## Updated at UTC 2026-03-04T03:30:24.192519

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-27751 9.8 0.04% 1 0 2026-03-04T02:08:00.523000 SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a default cre
CVE-2026-3224 0 0.00% 2 0 2026-03-03T22:16:29.523000 Authentication bypass in the Microsoft Entra ID (Azure AD) authentication mode i
CVE-2026-28518 7.8 0.00% 2 0 2026-03-03T22:16:28.993000 OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path tra
CVE-2026-3485 9.8 0.00% 2 0 2026-03-03T21:52:29.877000 A flaw has been found in D-Link DIR-868L 110b03. This affects the function sub_1
CVE-2025-59059 9.8 0.09% 4 0 2026-03-03T21:52:29.877000 Remote Code Execution Vulnerability in NashornScriptEngineCreator is reported in
CVE-2025-12345 8.8 0.06% 2 0 2026-03-03T21:52:29.877000 A security vulnerability has been detected in LLM-Claw 0.1.0/0.1.1/0.1.1a/0.1.1a
CVE-2026-3336 7.5 0.02% 2 0 2026-03-03T21:52:29.877000 Improper certificate validation in PKCS7_verify() in AWS-LC allows an unauthenti
CVE-2026-0032 7.8 0.01% 4 0 2026-03-03T21:32:19 In multiple functions of mem_protect.c, there is a possible out-of-bounds write
CVE-2026-3400 8.8 0.05% 2 0 2026-03-03T21:31:12 A security flaw has been discovered in Tenda AC15 up to 15.13.07.13. Affected by
CVE-2026-24114 9.8 0.02% 2 0 2026-03-03T20:16:47.607000 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate `pP
CVE-2026-24112 9.8 0.02% 2 0 2026-03-03T20:16:47.360000 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit t
CVE-2026-22719 8.1 0.47% 6 0 2026-03-03T20:16:47.160000 VMware Aria Operations contains a command injection vulnerability. A malicious u
CVE-2026-21385 7.8 0.01% 15 1 2026-03-03T20:16:46.140000 Memory corruption while using alignments for memory allocation.
CVE-2026-24101 9.8 0.29% 2 0 2026-03-03T19:44:19.120000 An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_mul
CVE-2025-48582 8.4 0.00% 2 0 2026-03-03T19:25:48.063000 In multiple locations, there is a possible way to delete media without the MANAG
CVE-2025-48602 8.4 0.01% 2 0 2026-03-03T19:25:08.307000 In exitKeyguardAndFinishSurfaceBehindRemoteAnimation of KeyguardViewMediator.jav
CVE-2025-48645 7.8 0.01% 2 0 2026-03-03T19:23:29.340000 In loadDescription of DeviceAdminInfo.java, there is a possible persistent packa
CVE-2025-48653 7.8 0.01% 2 0 2026-03-03T19:23:05.510000 In loadDataAndPostValue of multiple files, there is a possible way to obscure pe
CVE-2025-52482 8.3 0.04% 1 0 2026-03-03T19:13:35.437000 Chamilo is a learning management system. Prior to version 1.11.30, a Stored XSS
CVE-2025-50187 9.8 0.29% 2 0 2026-03-03T19:12:14.917000 Chamilo is a learning management system. Prior to version 1.11.28, parameter fro
CVE-2026-0021 8.4 0.01% 1 0 2026-03-03T18:42:10.833000 In hasInteractAcrossUsersFullPermission of AppInfoBase.java, there is a possible
CVE-2026-0011 8.4 0.01% 2 0 2026-03-03T18:41:55.677000 In enableSystemPackageLPw of Settings.java, there is a possible way to prevent l
CVE-2026-0017 7.7 0.01% 2 0 2026-03-03T18:40:59.027000 In onChange of BiometricService.java, there is a possible way to enable fingerpr
CVE-2025-48605 8.4 0.01% 2 0 2026-03-03T18:32:35 In multiple functions of KeyguardViewMediator.java, there is a possible lockscre
CVE-2025-48619 8.4 0.01% 2 0 2026-03-03T18:32:35 In multiple functions of ContentProvider.java, there is a possible way for an ap
CVE-2025-52365 7.8 0.00% 2 0 2026-03-03T18:32:35 A command injection vulnerability in the szc script of the ccurtsinger/stabilize
CVE-2026-25673 7.5 0.00% 2 0 2026-03-03T18:32:35 An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4
CVE-2025-48654 7.8 0.01% 2 0 2026-03-03T18:32:35 In onStart of CompanionDeviceManagerService.java, there is a possible confused d
CVE-2025-48635 7.7 0.01% 2 0 2026-03-03T18:32:34 In multiple functions of TaskFragmentOrganizerController.java, there is a possib
CVE-2026-20777 8.1 0.00% 2 0 2026-03-03T18:31:33 A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing fun
CVE-2025-48613 7.8 0.01% 2 0 2026-03-03T18:31:32 In VBMeta, there is a possible way to modify and resign VBMeta using a test key,
CVE-2025-48609 9.1 0.01% 2 0 2026-03-03T18:31:32 In multiple functions of MmsProvider.java, there is a possible way to arbitraril
CVE-2026-22891 9.8 0.00% 2 0 2026-03-03T18:31:32 A heap-based buffer overflow vulnerability exists in the Intan CLP parsing funct
CVE-2026-24115 9.8 0.02% 2 0 2026-03-03T18:31:31 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the
CVE-2026-24113 9.8 0.02% 2 0 2026-03-03T18:31:30 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit t
CVE-2026-24111 9.8 0.02% 2 0 2026-03-03T18:31:29 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit t
CVE-2026-24109 9.8 0.02% 2 0 2026-03-03T18:31:29 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit t
CVE-2025-52998 9.8 0.04% 2 0 2026-03-03T18:21:38.663000 Chamilo is a learning management system. Prior to version 1.11.30, in the applic
CVE-2026-3376 8.8 0.05% 2 0 2026-03-03T17:35:16.400000 A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by th
CVE-2026-3379 8.8 0.05% 2 0 2026-03-03T17:33:26.577000 A vulnerability has been found in Tenda F453 1.0.0.3. This vulnerability affects
CVE-2026-3398 8.8 0.05% 2 0 2026-03-03T17:32:11.063000 A vulnerability was determined in Tenda F453 1.0.0.3. Affected is the function f
CVE-2025-48579 8.4 0.00% 2 0 2026-03-03T17:04:04.223000 In multiple functions of MediaProvider.java, there is a possible external storag
CVE-2026-26710 9.8 0.03% 1 0 2026-03-03T16:16:21.417000 code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /f
CVE-2026-24108 9.8 0.04% 2 0 2026-03-03T15:54:49.147000 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit t
CVE-2026-0007 8.6 0.01% 2 0 2026-03-03T15:32:43 In writeToParcel of WindowInfo.cpp, there is a possible way to trick a user into
CVE-2026-0023 8.4 0.01% 2 0 2026-03-03T15:32:43 In createSessionInternal of PackageInstallerService.java, there is a possible wa
CVE-2026-0025 7.8 0.01% 4 0 2026-03-03T15:31:40 In hasImage of Notification.java, there is a possible way to reveal information
CVE-2026-0029 9.8 0.01% 2 0 2026-03-03T15:31:40 In __pkvm_init_vm of pkvm.c, there is a possible memory corruption due to a logi
CVE-2026-0010 8.4 0.01% 2 0 2026-03-03T15:31:40 In onTransact of IDrmManagerService.cpp, there is a possible out of bounds write
CVE-2026-0037 8.4 0.01% 1 0 2026-03-03T15:31:40 In multiple functions of ffa.c, there is a possible memory corruption due to a l
CVE-2026-24105 9.8 0.15% 2 0 2026-03-03T15:31:37 An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.1
CVE-2026-20423 7.1 0.01% 2 0 2026-03-03T15:31:36 In wlan STA driver, there is a possible out of bounds write due to a missing bou
CVE-2026-0038 8.4 0.01% 1 0 2026-03-03T15:31:35.410000 In multiple functions of mem_protect.c, there is a possible way to execute arbit
CVE-2026-0031 8.4 0.01% 1 0 2026-03-03T15:26:21.807000 In multiple functions of mem_protect.c, there is a possible out of bounds write
CVE-2026-21902 9.8 0.33% 8 1 2026-03-03T15:16:18.363000 An Incorrect Permission Assignment for Critical Resource vulnerability in the On
CVE-2026-0026 7.8 0.01% 2 0 2026-03-03T13:22:41.723000 In removePermission of PermissionManagerServiceImpl.java, there is a possible wa
CVE-2026-0008 8.4 0.01% 2 0 2026-03-03T13:20:00.050000 In multiple locations, there is a possible privilege escalation due to a confus
CVE-2025-48650 8.4 0.01% 2 0 2026-03-03T13:17:13.197000 In multiple locations, there is a possible information disclosure due to SQL inj
CVE-2026-22886 9.8 0.16% 4 0 2026-03-03T12:31:32 OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requi
CVE-2026-1874 None 0.15% 2 0 2026-03-03T09:30:54 Always-Incorrect Control Flow Implementation vulnerability in Mitsubishi Electri
CVE-2026-1875 None 0.15% 2 0 2026-03-03T09:30:54 Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corpo
CVE-2026-1492 9.8 0.07% 4 0 2026-03-03T06:31:14 The User Registration & Membership – Custom Registration Form Builder, Custom Lo
CVE-2026-24107 9.8 0.29% 2 0 2026-03-03T03:33:44 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the
CVE-2026-2448 8.8 0.10% 6 0 2026-03-03T03:32:48 The Page Builder by SiteOrigin plugin for WordPress is vulnerable to Local File
CVE-2026-2628 9.8 0.25% 3 1 2026-03-03T03:32:48 The All-in-One Microsoft 365 & Entra ID / Azure AD SSO Login plugin for WordPres
CVE-2025-48567 7.8 0.01% 2 0 2026-03-03T00:32:12 In multiple locations, there is a possible bypass of a file path filter designed
CVE-2026-1566 8.8 0.04% 3 0 2026-03-03T00:31:17 The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for W
CVE-2026-0020 8.4 0.01% 1 0 2026-03-03T00:31:11 In parsePermissionGroup of ParsedPermissionUtils.java, there is a possible way t
CVE-2026-0006 9.8 0.09% 5 1 2026-03-03T00:31:10 In multiple locations, there is a possible out of bounds read and write due to a
CVE-2025-48646 7.8 0.01% 2 0 2026-03-03T00:31:10 In executeRequest of ActivityStarter.java, there is a possible launch anywhere d
CVE-2026-0013 8.4 0.01% 2 0 2026-03-03T00:31:10 In setupLayout of PickActivity.java, there is a possible way to start any activi
CVE-2025-48578 7.8 0.01% 2 0 2026-03-03T00:31:09 In multiple functions of MediaProvider.java, there is a possible way to bypass t
CVE-2025-48574 8.4 0.00% 2 0 2026-03-03T00:31:09 In validateAddingWindowLw of DisplayPolicy.java, there is a possible way for an
CVE-2026-20430 8.8 0.02% 1 0 2026-03-02T22:05:08.293000 In wlan AP FW, there is a possible out of bounds write due to an incorrect bound
CVE-2026-20434 7.5 0.05% 1 0 2026-03-02T22:04:18.130000 In Modem, there is a possible out of bounds write due to a missing bounds check.
CVE-2026-0035 8.4 0.01% 1 0 2026-03-02T21:31:51 In createRequest of MediaProvider.java, there is a possible way for an app to ga
CVE-2026-0028 8.4 0.01% 1 0 2026-03-02T21:31:51 In __pkvm_host_share_guest of mem_protect.c, there is a possible out of bounds w
CVE-2026-0047 8.4 0.01% 1 0 2026-03-02T21:31:44 In dumpBitmapsProto of ActivityManagerService.java, there is a possible way for
CVE-2026-0030 8.4 0.01% 1 0 2026-03-02T21:31:43 In __host_check_page_state_range of mem_protect.c, there is a possible out of bo
CVE-2026-0034 8.4 0.01% 1 0 2026-03-02T21:31:42 In setPackageOrComponentEnabled of ManagedServices.java, there is a possible not
CVE-2025-48636 8.4 0.01% 2 0 2026-03-02T21:31:42 In openFile of BugreportContentProvider.java, there is a possible way to read an
CVE-2025-32313 8.4 0.01% 1 0 2026-03-02T21:31:38 In UsageEvents of UsageEvents.java, there is a possible out of bounds write due
CVE-2026-3010 0 0.05% 1 0 2026-03-02T20:30:10.923000 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site
CVE-2026-2749 9.9 0.03% 1 1 2026-03-02T20:30:10.923000 Vulnerability in Centreon Centreon Open Tickets on Central Server on Linux (Cent
CVE-2026-21882 8.4 0.01% 1 0 2026-03-02T20:29:29.330000 theshit is a command-line utility that automatically detects and fixes common mi
CVE-2025-58107 7.5 0.02% 1 1 2026-03-02T20:29:29.330000 In Microsoft Exchange through 2019, Exchange ActiveSync (EAS) configurations on
CVE-2026-3132 8.8 0.22% 1 0 2026-03-02T20:29:29.330000 The Master Addons for Elementor Premium plugin for WordPress is vulnerable to Re
CVE-2025-47373 7.8 0.01% 1 0 2026-03-02T20:29:29.330000 Memory Corruption when accessing buffers with invalid length during TA invocatio
CVE-2025-47376 7.8 0.01% 1 0 2026-03-02T20:29:29.330000 Memory Corruption when concurrent access to shared buffer occurs during IOCTL ca
CVE-2025-47381 7.8 0.01% 1 0 2026-03-02T20:29:29.330000 Memory Corruption while processing IOCTL calls when concurrent access to shared
CVE-2025-59603 7.8 0.01% 1 0 2026-03-02T20:29:29.330000 Memory Corruption when processing invalid user address with nonstandard buffer a
CVE-2026-3180 7.5 0.08% 1 0 2026-03-02T18:31:52 The Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe plu
CVE-2026-26720 9.8 0.25% 2 1 2026-03-02T18:31:51 An issue in Twenty CRM v1.15.0 and before allows a remote attacker to execute ar
CVE-2025-47377 7.8 0.01% 1 0 2026-03-02T18:31:51 Memory Corruption when accessing a buffer after it has been freed while processi
CVE-2025-47386 7.8 0.01% 1 0 2026-03-02T18:31:51 Memory Corruption while invoking IOCTL calls when concurrent access to shared bu
CVE-2025-59600 7.8 0.01% 1 0 2026-03-02T18:31:51 Memory Corruption when adding user-supplied data without checking available buff
CVE-2026-24110 9.8 0.04% 2 0 2026-03-02T18:31:45 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may send over
CVE-2025-47375 7.8 0.01% 1 0 2026-03-02T18:31:45 Memory corruption while handling different IOCTL calls from the user-space simul
CVE-2025-47379 7.8 0.01% 1 0 2026-03-02T18:31:45 Memory Corruption when concurrent access to shared buffer occurs due to improper
CVE-2025-47385 7.8 0.01% 1 0 2026-03-02T18:31:45 Memory Corruption when accessing trusted execution environment without proper pr
CVE-2026-21658 9.8 0.21% 2 0 2026-03-02T18:31:41 Unauthenticated Remote Code Execution i.e Improper Control of Generation of Code
CVE-2026-21657 9.8 0.08% 1 0 2026-03-02T18:31:41 Improper Control of Generation of Code ('Code Injection') vulnerability in Johns
CVE-2026-21656 9.8 0.08% 1 0 2026-03-02T18:31:41 Improper Control of Generation of Code ('Code Injection') vulnerability in Johns
CVE-2026-21654 9.8 0.12% 1 0 2026-03-02T18:31:41 Improper Neutralization of Special Elements used in an OS Command ('OS Command I
CVE-2026-21659 9.8 0.21% 1 0 2026-03-02T18:31:41 Unauthenticated Remote Code Execution and Information Disclosure due to Local Fi
CVE-2026-21660 9.8 0.03% 1 0 2026-03-02T18:23:05.353000 Hardcoded Email Credentials Saved as Plaintext in Firmware (CWE-256: Plaintext S
CVE-2026-22206 8.8 0.14% 1 0 2026-03-02T15:58:07 SPIP versions prior to 4.4.10 contain a SQL injection vulnerability that allows
CVE-2026-3432 None 0.09% 1 0 2026-03-02T15:31:31 On SimStudio version below to 0.5.74, the `/api/auth/oauth/token` endpoint conta
CVE-2026-3431 9.8 0.07% 2 0 2026-03-02T15:31:31 On SimStudio version below to 0.5.74, the MongoDB tool endpoints accept arbitrar
CVE-2026-27942 7.5 0.04% 1 0 2026-03-02T14:54:48.080000 fast-xml-parser allows users to validate XML, parse XML to JS object, or build X
CVE-2026-2999 9.8 0.10% 1 0 2026-03-02T09:30:38 IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution v
CVE-2026-3000 9.8 0.10% 3 0 2026-03-02T09:30:37 IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution v
CVE-2026-2584 None 0.30% 1 0 2026-03-02T09:30:37 A critical SQL Injection (SQLi) vulnerability has been identified in the authent
CVE-2026-3422 9.8 0.40% 2 0 2026-03-02T09:30:31 U-Office Force developed by e-Excellence has a Insecure Deserialization vulnerab
CVE-2026-3412 4.3 0.03% 1 0 2026-03-02T06:32:05 A vulnerability was detected in itsourcecode University Management System 1.0. T
CVE-2026-3408 4.3 0.04% 1 0 2026-03-02T06:32:05 A vulnerability was identified in Open Babel up to 3.1.1. This impacts the funct
CVE-2026-3399 8.8 0.05% 2 0 2026-03-02T00:30:29 A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerabi
CVE-2026-3380 8.8 0.05% 2 0 2026-03-01T06:31:35 A vulnerability was found in Tenda F453 1.0.0.3. This issue affects the function
CVE-2026-3378 8.8 0.05% 2 0 2026-03-01T03:30:24 A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromqosse
CVE-2026-27167 None 0.04% 1 0 2026-03-01T01:00:34 ## Summary Gradio applications running outside of Hugging Face Spaces automatic
CVE-2026-28562 8.2 0.01% 2 0 2026-03-01T00:30:19 wpForo 2.4.14 contains an unauthenticated SQL injection vulnerability in Topics:
CVE-2026-3377 8.8 0.05% 2 0 2026-03-01T00:30:19 A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is th
CVE-2026-2844 None 0.07% 1 0 2026-02-28T12:30:25 Missing Authentication for Critical Function vulnerability in Microchip TimePict
CVE-2025-13673 7.5 0.06% 1 0 2026-02-28T09:30:14 The Tutor LMS – eLearning and online course solution plugin for WordPress is vul
CVE-2026-27630 7.5 0.12% 1 0 2026-02-28T01:01:22.727000 TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Versions prio
CVE-2026-27498 8.6 0.66% 1 0 2026-02-27T21:51:40 ## Impact An authenticated user with permission to create or modify workflows co
CVE-2025-40932 8.2 0.03% 1 0 2026-02-27T21:32:27 Apache::SessionX versions through 2.01 for Perl create insecure session id. Apa
CVE-2026-2597 7.5 0.04% 1 0 2026-02-27T21:32:27 Crypt::SysRandom::XS versions before 0.010 for Perl is vulnerable to a heap buff
CVE-2026-27141 7.5 0.05% 1 0 2026-02-27T21:32:22 Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running s
CVE-2026-22207 9.8 0.17% 1 0 2026-02-27T21:31:21 OpenViking through version 0.1.18, prior to commit 0251c70, contains a broken ac
CVE-2026-22205 7.5 0.24% 1 0 2026-02-27T21:31:21 SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability cau
CVE-2026-26222 9.8 1.02% 1 0 2026-02-27T21:31:19 Altec DocLink (now maintained by Beyond Limits Inc.) version 4.0.336.0 exposes i
CVE-2026-27510 9.6 0.08% 2 0 2026-02-27T19:16:08.767000 Unitree Go2 firmware versions 1.1.7 through 1.1.11, when used with the Unitree G
CVE-2026-27509 8.0 0.03% 2 0 2026-02-27T19:16:08.547000 Unitree Go2 firmware versions V1.1.7 through V1.1.9 and V1.1.11 (EDU) do not imp
CVE-2026-26986 7.5 0.07% 1 0 2026-02-27T19:11:09.313000 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio
CVE-2026-27449 7.5 0.05% 1 0 2026-02-27T18:35:58 ### Description A vulnerability has been identified in Umbraco Engage where cert
CVE-2026-3301 9.8 2.90% 1 0 2026-02-27T18:31:05 A security flaw has been discovered in Totolink N300RH 6.1c.1353_B20190305. Affe
CVE-2026-27969 None 0.04% 1 0 2026-02-27T16:03:55 ### Impact Anyone with read/write access to the backup storage location (e.g. a
CVE-2026-28215 9.1 0.06% 1 0 2026-02-27T15:53:07.053000 hoppscotch is an open source API development ecosystem. Prior to version 2026.2.
CVE-2026-23750 8.1 0.01% 1 0 2026-02-27T15:34:18 Golioth Pouch version 0.1.0 prior to [INSERT FIXED VERSION], fixed in commit 1b2
CVE-2026-25954 7.5 0.06% 1 0 2026-02-27T14:56:16.663000 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio
CVE-2026-25942 7.5 0.07% 1 0 2026-02-27T14:54:06.747000 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio
CVE-2026-23627 8.8 0.01% 1 0 2026-02-27T14:51:47.317000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2026-24663 9.0 1.35% 1 0 2026-02-27T14:06:37.987000 An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and pri
CVE-2025-50857 9.8 0.58% 1 0 2026-02-27T14:06:37.987000 ZenTaoPMS v18.11 through v21.6.beta is vulnerable to Directory Traversal in /mod
CVE-2026-1565 8.8 0.28% 1 0 2026-02-27T14:06:37.987000 The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Members
CVE-2026-0980 8.3 0.22% 1 0 2026-02-27T14:06:37.987000 A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller
CVE-2026-26682 7.8 0.02% 1 0 2026-02-26T21:32:35 An issue in fastCMS before v.0.1.6 allows a local attacker to execute arbitrary
CVE-2026-28136 7.6 0.03% 1 0 2026-02-26T21:32:34 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-26938 8.6 0.04% 1 0 2026-02-26T21:31:39 Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336)
CVE-2025-71057 8.2 0.01% 1 0 2026-02-26T21:31:30 Improper session management in D-Link Wireless N 300 ADSL2+ Modem Router DSL-124
CVE-2026-27888 None 0.04% 1 0 2026-02-26T19:55:35 ### Impact An attacker who uses this vulnerability can craft a PDF which leads t
CVE-2026-27849 9.8 0.06% 1 0 2026-02-26T18:32:43 Due to missing neutralization of special elements, OS commands can be injected v
CVE-2026-20127 10.0 2.60% 5 3 2026-02-26T16:20:02.187000 A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controlle
CVE-2026-27636 8.8 0.34% 1 0 2026-02-26T16:07:11.047000 FreeScout is a free help desk and shared inbox built with PHP's Laravel framewor
CVE-2026-3201 4.7 0.02% 1 0 2026-02-26T14:49:01.050000 USB HID protocol dissector memory exhaustion in Wireshark 4.6.0 to 4.6.3 and 4.4
CVE-2025-70328 8.8 2.94% 1 0 2026-02-26T03:31:18 TOTOLINK X6000R v9.4.0cu.1498_B20250826 contains an OS command injection vulnera
CVE-2025-70327 9.8 2.05% 1 0 2026-02-26T03:06:04.013000 TOTOLINK X5000R v9.1.0cu_2415_B20250515 contains an argument injection vulnerabi
CVE-2026-26331 8.8 0.70% 1 1 2026-02-25T19:32:30.417000 yt-dlp is a command-line audio/video downloader. Starting in version 2023.06.21
CVE-2026-3202 4.7 0.02% 1 0 2026-02-25T15:31:53 NTS-KE protocol dissector crash in Wireshark 4.6.0 to 4.6.3 allows denial of ser
CVE-2026-3203 5.5 0.02% 1 0 2026-02-25T15:31:43 RF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to
CVE-2026-20841 7.8 0.10% 1 12 2026-02-25T14:32:14.467000 Improper neutralization of special elements used in a command ('command injectio
CVE-2026-25108 8.8 18.59% 1 0 2026-02-24T21:38:18.607000 FileZen contains an OS command injection vulnerability. When FileZen Antivirus C
CVE-2026-22553 9.8 1.26% 1 0 2026-02-24T21:31:51 All versions of InSAT MasterSCADA BUK-TS are susceptible to OS command injection
CVE-2025-64328 7.2 24.83% 1 1 2026-02-24T19:30:59.130000 FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX
CVE-2026-2033 8.1 15.58% 1 0 2026-02-23T18:14:13.887000 MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Executio
CVE-2026-2329 9.8 41.14% 1 0 2026-02-20T20:57:50.360000 An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP
CVE-2025-68615 9.8 0.05% 1 1 2026-02-19T16:09:15.480000 net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.
CVE-2026-0714 6.8 0.01% 4 0 2026-02-18T18:31:27 A physical attack vulnerability exists in certain Moxa industrial computers usin
CVE-2026-22769 10.0 34.16% 1 0 2026-02-18T18:30:35 Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a
CVE-2026-1731 9.8 60.92% 1 5 template 2026-02-17T15:31:33 BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote
CVE-2023-4911 7.8 57.16% 1 18 template 2026-02-13T21:25:07.227000 A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so whi
CVE-2026-24061 9.8 77.92% 4 63 template 2026-02-11T15:40:42.937000 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "
CVE-2026-21513 8.8 4.76% 2 0 2026-02-10T21:31:29 Protection mechanism failure in MSHTML Framework allows an unauthorized attacker
CVE-2026-1603 8.6 11.74% 1 0 template 2026-02-10T18:30:49 An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allo
CVE-2026-1687 7.3 5.29% 1 0 2026-02-10T15:14:03.207000 A weakness has been identified in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon
CVE-2020-37123 9.8 12.89% 1 0 template 2026-02-05T18:30:36 Pinger 1.0 contains a remote code execution vulnerability that allows attackers
CVE-2020-37088 7.5 4.95% 1 0 2026-02-04T00:30:40 School ERP Pro 1.0 contains a file disclosure vulnerability that allows unauthen
CVE-2026-1207 None 7.39% 1 0 template 2026-02-03T19:32:57 An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4
CVE-2025-13348 None 0.01% 1 0 2026-02-02T03:31:18 An improper access control vulnerability exists in ASUS Secure Delete Driver of
CVE-2026-1281 9.8 64.79% 2 2 2026-01-30T13:28:18.610000 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2026-21852 None 0.02% 2 2 2026-01-21T21:40:20 A vulnerability in Claude Code's project-load flow allowed malicious repositorie
CVE-2026-21859 5.8 1.13% 2 0 template 2026-01-20T19:03:30 ## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in Mailpit
CVE-2026-0628 8.8 0.04% 5 2 2026-01-12T16:48:33.560000 Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7
CVE-2025-38617 4.7 0.00% 2 0 2026-01-07T16:57:56.077000 In the Linux kernel, the following vulnerability has been resolved: net/packet:
CVE-2025-23299 6.7 0.02% 2 0 2025-10-22T21:12:32.330000 NVIDIA Bluefield and ConnectX contain a vulnerability in the management interfac
CVE-2025-62360 8.8 0.05% 1 0 2025-10-20T16:04:04.377000 WeGIA is an open source Web Manager for Institutions with a focus on Portuguese
CVE-2025-11462 7.8 0.04% 1 0 2025-10-14T18:31:29 Improper Link Resolution Before File Access in the AWS VPN Client for macOS vers
CVE-2025-59536 None 0.04% 2 0 2025-10-03T14:16:36 Due to a bug in the startup trust dialog implementation, Claude Code could be tr
CVE-2017-13089 8.8 51.23% 1 2 2025-04-20T01:37:25.860000 The http.c:skip_short_body() function is called in some circumstances, such as w
CVE-2023-6553 9.8 93.15% 1 4 template 2024-11-21T08:44:05.137000 The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution
CVE-2023-41772 7.8 19.53% 1 1 2024-04-04T08:32:52 Win32k Elevation of Privilege Vulnerability
CVE-2023-3643 7.3 10.14% 1 0 2023-11-07T05:05:15 A vulnerability was found in Boss Mini 1.4.0 Build 6221. It has been classified
CVE-2023-4116 4.3 25.35% 1 0 template 2023-11-07T05:01:24 A vulnerability classified as problematic was found in PHP Jabbers Taxi Booking
CVE-2026-27825 0 0.00% 2 1 N/A
CVE-2026-27826 0 0.00% 2 1 N/A
CVE-2025-62507 0 0.12% 2 1 N/A
CVE-2025-25198 0 0.12% 1 2 N/A
CVE-2026-3337 0 0.08% 1 0 N/A
CVE-2026-3338 0 0.03% 2 0 N/A
CVE-2026-21853 0 0.16% 1 0 N/A
CVE-2026-28286 0 0.06% 1 0 N/A
CVE-2025-52468 0 0.04% 1 0 N/A
CVE-2026-28403 0 0.01% 1 0 N/A
CVE-2026-25955 0 0.07% 1 0 N/A
CVE-2026-25953 0 0.09% 1 0 N/A
CVE-2026-25952 0 0.09% 1 0 N/A
CVE-2026-25997 0 0.09% 1 0 N/A
CVE-2026-25959 0 0.08% 1 0 N/A
CVE-2026-27950 0 0.10% 1 0 N/A
CVE-2026-24680 0 0.02% 1 0 N/A
CVE-2026-27633 0 0.12% 1 0 N/A
CVE-2026-28213 0 0.04% 1 0 N/A

CVE-2026-27751
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-04T02:08:00.523000

1 posts

SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a default credentials vulnerability that allows remote attackers to obtain administrative access to the management interface. Attackers can authenticate using the hardcoded default credentials without password change enforcement to gain full administrative control of the device.

offseq@infosec.exchange at 2026-02-28T09:00:27.000Z ##

🔐 CVE-2026-27751 (CRITICAL): SODOLA SL902-SWTGW124AS gateways (≤200.1.20) use default creds, enabling remote admin takeover. Change all passwords or restrict access ASAP! No patch yet. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #IoTSecurity #NetworkSecurity

##

CVE-2026-3224
(0 None)

EPSS: 0.00%

updated 2026-03-03T22:16:29.523000

2 posts

Authentication bypass in the Microsoft Entra ID (Azure AD) authentication mode in Devolutions Server 2025.3.15.0 and earlier allows an unauthenticated user to authenticate as an arbitrary Entra ID user via a forged JSON Web Token (JWT).

offseq at 2026-03-04T00:00:41.394Z ##

🚨 CVE-2026-3224: CRITICAL auth bypass in Devolutions Server <=2025.3.15.0 using Microsoft Entra ID. Attackers can forge JWTs for full access. No known exploits, but patch ASAP & tighten token validation. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-04T00:00:41.000Z ##

🚨 CVE-2026-3224: CRITICAL auth bypass in Devolutions Server <=2025.3.15.0 using Microsoft Entra ID. Attackers can forge JWTs for full access. No known exploits, but patch ASAP & tighten token validation. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #CyberSecurity #JWT

##

CVE-2026-28518
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-03T22:16:28.993000

2 posts

OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path traversal vulnerability in the .ovpack import handling that allows attackers to write files outside the intended import directory. Attackers can craft malicious ZIP archives with traversal sequences, absolute paths, or drive prefixes in member names to overwrite or create arbitrary files with the importing process privile

thehackerwire@mastodon.social at 2026-03-03T15:26:00.000Z ##

🟠 CVE-2026-28518 - High (7.8)

OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path traversal vulnerability in the .ovpack import handling that allows attackers to write files outside the intended import directory. Attackers can craft malicious ZIP arch...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:26:00.000Z ##

🟠 CVE-2026-28518 - High (7.8)

OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path traversal vulnerability in the .ovpack import handling that allows attackers to write files outside the intended import directory. Attackers can craft malicious ZIP arch...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3485
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-03T21:52:29.877000

2 posts

A flaw has been found in D-Link DIR-868L 110b03. This affects the function sub_1BF84 of the component SSDP Service. This manipulation of the argument ST causes os command injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

offseq at 2026-03-04T01:30:30.715Z ##

⚠️ CRITICAL: CVE-2026-3485 enables remote OS command injection in D-Link DIR-868L (110b03) via SSDP (UPnP). Exploit is public, no patch. Replace or isolate device ASAP — block SSDP, monitor traffic. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-04T01:30:30.000Z ##

⚠️ CRITICAL: CVE-2026-3485 enables remote OS command injection in D-Link DIR-868L (110b03) via SSDP (UPnP). Exploit is public, no patch. Replace or isolate device ASAP — block SSDP, monitor traffic. radar.offseq.com/threat/cve-20 #OffSeq #CVE20263485 #RouterSecurity #Vuln

##

CVE-2025-59059
(9.8 CRITICAL)

EPSS: 0.09%

updated 2026-03-03T21:52:29.877000

4 posts

Remote Code Execution Vulnerability in NashornScriptEngineCreator is reported in Apache Ranger versions <= 2.7.0. Users are recommended to upgrade to version 2.8.0, which fixes this issue.

thehackerwire@mastodon.social at 2026-03-03T15:38:24.000Z ##

🔴 CVE-2025-59059 - Critical (9.8)

Remote Code Execution Vulnerability in NashornScriptEngineCreator is reported in Apache Ranger versions &lt;= 2.7.0.
Users are recommended to upgrade to version 2.8.0, which fixes this issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:37:12.000Z ##

🔴 CVE-2025-59059 - Critical (9.8)

Remote Code Execution Vulnerability in NashornScriptEngineCreator is reported in Apache Ranger versions &lt;= 2.7.0.
Users are recommended to upgrade to version 2.8.0, which fixes this issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:38:24.000Z ##

🔴 CVE-2025-59059 - Critical (9.8)

Remote Code Execution Vulnerability in NashornScriptEngineCreator is reported in Apache Ranger versions &lt;= 2.7.0.
Users are recommended to upgrade to version 2.8.0, which fixes this issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:37:12.000Z ##

🔴 CVE-2025-59059 - Critical (9.8)

Remote Code Execution Vulnerability in NashornScriptEngineCreator is reported in Apache Ranger versions &lt;= 2.7.0.
Users are recommended to upgrade to version 2.8.0, which fixes this issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-12345
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-03T21:52:29.877000

2 posts

A security vulnerability has been detected in LLM-Claw 0.1.0/0.1.1/0.1.1a/0.1.1a-p1. The affected element is the function agent_deploy_init of the file /agents/deploy/initiate.c of the component Agent Deployment. Such manipulation leads to buffer overflow. It is possible to launch the attack remotely. A patch should be applied to remediate this issue.

thehackerwire@mastodon.social at 2026-03-03T07:25:39.000Z ##

🟠 CVE-2025-12345 - High (8.8)

A security vulnerability has been detected in LLM-Claw 0.1.0/0.1.1/0.1.1a/0.1.1a-p1. The affected element is the function agent_deploy_init of the file /agents/deploy/initiate.c of the component Agent Deployment. Such manipulation leads to buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T07:25:39.000Z ##

🟠 CVE-2025-12345 - High (8.8)

A security vulnerability has been detected in LLM-Claw 0.1.0/0.1.1/0.1.1a/0.1.1a-p1. The affected element is the function agent_deploy_init of the file /agents/deploy/initiate.c of the component Agent Deployment. Such manipulation leads to buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3336
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-03T21:52:29.877000

2 posts

Improper certificate validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass certificate chain verification when processing PKCS7 objects with multiple signers, except the final signer. Customers of AWS services do not need to take action. Applications using AWS-LC should upgrade to AWS-LC version 1.69.0.

awssecurityfeed@infosec.exchange at 2026-03-02T23:30:01.000Z ##

Issue with AWS-LC: an open-source, general-purpose cryptographic library (CVE-2026-3336, CVE-2026-3337, CVE-2026-3338)

Bulletin ID: 2026-005-AWS Scope: AWS Content Type: Important (requires attention) Publication Date: 2026/03/02 14:30 PM PST
Description:
AWS-LC is an open-source, general-purpose cryptographic library. We identified three distin...

aws.amazon.com/security/securi

#aws #security

##

thehackerwire@mastodon.social at 2026-03-02T22:22:20.000Z ##

🟠 CVE-2026-3336 - High (7.5)

Improper certificate validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass certificate chain verification when processing PKCS7 objects with multiple signers, except the final signer.

Customers of AWS services do not nee...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0032
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T21:32:19

4 posts

In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T15:38:33.000Z ##

🟠 CVE-2026-0032 - High (7.8)

In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:37:29.000Z ##

🟠 CVE-2026-0032 - High (7.8)

In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:38:33.000Z ##

🟠 CVE-2026-0032 - High (7.8)

In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:37:29.000Z ##

🟠 CVE-2026-0032 - High (7.8)

In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3400
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-03T21:31:12

2 posts

A security flaw has been discovered in Tenda AC15 up to 15.13.07.13. Affected by this issue is some unknown functionality of the file /goform/TextEditingConversion. The manipulation of the argument wpapsk_crypto2_4g results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-03-02T00:21:00.000Z ##

🟠 CVE-2026-3400 - High (8.8)

A security flaw has been discovered in Tenda AC15 up to 15.13.07.13. Affected by this issue is some unknown functionality of the file /goform/TextEditingConversion. The manipulation of the argument wpapsk_crypto2_4g results in stack-based buffer o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-02T00:00:39.000Z ##

🛡️ CVE-2026-3400 (HIGH, CVSS 8.7): Stack-based buffer overflow in Tenda AC15 routers (≤v15.13.07.13) allows unauthenticated remote code execution. PoC code is public. Restrict access & monitor for patches! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #CVE #Vulnerability

##

CVE-2026-24114
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-03T20:16:47.607000

2 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate `pPortMapIndex` may lead to buffer overflows when using `strcpy`.

thehackerwire@mastodon.social at 2026-03-03T16:03:31.000Z ##

🔴 CVE-2026-24114 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate `pPortMapIndex` may lead to buffer overflows when using `strcpy`.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:03:31.000Z ##

🔴 CVE-2026-24114 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate `pPortMapIndex` may lead to buffer overflows when using `strcpy`.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24112
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-03T20:16:47.360000

2 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by specifying the value of `userInfo`. When `userInfo` is passed into the `addWewifiWhiteUser` function and processed by `sscanf` without size validation, it could lead to a buffer overflow vulnerability.

thehackerwire@mastodon.social at 2026-03-03T16:00:19.000Z ##

🔴 CVE-2026-24112 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by specifying the value of `userInfo`. When `userInfo` is passed into the `addWewifiWhiteUser` function and processed by `sscanf` without size validat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:00:19.000Z ##

🔴 CVE-2026-24112 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by specifying the value of `userInfo`. When `userInfo` is passed into the `addWewifiWhiteUser` function and processed by `sscanf` without size validat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22719
(8.1 HIGH)

EPSS: 0.47%

updated 2026-03-03T20:16:47.160000

6 posts

VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.  To remediate CVE-2026-22719, apply the patches listed in the 'Fixed Version' column of the ' Response Matrix https://supp

secdb at 2026-03-04T00:00:20.308Z ##

🚨 [CISA-2026:0303] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-21385 (secdb.nttzen.cloud/cve/detail/)
- Name: Qualcomm Multiple Chipsets Memory Corruption Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Qualcomm
- Product: Multiple Chipsets
- Notes: source.android.com/docs/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-22719 (secdb.nttzen.cloud/cve/detail/)
- Name: Broadcom VMware Aria Operations Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Broadcom
- Product: VMware Aria Operations
- Notes: support.broadcom.com/web/ecx/s ; knowledge.broadcom.com/externa ; nvd.nist.gov/vuln/detail/CVE-2

##

oversecurity@mastodon.social at 2026-03-03T23:50:16.000Z ##

CISA flags VMware Aria Operations RCE flaw as exploited in attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability tracked as CVE-2026-22719 to its...

🔗️ [Bleepingcomputer] link.is.it/bR3nUY

##

cisakevtracker@mastodon.social at 2026-03-03T19:00:58.000Z ##

CVE ID: CVE-2026-22719
Vendor: Broadcom
Product: VMware Aria Operations
Date Added: 2026-03-03
Notes: support.broadcom.com/web/ecx/s ; knowledge.broadcom.com/externa ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-03-04T00:00:20.000Z ##

🚨 [CISA-2026:0303] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-21385 (secdb.nttzen.cloud/cve/detail/)
- Name: Qualcomm Multiple Chipsets Memory Corruption Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Qualcomm
- Product: Multiple Chipsets
- Notes: source.android.com/docs/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-22719 (secdb.nttzen.cloud/cve/detail/)
- Name: Broadcom VMware Aria Operations Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Broadcom
- Product: VMware Aria Operations
- Notes: support.broadcom.com/web/ecx/s ; knowledge.broadcom.com/externa ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260303 #cisa20260303 #cve_2026_21385 #cve_2026_22719 #cve202621385 #cve202622719

##

oversecurity@mastodon.social at 2026-03-03T23:50:16.000Z ##

CISA flags VMware Aria Operations RCE flaw as exploited in attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability tracked as CVE-2026-22719 to its...

🔗️ [Bleepingcomputer] link.is.it/bR3nUY

##

cisakevtracker@mastodon.social at 2026-03-03T19:00:58.000Z ##

CVE ID: CVE-2026-22719
Vendor: Broadcom
Product: VMware Aria Operations
Date Added: 2026-03-03
Notes: support.broadcom.com/web/ecx/s ; knowledge.broadcom.com/externa ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-21385
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T20:16:46.140000

15 posts

Memory corruption while using alignments for memory allocation.

1 repos

https://github.com/skincaree/qualcomm-vulnerability-scanner

secdb at 2026-03-04T00:00:20.308Z ##

🚨 [CISA-2026:0303] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-21385 (secdb.nttzen.cloud/cve/detail/)
- Name: Qualcomm Multiple Chipsets Memory Corruption Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Qualcomm
- Product: Multiple Chipsets
- Notes: source.android.com/docs/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-22719 (secdb.nttzen.cloud/cve/detail/)
- Name: Broadcom VMware Aria Operations Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Broadcom
- Product: VMware Aria Operations
- Notes: support.broadcom.com/web/ecx/s ; knowledge.broadcom.com/externa ; nvd.nist.gov/vuln/detail/CVE-2

##

undercodenews@mastodon.social at 2026-03-03T21:13:20.000Z ##

Qualcomm Zero-Day CVE-2026-21385 Exploited in Targeted Android Attacks as Spyware Suspicions Rise

A High-Severity Android Vulnerability Sparks Quiet Alarm Across the Security Industry A newly disclosed zero-day vulnerability in Qualcomm chipsets is drawing serious attention after evidence emerged that it has already been exploited in limited and targeted attacks. The flaw, tracked as CVE-2026-21385, affects Android devices powered by a broad range of Qualcomm…

undercodenews.com/qualcomm-zer

##

cisakevtracker@mastodon.social at 2026-03-03T19:01:13.000Z ##

CVE ID: CVE-2026-21385
Vendor: Qualcomm
Product: Multiple Chipsets
Date Added: 2026-03-03
Notes: source.android.com/docs/securi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

oversecurity@mastodon.social at 2026-03-03T15:50:04.000Z ##

Aggiornamenti Android marzo 2026, corretta una zero-day già sfruttata: cosa fare subito

Google ha rilasciato l’Android Security Bulletin di marzo 2026, il più corposo dell’anno: 129 vulnerabilità corrette di cui una, la CVE-2026-21385...

🔗️ [Cybersecurity360] link.is.it/AC1JZ9

##

threatcodex at 2026-03-03T15:40:18.392Z ##

Google confirms that the Qualcomm Android vulnerability CVE-2026-21385 was exploited in real-world attacks.

securityaffairs.com/188823/sec

##

beyondmachines1 at 2026-03-03T14:01:11.468Z ##

Google Android March 2026 Security Bulletin Patches 129 Vulnerabilities, One Actively Exploited Qualcomm Flaw

Google's March 2026 Android Security Bulletin patches 129 vulnerabilities, including a critical RCE flaw (CVE-2026-0006) requiring no user interaction and multiple CVSS 9.0 privilege escalation bugs in the kernel virtualization layer. A Qualcomm Display component vulnerability (CVE-2026-21385) is already being actively exploited in targeted attacks in the wild.

**An critical update for Android, with actively exploited flaw patched. Most users can't rush the patch because their vendors may not have released an updated version of Android for their devices. Do not delay the update to your Android when the you see the alert that an update is available. Your device may be targeted via the Qualcomm flaw.**

beyondmachines.net/event_detai

##

Matchbook3469@mastodon.social at 2026-03-03T13:53:41.000Z ##

⚠️ THREAT INTELLIGENCE

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

Vulnerability | HIGH
CVEs: CVE-2026-0628, CVE-2026-21385

Google has released security updates to patch 129 Android security vulnerabilities, including an actively exploited zero-day flaw in a Qualcomm...

Full analysis:
yazoul.net/news/news/new-chrom

#CyberSecurity #CVE #SecurityOps

##

jbhall56 at 2026-03-03T13:15:52.594Z ##

The exploited flaw, tracked as CVE-2026-21385 (CVSS score of 7.8) and impacting the graphics component of over 200 Qualcomm chipsets, is described as an integer overflow or wraparound issue leading to memory corruption while using alignments for memory allocation. securityweek.com/android-updat

##

secdb@infosec.exchange at 2026-03-04T00:00:20.000Z ##

🚨 [CISA-2026:0303] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-21385 (secdb.nttzen.cloud/cve/detail/)
- Name: Qualcomm Multiple Chipsets Memory Corruption Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Qualcomm
- Product: Multiple Chipsets
- Notes: source.android.com/docs/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-22719 (secdb.nttzen.cloud/cve/detail/)
- Name: Broadcom VMware Aria Operations Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Broadcom
- Product: VMware Aria Operations
- Notes: support.broadcom.com/web/ecx/s ; knowledge.broadcom.com/externa ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260303 #cisa20260303 #cve_2026_21385 #cve_2026_22719 #cve202621385 #cve202622719

##

cisakevtracker@mastodon.social at 2026-03-03T19:01:13.000Z ##

CVE ID: CVE-2026-21385
Vendor: Qualcomm
Product: Multiple Chipsets
Date Added: 2026-03-03
Notes: source.android.com/docs/securi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

oversecurity@mastodon.social at 2026-03-03T15:50:04.000Z ##

Aggiornamenti Android marzo 2026, corretta una zero-day già sfruttata: cosa fare subito

Google ha rilasciato l’Android Security Bulletin di marzo 2026, il più corposo dell’anno: 129 vulnerabilità corrette di cui una, la CVE-2026-21385...

🔗️ [Cybersecurity360] link.is.it/AC1JZ9

##

threatcodex@infosec.exchange at 2026-03-03T15:40:18.000Z ##

Google confirms that the Qualcomm Android vulnerability CVE-2026-21385 was exploited in real-world attacks.
#CVE_2026_21385
securityaffairs.com/188823/sec

##

beyondmachines1@infosec.exchange at 2026-03-03T14:01:11.000Z ##

Google Android March 2026 Security Bulletin Patches 129 Vulnerabilities, One Actively Exploited Qualcomm Flaw

Google's March 2026 Android Security Bulletin patches 129 vulnerabilities, including a critical RCE flaw (CVE-2026-0006) requiring no user interaction and multiple CVSS 9.0 privilege escalation bugs in the kernel virtualization layer. A Qualcomm Display component vulnerability (CVE-2026-21385) is already being actively exploited in targeted attacks in the wild.

**An critical update for Android, with actively exploited flaw patched. Most users can't rush the patch because their vendors may not have released an updated version of Android for their devices. Do not delay the update to your Android when the you see the alert that an update is available. Your device may be targeted via the Qualcomm flaw.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

jbhall56@infosec.exchange at 2026-03-03T13:15:52.000Z ##

The exploited flaw, tracked as CVE-2026-21385 (CVSS score of 7.8) and impacting the graphics component of over 200 Qualcomm chipsets, is described as an integer overflow or wraparound issue leading to memory corruption while using alignments for memory allocation. securityweek.com/android-updat

##

thehackerwire@mastodon.social at 2026-03-02T17:19:37.000Z ##

🟠 CVE-2026-21385 - High (7.8)

Memory corruption while using alignments for memory allocation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24101
(9.8 CRITICAL)

EPSS: 0.29%

updated 2026-03-03T19:44:19.120000

2 posts

An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_multi. When the condition is met, `s1_1` will be passed into sub_B0488, concatenated into `doSystemCmd`. The value of s1_1 is not validated, potentially leading to a command injection vulnerability.

thehackerwire@mastodon.social at 2026-03-02T19:12:57.000Z ##

🔴 CVE-2026-24101 - Critical (9.8)

An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_multi. When the condition is met, `s1_1` will be passed into sub_B0488, concatenated into `doSystemCmd`. The value of s1_1 is not validated, potentially leading to a comm...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-02T19:00:41.000Z ##

🔴 CVE-2026-24101 - Critical (9.8)

An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_multi. When the condition is met, `s1_1` will be passed into sub_B0488, concatenated into `doSystemCmd`. The value of s1_1 is not validated, potentially leading to a comm...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48582
(8.4 HIGH)

EPSS: 0.00%

updated 2026-03-03T19:25:48.063000

2 posts

In multiple locations, there is a possible way to delete media without the MANAGE_EXTERNAL_STORAGE permission due to an intent redirect. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T08:18:41.000Z ##

🟠 CVE-2025-48582 - High (8.4)

In multiple locations, there is a possible way to delete media without the MANAGE_EXTERNAL_STORAGE permission due to an intent redirect. This could lead to local escalation of privilege with no additional execution privileges needed. User interact...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T08:18:41.000Z ##

🟠 CVE-2025-48582 - High (8.4)

In multiple locations, there is a possible way to delete media without the MANAGE_EXTERNAL_STORAGE permission due to an intent redirect. This could lead to local escalation of privilege with no additional execution privileges needed. User interact...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48602
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T19:25:08.307000

2 posts

In exitKeyguardAndFinishSurfaceBehindRemoteAnimation of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T16:32:08.000Z ##

🟠 CVE-2025-48602 - High (8.4)

In exitKeyguardAndFinishSurfaceBehindRemoteAnimation of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges nee...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:32:08.000Z ##

🟠 CVE-2025-48602 - High (8.4)

In exitKeyguardAndFinishSurfaceBehindRemoteAnimation of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges nee...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48645
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T19:23:29.340000

2 posts

In loadDescription of DeviceAdminInfo.java, there is a possible persistent package due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T15:46:06.000Z ##

🟠 CVE-2025-48645 - High (7.8)

In loadDescription of DeviceAdminInfo.java, there is a possible persistent package due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed fo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:46:06.000Z ##

🟠 CVE-2025-48645 - High (7.8)

In loadDescription of DeviceAdminInfo.java, there is a possible persistent package due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed fo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48653
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T19:23:05.510000

2 posts

In loadDataAndPostValue of multiple files, there is a possible way to obscure permission usage due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T15:46:16.000Z ##

🟠 CVE-2025-48653 - High (7.8)

In loadDataAndPostValue of multiple files, there is a possible way to obscure permission usage due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:46:16.000Z ##

🟠 CVE-2025-48653 - High (7.8)

In loadDataAndPostValue of multiple files, there is a possible way to obscure permission usage due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-52482
(8.3 HIGH)

EPSS: 0.04%

updated 2026-03-03T19:13:35.437000

1 posts

Chamilo is a learning management system. Prior to version 1.11.30, a Stored XSS vulnerability exists in the glossary function, enabling all users with the Teachers role to inject JavaScript malicious code against the administrator. This issue has been patched in version 1.11.30.

thehackerwire@mastodon.social at 2026-03-02T16:00:25.000Z ##

🟠 CVE-2025-52482 - High (8.3)

Chamilo is a learning management system. Prior to version 1.11.30, a Stored XSS vulnerability exists in the glossary function, enabling all users with the Teachers role to inject JavaScript malicious code against the administrator. This issue has ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-50187
(9.8 CRITICAL)

EPSS: 0.29%

updated 2026-03-03T19:12:14.917000

2 posts

Chamilo is a learning management system. Prior to version 1.11.28, parameter from SOAP request is evaluated without filtering which leads to Remote Code Execution. This issue has been patched in version 1.11.28.

thehackerwire@mastodon.social at 2026-03-02T16:29:50.000Z ##

🔴 CVE-2025-50187 - Critical (9.8)

Chamilo is a learning management system. Prior to version 1.11.28, parameter from SOAP request is evaluated without filtering which leads to Remote Code Execution. This issue has been patched in version 1.11.28.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-02T16:00:20.000Z ##

🔴 CVE-2025-50187 - Critical (9.8)

Chamilo is a learning management system. Prior to version 1.11.28, parameter from SOAP request is evaluated without filtering which leads to Remote Code Execution. This issue has been patched in version 1.11.28.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0021
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:42:10.833000

1 posts

In hasInteractAcrossUsersFullPermission of AppInfoBase.java, there is a possible cross-user permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-02T23:00:39.000Z ##

🟠 CVE-2026-0021 - High (8.4)

In hasInteractAcrossUsersFullPermission of AppInfoBase.java, there is a possible cross-user permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interacti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0011
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:41:55.677000

2 posts

In enableSystemPackageLPw of Settings.java, there is a possible way to prevent location access from working due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T16:21:23.000Z ##

🟠 CVE-2026-0011 - High (8.4)

In enableSystemPackageLPw of Settings.java, there is a possible way to prevent location access from working due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User int...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:21:23.000Z ##

🟠 CVE-2026-0011 - High (8.4)

In enableSystemPackageLPw of Settings.java, there is a possible way to prevent location access from working due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User int...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0017
(7.7 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:40:59.027000

2 posts

In onChange of BiometricService.java, there is a possible way to enable fingerprint unlock due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T16:20:34.000Z ##

🟠 CVE-2026-0017 - High (7.7)

In onChange of BiometricService.java, there is a possible way to enable fingerprint unlock due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:20:34.000Z ##

🟠 CVE-2026-0017 - High (7.7)

In onChange of BiometricService.java, there is a possible way to enable fingerprint unlock due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48605
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:32:35

2 posts

In multiple functions of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T16:32:18.000Z ##

🟠 CVE-2025-48605 - High (8.4)

In multiple functions of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not ne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:32:18.000Z ##

🟠 CVE-2025-48605 - High (8.4)

In multiple functions of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not ne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48619
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:32:35

2 posts

In multiple functions of ContentProvider.java, there is a possible way for an app with read-only access to truncate files due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T16:31:57.000Z ##

🟠 CVE-2025-48619 - High (8.4)

In multiple functions of ContentProvider.java, there is a possible way for an app with read-only access to truncate files due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges ne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:31:57.000Z ##

🟠 CVE-2025-48619 - High (8.4)

In multiple functions of ContentProvider.java, there is a possible way for an app with read-only access to truncate files due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges ne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-52365
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-03T18:32:35

2 posts

A command injection vulnerability in the szc script of the ccurtsinger/stabilizer repository allows remote attackers to execute arbitrary system commands via unsanitized user input passed to os.system(). The vulnerability arises from improper input handling where command-line arguments are directly concatenated into shell commands without validation

thehackerwire@mastodon.social at 2026-03-03T16:20:24.000Z ##

🟠 CVE-2025-52365 - High (7.8)

A command injection vulnerability in the szc script of the ccurtsinger/stabilizer repository allows remote attackers to execute arbitrary system commands via unsanitized user input passed to os.system(). The vulnerability arises from improper inpu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:20:24.000Z ##

🟠 CVE-2025-52365 - High (7.8)

A command injection vulnerability in the szc script of the ccurtsinger/stabilizer repository allows remote attackers to execute arbitrary system commands via unsanitized user input passed to os.system(). The vulnerability arises from improper inpu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25673
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-03T18:32:35

2 posts

An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29. `URLField.to_python()` in Django calls `urllib.parse.urlsplit()`, which performs NFKC normalization on Windows that is disproportionately slow for certain Unicode characters, allowing a remote attacker to cause denial of service via large URL inputs containing these characters. Earlier, unsupported Django series

thehackerwire@mastodon.social at 2026-03-03T16:20:15.000Z ##

🟠 CVE-2026-25673 - High (7.5)

An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29.
`URLField.to_python()` in Django calls `urllib.parse.urlsplit()`, which performs NFKC normalization on Windows that is disproportionately slow for certain Unico...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:20:15.000Z ##

🟠 CVE-2026-25673 - High (7.5)

An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29.
`URLField.to_python()` in Django calls `urllib.parse.urlsplit()`, which performs NFKC normalization on Windows that is disproportionately slow for certain Unico...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48654
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:32:35

2 posts

In onStart of CompanionDeviceManagerService.java, there is a possible confused deputy due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T15:46:26.000Z ##

🟠 CVE-2025-48654 - High (7.8)

In onStart of CompanionDeviceManagerService.java, there is a possible confused deputy due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:46:26.000Z ##

🟠 CVE-2025-48654 - High (7.8)

In onStart of CompanionDeviceManagerService.java, there is a possible confused deputy due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48635
(7.7 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:32:34

2 posts

In multiple functions of TaskFragmentOrganizerController.java, there is a possible activity token leak due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T17:35:38.000Z ##

🟠 CVE-2025-48635 - High (7.7)

In multiple functions of TaskFragmentOrganizerController.java, there is a possible activity token leak due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interact...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T17:35:38.000Z ##

🟠 CVE-2025-48635 - High (7.7)

In multiple functions of TaskFragmentOrganizerController.java, there is a possible activity token leak due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interact...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20777
(8.1 HIGH)

EPSS: 0.00%

updated 2026-03-03T18:31:33

2 posts

A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted .wft file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

thehackerwire@mastodon.social at 2026-03-03T15:36:57.000Z ##

🟠 CVE-2026-20777 - High (8.1)

A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted .wft file can lead to arbitrary code execution. An attacker can prov...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:36:57.000Z ##

🟠 CVE-2026-20777 - High (8.1)

A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted .wft file can lead to arbitrary code execution. An attacker can prov...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48613
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:31:32

2 posts

In VBMeta, there is a possible way to modify and resign VBMeta using a test key, assuming the original image was previously signed with the same key. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T16:21:43.000Z ##

🟠 CVE-2025-48613 - High (7.8)

In VBMeta, there is a possible way to modify and resign VBMeta using a test key, assuming the original image was previously signed with the same key. This could lead to local escalation of privilege with no additional execution privileges needed. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:21:43.000Z ##

🟠 CVE-2025-48613 - High (7.8)

In VBMeta, there is a possible way to modify and resign VBMeta using a test key, assuming the original image was previously signed with the same key. This could lead to local escalation of privilege with no additional execution privileges needed. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48609
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-03-03T18:31:32

2 posts

In multiple functions of MmsProvider.java, there is a possible way to arbitrarily delete files which affect telephony, SMS, and MMS functionalities due to a path traversal error. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T16:21:33.000Z ##

🔴 CVE-2025-48609 - Critical (9.1)

In multiple functions of MmsProvider.java, there is a possible way to arbitrarily delete files which affect telephony, SMS, and MMS functionalities due to a path traversal error. This could lead to local denial of service with no additional execut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:21:33.000Z ##

🔴 CVE-2025-48609 - Critical (9.1)

In multiple functions of MmsProvider.java, there is a possible way to arbitrarily delete files which affect telephony, SMS, and MMS functionalities due to a path traversal error. This could lead to local denial of service with no additional execut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22891
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-03T18:31:32

2 posts

A heap-based buffer overflow vulnerability exists in the Intan CLP parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted Intan CLP file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

thehackerwire@mastodon.social at 2026-03-03T15:37:07.000Z ##

🔴 CVE-2026-22891 - Critical (9.8)

A heap-based buffer overflow vulnerability exists in the Intan CLP parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted Intan CLP file can lead to arbitrary code execution. An attacker can p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:37:07.000Z ##

🔴 CVE-2026-22891 - Critical (9.8)

A heap-based buffer overflow vulnerability exists in the Intan CLP parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted Intan CLP file can lead to arbitrary code execution. An attacker can p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24115
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-03T18:31:31

2 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the sizes of `gstup` and `gstdwn` before concatenating them into `gstruleQos` may lead to buffer overflow.

thehackerwire@mastodon.social at 2026-03-03T17:00:26.000Z ##

🔴 CVE-2026-24115 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the sizes of `gstup` and `gstdwn` before concatenating them into `gstruleQos` may lead to buffer overflow.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T17:00:26.000Z ##

🔴 CVE-2026-24115 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the sizes of `gstup` and `gstdwn` before concatenating them into `gstruleQos` may lead to buffer overflow.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24113
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-03T18:31:30

2 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `nptr`. When this value is passed into the `getMibPrefix` function and concatenated using `sprintf` without proper size validation, it could lead to a buffer overflow vulnerability.

thehackerwire@mastodon.social at 2026-03-03T16:03:21.000Z ##

🔴 CVE-2026-24113 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `nptr`. When this value is passed into the `getMibPrefix` function and concatenated using `sprintf` without proper size va...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:03:21.000Z ##

🔴 CVE-2026-24113 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `nptr`. When this value is passed into the `getMibPrefix` function and concatenated using `sprintf` without proper size va...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24111
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-03T18:31:29

2 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by specifying the value of `userInfo`. When `userInfo` is passed into the `addAuthUser` function and processed by `sscanf` without size validation, it could lead to buffer overflow.

thehackerwire@mastodon.social at 2026-03-03T16:03:11.000Z ##

🔴 CVE-2026-24111 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by specifying the value of `userInfo`. When `userInfo` is passed into the `addAuthUser` function and processed by `sscanf` without size validation, it...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:03:11.000Z ##

🔴 CVE-2026-24111 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by specifying the value of `userInfo`. When `userInfo` is passed into the `addAuthUser` function and processed by `sscanf` without size validation, it...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24109
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-03T18:31:29

2 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `picName`. When this value is used in `sprintf` without validating variable sizes, it could lead to a buffer overflow vulnerability.

thehackerwire@mastodon.social at 2026-03-03T16:00:30.000Z ##

🔴 CVE-2026-24109 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `picName`. When this value is used in `sprintf` without validating variable sizes, it could lead to a buffer overflow vuln...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:00:30.000Z ##

🔴 CVE-2026-24109 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `picName`. When this value is used in `sprintf` without validating variable sizes, it could lead to a buffer overflow vuln...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-52998
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-03T18:21:38.663000

2 posts

Chamilo is a learning management system. Prior to version 1.11.30, in the application, deserialization of data is performed, the data can be spoofed. An attacker can create objects of arbitrary classes, as well as fully control their properties, and thus modify the logic of the web application's operation. This issue has been patched in version 1.11.30.

thehackerwire@mastodon.social at 2026-03-03T19:00:16.000Z ##

🔴 CVE-2025-52998 - Critical (9.8)

Chamilo is a learning management system. Prior to version 1.11.30, in the application, deserialization of data is performed, the data can be spoofed. An attacker can create objects of arbitrary classes, as well as fully control their properties, a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T19:00:16.000Z ##

🔴 CVE-2025-52998 - Critical (9.8)

Chamilo is a learning management system. Prior to version 1.11.30, in the application, deserialization of data is performed, the data can be spoofed. An attacker can create objects of arbitrary classes, as well as fully control their properties, a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3376
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-03T17:35:16.400000

2 posts

A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromSafeMacFilter of the file /goform/SafeMacFilter. Such manipulation of the argument page leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

offseq@infosec.exchange at 2026-03-01T09:00:26.000Z ##

🔒 CVE-2026-3376: HIGH severity buffer overflow in Tenda F453 v1.0.0.3 (/goform/SafeMacFilter). Public exploit enables remote code execution — no auth needed. Isolate devices & restrict access until patched. radar.offseq.com/threat/cve-20 #OffSeq #RouterVuln #InfoSec

##

thehackerwire@mastodon.social at 2026-03-01T05:00:55.000Z ##

🟠 CVE-2026-3376 - High (8.8)

A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromSafeMacFilter of the file /goform/SafeMacFilter. Such manipulation of the argument page leads to buffer overflow. It is possible t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3379
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-03T17:33:26.577000

2 posts

A vulnerability has been found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSetIpBind of the file /goform/SetIpBind. The manipulation of the argument page leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-03-01T04:26:37.000Z ##

🟠 CVE-2026-3379 - High (8.8)

A vulnerability has been found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSetIpBind of the file /goform/SetIpBind. The manipulation of the argument page leads to buffer overflow. The attack may be initiated remotely. The ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-01T03:00:27.000Z ##

🚨 HIGH severity: Tenda F453 v1.0.0.3 has a buffer overflow (CVE-2026-3379) in /goform/SetIpBind. Remotely exploitable with no auth. Restrict access, monitor for exploit attempts, and patch ASAP. radar.offseq.com/threat/cve-20 #OffSeq #Cybersecurity #Vulnerability #CVE20263379

##

CVE-2026-3398
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-03T17:32:11.063000

2 posts

A vulnerability was determined in Tenda F453 1.0.0.3. Affected is the function fromAdvSetWan of the file /goform/AdvSetWan of the component httpd. Executing a manipulation of the argument wanmode/PPPOEPassword can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

offseq@infosec.exchange at 2026-03-02T03:00:27.000Z ##

🔎 HIGH severity: Tenda F453 v1.0.0.3 vulnerable to remote buffer overflow (CVE-2026-3398) via /goform/AdvSetWan. Exploit public, RCE possible with no auth. Disable remote admin & monitor for exploits. Patch ASAP. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #RouterSec

##

thehackerwire@mastodon.social at 2026-03-01T22:19:46.000Z ##

🟠 CVE-2026-3398 - High (8.8)

A vulnerability was determined in Tenda F453 1.0.0.3. Affected is the function fromAdvSetWan of the file /goform/AdvSetWan of the component httpd. Executing a manipulation of the argument wanmode/PPPOEPassword can lead to buffer overflow. The atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48579
(8.4 HIGH)

EPSS: 0.00%

updated 2026-03-03T17:04:04.223000

2 posts

In multiple functions of MediaProvider.java, there is a possible external storage write permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T08:18:32.000Z ##

🟠 CVE-2025-48579 - High (8.4)

In multiple functions of MediaProvider.java, there is a possible external storage write permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T08:18:32.000Z ##

🟠 CVE-2025-48579 - High (8.4)

In multiple functions of MediaProvider.java, there is a possible external storage write permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26710
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-03T16:16:21.417000

1 posts

code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /food/routers/edit-orders.php.

Matchbook3469@mastodon.social at 2026-03-03T17:37:04.000Z ##

⛔ New security advisory:

CVE-2026-26710 affects Carmelo Simple Food Order System.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

CVE-2026-24108
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-03T15:54:49.147000

2 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `nptr`. When this value is passed into the `getMibPrefix` function and concatenated using `sprintf` without proper size validation, it could lead to a buffer overflow vulnerability.

thehackerwire@mastodon.social at 2026-03-03T08:51:14.000Z ##

🔴 CVE-2026-24108 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `nptr`. When this value is passed into the `getMibPrefix` function and concatenated using `sprintf` without proper size va...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T08:51:14.000Z ##

🔴 CVE-2026-24108 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `nptr`. When this value is passed into the `getMibPrefix` function and concatenated using `sprintf` without proper size va...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0007
(8.6 HIGH)

EPSS: 0.01%

updated 2026-03-03T15:32:43

2 posts

In writeToParcel of WindowInfo.cpp, there is a possible way to trick a user into accepting a permission due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T14:18:10.000Z ##

🟠 CVE-2026-0007 - High (8.6)

In writeToParcel of WindowInfo.cpp, there is a possible way to trick a user into accepting a permission due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User inter...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T14:18:10.000Z ##

🟠 CVE-2026-0007 - High (8.6)

In writeToParcel of WindowInfo.cpp, there is a possible way to trick a user into accepting a permission due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User inter...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0023
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T15:32:43

2 posts

In createSessionInternal of PackageInstallerService.java, there is a possible way for an app to update its ownership due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T14:18:00.000Z ##

🟠 CVE-2026-0023 - High (8.4)

In createSessionInternal of PackageInstallerService.java, there is a possible way for an app to update its ownership due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T14:18:00.000Z ##

🟠 CVE-2026-0023 - High (8.4)

In createSessionInternal of PackageInstallerService.java, there is a possible way for an app to update its ownership due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0025
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T15:31:40

4 posts

In hasImage of Notification.java, there is a possible way to reveal information across users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T15:38:43.000Z ##

🟠 CVE-2026-0025 - High (7.8)

In hasImage of Notification.java, there is a possible way to reveal information across users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not need...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:37:40.000Z ##

🟠 CVE-2026-0025 - High (7.8)

In hasImage of Notification.java, there is a possible way to reveal information across users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not need...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:38:43.000Z ##

🟠 CVE-2026-0025 - High (7.8)

In hasImage of Notification.java, there is a possible way to reveal information across users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not need...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:37:40.000Z ##

🟠 CVE-2026-0025 - High (7.8)

In hasImage of Notification.java, there is a possible way to reveal information across users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not need...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0029
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-03-03T15:31:40

2 posts

In __pkvm_init_vm of pkvm.c, there is a possible memory corruption due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T15:37:18.000Z ##

🔴 CVE-2026-0029 - Critical (9.8)

In __pkvm_init_vm of pkvm.c, there is a possible memory corruption due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:37:18.000Z ##

🔴 CVE-2026-0029 - Critical (9.8)

In __pkvm_init_vm of pkvm.c, there is a possible memory corruption due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0010
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T15:31:40

2 posts

In onTransact of IDrmManagerService.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T14:18:21.000Z ##

🟠 CVE-2026-0010 - High (8.4)

In onTransact of IDrmManagerService.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T14:18:21.000Z ##

🟠 CVE-2026-0010 - High (8.4)

In onTransact of IDrmManagerService.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0037
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T15:31:40

1 posts

In multiple functions of ffa.c, there is a possible memory corruption due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-02T22:00:36.000Z ##

🟠 CVE-2026-0037 - High (8.4)

In multiple functions of ffa.c, there is a possible memory corruption due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24105
(9.8 CRITICAL)

EPSS: 0.15%

updated 2026-03-03T15:31:37

2 posts

An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.18_multi. The value of `v1` was not checked, potentially leading to a command injection vulnerability if injected into doSystemCmd.

thehackerwire@mastodon.social at 2026-03-03T16:00:08.000Z ##

🔴 CVE-2026-24105 - Critical (9.8)

An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.18_multi. The value of `v1` was not checked, potentially leading to a command injection vulnerability if injected into doSystemCmd.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T16:00:08.000Z ##

🔴 CVE-2026-24105 - Critical (9.8)

An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.18_multi. The value of `v1` was not checked, potentially leading to a command injection vulnerability if injected into doSystemCmd.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20423
(7.1 HIGH)

EPSS: 0.01%

updated 2026-03-03T15:31:36

2 posts

In wlan STA driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00465314; Issue ID: MSV-4956.

thehackerwire@mastodon.social at 2026-03-03T17:59:53.000Z ##

🟠 CVE-2026-20423 - High (7.8)

In wlan STA driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR0046...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T17:59:53.000Z ##

🟠 CVE-2026-20423 - High (7.8)

In wlan STA driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR0046...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0038
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T15:31:35.410000

1 posts

In multiple functions of mem_protect.c, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-02T22:14:48.000Z ##

🟠 CVE-2026-0038 - High (8.4)

In multiple functions of mem_protect.c, there is a possible way to execute arbitrary code due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not ne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0031
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T15:26:21.807000

1 posts

In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-02T21:19:54.000Z ##

🟠 CVE-2026-0031 - High (8.4)

In multiple functions of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21902
(9.8 CRITICAL)

EPSS: 0.33%

updated 2026-03-03T15:16:18.363000

8 posts

An Incorrect Permission Assignment for Critical Resource vulnerability in the On-Box Anomaly detection framework of Juniper Networks Junos OS Evolved on PTX Series allows an unauthenticated, network-based attacker to execute code as root. The On-Box Anomaly detection framework should only be reachable by other internal processes over the internal routing instance, but not over an externally expos

1 repos

https://github.com/watchtowrlabs/watchTowr-vs-JunosEvolved-CVE-2026-21902

AAKL at 2026-03-03T19:04:13.218Z ##

New.

WatchTower: Sometimes, You Can Just Feel The Security In The Design (Juniper Junos Evolved CVE-2026-21902 Pre-Auth RCE) labs.watchtowr.com/sometimes-y

##

threatcodex at 2026-03-03T17:36:53.729Z ##

Sometimes, You Can Just Feel The Security In The Design (Junos OS Evolved CVE-2026-21902 RCE)

labs.watchtowr.com/sometimes-y

##

glitterbean@wehavecookies.social at 2026-03-03T17:09:16.000Z ##

Sometimes, You Can Just Feel The Security In The Design (Junos OS Evolved CVE-2026-21902 RCE) labs.watchtowr.com/sometimes-y

##

_r_netsec at 2026-03-03T14:28:05.700Z ##

Sometimes, You Can Just Feel The Security In The Design (Junos OS Evolved CVE-2026-21902 RCE) - watchTowr Labs labs.watchtowr.com/sometimes-y

##

AAKL@infosec.exchange at 2026-03-03T19:04:13.000Z ##

New.

WatchTower: Sometimes, You Can Just Feel The Security In The Design (Juniper Junos Evolved CVE-2026-21902 Pre-Auth RCE) labs.watchtowr.com/sometimes-y #infosec #threatresearch

##

threatcodex@infosec.exchange at 2026-03-03T17:36:53.000Z ##

Sometimes, You Can Just Feel The Security In The Design (Junos OS Evolved CVE-2026-21902 RCE)
#CVE_2026_21902
labs.watchtowr.com/sometimes-y

##

_r_netsec@infosec.exchange at 2026-03-03T14:28:05.000Z ##

Sometimes, You Can Just Feel The Security In The Design (Junos OS Evolved CVE-2026-21902 RCE) - watchTowr Labs labs.watchtowr.com/sometimes-y

##

technadu@infosec.exchange at 2026-02-28T13:35:16.000Z ##

CVE-2026-21902 represents a high-impact infrastructure exposure.

Affected platform: Junos OS Evolved on PTX series routers.

Attack vector: Unauthenticated network access.
Privilege level: Root execution.
Service: On-Box Anomaly Detection, enabled by default.

Strategic risk:
• Traffic interception capability
• Policy manipulation
• Controller redirection
• Lateral pivoting
• Long-term foothold persistence
Although no exploitation has been observed, historically, high-performance routing infrastructure is a prime target due to its control-plane visibility and network centrality.

Recommended actions:
– Immediate patch validation
– Control-plane traffic monitoring
– Service exposure review
– Network segmentation validation
– Threat hunting for anomalous routing behavior
Are infrastructure devices integrated into your continuous detection engineering pipeline?

Source: securityweek.com/juniper-netwo

Engage below.
Follow TechNadu for high-signal vulnerability intelligence.
Repost to strengthen security awareness.

#Infosec #CVE2026 #Juniper #RouterSecurity #CriticalInfrastructure #ThreatModeling #DetectionEngineering #NetworkDefense #ZeroTrustArchitecture #CyberRisk #SecurityOperations #VulnerabilityManagement

##

CVE-2026-0026
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T13:22:41.723000

2 posts

In removePermission of PermissionManagerServiceImpl.java, there is a possible way to override any system permission due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T07:26:31.000Z ##

🟠 CVE-2026-0026 - High (7.8)

In removePermission of PermissionManagerServiceImpl.java, there is a possible way to override any system permission due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T07:26:31.000Z ##

🟠 CVE-2026-0026 - High (7.8)

In removePermission of PermissionManagerServiceImpl.java, there is a possible way to override any system permission due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0008
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T13:20:00.050000

2 posts

In multiple locations, there is a possible privilege escalation due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T08:00:14.000Z ##

🟠 CVE-2026-0008 - High (8.4)

In multiple locations, there is a possible privilege escalation due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T08:00:14.000Z ##

🟠 CVE-2026-0008 - High (8.4)

In multiple locations, there is a possible privilege escalation due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48650
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T13:17:13.197000

2 posts

In multiple locations, there is a possible information disclosure due to SQL injection. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T08:05:12.000Z ##

🟠 CVE-2025-48650 - High (8.4)

In multiple locations, there is a possible information disclosure due to SQL injection. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T08:05:12.000Z ##

🟠 CVE-2025-48650 - High (8.4)

In multiple locations, there is a possible information disclosure due to SQL injection. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22886
(9.8 CRITICAL)

EPSS: 0.16%

updated 2026-03-03T12:31:32

4 posts

OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce a mandatory password change on first use. After the first successful login, the server continues to accept the default password indefinitely without warning or enforcement. In real-world deployment

thehackerwire@mastodon.social at 2026-03-03T10:31:19.000Z ##

🔴 CVE-2026-22886 - Critical (9.8)

OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires
authentication. However, the product ships with a default administrative account (admin/
admin) and does not enforce a mandatory password change on first use. Afte...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-03-03T10:30:29.538Z ##

🛑 CRITICAL: CVE-2026-22886 in Eclipse OpenMQ lets remote attackers fully compromise brokers via default admin/admin creds if mgmt service is open. Disable unneeded services & update passwords now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-03T10:31:19.000Z ##

🔴 CVE-2026-22886 - Critical (9.8)

OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires
authentication. However, the product ships with a default administrative account (admin/
admin) and does not enforce a mandatory password change on first use. Afte...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-03T10:30:29.000Z ##

🛑 CRITICAL: CVE-2026-22886 in Eclipse OpenMQ lets remote attackers fully compromise brokers via default admin/admin creds if mgmt service is open. Disable unneeded services & update passwords now! radar.offseq.com/threat/cve-20 #OffSeq #CVE202622886 #EclipseOpenMQ #infosec

##

CVE-2026-1874(CVSS UNKNOWN)

EPSS: 0.15%

updated 2026-03-03T09:30:54

2 posts

Always-Incorrect Control Flow Implementation vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP versions 1.106 and prior and Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-EIP EtherNet/IP Module FX5-EIP all versions allows a remote attacker to cause a denial-of-service (DoS) condition on the products by continuously sending UDP packe

offseq at 2026-03-03T09:00:30.200Z ##

⚠️ CVE-2026-1874 (HIGH): Mitsubishi MELSEC iQ-F FX5-ENET/IP modules ≤1.106 vulnerable to unauthenticated UDP-based DoS. No patch yet. Segment networks & monitor UDP traffic. Reset needed to recover. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-03T09:00:30.000Z ##

⚠️ CVE-2026-1874 (HIGH): Mitsubishi MELSEC iQ-F FX5-ENET/IP modules ≤1.106 vulnerable to unauthenticated UDP-based DoS. No patch yet. Segment networks & monitor UDP traffic. Reset needed to recover. radar.offseq.com/threat/cve-20 #OffSeq #ICS #Infosec #Vulnerability

##

CVE-2026-1875(CVSS UNKNOWN)

EPSS: 0.15%

updated 2026-03-03T09:30:54

2 posts

Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-EIP EtherNet/IP Module FX5-EIP all versions allows a remote attacker to cause a denial-of-service (DoS) condition on the products by continuously sending UDP packets to the products. A system reset of the product is required for recovery.

offseq at 2026-03-03T07:30:29.959Z ##

🔎 CVE-2026-1875 (HIGH, CVSS 8.7) hits all Mitsubishi MELSEC iQ-F FX5-EIP modules. Remote UDP floods cause DoS — no auth needed. Segment networks & monitor UDP traffic. No known exploits, patch when available. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-03T07:30:29.000Z ##

🔎 CVE-2026-1875 (HIGH, CVSS 8.7) hits all Mitsubishi MELSEC iQ-F FX5-EIP modules. Remote UDP floods cause DoS — no auth needed. Segment networks & monitor UDP traffic. No known exploits, patch when available. radar.offseq.com/threat/cve-20 #OffSeq #ICS #CVE20261875 #OTSecurity

##

CVE-2026-1492
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-03-03T06:31:14

4 posts

The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to improper privilege management in all versions up to, and including, 5.1.2. This is due to the plugin accepting a user-supplied role during membership registration without properly enforcing a server-side allowlist. Thi

thehackerwire@mastodon.social at 2026-03-03T07:25:49.000Z ##

🔴 CVE-2026-1492 - Critical (9.8)

The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to improper privilege management in all versions up to, and includ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-03-03T06:00:26.815Z ##

⚠️ CVE-2026-1492 (CRITICAL, CVSS 9.8): wpeverest User Registration plugin ≤5.1.2 lets unauthenticated attackers register admin accounts via improper privilege checks. Disable registrations & audit users urgently! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-03T07:25:49.000Z ##

🔴 CVE-2026-1492 - Critical (9.8)

The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to improper privilege management in all versions up to, and includ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-03T06:00:26.000Z ##

⚠️ CVE-2026-1492 (CRITICAL, CVSS 9.8): wpeverest User Registration plugin ≤5.1.2 lets unauthenticated attackers register admin accounts via improper privilege checks. Disable registrations & audit users urgently! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec #Vuln

##

CVE-2026-24107
(9.8 CRITICAL)

EPSS: 0.29%

updated 2026-03-03T03:33:44

2 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the value of `usbPartitionName`, which is directly used in `doSystemCmd`, may lead to critical command injection vulnerabilities.

thehackerwire@mastodon.social at 2026-03-03T08:51:04.000Z ##

🔴 CVE-2026-24107 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the value of `usbPartitionName`, which is directly used in `doSystemCmd`, may lead to critical command injection vulnerabilities.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T08:51:04.000Z ##

🔴 CVE-2026-24107 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the value of `usbPartitionName`, which is directly used in `doSystemCmd`, may lead to critical command injection vulnerabilities.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2448
(8.8 HIGH)

EPSS: 0.10%

updated 2026-03-03T03:32:48

6 posts

The Page Builder by SiteOrigin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.33.5 via the locate_template() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass

thehackerwire@mastodon.social at 2026-03-03T07:46:57.000Z ##

🟠 CVE-2026-2448 - High (8.8)

The Page Builder by SiteOrigin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.33.5 via the locate_template() function. This makes it possible for authenticated attackers, with Contributor-level a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T07:25:58.000Z ##

🟠 CVE-2026-2448 - High (8.8)

The Page Builder by SiteOrigin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.33.5 via the locate_template() function. This makes it possible for authenticated attackers, with Contributor-level a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-03-03T04:30:28.317Z ##

🚨 CVE-2026-2448: HIGH severity path traversal in Page Builder by SiteOrigin (all versions). Contributor+ authentication enables LFI, risking server takeover. No patch yet — restrict permissions, monitor activity, and use a WAF. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-03T07:46:57.000Z ##

🟠 CVE-2026-2448 - High (8.8)

The Page Builder by SiteOrigin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.33.5 via the locate_template() function. This makes it possible for authenticated attackers, with Contributor-level a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T07:25:58.000Z ##

🟠 CVE-2026-2448 - High (8.8)

The Page Builder by SiteOrigin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.33.5 via the locate_template() function. This makes it possible for authenticated attackers, with Contributor-level a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-03T04:30:28.000Z ##

🚨 CVE-2026-2448: HIGH severity path traversal in Page Builder by SiteOrigin (all versions). Contributor+ authentication enables LFI, risking server takeover. No patch yet — restrict permissions, monitor activity, and use a WAF. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

CVE-2026-2628
(9.8 CRITICAL)

EPSS: 0.25%

updated 2026-03-03T03:32:48

3 posts

The All-in-One Microsoft 365 & Entra ID / Azure AD SSO Login plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.2.5. This makes it possible for unauthenticated attackers to bypass authentication and log in as other users, including administrators.

1 repos

https://github.com/b1gchoi/CVE-2026-2628-PoC

thehackerwire@mastodon.social at 2026-03-03T07:26:10.000Z ##

🔴 CVE-2026-2628 - Critical (9.8)

The All-in-One Microsoft 365 & Entra ID / Azure AD SSO Login plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.2.5. This makes it possible for unauthenticated attackers to bypass authentication and...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T07:26:10.000Z ##

🔴 CVE-2026-2628 - Critical (9.8)

The All-in-One Microsoft 365 & Entra ID / Azure AD SSO Login plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.2.5. This makes it possible for unauthenticated attackers to bypass authentication and...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-03T03:00:28.000Z ##

⚠️ CVE-2026-2628: CRITICAL auth bypass in All-in-One Microsoft 365 & Entra ID / Azure AD SSO Login plugin (≤2.2.5). Attackers can access WP admin accounts with no credentials. Disable plugin or restrict logins until patched! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #AzureAD

##

CVE-2025-48567
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T00:32:12

2 posts

In multiple locations, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T08:50:54.000Z ##

🟠 CVE-2025-48567 - High (7.8)

In multiple locations, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution priv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T08:50:54.000Z ##

🟠 CVE-2025-48567 - High (7.8)

In multiple locations, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution priv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1566
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-03T00:31:17

3 posts

The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up to, and including, 5.2.7. This is due to the plugin allowing users with a LatePoint Agent role, who are creating new customers to set the 'wordpress_user_id' field. This makes it possible for authenticated attackers, with Agent-level a

thehackerwire@mastodon.social at 2026-03-03T07:26:21.000Z ##

🟠 CVE-2026-1566 - High (8.8)

The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up to, and including, 5.2.7. This is due to the plugin allowing users with a LatePo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T07:26:21.000Z ##

🟠 CVE-2026-1566 - High (8.8)

The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up to, and including, 5.2.7. This is due to the plugin allowing users with a LatePo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-03T01:30:26.000Z ##

🚩 CVE-2026-1566 (HIGH): LatePoint WordPress plugin lets Agent users reset admin passwords — leads to full privilege escalation. All versions up to 5.2.7 affected. Restrict Agent roles & monitor now. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #Infosec

##

CVE-2026-0020
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T00:31:11

1 posts

In parsePermissionGroup of ParsedPermissionUtils.java, there is a possible way to bypass a consent dialog to obtain permissions due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-02T23:00:25.000Z ##

🟠 CVE-2026-0020 - High (8.4)

In parsePermissionGroup of ParsedPermissionUtils.java, there is a possible way to bypass a consent dialog to obtain permissions due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0006
(9.8 CRITICAL)

EPSS: 0.09%

updated 2026-03-03T00:31:10

5 posts

In multiple locations, there is a possible out of bounds read and write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

1 repos

https://github.com/aydin5245/cve-2026-0006

beyondmachines1 at 2026-03-03T14:01:11.468Z ##

Google Android March 2026 Security Bulletin Patches 129 Vulnerabilities, One Actively Exploited Qualcomm Flaw

Google's March 2026 Android Security Bulletin patches 129 vulnerabilities, including a critical RCE flaw (CVE-2026-0006) requiring no user interaction and multiple CVSS 9.0 privilege escalation bugs in the kernel virtualization layer. A Qualcomm Display component vulnerability (CVE-2026-21385) is already being actively exploited in targeted attacks in the wild.

**An critical update for Android, with actively exploited flaw patched. Most users can't rush the patch because their vendors may not have released an updated version of Android for their devices. Do not delay the update to your Android when the you see the alert that an update is available. Your device may be targeted via the Qualcomm flaw.**

beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-03-03T08:00:03.000Z ##

🔴 CVE-2026-0006 - Critical (9.8)

In multiple locations, there is a possible out of bounds read and write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-03-03T14:01:11.000Z ##

Google Android March 2026 Security Bulletin Patches 129 Vulnerabilities, One Actively Exploited Qualcomm Flaw

Google's March 2026 Android Security Bulletin patches 129 vulnerabilities, including a critical RCE flaw (CVE-2026-0006) requiring no user interaction and multiple CVSS 9.0 privilege escalation bugs in the kernel virtualization layer. A Qualcomm Display component vulnerability (CVE-2026-21385) is already being actively exploited in targeted attacks in the wild.

**An critical update for Android, with actively exploited flaw patched. Most users can't rush the patch because their vendors may not have released an updated version of Android for their devices. Do not delay the update to your Android when the you see the alert that an update is available. Your device may be targeted via the Qualcomm flaw.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-03-03T08:00:03.000Z ##

🔴 CVE-2026-0006 - Critical (9.8)

In multiple locations, there is a possible out of bounds read and write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-03T00:00:39.000Z ##

🔴 CVE-2026-0006: CRITICAL RCE in Android 16 via heap buffer overflows. No user action or privileges needed — remote attackers can fully compromise devices. Patch urgently when available! radar.offseq.com/threat/cve-20 #OffSeq #Android #RCE #Vulnerability

##

CVE-2025-48646
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T00:31:10

2 posts

In executeRequest of ActivityStarter.java, there is a possible launch anywhere due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T08:05:02.000Z ##

🟠 CVE-2025-48646 - High (7.8)

In executeRequest of ActivityStarter.java, there is a possible launch anywhere due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T08:05:02.000Z ##

🟠 CVE-2025-48646 - High (7.8)

In executeRequest of ActivityStarter.java, there is a possible launch anywhere due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0013
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T00:31:10

2 posts

In setupLayout of PickActivity.java, there is a possible way to start any activity as a DocumentsUI app due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T08:00:27.000Z ##

🟠 CVE-2026-0013 - High (8.4)

In setupLayout of PickActivity.java, there is a possible way to start any activity as a DocumentsUI app due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T08:00:27.000Z ##

🟠 CVE-2026-0013 - High (8.4)

In setupLayout of PickActivity.java, there is a possible way to start any activity as a DocumentsUI app due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48578
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T00:31:09

2 posts

In multiple functions of MediaProvider.java, there is a possible way to bypass the WRITE_EXTERNAL_STORAGE permission due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T08:18:22.000Z ##

🟠 CVE-2025-48578 - High (7.8)

In multiple functions of MediaProvider.java, there is a possible way to bypass the WRITE_EXTERNAL_STORAGE permission due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T08:18:22.000Z ##

🟠 CVE-2025-48578 - High (7.8)

In multiple functions of MediaProvider.java, there is a possible way to bypass the WRITE_EXTERNAL_STORAGE permission due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48574
(8.4 HIGH)

EPSS: 0.00%

updated 2026-03-03T00:31:09

2 posts

In validateAddingWindowLw of DisplayPolicy.java, there is a possible way for an app to intercept drag-and-drop events due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T08:05:22.000Z ##

🟠 CVE-2025-48574 - High (8.4)

In validateAddingWindowLw of DisplayPolicy.java, there is a possible way for an app to intercept drag-and-drop events due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges neede...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T08:05:22.000Z ##

🟠 CVE-2025-48574 - High (8.4)

In validateAddingWindowLw of DisplayPolicy.java, there is a possible way for an app to intercept drag-and-drop events due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges neede...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20430
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-02T22:05:08.293000

1 posts

In wlan AP FW, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00467553; Issue ID: MSV-5151.

thehackerwire@mastodon.social at 2026-03-02T14:40:44.000Z ##

🟠 CVE-2026-20430 - High (8.8)

In wlan AP FW, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for explo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20434
(7.5 HIGH)

EPSS: 0.05%

updated 2026-03-02T22:04:18.130000

1 posts

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY00782946; Issue ID: MSV-4135.

thehackerwire@mastodon.social at 2026-03-02T14:40:54.000Z ##

🟠 CVE-2026-20434 - High (7.5)

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0035
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-02T21:31:51

1 posts

In createRequest of MediaProvider.java, there is a possible way for an app to gain read/write access to non-existing files due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-02T22:00:26.000Z ##

🟠 CVE-2026-0035 - High (8.4)

In createRequest of MediaProvider.java, there is a possible way for an app to gain read/write access to non-existing files due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0028
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-02T21:31:51

1 posts

In __pkvm_host_share_guest of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-02T21:19:35.000Z ##

🟠 CVE-2026-0028 - High (8.4)

In __pkvm_host_share_guest of mem_protect.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0047
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-02T21:31:44

1 posts

In dumpBitmapsProto of ActivityManagerService.java, there is a possible way for an app to access private information due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-02T20:19:55.000Z ##

🟠 CVE-2026-0047 - High (8.4)

In dumpBitmapsProto of ActivityManagerService.java, there is a possible way for an app to access private information due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0030
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-02T21:31:43

1 posts

In __host_check_page_state_range of mem_protect.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-02T21:19:45.000Z ##

🟠 CVE-2026-0030 - High (8.4)

In __host_check_page_state_range of mem_protect.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0034
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-02T21:31:42

1 posts

In setPackageOrComponentEnabled of ManagedServices.java, there is a possible notification policy desync due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-02T22:00:15.000Z ##

🟠 CVE-2026-0034 - High (8.4)

In setPackageOrComponentEnabled of ManagedServices.java, there is a possible notification policy desync due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48636
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-02T21:31:42

2 posts

In openFile of BugreportContentProvider.java, there is a possible way to read and write unauthorized files due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-02T20:20:18.000Z ##

🟠 CVE-2025-48636 - High (8.4)

In openFile of BugreportContentProvider.java, there is a possible way to read and write unauthorized files due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-02T20:20:04.000Z ##

🟠 CVE-2025-48636 - High (8.4)

In openFile of BugreportContentProvider.java, there is a possible way to read and write unauthorized files due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-32313
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-02T21:31:38

1 posts

In UsageEvents of UsageEvents.java, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-02T22:14:57.000Z ##

🟠 CVE-2025-32313 - High (8.4)

In UsageEvents of UsageEvents.java, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for explo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3010
(0 None)

EPSS: 0.05%

updated 2026-03-02T20:30:10.923000

1 posts

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Microchip TimePictra allows Query System for Information.This issue affects TimePictra: from 11.0 through 11.3 SP2.

offseq@infosec.exchange at 2026-03-01T00:00:38.000Z ##

🚨 CVE-2026-3010: CRITICAL XSS in Microchip TimePictra v11.0 – 11.3 SP2. Remote, unauthenticated attackers can inject scripts via web UI. Restrict access, enable WAF, monitor logs. Patch awaited. Full info: radar.offseq.com/threat/cve-20 #OffSeq #XSS #ICS #Vuln

##

CVE-2026-2749
(9.9 CRITICAL)

EPSS: 0.03%

updated 2026-03-02T20:30:10.923000

1 posts

Vulnerability in Centreon Centreon Open Tickets on Central Server on Linux (Centroen Open Ticket modules).This issue affects Centreon Open Tickets on Central Server: from all before 25.10.3, 24.10.8, 24.04.7.

1 repos

https://github.com/hakaioffsec/Centreon-Exploits-2026

offseq@infosec.exchange at 2026-02-28T10:30:27.000Z ##

🚨 CRITICAL: CVE-2026-2749 hits Centreon Open Tickets (Linux Central Server). All before v25.10.3/24.10.8/24.04.7 at risk — remote exploit, full compromise possible. Restrict access & monitor systems! radar.offseq.com/threat/cve-20 #OffSeq #Centreon #Vuln

##

CVE-2026-21882
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-02T20:29:29.330000

1 posts

theshit is a command-line utility that automatically detects and fixes common mistakes in shell commands. Prior to version 0.2.0, improper privilege dropping allows local privilege escalation via command re-execution. This issue has been patched in version 0.2.0.

thehackerwire@mastodon.social at 2026-03-02T20:19:46.000Z ##

🟠 CVE-2026-21882 - High (8.4)

theshit is a command-line utility that automatically detects and fixes common mistakes in shell commands. Prior to version 0.2.0, improper privilege dropping allows local privilege escalation via command re-execution. This issue has been patched i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-58107
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-02T20:29:29.330000

1 posts

In Microsoft Exchange through 2019, Exchange ActiveSync (EAS) configurations on on-premises servers may transmit sensitive data from Samsung mobile devices in cleartext, including the user's name, e-mail address, device ID, bearer token, and base64-encoded password.

1 repos

https://github.com/geo-chen/microsoft

thehackerwire@mastodon.social at 2026-03-02T19:18:26.000Z ##

🟠 CVE-2025-58107 - High (7.5)

In Microsoft Exchange through 2019, Exchange ActiveSync (EAS) configurations on on-premises servers may transmit sensitive data from Samsung mobile devices in cleartext, including the user's name, e-mail address, device ID, bearer token, and base6...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3132
(8.8 HIGH)

EPSS: 0.22%

updated 2026-03-02T20:29:29.330000

1 posts

The Master Addons for Elementor Premium plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.1.3 via the 'JLTMA_Widget_Admin::render_preview'. This is due to missing capability check. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute code on the server.

thehackerwire@mastodon.social at 2026-03-02T19:00:12.000Z ##

🟠 CVE-2026-3132 - High (8.8)

The Master Addons for Elementor Premium plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.1.3 via the 'JLTMA_Widget_Admin::render_preview'. This is due to missing capability check. This makes it po...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47373
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-02T20:29:29.330000

1 posts

Memory Corruption when accessing buffers with invalid length during TA invocation.

thehackerwire@mastodon.social at 2026-03-02T18:09:27.000Z ##

🟠 CVE-2025-47373 - High (7.8)

Memory Corruption when accessing buffers with invalid length during TA invocation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47376
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-02T20:29:29.330000

1 posts

Memory Corruption when concurrent access to shared buffer occurs during IOCTL calls.

thehackerwire@mastodon.social at 2026-03-02T18:09:17.000Z ##

🟠 CVE-2025-47376 - High (7.8)

Memory Corruption when concurrent access to shared buffer occurs during IOCTL calls.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47381
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-02T20:29:29.330000

1 posts

Memory Corruption while processing IOCTL calls when concurrent access to shared buffer occurs.

thehackerwire@mastodon.social at 2026-03-02T17:41:42.000Z ##

🟠 CVE-2025-47381 - High (7.8)

Memory Corruption while processing IOCTL calls when concurrent access to shared buffer occurs.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-59603
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-02T20:29:29.330000

1 posts

Memory Corruption when processing invalid user address with nonstandard buffer address.

thehackerwire@mastodon.social at 2026-03-02T17:34:35.000Z ##

🟠 CVE-2025-59603 - High (7.8)

Memory Corruption when processing invalid user address with nonstandard buffer address.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3180
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-02T18:31:52

1 posts

The Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe plugin for WordPress is vulnerable to blind SQL Injection via the ‘cgLostPasswordEmail’ and the ’cgl_mail’ parameter in all versions up to, and including, 28.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthentic

thehackerwire@mastodon.social at 2026-03-02T19:00:00.000Z ##

🟠 CVE-2026-3180 - High (7.5)

The Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe plugin for WordPress is vulnerable to blind SQL Injection via the ‘cgLostPasswordEmail’ and the ’cgl_mail’ parameter in all versions up to, and including, 28.1....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26720
(9.8 CRITICAL)

EPSS: 0.25%

updated 2026-03-02T18:31:51

2 posts

An issue in Twenty CRM v1.15.0 and before allows a remote attacker to execute arbitrary code via the local.driver.ts module.

1 repos

https://github.com/dillonkirsch/CVE-2026-26720-Twenty-RCE

thehackerwire@mastodon.social at 2026-03-02T19:12:48.000Z ##

🔴 CVE-2026-26720 - Critical (9.8)

An issue in Twenty CRM v1.15.0 and before allows a remote attacker to execute arbitrary code via the local.driver.ts module.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-02T19:00:32.000Z ##

🔴 CVE-2026-26720 - Critical (9.8)

An issue in Twenty CRM v1.15.0 and before allows a remote attacker to execute arbitrary code via the local.driver.ts module.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47377
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-02T18:31:51

1 posts

Memory Corruption when accessing a buffer after it has been freed while processing IOCTL calls.

thehackerwire@mastodon.social at 2026-03-02T17:41:52.000Z ##

🟠 CVE-2025-47377 - High (7.8)

Memory Corruption when accessing a buffer after it has been freed while processing IOCTL calls.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47386
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-02T18:31:51

1 posts

Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs.

thehackerwire@mastodon.social at 2026-03-02T17:34:54.000Z ##

🟠 CVE-2025-47386 - High (7.8)

Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-59600
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-02T18:31:51

1 posts

Memory Corruption when adding user-supplied data without checking available buffer space.

thehackerwire@mastodon.social at 2026-03-02T17:19:48.000Z ##

🟠 CVE-2025-59600 - High (7.8)

Memory Corruption when adding user-supplied data without checking available buffer space.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24110
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-02T18:31:45

2 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may send overly long `addDhcpRules` data. When these rules enter the `addDhcpRule` function and are processed by `ret = sscanf(pRule, " %d\t%[^\t]\t%[^\n\r\t]", &dhcpsIndex, dhcpsIP, dhcpsMac);`, the lack of size validation for the rules could lead to buffer overflows in `dhcpsIndex`, `dhcpsIP`, and `dhcpsMac`.

thehackerwire@mastodon.social at 2026-03-02T19:13:05.000Z ##

🔴 CVE-2026-24110 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may send overly long `addDhcpRules` data. When these rules enter the `addDhcpRule` function and are processed by `ret = sscanf(pRule, " %d\t%[^\t]\t%[^\n\r\t]", &dhcpsIndex, dhcpsI...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-02T19:00:50.000Z ##

🔴 CVE-2026-24110 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may send overly long `addDhcpRules` data. When these rules enter the `addDhcpRule` function and are processed by `ret = sscanf(pRule, " %d\t%[^\t]\t%[^\n\r\t]", &dhcpsIndex, dhcpsI...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47375
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-02T18:31:45

1 posts

Memory corruption while handling different IOCTL calls from the user-space simultaneously.

thehackerwire@mastodon.social at 2026-03-02T18:09:07.000Z ##

🟠 CVE-2025-47375 - High (7.8)

Memory corruption while handling different IOCTL calls from the user-space simultaneously.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47379
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-02T18:31:45

1 posts

Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources.

thehackerwire@mastodon.social at 2026-03-02T17:42:01.000Z ##

🟠 CVE-2025-47379 - High (7.8)

Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47385
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-02T18:31:45

1 posts

Memory Corruption when accessing trusted execution environment without proper privilege check.

thehackerwire@mastodon.social at 2026-03-02T17:34:45.000Z ##

🟠 CVE-2025-47385 - High (7.8)

Memory Corruption when accessing trusted execution environment without proper privilege check.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21658
(9.8 CRITICAL)

EPSS: 0.21%

updated 2026-03-02T18:31:41

2 posts

Unauthenticated Remote Code Execution i.e Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection.This issue affects Frick Controls Quantum HD version 10.22 and prior.

thehackerwire@mastodon.social at 2026-03-02T19:57:04.000Z ##

🔴 CVE-2026-21658 - Critical (9.8)

Unauthenticated Remote Code Execution i.e Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient validation of input in certain parameters may permi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

secdb@infosec.exchange at 2026-03-02T00:00:55.000Z ##

📈 CVE Published in last 7 days (2026-02-23 - 2026-03-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 974

Severity:
- Critical: 145
- High: 315
- Medium: 431
- Low: 49
- None: 34

Status:
- : 10
- Analyzed: 435
- Awaiting Analysis: 257
- Modified: 60
- Received: 119
- Rejected: 17
- Undergoing Analysis: 76

Top CNAs:
- GitHub, Inc.: 354
- VulDB: 131
- VulnCheck: 70
- Mozilla Corporation: 52
- ICS-CERT: 51
- MITRE: 34
- Wordfence: 34
- Red Hat, Inc.: 15
- Cisco Systems, Inc.: 15
- GitLab Inc.: 13

Top Affected Products:
- UNKNOWN: 459
- Mozilla Firefox: 52
- Mozilla Thunderbird: 50
- Imagemagick: 34
- Open-emr Openemr: 25
- Copeland Xweb 300d Pro Firmware: 15
- Freerdp: 15
- Copeland Xweb 500b Pro Firmware: 15
- Copeland Xweb 500d Pro Firmware: 15
- Tenda F453 Firmware: 10

Top EPSS Score:
- CVE-2026-3301 - 2.90 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70328 - 2.51 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-20127 - 2.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70327 - 1.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24663 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22553 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26222 - 0.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26331 - 0.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27498 - 0.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21658 - 0.59 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-21657
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-03-02T18:31:41

1 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient validation of input in certain parameters may permit unexpected actions, which could impact the security of the device before authentication occurs.This issue affects Frick Controls Quantum HD version 10.22 and prior.

thehackerwire@mastodon.social at 2026-03-02T19:56:54.000Z ##

🔴 CVE-2026-21657 - Critical (9.8)

Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient validation of input in certain parameters may permit unexpected actions, which could impact ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21656
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-03-02T18:31:41

1 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient validation of input in certain parameters may permit unexpected actions, which could impact the security of the device before authentication occurs.This issue affects Frick Controls Quantum HD version 10.22 and prior.

thehackerwire@mastodon.social at 2026-03-02T19:56:45.000Z ##

🔴 CVE-2026-21656 - Critical (9.8)

Improper Control of Generation of Code ('Code Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows Code Injection. Insufficient validation of input in certain parameters may permit unexpected actions, which could impact ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21654
(9.8 CRITICAL)

EPSS: 0.12%

updated 2026-03-02T18:31:41

1 posts

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows OS Command Injection.This issue affects Frick Controls Quantum HD version 10.22 and prior.

thehackerwire@mastodon.social at 2026-03-02T19:01:27.000Z ##

🔴 CVE-2026-21654 - Critical (9.8)

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Johnson Controls Frick Controls Quantum HD allows OS Command Injection. Insufficient validation of input in certain parameters may permit ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21659
(9.8 CRITICAL)

EPSS: 0.21%

updated 2026-03-02T18:31:41

1 posts

Unauthenticated Remote Code Execution and Information Disclosure due to Local File Inclusion (LFI) vulnerability in Johnson Controls Frick Controls Quantum HD allow an unauthenticated attacker to execute arbitrary code on the affected device, leading to full system compromise. This issue affects Frick Controls Quantum HD: Frick Controls Quantum HD version 10.22 and prior.

thehackerwire@mastodon.social at 2026-03-02T19:01:07.000Z ##

🔴 CVE-2026-21659 - Critical (9.8)

Unauthenticated Remote Code Execution and Information Disclosure due to Local File Inclusion (LFI) vulnerability in Johnson Controls Frick Controls Quantum HD allow an unauthenticated attacker to
execute arbitrary code on the affected device, lea...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21660
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-02T18:23:05.353000

1 posts

Hardcoded Email Credentials Saved as Plaintext in Firmware (CWE-256: Plaintext Storage of a Password) vulnerability in Frick Controls Quantum HD version 10.22 and prior lead to unauthorized access, exposure of sensitive information, and potential misuse or system compromise This issue affects Frick Controls Quantum HD version 10.22 and prior.

thehackerwire@mastodon.social at 2026-03-02T19:01:17.000Z ##

🔴 CVE-2026-21660 - Critical (9.8)

Hardcoded Email Credentials Saved as Plaintext in Firmware (CWE-256: Plaintext Storage of a Password) vulnerability in Frick Controls Quantum HD version 10.22 and prior lead to unauthorized access, exposure of sensitive information, and potential...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22206
(8.8 HIGH)

EPSS: 0.14%

updated 2026-03-02T15:58:07

1 posts

SPIP versions prior to 4.4.10 contain a SQL injection vulnerability that allows authenticated low-privilege users to execute arbitrary SQL queries by manipulating union-based injection techniques. Attackers can exploit this SQL injection flaw combined with PHP tag processing to achieve remote code execution on the server.

thehackerwire@mastodon.social at 2026-02-28T10:01:09.000Z ##

🟠 CVE-2026-22206 - High (8.8)

SPIP versions prior to 4.4.10 contain a SQL injection vulnerability that allows authenticated low-privilege users to execute arbitrary SQL queries by manipulating union-based injection techniques. Attackers can exploit this SQL injection flaw comb...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3432(CVSS UNKNOWN)

EPSS: 0.09%

updated 2026-03-02T15:31:31

1 posts

On SimStudio version below to 0.5.74, the `/api/auth/oauth/token` endpoint contains a code path that bypasses all authorization checks when provided with `credentialAccountUserId` and `providerId` parameters. An unauthenticated attacker can retrieve OAuth access tokens for any user by supplying their user ID and a provider name, effectively stealing credentials to third-party services.

AAKL@infosec.exchange at 2026-03-02T15:36:46.000Z ##

New.

Tenable has added three vulnerabilities to its threat advisories:

- Critical: CVE-2026-3432: Sim Studio AI - Unauthenticated OAuth Token Theft tenable.com/security/research/

- Critical: CVE-2026-3431: Sim Studio AI - MongoDB SSRF and Arbitrary Document Deletion tenable.com/security/research/

- Medium: CVE-2026-27167: Gradio - Mocked OAuth Login Exposes Server Credentials and Uses Hardcoded Session Secret tenable.com/security/research/ @tenable #vulnerability #infosec

##

CVE-2026-3431
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-03-02T15:31:31

2 posts

On SimStudio version below to 0.5.74, the MongoDB tool endpoints accept arbitrary connection parameters from the caller without authentication or host restrictions. An attacker can leverage these endpoints to connect to any reachable MongoDB instance and perform unauthorized operations including reading, modifying, and deleting data.

AAKL@infosec.exchange at 2026-03-02T15:36:46.000Z ##

New.

Tenable has added three vulnerabilities to its threat advisories:

- Critical: CVE-2026-3432: Sim Studio AI - Unauthenticated OAuth Token Theft tenable.com/security/research/

- Critical: CVE-2026-3431: Sim Studio AI - MongoDB SSRF and Arbitrary Document Deletion tenable.com/security/research/

- Medium: CVE-2026-27167: Gradio - Mocked OAuth Login Exposes Server Credentials and Uses Hardcoded Session Secret tenable.com/security/research/ @tenable #vulnerability #infosec

##

thehackerwire@mastodon.social at 2026-03-02T13:17:11.000Z ##

🔴 CVE-2026-3431 - Critical (9.8)

On SimStudio version below to 0.5.74, the MongoDB tool endpoints accept arbitrary connection parameters from the caller without authentication or host restrictions. An attacker can leverage these endpoints to connect to any reachable MongoDB insta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27942
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-02T14:54:48.080000

1 posts

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. Prior to version 5.3.8, the application crashes with stack overflow when user use XML builder with `preserveOrder:true`. Version 5.3.8 fixes the issue. As a workaround, use XML builder with `preserveOrder:false` or check the input data before passing to b

thehackerwire@mastodon.social at 2026-02-28T13:00:48.000Z ##

🟠 CVE-2026-27942 - High (7.5)

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. Prior to version 5.3.8, the application crashes with stack overflow when user use XML builder with `pr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2999
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-03-02T09:30:38

1 posts

IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary executable files from a remote source and execute them.

thehackerwire@mastodon.social at 2026-03-02T07:22:27.000Z ##

🔴 CVE-2026-2999 - Critical (9.8)

IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary executable files from a remote source and execute them.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3000
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-03-02T09:30:37

3 posts

IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary DLL files from a remote source and execute them.

Matchbook3469@mastodon.social at 2026-03-03T11:25:34.000Z ##

⛔ New security advisory:

CVE-2026-3000 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

offseq@infosec.exchange at 2026-03-02T09:00:30.000Z ##

🚨 CVE-2026-3000 (CRITICAL): IDExpert Windows Logon Agent v2.7.3.230719 allows unauthenticated remote code execution via malicious DLL download. Disable agent, monitor for unusual activity, restrict outbound traffic. radar.offseq.com/threat/cve-20 #OffSeq #Cybersecurity #RCE #CVE

##

thehackerwire@mastodon.social at 2026-03-02T07:22:09.000Z ##

🔴 CVE-2026-3000 - Critical (9.8)

IDExpert Windows Logon Agent developed by Changing has a Remote Code Execution vulnerability, allowing unauthenticated remote attackers to force the system to download arbitrary DLL files from a remote source and execute them.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2584(CVSS UNKNOWN)

EPSS: 0.30%

updated 2026-03-02T09:30:37

1 posts

A critical SQL Injection (SQLi) vulnerability has been identified in the authentication module of the system. An unauthenticated, remote attacker (AV:N/PR:N) can exploit this flaw by sending specially crafted SQL queries through the login interface. Due to low attack complexity (AC:L) and the absence of specific requirements (AT:N), the vulnerability allows for a total compromise of the system's c

offseq@infosec.exchange at 2026-03-02T10:30:29.000Z ##

🚨 CRITICAL: CVE-2026-2584 in Ciser CSIP firmware 3.0 – 5.1 enables unauthenticated SQL injection via login interface. Config data at risk — patch not yet released. Restrict access & monitor now. radar.offseq.com/threat/cve-20 #OffSeq #CVE20262584 #SQLi #FirmwareSecurity

##

CVE-2026-3422
(9.8 CRITICAL)

EPSS: 0.40%

updated 2026-03-02T09:30:31

2 posts

U-Office Force developed by e-Excellence has a Insecure Deserialization vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server by sending maliciously crafted serialized content.

offseq@infosec.exchange at 2026-03-02T07:30:28.000Z ##

🚨 CRITICAL: CVE-2026-3422 in e-Excellence U-Office Force enables unauthenticated remote code execution via insecure deserialization (CWE-502). No patch — restrict access, monitor traffic, use WAF/RASP. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Infosec #CVE20263422

##

thehackerwire@mastodon.social at 2026-03-02T07:22:17.000Z ##

🔴 CVE-2026-3422 - Critical (9.8)

U-Office Force developed by e-Excellence has a Insecure Deserialization vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server by sending maliciously crafted serialized content.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3412
(4.3 MEDIUM)

EPSS: 0.03%

updated 2026-03-02T06:32:05

1 posts

A vulnerability was detected in itsourcecode University Management System 1.0. This affects an unknown part of the file /att_single_view.php. The manipulation of the argument dt results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-03-02T06:00:29.000Z ##

CVE-2026-3412: Medium XSS in itsourcecode University Management System v1.0. 'dt' param in /att_single_view.php is vulnerable. Public exploit available — patch or mitigate to prevent session hijack & data theft. Details: radar.offseq.com/threat/cve-20 #OffSeq #XSS #Vuln

##

CVE-2026-3408
(4.3 MEDIUM)

EPSS: 0.04%

updated 2026-03-02T06:32:05

1 posts

A vulnerability was identified in Open Babel up to 3.1.1. This impacts the function OBAtom::GetExplicitValence of the file isrc/atom.cpp of the component CDXML File Handler. Such manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit is publicly available and might be used. The name of the patch is e23a224b8fd9d7c2a7cde9ef4ec6afb4c05aa08a. It is best pract

offseq@infosec.exchange at 2026-03-02T04:30:28.000Z ##

🔎 CVE-2026-3408 (MEDIUM): Open Babel 3.1.0/3.1.1 vulnerable to DoS via null pointer dereference in CDXML handler. Exploit public, patch available (commit e23a224b8fd9…). Update now to prevent app crashes! radar.offseq.com/threat/cve-20 #OffSeq #OpenBabel #VulnAlert

##

CVE-2026-3399
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-02T00:30:29

2 posts

A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. The manipulation of the argument dips leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.

offseq@infosec.exchange at 2026-03-02T01:30:29.000Z ##

🚨 HIGH severity: CVE-2026-3399 impacts Tenda F453 (v1.0.0.3) via buffer overflow in httpd's fromGstDhcpSetSer. Remotely exploitable, public exploit available. Patch or mitigate now to prevent device takeover! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Infosec #Router

##

thehackerwire@mastodon.social at 2026-03-01T23:19:42.000Z ##

🟠 CVE-2026-3399 - High (8.8)

A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. The manipulation of the argument dips leads to buffer overflow. The at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3380
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-01T06:31:35

2 posts

A vulnerability was found in Tenda F453 1.0.0.3. This issue affects the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page results in buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.

offseq@infosec.exchange at 2026-03-01T04:30:27.000Z ##

🚨 CVE-2026-3380: HIGH-severity buffer overflow in Tenda F453 (v1.0.0.3). Remotely exploitable, no auth needed — PoC public. Isolate devices, restrict WAN, monitor for /goform/L7Im traffic. Patch pending. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Tenda #InfoSec

##

thehackerwire@mastodon.social at 2026-03-01T04:26:28.000Z ##

🟠 CVE-2026-3380 - High (8.8)

A vulnerability was found in Tenda F453 1.0.0.3. This issue affects the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page results in buffer overflow. The attack may be launched remotely. The exploit has been made...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3378
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-01T03:30:24

2 posts

A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromqossetting of the file /goform/qossetting. Executing a manipulation of the argument qos can lead to buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.

offseq@infosec.exchange at 2026-03-01T06:00:32.000Z ##

🔥 CVE-2026-3378 (HIGH, CVSS 8.7): Buffer overflow in Tenda F453 (FW 1.0.0.3) lets remote attackers execute code or cause DoS — no authentication needed. PoC exploit published. Patch or restrict access now! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Tenda #RouterSecurity

##

thehackerwire@mastodon.social at 2026-03-01T04:26:47.000Z ##

🟠 CVE-2026-3378 - High (8.8)

A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromqossetting of the file /goform/qossetting. Executing a manipulation of the argument qos can lead to buffer overflow. The attack can be launched remotely. The exploit has be...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27167(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-03-01T01:00:34

1 posts

## Summary Gradio applications running outside of Hugging Face Spaces automatically enable "mocked" OAuth routes when OAuth components (e.g. `gr.LoginButton`) are used. When a user visits `/login/huggingface`, the server retrieves its own Hugging Face access token via `huggingface_hub.get_token()` and stores it in the visitor's session cookie. If the application is network-accessible, any remote

AAKL@infosec.exchange at 2026-03-02T15:36:46.000Z ##

New.

Tenable has added three vulnerabilities to its threat advisories:

- Critical: CVE-2026-3432: Sim Studio AI - Unauthenticated OAuth Token Theft tenable.com/security/research/

- Critical: CVE-2026-3431: Sim Studio AI - MongoDB SSRF and Arbitrary Document Deletion tenable.com/security/research/

- Medium: CVE-2026-27167: Gradio - Mocked OAuth Login Exposes Server Credentials and Uses Hardcoded Session Secret tenable.com/security/research/ @tenable #vulnerability #infosec

##

CVE-2026-28562
(8.2 HIGH)

EPSS: 0.01%

updated 2026-03-01T00:30:19

2 posts

wpForo 2.4.14 contains an unauthenticated SQL injection vulnerability in Topics::get_topics() where the ORDER BY clause relies on ineffective esc_sql() sanitization on unquoted identifiers. Attackers exploit the wpfob parameter with CASE WHEN payloads to perform blind boolean extraction of credentials from the WordPress database.

offseq@infosec.exchange at 2026-03-01T10:30:26.000Z ##

🛡️ HIGH severity: CVE-2026-28562 in wpForo Forum 2.4.14 (WordPress) — unauthenticated SQL injection via wpfob, enabling blind credential extraction. Apply WAF rules & monitor logs until a fix is released. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #SQLInjection #Infosec

##

thehackerwire@mastodon.social at 2026-03-01T05:01:04.000Z ##

🟠 CVE-2026-28562 - High (8.2)

wpForo 2.4.14 contains an unauthenticated SQL injection vulnerability in Topics::get_topics() where the ORDER BY clause relies on ineffective esc_sql() sanitization on unquoted identifiers. Attackers exploit the wpfob parameter with CASE WHEN payl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3377
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-01T00:30:19

2 posts

A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. Performing a manipulation of the argument page results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-03-01T07:30:28.000Z ##

⚠️ CVE-2026-3377 (HIGH): Buffer overflow in Tenda F453 v1.0.0.3 via /goform/SafeUrlFilter. Public exploit available, no patch yet. Restrict device access & monitor traffic. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Tenda #Infosec

##

thehackerwire@mastodon.social at 2026-03-01T05:00:44.000Z ##

🟠 CVE-2026-3377 - High (8.8)

A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. Performing a manipulation of the argument page results in buffer overflow. The attack can be initiated ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2844(CVSS UNKNOWN)

EPSS: 0.07%

updated 2026-02-28T12:30:25

1 posts

Missing Authentication for Critical Function vulnerability in Microchip TimePictra allows Configuration/Environment Manipulation.This issue affects TimePictra: from 11.0 through 11.3 SP2.

offseq@infosec.exchange at 2026-03-01T01:30:27.000Z ##

⚠️ CRITICAL vuln in Microchip TimePictra (11.0 – 11.3 SP2): CVE-2026-2844 lets remote, unauthenticated attackers manipulate configs. No patch yet — restrict access & monitor logs! radar.offseq.com/threat/cve-20 #OffSeq #TimePictra #Vulnerability #OTSecurity

##

CVE-2025-13673
(7.5 HIGH)

EPSS: 0.06%

updated 2026-02-28T09:30:14

1 posts

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into alrea

thehackerwire@mastodon.social at 2026-02-28T08:18:13.000Z ##

🟠 CVE-2025-13673 - High (7.5)

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient escaping on the user supplied parameter and ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27630
(7.5 HIGH)

EPSS: 0.12%

updated 2026-02-28T01:01:22.727000

1 posts

TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Versions prior to version 2.02 are vulnerable to a Denial of Service (DoS) attack known as Slowloris. The server spawns a new OS thread for every incoming connection without enforcing a maximum concurrency limit or an appropriate request timeout. An unauthenticated remote attacker can exhaust server concurrency limits and memory by

thehackerwire@mastodon.social at 2026-03-01T05:01:38.000Z ##

🟠 CVE-2026-27630 - High (7.5)

TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Versions prior to version 2.02 are vulnerable to a Denial of Service (DoS) attack known as Slowloris. The server spawns a new OS thread for every incoming connection without enforc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27498
(8.6 HIGH)

EPSS: 0.66%

updated 2026-02-27T21:51:40

1 posts

## Impact An authenticated user with permission to create or modify workflows could chain the Read/Write Files from Disk node with git operations to achieve remote code execution. By writing to specific configuration files and then triggering a git operation, the attacker could execute arbitrary shell commands on the n8n host. ## Patches The issue has been fixed in n8n versions 2.2.0 and 1.123.8.

secdb@infosec.exchange at 2026-03-02T00:00:55.000Z ##

📈 CVE Published in last 7 days (2026-02-23 - 2026-03-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 974

Severity:
- Critical: 145
- High: 315
- Medium: 431
- Low: 49
- None: 34

Status:
- : 10
- Analyzed: 435
- Awaiting Analysis: 257
- Modified: 60
- Received: 119
- Rejected: 17
- Undergoing Analysis: 76

Top CNAs:
- GitHub, Inc.: 354
- VulDB: 131
- VulnCheck: 70
- Mozilla Corporation: 52
- ICS-CERT: 51
- MITRE: 34
- Wordfence: 34
- Red Hat, Inc.: 15
- Cisco Systems, Inc.: 15
- GitLab Inc.: 13

Top Affected Products:
- UNKNOWN: 459
- Mozilla Firefox: 52
- Mozilla Thunderbird: 50
- Imagemagick: 34
- Open-emr Openemr: 25
- Copeland Xweb 300d Pro Firmware: 15
- Freerdp: 15
- Copeland Xweb 500b Pro Firmware: 15
- Copeland Xweb 500d Pro Firmware: 15
- Tenda F453 Firmware: 10

Top EPSS Score:
- CVE-2026-3301 - 2.90 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70328 - 2.51 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-20127 - 2.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70327 - 1.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24663 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22553 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26222 - 0.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26331 - 0.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27498 - 0.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21658 - 0.59 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-40932
(8.2 HIGH)

EPSS: 0.03%

updated 2026-02-27T21:32:27

1 posts

Apache::SessionX versions through 2.01 for Perl create insecure session id. Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTT

thehackerwire@mastodon.social at 2026-02-28T09:00:51.000Z ##

🟠 CVE-2025-40932 - High (8.2)

Apache::SessionX versions through 2.01 for Perl create insecure session id.

Apache::SessionX generates session ids insecurely. The default session id generator in Apache::SessionX::Generate::MD5 returns a MD5 hash seeded with the built-in rand() ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2597
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-27T21:32:27

1 posts

Crypt::SysRandom::XS versions before 0.010 for Perl is vulnerable to a heap buffer overflow in the XS function random_bytes(). The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) is supplied, the expression length + 1u causes an integer wraparound, resulting in a zero-byte allocation. The subsequent call to chosen random function (e.g. getrandom

thehackerwire@mastodon.social at 2026-02-28T08:19:59.000Z ##

🟠 CVE-2026-2597 - High (7.5)

Crypt::SysRandom::XS versions before 0.010 for Perl is vulnerable to a heap buffer overflow in the XS function random_bytes().

The function does not validate that the length parameter is non-negative. If a negative value (e.g. -1) is supplied, th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27141
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-27T21:32:22

1 posts

Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic

thehackerwire@mastodon.social at 2026-02-28T10:09:58.000Z ##

🟠 CVE-2026-27141 - High (7.5)

Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22207
(9.8 CRITICAL)

EPSS: 0.17%

updated 2026-02-27T21:31:21

1 posts

OpenViking through version 0.1.18, prior to commit 0251c70, contains a broken access control vulnerability that allows unauthenticated attackers to gain ROOT privileges when the root_api_key configuration is omitted. Attackers can send requests to protected endpoints without authentication headers to access administrative functions including account management, resource operations, and system conf

thehackerwire@mastodon.social at 2026-02-28T10:09:48.000Z ##

🔴 CVE-2026-22207 - Critical (9.8)

OpenViking through version 0.1.18, prior to commit 0251c70, contains a broken access control vulnerability that allows unauthenticated attackers to gain ROOT privileges when the root_api_key configuration is omitted. Attackers can send requests ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22205
(7.5 HIGH)

EPSS: 0.24%

updated 2026-02-27T21:31:21

1 posts

SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability caused by PHP type juggling that allows unauthenticated attackers to access protected information. Attackers can exploit loose type comparisons in authentication logic to bypass login verification and retrieve sensitive internal data.

thehackerwire@mastodon.social at 2026-02-28T10:00:58.000Z ##

🟠 CVE-2026-22205 - High (7.5)

SPIP versions prior to 4.4.10 contain an authentication bypass vulnerability caused by PHP type juggling that allows unauthenticated attackers to access protected information. Attackers can exploit loose type comparisons in authentication logic to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26222
(9.8 CRITICAL)

EPSS: 1.02%

updated 2026-02-27T21:31:19

1 posts

Altec DocLink (now maintained by Beyond Limits Inc.) version 4.0.336.0 exposes insecure .NET Remoting endpoints over TCP and HTTP/SOAP via Altec.RDCHostService.exe using the ObjectURI "doclinkServer.soap". The service does not require authentication and is vulnerable to unsafe object unmarshalling, allowing remote attackers to read arbitrary files from the underlying system by specifying local fil

secdb@infosec.exchange at 2026-03-02T00:00:55.000Z ##

📈 CVE Published in last 7 days (2026-02-23 - 2026-03-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 974

Severity:
- Critical: 145
- High: 315
- Medium: 431
- Low: 49
- None: 34

Status:
- : 10
- Analyzed: 435
- Awaiting Analysis: 257
- Modified: 60
- Received: 119
- Rejected: 17
- Undergoing Analysis: 76

Top CNAs:
- GitHub, Inc.: 354
- VulDB: 131
- VulnCheck: 70
- Mozilla Corporation: 52
- ICS-CERT: 51
- MITRE: 34
- Wordfence: 34
- Red Hat, Inc.: 15
- Cisco Systems, Inc.: 15
- GitLab Inc.: 13

Top Affected Products:
- UNKNOWN: 459
- Mozilla Firefox: 52
- Mozilla Thunderbird: 50
- Imagemagick: 34
- Open-emr Openemr: 25
- Copeland Xweb 300d Pro Firmware: 15
- Freerdp: 15
- Copeland Xweb 500b Pro Firmware: 15
- Copeland Xweb 500d Pro Firmware: 15
- Tenda F453 Firmware: 10

Top EPSS Score:
- CVE-2026-3301 - 2.90 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70328 - 2.51 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-20127 - 2.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70327 - 1.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24663 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22553 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26222 - 0.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26331 - 0.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27498 - 0.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21658 - 0.59 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-27510
(9.6 CRITICAL)

EPSS: 0.08%

updated 2026-02-27T19:16:08.767000

2 posts

Unitree Go2 firmware versions 1.1.7 through 1.1.11, when used with the Unitree Go2 Android application (com.unitree.doggo2), are vulnerable to remote code execution due to missing integrity protection and validation of user-created programmes. The Android application stores programs in a local SQLite database (unitree_go2.db, table dog_programme) and transmits the programme_text content, including

sambowne@infosec.exchange at 2026-03-02T21:14:20.000Z ##

From DDS Packets to Robot Shells: Two RCEs in Unitree Robots (CVE-2026-27509 & CVE-2026-27510) boschko.ca/unitree-go2-rce/

##

thehackerwire@mastodon.social at 2026-02-28T10:10:42.000Z ##

🔴 CVE-2026-27510 - Critical (9.6)

Unitree Go2 firmware versions 1.1.7 through 1.1.11, when used with the Unitree Go2 Android application (com.unitree.doggo2), are vulnerable to remote code execution due to missing integrity protection and validation of user-created programmes. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27509
(8.0 HIGH)

EPSS: 0.03%

updated 2026-02-27T19:16:08.547000

2 posts

Unitree Go2 firmware versions V1.1.7 through V1.1.9 and V1.1.11 (EDU) do not implement DDS authentication or authorization for the Eclipse CycloneDDS topic rt/api/programming_actuator/request handled by actuator_manager.py. A network-adjacent, unauthenticated attacker can join DDS domain 0 and publish a crafted message (api_id=1002) containing arbitrary Python, which the robot writes to disk under

sambowne@infosec.exchange at 2026-03-02T21:14:20.000Z ##

From DDS Packets to Robot Shells: Two RCEs in Unitree Robots (CVE-2026-27509 & CVE-2026-27510) boschko.ca/unitree-go2-rce/

##

thehackerwire@mastodon.social at 2026-02-28T10:10:08.000Z ##

🟠 CVE-2026-27509 - High (8)

Unitree Go2 firmware versions V1.1.7 through V1.1.9 and V1.1.11 (EDU) do not implement DDS authentication or authorization for the Eclipse CycloneDDS topic rt/api/programming_actuator/request handled by actuator_manager.py. A network-adjacent, una...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26986
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-27T19:11:09.313000

1 posts

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, `rail_window_free` dereferences a freed `xfAppWindow` pointer during `HashTable_Free` cleanup because `xf_rail_window_common` calls `free(appWindow)` on title allocation failure without first removing the entry from the `railWindows` hash table, leaving a dangling pointer that is freed again on disconnect. Ve

thehackerwire@mastodon.social at 2026-03-01T06:00:03.000Z ##

🟠 CVE-2026-26986 - High (7.5)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, `rail_window_free` dereferences a freed `xfAppWindow` pointer during `HashTable_Free` cleanup because `xf_rail_window_common` calls `free(appWindow)` on titl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27449
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-27T18:35:58

1 posts

### Description A vulnerability has been identified in Umbraco Engage where certain API endpoints are exposed without enforcing authentication or authorization checks. The affected endpoints can be accessed directly over the network without requiring a valid session or user credentials. By supplying a user-controlled identifier parameter (e.g., ?id=), an attacker can retrieve sensitive data associ

thehackerwire@mastodon.social at 2026-02-28T10:00:47.000Z ##

🟠 CVE-2026-27449 - High (7.5)

Umbraco Engage is a business intelligence platform. A vulnerability has been identified in Umbraco Engage prior to versions 16.2.1 and 17.1.1 where certain API endpoints are exposed without enforcing authentication or authorization checks. The aff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3301
(9.8 CRITICAL)

EPSS: 2.90%

updated 2026-02-27T18:31:05

1 posts

A security flaw has been discovered in Totolink N300RH 6.1c.1353_B20190305. Affected by this vulnerability is the function setWebWlanIdx of the file /cgi-bin/cstecgi.cgi of the component Web Management Interface. Performing a manipulation of the argument webWlanIdx results in os command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for

secdb@infosec.exchange at 2026-03-02T00:00:55.000Z ##

📈 CVE Published in last 7 days (2026-02-23 - 2026-03-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 974

Severity:
- Critical: 145
- High: 315
- Medium: 431
- Low: 49
- None: 34

Status:
- : 10
- Analyzed: 435
- Awaiting Analysis: 257
- Modified: 60
- Received: 119
- Rejected: 17
- Undergoing Analysis: 76

Top CNAs:
- GitHub, Inc.: 354
- VulDB: 131
- VulnCheck: 70
- Mozilla Corporation: 52
- ICS-CERT: 51
- MITRE: 34
- Wordfence: 34
- Red Hat, Inc.: 15
- Cisco Systems, Inc.: 15
- GitLab Inc.: 13

Top Affected Products:
- UNKNOWN: 459
- Mozilla Firefox: 52
- Mozilla Thunderbird: 50
- Imagemagick: 34
- Open-emr Openemr: 25
- Copeland Xweb 300d Pro Firmware: 15
- Freerdp: 15
- Copeland Xweb 500b Pro Firmware: 15
- Copeland Xweb 500d Pro Firmware: 15
- Tenda F453 Firmware: 10

Top EPSS Score:
- CVE-2026-3301 - 2.90 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70328 - 2.51 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-20127 - 2.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70327 - 1.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24663 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22553 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26222 - 0.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26331 - 0.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27498 - 0.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21658 - 0.59 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-27969(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-02-27T16:03:55

1 posts

### Impact Anyone with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that files in the manifest — which may be files that they have also added to the manifest and backup contents — are written to any accessible location on restore. This is a common [Path Traversal](https://owasp.org/www-community/attacks/Path_Traversal) security issue

thehackerwire@mastodon.social at 2026-02-28T12:00:14.000Z ##

🟠 CVE-2026-27969 - High (8.8)

Vitess is a database clustering system for horizontal scaling of MySQL. Prior to versions 23.0.3 and 22.0.4, anyone with read/write access to the backup storage location (e.g. an S3 bucket) can manipulate backup manifest files so that files in the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28215
(9.1 CRITICAL)

EPSS: 0.06%

updated 2026-02-27T15:53:07.053000

1 posts

hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, an unauthenticated attacker can overwrite the entire infrastructure configuration of a self-hosted Hoppscotch instance including OAuth provider credentials and SMTP settings by sending a single HTTP POST request with no authentication. The endpoint POST /v1/onboarding/config has no authentication guard and performs

thehackerwire@mastodon.social at 2026-02-28T09:01:10.000Z ##

🔴 CVE-2026-28215 - Critical (9.1)

hoppscotch is an open source API development ecosystem. Prior to version 2026.2.0, an unauthenticated attacker can overwrite the entire infrastructure configuration of a self-hosted Hoppscotch instance including OAuth provider credentials and SMTP...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23750
(8.1 HIGH)

EPSS: 0.01%

updated 2026-02-27T15:34:18

1 posts

Golioth Pouch version 0.1.0 prior to [INSERT FIXED VERSION], fixed in commit 1b2219a1, contain a heap-based buffer overflow in BLE GATT server certificate handling. server_cert_write() allocates a heap buffer of size CONFIG_POUCH_SERVER_CERT_MAX_LEN when receiving the first fragment, then appends subsequent fragments using memcpy() without verifying that sufficient capacity remains. An adjacent BL

thehackerwire@mastodon.social at 2026-02-28T11:00:57.000Z ##

🟠 CVE-2026-23750 - High (8.1)

Golioth Pouch version 0.1.0, prior to commit 1b2219a1, contains a heap-based buffer overflow in BLE GATT server certificate handling. server_cert_write() allocates a heap buffer of size CONFIG_POUCH_SERVER_CERT_MAX_LEN when receiving the first fra...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25954
(7.5 HIGH)

EPSS: 0.06%

updated 2026-02-27T14:56:16.663000

1 posts

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, `xf_rail_server_local_move_size` dereferences a freed `xfAppWindow` pointer because `xf_rail_get_window` returns an unprotected pointer from the `railWindows` hash table, and the main thread can concurrently delete the window (via a window delete order) while the RAIL channel thread is still using the pointer

thehackerwire@mastodon.social at 2026-03-01T07:01:24.000Z ##

🟠 CVE-2026-25954 - High (7.5)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, `xf_rail_server_local_move_size` dereferences a freed `xfAppWindow` pointer because `xf_rail_get_window` returns an unprotected pointer from the `railWindows...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25942
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-27T14:54:06.747000

1 posts

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, `xf_rail_server_execute_result` indexes the global `error_code_names[]` array (7 elements, indices 0–6) with an unchecked `execResult->execResult` value received from the server, allowing an out-of-bounds read when the server sends an `execResult` value of 7 or greater. Version 3.23.0 fixes the issue.

thehackerwire@mastodon.social at 2026-03-01T06:59:59.000Z ##

🟠 CVE-2026-25942 - High (7.5)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, `xf_rail_server_execute_result` indexes the global `error_code_names[]` array (7 elements, indices 0–6) with an unchecked `execResult->execResult` value re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23627
(8.8 HIGH)

EPSS: 0.01%

updated 2026-02-27T14:51:47.317000

1 posts

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, an SQL injection vulnerability in the Immunization module allows any authenticated user to execute arbitrary SQL queries, leading to complete database compromise, PHI exfiltration, credential theft, and potential remote code execution. The vulnerability exists because us

thehackerwire@mastodon.social at 2026-03-01T07:59:53.000Z ##

🟠 CVE-2026-23627 - High (8.8)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, an SQL injection vulnerability in the Immunization module allows any authenticated user to execute arbitrary SQL queri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24663
(9.0 CRITICAL)

EPSS: 1.35%

updated 2026-02-27T14:06:37.987000

1 posts

An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an unauthenticated attacker to achieve remote code execution on the system by sending a crafted request to the libraries installation route and injecting malicious input into the request body.

secdb@infosec.exchange at 2026-03-02T00:00:55.000Z ##

📈 CVE Published in last 7 days (2026-02-23 - 2026-03-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 974

Severity:
- Critical: 145
- High: 315
- Medium: 431
- Low: 49
- None: 34

Status:
- : 10
- Analyzed: 435
- Awaiting Analysis: 257
- Modified: 60
- Received: 119
- Rejected: 17
- Undergoing Analysis: 76

Top CNAs:
- GitHub, Inc.: 354
- VulDB: 131
- VulnCheck: 70
- Mozilla Corporation: 52
- ICS-CERT: 51
- MITRE: 34
- Wordfence: 34
- Red Hat, Inc.: 15
- Cisco Systems, Inc.: 15
- GitLab Inc.: 13

Top Affected Products:
- UNKNOWN: 459
- Mozilla Firefox: 52
- Mozilla Thunderbird: 50
- Imagemagick: 34
- Open-emr Openemr: 25
- Copeland Xweb 300d Pro Firmware: 15
- Freerdp: 15
- Copeland Xweb 500b Pro Firmware: 15
- Copeland Xweb 500d Pro Firmware: 15
- Tenda F453 Firmware: 10

Top EPSS Score:
- CVE-2026-3301 - 2.90 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70328 - 2.51 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-20127 - 2.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70327 - 1.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24663 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22553 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26222 - 0.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26331 - 0.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27498 - 0.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21658 - 0.59 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-50857
(9.8 CRITICAL)

EPSS: 0.58%

updated 2026-02-27T14:06:37.987000

1 posts

ZenTaoPMS v18.11 through v21.6.beta is vulnerable to Directory Traversal in /module/ai/control.php. This allows attackers to execute arbitrary code via a crafted file upload

thehackerwire@mastodon.social at 2026-02-28T11:01:06.000Z ##

🔴 CVE-2025-50857 - Critical (9.8)

ZenTaoPMS v18.11 through v21.6.beta is vulnerable to Directory Traversal in /module/ai/control.php. This allows attackers to execute arbitrary code via a crafted file upload

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1565
(8.8 HIGH)

EPSS: 0.28%

updated 2026-02-27T14:06:37.987000

1 posts

The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'WPUF_Admin_Settings::check_filetype_and_ext' function and in the 'Admin_Tools::check_filetype_and_ext' function in all versions up to, and including, 4.2.8. This makes it possible for authe

thehackerwire@mastodon.social at 2026-02-28T10:10:51.000Z ##

🟠 CVE-2026-1565 - High (8.8)

The User Frontend: AI Powered Frontend Posting, User Directory, Profile, Membership & User Registration plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the 'WPUF_Admin_Settings::check_filetype_...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0980
(8.3 HIGH)

EPSS: 0.22%

updated 2026-02-27T14:06:37.987000

1 posts

A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious username for the BMC interface. This could lead to remote code execution (RCE) on the system.

thehackerwire@mastodon.social at 2026-02-28T08:19:49.000Z ##

🟠 CVE-2026-0980 - High (8.3)

A flaw was found in rubyipmi, a gem used in the Baseboard Management Controller (BMC) component of Red Hat Satellite. An authenticated attacker with host creation or update permissions could exploit this vulnerability by crafting a malicious usern...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26682
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-26T21:32:35

1 posts

An issue in fastCMS before v.0.1.6 allows a local attacker to execute arbitrary code via the PluginController.java component

thehackerwire@mastodon.social at 2026-02-28T11:00:47.000Z ##

🟠 CVE-2026-26682 - High (7.8)

An issue in fastCMS before v.0.1.6 allows a local attacker to execute arbitrary code via the PluginController.java component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28136
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-26T21:32:34

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in VeronaLabs WP SMS wp-sms allows SQL Injection.This issue affects WP SMS: from n/a through <= 6.9.12.

thehackerwire@mastodon.social at 2026-02-28T12:00:00.000Z ##

🟠 CVE-2026-28136 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in VeronaLabs WP SMS wp-sms allows SQL Injection.This issue affects WP SMS: from n/a through &lt;= 6.9.12.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26938
(8.6 HIGH)

EPSS: 0.04%

updated 2026-02-26T21:31:39

1 posts

Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336) exists in Workflows in Kibana which could allow an attacker to read arbitrary files from the Kibana server filesystem, and perform Server-Side Request Forgery (SSRF) via Code Injection (CAPEC-242). This requires an authenticated user who has the workflowsManagement:executeWorkflow privilege.

thehackerwire@mastodon.social at 2026-02-28T10:11:00.000Z ##

🟠 CVE-2026-26938 - High (8.6)

Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336) exists in Workflows in Kibana which could allow an attacker to read arbitrary files from the Kibana server filesystem, and perform Server-Side Request Forgery (SSRF) ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71057
(8.2 HIGH)

EPSS: 0.01%

updated 2026-02-26T21:31:30

1 posts

Improper session management in D-Link Wireless N 300 ADSL2+ Modem Router DSL-124 ME_1.00 allows attackers to execute a session hijacking attack via spoofing the IP address of an authenticated user.

thehackerwire@mastodon.social at 2026-02-28T11:59:50.000Z ##

🟠 CVE-2025-71057 - High (8.2)

Improper session management in D-Link Wireless N 300 ADSL2+ Modem Router DSL-124 ME_1.00 allows attackers to execute a session hijacking attack via spoofing the IP address of an authenticated user.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27888(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-02-26T19:55:35

1 posts

### Impact An attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing the `xfa` property of a reader or writer and the corresponding stream being compressed using `/FlateDecode`. ### Patches This has been fixed in [pypdf==6.7.3](https://github.com/py-pdf/pypdf/releases/tag/6.7.3). ### Workarounds If projects cannot upgrade yet, conside

thehackerwire@mastodon.social at 2026-03-01T05:01:18.000Z ##

🟠 CVE-2026-27888 - High (7.5)

pypdf is a free and open-source pure-python PDF library. Prior to 6.7.3, an attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing the `xfa` property of a reader or writer and the corre...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27849
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-02-26T18:32:43

1 posts

Due to missing neutralization of special elements, OS commands can be injected via the update functionality of a TLS-SRP connection, which is normally used for configuring devices inside the mesh network. This issue affects MR9600: 1.0.4.205530; MX4200: 1.0.13.210200.

thehackerwire@mastodon.social at 2026-03-01T08:00:03.000Z ##

🔴 CVE-2026-27849 - Critical (9.8)

Due to missing neutralization of special elements, OS commands can be injected via the update functionality of a TLS-SRP connection, which is normally used for configuring devices inside the mesh network.
This issue affects MR9600: 1.0.4.205530; M...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20127
(10.0 CRITICAL)

EPSS: 2.60%

updated 2026-02-26T16:20:02.187000

5 posts

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is n

3 repos

https://github.com/zerozenxlabs/CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE

https://github.com/bluefalconink/cisa-ed-26-03-tracker

https://github.com/Dimchuk/CVE-2026-20127-chain

AAKL at 2026-03-03T18:37:54.906Z ##

Broadcom has an updated advisory for a low-severity vulnerability: Datacom SQL Performance Analyzer 1.2 - Vulnerabilities in Third Party Dependencies support.broadcom.com/web/ecx/s

Updated advisory from Cisco:

Critical: CVE-2026-20127-CWE-287: Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability sec.cloudapps.cisco.com/securi

Also from Cisco: VTK tagged for a zero-day report talosintelligence.com/vulnerab @TalosSecurity

##

jbhall56 at 2026-03-03T13:42:10.821Z ##

The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind. darkreading.com/vulnerabilitie

##

AAKL@infosec.exchange at 2026-03-03T18:37:54.000Z ##

Broadcom has an updated advisory for a low-severity vulnerability: Datacom SQL Performance Analyzer 1.2 - Vulnerabilities in Third Party Dependencies support.broadcom.com/web/ecx/s

Updated advisory from Cisco:

Critical: CVE-2026-20127-CWE-287: Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability sec.cloudapps.cisco.com/securi

Also from Cisco: VTK tagged for a zero-day report talosintelligence.com/vulnerab @TalosSecurity #Cisco #Broadcom #infosec #vulnerability #zeroday

##

jbhall56@infosec.exchange at 2026-03-03T13:42:10.000Z ##

The maximum-severity vulnerability CVE-2026-20127 was exploited by an unknown but sophisticated threat actor who left very little evidence behind. darkreading.com/vulnerabilitie

##

secdb@infosec.exchange at 2026-03-02T00:00:55.000Z ##

📈 CVE Published in last 7 days (2026-02-23 - 2026-03-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 974

Severity:
- Critical: 145
- High: 315
- Medium: 431
- Low: 49
- None: 34

Status:
- : 10
- Analyzed: 435
- Awaiting Analysis: 257
- Modified: 60
- Received: 119
- Rejected: 17
- Undergoing Analysis: 76

Top CNAs:
- GitHub, Inc.: 354
- VulDB: 131
- VulnCheck: 70
- Mozilla Corporation: 52
- ICS-CERT: 51
- MITRE: 34
- Wordfence: 34
- Red Hat, Inc.: 15
- Cisco Systems, Inc.: 15
- GitLab Inc.: 13

Top Affected Products:
- UNKNOWN: 459
- Mozilla Firefox: 52
- Mozilla Thunderbird: 50
- Imagemagick: 34
- Open-emr Openemr: 25
- Copeland Xweb 300d Pro Firmware: 15
- Freerdp: 15
- Copeland Xweb 500b Pro Firmware: 15
- Copeland Xweb 500d Pro Firmware: 15
- Tenda F453 Firmware: 10

Top EPSS Score:
- CVE-2026-3301 - 2.90 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70328 - 2.51 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-20127 - 2.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70327 - 1.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24663 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22553 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26222 - 0.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26331 - 0.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27498 - 0.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21658 - 0.59 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-27636
(8.8 HIGH)

EPSS: 0.34%

updated 2026-02-26T16:07:11.047000

1 posts

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.206, FreeScout's file upload restriction list in `app/Misc/Helper.php` does not include `.htaccess` or `.user.ini` files. On Apache servers with `AllowOverride All` (a common configuration), an authenticated user can upload a `.htaccess` file to redefine how files are processed, enabling Remote

EUVD_Bot@mastodon.social at 2026-03-04T00:01:08.000Z ##

🚨 EUVD-2026-9347

📊 Score: 10.0/10 (CVSS v3.1)
📦 Product: freescout
🏢 Vendor: freescout-help-desk
📅 Updated: 2026-03-03

📝 FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with file upload permissions to achieve Remote Code...

🔗 euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

CVE-2026-3201
(4.7 MEDIUM)

EPSS: 0.02%

updated 2026-02-26T14:49:01.050000

1 posts

USB HID protocol dissector memory exhaustion in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service

netresec@infosec.exchange at 2026-03-02T10:00:13.000Z ##

RE: infosec.exchange/@geraldcombs/

#Wireshark 4.6.4 resolves 3 denial of service vulnerabilities in the following protocol dissectors:

The new release also includes a bug fix for #JA4 fingerprints of TLS handshakes with odd ALPN values as well as an important update of the #SOCKS parser, which now enables more reliable extraction of data from within SOCKS tunnels.

##

CVE-2025-70328
(8.8 HIGH)

EPSS: 2.94%

updated 2026-02-26T03:31:18

1 posts

TOTOLINK X6000R v9.4.0cu.1498_B20250826 contains an OS command injection vulnerability in the NTPSyncWithHost handler of the /usr/sbin/shttpd executable. The host_time parameter is retrieved via sub_40C404 and passed to a date -s shell command through CsteSystem. While the first two tokens of the input are validated, the remainder of the string is not sanitized, allowing authenticated attackers to

secdb@infosec.exchange at 2026-03-02T00:00:55.000Z ##

📈 CVE Published in last 7 days (2026-02-23 - 2026-03-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 974

Severity:
- Critical: 145
- High: 315
- Medium: 431
- Low: 49
- None: 34

Status:
- : 10
- Analyzed: 435
- Awaiting Analysis: 257
- Modified: 60
- Received: 119
- Rejected: 17
- Undergoing Analysis: 76

Top CNAs:
- GitHub, Inc.: 354
- VulDB: 131
- VulnCheck: 70
- Mozilla Corporation: 52
- ICS-CERT: 51
- MITRE: 34
- Wordfence: 34
- Red Hat, Inc.: 15
- Cisco Systems, Inc.: 15
- GitLab Inc.: 13

Top Affected Products:
- UNKNOWN: 459
- Mozilla Firefox: 52
- Mozilla Thunderbird: 50
- Imagemagick: 34
- Open-emr Openemr: 25
- Copeland Xweb 300d Pro Firmware: 15
- Freerdp: 15
- Copeland Xweb 500b Pro Firmware: 15
- Copeland Xweb 500d Pro Firmware: 15
- Tenda F453 Firmware: 10

Top EPSS Score:
- CVE-2026-3301 - 2.90 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70328 - 2.51 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-20127 - 2.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70327 - 1.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24663 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22553 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26222 - 0.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26331 - 0.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27498 - 0.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21658 - 0.59 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-70327
(9.8 CRITICAL)

EPSS: 2.05%

updated 2026-02-26T03:06:04.013000

1 posts

TOTOLINK X5000R v9.1.0cu_2415_B20250515 contains an argument injection vulnerability in the setDiagnosisCfg handler of the /usr/sbin/lighttpd executable. The ip parameter is retrieved via websGetVar and passed to a ping command through CsteSystem without validating if the input starts with a hyphen (-). This allows remote authenticated attackers to inject arbitrary command-line options into the pi

secdb@infosec.exchange at 2026-03-02T00:00:55.000Z ##

📈 CVE Published in last 7 days (2026-02-23 - 2026-03-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 974

Severity:
- Critical: 145
- High: 315
- Medium: 431
- Low: 49
- None: 34

Status:
- : 10
- Analyzed: 435
- Awaiting Analysis: 257
- Modified: 60
- Received: 119
- Rejected: 17
- Undergoing Analysis: 76

Top CNAs:
- GitHub, Inc.: 354
- VulDB: 131
- VulnCheck: 70
- Mozilla Corporation: 52
- ICS-CERT: 51
- MITRE: 34
- Wordfence: 34
- Red Hat, Inc.: 15
- Cisco Systems, Inc.: 15
- GitLab Inc.: 13

Top Affected Products:
- UNKNOWN: 459
- Mozilla Firefox: 52
- Mozilla Thunderbird: 50
- Imagemagick: 34
- Open-emr Openemr: 25
- Copeland Xweb 300d Pro Firmware: 15
- Freerdp: 15
- Copeland Xweb 500b Pro Firmware: 15
- Copeland Xweb 500d Pro Firmware: 15
- Tenda F453 Firmware: 10

Top EPSS Score:
- CVE-2026-3301 - 2.90 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70328 - 2.51 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-20127 - 2.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70327 - 1.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24663 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22553 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26222 - 0.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26331 - 0.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27498 - 0.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21658 - 0.59 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-26331
(8.8 HIGH)

EPSS: 0.70%

updated 2026-02-25T19:32:30.417000

1 posts

yt-dlp is a command-line audio/video downloader. Starting in version 2023.06.21 and prior to version 2026.02.21, when yt-dlp's `--netrc-cmd` command-line option (or `netrc_cmd` Python API parameter) is used, an attacker could achieve arbitrary command injection on the user's system with a maliciously crafted URL. yt-dlp maintainers assume the impact of this vulnerability to be high for anyone who

1 repos

https://github.com/dxlerYT/CVE-2026-26331

secdb@infosec.exchange at 2026-03-02T00:00:55.000Z ##

📈 CVE Published in last 7 days (2026-02-23 - 2026-03-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 974

Severity:
- Critical: 145
- High: 315
- Medium: 431
- Low: 49
- None: 34

Status:
- : 10
- Analyzed: 435
- Awaiting Analysis: 257
- Modified: 60
- Received: 119
- Rejected: 17
- Undergoing Analysis: 76

Top CNAs:
- GitHub, Inc.: 354
- VulDB: 131
- VulnCheck: 70
- Mozilla Corporation: 52
- ICS-CERT: 51
- MITRE: 34
- Wordfence: 34
- Red Hat, Inc.: 15
- Cisco Systems, Inc.: 15
- GitLab Inc.: 13

Top Affected Products:
- UNKNOWN: 459
- Mozilla Firefox: 52
- Mozilla Thunderbird: 50
- Imagemagick: 34
- Open-emr Openemr: 25
- Copeland Xweb 300d Pro Firmware: 15
- Freerdp: 15
- Copeland Xweb 500b Pro Firmware: 15
- Copeland Xweb 500d Pro Firmware: 15
- Tenda F453 Firmware: 10

Top EPSS Score:
- CVE-2026-3301 - 2.90 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70328 - 2.51 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-20127 - 2.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70327 - 1.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24663 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22553 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26222 - 0.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26331 - 0.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27498 - 0.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21658 - 0.59 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-3202
(4.7 MEDIUM)

EPSS: 0.02%

updated 2026-02-25T15:31:53

1 posts

NTS-KE protocol dissector crash in Wireshark 4.6.0 to 4.6.3 allows denial of service

netresec@infosec.exchange at 2026-03-02T10:00:13.000Z ##

RE: infosec.exchange/@geraldcombs/

#Wireshark 4.6.4 resolves 3 denial of service vulnerabilities in the following protocol dissectors:

The new release also includes a bug fix for #JA4 fingerprints of TLS handshakes with odd ALPN values as well as an important update of the #SOCKS parser, which now enables more reliable extraction of data from within SOCKS tunnels.

##

CVE-2026-3203
(5.5 MEDIUM)

EPSS: 0.02%

updated 2026-02-25T15:31:43

1 posts

RF4CE Profile protocol dissector crash in Wireshark 4.6.0 to 4.6.3 and 4.4.0 to 4.4.13 allows denial of service

netresec@infosec.exchange at 2026-03-02T10:00:13.000Z ##

RE: infosec.exchange/@geraldcombs/

#Wireshark 4.6.4 resolves 3 denial of service vulnerabilities in the following protocol dissectors:

The new release also includes a bug fix for #JA4 fingerprints of TLS handshakes with odd ALPN values as well as an important update of the #SOCKS parser, which now enables more reliable extraction of data from within SOCKS tunnels.

##

cyberveille@mastobot.ping.moi at 2026-03-03T04:00:12.000Z ##

📢 CVE-2026-20841 : exécution de code via liens Markdown dans le Bloc-notes Windows (corrigée)
📝 Selon TrendAI Research Team (extrait d’un rapport TrendAI Research Services), u...
📖 cyberveille : cyberveille.ch/posts/2026-03-0
🌐 source : zerodayinitiative.com/blog/202
#CVE_2026_20841 #IOC #Cyberveille

##

CVE-2026-25108
(8.8 HIGH)

EPSS: 18.59%

updated 2026-02-24T21:38:18.607000

1 posts

FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.

secdb@infosec.exchange at 2026-03-01T00:01:35.000Z ##

📈 CVE Published in last 30 days (2026-01-30 - 2026-03-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5003

Severity:
- Critical: 448
- High: 1563
- Medium: 2229
- Low: 226
- None: 537

Status:
- : 33
- Analyzed: 2258
- Awaiting Analysis: 2188
- Modified: 155
- Received: 89
- Rejected: 197
- Undergoing Analysis: 83

Top CNAs:
- GitHub, Inc.: 907
- VulnCheck: 572
- VulDB: 519
- Patchstack: 385
- Wordfence: 361
- kernel.org: 259
- MITRE: 217
- Fortinet, Inc.: 102
- Intel Corporation: 84
- Apple Inc.: 76

Top Affected Products:
- UNKNOWN: 2529
- Apple Macos: 64
- Mozilla Firefox: 54
- Mozilla Thunderbird: 51
- Apple Iphone Os: 49
- Apple Ipados: 49
- Openclaw: 35
- Imagemagick: 34
- Microsoft Windows Server 2025: 29
- Comodo Dome Firewall: 29

Top EPSS Score:
- CVE-2026-1731 - 61.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2329 - 41.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22769 - 34.16 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25108 - 18.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 15.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37123 - 12.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1603 - 11.74 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 5.42 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37088 - 4.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1207 - 4.78 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-22553
(9.8 CRITICAL)

EPSS: 1.26%

updated 2026-02-24T21:31:51

1 posts

All versions of InSAT MasterSCADA BUK-TS are susceptible to OS command injection through a field in its MMadmServ web interface. Malicious users that use the vulnerable endpoint are potentially able to cause remote code execution.

secdb@infosec.exchange at 2026-03-02T00:00:55.000Z ##

📈 CVE Published in last 7 days (2026-02-23 - 2026-03-02)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 974

Severity:
- Critical: 145
- High: 315
- Medium: 431
- Low: 49
- None: 34

Status:
- : 10
- Analyzed: 435
- Awaiting Analysis: 257
- Modified: 60
- Received: 119
- Rejected: 17
- Undergoing Analysis: 76

Top CNAs:
- GitHub, Inc.: 354
- VulDB: 131
- VulnCheck: 70
- Mozilla Corporation: 52
- ICS-CERT: 51
- MITRE: 34
- Wordfence: 34
- Red Hat, Inc.: 15
- Cisco Systems, Inc.: 15
- GitLab Inc.: 13

Top Affected Products:
- UNKNOWN: 459
- Mozilla Firefox: 52
- Mozilla Thunderbird: 50
- Imagemagick: 34
- Open-emr Openemr: 25
- Copeland Xweb 300d Pro Firmware: 15
- Freerdp: 15
- Copeland Xweb 500b Pro Firmware: 15
- Copeland Xweb 500d Pro Firmware: 15
- Tenda F453 Firmware: 10

Top EPSS Score:
- CVE-2026-3301 - 2.90 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70328 - 2.51 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-20127 - 2.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-70327 - 1.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24663 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22553 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26222 - 0.85 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26331 - 0.60 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27498 - 0.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21658 - 0.59 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-64328
(7.2 HIGH)

EPSS: 24.83%

updated 2026-02-24T19:30:59.130000

1 posts

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions 17.0.2.36 and above before 17.0.3, the filestore module within the Administrative interface is vulnerable to a post-authentication command injection by an authenticated known user via the testconnection -> check_ssh_connect() function. An attacker can leverage this vulnerability to obtain remote a

1 repos

https://github.com/mcorybillington/CVE-2025-64328_FreePBX-framework-Command-Injection

beyondmachines1@infosec.exchange at 2026-03-02T08:01:11.000Z ##

Over 900 Sangoma FreePBX Instances Compromised via Command Injection Flaw

Sangoma FreePBX is under active attack via CVE-2025-64328. Over 900 instances compromised with installed web shells are detected online.

**If you use FreePBX, plan a very quick update to version 17.0.3 and make sure your admin panel is isolated from the internet. Your FreePBX is already attacked.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2026-2033
(8.1 HIGH)

EPSS: 15.58%

updated 2026-02-23T18:14:13.887000

1 posts

MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of artifact file paths. The issue results from the lack of proper validat

secdb@infosec.exchange at 2026-03-01T00:01:35.000Z ##

📈 CVE Published in last 30 days (2026-01-30 - 2026-03-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5003

Severity:
- Critical: 448
- High: 1563
- Medium: 2229
- Low: 226
- None: 537

Status:
- : 33
- Analyzed: 2258
- Awaiting Analysis: 2188
- Modified: 155
- Received: 89
- Rejected: 197
- Undergoing Analysis: 83

Top CNAs:
- GitHub, Inc.: 907
- VulnCheck: 572
- VulDB: 519
- Patchstack: 385
- Wordfence: 361
- kernel.org: 259
- MITRE: 217
- Fortinet, Inc.: 102
- Intel Corporation: 84
- Apple Inc.: 76

Top Affected Products:
- UNKNOWN: 2529
- Apple Macos: 64
- Mozilla Firefox: 54
- Mozilla Thunderbird: 51
- Apple Iphone Os: 49
- Apple Ipados: 49
- Openclaw: 35
- Imagemagick: 34
- Microsoft Windows Server 2025: 29
- Comodo Dome Firewall: 29

Top EPSS Score:
- CVE-2026-1731 - 61.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2329 - 41.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22769 - 34.16 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25108 - 18.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 15.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37123 - 12.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1603 - 11.74 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 5.42 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37088 - 4.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1207 - 4.78 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-2329
(9.8 CRITICAL)

EPSS: 41.14%

updated 2026-02-20T20:57:50.360000

1 posts

An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.

secdb@infosec.exchange at 2026-03-01T00:01:35.000Z ##

📈 CVE Published in last 30 days (2026-01-30 - 2026-03-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5003

Severity:
- Critical: 448
- High: 1563
- Medium: 2229
- Low: 226
- None: 537

Status:
- : 33
- Analyzed: 2258
- Awaiting Analysis: 2188
- Modified: 155
- Received: 89
- Rejected: 197
- Undergoing Analysis: 83

Top CNAs:
- GitHub, Inc.: 907
- VulnCheck: 572
- VulDB: 519
- Patchstack: 385
- Wordfence: 361
- kernel.org: 259
- MITRE: 217
- Fortinet, Inc.: 102
- Intel Corporation: 84
- Apple Inc.: 76

Top Affected Products:
- UNKNOWN: 2529
- Apple Macos: 64
- Mozilla Firefox: 54
- Mozilla Thunderbird: 51
- Apple Iphone Os: 49
- Apple Ipados: 49
- Openclaw: 35
- Imagemagick: 34
- Microsoft Windows Server 2025: 29
- Comodo Dome Firewall: 29

Top EPSS Score:
- CVE-2026-1731 - 61.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2329 - 41.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22769 - 34.16 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25108 - 18.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 15.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37123 - 12.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1603 - 11.74 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 5.42 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37088 - 4.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1207 - 4.78 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-68615
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-02-19T16:09:15.480000

1 posts

net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.5 and 5.10.pre2, a specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash. This issue has been patched in versions 5.9.5 and 5.10.pre2.

1 repos

https://github.com/yt2w/CVE-2025-68615

beyondmachines1@infosec.exchange at 2026-03-02T16:01:10.000Z ##

IBM Patches Critical Remote Code Execution Flaws in QRadar SIEM

IBM patched 11 vulnerabilities in QRadar SIEM 7.5.0, including a critical net-snmp flaw (CVE-2025-68615) that allows unauthenticated remote attackers to crash the system or execute arbitrary code.

**If you are using IBM QRadar 7.5.0 branch, review its exposure to untrusted networks, then plan a patch cycle. It's not urgent especially if your SIEM is properly isolated, but should not be ignored.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-0714
(6.8 MEDIUM)

EPSS: 0.01%

updated 2026-02-18T18:31:27

4 posts

A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data m

CVE-2026-22769
(10.0 CRITICAL)

EPSS: 34.16%

updated 2026-02-18T18:30:35

1 posts

Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgr

secdb@infosec.exchange at 2026-03-01T00:01:35.000Z ##

📈 CVE Published in last 30 days (2026-01-30 - 2026-03-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5003

Severity:
- Critical: 448
- High: 1563
- Medium: 2229
- Low: 226
- None: 537

Status:
- : 33
- Analyzed: 2258
- Awaiting Analysis: 2188
- Modified: 155
- Received: 89
- Rejected: 197
- Undergoing Analysis: 83

Top CNAs:
- GitHub, Inc.: 907
- VulnCheck: 572
- VulDB: 519
- Patchstack: 385
- Wordfence: 361
- kernel.org: 259
- MITRE: 217
- Fortinet, Inc.: 102
- Intel Corporation: 84
- Apple Inc.: 76

Top Affected Products:
- UNKNOWN: 2529
- Apple Macos: 64
- Mozilla Firefox: 54
- Mozilla Thunderbird: 51
- Apple Iphone Os: 49
- Apple Ipados: 49
- Openclaw: 35
- Imagemagick: 34
- Microsoft Windows Server 2025: 29
- Comodo Dome Firewall: 29

Top EPSS Score:
- CVE-2026-1731 - 61.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2329 - 41.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22769 - 34.16 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25108 - 18.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 15.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37123 - 12.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1603 - 11.74 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 5.42 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37088 - 4.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1207 - 4.78 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-1731
(9.8 CRITICAL)

EPSS: 60.92%

updated 2026-02-17T15:31:33

1 posts

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Nuclei template

5 repos

https://github.com/jakubie07/CVE-2026-1731

https://github.com/cybrdude/cve-2026-1731-scanner

https://github.com/win3zz/CVE-2026-1731

https://github.com/richardpaimu34/CVE-2026-1731

https://github.com/hexissam/CVE-2026-1731

secdb@infosec.exchange at 2026-03-01T00:01:35.000Z ##

📈 CVE Published in last 30 days (2026-01-30 - 2026-03-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5003

Severity:
- Critical: 448
- High: 1563
- Medium: 2229
- Low: 226
- None: 537

Status:
- : 33
- Analyzed: 2258
- Awaiting Analysis: 2188
- Modified: 155
- Received: 89
- Rejected: 197
- Undergoing Analysis: 83

Top CNAs:
- GitHub, Inc.: 907
- VulnCheck: 572
- VulDB: 519
- Patchstack: 385
- Wordfence: 361
- kernel.org: 259
- MITRE: 217
- Fortinet, Inc.: 102
- Intel Corporation: 84
- Apple Inc.: 76

Top Affected Products:
- UNKNOWN: 2529
- Apple Macos: 64
- Mozilla Firefox: 54
- Mozilla Thunderbird: 51
- Apple Iphone Os: 49
- Apple Ipados: 49
- Openclaw: 35
- Imagemagick: 34
- Microsoft Windows Server 2025: 29
- Comodo Dome Firewall: 29

Top EPSS Score:
- CVE-2026-1731 - 61.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2329 - 41.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22769 - 34.16 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25108 - 18.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 15.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37123 - 12.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1603 - 11.74 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 5.42 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37088 - 4.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1207 - 4.78 % (secdb.nttzen.cloud/cve/detail/)

##

certvde@infosec.exchange at 2026-03-02T07:01:23.000Z ##

#OT #Advisory VDE-2026-002
Endress+Hauser: buffer overflow in glibc ld.so leading to privilege escalation

A vulnerability has been identified in WAGO devices utilized in Endress+Hauser IoT solutions. WAGO has provided fixes for these vulnerabilities, which have been integrated into the solutions by Endress+Hauser.
#CVE CVE-2023-4911

certvde.com/en/advisories/vde-
#oCSAF
#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2026-24061
(9.8 CRITICAL)

EPSS: 77.92%

updated 2026-02-11T15:40:42.937000

4 posts

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Nuclei template

63 repos

https://github.com/Parad0x7e/CVE-2026-24061

https://github.com/tiborscholtz/CVE-2026-24061

https://github.com/BrainBob/CVE-2026-24061

https://github.com/scumfrog/cve-2026-24061

https://github.com/leonjza/inetutils-telnetd-auth-bypass

https://github.com/lavabyte/telnet-CVE-2026-24061

https://github.com/Chocapikk/CVE-2026-24061

https://github.com/JayGLXR/CVE-2026-24061-POC

https://github.com/monstertsl/CVE-2026-24061

https://github.com/m3ngx1ng/cve_2026_24061_cli

https://github.com/r00tuser111/CVE-2026-24061

https://github.com/obrunolima1910/CVE-2026-24061

https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-

https://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-Detector

https://github.com/Mefhika120/Ashwesker-CVE-2026-24061

https://github.com/h3athen/CVE-2026-24061

https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root

https://github.com/madfxr/Twenty-Three-Scanner

https://github.com/ms0x08-dev/CVE-2026-24061-POC

https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd

https://github.com/hilwa24/CVE-2026-24061

https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061

https://github.com/Ali-brarou/telnest

https://github.com/shivam-bathla/CVE-2026-24061-setup

https://github.com/infat0x/CVE-2026-24061

https://github.com/z3n70/CVE-2026-24061

https://github.com/Remnant-DB/CVE-2026-24061

https://github.com/cumakurt/tscan

https://github.com/killsystema/scan-cve-2026-24061

https://github.com/XsanFlip/CVE-2026-24061-Scanner

https://github.com/0x7556/CVE-2026-24061

https://github.com/mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-

https://github.com/yanxinwu946/CVE-2026-24061--telnetd

https://github.com/hyu164/Terrminus-CVE-2026-2406

https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061

https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester

https://github.com/Gabs-hub/CVE-2026-24061_Lab

https://github.com/punitdarji/telnetd-cve-2026-24061

https://github.com/ilostmypassword/Melissae

https://github.com/SeptembersEND/CVE--2026-24061

https://github.com/hackingyseguridad/root

https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061

https://github.com/setuju/telnetd

https://github.com/buzz075/CVE-2026-24061

https://github.com/parameciumzhang/Tell-Me-Root

https://github.com/ibrahmsql/CVE-2026-24061-PoC

https://github.com/Mr-Zapi/CVE-2026-24061

https://github.com/LucasPDiniz/CVE-2026-24061

https://github.com/Alter-N0X/CVE-2026-24061-POC

https://github.com/X-croot/CVE-2026-24061_POC

https://github.com/typeconfused/CVE-2026-24061

https://github.com/ridpath/Terrminus-CVE-2026-2406

https://github.com/duy-31/CVE-2026-24061---telnetd

https://github.com/Lingzesec/CVE-2026-24061-GUI

https://github.com/TryA9ain/CVE-2026-24061

https://github.com/balgan/CVE-2026-24061

https://github.com/novitahk/Exploit-CVE-2026-24061

https://github.com/SafeBreach-Labs/CVE-2026-24061

https://github.com/midox008/CVE-2026-24061

https://github.com/franckferman/CVE_2026_24061_PoC

https://github.com/xuemian168/CVE-2026-24061

https://github.com/0p5cur/CVE-2026-24061-POC

https://github.com/SystemVll/CVE-2026-24061

AAKL at 2026-03-03T18:58:37.114Z ##

New.

Picus: CVE-2026-24061: Critical Telnetd Flaw Grants Root Access picussecurity.com/resource/blo

##

pentesttools at 2026-03-03T14:09:50.243Z ##

February was about moving from detection to proof.

Here are the top updates in Pentest-Tools.com:

🧪 New research hub - we launched the Offensive Security Research Hub to share original 0-day research, working PoCs, and technical exploit chains built by our own team.

🔐 ISO 27001 certified - we are officially ISO/IEC 27001:2022 certified, providing verified assurance for your sensitive findings.

🎯 One-click RCE validation - Sniper: Auto-Exploiter now supports controlled exploitation for Telnet (CVE-2026-24061) and Ivanti EPMM (CVE-2026-1281) for confirmed proof-of-impact.

🛡️ New detection: Redis RCE - identify exploitable Redis instances (CVE-2025-62507) across internet-facing and internal segments.

🧭 Granular scan logs - Website and API Scanners now display discoveries in the console output in real-time.

Catch the full breakdown in the video or in this link: pentest-tools.com/change-log

Until next time: Stay sharp. Stay human.

##

AAKL@infosec.exchange at 2026-03-03T18:58:37.000Z ##

New.

Picus: CVE-2026-24061: Critical Telnetd Flaw Grants Root Access picussecurity.com/resource/blo #infosec #vulnerability #threatresearch

##

pentesttools@infosec.exchange at 2026-03-03T14:09:50.000Z ##

February was about moving from detection to proof.

Here are the top updates in Pentest-Tools.com:

🧪 New research hub - we launched the Offensive Security Research Hub to share original 0-day research, working PoCs, and technical exploit chains built by our own team.

🔐 ISO 27001 certified - we are officially ISO/IEC 27001:2022 certified, providing verified assurance for your sensitive findings.

🎯 One-click RCE validation - Sniper: Auto-Exploiter now supports controlled exploitation for Telnet (CVE-2026-24061) and Ivanti EPMM (CVE-2026-1281) for confirmed proof-of-impact.

🛡️ New detection: Redis RCE - identify exploitable Redis instances (CVE-2025-62507) across internet-facing and internal segments.

🧭 Granular scan logs - Website and API Scanners now display discoveries in the console output in real-time.

Catch the full breakdown in the video or in this link: pentest-tools.com/change-log

Until next time: Stay sharp. Stay human.

#OffensiveSecurity #EthicalHacking #Infosec #VulnerabilityManagement #ISO27001

##

CVE-2026-21513
(8.8 HIGH)

EPSS: 4.76%

updated 2026-02-10T21:31:29

2 posts

Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.

hackerworkspace@infosec.exchange at 2026-03-02T18:43:56.000Z ##

APT28 Tied to CVE-2026-21513 MSHTML 0-Day Exploited Before Feb 2026 Patch Tuesday

thehackernews.com/2026/03/apt2

#cybersecurity #threatintelligence #zeroday

##

thefinancialstandard@mastodon.social at 2026-03-02T11:32:08.000Z ##

Urgent APT28 Cyber Attack Tied to MSHTML 0-Day

APT28 linked to CVE-2026-21513 MSHTML 0-day exploit. Urgent action is needed to mitigate cyber attack risks and protect sensitive data.

Read more: api.thefinancialstandard.com/a

#finance #cybersecurity #fintech #news

##

CVE-2026-1603
(8.6 HIGH)

EPSS: 11.74%

updated 2026-02-10T18:30:49

1 posts

An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data.

Nuclei template

secdb@infosec.exchange at 2026-03-01T00:01:35.000Z ##

📈 CVE Published in last 30 days (2026-01-30 - 2026-03-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5003

Severity:
- Critical: 448
- High: 1563
- Medium: 2229
- Low: 226
- None: 537

Status:
- : 33
- Analyzed: 2258
- Awaiting Analysis: 2188
- Modified: 155
- Received: 89
- Rejected: 197
- Undergoing Analysis: 83

Top CNAs:
- GitHub, Inc.: 907
- VulnCheck: 572
- VulDB: 519
- Patchstack: 385
- Wordfence: 361
- kernel.org: 259
- MITRE: 217
- Fortinet, Inc.: 102
- Intel Corporation: 84
- Apple Inc.: 76

Top Affected Products:
- UNKNOWN: 2529
- Apple Macos: 64
- Mozilla Firefox: 54
- Mozilla Thunderbird: 51
- Apple Iphone Os: 49
- Apple Ipados: 49
- Openclaw: 35
- Imagemagick: 34
- Microsoft Windows Server 2025: 29
- Comodo Dome Firewall: 29

Top EPSS Score:
- CVE-2026-1731 - 61.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2329 - 41.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22769 - 34.16 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25108 - 18.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 15.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37123 - 12.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1603 - 11.74 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 5.42 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37088 - 4.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1207 - 4.78 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-1687
(7.3 HIGH)

EPSS: 5.29%

updated 2026-02-10T15:14:03.207000

1 posts

A weakness has been identified in Tenda HG10 US_HG7_HG9_HG10re_300001138_en_xpon. Impacted is an unknown function of the file /boaform/formSamba of the component Boa Webserver. Executing a manipulation of the argument serverString can lead to command injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.

secdb@infosec.exchange at 2026-03-01T00:01:35.000Z ##

📈 CVE Published in last 30 days (2026-01-30 - 2026-03-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5003

Severity:
- Critical: 448
- High: 1563
- Medium: 2229
- Low: 226
- None: 537

Status:
- : 33
- Analyzed: 2258
- Awaiting Analysis: 2188
- Modified: 155
- Received: 89
- Rejected: 197
- Undergoing Analysis: 83

Top CNAs:
- GitHub, Inc.: 907
- VulnCheck: 572
- VulDB: 519
- Patchstack: 385
- Wordfence: 361
- kernel.org: 259
- MITRE: 217
- Fortinet, Inc.: 102
- Intel Corporation: 84
- Apple Inc.: 76

Top Affected Products:
- UNKNOWN: 2529
- Apple Macos: 64
- Mozilla Firefox: 54
- Mozilla Thunderbird: 51
- Apple Iphone Os: 49
- Apple Ipados: 49
- Openclaw: 35
- Imagemagick: 34
- Microsoft Windows Server 2025: 29
- Comodo Dome Firewall: 29

Top EPSS Score:
- CVE-2026-1731 - 61.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2329 - 41.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22769 - 34.16 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25108 - 18.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 15.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37123 - 12.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1603 - 11.74 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 5.42 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37088 - 4.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1207 - 4.78 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2020-37123
(9.8 CRITICAL)

EPSS: 12.89%

updated 2026-02-05T18:30:36

1 posts

Pinger 1.0 contains a remote code execution vulnerability that allows attackers to inject shell commands through the ping and socket parameters. Attackers can exploit the unsanitized input in ping.php to write arbitrary PHP files and execute system commands by appending shell metacharacters.

Nuclei template

secdb@infosec.exchange at 2026-03-01T00:01:35.000Z ##

📈 CVE Published in last 30 days (2026-01-30 - 2026-03-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5003

Severity:
- Critical: 448
- High: 1563
- Medium: 2229
- Low: 226
- None: 537

Status:
- : 33
- Analyzed: 2258
- Awaiting Analysis: 2188
- Modified: 155
- Received: 89
- Rejected: 197
- Undergoing Analysis: 83

Top CNAs:
- GitHub, Inc.: 907
- VulnCheck: 572
- VulDB: 519
- Patchstack: 385
- Wordfence: 361
- kernel.org: 259
- MITRE: 217
- Fortinet, Inc.: 102
- Intel Corporation: 84
- Apple Inc.: 76

Top Affected Products:
- UNKNOWN: 2529
- Apple Macos: 64
- Mozilla Firefox: 54
- Mozilla Thunderbird: 51
- Apple Iphone Os: 49
- Apple Ipados: 49
- Openclaw: 35
- Imagemagick: 34
- Microsoft Windows Server 2025: 29
- Comodo Dome Firewall: 29

Top EPSS Score:
- CVE-2026-1731 - 61.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2329 - 41.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22769 - 34.16 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25108 - 18.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 15.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37123 - 12.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1603 - 11.74 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 5.42 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37088 - 4.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1207 - 4.78 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2020-37088
(7.5 HIGH)

EPSS: 4.95%

updated 2026-02-04T00:30:40

1 posts

School ERP Pro 1.0 contains a file disclosure vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the 'document' parameter in download.php. Attackers can access sensitive configuration files by supplying directory traversal paths to retrieve system credentials and configuration information.

secdb@infosec.exchange at 2026-03-01T00:01:35.000Z ##

📈 CVE Published in last 30 days (2026-01-30 - 2026-03-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5003

Severity:
- Critical: 448
- High: 1563
- Medium: 2229
- Low: 226
- None: 537

Status:
- : 33
- Analyzed: 2258
- Awaiting Analysis: 2188
- Modified: 155
- Received: 89
- Rejected: 197
- Undergoing Analysis: 83

Top CNAs:
- GitHub, Inc.: 907
- VulnCheck: 572
- VulDB: 519
- Patchstack: 385
- Wordfence: 361
- kernel.org: 259
- MITRE: 217
- Fortinet, Inc.: 102
- Intel Corporation: 84
- Apple Inc.: 76

Top Affected Products:
- UNKNOWN: 2529
- Apple Macos: 64
- Mozilla Firefox: 54
- Mozilla Thunderbird: 51
- Apple Iphone Os: 49
- Apple Ipados: 49
- Openclaw: 35
- Imagemagick: 34
- Microsoft Windows Server 2025: 29
- Comodo Dome Firewall: 29

Top EPSS Score:
- CVE-2026-1731 - 61.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2329 - 41.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22769 - 34.16 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25108 - 18.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 15.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37123 - 12.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1603 - 11.74 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 5.42 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37088 - 4.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1207 - 4.78 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-1207(CVSS UNKNOWN)

EPSS: 7.39%

updated 2026-02-03T19:32:57

1 posts

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. Raster lookups on ``RasterField`` (only implemented on PostGIS) allows remote attackers to inject SQL via the band index parameter. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Tarek Nakkouch for reporting this issu

Nuclei template

secdb@infosec.exchange at 2026-03-01T00:01:35.000Z ##

📈 CVE Published in last 30 days (2026-01-30 - 2026-03-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5003

Severity:
- Critical: 448
- High: 1563
- Medium: 2229
- Low: 226
- None: 537

Status:
- : 33
- Analyzed: 2258
- Awaiting Analysis: 2188
- Modified: 155
- Received: 89
- Rejected: 197
- Undergoing Analysis: 83

Top CNAs:
- GitHub, Inc.: 907
- VulnCheck: 572
- VulDB: 519
- Patchstack: 385
- Wordfence: 361
- kernel.org: 259
- MITRE: 217
- Fortinet, Inc.: 102
- Intel Corporation: 84
- Apple Inc.: 76

Top Affected Products:
- UNKNOWN: 2529
- Apple Macos: 64
- Mozilla Firefox: 54
- Mozilla Thunderbird: 51
- Apple Iphone Os: 49
- Apple Ipados: 49
- Openclaw: 35
- Imagemagick: 34
- Microsoft Windows Server 2025: 29
- Comodo Dome Firewall: 29

Top EPSS Score:
- CVE-2026-1731 - 61.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2329 - 41.14 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-22769 - 34.16 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25108 - 18.59 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 15.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37123 - 12.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1603 - 11.74 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1687 - 5.42 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2020-37088 - 4.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-1207 - 4.78 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-13348(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-02-02T03:31:18

1 posts

An improper access control vulnerability exists in ASUS Secure Delete Driver of ASUS Business Manager. This vulnerability can be triggered by a local user sending a specially crafted request, potentially leading to the creation of arbitrary files in a specified path. Refer to the "Security Update for ASUS Business Manager" section on the ASUS Security Advisory for more information.

AAKL@infosec.exchange at 2026-03-02T17:20:04.000Z ##

ASUS has a new security advisory relating to CVE-2025-13348, a high-severity vulnerability:

Security Update for ASUS Business Manager asus.com/security-advisory/ #infosec #vulnerability #ASUS

##

CVE-2026-1281
(9.8 CRITICAL)

EPSS: 64.79%

updated 2026-01-30T13:28:18.610000

2 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

2 repos

https://github.com/YunfeiGE18/CVE-2026-1281-CVE-2026-1340-Ivanti-EPMM-RCE

https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE

pentesttools at 2026-03-03T14:09:50.243Z ##

February was about moving from detection to proof.

Here are the top updates in Pentest-Tools.com:

🧪 New research hub - we launched the Offensive Security Research Hub to share original 0-day research, working PoCs, and technical exploit chains built by our own team.

🔐 ISO 27001 certified - we are officially ISO/IEC 27001:2022 certified, providing verified assurance for your sensitive findings.

🎯 One-click RCE validation - Sniper: Auto-Exploiter now supports controlled exploitation for Telnet (CVE-2026-24061) and Ivanti EPMM (CVE-2026-1281) for confirmed proof-of-impact.

🛡️ New detection: Redis RCE - identify exploitable Redis instances (CVE-2025-62507) across internet-facing and internal segments.

🧭 Granular scan logs - Website and API Scanners now display discoveries in the console output in real-time.

Catch the full breakdown in the video or in this link: pentest-tools.com/change-log

Until next time: Stay sharp. Stay human.

##

pentesttools@infosec.exchange at 2026-03-03T14:09:50.000Z ##

February was about moving from detection to proof.

Here are the top updates in Pentest-Tools.com:

🧪 New research hub - we launched the Offensive Security Research Hub to share original 0-day research, working PoCs, and technical exploit chains built by our own team.

🔐 ISO 27001 certified - we are officially ISO/IEC 27001:2022 certified, providing verified assurance for your sensitive findings.

🎯 One-click RCE validation - Sniper: Auto-Exploiter now supports controlled exploitation for Telnet (CVE-2026-24061) and Ivanti EPMM (CVE-2026-1281) for confirmed proof-of-impact.

🛡️ New detection: Redis RCE - identify exploitable Redis instances (CVE-2025-62507) across internet-facing and internal segments.

🧭 Granular scan logs - Website and API Scanners now display discoveries in the console output in real-time.

Catch the full breakdown in the video or in this link: pentest-tools.com/change-log

Until next time: Stay sharp. Stay human.

#OffensiveSecurity #EthicalHacking #Infosec #VulnerabilityManagement #ISO27001

##

CVE-2026-21852(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-01-21T21:40:20

2 posts

A vulnerability in Claude Code's project-load flow allowed malicious repositories to exfiltrate data including Anthropic API keys before users confirmed trust. If a user started Claude Code in an attacker-controller repository, and the repository included a settings file that set ANTHROPIC_BASE_URL to an attacker-controlled endpoint, Claude Code would issue API requests before showing the trust pr

2 repos

https://github.com/M0broot/CVE-Archive

https://github.com/atiilla/CVE-2026-21852-PoC

CVE-2026-21859
(5.8 MEDIUM)

EPSS: 1.13%

updated 2026-01-20T19:03:30

2 posts

## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in Mailpit's `/proxy` endpoint that allows attackers to make requests to internal network resources. ## Description The `/proxy` endpoint allows requests to internal network resources. While it validates `http://` and `https://` schemes, it does not block internal IP addresses, allowing attackers to access internal services a

Nuclei template

beyondmachines1 at 2026-03-03T08:01:11.440Z ##

Mailpit SSRF Vulnerability Exploited in Targeted Attacks

Mailpit versions 1.28.0 and earlier are vulnerable to a Server-Side Request Forgery (SSRF) flaw (CVE-2026-21859) that allows attackers to probe internal networks and access sensitive cloud metadata. CrowdSec reports active, intelligence-driven exploitation attempts targeting the /proxy endpoint.

**Ensure development tools like Mailpit are never exposed to the public internet without strict authentication and network segmentation. If you are using Mailpit make sure it's isolated and update ASAP to version 1.28.1. These tools are already attacked and attacks will only get worse.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-03-03T08:01:11.000Z ##

Mailpit SSRF Vulnerability Exploited in Targeted Attacks

Mailpit versions 1.28.0 and earlier are vulnerable to a Server-Side Request Forgery (SSRF) flaw (CVE-2026-21859) that allows attackers to probe internal networks and access sensitive cloud metadata. CrowdSec reports active, intelligence-driven exploitation attempts targeting the /proxy endpoint.

**Ensure development tools like Mailpit are never exposed to the public internet without strict authentication and network segmentation. If you are using Mailpit make sure it's isolated and update ASAP to version 1.28.1. These tools are already attacked and attacks will only get worse.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2026-0628
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-12T16:48:33.560000

5 posts

Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High)

2 repos

https://github.com/sastraadiwiguna-purpleeliteteaming/Dissecting-CVE-2026-0628-Chromium-Extension-Privilege-Escalation

https://github.com/fevar54/CVE-2026-0628-POC

Matchbook3469@mastodon.social at 2026-03-03T13:53:41.000Z ##

⚠️ THREAT INTELLIGENCE

New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

Vulnerability | HIGH
CVEs: CVE-2026-0628, CVE-2026-21385

Google has released security updates to patch 129 Android security vulnerabilities, including an actively exploited zero-day flaw in a Qualcomm...

Full analysis:
yazoul.net/news/news/new-chrom

#CyberSecurity #CVE #SecurityOps

##

jbhall56 at 2026-03-03T13:36:48.173Z ##

The flaw, tracked as CVE-2026-0628, was uncovered by researchers at Palo Alto Networks' Unit 42 who found that rogue Chrome extensions could manipulate how the browser handled requests to the embedded Gemini Live side panel. theregister.com/2026/03/03/goo

##

SerferTroyan@mastodon.social at 2026-03-03T09:54:57.000Z ##

📰 Критична вразливість Chrome дозволяє шкідливим розширенням шпигувати за користувачами через Gemini

CyberCalm Критична вразливість Chrome дозволяє шкідливим розширенням шпигувати за користувачами через Gemini Дослідники з безпеки виявили вразливість високого ступеня небезпеки у функції Gemini браузера Google Chrome. Вона дозволяє зловмисникам...

🔗 cybercalm.org/krytychna-vrazly

##

undercodenews@mastodon.social at 2026-03-03T09:31:38.000Z ##

Chrome’s Gemini Live Side Panel Exposed a Silent Spy Tool — Millions at Risk Before Patch

Introduction: A Browser Feature Turned Into a Surveillance Gateway A newly disclosed security flaw in Google Chrome has raised fresh concerns about how deeply browser extensions can penetrate user privacy. The issue, tracked as CVE-2026-0628, affected Chrome’s Gemini Live side panel and allowed malicious extensions to operate far beyond their intended permissions. For a period of…

undercodenews.com/chromes-gemi

##

jbhall56@infosec.exchange at 2026-03-03T13:36:48.000Z ##

The flaw, tracked as CVE-2026-0628, was uncovered by researchers at Palo Alto Networks' Unit 42 who found that rogue Chrome extensions could manipulate how the browser handled requests to the embedded Gemini Live side panel. theregister.com/2026/03/03/goo

##

CVE-2025-38617
(4.7 MEDIUM)

EPSS: 0.00%

updated 2026-01-07T16:57:56.077000

2 posts

In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_set_ring() releases po->bind_lock, another thread can run packet_notifier() and process an NETDEV_UP event. This race and the fix are both similar to that of commit 15fe076edea7 ("net/packet: fix a race in packet_bind() and packet_notifier()"). There

CVE-2025-23299
(6.7 MEDIUM)

EPSS: 0.02%

updated 2025-10-22T21:12:32.330000

2 posts

NVIDIA Bluefield and ConnectX contain a vulnerability in the management interface that could allow a malicious actor with high privilege access to execute arbitrary code.

CVE-2025-62360
(8.8 HIGH)

EPSS: 0.05%

updated 2025-10-20T16:04:04.377000

1 posts

WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users.Prior to 3.5.1, a SQL Injection vulnerability was identified in the /html/funcionario/dependente_documento.php endpoint, specifically in the id_dependente parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the

exploitdb_bot@mastodon.social at 2026-03-03T10:01:10.000Z ##

🚨 New Exploit: WeGIA 3.5.0 - SQL Injection
📋 CVE: CVE-2025-62360
👤 Author: onurdemir

🔗 exploit-db.com/exploits/52483

#ExploitDB #InfoSec #CyberSecurity #CVE-2025-62360

##

CVE-2025-11462
(7.8 HIGH)

EPSS: 0.04%

updated 2025-10-14T18:31:29

1 posts

Improper Link Resolution Before File Access in the AWS VPN Client for macOS versions 1.3.2- 5.2.0 allows a local user to execute code with elevated privileges. Insufficient validation checks on the log destination directory during log rotation could allow a non-administrator user to create a symlink from a client log file to a privileged location. On log rotation, this could lead to code execution

awssecurityfeed@infosec.exchange at 2026-03-02T23:30:01.000Z ##

CVE-2025-11462 AWS ClientVPN macOS Client Local Privilege Escalation

Bulletin ID: AWS-2025-020 Scope: AWS Content Type: Important (requires attention) Publication Date: 2025/10/07 01:30 PM PDT
Description:
AWS Client VPN is a managed client-based VPN service that enables secure access to AWS and ...

aws.amazon.com/security/securi

#aws #security

##

CVE-2025-59536(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-10-03T14:16:36

2 posts

Due to a bug in the startup trust dialog implementation, Claude Code could be tricked to execute code contained in a project before the user accepted the startup trust dialog. Exploiting this requires a user to start Claude Code in an untrusted directory. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to

CVE-2017-13089
(8.8 HIGH)

EPSS: 51.23%

updated 2025-04-20T01:37:25.860000

1 posts

The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative number. The code then tries to skip the chunk in pieces of 512 bytes by using the MIN() macro, but ends up passing the

2 repos

https://github.com/r1b/CVE-2017-13089

https://github.com/mzeyong/CVE-2017-13089

hackmag@infosec.exchange at 2026-03-01T16:15:37.000Z ##

@oraclejmt you're not wrong - the article is all about CVE-2017-13089 :)

##

CVE-2023-6553
(9.8 CRITICAL)

EPSS: 93.15%

updated 2024-11-21T08:44:05.137000

1 posts

The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the serv

Nuclei template

4 repos

https://github.com/cc3305/CVE-2023-6553

https://github.com/Chocapikk/CVE-2023-6553

https://github.com/motikan2010/CVE-2023-6553-PoC

https://github.com/Harshit-Mashru/CVE-2023-6553

exploitdb_bot@mastodon.social at 2026-03-03T11:31:05.000Z ##

🚨 New Exploit: WordPress Backup Migration 1.3.7 - Remote Command Execution
📋 CVE: CVE-2023-6553
👤 Author: dangwenjing

🔗 exploit-db.com/exploits/52486

#ExploitDB #InfoSec #CyberSecurity #CVE-2023-6553

##

CVE-2023-41772
(7.8 HIGH)

EPSS: 19.53%

updated 2024-04-04T08:32:52

1 posts

Win32k Elevation of Privilege Vulnerability

1 repos

https://github.com/R41N3RZUF477/CVE-2023-41772

R41N3RZUF477@infosec.exchange at 2026-03-01T18:13:23.000Z ##

@tiraniddo Finally, the post I waited for. Back in 2023 I searched for a UAC bypass that is compatible with "always notify" and Windows 10 upwards to complete my chain for any Windows UAC bypass. I used your token reading UAC bypass as a base for older Windows systems. Then I just found CVE-2023-41772 by accident. So this route was burned or at least I thought it was. Then I tried to find a UIAccess bypass and it worked again. That was the moment where I knew not auto-elevate but UIAccess is (and will be) the biggest weakness of UAC. Even without GetProcessHandleFromHwnd there are more options like CSRSS activation cache poisoning, COM injection, abusing WER, ...

As far as I have seen the newest version of administrator protection still has at least one bug, that let's you bypass it, but after the chaos of the first "release", I will rather wait for the full release.

Anyway the PPL bypass might be fixed, but I have another PPL bypass that is "fixed" in 24H2 but still works on 25H2 and preview. The bug is simple, but (unique) exploitation is so dumb, I don't know what to say ... 😅

##

CVE-2023-3643
(7.3 HIGH)

EPSS: 10.14%

updated 2023-11-07T05:05:15

1 posts

A vulnerability was found in Boss Mini 1.4.0 Build 6221. It has been classified as critical. This affects an unknown part of the file boss/servlet/document. The manipulation of the argument path leads to file inclusion. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-233889 was assigned to this vulnerability.

exploitdb_bot@mastodon.social at 2026-03-03T10:01:06.000Z ##

🚨 New Exploit: Boss Mini v1.4.0 - Local File Inclusion (LFI)
📋 CVE: CVE-2023-3643
👤 Author: andersoncezar048

🔗 exploit-db.com/exploits/52482

#ExploitDB #InfoSec #CyberSecurity #CVE-2023-3643

##

CVE-2023-4116
(4.3 MEDIUM)

EPSS: 25.35%

updated 2023-11-07T05:01:24

1 posts

A vulnerability classified as problematic was found in PHP Jabbers Taxi Booking 2.0. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument index leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-235963. NOTE: The vendor was contacted early about this disclosure but

Nuclei template

steelefortress@infosec.exchange at 2026-03-01T12:01:21.000Z ##

This week's biggest security fails include the emergence of Hot Dog Bots that can devour a 12-oz bun in under 8 minutes, but what's less funny is the alarming rate of exploited vulnerabilities like the recently patched CVE-2023-4116 in Windows Server.

Meanwhile,...

Read more: steelefortress.com/o629yr

#CyberDefense #Privacy #Encryption #Cybersecurity #InfoSec

##

CVE-2026-27825
(0 None)

EPSS: 0.00%

2 posts

N/A

1 repos

https://github.com/plutosecurity/MCPwnfluence

beyondmachines1 at 2026-03-03T17:01:11.385Z ##

Critical RCE and SSRF Vulnerabilities Discovered in Popular mcp-atlassian Server

mcp-atlassian versions before 0.17.0 contain vulnerabilities (CVE-2026-27825 and CVE-2026-27826) that allow unauthenticated attackers to execute remote code and perform SSRF attacks by exploiting missing path validation and insecure header handling.

**If you use mcp-atlassian, update to version 0.17.0 ASAP. Since these servers run with high privileges and no authentication by default, network isolation is your first defense against unauthorized access and lateral movement withing environments.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-03-03T17:01:11.000Z ##

Critical RCE and SSRF Vulnerabilities Discovered in Popular mcp-atlassian Server

mcp-atlassian versions before 0.17.0 contain vulnerabilities (CVE-2026-27825 and CVE-2026-27826) that allow unauthenticated attackers to execute remote code and perform SSRF attacks by exploiting missing path validation and insecure header handling.

**If you use mcp-atlassian, update to version 0.17.0 ASAP. Since these servers run with high privileges and no authentication by default, network isolation is your first defense against unauthorized access and lateral movement withing environments.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-27826
(0 None)

EPSS: 0.00%

2 posts

N/A

1 repos

https://github.com/plutosecurity/MCPwnfluence

beyondmachines1 at 2026-03-03T17:01:11.385Z ##

Critical RCE and SSRF Vulnerabilities Discovered in Popular mcp-atlassian Server

mcp-atlassian versions before 0.17.0 contain vulnerabilities (CVE-2026-27825 and CVE-2026-27826) that allow unauthenticated attackers to execute remote code and perform SSRF attacks by exploiting missing path validation and insecure header handling.

**If you use mcp-atlassian, update to version 0.17.0 ASAP. Since these servers run with high privileges and no authentication by default, network isolation is your first defense against unauthorized access and lateral movement withing environments.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-03-03T17:01:11.000Z ##

Critical RCE and SSRF Vulnerabilities Discovered in Popular mcp-atlassian Server

mcp-atlassian versions before 0.17.0 contain vulnerabilities (CVE-2026-27825 and CVE-2026-27826) that allow unauthenticated attackers to execute remote code and perform SSRF attacks by exploiting missing path validation and insecure header handling.

**If you use mcp-atlassian, update to version 0.17.0 ASAP. Since these servers run with high privileges and no authentication by default, network isolation is your first defense against unauthorized access and lateral movement withing environments.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

pentesttools at 2026-03-03T14:09:50.243Z ##

February was about moving from detection to proof.

Here are the top updates in Pentest-Tools.com:

🧪 New research hub - we launched the Offensive Security Research Hub to share original 0-day research, working PoCs, and technical exploit chains built by our own team.

🔐 ISO 27001 certified - we are officially ISO/IEC 27001:2022 certified, providing verified assurance for your sensitive findings.

🎯 One-click RCE validation - Sniper: Auto-Exploiter now supports controlled exploitation for Telnet (CVE-2026-24061) and Ivanti EPMM (CVE-2026-1281) for confirmed proof-of-impact.

🛡️ New detection: Redis RCE - identify exploitable Redis instances (CVE-2025-62507) across internet-facing and internal segments.

🧭 Granular scan logs - Website and API Scanners now display discoveries in the console output in real-time.

Catch the full breakdown in the video or in this link: pentest-tools.com/change-log

Until next time: Stay sharp. Stay human.

##

pentesttools@infosec.exchange at 2026-03-03T14:09:50.000Z ##

February was about moving from detection to proof.

Here are the top updates in Pentest-Tools.com:

🧪 New research hub - we launched the Offensive Security Research Hub to share original 0-day research, working PoCs, and technical exploit chains built by our own team.

🔐 ISO 27001 certified - we are officially ISO/IEC 27001:2022 certified, providing verified assurance for your sensitive findings.

🎯 One-click RCE validation - Sniper: Auto-Exploiter now supports controlled exploitation for Telnet (CVE-2026-24061) and Ivanti EPMM (CVE-2026-1281) for confirmed proof-of-impact.

🛡️ New detection: Redis RCE - identify exploitable Redis instances (CVE-2025-62507) across internet-facing and internal segments.

🧭 Granular scan logs - Website and API Scanners now display discoveries in the console output in real-time.

Catch the full breakdown in the video or in this link: pentest-tools.com/change-log

Until next time: Stay sharp. Stay human.

#OffensiveSecurity #EthicalHacking #Infosec #VulnerabilityManagement #ISO27001

##

exploitdb_bot@mastodon.social at 2026-03-03T11:12:06.000Z ##

🚨 New Exploit: mailcow 2025-01a - Host Header Password Reset Poisoning
📋 CVE: CVE-2025-25198
👤 Author: alvarez

🔗 exploit-db.com/exploits/52485

#ExploitDB #InfoSec #CyberSecurity #CVE-2025-25198

##

CVE-2026-3337
(0 None)

EPSS: 0.08%

1 posts

N/A

awssecurityfeed@infosec.exchange at 2026-03-02T23:30:01.000Z ##

Issue with AWS-LC: an open-source, general-purpose cryptographic library (CVE-2026-3336, CVE-2026-3337, CVE-2026-3338)

Bulletin ID: 2026-005-AWS Scope: AWS Content Type: Important (requires attention) Publication Date: 2026/03/02 14:30 PM PST
Description:
AWS-LC is an open-source, general-purpose cryptographic library. We identified three distin...

aws.amazon.com/security/securi

#aws #security

##

CVE-2026-3338
(0 None)

EPSS: 0.03%

2 posts

N/A

awssecurityfeed@infosec.exchange at 2026-03-02T23:30:01.000Z ##

Issue with AWS-LC: an open-source, general-purpose cryptographic library (CVE-2026-3336, CVE-2026-3337, CVE-2026-3338)

Bulletin ID: 2026-005-AWS Scope: AWS Content Type: Important (requires attention) Publication Date: 2026/03/02 14:30 PM PST
Description:
AWS-LC is an open-source, general-purpose cryptographic library. We identified three distin...

aws.amazon.com/security/securi

#aws #security

##

thehackerwire@mastodon.social at 2026-03-02T22:22:10.000Z ##

🟠 CVE-2026-3338 - High (7.5)

Improper signature validation in PKCS7_verify() in AWS-LC allows an unauthenticated user to bypass signature verification when processing PKCS7 objects with Authenticated Attributes.

Customers of AWS services do not need to take action. Applica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21853
(0 None)

EPSS: 0.16%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-02T19:18:16.000Z ##

🟠 CVE-2026-21853 - High (8.8)

AFFiNE is an open-source, all-in-one workspace and an operating system. Prior to version 0.25.4, there is a one-click remote code execution vulnerability. This vulnerability can be exploited by embedding a specially crafted affine: URL on a websit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28286
(0 None)

EPSS: 0.06%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-02T17:19:27.000Z ##

🟠 CVE-2026-28286 - High (8.5)

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.2-beta3, the application enforces restrictions in the frontend/UI to prevent users from creating files or folders in internal OS paths. H...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-52468
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-02T16:29:39.000Z ##

🟠 CVE-2025-52468 - High (8.8)

Chamilo is a learning management system. Prior to version 1.11.30, an input validation vulnerability exists when importing user data from CSV files. This flaw occurs due to insufficient sanitization of user data, specifically in the "Last Name", "...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28403
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-02T16:27:51.000Z ##

🟠 CVE-2026-28403 - High (7.6)

Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server (`ws://127.0.0.1:`) accepts connections from any origin without validating the HTTP `Origin` header during the WebSocket handshake. A maliciou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25955
(0 None)

EPSS: 0.07%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-01T07:01:33.000Z ##

🔴 CVE-2026-25955 - Critical (9.8)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, `xf_AppUpdateWindowFromSurface` reuses a cached `XImage` whose `data` pointer references a freed RDPGFX surface buffer, because `gdi_DeleteSurface` frees `su...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25953
(0 None)

EPSS: 0.09%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-01T07:01:14.000Z ##

🔴 CVE-2026-25953 - Critical (9.8)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, `xf_AppUpdateWindowFromSurface` reads from a freed `xfAppWindow` because the RDPGFX DVC thread obtains a bare pointer via `xf_rail_get_window` without any li...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25952
(0 None)

EPSS: 0.09%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-01T07:00:09.000Z ##

🔴 CVE-2026-25952 - Critical (9.8)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, `xf_SetWindowMinMaxInfo` dereferences a freed `xfAppWindow` pointer because `xf_rail_get_window` in `xf_rail_server_min_max_info` returns an unprotected poin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25997
(0 None)

EPSS: 0.09%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-01T06:59:50.000Z ##

🔴 CVE-2026-25997 - Critical (9.8)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, `xf_clipboard_format_equal` reads freed `lastSentFormats` memory because `xf_clipboard_formats_free` (called from the cliprdr channel thread during auto-reco...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25959
(0 None)

EPSS: 0.08%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-01T06:00:13.000Z ##

🔴 CVE-2026-25959 - Critical (9.8)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, `xf_cliprdr_provide_data_` passes freed `pDstData` to `XChangeProperty` because the cliprdr channel thread calls `xf_cliprdr_server_format_data_response` whi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27950
(0 None)

EPSS: 0.10%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-01T05:59:53.000Z ##

🟠 CVE-2026-27950 - High (7.5)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, the fix for the heap-use-after-free described in CVE-2026-24680 is incomplete. While the vulnerable execution flow referenced in the advisory exists in the S...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24680
(0 None)

EPSS: 0.02%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-01T05:59:53.000Z ##

🟠 CVE-2026-27950 - High (7.5)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, the fix for the heap-use-after-free described in CVE-2026-24680 is incomplete. While the vulnerable execution flow referenced in the advisory exists in the S...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27633
(0 None)

EPSS: 0.12%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-01T05:01:28.000Z ##

🟠 CVE-2026-27633 - High (7.5)

TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Versions prior to version 2.02 have a Denial of Service (DoS) vulnerability via memory exhaustion. Unauthenticated remote attackers can send an HTTP POST request to the server with...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28213
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-02-28T09:01:01.000Z ##

🔴 CVE-2026-28213 - Critical (9.8)

EverShop is a TypeScript-first eCommerce platform. Versions prior to 2.1.1 have a vulnerability in the "Forgot Password" functionality. When specifying a target email address, the API response returns the password reset token. This allows an attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites