssicherheit #CISO #BSI #SharePoint #Citrix #NetScaler #Patchmanagement #NIS2 #CyberSecurity #ITSicherheit
March 26 Advisory: Citrix NetScaler ADC and Gateway Out-of-Bounds Read Vulnerability [CVE-2026-3055] - Censys
##CVE-2026-3055 : appliquez ce patch Citrix avant qu’il ne soit trop tard https://www.it-connect.fr/cve-2026-3055-appliquez-ce-patch-citrix-avant-quil-ne-soit-trop-tard/ #ActuCybersécurité #Vulnérabilités #Cybersécurité
##Aww yiss another critical Citrix vuln.
Detection/remediation details here: https://docs.netscaler.com/en-us/netscaler-console-service/instance-advisory/remediate-vulnerabilities-cve-2026-3055
##updated 2026-03-24T15:53:48.067000
2 posts
Rails released security patches for versions 7.2, 8.0, and 8.1 this week, addressing 10 vulnerabilities. The list includes XSS vulnerabilities in Action Pack debug exceptions and Action View tag helpers, DoS vulnerabilities in Active Storage (range requests) and Active Support (number formatting), plus path traversal and glob injection issues in Active Storage DiskService
The most interesting one for me is CVE-2026-33167 - XSS via debug exceptions in development mode. Interesting attack vector!
##Rails released security patches for versions 7.2, 8.0, and 8.1 this week, addressing 10 vulnerabilities. The list includes XSS vulnerabilities in Action Pack debug exceptions and Action View tag helpers, DoS vulnerabilities in Active Storage (range requests) and Active Support (number formatting), plus path traversal and glob injection issues in Active Storage DiskService
The most interesting one for me is CVE-2026-33167 - XSS via debug exceptions in development mode. Interesting attack vector!
##updated 2026-03-24T15:53:48.067000
3 posts
🚨 CRITICAL: CISA flags CVE-2026-4681 in PTC Windchill PLM. German police issued physical warnings — high urgency! No active exploits, but risk to manufacturing & engineering data is severe. Audit & secure now. https://radar.offseq.com/threat/cisa-flags-critical-ptc-vulnerability-that-had-ger-e5854258 #OffSeq #Vulnerability #PLM #InfoSec
##🚨 CRITICAL: CISA flags CVE-2026-4681 in PTC Windchill PLM. German police issued physical warnings — high urgency! No active exploits, but risk to manufacturing & engineering data is severe. Audit & secure now. https://radar.offseq.com/threat/cisa-flags-critical-ptc-vulnerability-that-had-ger-e5854258 #OffSeq #Vulnerability #PLM #InfoSec
##PTC Warns of Imminent RCE Threat in Windchill and FlexPLM Systems
PTC reports a critical RCE vulnerability (CVE-2026-4681) in Windchill and FlexPLM software, leading to emergency warnings from German police due to an imminent threat of exploitation.
**If you're running PTC Windchill or FlexPLM, make sure these systems are isolated from the internet and accessible from trusted networks only. This one is a perfect 10.0 severity with no patch yet, so apply the recommended rewrite rules to block the WindchillGW and WindchillAuthGW servlet paths immediately. Also check your servers for signs of compromise like GW.class, payload.bin, or dpr_*.jsp files, and if you can't apply the workarounds, shut down the affected services until PTC releases an official patch.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/ptc-warns-of-imminent-rce-threat-in-windchill-and-flexplm-systems-8-k-p-i-c/gD2P6Ple2L
updated 2026-03-24T06:31:20
1 posts
🚨 CRITICAL: CVE-2026-4283 in WP DSGVO Tools (GDPR) plugin allows unauthenticated attackers to irreversibly destroy non-admin accounts via 'super-unsubscribe' AJAX. All versions ≤3.1.38 affected. Remove '[unsubscribe_form]' & monitor for abuse. https://radar.offseq.com/threat/cve-2026-4283-cwe-862-missing-authorization-in-leg-b0b3a8d9 #OffSeq #WordPress #Infosec
##updated 2026-03-23T21:30:57
2 posts
1 repos
strongSwan CVE-2026-25075: Integer Underflow in VPN Authentication
https://bishopfox.com/blog/strongswan-cve-2026-25075-integer-underflow-in-vpn-authentication
Short summary: https://hackerworkspace.com/article/strongswan-cve-2026-25075-integer-underflow-in-vpn-authentication
##strongSwan CVE-2026-25075: Integer Underflow in VPN Authentication
https://bishopfox.com/blog/strongswan-cve-2026-25075-integer-underflow-in-vpn-authentication
Short summary: https://hackerworkspace.com/article/strongswan-cve-2026-25075-integer-underflow-in-vpn-authentication
##updated 2026-03-23T18:30:39
1 posts
Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.
https://feedly.com/cve/CVE-2026-15518 and https://feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations
https://feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access
##updated 2026-03-23T18:30:39
1 posts
TP-Link Patches Multiple Flaws Including Authentication Bypass in Archer NX Routers
TP-Link patched four high-severity vulnerabilities in its Archer NX router series, including a authentication bypass (CVE-2025-15517) that allows unauthenticated attackers to upload malicious firmware and take full control of the device.
**If you own a TP-Link Archer NX router (NX600, NX500, NX210, or NX200), make sure it is isolated from the internet and accessible from trusted networks only. Then plan a quick patch to the latest firmware from the official TP-Link Support portal for your specific hardware version. Disable remote management and ensure the admin interface is only reachable from your internal network.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/tp-link-patches-multiple-flaws-including-authentication-bypass-in-archer-nx-routers-7-i-6-1-m/gD2P6Ple2L
updated 2026-03-23T14:16:33.017000
3 posts
5 repos
https://github.com/watchtowrlabs/watchtowr-vs-telnetd-CVE-2026-32746
https://github.com/danindiana/cve-2026-32746-mitigation
https://github.com/jeffaf/cve-2026-32746
A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils CVE-2026-32746) https://lobste.rs/s/udbivp #c #security
https://labs.watchtowr.com/a-32-year-old-bug-walks-into-a-telnet-server-gnu-inetutils-telnetd-cve-2026-32746/
##Yes, the vulnerability is so old, it dates from a time when networks charged on a ‘per-packet basis’.
enjoyed this telnetd analysis. (if you can’t believe anyone has a legitimate operational reason to run telnet, you live in a cozy world indeed) https://labs.watchtowr.com/a-32-year-old-bug-walks-into-a-telnet-server-gnu-inetutils-telnetd-cve-2026-32746/
##updated 2026-03-23T09:30:29
2 posts
1 repos
Critical Hidden Functionality Vulnerability in WAGO Industrial Managed Switches
WAGO reports a critical CVSS 10.0 vulnerability (CVE-2026-3587) in its industrial managed switches that allows unauthenticated remote attackers to escape the CLI and gain full device control. The flaw affects numerous models used in critical infrastructure.
**Make sure all WAGO managed switches (Lean and Industrial series) are isolated from the internet and accessible from trusted networks only. Then update the firmware to the latest "S1" patched versions if you can't patch immediately, disable SSH and Telnet so the command line is only reachable through a physical connection on the device itself.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-hidden-functionality-vulnerability-in-wago-industrial-managed-switches-z-2-4-s-8/gD2P6Ple2L
Critical Hidden Functionality Vulnerability in WAGO Industrial Managed Switches
WAGO reports a critical CVSS 10.0 vulnerability (CVE-2026-3587) in its industrial managed switches that allows unauthenticated remote attackers to escape the CLI and gain full device control. The flaw affects numerous models used in critical infrastructure.
**Make sure all WAGO managed switches (Lean and Industrial series) are isolated from the internet and accessible from trusted networks only. Then update the firmware to the latest "S1" patched versions if you can't patch immediately, disable SSH and Telnet so the command line is only reachable through a physical connection on the device itself.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-hidden-functionality-vulnerability-in-wago-industrial-managed-switches-z-2-4-s-8/gD2P6Ple2L
updated 2026-03-20T21:02:35
2 posts
🟠 CVE-2026-33487 - High (7.5)
goxmlsig provides XML Digital Signatures implemented in Go. Prior to version 1.6.0, the `validateSignature` function in `validate.go` goes through the references in the `SignedInfo` block to find one that matches the signed element's ID. In Go ver...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33487/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33487 - High (7.5)
goxmlsig provides XML Digital Signatures implemented in Go. Prior to version 1.6.0, the `validateSignature` function in `validate.go` goes through the references in the `SignedInfo` block to find one that matches the signed element's ID. In Go ver...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33487/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-20T20:51:08
2 posts
🟠 CVE-2026-33496 - High (8.1)
ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Versions prior to 26.2.0 are vulnerable to authentication bypass due to cache key confusion. The `oaut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33496/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33496 - High (8.1)
ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Versions prior to 26.2.0 are vulnerable to authentication bypass due to cache key confusion. The `oaut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33496/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-20T20:48:35
2 posts
🟠 CVE-2026-33442 - High (8.1)
Kysely is a type-safe TypeScript SQL query builder. In versions 0.28.12 and 0.28.13, the `sanitizeStringLiteral` method in Kysely's query compiler escapes single quotes (`'` → `''`) but does not escape backslashes. On MySQL with the default `BAC...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33442/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33442 - High (8.1)
Kysely is a type-safe TypeScript SQL query builder. In versions 0.28.12 and 0.28.13, the `sanitizeStringLiteral` method in Kysely's query compiler escapes single quotes (`'` → `''`) but does not escape backslashes. On MySQL with the default `BAC...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33442/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-20T20:48:15
2 posts
🟠 CVE-2026-33413 - High (8.8)
etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, unauthorized users may bypass authentication or authorization checks and call certain etcd functions in clusters that expose t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33413/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33413 - High (8.8)
etcd is a distributed key-value store for the data of a distributed system. Prior to versions 3.4.42, 3.5.28, and 3.6.9, unauthorized users may bypass authentication or authorization checks and call certain etcd functions in clusters that expose t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33413/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-20T18:32:18
1 posts
@gknauss I think the thing is to move to 18.7.3, which is patched.
For devices running versions of iOS prior to 18.6, DarkSword uses CVE-2025-31277, a JIT optimization/type confusion bug which was patched by Apple in iOS 18.6. For devices running iOS 18.6-18.7, DarkSword uses CVE-2025-43529, a garbage collection bug in the Data Flow Graph (DFG) JIT layer of JavaScriptCore which was patched by Apple in iOS 18.7.3 and 26.2 after it was reported by GTIG. Both exploits develop their own fakeobj/addrof primitives, and then build arbitrary read/write primitives the same way on top of them.
I'm unaware of a compelling reason or hardware limitation to not upgrade from 18.6 to 18.7
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/
##updated 2026-03-19T18:32:21
2 posts
3 repos
https://github.com/sak110/CVE-2026-20131
Grab a coffee. Cisco has a long list of advisories today, one is critical, several are high-severity.
This was first published on March 4:
Critical: CVE-2026-20131: Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh
More: https://sec.cloudapps.cisco.com/security/center/publicationListing.x @TalosSecurity
Also, Cisco has tagged GeoVision and MediaArea for zero-day reports https://talosintelligence.com/vulnerability_info #Zeroday #Cisco #infosec #vulnerability
##updated 2026-03-19T13:09:24.293000
1 posts
Zwei kritische Schwachstellen beherrschen die Lage für deutsche Unternehmen.
Das BSI warnt vor einer aktiv ausgenutzten Lücke in Microsoft SharePoint. Die CISA hatte die Schwachstelle am 18. März in ihren Katalog ausgenutzter Sicherheitslücken aufgenommen. CERT-EU veröffentlichte am 25. März ein Advisory und verwies auf Maßnahmen aus der ToolShell-Angriffskampagne des Vorjahres. Der CVSS-Score liegt bei 9.8 von 10 und wurde hochgestuft, nachdem sich herausstellte, dass eine Ausnutzung auch ohne Authentifizierung möglich ist.
Parallel dazu hat CERT-Bund am 24. März Alarm wegen zweier Schwachstellen in Citrix NetScaler ADC und NetScaler Gateway geschlagen. CVE-2026-3055 ermöglicht es nicht authentifizierten Angreifern, aktive Session-Token aus dem Speicher betroffener Geräte auszulesen. CVE-2026-4368 kann durch eine Race Condition zur Übernahme fremder Benutzersitzungen führen. Besonders gefährdet sind Systeme, die als SAML Identity Provider konfiguriert sind, also eine in Unternehmensumgebungen weit verbreitete Konfiguration für Single Sign-On. Sicherheitsforscher bewerten eine baldige aktive Ausnutzung als sehr wahrscheinlich.
Sofortmaßnahmen: SharePoint patchen, NetScaler aktualisieren und aktiven Sessions beenden.
Cybersicherheitswarnung 2026-238220-1032 (25.03.2026) | CERT-Bund WID-SEC-2026-0836 (24.03.2026)
CVE-2026-20963 | CVE-2026-3055 | CVE-2026-4368
#Informationssicherheit #CISO #BSI #SharePoint #Citrix #NetScaler #Patchmanagement #NIS2 #CyberSecurity #ITSicherheit
updated 2026-03-16T18:02:21.613000
1 posts
This month's exciting release fixes our first official[1] CVE for magic wormhole!
To improve your local machine's safety, please upgrade to magic wormhole 0.23.0
##updated 2026-03-10T21:32:18
1 posts
Microsoft Authenticator’s Unclaimed Deep Link: A Full Account Takeover Story (CVE-2026–26123)
This vulnerability is an Authentication Bypass, specifically a session hijacking issue affecting the Microsoft Authenticator app. The root cause was improper handling of deep links within the application, which allowed malicious actors to craft unclaimed deep links containing account tokens. When users clicked these links, their active sessions were hijacked, resulting in full account takeover without requiring any user interaction other than clicking a link. To exploit this, an attacker could generate a malicious deep link with an embedded account token and share it via SMS or email. The session hijack occurred due to the application's failure to verify the authenticity of deep links before processing them. This vulnerability has been assigned CVE-2026–26123. Microsoft rewarded $50,000 for this find and immediately patched the issue. To prevent similar vulnerabilities, it is crucial to thoroughly validate and sanitize all user-controlled inputs, including deep links. Key lesson: Always verify the authenticity of user-supplied data before processing it. #BugBounty #Cybersecurity #AuthenticationBypass #SessionHijacking #Infosec
updated 2026-03-05T19:39:11.967000
2 posts
1 repos
After 2+ weeks of semi-painful exploit development, @yeslikethefood and team have a full RCA out for Cisco Secure Firewall Management Center (FMC) CVE-2026-20079.
The bug is a CVSS 10, but there are significant prerequisites that may limit exploitability in real-world scenarios. There are between 300 and 700 FMC systems on the public internet as of today.
https://www.vulncheck.com/blog/cisco-fmc-auth-bypass-cve-2026-20079
##After 2+ weeks of semi-painful exploit development, @yeslikethefood and team have a full RCA out for Cisco Secure Firewall Management Center (FMC) CVE-2026-20079.
The bug is a CVSS 10, but there are significant prerequisites that may limit exploitability in real-world scenarios. There are between 300 and 700 FMC systems on the public internet as of today.
https://www.vulncheck.com/blog/cisco-fmc-auth-bypass-cve-2026-20079
##updated 2026-02-03T00:30:18
2 posts
8 repos
https://github.com/samael0x4/CVE-2026-21962
https://github.com/gglessner/cve_2026_21962_scanner
https://github.com/gregk4sec/CVE-2026-21962-o
https://github.com/boroeurnprach/Ashwesker-CVE-2026-21962
https://github.com/gregk4sec/cve-2026-21962
https://github.com/naozibuhao/CVE-2026-21962_Java_GUI_Exploit_Tool
Oracle WebLogic Servers Face Immediate Exploitation of Critical RCE Vulnerabilities
Oracle WebLogic Server is under active attack following the rapid weaponization of CVE-2026-21962, a critical RCE flaw exploited the same day its exploit code was released. Attackers are using automated tools and VPS infrastructure to target both new and legacy vulnerabilities.
**If you're running Oracle WebLogic Server, patch immediately. CVE-2026-21962 is being exploited in the wild on the same day exploit code dropped, and attackers are also chaining older flaws like CVE-2020-14882 and CVE-2017-10271 that still work on unpatched systems. Restrict WebLogic admin console access to internal networks or VPN only, disable protocols you don't need (IIOP, T3), and prioritize getting those patches applied today. These attacks are fully automated, require no login, and give attackers complete control of your server.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/oracle-weblogic-servers-face-immediate-exploitation-of-critical-rce-vulnerabilities-0-0-m-z-c/gD2P6Ple2L
Oracle WebLogic Servers Face Immediate Exploitation of Critical RCE Vulnerabilities
Oracle WebLogic Server is under active attack following the rapid weaponization of CVE-2026-21962, a critical RCE flaw exploited the same day its exploit code was released. Attackers are using automated tools and VPS infrastructure to target both new and legacy vulnerabilities.
**If you're running Oracle WebLogic Server, patch immediately. CVE-2026-21962 is being exploited in the wild on the same day exploit code dropped, and attackers are also chaining older flaws like CVE-2020-14882 and CVE-2017-10271 that still work on unpatched systems. Restrict WebLogic admin console access to internal networks or VPN only, disable protocols you don't need (IIOP, T3), and prioritize getting those patches applied today. These attacks are fully automated, require no login, and give attackers complete control of your server.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/oracle-weblogic-servers-face-immediate-exploitation-of-critical-rce-vulnerabilities-0-0-m-z-c/gD2P6Ple2L
updated 2025-12-17T21:31:01
1 posts
8 repos
https://github.com/SgtBattenHA/Analysis
https://github.com/SimoesCTT/Convergent-Time-Theory-Enhanced-iOS-Safari-RCE-CVE-2025-43529-
https://github.com/jir4vv1t/CVE-2025-43529
https://github.com/kmeps4/bugtest
https://github.com/sakyu7/sakyu7.github.io
https://github.com/zeroxjf/WebKit-UAF-ANGLE-OOB-Analysis
@gknauss I think the thing is to move to 18.7.3, which is patched.
For devices running versions of iOS prior to 18.6, DarkSword uses CVE-2025-31277, a JIT optimization/type confusion bug which was patched by Apple in iOS 18.6. For devices running iOS 18.6-18.7, DarkSword uses CVE-2025-43529, a garbage collection bug in the Data Flow Graph (DFG) JIT layer of JavaScriptCore which was patched by Apple in iOS 18.7.3 and 26.2 after it was reported by GTIG. Both exploits develop their own fakeobj/addrof primitives, and then build arbitrary read/write primitives the same way on top of them.
I'm unaware of a compelling reason or hardware limitation to not upgrade from 18.6 to 18.7
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/
##updated 2025-12-09T16:53:25
1 posts
100 repos
https://github.com/ynsmroztas/NextRce
https://github.com/zzhorc/CVE-2025-55182
https://github.com/vulncheck-oss/cve-2025-55182
https://github.com/zr0n/react2shell
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/alsaut1/react2shell-lab
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/gensecaihq/react2shell-scanner
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/theman001/CVE-2025-55182
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/BlackTechX011/React2Shell
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/hualy13/CVE-2025-55182
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/alptexans/RSC-Detect-CVE-2025-55182
https://github.com/nehkark/CVE-2025-55182
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/sumanrox/rschunter
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/jctommasi/react2shellVulnApp
https://github.com/xalgord/React2Shell
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/kavienanj/CVE-2025-55182
https://github.com/Faithtiannn/CVE-2025-55182
https://github.com/shyambhanushali/React2Shell
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/hoosin/CVE-2025-55182
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/msanft/CVE-2025-55182
https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/freeqaz/react2shell
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC
https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/MemerGamer/CVE-2025-55182
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/mrknow001/RSC_Detector
https://github.com/Archerkong/CVE-2025-55182
https://github.com/emredavut/CVE-2025-55182
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/momika233/CVE-2025-55182-bypass
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/snipevx/React2Shell-POC
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/shamo0/react2shell-PoC
https://github.com/sickwell/CVE-2025-55182
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/surajhacx/react2shellpoc
https://github.com/rix4uni/CVE-2025-55182
https://github.com/Cillian-Collins/CVE-2025-55182
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/Updatelap/CVE-2025-55182
https://github.com/theori-io/reactguard
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/assetnote/react2shell-scanner
https://github.com/timsonner/React2Shell-CVE-2025-55182
New. This relates to CVE-2023-46604, CVE-2023-38646, and CVE-2025-55182.
VulnCheck: The Return of the Kinsing https://www.vulncheck.com/blog/return-of-the-kinsing @vulncheck #infosec #threatresearch #botnet
##updated 2025-11-04T00:30:41
1 posts
34 repos
https://github.com/mranv/honeypot.rs
https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit
https://github.com/evkl1d/CVE-2023-46604
https://github.com/cuanh2333/CVE-2023-46604
https://github.com/NKeshawarz/CVE-2023-46604-RCE
https://github.com/dcm2406/CVE-2023-46604
https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ
https://github.com/RockyDesigne/SSP-Assignment-3-RCEYouLater
https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp
https://github.com/trganda/ActiveMQ-RCE
https://github.com/hh-hunter/cve-2023-46604
https://github.com/fiza-naeem0902/Vulnerability-Assessment
https://github.com/CCIEVoice2009/CVE-2023-46604
https://github.com/pavanaa4k/CVE-2023-46604-LAB
https://github.com/vulncheck-oss/cve-2023-46604
https://github.com/stegano5/ExploitScript-CVE-2023-46604
https://github.com/ImuSpirit/ActiveMQ_RCE_Pro_Max
https://github.com/LiritoShawshark/CVE-2023-46604_ActiveMQ_RCE_Recurrence
https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell
https://github.com/nitzanoligo/CVE-2023-46604-demo
https://github.com/pulentoski/CVE-2023-46604
https://github.com/vjayant93/CVE-2023-46604-POC
https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604
https://github.com/Anekant-Singhai/Exploits
https://github.com/dcm2406/CVE-Lab
https://github.com/vaishnavucv/Project-Vuln-Detection-N-Mitigation_101
https://github.com/infokek/activemq-honeypot
https://github.com/Mudoleto/Broker_ApacheMQ
https://github.com/mrpentst/CVE-2023-46604
https://github.com/skrkcb2/CVE-2023-46604
https://github.com/sangrok-jeon/CVE-2023-46604-Analysis
https://github.com/tomasmussi/activemq-cve-2023-46604
https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up
New. This relates to CVE-2023-46604, CVE-2023-38646, and CVE-2025-55182.
VulnCheck: The Return of the Kinsing https://www.vulncheck.com/blog/return-of-the-kinsing @vulncheck #infosec #threatresearch #botnet
##updated 2025-10-27T17:09:11.960000
2 posts
41 repos
https://github.com/1n7erface/PocList
https://github.com/b1g-b33f/CVE-2020-14882
https://github.com/zhzyker/vulmap
https://github.com/Root-Shells/CVE-2020-14882
https://github.com/pwn3z/CVE-2020-14882-WebLogic
https://github.com/AleksaZatezalo/CVE-2020-14882
https://github.com/mmioimm/cve-2020-14882
https://github.com/zesnd/CVE-2020-14882-POC
https://github.com/tpdlshdmlrkfmcla/WebLogic_CVE_2020_14882
https://github.com/0xn0ne/weblogicScanner
https://github.com/wsfengfan/cve-2020-14882
https://github.com/nik0nz7/CVE-2020-14882
https://github.com/N0Coriander/CVE-2020-14882-14883
https://github.com/xfiftyone/CVE-2020-14882
https://github.com/corelight/CVE-2020-14882-weblogicRCE
https://github.com/alexfrancow/CVE-2020-14882
https://github.com/ovProphet/CVE-2020-14882-checker
https://github.com/GGyao/CVE-2020-14882_POC
https://github.com/BabyTeam1024/CVE-2020-14882
https://github.com/Danny-LLi/CVE-2020-14882
https://github.com/Ormicron/CVE-2020-14882-GUI-Test
https://github.com/exploitblizzard/CVE-2020-14882-WebLogic
https://github.com/qianniaoge/CVE-2020-14882_Exploit_Gui
https://github.com/jas502n/CVE-2020-14882
https://github.com/KKC73/weblogic-cve-2020-14882
https://github.com/pprietosanchez/CVE-2020-14750
https://github.com/zhzyker/exphub
https://github.com/0thm4n3/cve-2020-14882
https://github.com/LucasPDiniz/CVE-2020-14882
https://github.com/ludy-dev/Weblogic_Unauthorized-bypass-RCE
https://github.com/murataydemir/CVE-2020-14882
https://github.com/s1kr10s/CVE-2020-14882
https://github.com/XTeam-Wing/CVE-2020-14882
https://github.com/kk98kk0/CVE-2020-14882
https://github.com/milo2012/CVE-2020-14882
https://github.com/murataydemir/CVE-2020-14883
https://github.com/xMr110/CVE-2020-14882
https://github.com/NS-Sp4ce/CVE-2020-14882
https://github.com/QmF0c3UK/CVE-2020-14882
Oracle WebLogic Servers Face Immediate Exploitation of Critical RCE Vulnerabilities
Oracle WebLogic Server is under active attack following the rapid weaponization of CVE-2026-21962, a critical RCE flaw exploited the same day its exploit code was released. Attackers are using automated tools and VPS infrastructure to target both new and legacy vulnerabilities.
**If you're running Oracle WebLogic Server, patch immediately. CVE-2026-21962 is being exploited in the wild on the same day exploit code dropped, and attackers are also chaining older flaws like CVE-2020-14882 and CVE-2017-10271 that still work on unpatched systems. Restrict WebLogic admin console access to internal networks or VPN only, disable protocols you don't need (IIOP, T3), and prioritize getting those patches applied today. These attacks are fully automated, require no login, and give attackers complete control of your server.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/oracle-weblogic-servers-face-immediate-exploitation-of-critical-rce-vulnerabilities-0-0-m-z-c/gD2P6Ple2L
Oracle WebLogic Servers Face Immediate Exploitation of Critical RCE Vulnerabilities
Oracle WebLogic Server is under active attack following the rapid weaponization of CVE-2026-21962, a critical RCE flaw exploited the same day its exploit code was released. Attackers are using automated tools and VPS infrastructure to target both new and legacy vulnerabilities.
**If you're running Oracle WebLogic Server, patch immediately. CVE-2026-21962 is being exploited in the wild on the same day exploit code dropped, and attackers are also chaining older flaws like CVE-2020-14882 and CVE-2017-10271 that still work on unpatched systems. Restrict WebLogic admin console access to internal networks or VPN only, disable protocols you don't need (IIOP, T3), and prioritize getting those patches applied today. These attacks are fully automated, require no login, and give attackers complete control of your server.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/oracle-weblogic-servers-face-immediate-exploitation-of-critical-rce-vulnerabilities-0-0-m-z-c/gD2P6Ple2L
updated 2025-10-23T18:48:05.013000
2 posts
2 repos
👆
🖼️
"Analysis of the kit showed that it relies on the exploitation of many previously patched vulnerabilities and also includes exploits for CVE-2023-32434 and CVE-2023-38606. These two vulnerabilities particularly caught our attention because they had been first first discovered as zero-days used in Operation Triangulation. "
👇
https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/
ah oueee... ça c'est une jolie "coïncidence" & plot twist
intéressant maintenant de voir quelles etaient les cibles...
##Coruna: the framework used in Operation Triangulation
Kaspersky GReAT experts look into the Coruna exploit kit targeting iPhones. We discovered that the kernel exploit for CVE-2023-32434 and...
🔗️ [Securelist] https://link.is.it/XwhkQ8
##updated 2025-10-22T00:33:51
1 posts
👆
🖼️
"Analysis of the kit showed that it relies on the exploitation of many previously patched vulnerabilities and also includes exploits for CVE-2023-32434 and CVE-2023-38606. These two vulnerabilities particularly caught our attention because they had been first first discovered as zero-days used in Operation Triangulation. "
👇
https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/
ah oueee... ça c'est une jolie "coïncidence" & plot twist
intéressant maintenant de voir quelles etaient les cibles...
##updated 2025-10-22T00:31:29
2 posts
31 repos
https://github.com/bigsizeme/weblogic-XMLDecoder
https://github.com/cved-sources/cve-2017-10271
https://github.com/kbsec/Weblogic_Wsat_RCE
https://github.com/JackyTsuuuy/weblogic_wls_rce_poc-exp
https://github.com/kkirsche/CVE-2017-10271
https://github.com/s3xy/CVE-2017-10271
https://github.com/c0mmand3rOpSec/CVE-2017-10271
https://github.com/0xn0ne/weblogicScanner
https://github.com/cjjduck/weblogic_wls_wsat_rce
https://github.com/testwc/CVE-2017-10271
https://github.com/1337g/CVE-2017-10271
https://github.com/XHSecurity/Oracle-WebLogic-CVE-2017-10271
https://github.com/ETOCheney/JavaDeserialization
https://github.com/shack2/javaserializetools
https://github.com/pssss/CVE-2017-10271
https://github.com/SuperHacker-liuan/cve-2017-10271-poc
https://github.com/Al1ex/CVE-2017-10271
https://github.com/7kbstorm/WebLogic_CNVD_C2019_48814
https://github.com/seoyoung-kang/CVE-2017-10271
https://github.com/lonehand/Oracle-WebLogic-CVE-2017-10271-master
https://github.com/SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961
https://github.com/Cymmetria/weblogic_honeypot
https://github.com/ZH3FENG/PoCs-Weblogic_2017_10271
https://github.com/KKsdall/7kbstormq
https://github.com/peterpeter228/Oracle-WebLogic-CVE-2017-10271
https://github.com/pizza-power/weblogic-CVE-2019-2729-POC
https://github.com/ianxtianxt/-CVE-2017-10271-
https://github.com/rambleZzz/weblogic_CVE_2017_10271
https://github.com/r4b3rt/CVE-2017-10271
Oracle WebLogic Servers Face Immediate Exploitation of Critical RCE Vulnerabilities
Oracle WebLogic Server is under active attack following the rapid weaponization of CVE-2026-21962, a critical RCE flaw exploited the same day its exploit code was released. Attackers are using automated tools and VPS infrastructure to target both new and legacy vulnerabilities.
**If you're running Oracle WebLogic Server, patch immediately. CVE-2026-21962 is being exploited in the wild on the same day exploit code dropped, and attackers are also chaining older flaws like CVE-2020-14882 and CVE-2017-10271 that still work on unpatched systems. Restrict WebLogic admin console access to internal networks or VPN only, disable protocols you don't need (IIOP, T3), and prioritize getting those patches applied today. These attacks are fully automated, require no login, and give attackers complete control of your server.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/oracle-weblogic-servers-face-immediate-exploitation-of-critical-rce-vulnerabilities-0-0-m-z-c/gD2P6Ple2L
Oracle WebLogic Servers Face Immediate Exploitation of Critical RCE Vulnerabilities
Oracle WebLogic Server is under active attack following the rapid weaponization of CVE-2026-21962, a critical RCE flaw exploited the same day its exploit code was released. Attackers are using automated tools and VPS infrastructure to target both new and legacy vulnerabilities.
**If you're running Oracle WebLogic Server, patch immediately. CVE-2026-21962 is being exploited in the wild on the same day exploit code dropped, and attackers are also chaining older flaws like CVE-2020-14882 and CVE-2017-10271 that still work on unpatched systems. Restrict WebLogic admin console access to internal networks or VPN only, disable protocols you don't need (IIOP, T3), and prioritize getting those patches applied today. These attacks are fully automated, require no login, and give attackers complete control of your server.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/oracle-weblogic-servers-face-immediate-exploitation-of-critical-rce-vulnerabilities-0-0-m-z-c/gD2P6Ple2L
updated 2025-04-24T21:32:54
1 posts
95 repos
https://github.com/wiggels/regresshion-check
https://github.com/BrandonLynch2402/cve-2024-6387-nuclei-template
https://github.com/ahlfors/CVE-2024-6387
https://github.com/YassDEV221608/CVE-2024-6387
https://github.com/l-urk/CVE-2024-6387
https://github.com/xonoxitron/regreSSHion-checker
https://github.com/zgzhang/cve-2024-6387-poc
https://github.com/dgourillon/mitigate-CVE-2024-6387
https://github.com/kubota/CVE-2024-6387-Vulnerability-Checker
https://github.com/s1d6point7bugcrowd/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH
https://github.com/sxlmnwb/CVE-2024-6387
https://github.com/grupooruss/CVE-2024-6387
https://github.com/Karmakstylez/CVE-2024-6387
https://github.com/FerasAlrimali/CVE-2024-6387-POC
https://github.com/dawnl3ss/CVE-2024-6387
https://github.com/Remnant-DB/CVE-2024-6387
https://github.com/alex14324/ssh_poc2024
https://github.com/ThatNotEasy/CVE-2024-6387
https://github.com/devarshishimpi/CVE-2024-6387-Check
https://github.com/0x4D31/cve-2024-6387_hassh
https://github.com/almogopp/OpenSSH-CVE-2024-6387-Fix
https://github.com/OHHDamnBRO/Noregressh
https://github.com/anhvutuan/CVE-2024-6387-poc-1
https://github.com/daniel-odrinski/CVE-2024-6387-Mitigation-Ansible-Playbook
https://github.com/sms2056/CVE-2024-6387
https://github.com/dream434/CVE-2024-6387
https://github.com/identity-threat-labs/Article-RegreSSHion-CVE-2024-6387
https://github.com/edsonjt81/CVE-2024-6387_Check
https://github.com/harshinsecurity/sentinelssh
https://github.com/jocker2410/CVE-2024-6387_poc
https://github.com/prelearn-code/CVE-2024-6387
https://github.com/lflare/cve-2024-6387-poc
https://github.com/d0rb/CVE-2024-6387
https://github.com/t3rry327/cve-2024-6387-poc
https://github.com/Symbolexe/CVE-2024-6387
https://github.com/theaog/spirit
https://github.com/filipi86/CVE-2024-6387-Vulnerability-Checker
https://github.com/hssmo/cve-2024-6387_AImade
https://github.com/SkyGodling/CVE-2024-6387-POC
https://github.com/password123456/cve-security-response-guidelines
https://github.com/shamo0/CVE-2024-6387_PoC
https://github.com/CiderAndWhisky/regression-scanner
https://github.com/lala-amber/CVE-2024-6387
https://github.com/bigb0x/CVE-2024-6387
https://github.com/YassDEV221608/CVE-2024-6387_PoC
https://github.com/turbobit/CVE-2024-6387-OpenSSH-Vulnerability-Checker
https://github.com/kuffsit/check_cve_2024_6387
https://github.com/sardine-web/CVE-2024-6387-template
https://github.com/CognisysGroup/CVE-2024-6387-Checker
https://github.com/xiw1ll/CVE-2024-6387_Checker
https://github.com/R4Tw1z/CVE-2024-6387
https://github.com/mrmtwoj/CVE-2024-6387
https://github.com/JackSparrowhk/ssh-CVE-2024-6387-poc
https://github.com/no-one-sec/CVE-2024-6387
https://github.com/MaulikxLakhani/SSHScout
https://github.com/redux-sibi-jose/mitigate_ssh
https://github.com/ACHUX21/checker-CVE-2024-6387
https://github.com/AiGptCode/ssh_exploiter_CVE-2024-6387
https://github.com/imv7/CVE-2024-6387
https://github.com/sardine-web/CVE-2024-6387_Check
https://github.com/zenzue/CVE-2024-6387-Mitigation
https://github.com/th3gokul/CVE-2024-6387
https://github.com/xonoxitron/regreSSHion
https://github.com/n1cks0n/Test_CVE-2024-6387
https://github.com/MrR0b0t19/CVE-2024-6387-Exploit-POC
https://github.com/awusan125/test_for6387
https://github.com/betancour/OpenSSH-Vulnerability-test
https://github.com/DimaMend/cve-2024-6387-poc
https://github.com/Ngagne-Demba-Dia/CVE-2024-6387-corrigee
https://github.com/xaitax/CVE-2024-6387_Check
https://github.com/P4x1s/CVE-2024-6387
https://github.com/identity-threat-labs/CVE-2024-6387-Vulnerability-Checker
https://github.com/vkaushik-chef/regreSSHion
https://github.com/getdrive/CVE-2024-6387-PoC
https://github.com/jack0we/CVE-2024-6387
https://github.com/X-Projetion/CVE-2023-4596-OpenSSH-Multi-Checker
https://github.com/rumochnaya/openssh-cve-2024-6387.sh
https://github.com/RickGeex/CVE-2024-6387-Checker
https://github.com/paradessia/CVE-2024-6387-nmap
https://github.com/acrono/cve-2024-6387-poc
https://github.com/Mufti22/CVE-2024-6387-checkher
https://github.com/HadesNull123/CVE-2024-6387_Check
https://github.com/thegenetic/CVE-2024-6387-exploit
https://github.com/4lxprime/regreSSHive
https://github.com/muyuanlove/CVE-2024-6387fixshell
https://github.com/teamos-hub/regreSSHion
https://github.com/TAM-K592/CVE-2024-6387
https://github.com/xristos8574/regreSSHion-nmap-scanner
https://github.com/kinu404/CVE-2024-6387
https://github.com/azurejoga/CVE-2024-6387-how-to-fix
https://github.com/passwa11/cve-2024-6387-poc
https://github.com/l0n3m4n/CVE-2024-6387
https://github.com/invaderslabs/regreSSHion-CVE-2024-6387-
https://github.com/PrincipalAnthony/CVE-2024-6387-Updated-x64bit
updated 2024-11-21T05:39:02.050000
2 posts
Just released another entry in my blog series looking at the unpatchable vulnerabilities of Kubernetes.
Whilst the CVEs are quite old, understanding them is useful, both to understand if you need to apply mitigations and also for some of the low-level Kubernetes implementation details they involve.
https://securitylabs.datadoghq.com/articles/unpatchable-kubernetes-vulnerabilities-cve-2020-8561/
##Just released another entry in my blog series looking at the unpatchable vulnerabilities of Kubernetes.
Whilst the CVEs are quite old, understanding them is useful, both to understand if you need to apply mitigations and also for some of the low-level Kubernetes implementation details they involve.
https://securitylabs.datadoghq.com/articles/unpatchable-kubernetes-vulnerabilities-cve-2020-8561/
##updated 2024-02-15T18:30:40
1 posts
41 repos
https://github.com/passwa11/CVE-2023-38646
https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646-
https://github.com/Red4mber/CVE-2023-38646
https://github.com/adriyansyah-mf/CVE-2023-38646--Metabase-
https://github.com/Chocapikk/CVE-2023-38646
https://github.com/Mrunalkaran/CVE-2023-38646
https://github.com/BreezeGalaxy/CVE-2023-38646
https://github.com/Any3ite/cve-2023-38646-metabase-ReverseShell
https://github.com/JayRyz/CVE-2023-38646-PoC-Metabase
https://github.com/raytheon0x21/CVE-2023-38646
https://github.com/asepsaepdin/CVE-2023-38646
https://github.com/threatHNTR/CVE-2023-38646
https://github.com/m3m0o/metabase-pre-auth-rce-poc
https://github.com/junnythemarksman/CVE-2023-38646
https://github.com/kh4sh3i/CVE-2023-38646
https://github.com/Pyr0sec/CVE-2023-38646
https://github.com/nickswink/CVE-2023-38646
https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase
https://github.com/Pumpkin-Garden/POC_Metabase_CVE-2023-38646
https://github.com/alexandre-pecorilla/CVE-2023-38646
https://github.com/Xuxfff/CVE-2023-38646-Poc
https://github.com/shamo0/CVE-2023-38646-PoC
https://github.com/AnvithLobo/CVE-2023-38646
https://github.com/0utl4nder/Another-Metabase-RCE-CVE-2023-38646
https://github.com/DaniTheHack3r/CVE-2023-38646
https://github.com/0xrobiul/CVE-2023-38646
https://github.com/robotmikhro/CVE-2023-38646
https://github.com/birdm4nw/CVE-2023-38646
https://github.com/securezeron/CVE-2023-38646
https://github.com/Zenmovie/CVE-2023-38646
https://github.com/j0yb0y0h/CVE-2023-38646
https://github.com/yxl2001/CVE-2023-38646
https://github.com/Shisones/MetabaseRCE_CVE-2023-38646
https://github.com/Ego1stoo/CVE-2023-38646
https://github.com/cleanmgr112/cve-2023-38646-poc
https://github.com/Boogipop/MetabaseRceTools
https://github.com/getdrive/PoC
https://github.com/Anekant-Singhai/Exploits
https://github.com/fidjiw/CVE-2023-38646-POC
New. This relates to CVE-2023-46604, CVE-2023-38646, and CVE-2025-55182.
VulnCheck: The Return of the Kinsing https://www.vulncheck.com/blog/return-of-the-kinsing @vulncheck #infosec #threatresearch #botnet
##🚨 CVE-2026-33897 (CRITICAL, CVSS 10): Incus <6.23.0 flaw in pongo2 template isolation lets attackers with local access escape containers & gain root on host. Upgrade ASAP! https://radar.offseq.com/threat/cve-2026-33897-cwe-1336-improper-neutralization-of-fafd9faa #OffSeq #LinuxSecurity #CVE202633897 #Containers
##🔴 CVE-2026-33897 - Critical (9.9)
Incus is a system container and virtual machine manager. Prior to version 6.23.0, instance template files can be used to cause arbitrary read or writes as root on the host server. Incus allows for pongo2 templates within instances which can be use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33897/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-33897 (CRITICAL, CVSS 10): Incus <6.23.0 flaw in pongo2 template isolation lets attackers with local access escape containers & gain root on host. Upgrade ASAP! https://radar.offseq.com/threat/cve-2026-33897-cwe-1336-improper-neutralization-of-fafd9faa #OffSeq #LinuxSecurity #CVE202633897 #Containers
##🔴 CVE-2026-33897 - Critical (9.9)
Incus is a system container and virtual machine manager. Prior to version 6.23.0, instance template files can be used to cause arbitrary read or writes as root on the host server. Incus allows for pongo2 templates within instances which can be use...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33897/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-33945 (CRITICAL, CVSS 10): lxc incus <6.23.0 is vulnerable to path traversal, enabling attackers to write as root & escalate privileges. Upgrade to 6.23.0+ ASAP, restrict config access! https://radar.offseq.com/threat/cve-2026-33945-cwe-22-improper-limitation-of-a-pat-4b327a65 #OffSeq #CVE202633945 #ContainerSecurity
##🚨 CVE-2026-33945 (CRITICAL, CVSS 10): lxc incus <6.23.0 is vulnerable to path traversal, enabling attackers to write as root & escalate privileges. Upgrade to 6.23.0+ ASAP, restrict config access! https://radar.offseq.com/threat/cve-2026-33945-cwe-22-improper-limitation-of-a-pat-4b327a65 #OffSeq #CVE202633945 #ContainerSecurity
##🔴 CVE-2026-33942 - Critical (9.8)
Saloon is a PHP library that gives users tools to build API integrations and SDKs. Versions prior to 4.0.0 used PHP's unserialize() in AccessTokenAuthenticator::unserialize() to restore OAuth token state from cache or storage, with allowed_classes...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33942/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-33942 - Critical (9.8)
Saloon is a PHP library that gives users tools to build API integrations and SDKs. Versions prior to 4.0.0 used PHP's unserialize() in AccessTokenAuthenticator::unserialize() to restore OAuth token state from cache or storage, with allowed_classes...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33942/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23995 - High (8.4)
EVerest is an EV charging software stack. Prior to version 2026.02.0, stack-based buffer overflow in CAN interface initialization: passing an interface name longer than IFNAMSIZ (16) to CAN open routines overflows `ifreq.ifr_name`, corrupting adja...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23995 - High (8.4)
EVerest is an EV charging software stack. Prior to version 2026.02.0, stack-based buffer overflow in CAN interface initialization: passing an interface name longer than IFNAMSIZ (16) to CAN open routines overflows `ifreq.ifr_name`, corrupting adja...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23995 - High (8.4)
EVerest is an EV charging software stack. Prior to version 2026.02.0, stack-based buffer overflow in CAN interface initialization: passing an interface name longer than IFNAMSIZ (16) to CAN open routines overflows `ifreq.ifr_name`, corrupting adja...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23995 - High (8.4)
EVerest is an EV charging software stack. Prior to version 2026.02.0, stack-based buffer overflow in CAN interface initialization: passing an interface name longer than IFNAMSIZ (16) to CAN open routines overflows `ifreq.ifr_name`, corrupting adja...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22593 - High (8.4)
EVerest is an EV charging software stack. Prior to version 2026.02.0, an off-by-one check in IsoMux certificate filename handling causes a stack-based buffer overflow when a filename length equals `MAX_FILE_NAME_LENGTH` (100). A crafted filename i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22593/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22593 - High (8.4)
EVerest is an EV charging software stack. Prior to version 2026.02.0, an off-by-one check in IsoMux certificate filename handling causes a stack-based buffer overflow when a filename length equals `MAX_FILE_NAME_LENGTH` (100). A crafted filename i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22593/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-26008 - High (7.5)
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have an out-of-bounds access (std::vector) that leads to possible remote crash/memory corruption. This is because the CSMS sends UpdateAllowedEnergyTransferModes over the networ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26008/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-26008 - High (7.5)
EVerest is an EV charging software stack. Versions prior to 2026.02.0 have an out-of-bounds access (std::vector) that leads to possible remote crash/memory corruption. This is because the CSMS sends UpdateAllowedEnergyTransferModes over the networ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26008/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33416 - High (7.5)
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE` each alias a heap-allocated buffer betw...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33416/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33416 - High (7.5)
LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE` each alias a heap-allocated buffer betw...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33416/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
###libpng 1.6.56 fixes two high-severity vulnerabilities: CVE-2026-33416 and CVE-2026-33636.
Out of these CVE-2026-33416: Use-after-free via pointer aliasing in png_set_tRNS and png_set_PLTE is particularly serious as arbitrary code execution has been demonstrated. Applications that call png_free_data() to release memory between png_read_info() and png_read_update_info() are affected.
https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7j
The second vulnerability CVE-2026-33636: Out-of-bounds read/write in the palette expansion on ARM Neon is of more limited concern as only crashes has been demonstrated. More serious impacts have not been ruled out, however.
https://github.com/pnggroup/libpng/security/advisories/GHSA-wjr5-c57x-95m2
##🟠 CVE-2026-33149 - High (8.1)
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Versions up to and including 2.5.3 set ALLOWED_HOSTS = '*' by default, which causes Django to accept any value in the HTTP Host header without val...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33149/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33149 - High (8.1)
Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Versions up to and including 2.5.3 set ALLOWED_HOSTS = '*' by default, which causes Django to accept any value in the HTTP Host header without val...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33149/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33491 - High (7.8)
Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrar...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33491/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33491 - High (7.8)
Zen C is a systems programming language that compiles to human-readable GNU C/C11. Prior to version 0.4.4, a stack-based buffer overflow vulnerability in the Zen C compiler allows attackers to cause a compiler crash or potentially execute arbitrar...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33491/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4926 - High (7.5)
Impact:
A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service.
Patche...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4926/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4926 - High (7.5)
Impact:
A bad regular expression is generated any time you have multiple sequential optional groups (curly brace syntax), such as `{a}{b}{c}:z`. The generated regex grows exponentially with the number of groups, causing denial of service.
Patche...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4926/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33530 - High (7.7)
InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, certain API endpoints associated with bulk data operations can be hijacked to exfiltrate sensitive information from the database. The bulk operation API endpoints (e....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33530/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33530 - High (7.7)
InvenTree is an Open Source Inventory Management System. Prior to version 1.2.6, certain API endpoints associated with bulk data operations can be hijacked to exfiltrate sensitive information from the database. The bulk operation API endpoints (e....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33530/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.
https://feedly.com/cve/CVE-2026-15518 and https://feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations
https://feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access
##Ehm:
> Für die Ausnutzung zwei weiterer Schwachstellen (CVE-2026-15518, CVE-2026-15519) benötigen Angreifer Adminrechte. Ist das gegeben, können sie eigene Befehle auf Ebene des Betriebssystems ausführen.
Wenn jemand Adminrechte dafür braucht, ist das KEINE Schwachstelle...
##Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.
https://feedly.com/cve/CVE-2026-15518 and https://feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations
https://feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access
##Ehm:
> Für die Ausnutzung zwei weiterer Schwachstellen (CVE-2026-15518, CVE-2026-15519) benötigen Angreifer Adminrechte. Ist das gegeben, können sie eigene Befehle auf Ebene des Betriebssystems ausführen.
Wenn jemand Adminrechte dafür braucht, ist das KEINE Schwachstelle...
##🚨 CVE-2026-33526: Critical Use-After-Free in Squid (<7.5) allows remote attackers to crash Squid via ICP traffic. icp_access rules are ineffective. Upgrade to 7.5+ or disable ICP (icp_port=0) ASAP! https://radar.offseq.com/threat/cve-2026-33526-cwe-416-use-after-free-in-squid-cac-5f2ea159 #OffSeq #Squid #Vuln #DoS
##2 posts
1 repos
https://github.com/ChrisSub08/CVE-2026-33917_SqlInjectionVulnerabilityOpenEMR8.0.0
🟠 CVE-2026-33917 - High (8.8)
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33917/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33917 - High (8.8)
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33917/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33932 - High (7.6)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a stored cross-site scripting vulnerability in the CCDA document preview allows an attacker who can upload or send a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33932/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34055 - High (8.1)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the legacy patient notes functions in `library/pnotes.inc.php` perform updates and deletes using `WHERE id = ?` with...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34055/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23514 - High (8.8)
Kiteworks is a private data network (PDN). Versions 9.2.0 and 9.2.1 of Kiteworks Core have an access control vulnerability that allows authenticated users to access unauthorized content. Upgrade Kiteworks Core to version 9.2.2 or later to receive ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23514/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33348 - High (8.7)
OpenEMR is a free and open source electronic health records and medical practice management application. Users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form are displayed on the en...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33348/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24750 - High (7.6)
Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior to version 9.2.1, an authenticated attacker could exploit an Improper Neutralization of Input During Web Page Generation as Stored XSS when modifying forms. Upgrade Ki...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24750/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-30975 - High (8.1)
Sonarr is a PVR for Usenet and BitTorrent users. Versions prior to 4.0.16.2942 have an authentication bypass that affected users that had disabled authentication for local addresses (Authentication Required set to: `Disabled for Local Addresses`) ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30975/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##1 posts
1 repos
https://github.com/JivaSecurity/ESPOCRM-RCE-POC-CVE-2026-33656
CVE-2026-33656: EspoCRM ≤ 9.3.3 — Formula engine ACL gap + path traversal → authenticated RCE (full write-up + PoC) https://jivasecurity.com/writeups/espocrm-rce-cve-2026-33656
##Stackfield Desktop App: RCE via Path Traversal and Arbitrary File Write (CVE-2026-28373) https://www.rcesecurity.com/2026/03/stackfield-desktop-app-rce-via-path-traversal-and-arbitrary-file-write-cve-2026-28373/
##We're released Netty 4.2.11 and 4.1.132. These contain many bug fixes, and fixes for two CVEs both rated *high*:
- CVE-2026-33871: HTTP/2 CONTINUATION frame flood Denial of Service.
- CVE-2026-33870: HTTP/1.1 Request Smuggling vulnerability in chunked encoding parsing.
Release notes for 4.2.11: https://netty.io/news/2026/03/24/4-2-11-Final.html
Release notes for 4.1.132: https://netty.io/news/2026/03/24/4-1-132-Final.html
Also of note: We had 17 people contribute to Netty 4.2.11, of which 5 are new first time contributors 😲
##