##
Updated at UTC 2026-03-09T03:48:52.432219
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-3787 | 7.0 | 0.00% | 2 | 0 | 2026-03-09T00:30:19 | A weakness has been identified in UltraVNC 1.6.4.0 on Windows. This affects an u | |
| CVE-2026-3769 | 8.8 | 0.00% | 4 | 0 | 2026-03-08T21:15:51.470000 | A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is th | |
| CVE-2026-3768 | 8.8 | 0.00% | 4 | 0 | 2026-03-08T21:15:51.267000 | A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by th | |
| CVE-2026-3728 | 8.8 | 0.05% | 2 | 0 | 2026-03-08T12:30:34 | A vulnerability was determined in Tenda F453 1.0.0.3/1.If. This issue affects th | |
| CVE-2026-3727 | 8.8 | 0.05% | 2 | 0 | 2026-03-08T12:30:27 | A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the | |
| CVE-2026-3732 | 8.8 | 0.05% | 4 | 0 | 2026-03-08T11:15:50.523000 | A security vulnerability has been detected in Tenda F453 1.0.0.3. This affects t | |
| CVE-2026-3729 | 8.8 | 0.05% | 2 | 0 | 2026-03-08T11:15:49.863000 | A vulnerability was identified in Tenda F453 1.0.0.3/3.As. Impacted is the funct | |
| CVE-2026-3726 | 8.8 | 0.05% | 4 | 0 | 2026-03-08T09:30:27 | A vulnerability has been found in Tenda F453 1.0.0.3. This affects the function | |
| CVE-2026-3715 | 8.8 | 0.04% | 4 | 0 | 2026-03-08T09:30:21 | A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the funct | |
| CVE-2026-28683 | 8.7 | 0.02% | 2 | 0 | 2026-03-08T08:37:48 | ### Summary If a malicious authenticated user uploads SVG and creates a hotlink | |
| CVE-2026-3703 | 9.8 | 0.07% | 5 | 0 | 2026-03-08T06:31:15 | A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_4 | |
| CVE-2026-3701 | 8.8 | 0.04% | 2 | 0 | 2026-03-08T06:31:15 | A security vulnerability has been detected in H3C Magic B1 up to 100R004. Affect | |
| CVE-2026-3698 | 8.8 | 0.04% | 2 | 0 | 2026-03-08T03:30:34 | A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. This affect | |
| CVE-2026-3700 | 8.8 | 0.04% | 2 | 0 | 2026-03-08T03:30:34 | A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. Affected is | |
| CVE-2026-3699 | 8.8 | 0.04% | 2 | 0 | 2026-03-08T03:16:04.017000 | A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-171114. This i | |
| CVE-2026-3677 | 8.8 | 0.05% | 2 | 0 | 2026-03-08T00:31:58 | A vulnerability was found in Tenda FH451 1.0.0.9. This impacts the function from | |
| CVE-2026-3678 | 8.8 | 0.05% | 2 | 0 | 2026-03-08T00:31:58 | A vulnerability was determined in Tenda FH451 1.0.0.9. Affected is the function | |
| CVE-2026-3679 | 8.8 | 0.05% | 2 | 0 | 2026-03-07T23:15:47.643000 | A vulnerability was identified in Tenda FH451 1.0.0.9. Affected by this vulnerab | |
| CVE-2026-24308 | None | 0.01% | 1 | 0 | 2026-03-07T18:31:31 | Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 | |
| CVE-2026-30860 | 9.9 | 0.08% | 5 | 0 | 2026-03-07T17:15:53.823000 | WeKnora is an LLM-powered framework designed for deep document understanding and | |
| CVE-2026-29784 | 7.5 | 0.02% | 2 | 0 | 2026-03-07T16:15:55.430000 | Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, in | |
| CVE-2026-28678 | 8.1 | 0.03% | 2 | 0 | 2026-03-07T16:15:54.010000 | DSA Study Hub is an interactive educational web application. Prior to commit d52 | |
| CVE-2026-29193 | 8.2 | 0.03% | 2 | 0 | 2026-03-07T15:15:55.867000 | ZITADEL is an open source identity management platform. From version 4.0.0 to 4. | |
| CVE-2026-1074 | 7.2 | 0.06% | 1 | 0 | 2026-03-07T08:16:09.020000 | The WP App Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting | |
| CVE-2025-14675 | 7.2 | 0.68% | 2 | 0 | 2026-03-07T08:16:05.963000 | The Meta Box plugin for WordPress is vulnerable to arbitrary file deletion due t | |
| CVE-2025-8899 | 8.8 | 0.04% | 1 | 0 | 2026-03-07T06:16:09.350000 | The Paid Videochat Turnkey Site – HTML5 PPV Live Webcams plugin for WordPress is | |
| CVE-2025-14353 | 7.5 | 0.07% | 2 | 0 | 2026-03-07T03:30:29 | The ZIP Code Based Content Protection plugin for WordPress is vulnerable to SQL | |
| CVE-2025-15602 | 8.8 | 0.02% | 1 | 0 | 2026-03-07T02:33:41 | Snipe-IT versions prior to 8.3.7 contain sensitive user attributes related to ac | |
| CVE-2026-2020 | 7.5 | 0.09% | 1 | 0 | 2026-03-07T02:16:12.077000 | The JS Archive List plugin for WordPress is vulnerable to PHP Object Injection i | |
| CVE-2026-30861 | 10.0 | 0.21% | 6 | 0 | 2026-03-07T01:59:02 | ### Summary A critical unauthenticated remote code execution (RCE) vulnerabilit | |
| CVE-2026-25070 | 0 | 1.03% | 3 | 0 | 2026-03-07T01:15:57.427000 | XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain | |
| CVE-2026-30855 | 9.8 | 0.08% | 2 | 0 | 2026-03-06T23:53:57 | ### Summary An authorization bypass in tenant management endpoints of WeKnora ap | |
| CVE-2026-30851 | 8.1 | 0.01% | 2 | 0 | 2026-03-06T23:38:45 | ## Summary Caddy's `forward_auth` directive with `copy_headers` generates condi | |
| CVE-2026-26017 | 7.7 | 0.04% | 1 | 0 | 2026-03-06T22:43:40 | A logical vulnerability in CoreDNS allows DNS access controls to be bypassed due | |
| CVE-2025-45691 | 7.5 | 0.05% | 2 | 0 | 2026-03-06T22:23:33 | An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in | |
| CVE-2026-30823 | 8.8 | 0.02% | 1 | 0 | 2026-03-06T22:20:51 | ### Summary The Flowise platform has a critical Insecure Direct Object Reference | |
| CVE-2026-30822 | 7.7 | 0.04% | 2 | 0 | 2026-03-06T22:19:14 | ## Summary **A Mass Assignment vulnerability in the `/api/v1/leads` endpoint al | |
| CVE-2026-30832 | 9.1 | 0.04% | 4 | 0 | 2026-03-06T22:16:02 | While auditing the codebase in the wake of the webhook SSRF fix shipped in v0.11 | |
| CVE-2026-29064 | 8.2 | 0.01% | 1 | 0 | 2026-03-06T22:10:52 | ### Summary A path traversal vulnerability in archive extraction allows a speci | |
| CVE-2026-26018 | 7.5 | 0.04% | 1 | 0 | 2026-03-06T22:08:22 | ## Executive Summary A Denial of Service vulnerability exists in CoreDNS's loop | |
| CVE-2026-29058 | 9.8 | 0.10% | 4 | 0 | 2026-03-06T21:56:51 | ## Impact An unauthenticated attacker can execute arbitrary OS commands on the | |
| CVE-2026-30227 | 0 | 0.80% | 2 | 0 | 2026-03-06T21:16:16.607000 | MimeKit is a C# library which may be used for the creation and parsing of messag | |
| CVE-2026-30223 | 8.8 | 0.02% | 1 | 0 | 2026-03-06T21:16:16.113000 | OliveTin gives access to predefined shell commands from a web interface. Prior t | |
| CVE-2026-29091 | 8.1 | 0.25% | 1 | 0 | 2026-03-06T19:16:21.720000 | Locutus brings stdlibs of other programming languages to JavaScript for educatio | |
| CVE-2026-30834 | 7.5 | 0.03% | 2 | 0 | 2026-03-06T18:41:00 | # SSRF with Full Response Exfiltration via Download Handler ### Summary A Serve | |
| CVE-2026-30827 | 7.5 | 0.01% | 1 | 0 | 2026-03-06T18:36:57 | ## Summary The default `keyGenerator` in express-rate-limit applies IPv6 subnet | |
| CVE-2026-28284 | 8.8 | 0.03% | 2 | 0 | 2026-03-06T18:32:58.330000 | FreePBX is an open source IP PBX. Prior to versions 16.0.10 and 17.0.5, the Free | |
| CVE-2026-2446 | 9.8 | 0.07% | 2 | 0 | 2026-03-06T18:32:19 | The PowerPack for LearnDash WordPress plugin before 1.3.0 does not have authoriz | |
| CVE-2026-3589 | 7.5 | 0.03% | 3 | 0 | 2026-03-06T18:16:22.450000 | The WooCommerce WordPress plugin from versions 5.4.0 to 10.5.2 does not properly | |
| CVE-2026-29087 | 7.5 | 0.03% | 1 | 0 | 2026-03-06T18:16:19.757000 | @hono/node-server allows running the Hono application on Node.js. Prior to versi | |
| CVE-2026-28789 | 7.5 | 0.09% | 2 | 0 | 2026-03-06T18:16:19.300000 | OliveTin gives access to predefined shell commands from a web interface. Prior t | |
| CVE-2026-28514 | 0 | 0.11% | 1 | 0 | 2026-03-06T18:16:19.103000 | Rocket.Chat is an open-source, secure, fully customizable communications platfor | |
| CVE-2026-28342 | 7.5 | 0.06% | 2 | 0 | 2026-03-06T18:16:17.907000 | OliveTin gives access to predefined shell commands from a web interface. Prior t | |
| CVE-2025-70230 | 9.8 | 0.06% | 2 | 0 | 2026-03-06T17:37:58.670000 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para | |
| CVE-2025-70231 | 9.8 | 0.08% | 2 | 0 | 2026-03-06T17:37:30.923000 | D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When proces | |
| CVE-2025-70232 | 9.8 | 0.06% | 2 | 0 | 2026-03-06T17:36:58.860000 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para | |
| CVE-2026-29611 | 7.5 | 0.03% | 2 | 0 | 2026-03-06T17:16:35.073000 | OpenClaw versions prior to 2026.2.14 contain a local file inclusion vulnerabilit | |
| CVE-2026-29610 | 8.8 | 0.07% | 1 | 0 | 2026-03-06T17:16:34.833000 | OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability t | |
| CVE-2026-29075 | 8.3 | 0.07% | 1 | 0 | 2026-03-06T17:16:34.167000 | Mesa is an open-source Python library for agent-based modeling, simulating compl | |
| CVE-2026-28484 | 0 | 0.00% | 1 | 0 | 2026-03-06T17:16:32.923000 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering | |
| CVE-2026-28476 | 8.3 | 0.06% | 2 | 0 | 2026-03-06T17:16:32.163000 | OpenClaw versions prior to 2026.2.14 contain a server-side request forgery vulne | |
| CVE-2026-28473 | 8.1 | 0.03% | 1 | 0 | 2026-03-06T17:16:31.973000 | OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerabilit | |
| CVE-2026-28464 | 5.9 | 0.09% | 1 | 0 | 2026-03-06T17:16:30.390000 | OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for | |
| CVE-2026-28458 | 8.1 | 0.05% | 1 | 0 | 2026-03-06T17:16:30 | OpenClaw version 2026.1.20 prior to 2026.2.1 contains a vulnerability in the Bro | |
| CVE-2026-28447 | 8.1 | 0.03% | 1 | 0 | 2026-03-06T17:16:28.550000 | OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.1 contain a path traversal vu | |
| CVE-2026-28442 | 8.5 | 0.04% | 2 | 0 | 2026-03-06T17:16:28.200000 | ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 syst | |
| CVE-2026-28393 | 7.7 | 0.01% | 1 | 0 | 2026-03-06T17:16:27.817000 | OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulner | |
| CVE-2026-0848 | 10.0 | 0.41% | 2 | 0 | 2026-03-06T17:16:25.273000 | NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper | |
| CVE-2026-26288 | 9.4 | 0.07% | 2 | 0 | 2026-03-06T16:16:10.723000 | WebSocket endpoints lack proper authentication mechanisms, enabling attackers to | |
| CVE-2026-24696 | 7.5 | 0.05% | 1 | 0 | 2026-03-06T16:16:10.193000 | The WebSocket Application Programming Interface lacks restrictions on the number | |
| CVE-2026-20882 | 7.5 | 0.06% | 1 | 0 | 2026-03-06T16:16:09.913000 | The WebSocket Application Programming Interface lacks restrictions on the number | |
| CVE-2026-29000 | 10.0 | 0.24% | 1 | 1 | 2026-03-06T15:41:57 | pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication by | |
| CVE-2026-26051 | 9.4 | 0.10% | 2 | 0 | 2026-03-06T15:31:36 | WebSocket endpoints lack proper authentication mechanisms, enabling attackers to | |
| CVE-2026-2753 | 7.5 | 0.07% | 1 | 0 | 2026-03-06T15:31:36 | An Absolute Path Traversal vulnerability exists in Navtor NavBox. The applicatio | |
| CVE-2026-28794 | None | 0.32% | 1 | 0 | 2026-03-06T15:16:22 | ### Summary A critical Prototype Pollution vulnerability exists in the RPC JSON | |
| CVE-2026-28787 | 8.2 | 0.05% | 3 | 0 | 2026-03-06T15:16:16 | ### Summary The WebAuthn authentication implementation does not store the chall | |
| CVE-2026-2754 | 7.5 | 0.04% | 1 | 0 | 2026-03-06T15:16:11.320000 | Navtor NavBox exposes sensitive configuration and operational data due to missin | |
| CVE-2026-29093 | 8.1 | 0.05% | 1 | 0 | 2026-03-06T14:24:08 | ## Summary The official `docker-compose.yml` publishes the memcached service on | |
| CVE-2026-25921 | 9.3 | 0.02% | 2 | 0 | 2026-03-06T14:02:02.117000 | Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwri | |
| CVE-2021-30952 | 7.8 | 1.51% | 4 | 0 | 2026-03-06T13:44:17.940000 | An integer overflow was addressed with improved input validation. This issue is | |
| CVE-2021-22681 | 9.8 | 15.43% | 3 | 0 | 2026-03-06T13:44:06.370000 | Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogi | |
| CVE-2018-25181 | 7.5 | 0.57% | 2 | 0 | 2026-03-06T13:16:00.447000 | Musicco 2.0.0 contains a path traversal vulnerability that allows unauthenticate | |
| CVE-2018-25166 | 8.2 | 0.06% | 1 | 0 | 2026-03-06T13:15:57.430000 | Meneame English Pligg 5.8 contains an SQL injection vulnerability that allows un | |
| CVE-2026-26416 | 8.8 | 0.03% | 2 | 1 | 2026-03-06T12:31:37 | An authorization bypass vulnerability in Tata Consultancy Services Cognix Recon | |
| CVE-2025-70995 | 8.8 | 0.36% | 2 | 1 | 2026-03-06T12:31:37 | An issue in Aranda Service Desk Web Edition (ASDK API 8.6) allows authenticated | |
| CVE-2025-13476 | 9.8 | 0.05% | 2 | 0 | 2026-03-06T12:31:36 | Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 u | |
| CVE-2025-70229 | 9.8 | 0.06% | 2 | 0 | 2026-03-06T12:31:36 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para | |
| CVE-2026-26418 | 7.5 | 0.06% | 2 | 1 | 2026-03-06T12:31:36 | Missing authentication and authorization in the web API of Tata Consultancy Serv | |
| CVE-2025-70233 | 9.8 | 0.06% | 2 | 0 | 2026-03-06T12:30:31 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para | |
| CVE-2025-70949 | 7.5 | 0.03% | 2 | 0 | 2026-03-06T11:16:08.263000 | An observable timing discrepancy in @perfood/couch-auth v0.26.0 allows attackers | |
| CVE-2025-70948 | 9.3 | 0.03% | 2 | 0 | 2026-03-06T11:16:08.090000 | A host header injection vulnerability in the mailer component of @perfood/couch- | |
| CVE-2026-26417 | 8.1 | 0.03% | 2 | 1 | 2026-03-06T10:16:22.163000 | A broken access control vulnerability in the password reset functionality of Tat | |
| CVE-2025-70616 | 7.8 | 0.01% | 2 | 0 | 2026-03-06T10:16:21.803000 | A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys | |
| CVE-2025-70614 | 8.1 | 0.03% | 2 | 0 | 2026-03-06T10:16:21.627000 | OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2 contains a broken | |
| CVE-2025-29165 | 9.8 | 0.04% | 2 | 0 | 2026-03-06T10:16:20.040000 | An issue in D-Link DIR-1253 MESH V1.6.1684 allows an attacker to escalate privil | |
| CVE-2026-2331 | 9.8 | 0.17% | 5 | 0 | 2026-03-06T09:31:41 | An attacker may perform unauthenticated read and write operations on sensitive f | |
| CVE-2026-2330 | 9.4 | 0.21% | 2 | 0 | 2026-03-06T08:16:27.253000 | An attacker may access restricted filesystem areas on the device via the CROWN R | |
| CVE-2026-29183 | 9.3 | 0.03% | 3 | 0 | 2026-03-06T08:16:27.090000 | SiYuan is a personal knowledge management system. Prior to version 3.5.9, an una | |
| CVE-2026-29074 | 7.5 | 0.04% | 1 | 0 | 2026-03-06T08:16:26.920000 | SVGO, short for SVG Optimizer, is a Node.js library and command-line application | |
| CVE-2026-28681 | 8.1 | 0.06% | 2 | 0 | 2026-03-06T05:16:37.710000 | Internet Routing Registry daemon version 4 is an IRR database server, processing | |
| CVE-2026-28679 | 8.6 | 0.04% | 2 | 0 | 2026-03-06T05:16:36.977000 | Home-Gallery.org is a self-hosted open-source web gallery to browse personal pho | |
| CVE-2026-28677 | 8.2 | 0.04% | 1 | 0 | 2026-03-06T05:16:36.610000 | OpenSift is an AI study tool that sifts through large datasets using semantic se | |
| CVE-2026-25888 | 8.8 | 0.23% | 2 | 0 | 2026-03-06T05:16:29.903000 | Chartbrew is an open-source web application that can connect directly to databas | |
| CVE-2026-28501 | 9.8 | 0.03% | 3 | 0 | 2026-03-06T04:16:08.177000 | WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthen | |
| CVE-2025-59543 | 9.0 | 0.04% | 3 | 0 | 2026-03-06T04:16:02.293000 | Chamilo is a learning management system. Prior to version 1.11.34, there is a st | |
| CVE-2025-59541 | 8.1 | 0.01% | 3 | 0 | 2026-03-06T04:16:01.977000 | Chamilo is a learning management system. Prior to version 1.11.34, a Cross-Site | |
| CVE-2026-28466 | 10.0 | 0.09% | 1 | 0 | 2026-03-06T01:05:55 | ### Summary A remote code execution (RCE) vulnerability in the gateway-to-node | |
| CVE-2026-28479 | 5.4 | 0.02% | 1 | 0 | 2026-03-06T01:05:00 | ## Affected Packages / Versions - npm package: `openclaw` - Affected versions: ` | |
| CVE-2026-28462 | 7.5 | 0.04% | 1 | 0 | 2026-03-06T01:04:45 | ## Summary OpenClaw’s browser control API accepted user-supplied output paths | |
| CVE-2026-28469 | 9.8 | 0.03% | 1 | 0 | 2026-03-06T01:03:20 | ## Summary When multiple Google Chat webhook targets are registered on the same | |
| CVE-2026-28470 | 9.8 | 0.07% | 1 | 0 | 2026-03-06T01:02:34 | ### Summary Exec approvals allowlist bypass via command substitution/backticks | |
| CVE-2026-28465 | 5.9 | 0.02% | 1 | 0 | 2026-03-06T01:01:24 | ## Affected Packages / Versions This issue affects the optional voice-call plug | |
| CVE-2026-29613 | 5.9 | 0.02% | 1 | 0 | 2026-03-06T01:00:35 | ## Summary The BlueBubbles webhook handler previously treated any request whose | |
| CVE-2026-28456 | 7.2 | 0.06% | 1 | 0 | 2026-03-06T00:59:49 | ## Summary OpenClaw Gateway supports hook mappings with optional JavaScript/Typ | |
| CVE-2026-28453 | 8.1 | 0.04% | 1 | 0 | 2026-03-06T00:59:39 | ## Summary OpenClaw versions before 2026.2.14 did not sufficiently validate TAR | |
| CVE-2026-28454 | 9.8 | 0.02% | 2 | 0 | 2026-03-06T00:58:49 | ## Summary When Telegram webhook mode is enabled without a configured webhook s | |
| CVE-2026-28727 | 7.8 | 0.01% | 2 | 0 | 2026-03-06T00:31:42 | Local privilege escalation due to insecure Unix socket permissions. The followin | |
| CVE-2026-21536 | 9.8 | 0.40% | 2 | 0 | 2026-03-06T00:31:41 | Microsoft Devices Pricing Program Remote Code Execution Vulnerability | |
| CVE-2026-22552 | 9.4 | 0.10% | 2 | 0 | 2026-03-06T00:31:41 | WebSocket endpoints lack proper authentication mechanisms, enabling attackers to | |
| CVE-2026-28710 | 8.1 | 0.07% | 1 | 0 | 2026-03-06T00:31:41 | Sensitive information disclosure and manipulation due to improper authentication | |
| CVE-2026-27778 | 7.5 | 0.06% | 1 | 0 | 2026-03-06T00:16:10.960000 | The WebSocket Application Programming Interface lacks restrictions on the number | |
| CVE-2026-26125 | 8.6 | 0.08% | 1 | 0 | 2026-03-05T23:16:20.160000 | Payment Orchestrator Service Elevation of Privilege Vulnerability | |
| CVE-2026-29188 | 9.1 | 0.06% | 1 | 0 | 2026-03-05T22:50:22 | ### Summary A broken access control vulnerability in the TUS protocol DELETE en | |
| CVE-2026-28790 | 7.5 | 0.06% | 2 | 0 | 2026-03-05T22:49:38 | ### Summary OliveTin allows an unauthenticated guest to terminate running actio | |
| CVE-2026-27944 | 9.8 | 0.05% | 1 | 0 | 2026-03-05T22:37:22 | ## Summary The `/api/backup` endpoint is accessible without authentication and | |
| CVE-2026-26999 | 7.5 | 0.01% | 1 | 0 | 2026-03-05T22:29:01 | ## Impact There is a potential vulnerability in Traefik managing TLS handshake | |
| CVE-2026-28478 | 7.5 | 0.08% | 1 | 0 | 2026-03-05T22:16:22.210000 | OpenClaw versions prior to 2026.2.13 contain a denial of service vulnerability i | |
| CVE-2026-28463 | 8.4 | 0.02% | 1 | 0 | 2026-03-05T22:16:19.127000 | OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens bu | |
| CVE-2026-28289 | 10.0 | 0.03% | 1 | 1 | 2026-03-05T22:16:15.213000 | FreeScout is a free help desk and shared inbox built with PHP's Laravel framewor | |
| CVE-2026-29609 | 7.5 | 0.10% | 1 | 0 | 2026-03-05T21:59:52 | ### Summary URL-backed media fetch handling allocated the entire response payloa | |
| CVE-2026-28474 | None | 0.04% | 2 | 0 | 2026-03-05T21:52:02 | ## Summary In affected versions of the optional Nextcloud Talk plugin (installe | |
| CVE-2026-28472 | None | 0.04% | 1 | 0 | 2026-03-05T21:51:23 | ### Summary The gateway WebSocket `connect` handshake could allow skipping devi | |
| CVE-2026-28468 | 7.1 | 0.02% | 2 | 0 | 2026-03-05T21:50:00 | ## Summary openclaw could start the sandbox browser bridge server without authe | |
| CVE-2026-30244 | 7.5 | 0.02% | 1 | 0 | 2026-03-05T21:48:12 | ## Executive Summary A security vulnerability exists in the Plane project manag | |
| CVE-2026-28451 | 8.6 | 0.04% | 2 | 0 | 2026-03-05T21:44:47 | ### Summary The Feishu extension could fetch attacker-controlled remote URLs in | |
| CVE-2026-30242 | 8.5 | 0.03% | 1 | 0 | 2026-03-05T21:43:16 | ### Summary The webhook URL validation in `plane/app/serializers/webhook.py` onl | |
| CVE-2026-28446 | 9.4 | 0.26% | 1 | 0 | 2026-03-05T21:43:07 | ### Summary An authentication bypass in the optional `voice-call` extension/plu | |
| CVE-2026-28392 | 4.8 | 0.03% | 2 | 0 | 2026-03-05T21:41:06 | ## Summary When Slack DMs are configured with `dmPolicy=open`, the Slack slash- | |
| CVE-2026-28391 | None | 0.05% | 1 | 0 | 2026-03-05T21:40:43 | ### Summary On Windows nodes, exec requests were executed via `cmd.exe /d /s /c | |
| CVE-2026-28115 | 9.3 | 0.03% | 1 | 0 | 2026-03-05T21:31:51 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2017-7921 | 10.0 | 94.27% | 3 | 25 | template | 2026-03-05T21:31:32 | An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Serie |
| CVE-2026-24457 | 9.1 | 0.19% | 3 | 0 | 2026-03-05T21:30:57 | An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read ar | |
| CVE-2023-43000 | 8.8 | 0.11% | 4 | 0 | 2026-03-05T21:30:24 | A use-after-free issue was addressed with improved memory management. This issue | |
| CVE-2023-41974 | 7.8 | 0.48% | 4 | 0 | 2026-03-05T21:30:23 | A use-after-free issue was addressed with improved memory management. This issue | |
| CVE-2026-26478 | 9.8 | 0.86% | 2 | 0 | 2026-03-05T18:13:33.993000 | A shell command injection vulnerability in Mobvoi Tichome Mini smart speaker 012 | |
| CVE-2026-29186 | 7.7 | 0.07% | 2 | 0 | 2026-03-05T00:12:09 | ### Impact This is a configuration bypass vulnerability that enables arbitrary c | |
| CVE-2026-29192 | 7.7 | 0.03% | 2 | 0 | 2026-03-04T22:53:44 | ### Summary A vulnerability in Zitadel's login V2 interface was discovered, all | |
| CVE-2026-29191 | 9.3 | 0.03% | 2 | 0 | 2026-03-04T22:47:09 | ### Summary A vulnerability was discovered in Zitadel's login V2 interface that | |
| CVE-2026-2256 | 6.5 | 2.31% | 2 | 1 | 2026-03-03T21:52:29.877000 | A command injection vulnerability in ModelScope's ms-agent versions v1.6.0rc1 an | |
| CVE-2026-24101 | 9.8 | 1.13% | 2 | 0 | 2026-03-03T19:44:19.120000 | An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_mul | |
| CVE-2024-47886 | 7.2 | 0.89% | 2 | 0 | 2026-03-03T19:11:21.227000 | Chamilo is a learning management system. Chamillo is affected by a post-authenti | |
| CVE-2026-24107 | 9.8 | 1.13% | 2 | 0 | 2026-03-03T15:55:11.547000 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the | |
| CVE-2026-24105 | 9.8 | 1.69% | 2 | 0 | 2026-03-03T15:31:37 | An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.1 | |
| CVE-2026-1492 | 9.8 | 0.07% | 2 | 1 | 2026-03-03T06:31:14 | The User Registration & Membership – Custom Registration Form Builder, Custom Lo | |
| CVE-2026-23600 | 0 | 0.24% | 1 | 0 | 2026-03-02T20:29:29.330000 | A remote authentication bypass vulnerability exists in HPE AutoPass License S | |
| CVE-2026-20127 | 10.0 | 2.60% | 1 | 6 | 2026-02-26T16:20:02.187000 | A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controlle | |
| CVE-2026-2441 | 8.8 | 0.14% | 2 | 8 | 2026-02-23T13:24:55.920000 | Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote a | |
| CVE-2026-20841 | 8.8 | 0.10% | 1 | 12 | 2026-02-11T15:31:25 | Improper neutralization of special elements used in a command ('command injectio | |
| CVE-2026-25253 | 8.8 | 0.05% | 7 | 6 | 2026-02-02T23:41:06 | ## Summary The Control UI trusts `gatewayUrl` from the query string without val | |
| CVE-2025-38617 | 4.7 | 0.00% | 1 | 0 | 2026-01-07T18:30:21 | In the Linux kernel, the following vulnerability has been resolved: net/packet: | |
| CVE-2025-14500 | 9.8 | 1.29% | 1 | 0 | 2025-12-24T00:30:27 | IceWarp14 X-File-Operation Command Injection Remote Code Execution Vulnerability | |
| CVE-2025-55182 | 10.0 | 66.27% | 1 | 100 | template | 2025-12-10T02:00:02.557000 | A pre-authentication remote code execution vulnerability exists in React Server |
| CVE-2025-10959 | 6.3 | 0.20% | 1 | 0 | 2025-09-25T18:30:45 | A vulnerability has been found in Wavlink NU516U1 M16U1_V240425. The affected el | |
| CVE-2023-38545 | 9.8 | 26.25% | 2 | 9 | 2025-02-13T18:33:03 | This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. | |
| CVE-2024-36694 | 8.1 | 0.59% | 1 | 0 | 2024-12-18T22:03:16 | A Server-Side Template Injection (SSTI) vulnerability in the Theme Editor Functi | |
| CVE-2021-22901 | 8.1 | 0.34% | 4 | 0 | 2024-11-21T05:50:52.580000 | curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting | |
| CVE-2026-29779 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-30863 | 0 | 0.07% | 2 | 1 | N/A | ||
| CVE-2026-28210 | 0 | 0.05% | 2 | 0 | N/A | ||
| CVE-2026-28287 | 0 | 0.11% | 2 | 0 | N/A | ||
| CVE-2026-29067 | 0 | 0.01% | 2 | 0 | N/A | ||
| CVE-2025-55208 | 0 | 0.05% | 2 | 0 | N/A | ||
| CVE-2026-28405 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-29089 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2026-29789 | 0 | 0.05% | 2 | 0 | N/A | ||
| CVE-2026-30840 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2025-14297 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-28485 | 0 | 0.06% | 1 | 0 | N/A | ||
| CVE-2025-55289 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2025-59542 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-29041 | 0 | 0.24% | 1 | 1 | N/A | ||
| CVE-2026-28429 | 0 | 0.36% | 1 | 0 | N/A | ||
| CVE-2026-28676 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2026-28680 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-27884 | 0 | 0.03% | 1 | 0 | N/A |
updated 2026-03-09T00:30:19
2 posts
UltraVNC 1.6.4.0 on Windows hit by HIGH-severity vuln (CVE-2026-3787): uncontrolled DLL search path in cryptbase.dll. Local attackers could escalate privileges. No patch yet — restrict access & monitor for DLL hijacking. https://radar.offseq.com/threat/cve-2026-3787-uncontrolled-search-path-in-ultravnc-8f16fda8 #OffSeq #Vuln #UltraVNC
##UltraVNC 1.6.4.0 on Windows hit by HIGH-severity vuln (CVE-2026-3787): uncontrolled DLL search path in cryptbase.dll. Local attackers could escalate privileges. No patch yet — restrict access & monitor for DLL hijacking. https://radar.offseq.com/threat/cve-2026-3787-uncontrolled-search-path-in-ultravnc-8f16fda8 #OffSeq #Vuln #UltraVNC
##updated 2026-03-08T21:15:51.470000
4 posts
🚩 CVE-2026-3769: HIGH severity vuln in Tenda F453 (v1.0.0.3) — stack-based buffer overflow in /goform/WrlclientSet. Public exploit released! Limit remote access, monitor traffic, apply mitigations. Details: https://radar.offseq.com/threat/cve-2026-3769-stack-based-buffer-overflow-in-tenda-7dc11ff5 #OffSeq #NetworkSecurity #Vuln
##🟠 CVE-2026-3769 - High (8.8)
A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function WrlclientSet of the file /goform/WrlclientSet. The manipulation of the argument GO results in stack-based buffer overflow. The attack can be executed remote...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3769/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚩 CVE-2026-3769: HIGH severity vuln in Tenda F453 (v1.0.0.3) — stack-based buffer overflow in /goform/WrlclientSet. Public exploit released! Limit remote access, monitor traffic, apply mitigations. Details: https://radar.offseq.com/threat/cve-2026-3769-stack-based-buffer-overflow-in-tenda-7dc11ff5 #OffSeq #NetworkSecurity #Vuln
##🟠 CVE-2026-3769 - High (8.8)
A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function WrlclientSet of the file /goform/WrlclientSet. The manipulation of the argument GO results in stack-based buffer overflow. The attack can be executed remote...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3769/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T21:15:51.267000
4 posts
🚩 CVE-2026-3768 (HIGH, CVSS 8.7): Stack buffer overflow in Tenda F453 v1.0.0.3 — remote, unauthenticated exploit possible. Public exploit code released. Patch ASAP or restrict remote access! https://radar.offseq.com/threat/cve-2026-3768-stack-based-buffer-overflow-in-tenda-9b634f69 #OffSeq #CVE20263768 #RouterSecurity #Infosec
##🟠 CVE-2026-3768 - High (8.8)
A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet. The manipulation of the argument GO leads to stack-based buffer overflow. Remote expl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3768/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚩 CVE-2026-3768 (HIGH, CVSS 8.7): Stack buffer overflow in Tenda F453 v1.0.0.3 — remote, unauthenticated exploit possible. Public exploit code released. Patch ASAP or restrict remote access! https://radar.offseq.com/threat/cve-2026-3768-stack-based-buffer-overflow-in-tenda-9b634f69 #OffSeq #CVE20263768 #RouterSecurity #Infosec
##🟠 CVE-2026-3768 - High (8.8)
A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet. The manipulation of the argument GO leads to stack-based buffer overflow. Remote expl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3768/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T12:30:34
2 posts
🟠 CVE-2026-3728 - High (8.8)
A vulnerability was determined in Tenda F453 1.0.0.3/1.If. This issue affects the function fromSetCfm of the file /goform/setcfm. This manipulation of the argument funcname/funcpara1 causes stack-based buffer overflow. Remote exploitation of the a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3728/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3728 - High (8.8)
A vulnerability was determined in Tenda F453 1.0.0.3/1.If. This issue affects the function fromSetCfm of the file /goform/setcfm. This manipulation of the argument funcname/funcpara1 causes stack-based buffer overflow. Remote exploitation of the a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3728/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T12:30:27
2 posts
🟠 CVE-2026-3727 - High (8.8)
A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function sub_3C6C0 of the file /goform/QuickIndex. The manipulation of the argument mit_linktype/PPPOEPassword results in stack-based buffer overflow. The attack may b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3727/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3727 - High (8.8)
A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function sub_3C6C0 of the file /goform/QuickIndex. The manipulation of the argument mit_linktype/PPPOEPassword results in stack-based buffer overflow. The attack may b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3727/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T11:15:50.523000
4 posts
🛑 CVE-2026-3732: HIGH severity stack buffer overflow in Tenda F453 (v1.0.0.3). Remote, unauthenticated code execution risk — no patch yet. Block remote mgmt & monitor endpoints. Details: https://radar.offseq.com/threat/cve-2026-3732-stack-based-buffer-overflow-in-tenda-41443da2 #OffSeq #Vuln #RouterSecurity #CVE20263732
##🟠 CVE-2026-3732 - High (8.8)
A security vulnerability has been detected in Tenda F453 1.0.0.3. This affects the function strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. It is possible to initiate the attac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3732/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🛑 CVE-2026-3732: HIGH severity stack buffer overflow in Tenda F453 (v1.0.0.3). Remote, unauthenticated code execution risk — no patch yet. Block remote mgmt & monitor endpoints. Details: https://radar.offseq.com/threat/cve-2026-3732-stack-based-buffer-overflow-in-tenda-41443da2 #OffSeq #Vuln #RouterSecurity #CVE20263732
##🟠 CVE-2026-3732 - High (8.8)
A security vulnerability has been detected in Tenda F453 1.0.0.3. This affects the function strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. It is possible to initiate the attac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3732/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T11:15:49.863000
2 posts
🟠 CVE-2026-3729 - High (8.8)
A vulnerability was identified in Tenda F453 1.0.0.3/3.As. Impacted is the function fromPptpUserAdd of the file /goform/PPTPDClient. Such manipulation of the argument username/opttype leads to stack-based buffer overflow. The attack can be execute...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3729/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3729 - High (8.8)
A vulnerability was identified in Tenda F453 1.0.0.3/3.As. Impacted is the function fromPptpUserAdd of the file /goform/PPTPDClient. Such manipulation of the argument username/opttype leads to stack-based buffer overflow. The attack can be execute...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3729/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T09:30:27
4 posts
🚨 CVE-2026-3726 (HIGH, CVSS 8.7) in Tenda F453 (v1.0.0.3): Stack buffer overflow in /goform/webExcptypemanFilter enables remote, unauthenticated code execution. Public exploit code raises risk — restrict access & monitor now! https://radar.offseq.com/threat/cve-2026-3726-stack-based-buffer-overflow-in-tenda-6f0be4bc #OffSeq #Vuln #Infosec
##🟠 CVE-2026-3726 - High (8.8)
A vulnerability has been found in Tenda F453 1.0.0.3. This affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initia...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3726/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-3726 (HIGH, CVSS 8.7) in Tenda F453 (v1.0.0.3): Stack buffer overflow in /goform/webExcptypemanFilter enables remote, unauthenticated code execution. Public exploit code raises risk — restrict access & monitor now! https://radar.offseq.com/threat/cve-2026-3726-stack-based-buffer-overflow-in-tenda-6f0be4bc #OffSeq #Vuln #Infosec
##🟠 CVE-2026-3726 - High (8.8)
A vulnerability has been found in Tenda F453 1.0.0.3. This affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initia...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3726/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T09:30:21
4 posts
🛡️ CVE-2026-3715: HIGH-severity stack overflow in Wavlink WL-WN579X3-C routers (v231124). Remote attackers can execute code w/o auth. Exploit code is public — patch to 20260226 now! https://radar.offseq.com/threat/cve-2026-3715-stack-based-buffer-overflow-in-wavli-504a0f36 #OffSeq #Vulnerability #RouterSecurity #Infosec
##🟠 CVE-2026-3715 - High (8.8)
A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the function sub_40139C of the file /cgi-bin/firewall.cgi. Performing a manipulation of the argument del_flag results in stack-based buffer overflow. It is possible to initiate...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3715/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🛡️ CVE-2026-3715: HIGH-severity stack overflow in Wavlink WL-WN579X3-C routers (v231124). Remote attackers can execute code w/o auth. Exploit code is public — patch to 20260226 now! https://radar.offseq.com/threat/cve-2026-3715-stack-based-buffer-overflow-in-wavli-504a0f36 #OffSeq #Vulnerability #RouterSecurity #Infosec
##🟠 CVE-2026-3715 - High (8.8)
A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the function sub_40139C of the file /cgi-bin/firewall.cgi. Performing a manipulation of the argument del_flag results in stack-based buffer overflow. It is possible to initiate...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3715/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T08:37:48
2 posts
🟠 CVE-2026-28683 - High (8.7)
Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, if a malicious authenticated user uploads SVG and creates a hotlink for it, they can achieve stored XSS. This issue has been patc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28683/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28683 - High (8.7)
Gokapi is a self-hosted file sharing server with automatic expiration and encryption support. Prior to version 2.2.3, if a malicious authenticated user uploads SVG and creates a hotlink for it, they can achieve stored XSS. This issue has been patc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28683/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T06:31:15
5 posts
🔴 New security advisory:
CVE-2026-3703 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-3703
🔴 CVE-2026-3703 - Critical (9.8)
A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_401A10 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to out-of-bounds write. The attack may be performed from remote. The exp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3703/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-3703 in Wavlink NU516U1 (firmware 251208) allows remote, unauthenticated out-of-bounds write via /cgi-bin/login.cgi. Public exploit available — patch immediately! Monitor for abnormal ipaddr activity. https://radar.offseq.com/threat/cve-2026-3703-out-of-bounds-write-in-wavlink-nu516-a93ca55c #OffSeq #Vuln #RouterSecurity #Wavlink
##🔴 CVE-2026-3703 - Critical (9.8)
A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_401A10 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to out-of-bounds write. The attack may be performed from remote. The exp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3703/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-3703 in Wavlink NU516U1 (firmware 251208) allows remote, unauthenticated out-of-bounds write via /cgi-bin/login.cgi. Public exploit available — patch immediately! Monitor for abnormal ipaddr activity. https://radar.offseq.com/threat/cve-2026-3703-out-of-bounds-write-in-wavlink-nu516-a93ca55c #OffSeq #Vuln #RouterSecurity #Wavlink
##updated 2026-03-08T06:31:15
2 posts
🟠 CVE-2026-3701 - High (8.8)
A security vulnerability has been detected in H3C Magic B1 up to 100R004. Affected by this vulnerability is the function Edit_BasicSSID_5G of the file /goform/aspForm. Such manipulation of the argument param leads to buffer overflow. The attack ca...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3701/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3701 - High (8.8)
A security vulnerability has been detected in H3C Magic B1 up to 100R004. Affected by this vulnerability is the function Edit_BasicSSID_5G of the file /goform/aspForm. Such manipulation of the argument param leads to buffer overflow. The attack ca...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3701/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T03:30:34
2 posts
🟠 CVE-2026-3698 - High (8.8)
A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. This affects the function strcpy of the file /goform/NTP. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3698/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3698 - High (8.8)
A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. This affects the function strcpy of the file /goform/NTP. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3698/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T03:30:34
2 posts
🟠 CVE-2026-3700 - High (8.8)
A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formConfigDnsFilterGlobal. This manipulation causes buffer overflow. Remote exploitation of the attack is possible. The exploi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3700/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3700 - High (8.8)
A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formConfigDnsFilterGlobal. This manipulation causes buffer overflow. Remote exploitation of the attack is possible. The exploi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3700/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T03:16:04.017000
2 posts
🟠 CVE-2026-3699 - High (8.8)
A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-171114. This impacts the function strcpy of the file /goform/formRemoteControl. The manipulation results in buffer overflow. The attack may be launched remotely. The exploit has bee...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3699/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3699 - High (8.8)
A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-171114. This impacts the function strcpy of the file /goform/formRemoteControl. The manipulation results in buffer overflow. The attack may be launched remotely. The exploit has bee...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3699/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T00:31:58
2 posts
🟠 CVE-2026-3677 - High (8.8)
A vulnerability was found in Tenda FH451 1.0.0.9. This impacts the function fromSetCfm of the file /goform/setcfm. The manipulation of the argument funcname/funcpara1 results in stack-based buffer overflow. The attack may be performed from remote....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3677/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3677 - High (8.8)
A vulnerability was found in Tenda FH451 1.0.0.9. This impacts the function fromSetCfm of the file /goform/setcfm. The manipulation of the argument funcname/funcpara1 results in stack-based buffer overflow. The attack may be performed from remote....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3677/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T00:31:58
2 posts
🟠 CVE-2026-3678 - High (8.8)
A vulnerability was determined in Tenda FH451 1.0.0.9. Affected is the function sub_3C434 of the file /goform/AdvSetWan. This manipulation of the argument wanmode/PPPOEPassword causes stack-based buffer overflow. It is possible to initiate the att...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3678/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3678 - High (8.8)
A vulnerability was determined in Tenda FH451 1.0.0.9. Affected is the function sub_3C434 of the file /goform/AdvSetWan. This manipulation of the argument wanmode/PPPOEPassword causes stack-based buffer overflow. It is possible to initiate the att...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3678/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-07T23:15:47.643000
2 posts
🟠 CVE-2026-3679 - High (8.8)
A vulnerability was identified in Tenda FH451 1.0.0.9. Affected by this vulnerability is the function formQuickIndex of the file /goform/QuickIndex. Such manipulation of the argument mit_linktype/PPPOEPassword leads to stack-based buffer overflow....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3679/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3679 - High (8.8)
A vulnerability was identified in Tenda FH451 1.0.0.9. Affected by this vulnerability is the function formQuickIndex of the file /goform/QuickIndex. Such manipulation of the argument mit_linktype/PPPOEPassword leads to stack-based buffer overflow....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3679/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-07T18:31:31
1 posts
💡 HIGH severity: CVE-2026-24308 in Apache ZooKeeper 3.8.0 – 3.9.4 logs sensitive config at INFO level. Risk of secret exposure via logs. Patch to 3.8.6/3.9.5 & restrict log access! https://radar.offseq.com/threat/cve-2026-24308-cwe-532-insertion-of-sensitive-info-090ca1fd #OffSeq #ZooKeeper #CVE202624308 #Security
##updated 2026-03-07T17:15:53.823000
5 posts
🔴 CVE-2026-30860 - Critical (9.9)
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, a remote code execution (RCE) vulnerability exists in the application's database query functionality. The validation syst...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30860/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 New security advisory:
CVE-2026-30860 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-30860
⚠️ CRITICAL: Tencent WeKnora (<0.2.12) hit by CVE-2026-30860 — SQLi in PostgreSQL array/row parsing enables unauthenticated RCE. Patch to 0.2.12 ASAP. Restrict DB rights and monitor logs. https://radar.offseq.com/threat/cve-2026-30860-cwe-89-improper-neutralization-of-s-90c4d0a6 #OffSeq #SQLInjection #InfoSec
##🔴 CVE-2026-30860 - Critical (9.9)
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, a remote code execution (RCE) vulnerability exists in the application's database query functionality. The validation syst...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30860/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: Tencent WeKnora (<0.2.12) hit by CVE-2026-30860 — SQLi in PostgreSQL array/row parsing enables unauthenticated RCE. Patch to 0.2.12 ASAP. Restrict DB rights and monitor logs. https://radar.offseq.com/threat/cve-2026-30860-cwe-89-improper-neutralization-of-s-90c4d0a6 #OffSeq #SQLInjection #InfoSec
##updated 2026-03-07T16:15:55.430000
2 posts
🟠 CVE-2026-29784 - High (7.5)
Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the requesting session. In some scenarios this might hav...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29784/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29784 - High (7.5)
Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the requesting session. In some scenarios this might hav...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29784/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-07T16:15:54.010000
2 posts
🟠 CVE-2026-28678 - High (8.1)
DSA Study Hub is an interactive educational web application. Prior to commit d527fba, the user authentication system in server/routes/auth.js was found to be vulnerable to Insufficiently Protected Credentials. Authentication tokens (JWTs) were sto...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28678/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28678 - High (8.1)
DSA Study Hub is an interactive educational web application. Prior to commit d527fba, the user authentication system in server/routes/auth.js was found to be vulnerable to Insufficiently Protected Credentials. Authentication tokens (JWTs) were sto...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28678/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-07T15:15:55.867000
2 posts
🟠 CVE-2026-29193 - High (8.2)
ZITADEL is an open source identity management platform. From version 4.0.0 to 4.12.0, a vulnerability in Zitadel's login V2 UI allowed users to bypass login behavior and security policies and self-register new accounts or sign in using password ev...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29193/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29193 - High (8.2)
ZITADEL is an open source identity management platform. From version 4.0.0 to 4.12.0, a vulnerability in Zitadel's login V2 UI allowed users to bypass login behavior and security policies and self-register new accounts or sign in using password ev...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29193/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-07T08:16:09.020000
1 posts
🚨 CVE-2026-1074: High-severity stored XSS in WP App Bar plugin (all versions). No auth needed — attackers inject scripts via 'app-bar-features' & compromise admin sessions. Patch or disable urgently! https://radar.offseq.com/threat/cve-2026-1074-cwe-79-improper-neutralization-of-in-ed135d09 #OffSeq #WordPress #XSS #Vuln
##updated 2026-03-07T08:16:05.963000
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-07T06:16:09.350000
1 posts
🟠 CVE-2025-8899 - High (8.8)
The Paid Videochat Turnkey Site – HTML5 PPV Live Webcams plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.3.20. This is due to videowhisper_register_form() function not restricting user roles tha...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-8899/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-07T03:30:29
2 posts
🟠 CVE-2025-14353 - High (7.5)
The ZIP Code Based Content Protection plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 1.0.2 via the 'zipcode' parameter. This is due to insufficient escaping on the user supplied parameter and lack of suff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14353/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-14353 - High (7.5)
The ZIP Code Based Content Protection plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 1.0.2 via the 'zipcode' parameter. This is due to insufficient escaping on the user supplied parameter and lack of suff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14353/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-07T02:33:41
1 posts
🟠 CVE-2025-15602 - High (8.8)
Snipe-IT versions prior to 8.3.7 contain sensitive user attributes related to account privileges that are insufficiently protected against mass assignment. An authenticated, low-privileged user can craft a malicious API request to modify restricte...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15602/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-07T02:16:12.077000
1 posts
🟠 CVE-2026-2020 - High (7.5)
The JS Archive List plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.1.7 via the 'included' shortcode attribute. This is due to the deserialization of untrusted input supplied via the 'included' pa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2020/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-07T01:59:02
6 posts
🔴 CVE-2026-30861 - Critical (9.9)
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. From version 0.2.5 to before version 0.2.10, an unauthenticated remote code execution (RCE) vulnerability exists in the MCP stdio configuration va...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30861/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: Tencent WeKnora (0.2.5 – 0.2.9) hit by unauthenticated RCE (CVE-2026-30861) — attackers bypass command validation using npx - p node. Patch to 0.2.10 ASAP! https://radar.offseq.com/threat/cve-2026-30861-cwe-78-improper-neutralization-of-s-94bf2228 #OffSeq #Vulnerability #RCE #Tencent
##🚨 CRITICAL CVE-2026-30861: Tencent WeKnora (0.2.5 – 0.2.9) OS command injection enables unauth RCE — full system compromise possible. Patch to 0.2.10 now! More info: https://radar.offseq.com/threat/cve-2026-30861-cwe-78-improper-neutralization-of-s-94bf2228 #OffSeq #RCE #Vulnerability #InfoSec
##🔴 CVE-2026-30861 - Critical (9.9)
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. From version 0.2.5 to before version 0.2.10, an unauthenticated remote code execution (RCE) vulnerability exists in the MCP stdio configuration va...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30861/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: Tencent WeKnora (0.2.5 – 0.2.9) hit by unauthenticated RCE (CVE-2026-30861) — attackers bypass command validation using npx - p node. Patch to 0.2.10 ASAP! https://radar.offseq.com/threat/cve-2026-30861-cwe-78-improper-neutralization-of-s-94bf2228 #OffSeq #Vulnerability #RCE #Tencent
##🚨 CRITICAL CVE-2026-30861: Tencent WeKnora (0.2.5 – 0.2.9) OS command injection enables unauth RCE — full system compromise possible. Patch to 0.2.10 now! More info: https://radar.offseq.com/threat/cve-2026-30861-cwe-78-improper-neutralization-of-s-94bf2228 #OffSeq #RCE #Vulnerability #InfoSec
##updated 2026-03-07T01:15:57.427000
3 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
⚠️ CRITICAL: CVE-2026-25070 in XikeStor SKS8310-8X allows unauthenticated remote OS command injection (CVSS 9.3). No patch yet. Restrict access, segment networks, and monitor endpoints. Full root risk! https://radar.offseq.com/threat/cve-2026-25070-cwe-78-improper-neutralization-of-s-f0039eef #OffSeq #Vulnerability #NetworkSecurity
##updated 2026-03-06T23:53:57
2 posts
🟠 CVE-2026-30855 - High (8.8)
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.2, an authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modif...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30855/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-30855 - High (8.8)
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.2, an authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modif...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30855/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T23:38:45
2 posts
🟠 CVE-2026-30851 - High (8.1)
Caddy is an extensible server platform that uses TLS by default. From version 2.10.0 to before version 2.11.2, forward_auth copy_headers does not strip client-supplied headers, allowing identity injection and privilege escalation. This issue has b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30851/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-30851 - High (8.1)
Caddy is an extensible server platform that uses TLS by default. From version 2.10.0 to before version 2.11.2, forward_auth copy_headers does not strip client-supplied headers, allowing identity injection and privilege escalation. This issue has b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30851/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T22:43:40
1 posts
🟠 CVE-2026-26017 - High (7.7)
CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26017/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T22:23:33
2 posts
🟠 CVE-2025-45691 - High (7.5)
An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter wh...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-45691/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-45691 - High (7.5)
An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter wh...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-45691/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T22:20:51
1 posts
🟠 CVE-2026-30823 - High (8.8)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, there is an IDOR vulnerability, leading to account takeover and enterprise feature bypass via SSO configuration. This issue has been ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30823/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T22:19:14
2 posts
🟠 CVE-2026-30822 - High (7.7)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, unauthenticated users can inject arbitrary values into internal database fields when creating leads. This issue has been patched in v...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30822/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-30822 - High (7.7)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, unauthenticated users can inject arbitrary values into internal database fields when creating leads. This issue has been patched in v...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30822/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T22:16:02
4 posts
🔴 CVE-2026-30832 - Critical (9.1)
Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.4, an authenticated SSH user can force the server to make HTTP requests to internal/private IP addresses by running repo import with a crafted...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30832/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔔 CRITICAL CVE-2026-30832: charmbracelet soft-serve (0.6.0 – 0.11.4) allows authenticated SSH users to exploit SSRF via repo import, exposing internal resources. Update to 0.11.4+ now. More: https://radar.offseq.com/threat/cve-2026-30832-cwe-918-server-side-request-forgery-01aea4d4 #OffSeq #SSRF #Vulnerability
##🔴 CVE-2026-30832 - Critical (9.1)
Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.4, an authenticated SSH user can force the server to make HTTP requests to internal/private IP addresses by running repo import with a crafted...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30832/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔔 CRITICAL CVE-2026-30832: charmbracelet soft-serve (0.6.0 – 0.11.4) allows authenticated SSH users to exploit SSRF via repo import, exposing internal resources. Update to 0.11.4+ now. More: https://radar.offseq.com/threat/cve-2026-30832-cwe-918-server-side-request-forgery-01aea4d4 #OffSeq #SSRF #Vulnerability
##updated 2026-03-06T22:10:52
1 posts
🟠 CVE-2026-29064 - High (8.2)
Zarf is an Airgap Native Packager Manager for Kubernetes. From version 0.54.0 to before version 0.73.1, a path traversal vulnerability in archive extraction allows a specifically crafted Zarf package to create symlinks pointing outside the destina...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29064/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T22:08:22
1 posts
🟠 CVE-2026-26018 - High (7.5)
CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a denial of service vulnerability exists in CoreDNS's loop detection plugin that allows an attacker to crash the DNS server by sending specially crafted DNS queries. The vulnera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26018/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T21:56:51
4 posts
Critical Zero-Click Command Injection in AVideo Platform Allows Stream Hijacking
AVideo version 6.0 contains a critical zero-click command injection vulnerability (CVE-2026-29058) that allows unauthenticated attackers to execute arbitrary OS commands and hijack video streams.
**If you are using AVideo platform this is urgent and important. Patch ASAP to version 7.0, because your server will be attacked. Until you update today, use a web application firewall or reverse proxy to block access to the getImage.php component.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-zero-click-command-injection-in-avideo-platform-allows-stream-hijacking-w-3-3-3-s/gD2P6Ple2L
Critical Zero-Click Command Injection in AVideo Platform Allows Stream Hijacking
AVideo version 6.0 contains a critical zero-click command injection vulnerability (CVE-2026-29058) that allows unauthenticated attackers to execute arbitrary OS commands and hijack video streams.
**If you are using AVideo platform this is urgent and important. Patch ASAP to version 7.0, because your server will be attacked. Until you update today, use a web application firewall or reverse proxy to block access to the getImage.php component.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-zero-click-command-injection-in-avideo-platform-allows-stream-hijacking-w-3-3-3-s/gD2P6Ple2L
🔴 CVE-2026-29058 - Critical (9.8)
AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the base64Url GET parameter. This can lead to full server c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29058/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL OS command injection in WWBN AVideo-Encoder < 7.0 (CVE-2026-29058). Unauthenticated attackers can execute arbitrary commands, risking full server takeover. Patch to v7.0 ASAP! https://radar.offseq.com/threat/cve-2026-29058-cwe-78-improper-neutralization-of-s-6e5bf915 #OffSeq #Vulnerability #CyberSecurity
##updated 2026-03-06T21:16:16.607000
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-06T21:16:16.113000
1 posts
🟠 CVE-2026-30223 - High (8.8)
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, when JWT authentication is configured using either "authJwtPubKeyPath" (local RSA public key) or "authJwtHmacSecret" (HMAC secret), the configured...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30223/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T19:16:21.720000
1 posts
🟠 CVE-2026-29091 - High (8.1)
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to version 3.0.0, a remote code execution (RCE) flaw was discovered in the locutus project, specifically within the call_user_func_array function i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29091/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T18:41:00
2 posts
🟠 CVE-2026-30834 - High (7.5)
PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Prior to version 0.7.7, a Server-Side Request Forgery (SSRF) vulnerability in the /download endpoint allows any user with API access to induce the Pinc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30834/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-30834 - High (7.5)
PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Prior to version 0.7.7, a Server-Side Request Forgery (SSRF) vulnerability in the /download endpoint allows any user with API access to induce the Pinc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30834/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T18:36:57
1 posts
🟠 CVE-2026-30827 - High (7.5)
express-rate-limit is a basic rate-limiting middleware for Express. In versions starting from 8.0.0 and prior to versions 8.0.2, 8.1.1, 8.2.2, and 8.3.0, the default keyGenerator in express-rate-limit applies IPv6 subnet masking (/56 by default) t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30827/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T18:32:58.330000
2 posts
🟠 CVE-2026-28284 - High (8.8)
FreePBX is an open source IP PBX. Prior to versions 16.0.10 and 17.0.5, the FreePBX logfiles module contains several authenticated SQL injection vulnerabilities. This issue has been patched in versions 16.0.10 and 17.0.5.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28284/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28284 - High (8.8)
FreePBX is an open source IP PBX. Prior to versions 16.0.10 and 17.0.5, the FreePBX logfiles module contains several authenticated SQL injection vulnerabilities. This issue has been patched in versions 16.0.10 and 17.0.5.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28284/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T18:32:19
2 posts
🔴 CVE-2026-2446 - Critical (9.8)
The PowerPack for LearnDash WordPress plugin before 1.3.0 does not have authorization and CRSF checks in an AJAX action, allowing unauthenticated users to update arbitrary WordPress options (such as default_role etc) and create arbitrary admin users
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2446/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2446 - Critical (9.8)
The PowerPack for LearnDash WordPress plugin before 1.3.0 does not have authorization and CRSF checks in an AJAX action, allowing unauthenticated users to update arbitrary WordPress options (such as default_role etc) and create arbitrary admin users
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2446/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T18:16:22.450000
3 posts
🟠 CVE-2026-3589 - High (7.5)
The WooCommerce WordPress plugin from versions 5.4.0 to 10.5.2 does not properly handle batch requests, which could allow unauthenticated users to make a logged in admin call non store/WC REST endpoints, and create arbitrary admin users via a CSRF...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3589/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3589 - High (7.5)
The WooCommerce WordPress plugin from versions 5.4.0 to 10.5.2 does not properly handle batch requests, which could allow unauthenticated users to make a logged in admin call non store/WC REST endpoints, and create arbitrary admin users via a CSRF...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3589/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-3589: CRITICAL CSRF in WooCommerce (5.4.0 – 10.5.2) lets unauth users create admin accounts via REST API batch requests. Patch ASAP! Restrict API access & monitor for abuse. More: https://radar.offseq.com/threat/cve-2026-3589-cwe-352-cross-site-request-forgery-c-929d5a57 #OffSeq #WooCommerce #WordPress #CSRF
##updated 2026-03-06T18:16:19.757000
1 posts
🟠 CVE-2026-29087 - High (7.5)
@Hono/node-server allows running the Hono application on Node.js. Prior to version 1.19.10, when using @Hono/node-server's static file serving together with route-based middleware protections (e.g. protecting /admin/*), inconsistent URL decoding c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29087/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T18:16:19.300000
2 posts
🟠 CVE-2026-28789 - High (7.5)
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.10.3, an unauthenticated denial-of-service vulnerability exists in OliveTin’s OAuth2 login flow. Concurrent requests to /oauth/login can trigger unsyn...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28789/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28789 - High (7.5)
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.10.3, an unauthenticated denial-of-service vulnerability exists in OliveTin’s OAuth2 login flow. Concurrent requests to /oauth/login can trigger unsyn...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28789/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T18:16:19.103000
1 posts
🚩 CRITICAL: CVE-2026-28514 in Rocket.Chat (<8.0.0) allows auth bypass via username-only login. Full account takeover possible! Patch now or restrict access + enable MFA. Details: https://radar.offseq.com/threat/cve-2026-28514-cwe-287-improper-authentication-in--bf7998c6 #OffSeq #RocketChat #Security #CVE202628514
##updated 2026-03-06T18:16:17.907000
2 posts
🟠 CVE-2026-28342 - High (7.5)
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.10.2, the PasswordHash API endpoint allows unauthenticated users to trigger excessive memory allocation by sending concurrent password hashing requests....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28342/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28342 - High (7.5)
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.10.2, the PasswordHash API endpoint allows unauthenticated users to trigger excessive memory allocation by sending concurrent password hashing requests....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28342/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:37:58.670000
2 posts
🔴 CVE-2025-70230 - Critical (9.8)
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDDNS.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70230/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70230 - Critical (9.8)
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDDNS.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70230/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:37:30.923000
2 posts
🔴 CVE-2025-70231 - Critical (9.8)
D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When processing POST requests related to verification codes in /goform/formLogin, it enters /goform/getAuthCode but fails to filter the value of the FILECODE parameter, resulting...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70231/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70231 - Critical (9.8)
D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When processing POST requests related to verification codes in /goform/formLogin, it enters /goform/getAuthCode but fails to filter the value of the FILECODE parameter, resulting...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70231/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:36:58.860000
2 posts
🔴 CVE-2025-70232 - Critical (9.8)
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetMACFilter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70232/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70232 - Critical (9.8)
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetMACFilter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70232/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:16:35.073000
2 posts
🟠 CVE-2026-29611 - High (7.5)
OpenClaw versions prior to 2026.2.14 contain a local file inclusion vulnerability in BlueBubbles extension (must be installed and enabled) media path handling that allows attackers to read arbitrary files from the local filesystem. The sendBlueBub...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29611/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29611 - High (7.5)
OpenClaw versions prior to 2026.2.14 contain a local file inclusion vulnerability in BlueBubbles extension (must be installed and enabled) media path handling that allows attackers to read arbitrary files from the local filesystem. The sendBlueBub...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29611/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:16:34.833000
1 posts
🟠 CVE-2026-29610 - High (7.8)
OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability that allows attackers to execute unintended binaries by manipulating PATH environment variables through node-host execution or project-local bootstrapping. Attackers wi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29610/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:16:34.167000
1 posts
🟠 CVE-2026-29075 - High (8.3)
Mesa is an open-source Python library for agent-based modeling, simulating complex systems and exploring emergent behaviors. In version 3.5.0 and prior, checking out of untrusted code in benchmarks.yml workflow may lead to code execution in privil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29075/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:16:32.923000
1 posts
🔴 CVE-2026-28484 - Critical (9.8)
OpenClaw versions prior to 2026.2.15 contain an option injection vulnerability in the git-hooks/pre-commit hook that allows attackers to stage ignored files by creating maliciously-named files beginning with dashes. The hook fails to use a -- sepa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28484/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:16:32.163000
2 posts
🟠 CVE-2026-28476 - High (8.3)
OpenClaw versions prior to 2026.2.14 contain a server-side request forgery vulnerability in the optional Tlon Urbit extension that accepts user-provided base URLs for authentication without proper validation. Attackers who can influence the config...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28476/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28476 - High (8.3)
OpenClaw versions prior to 2026.2.14 contain a server-side request forgery vulnerability in the optional Tlon Urbit extension that accepts user-provided base URLs for authentication without proper validation. Attackers who can influence the config...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28476/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:16:31.973000
1 posts
🔴 CVE-2026-28473 - Critical (9.8)
OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerability where clients with operator.write scope can approve or deny exec approval requests by sending the /approve chat command. The /approve command path invokes exec.appro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28473/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:16:30.390000
1 posts
🔴 CVE-2026-28464 - Critical (9.8)
OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28464/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:16:30
1 posts
🟠 CVE-2026-28458 - High (7.5)
OpenClaw version 2026.1.20 prior to 2026.2.1 contains a vulnerability in the Browser Relay (extension must be installed and enabled) /cdp WebSocket endpoint in which it does not require authentication tokens, allowing websites to connect via loopb...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28458/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:16:28.550000
1 posts
🟠 CVE-2026-28447 - High (7.5)
OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.1 contain a path traversal vulnerability in plugin installation that allows malicious plugin package names to escape the extensions directory. Attackers can craft scoped package names containing p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28447/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:16:28.200000
2 posts
🟠 CVE-2026-28442 - High (8.5)
ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.2-beta3, users are restricted from deleting internal system files or folders through the application interface. However, when interacting...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28442/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28442 - High (8.5)
ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.2-beta3, users are restricted from deleting internal system files or folders through the application interface. However, when interacting...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28442/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:16:27.817000
1 posts
🟠 CVE-2026-28393 - High (7.5)
OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulnerability in hook transform module loading that allows arbitrary JavaScript execution. The hooks.mappings[].transform.module parameter accepts absolute paths and travers...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28393/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:16:25.273000
2 posts
🔴 CVE-2026-0848 - Critical (10)
NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper input validation in the StanfordSegmenter module. The module dynamically loads external Java .jar files without verification or sandboxing. An attacker can supply ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0848/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-0848 - Critical (10)
NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper input validation in the StanfordSegmenter module. The module dynamically loads external Java .jar files without verification or sandboxing. An attacker can supply ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0848/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T16:16:10.723000
2 posts
🔴 CVE-2026-26288 - Critical (9.4)
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a kno...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26288/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-26288 in Everon api.everon.io (all versions) allows unauthenticated WebSocket access — attackers can impersonate charging stations & control backend data. Restrict access & implement auth now! https://radar.offseq.com/threat/cve-2026-26288-cwe-306-in-everon-apieveronio-4db274ef #OffSeq #Cybersecurity #EVCharging #CVE
##updated 2026-03-06T16:16:10.193000
1 posts
🟠 CVE-2026-24696 - High (7.5)
The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24696/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T16:16:09.913000
1 posts
🟠 CVE-2026-20882 - High (7.5)
The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20882/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T15:41:57
1 posts
1 repos
Critical Authentication Bypass in pac4j-jwt Library Allows Full User Impersonation
A critical authentication bypass vulnerability (CVE-2026-29000) in the pac4j-jwt Java library allows attackers to impersonate any user by forging encrypted but unsigned tokens. The flaw is caused by a logic error in JwtAuthenticator that skips signature verification when a token is wrapped in an RSA-encrypted envelope.
**If your Java applications use pac4j-jwt, this is urgent! Update to the latest patched versions immediately because there is no practical way to hide your app from the internet, and the exploit is trivial - it will be exploited in a matter of days.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-in-pac4j-jwt-library-allows-full-user-impersonation-f-h-1-h-f/gD2P6Ple2L
updated 2026-03-06T15:31:36
2 posts
🔴 CVE-2026-26051 - Critical (9.4)
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a kno...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26051/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-26051 (CRITICAL, CVSS 9.4) in Mobiliti e-mobi.hu: Unauthenticated OCPP WebSocket endpoints allow charging station impersonation + backend manipulation. Enforce strong auth & monitor now. https://radar.offseq.com/threat/cve-2026-26051-cwe-306-in-mobiliti-e-mobihu-70ec4ea6 #OffSeq #CVE202626051 #EVsecurity
##updated 2026-03-06T15:31:36
1 posts
🟠 CVE-2026-2753 - High (7.5)
An Absolute Path Traversal vulnerability exists in Navtor NavBox. The application exposes an HTTP service that fails to properly sanitize user-supplied path input. Unauthenticated remote attackers can exploit this issue by submitting requests cont...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2753/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T15:16:22
1 posts
🚨 CRITICAL: CVE-2026-28794 in @orpc/client (<1.13.6) allows unauthenticated prototype pollution via RPC JSON deserializer. Risks: auth bypass, DoS, RCE. Patch to 1.13.6+ ASAP! https://radar.offseq.com/threat/cve-2026-28794-cwe-1321-improperly-controlled-modi-427da505 #OffSeq #NodeJS #CVE202628794 #infosec
##updated 2026-03-06T15:16:16
3 posts
🟠 CVE-2026-28787 - High (8.2)
OneUptime is a solution for monitoring and managing online services. In version 10.0.11 and prior, the WebAuthn authentication implementation does not store the challenge on the server side. Instead, the challenge is returned to the client and acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28787/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28787 - High (8.2)
OneUptime is a solution for monitoring and managing online services. In version 10.0.11 and prior, the WebAuthn authentication implementation does not store the challenge on the server side. Instead, the challenge is returned to the client and acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28787/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28787 - High (8.2)
OneUptime is a solution for monitoring and managing online services. In version 10.0.11 and prior, the WebAuthn authentication implementation does not store the challenge on the server side. Instead, the challenge is returned to the client and acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28787/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T15:16:11.320000
1 posts
🟠 CVE-2026-2754 - High (7.5)
Navtor NavBox exposes sensitive configuration and operational data due to missing authentication on HTTP API endpoints. An unauthenticated remote attacker with network access to the device can execute HTTP GET requests to TCP port 8080 to retrieve...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2754/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T14:24:08
1 posts
🟠 CVE-2026-29093 - High (8.1)
WWBN AVideo is an open source video platform. Prior to version 24.0, the official docker-compose.yml publishes the memcached service on host port 11211 (0.0.0.0:11211) with no authentication, while the Dockerfile configures PHP to store all user s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29093/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T14:02:02.117000
2 posts
🔴 CVE-2026-25921 - Critical (9.3)
Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwritable LFS object across different repos leads to supply-chain attack, all LFS objects are vulnerable to be maliciously overwritten by malicious attackers. This issue h...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25921/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25921 - Critical (9.3)
Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwritable LFS object across different repos leads to supply-chain attack, all LFS objects are vulnerable to be maliciously overwritten by malicious attackers. This issue h...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25921/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T13:44:17.940000
4 posts
🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0305)
CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2017-7921 (https://secdb.nttzen.cloud/cve/detail/CVE-2017-7921)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/ ; https://nvd.nist.gov/vuln/detail/CVE-2017-7921
⚠️ CVE-2021-22681 (https://secdb.nttzen.cloud/cve/detail/CVE-2021-22681)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: https://support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/~/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers- ; https://www.cisa.gov/news-events/ics-advisories/icsa-21-056-03 ; https://nvd.nist.gov/vuln/detail/CVE-2021-22681
⚠️ CVE-2021-30952 (https://secdb.nttzen.cloud/cve/detail/CVE-2021-30952)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: https://support.apple.com/en-us/HT212975 ; https://support.apple.com/en-us/HT212976 ; https://support.apple.com/en-us/HT212978 ; https://support.apple.com/en-us/HT212980 ; https://support.apple.com/en-us/HT212982 ; https://nvd.nist.gov/vuln/detail/CVE-2021-30952
⚠️ CVE-2023-41974 (https://secdb.nttzen.cloud/cve/detail/CVE-2023-41974)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: https://support.apple.com/en-us/HT213938 ; https://support.apple.com/kb/HT213938 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41974
⚠️ CVE-2023-43000 (https://secdb.nttzen.cloud/cve/detail/CVE-2023-43000)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: https://support.apple.com/en-us/120324 ; https://support.apple.com/en-us/120331 ; https://support.apple.com/en-us/120338 ; https://nvd.nist.gov/vuln/detail/CVE-2023-43000
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260305 #cisa20260305 #cve_2017_7921 #cve_2021_22681 #cve_2021_30952 #cve_2023_41974 #cve_2023_43000 #cve20177921 #cve202122681 #cve202130952 #cve202341974 #cve202343000
##CVE ID: CVE-2021-30952
Vendor: Apple
Product: Multiple Products
Date Added: 2026-03-05
Notes: https://support.apple.com/en-us/HT212975 ; https://support.apple.com/en-us/HT212976 ; https://support.apple.com/en-us/HT212978 ; https://support.apple.com/en-us/HT212980 ; https://support.apple.com/en-us/HT212982 ; https://nvd.nist.gov/vuln/detail/CVE-2021-30952
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2021-30952
CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM ESTCISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
- CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
- CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability
THREE Apple CVE's added to CISA KEV.
Patch your shit, people.
##CISA has updated the KEV catalogue. Apple posted its security advisories yesterday: https://support.apple.com/en-us/100100
- CVE-2023-41974L Apple iOS and iPadOS Use-After-Free Vulnerability https://www.cve.org/CVERecord?id=CVE-2023-41974
- CVE-2021-30952L Apple Multiple Products Integer Overflow or Wraparound Vulnerability https://www.cve.org/CVERecord?id=CVE-2021-30952
- CVE-2023-43000: Apple Multiple products Use-After-Free Vulnerability https://www.cve.org/CVERecord?id=CVE-2023-43000
Several industrial advisories: https://www.cisa.gov/ #CISA #vulnerability #infosec #Apple
##updated 2026-03-06T13:44:06.370000
3 posts
🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0305)
CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2017-7921 (https://secdb.nttzen.cloud/cve/detail/CVE-2017-7921)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/ ; https://nvd.nist.gov/vuln/detail/CVE-2017-7921
⚠️ CVE-2021-22681 (https://secdb.nttzen.cloud/cve/detail/CVE-2021-22681)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: https://support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/~/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers- ; https://www.cisa.gov/news-events/ics-advisories/icsa-21-056-03 ; https://nvd.nist.gov/vuln/detail/CVE-2021-22681
⚠️ CVE-2021-30952 (https://secdb.nttzen.cloud/cve/detail/CVE-2021-30952)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: https://support.apple.com/en-us/HT212975 ; https://support.apple.com/en-us/HT212976 ; https://support.apple.com/en-us/HT212978 ; https://support.apple.com/en-us/HT212980 ; https://support.apple.com/en-us/HT212982 ; https://nvd.nist.gov/vuln/detail/CVE-2021-30952
⚠️ CVE-2023-41974 (https://secdb.nttzen.cloud/cve/detail/CVE-2023-41974)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: https://support.apple.com/en-us/HT213938 ; https://support.apple.com/kb/HT213938 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41974
⚠️ CVE-2023-43000 (https://secdb.nttzen.cloud/cve/detail/CVE-2023-43000)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: https://support.apple.com/en-us/120324 ; https://support.apple.com/en-us/120331 ; https://support.apple.com/en-us/120338 ; https://nvd.nist.gov/vuln/detail/CVE-2023-43000
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260305 #cisa20260305 #cve_2017_7921 #cve_2021_22681 #cve_2021_30952 #cve_2023_41974 #cve_2023_43000 #cve20177921 #cve202122681 #cve202130952 #cve202341974 #cve202343000
##CVE ID: CVE-2021-22681
Vendor: Rockwell
Product: Multiple Products
Date Added: 2026-03-05
Notes: https://support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/~/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers- ; https://www.cisa.gov/news-events/ics-advisories/icsa-21-056-03 ; https://nvd.nist.gov/vuln/detail/CVE-2021-22681
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2021-22681
CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM ESTCISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
- CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
- CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability
THREE Apple CVE's added to CISA KEV.
Patch your shit, people.
##updated 2026-03-06T13:16:00.447000
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-06T13:15:57.430000
1 posts
🟠 New security advisory:
CVE-2018-25166 affects multiple systems.
• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2018-25166
updated 2026-03-06T12:31:37
2 posts
1 repos
🟠 CVE-2026-26416 - High (8.8)
An authorization bypass vulnerability in Tata Consultancy Services Cognix Recon Client v3.0 allows authenticated users to escalate privileges across role boundaries via crafted requests.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26416/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-26416 - High (8.8)
An authorization bypass vulnerability in Tata Consultancy Services Cognix Recon Client v3.0 allows authenticated users to escalate privileges across role boundaries via crafted requests.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26416/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T12:31:37
2 posts
1 repos
🟠 CVE-2025-70995 - High (8.8)
An issue in Aranda Service Desk Web Edition (ASDK API 8.6) allows authenticated attackers to achieve remote code execution due to improper validation of uploaded files. An authenticated user can upload a crafted web.config file by sending a crafte...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70995 - High (8.8)
An issue in Aranda Service Desk Web Edition (ASDK API 8.6) allows authenticated attackers to achieve remote code execution due to improper validation of uploaded files. An authenticated user can upload a crafted web.config file by sending a crafte...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T12:31:36
2 posts
🔴 CVE-2025-13476 - Critical (9.8)
Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13476/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-13476 - Critical (9.8)
Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13476/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T12:31:36
2 posts
🔴 CVE-2025-70229 - Critical (9.8)
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSchedule.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70229/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70229 - Critical (9.8)
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSchedule.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70229/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T12:31:36
2 posts
1 repos
🟠 CVE-2026-26418 - High (7.5)
Missing authentication and authorization in the web API of Tata Consultancy Services Cognix Recon Client v3.0 allows remote attackers to access application functionality without restriction via the network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26418/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-26418 - High (7.5)
Missing authentication and authorization in the web API of Tata Consultancy Services Cognix Recon Client v3.0 allows remote attackers to access application functionality without restriction via the network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26418/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T12:30:31
2 posts
🔴 CVE-2025-70233 - Critical (9.8)
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetEnableWizard.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70233/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70233 - Critical (9.8)
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetEnableWizard.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70233/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T11:16:08.263000
2 posts
🟠 CVE-2025-70949 - High (7.5)
An observable timing discrepancy in @perfood/couch-auth v0.26.0 allows attackers to access sensitive information via a timing side-channel.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70949/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70949 - High (7.5)
An observable timing discrepancy in @perfood/couch-auth v0.26.0 allows attackers to access sensitive information via a timing side-channel.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70949/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T11:16:08.090000
2 posts
🔴 CVE-2025-70948 - Critical (9.3)
A host header injection vulnerability in the mailer component of @perfood/couch-auth v0.26.0 allows attackers to obtain reset tokens and execute an account takeover via spoofing the HTTP Host header.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70948/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-70948 - Critical (9.3)
A host header injection vulnerability in the mailer component of @perfood/couch-auth v0.26.0 allows attackers to obtain reset tokens and execute an account takeover via spoofing the HTTP Host header.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70948/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T10:16:22.163000
2 posts
1 repos
🟠 CVE-2026-26417 - High (8.1)
A broken access control vulnerability in the password reset functionality of Tata Consultancy Services Cognix Recon Client v3.0 allows authenticated users to reset passwords of arbitrary user accounts via crafted requests.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26417/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-26417 - High (8.1)
A broken access control vulnerability in the password reset functionality of Tata Consultancy Services Cognix Recon Client v3.0 allows authenticated users to reset passwords of arbitrary user accounts via crafted requests.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26417/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T10:16:21.803000
2 posts
🟠 CVE-2025-70616 - High (7.8)
A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys kernel driver (version 1.2.0.0) in the IOCTL handler for code 0x80102058. The vulnerability is caused by missing bounds checking on the user-controlled Options paramet...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70616/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70616 - High (7.8)
A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys kernel driver (version 1.2.0.0) in the IOCTL handler for code 0x80102058. The vulnerability is caused by missing bounds checking on the user-controlled Options paramet...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70616/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T10:16:21.627000
2 posts
🟠 CVE-2025-70614 - High (8.1)
OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2 contains a broken access control vulnerability in the web-based control panel allowing authenticated low-privileged attackers to gain to access to arbitrary SMS messages via a crafted ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70614/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-70614 - High (8.1)
OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2 contains a broken access control vulnerability in the web-based control panel allowing authenticated low-privileged attackers to gain to access to arbitrary SMS messages via a crafted ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70614/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T10:16:20.040000
2 posts
🔴 CVE-2025-29165 - Critical (9.8)
An issue in D-Link DIR-1253 MESH V1.6.1684 allows an attacker to escalate privileges via the etc/shadow.sample component
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-29165/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-29165 - Critical (9.8)
An issue in D-Link DIR-1253 MESH V1.6.1684 allows an attacker to escalate privileges via the etc/shadow.sample component
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-29165/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T09:31:41
5 posts
🔴 CRITICAL: CVE-2026-2331 in SICK Lector85x v2.6.0 allows unauthenticated HTTP access to sensitive files & Lua code execution. No patch yet — segment networks & restrict HTTP access. Monitor for abuse! https://radar.offseq.com/threat/cve-2026-2331-cwe-552-files-or-directories-accessi-5e67b9ed #OffSeq #ICS #Vuln #OTSecurity
##🔴 CVE-2026-2331 - Critical (9.8)
An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTT...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2331/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2331 - Critical (9.8)
An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTT...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2331/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2331 - Critical (9.8)
An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTT...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2331/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-2331 - Critical (9.8)
An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTT...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2331/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T08:16:27.253000
2 posts
🚨 CRITICAL: CVE-2026-2330 in SICK Lector85x lets remote, unauthenticated attackers modify device configs via the CROWN REST interface. Patch or restrict access now to prevent OT compromise. https://radar.offseq.com/threat/cve-2026-2330-cwe-552-files-or-directories-accessi-493bd9c6 #OffSeq #ICS #Vulnerability #Infosec
##🔴 CVE-2026-2330 - Critical (9.4)
An attacker may access restricted filesystem areas on the device via the CROWN REST interface due to incomplete whitelist enforcement. Certain directories intended for internal testing were not covered by the whitelist and are accessible without a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2330/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T08:16:27.090000
3 posts
🚨 New security advisory:
CVE-2026-29183 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://yazoul.net/advisory/cve/cve-2026-29183
🚨 New security advisory:
CVE-2026-29183 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://yazoul.net/advisory/cve/cve-2026-29183
🔴 CVE-2026-29183 - Critical (9.3)
SiYuan is a personal knowledge management system. Prior to version 3.5.9, an unauthenticated reflected XSS vulnerability exists in the dynamic icon API endpoint "GET /api/icon/getDynamicIcon" when type=8, attacker-controlled content is embedded in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29183/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T08:16:26.920000
1 posts
🟠 CVE-2026-29074 - High (7.5)
SVGO, short for SVG Optimizer, is a Node.js library and command-line application for optimizing SVG files. From version 2.1.0 to before version 2.8.1, from version 3.0.0 to before version 3.3.3, and before version 4.0.1, SVGO accepts XML with cust...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29074/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T05:16:37.710000
2 posts
🟠 CVE-2026-28681 - High (8.1)
Internet Routing Registry daemon version 4 is an IRR database server, processing IRR objects in the RPSL format. From version 4.4.0 to before version 4.4.5 and from version 4.5.0 to before version 4.5.1, an attacker can manipulate the HTTP Host he...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28681/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28681 - High (8.1)
Internet Routing Registry daemon version 4 is an IRR database server, processing IRR objects in the RPSL format. From version 4.4.0 to before version 4.4.5 and from version 4.5.0 to before version 4.5.1, an attacker can manipulate the HTTP Host he...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28681/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T05:16:36.977000
2 posts
🟠 CVE-2026-28679 - High (8.6)
Home-Gallery.org is a self-hosted open-source web gallery to browse personal photos and videos. Prior to version 1.21.0, when a user requests a download, the application does not verify whether the requested file is located within the media source...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28679/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28679 - High (8.6)
Home-Gallery.org is a self-hosted open-source web gallery to browse personal photos and videos. Prior to version 1.21.0, when a user requests a download, the application does not verify whether the requested file is located within the media source...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28679/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T05:16:36.610000
1 posts
🟠 CVE-2026-28677 - High (8.2)
OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, the URL ingest pipeline accepted user-controlled remote URLs with incomplete destination restrictions. Although p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28677/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T05:16:29.903000
2 posts
🟠 CVE-2026-25888 - High (8.8)
Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.1, there is a remote code execution vulnerability via a vulnerable API. This issue has been patched...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25888/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25888 - High (8.8)
Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.1, there is a remote code execution vulnerability via a vulnerable API. This issue has been patched...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25888/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T04:16:08.177000
3 posts
🔴 CVE-2026-28501 - Critical (9.8)
WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthenticated SQL Injection vulnerability exists in AVideo within the objects/videos.json.php and objects/video.php components. The application fails to properly sanitize th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28501/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-28501 - Critical (9.8)
WWBN AVideo is an open source video platform. Prior to version 24.0, an unauthenticated SQL Injection vulnerability exists in AVideo within the objects/videos.json.php and objects/video.php components. The application fails to properly sanitize th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28501/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🛑 CVE-2026-28501: CRITICAL SQL Injection in WWBN AVideo < 24.0! Unauthenticated attackers can run arbitrary SQL via JSON POST (catName param). Upgrade to v24.0+ ASAP! Details: https://radar.offseq.com/threat/cve-2026-28501-cwe-89-improper-neutralization-of-s-36e0dbd6 #OffSeq #Infosec #SQLInjection #AVideo
##updated 2026-03-06T04:16:02.293000
3 posts
🔴 CVE-2025-59543 - Critical (9)
Chamilo is a learning management system. Prior to version 1.11.34, there is a stored cross-site scripting (XSS) vulnerability. By injecting malicious JavaScript into the course description field, an attacker with a low-privileged account (e.g., tr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59543/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-59543 - Critical (9)
Chamilo is a learning management system. Prior to version 1.11.34, there is a stored cross-site scripting (XSS) vulnerability. By injecting malicious JavaScript into the course description field, an attacker with a low-privileged account (e.g., tr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59543/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-59543 - Critical (9)
Chamilo is a learning management system. Prior to version 1.11.34, there is a stored cross-site scripting (XSS) vulnerability. By injecting malicious JavaScript into the course description field, an attacker with a low-privileged account (e.g., tr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59543/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T04:16:01.977000
3 posts
🟠 CVE-2025-59541 - High (8.1)
Chamilo is a learning management system. Prior to version 1.11.34, a Cross-Site Request Forgery (CSRF) vulnerability allows an attacker to delete projects inside a course without the victim’s consent. The issue arises because sensitive actions s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59541/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-59541 - High (8.1)
Chamilo is a learning management system. Prior to version 1.11.34, a Cross-Site Request Forgery (CSRF) vulnerability allows an attacker to delete projects inside a course without the victim’s consent. The issue arises because sensitive actions s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59541/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-59541 - High (8.1)
Chamilo is a learning management system. Prior to version 1.11.34, a Cross-Site Request Forgery (CSRF) vulnerability allows an attacker to delete projects inside a course without the victim’s consent. The issue arises because sensitive actions s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59541/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:05:55
1 posts
🟠 CVE-2026-28466 - High (8.8)
OpenClaw versions prior to 2026.2.14 contain a vulnerability in the gateway in which it fails to sanitize internal approval fields in node.invoke parameters, allowing authenticated clients to bypass exec approval gating for system.run commands. At...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28466/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:05:00
1 posts
🟠 CVE-2026-28479 - High (7.5)
OpenClaw versions prior to 2026.2.15 use SHA-1 to hash sandbox identifier cache keys for Docker and browser sandbox configurations, which is deprecated and vulnerable to collision attacks. An attacker can exploit SHA-1 collisions to cause cache po...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28479/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:04:45
1 posts
🟠 CVE-2026-28462 - High (7.5)
OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser control API in which it accepts user-supplied output paths for trace and download files without consistently constraining writes to temporary directories. Attackers with A...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28462/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:03:20
1 posts
🔴 CVE-2026-28469 - Critical (9.8)
OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit fir...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28469/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:02:34
1 posts
🔴 CVE-2026-28470 - Critical (9.8)
OpenClaw versions prior to 2026.2.2 contain an exec approvals (must be enabled) allowlist bypass vulnerability that allows attackers to execute arbitrary commands by injecting command substitution syntax. Attackers can bypass the allowlist protect...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28470/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:01:24
1 posts
🟠 CVE-2026-28465 - High (7.5)
OpenClaw's voice-call plugin versions before 2026.2.3 contain an improper authentication vulnerability in webhook verification that allows remote attackers to bypass verification by supplying untrusted forwarded headers. Attackers can spoof webhoo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:00:35
1 posts
🟠 CVE-2026-29613 - High (7.5)
OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles (optional plugin) webhook handler in which it authenticates requests based solely on loopback remoteAddress without validating forwarding headers, allowing bypass of c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29613/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T00:59:49
1 posts
🟠 CVE-2026-28456 - High (8.4)
OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gatewa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28456/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T00:59:39
1 posts
🟠 CVE-2026-28453 - High (7.5)
OpenClaw versions prior to 2026.2.14 fail to validate TAR archive entry paths during extraction, allowing path traversal sequences to write files outside the intended directory. Attackers can craft malicious archives with traversal sequences like ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28453/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T00:58:49
2 posts
🔴 CVE-2026-28454 - Critical (9.8)
OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets in Telegram webhook mode (must be enabled), allowing unauthenticated HTTP POST requests to the webhook endpoint that trust attacker-controlled JSON payloads. Remote attackers can...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28454/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-28454 - Critical (9.8)
OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets in Telegram webhook mode (must be enabled), allowing unauthenticated HTTP POST requests to the webhook endpoint that trust attacker-controlled JSON payloads. Remote attackers can...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28454/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T00:31:42
2 posts
🟠 CVE-2026-28727 - High (7.8)
Local privilege escalation due to insecure Unix socket permissions. The following products are affected: Acronis Cyber Protect 17 (macOS) before build 41186, Acronis Cyber Protect Cloud Agent (macOS) before build 41124.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28727/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28727 - High (7.8)
Local privilege escalation due to insecure Unix socket permissions. The following products are affected: Acronis Cyber Protect 17 (macOS) before build 41186, Acronis Cyber Protect Cloud Agent (macOS) before build 41124.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28727/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T00:31:41
2 posts
🔴 CVE-2026-21536 - Critical (9.8)
Microsoft Devices Pricing Program Remote Code Execution Vulnerability
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21536/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-21536 (CRITICAL, CVSS 9.8): RCE in Microsoft Devices Pricing Program via unrestricted file upload (CWE-434). No patch — restrict uploads, monitor endpoints. High risk for enterprise. https://radar.offseq.com/threat/cve-2026-21536-cwe-434-unrestricted-upload-of-file-3dbf1775 #OffSeq #Microsoft #Vuln #RCE
##updated 2026-03-06T00:31:41
2 posts
🔴 CVE-2026-22552 - Critical (9.4)
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a kno...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22552/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL vuln in ePower epower.ie (all versions): Unauthenticated OCPP WebSocket endpoints allow station impersonation & backend manipulation. Privilege escalation risk is HIGH — patch or mitigate now! CVE-2026-22552 https://radar.offseq.com/threat/cve-2026-22552-cwe-306-in-epower-epowerie-1e2e527e #OffSeq #Vulnerability #EVCharging
##updated 2026-03-06T00:31:41
1 posts
🟠 CVE-2026-28710 - High (8.1)
Sensitive information disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 17 (Linux, Windows) before build 41186.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28710/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T00:16:10.960000
1 posts
🟠 CVE-2026-27778 - High (7.5)
The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27778/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T23:16:20.160000
1 posts
🟠 CVE-2026-26125 - High (8.6)
Payment Orchestrator Service Elevation of Privilege Vulnerability
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26125/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T22:50:22
1 posts
🔴 CVE-2026-29188 - Critical (9.1)
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.61.1, a broken access control vulnerability in the TUS protocol DELETE endpoint a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29188/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T22:49:38
2 posts
🟠 CVE-2026-28790 - High (7.5)
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.0, OliveTin allows an unauthenticated guest to terminate running actions through KillAction even when authRequireGuestsToLogin: true is enabled. Gues...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28790/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28790 - High (7.5)
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.0, OliveTin allows an unauthenticated guest to terminate running actions through KillAction even when authRequireGuestsToLogin: true is enabled. Gues...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28790/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T22:37:22
1 posts
Critical Security Alert: CVE-2026-27944 Exposes Nginx UI Backups and Encryption Keys
Introduction: A Severe Flaw in a Widely Used Web Server Management Tool A newly disclosed security vulnerability has raised serious concerns across the cybersecurity community. The flaw, identified as CVE-2026-27944, affects Nginx UI, a popular web-based dashboard used to manage and configure Nginx servers. With a CVSS severity score of 9.8, the issue is classified as critical and…
##updated 2026-03-05T22:29:01
1 posts
🟠 CVE-2026-26999 - High (7.5)
Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a potential vulnerability in Traefik managing TLS handshake on TCP routers. When Traefik processes a TLS connection on a TCP router, the read deadlin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26999/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T22:16:22.210000
1 posts
🟠 CVE-2026-28478 - High (7.5)
OpenClaw versions prior to 2026.2.13 contain a denial of service vulnerability in webhook handlers that buffer request bodies without strict byte or time limits. Remote unauthenticated attackers can send oversized JSON payloads or slow uploads to ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28478/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T22:16:19.127000
1 posts
🟠 CVE-2026-28463 - High (8.4)
OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28463/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T22:16:15.213000
1 posts
1 repos
📢 FreeScout: Zero‑click RCE non authentifié (CVE‑2026‑28289) corrigé en v1.8.207
📝 Source: OX Security (OX Research).
📖 cyberveille : https://cyberveille.ch/posts/2026-03-08-freescout-zero-click-rce-non-authentifie-cve-2026-28289-corrige-en-v1-8-207/
🌐 source : https://www.ox.security/blog/freescout-rce-cve-2026-28289/
#CVE_2026_28289 #FreeScout #Cyberveille
updated 2026-03-05T21:59:52
1 posts
🟠 CVE-2026-29609 - High (7.5)
OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the fetchWithGuard function that allocates entire response payloads in memory before enforcing maxBytes limits. Remote attackers can trigger memory exhaustion by ser...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29609/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:52:02
2 posts
🔴 CVE-2026-28474 - Critical (9.8)
OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matching on the mutable actor.name display name field for allowlist validation, allowing attackers to bypass DM and room allowlists. An attacker can change their Nextcloud...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28474/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: CVE-2026-28474 in OpenClaw nextcloud-talk (pre-2026.2.6) lets attackers bypass allowlists by matching display names. No auth needed — patch now! Details: https://radar.offseq.com/threat/cve-2026-28474-incorrect-authorization-in-openclaw-da9baab9 #OffSeq #Vulnerability #Nextcloud #Security
##updated 2026-03-05T21:51:23
1 posts
🔴 CVE-2026-28472 - Critical (9.8)
OpenClaw versions prior to 2026.2.2 contain a vulnerability in the gateway WebSocket connect handshake in which it allows skipping device identity checks when auth.token is present but not validated. Attackers can connect to the gateway without pr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28472/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:50:00
2 posts
🟠 CVE-2026-28468 - High (7.8)
OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28468/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28468 - High (7.8)
OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28468/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:48:12
1 posts
🟠 CVE-2026-30244 - High (7.5)
Plane is an an open-source project management tool. Prior to version 1.2.2, unauthenticated attackers can enumerate workspace members and extract sensitive information including email addresses, user roles, and internal identifiers. The vulnerabil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30244/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:44:47
2 posts
🟠 CVE-2026-28451 - High (8.3)
OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnerabilities in the Feishu extension that allow attackers to fetch attacker-controlled remote URLs without SSRF protections via sendMediaFeishu function and markdown image...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28451/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28451 - High (8.3)
OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnerabilities in the Feishu extension that allow attackers to fetch attacker-controlled remote URLs without SSRF protections via sendMediaFeishu function and markdown image...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28451/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:43:16
1 posts
🟠 CVE-2026-30242 - High (8.5)
Plane is an an open-source project management tool. Prior to version 1.2.3, the webhook URL validation in plane/app/serializers/webhook.py only checks ip.is_loopback, allowing attackers with workspace ADMIN role to create webhooks pointing to priv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30242/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:43:07
1 posts
🔴 CVE-2026-28446 - Critical (9.8)
OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28446/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:41:06
2 posts
🚨 New security advisory:
CVE-2026-28392 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://yazoul.net/advisory/cve/cve-2026-28392
🔴 CVE-2026-28392 - Critical (9.8)
OpenClaw versions prior to 2026.2.14 contain a privilege escalation vulnerability in the Slack slash-command handler that incorrectly authorizes any direct message sender when dmPolicy is set to open (must be configured). Attackers can execute pri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28392/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:40:43
1 posts
🔴 CVE-2026-28391 - Critical (9.8)
OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests, allowing attackers to bypass command approval restrictions. Remote attackers can craft command strings with shell metach...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28391/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:31:51
1 posts
🔴 CVE-2026-28115 - Critical (9.3)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in loopus WP Attractive Donations System - Easy Stripe & Paypal donations WP_AttractiveDonationsSystem allows Blind SQL Injection.This issue affects...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28115/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:31:32
3 posts
25 repos
https://github.com/D2550/CVE_2017_7921_EXP
https://github.com/JrDw0/CVE-2017-7921-EXP
https://github.com/MartinxMax/BloodCat
https://github.com/aengussong/hikvision_probe
https://github.com/K3ysTr0K3R/CVE-2017-7921-EXPLOIT
https://github.com/KelvinWin10/CVE-2017-7921-rewrite
https://github.com/saaydmr/hikvision-exploiter
https://github.com/MisakaMikato/cve-2017-7921-golang
https://github.com/GabrielAvls/CVE-2017-7921
https://github.com/inj3ction/CVE-2017-7921-EXP
https://github.com/BurnyMcDull/CVE-2017-7921
https://github.com/201646613/CVE-2017-7921
https://github.com/AnonkiGroup/AnonHik
https://github.com/voidsshadows/Hikvision-City-Hunter
https://github.com/p4tq/hikvision_CVE-2017-7921_auth_bypass_config_decryptor
https://github.com/krypton612/hikivision
https://github.com/lastvocher/Hikvision-CVE-2017-7921-decryptor
https://github.com/Wyl-cmd/CVE-2017-7921-Research-Toolkit
https://github.com/jorhelp/Ingram
https://github.com/kooroshsanaei/HikVision-CVE-2017-7921
https://github.com/mverschu/CVE-2017-7921
https://github.com/chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor
https://github.com/0xf3d0rq/CVE-2017-7921
https://github.com/b3pwn3d/CVE-2017-7921
https://github.com/yousouf-Tasfin/cve-2017-7921-Mass-Exploit
🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0305)
CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2017-7921 (https://secdb.nttzen.cloud/cve/detail/CVE-2017-7921)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/ ; https://nvd.nist.gov/vuln/detail/CVE-2017-7921
⚠️ CVE-2021-22681 (https://secdb.nttzen.cloud/cve/detail/CVE-2021-22681)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: https://support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/~/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers- ; https://www.cisa.gov/news-events/ics-advisories/icsa-21-056-03 ; https://nvd.nist.gov/vuln/detail/CVE-2021-22681
⚠️ CVE-2021-30952 (https://secdb.nttzen.cloud/cve/detail/CVE-2021-30952)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: https://support.apple.com/en-us/HT212975 ; https://support.apple.com/en-us/HT212976 ; https://support.apple.com/en-us/HT212978 ; https://support.apple.com/en-us/HT212980 ; https://support.apple.com/en-us/HT212982 ; https://nvd.nist.gov/vuln/detail/CVE-2021-30952
⚠️ CVE-2023-41974 (https://secdb.nttzen.cloud/cve/detail/CVE-2023-41974)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: https://support.apple.com/en-us/HT213938 ; https://support.apple.com/kb/HT213938 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41974
⚠️ CVE-2023-43000 (https://secdb.nttzen.cloud/cve/detail/CVE-2023-43000)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: https://support.apple.com/en-us/120324 ; https://support.apple.com/en-us/120331 ; https://support.apple.com/en-us/120338 ; https://nvd.nist.gov/vuln/detail/CVE-2023-43000
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260305 #cisa20260305 #cve_2017_7921 #cve_2021_22681 #cve_2021_30952 #cve_2023_41974 #cve_2023_43000 #cve20177921 #cve202122681 #cve202130952 #cve202341974 #cve202343000
##CVE ID: CVE-2017-7921
Vendor: Hikvision
Product: Multiple Products
Date Added: 2026-03-05
Notes: https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/ ; https://nvd.nist.gov/vuln/detail/CVE-2017-7921
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2017-7921
CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM ESTCISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
- CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
- CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability
THREE Apple CVE's added to CISA KEV.
Patch your shit, people.
##updated 2026-03-05T21:30:57
3 posts
🔴 CVE-2026-24457 - Critical (9.1)
An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read arbitrary files from a MQ Broker's server. A full exploitation could read unauthorized files of the OpenMQ’s host OS. In some scenarios RCE could be achieved.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24457/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24457 - Critical (9.1)
An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read arbitrary files from a MQ Broker's server. A full exploitation could read unauthorized files of the OpenMQ’s host OS. In some scenarios RCE could be achieved.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24457/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-24457 - Critical (9.1)
An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read arbitrary files from a MQ Broker's server. A full exploitation could read unauthorized files of the OpenMQ’s host OS. In some scenarios RCE could be achieved.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24457/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:30:24
4 posts
🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0305)
CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2017-7921 (https://secdb.nttzen.cloud/cve/detail/CVE-2017-7921)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/ ; https://nvd.nist.gov/vuln/detail/CVE-2017-7921
⚠️ CVE-2021-22681 (https://secdb.nttzen.cloud/cve/detail/CVE-2021-22681)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: https://support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/~/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers- ; https://www.cisa.gov/news-events/ics-advisories/icsa-21-056-03 ; https://nvd.nist.gov/vuln/detail/CVE-2021-22681
⚠️ CVE-2021-30952 (https://secdb.nttzen.cloud/cve/detail/CVE-2021-30952)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: https://support.apple.com/en-us/HT212975 ; https://support.apple.com/en-us/HT212976 ; https://support.apple.com/en-us/HT212978 ; https://support.apple.com/en-us/HT212980 ; https://support.apple.com/en-us/HT212982 ; https://nvd.nist.gov/vuln/detail/CVE-2021-30952
⚠️ CVE-2023-41974 (https://secdb.nttzen.cloud/cve/detail/CVE-2023-41974)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: https://support.apple.com/en-us/HT213938 ; https://support.apple.com/kb/HT213938 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41974
⚠️ CVE-2023-43000 (https://secdb.nttzen.cloud/cve/detail/CVE-2023-43000)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: https://support.apple.com/en-us/120324 ; https://support.apple.com/en-us/120331 ; https://support.apple.com/en-us/120338 ; https://nvd.nist.gov/vuln/detail/CVE-2023-43000
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260305 #cisa20260305 #cve_2017_7921 #cve_2021_22681 #cve_2021_30952 #cve_2023_41974 #cve_2023_43000 #cve20177921 #cve202122681 #cve202130952 #cve202341974 #cve202343000
##CVE ID: CVE-2023-43000
Vendor: Apple
Product: Multiple Products
Date Added: 2026-03-05
Notes: https://support.apple.com/en-us/120324 ; https://support.apple.com/en-us/120331 ; https://support.apple.com/en-us/120338 ; https://nvd.nist.gov/vuln/detail/CVE-2023-43000
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2023-43000
CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM ESTCISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
- CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
- CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability
THREE Apple CVE's added to CISA KEV.
Patch your shit, people.
##CISA has updated the KEV catalogue. Apple posted its security advisories yesterday: https://support.apple.com/en-us/100100
- CVE-2023-41974L Apple iOS and iPadOS Use-After-Free Vulnerability https://www.cve.org/CVERecord?id=CVE-2023-41974
- CVE-2021-30952L Apple Multiple Products Integer Overflow or Wraparound Vulnerability https://www.cve.org/CVERecord?id=CVE-2021-30952
- CVE-2023-43000: Apple Multiple products Use-After-Free Vulnerability https://www.cve.org/CVERecord?id=CVE-2023-43000
Several industrial advisories: https://www.cisa.gov/ #CISA #vulnerability #infosec #Apple
##updated 2026-03-05T21:30:23
4 posts
🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0305)
CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2017-7921 (https://secdb.nttzen.cloud/cve/detail/CVE-2017-7921)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/ ; https://nvd.nist.gov/vuln/detail/CVE-2017-7921
⚠️ CVE-2021-22681 (https://secdb.nttzen.cloud/cve/detail/CVE-2021-22681)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: https://support.rockwellautomation.com/app/answers/answer_view/a_id/1130301/~/cve-2021-22681%3A-authentication-bypass-vulnerability-found-in-logix-controllers- ; https://www.cisa.gov/news-events/ics-advisories/icsa-21-056-03 ; https://nvd.nist.gov/vuln/detail/CVE-2021-22681
⚠️ CVE-2021-30952 (https://secdb.nttzen.cloud/cve/detail/CVE-2021-30952)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: https://support.apple.com/en-us/HT212975 ; https://support.apple.com/en-us/HT212976 ; https://support.apple.com/en-us/HT212978 ; https://support.apple.com/en-us/HT212980 ; https://support.apple.com/en-us/HT212982 ; https://nvd.nist.gov/vuln/detail/CVE-2021-30952
⚠️ CVE-2023-41974 (https://secdb.nttzen.cloud/cve/detail/CVE-2023-41974)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: https://support.apple.com/en-us/HT213938 ; https://support.apple.com/kb/HT213938 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41974
⚠️ CVE-2023-43000 (https://secdb.nttzen.cloud/cve/detail/CVE-2023-43000)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: https://support.apple.com/en-us/120324 ; https://support.apple.com/en-us/120331 ; https://support.apple.com/en-us/120338 ; https://nvd.nist.gov/vuln/detail/CVE-2023-43000
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260305 #cisa20260305 #cve_2017_7921 #cve_2021_22681 #cve_2021_30952 #cve_2023_41974 #cve_2023_43000 #cve20177921 #cve202122681 #cve202130952 #cve202341974 #cve202343000
##CVE ID: CVE-2023-41974
Vendor: Apple
Product: iOS and iPadOS
Date Added: 2026-03-05
Notes: https://support.apple.com/en-us/HT213938 ; https://support.apple.com/kb/HT213938 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41974
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2023-41974
CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM ESTCISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.
- CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
- CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
- CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability
THREE Apple CVE's added to CISA KEV.
Patch your shit, people.
##CISA has updated the KEV catalogue. Apple posted its security advisories yesterday: https://support.apple.com/en-us/100100
- CVE-2023-41974L Apple iOS and iPadOS Use-After-Free Vulnerability https://www.cve.org/CVERecord?id=CVE-2023-41974
- CVE-2021-30952L Apple Multiple Products Integer Overflow or Wraparound Vulnerability https://www.cve.org/CVERecord?id=CVE-2021-30952
- CVE-2023-43000: Apple Multiple products Use-After-Free Vulnerability https://www.cve.org/CVERecord?id=CVE-2023-43000
Several industrial advisories: https://www.cisa.gov/ #CISA #vulnerability #infosec #Apple
##updated 2026-03-05T18:13:33.993000
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-05T00:12:09
2 posts
🟠 CVE-2026-29186 - High (7.7)
Backstage is an open framework for building developer portals. Prior to version 1.14.3, this is a configuration bypass vulnerability that enables arbitrary code execution. The @backstage/plugin-techdocs-node package uses an allowlist to filter dan...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29186/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29186 - High (7.7)
Backstage is an open framework for building developer portals. Prior to version 1.14.3, this is a configuration bypass vulnerability that enables arbitrary code execution. The @backstage/plugin-techdocs-node package uses an allowlist to filter dan...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29186/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-04T22:53:44
2 posts
🟠 CVE-2026-29192 - High (7.7)
ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via Default URI Redirect. This issue has been patched in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29192/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29192 - High (7.7)
ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via Default URI Redirect. This issue has been patched in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29192/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-04T22:47:09
2 posts
🔴 CVE-2026-29191 - Critical (9.3)
ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via XSS in /saml-post Endpoint. This issue has been patch...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29191/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-29191 - Critical (9.3)
ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via XSS in /saml-post Endpoint. This issue has been patch...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29191/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-03T21:52:29.877000
2 posts
1 repos
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-03T19:44:19.120000
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-03T19:11:21.227000
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-03T15:55:11.547000
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-03T15:31:37
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-03T06:31:14
2 posts
1 repos
WordPress – CVE-2026-1492 : une faille dans un plugin permet de devenir admin très facilement https://www.it-connect.fr/wordpress-cve-2026-1492-une-faille-dans-un-plugin-permet-de-devenir-admin-tres-facilement/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Wordpress
##⚠️ WordPress membership plugin bug exploited to create admin accounts
「 The security vulnerability is tracked as CVE-2026-1492 and received a critical severity rating of 9.8. Because the plugin accepts a user-supplied role during membership registration, hackers can create administrator accounts without authentication 」
##updated 2026-03-02T20:29:29.330000
1 posts
Critical Authentication Bypass Discovered in HPE AutoPass License Server (CVE-2026-23600)
Introduction Enterprise infrastructure often depends on licensing servers to manage software authorization across networks. These systems rarely attract the same attention as application servers or databases, yet they hold powerful administrative capabilities. When vulnerabilities appear in such infrastructure, attackers can potentially gain a foothold that affects entire…
##updated 2026-02-26T16:20:02.187000
1 posts
6 repos
https://github.com/zerozenxlabs/CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE
https://github.com/leemuun/CVE-2026-20127
https://github.com/BugFor-Pings/CVE-2026-20127_EXP
https://github.com/yonathanpy/CVE-2026-20127-Cisco-SD-WAN-Preauth-RCE
Cisco Catalyst SD-WAN CVSS 10.0 zero-day (CVE-2026-20127) has been actively exploited, with attackers gaining admin access.
Full technical breakdown: https://forum.hashpwn.net/post/10802
#cisco #sdwan #cvss10 #cve202620127 #exploit #cybersecurity #infosec #news #hashpwn
##updated 2026-02-23T13:24:55.920000
2 posts
8 repos
https://github.com/fartlover37/CVE-2026-2441-PoC
https://github.com/NetVanguard-cmd/CVE-2026-2441
https://github.com/theemperorspath/CVE-2026-2441-PoC
https://github.com/D3b0j33t/CVE-2026-2441-PoC
https://github.com/b1gchoi/CVE-2026-2441_POC
https://github.com/atiilla/CVE-2026-2441_PoC
– Upcoming eye-level camera glasses for AI-powered visual understanding via Galaxy phones.
- **Neo-Luddite attacks on data centers** – U.S. activists destroying AI/data center equipment, causing billion-dollar damages.
- **Accenture AI adoption mandate** – Employees penalized for not using AI tools, raising ethical concerns.
- **CSS zero-day vulnerability (CVE-2026-2441)** – Chrome exploit via manipulated CSS files.
- **Baikonur Launch Pad restoration** – Progress MS-33 ISS [2/14]
They Hacked the CSS: Inside Chrome’s First Zero-Day of 2026 (CVE-2026–2441) https://infosecwriteups.com/they-hacked-the-css-inside-chromes-first-zero-day-of-2026-cve-2026-2441-d6087cedae2d
##updated 2026-02-11T15:31:25
1 posts
12 repos
https://github.com/BTtea/CVE-2026-20841-PoC
https://github.com/tangent65536/CVE-2026-20841
https://github.com/hackfaiz/CVE-2026-20841-PoC
https://github.com/atiilla/CVE-2026-20841
https://github.com/dogukankurnaz/CVE-2026-20841-PoC
https://github.com/EleniChristopoulou/PoC-CVE-2026-20841
https://github.com/uky007/CVE-2026-20841_notepad_analysis
https://github.com/404godd/CVE-2026-20841-PoC
https://github.com/SecureWithUmer/CVE-2026-20841
https://github.com/RajaUzairAbdullah/CVE-2026-20841
But there was a CVE for that.
msrc.microsoft.com/update-guide...
Security Update Guide - Micros...
updated 2026-02-02T23:41:06
7 posts
6 repos
https://github.com/ethiack/moltbot-1click-rce
https://github.com/FrigateCaptain/openclaw_vulnerabilities_and_solutions
https://github.com/Ckokoski/moatbot-security
https://github.com/Joseph19820124/openclaw-vuln-report
🚨 SECURITY ALERT: 42,089 OpenClaw AI instances exposed with critical RCE vulnerability (CVE-2026-25253, CVSS 8.8).
93% lack authentication. 1.5M API tokens compromised. One-click shell access via malicious websites.
Full analysis + protection strategies:
https://dev.to/tiamatenity/your-ai-assistant-is-leaking-everything-42k-exposed-instances-critical-cves-and-how-to-protect-yourself
🚨 Every AI conversation is a data breach.
42,000+ OpenClaw instances exposing credentials. 1.5M API tokens leaked. CVE-2026-25253: one-click RCE.
TIAMAT Privacy Proxy: Scrub PII before it reaches OpenAI/Anthropic/Groq. User IP stays hidden. 20% margin routing.
Privacy is infrastructure now. https://tiamat.live
##🚨 **OpenClaw: The Largest AI Security Incident in Sovereign AI History**
42,000+ exposed instances. 93% with critical auth bypass. 1.5M leaked API tokens.
**CVE-2026-25253:** One-click RCE via WebSocket token hijacking.
Our investigation exposed 341 malicious skills in ClawHub. 36.82% of scanned skills have security flaws.
Full analysis: https://tiamat.live/research
##🔒 OPENCLAW SECURITY DISASTER + PRIVACY PROXY SOLUTION
OpenClaw: 42K exposed instances, CVE-2026-25253 (RCE), 1.5M tokens leaked, 341 malicious skills.
Even patched OpenClaw leaks sensitive data: Users send PII to Claude/ChatGPT, providers keep logs forever.
Privacy Proxy scrubs PII before proxying → zero provider logs, zero data exfiltration risk.
Deploy now: https://tiamat.live
##The OpenClaw AI security crisis:
42,000+ exposed instances, 93% auth bypass
CVE-2026-25253 (CVSS 8.8): one malicious link = shell RCE via WebSocket hijack
1.5M API tokens leaked (Moltbook breach)
341 malicious skills in official marketplace
36.82% flaw rate across all ClawHub skills
New coined terms:
→ One-Click Compromise
→ The Skill Poisoning Problem
→ The Sovereign AI Paradox
Sovereignty ≠ security.
##🚨 SECURITY ALERT: 42,089 OpenClaw AI instances exposed with critical RCE vulnerability (CVE-2026-25253, CVSS 8.8).
93% lack authentication. 1.5M API tokens compromised. One-click shell access via malicious websites.
Full analysis + protection strategies:
https://dev.to/tiamatenity/your-ai-assistant-is-leaking-everything-42k-exposed-instances-critical-cves-and-how-to-protect-yourself
The OpenClaw AI security crisis:
42,000+ exposed instances, 93% auth bypass
CVE-2026-25253 (CVSS 8.8): one malicious link = shell RCE via WebSocket hijack
1.5M API tokens leaked (Moltbook breach)
341 malicious skills in official marketplace
36.82% flaw rate across all ClawHub skills
New coined terms:
→ One-Click Compromise
→ The Skill Poisoning Problem
→ The Sovereign AI Paradox
Sovereignty ≠ security.
##updated 2026-01-07T18:30:21
1 posts
A Race Within A Race: Exploiting CVE-2025-38617 in Linux Packet Sockets https://blog.calif.io/p/a-race-within-a-race-exploiting-cve
##updated 2025-12-24T00:30:27
1 posts
Critical Unauthenticated RCE Vulnerability in IceWarp Leaves 1,200 Servers Exposed
IceWarp patched a critical unauthenticated remote code execution vulnerability (CVE-2025-14500) that allows attackers to run commands with system privileges via a malicious HTTP header. Over 1,200 servers remain exposed, posing a significant risk to corporate communication data and internal network security.
**If you are using IceWarp, this is important. Unauthenticated attackers can take full control of your entire mail server without needing a password. Apply the latest IceWarp security updates to close this vulnerability. If possible, isolate the platform from the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-unauthenticated-rce-vulnerability-in-icewarp-leaves-1200-servers-exposed-0-e-s-v-l/gD2P6Ple2L
updated 2025-12-10T02:00:02.557000
1 posts
100 repos
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/Faithtiannn/CVE-2025-55182
https://github.com/BlackTechX011/React2Shell
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/freeqaz/react2shell
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/emredavut/CVE-2025-55182
https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182
https://github.com/assetnote/react2shell-scanner
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/kondukto-io/vulnerable-next-js-poc
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/Cillian-Collins/CVE-2025-55182
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/zr0n/react2shell
https://github.com/mrknow001/RSC_Detector
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/sho-luv/React2Shell
https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/gensecaihq/react2shell-scanner
https://github.com/hoosin/CVE-2025-55182
https://github.com/ynsmroztas/NextRce
https://github.com/sickwell/CVE-2025-55182
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/xalgord/React2Shell
https://github.com/kavienanj/CVE-2025-55182
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/shyambhanushali/React2Shell
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/jctommasi/react2shellVulnApp
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/shamo0/react2shell-PoC
https://github.com/timsonner/React2Shell-CVE-2025-55182
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/nehkark/CVE-2025-55182
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/theman001/CVE-2025-55182
https://github.com/theori-io/reactguard
https://github.com/Updatelap/CVE-2025-55182
https://github.com/msanft/CVE-2025-55182
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/hualy13/CVE-2025-55182
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/MemerGamer/CVE-2025-55182
https://github.com/alptexans/RSC-Detect-CVE-2025-55182
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/rix4uni/CVE-2025-55182
https://github.com/MuhammadWaseem29/React2Shell_Rce-cve-2025-55182
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/zzhorc/CVE-2025-55182
https://github.com/sumanrox/rschunter
https://github.com/surajhacx/react2shellpoc
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/vulncheck-oss/cve-2025-55182
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/alsaut1/react2shell-lab
https://github.com/momika233/CVE-2025-55182-bypass
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
📢 Sicarii redirige ses affiliés vers le RaaS BQTLock; exploitation de React2Shell (CVE-2025-55182)
📝 Selon le Halcyon Ransomware Research Center, l’ad...
📖 cyberveille : https://cyberveille.ch/posts/2026-03-08-sicarii-redirige-ses-affilies-vers-le-raas-bqtlock-exploitation-de-react2shell-cve-2025-55182/
🌐 source : https://www.halcyon.ai/ransomware-alerts/pro-iranian-ransomware-operators-tactical-shift-from-sicarii-to-bqtlock
#BQTLock #CVE_2025_55182__React2Shell_ #Cyberveille
updated 2025-09-25T18:30:45
1 posts
🚨 EUVD-2026-10208
📊 Score: 5.1/10 (CVSS v3.1)
📦 Product: NU516U1
🏢 Vendor: WAVLINK
📅 Updated: 2026-03-08
📝 A vulnerability has been found in Wavlink NU516U1 251208. This vulnerability affects the function sub_405B2C of the file /cgi-bin/firewall.cgi of the component Incomplete Fix CVE-2025-10959. The manipulation leads to command injection. It is possible to init...
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-10208
##updated 2025-02-13T18:33:03
2 posts
9 repos
https://github.com/vanigori/CVE-2023-38545-sample
https://github.com/imfht/CVE-2023-38545
https://github.com/bcdannyboy/CVE-2023-38545
https://github.com/d0rb/CVE-2023-38545
https://github.com/dbrugman/CVE-2023-38545-POC
https://github.com/UTsweetyfish/CVE-2023-38545
https://github.com/Yang-Shun-Yu/CVE-2023-38545
https://github.com/fatmo666/CVE-2023-38545-libcurl-SOCKS5-heap-buffer-overflow
@spinnyspinlock we've only had two severity HIGH CVEs in #curl within the last five years, both of them were C mistakes: https://curl.se/docs/CVE-2023-38545.html and https://curl.se/docs/CVE-2021-22901.html
##@spinnyspinlock we've only had two severity HIGH CVEs in #curl within the last five years, both of them were C mistakes: https://curl.se/docs/CVE-2023-38545.html and https://curl.se/docs/CVE-2021-22901.html
##updated 2024-12-18T22:03:16
1 posts
🚨 EUVD-2026-10220
📊 Score: 5.1/10 (CVSS v3.1)
📦 Product: Opencart
📅 Updated: 2026-03-08
📝 A vulnerability has been found in OpenCart 4.0.2.3. Affected by this issue is the function Save of the file admin/controller/design/template.php of the component Incomplete Fix CVE-2024-36694. Such manipulation leads to improper neutralization of special elements used in a t...
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-10220
##updated 2024-11-21T05:50:52.580000
4 posts
@bagder CVE-2021-22901 was exactly the kind of interesting vulnerability I wanted to see, thank you! well done on the good security track record too :)
##@spinnyspinlock we've only had two severity HIGH CVEs in #curl within the last five years, both of them were C mistakes: https://curl.se/docs/CVE-2023-38545.html and https://curl.se/docs/CVE-2021-22901.html
##@bagder CVE-2021-22901 was exactly the kind of interesting vulnerability I wanted to see, thank you! well done on the good security track record too :)
##@spinnyspinlock we've only had two severity HIGH CVEs in #curl within the last five years, both of them were C mistakes: https://curl.se/docs/CVE-2023-38545.html and https://curl.se/docs/CVE-2021-22901.html
##🟠 CVE-2026-29779 - High (7.5)
UptimeFlare is a serverless uptime monitoring & status page solution, powered by Cloudflare Workers. Prior to commit 377a596, configuration file uptime.config.ts exports both pageConfig (safe for client use) and workerConfig (server-only, contains...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29779/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29779 - High (7.5)
UptimeFlare is a serverless uptime monitoring & status page solution, powered by Cloudflare Workers. Prior to commit 377a596, configuration file uptime.config.ts exports both pageConfig (safe for client use) and workerConfig (server-only, contains...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29779/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: parse-server (<8.6.10, <9.5.0-alpha.11) has CWE-287 improper authentication (CVE-2026-30863). JWT audience check skipped by default; attackers can impersonate users. Patch or set audience now. https://radar.offseq.com/threat/cve-2026-30863-cwe-287-improper-authentication-in--0b463399 #OffSeq #CVE202630863 #ParseServer #infosec
##🚨 CRITICAL: parse-server (<8.6.10, <9.5.0-alpha.11) has CWE-287 improper authentication (CVE-2026-30863). JWT audience check skipped by default; attackers can impersonate users. Patch or set audience now. https://radar.offseq.com/threat/cve-2026-30863-cwe-287-improper-authentication-in--0b463399 #OffSeq #CVE202630863 #ParseServer #infosec
##🟠 CVE-2026-28210 - High (8.8)
FreePBX is an open source IP PBX. Prior to versions 16.0.49 and 17.0.7, FreePBX module cdr (Call Data Record) is vulnerable to SQL query injection. This issue has been patched in versions 16.0.49 and 17.0.7.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28210/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28210 - High (8.8)
FreePBX is an open source IP PBX. Prior to versions 16.0.49 and 17.0.7, FreePBX module cdr (Call Data Record) is vulnerable to SQL query injection. This issue has been patched in versions 16.0.49 and 17.0.7.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28210/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28287 - High (8.8)
FreePBX is an open source IP PBX. From versions 16.0.17.2 to before 16.0.20 and from version 17.0.2.4 to before 17.0.5, multiple command injection vulnerabilities exist in the recordings module. This issue has been patched in versions 16.0.20 and ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28287/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28287 - High (8.8)
FreePBX is an open source IP PBX. From versions 16.0.17.2 to before 16.0.20 and from version 17.0.2.4 to before 17.0.5, multiple command injection vulnerabilities exist in the recordings module. This issue has been patched in versions 16.0.20 and ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28287/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29067 - High (8.1)
ZITADEL is an open source identity management platform. From version 4.0.0-rc.1 to 4.7.0, a potential vulnerability exists in ZITADEL's password reset mechanism in login V2. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29067/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29067 - High (8.1)
ZITADEL is an open source identity management platform. From version 4.0.0-rc.1 to 4.7.0, a potential vulnerability exists in ZITADEL's password reset mechanism in login V2. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29067/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-55208 - Critical (9)
Chamilo is a learning management system. Versions prior to 1.11.34 have a Stored XSS through insecure file uploads in `Social Networks`. Through it, a low-privilege user can execute arbitrary code in the admin user inbox, allowing takeover of the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-55208/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-55208 - Critical (9)
Chamilo is a learning management system. Versions prior to 1.11.34 have a Stored XSS through insecure file uploads in `Social Networks`. Through it, a low-privilege user can execute arbitrary code in the admin user inbox, allowing takeover of the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-55208/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28405 - High (8)
MarkUs is a web application for the submission and grading of student assignments. Prior to version 2.9.1, the courses//assignments//submissions/html_content route reads the contents of a student-submitted file and renders them without sanitizatio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28405/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28405 - High (8)
MarkUs is a web application for the submission and grading of student assignments. Prior to version 2.9.1, the courses//assignments//submissions/html_content route reads the contents of a student-submitted file and renders them without sanitizatio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28405/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29089 - High (8.8)
TimescaleDB is a time-series database for high-performance real-time analytics packaged as a Postgres extension. From version 2.23.0 to 2.25.1, PostgreSQL uses the search_path setting to locate unqualified database objects (tables, functions, oper...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29089/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-29789 - Critical (9.9)
Vito is a self-hosted web application that helps manage servers and deploy PHP applications into production servers. Prior to version 3.20.3, a missing authorization check in workflow site-creation actions allows an authenticated attacker with wor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29789/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-29789 (CRITICAL, CVSS 10): vitodeploy vito <3.20.3 has missing auth checks in workflow site-creation. Attackers with workflow write can act across projects. Patch to 3.20.3+ now! https://radar.offseq.com/threat/cve-2026-29789-cwe-862-missing-authorization-in-vi-a7e2f21c #OffSeq #Vulnerability #PatchTuesday
##🟠 CVE-2026-30840 - High (8.8)
Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, there is a server-side request forgery vulnerability in notification testers. This issue has been patched in version 4.6.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30840/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##We (at Tachyon) found an auth bypass in MLflow https://tachyon.so/blog/cve-2025-14297-mlflow-authorization-bypass
##🟠 CVE-2026-28485 - High (8.4)
OpenClaw versions 2026.1.5 prior to 2026.2.12 fail to enforce mandatory authentication on the /agent/act browser-control HTTP route, allowing unauthorized local callers to invoke privileged operations. Remote attackers on the local network or loca...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28485/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-55289 - High (8.8)
Chamilo is a learning management system. Prior to version 1.11.34, there is a stored XSS vulnerability in Chamilo LMS (Verison 1.11.32) allows an attacker to inject arbitrary JavaScript into the platform’s social network and internal messaging f...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-55289/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-59542 - Critical (9)
Chamilo is a learning management system. Prior to version 1.11.34, there is a stored cross-site scripting (XSS) vulnerability. By injecting malicious JavaScript into the course learning path Settings field, an attacker with a low-privileged accoun...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59542/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29041 - High (8.8)
Chamilo is a learning management system. Prior to version 1.11.34, Chamilo LMS is affected by an authenticated remote code execution vulnerability caused by improper validation of uploaded files. The application relies solely on MIME-type verifica...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29041/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28429 - High (7.5)
Talishar is a fan-made Flesh and Blood project. Prior to commit 6be3871, a Path Traversal vulnerability was identified in the gameName parameter. While the application's primary entry points implement input validation, the ParseGamestate.php compo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28429/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28676 - High (8.8)
OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Prior to version 1.6.3-alpha, multiple storage helpers used path construction patterns that did not uniformly enforce base-directory containmen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28676/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-28680 - Critical (9.3)
Ghostfolio is an open source wealth management software. Prior to version 2.245.0, an attacker can exploit the manual asset import feature to perform a full-read SSRF, allowing them to exfiltrate sensitive cloud metadata (IMDS) or probe internal n...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28680/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##NetExec vulnerable to arbitrary file write via path traversal in spider_plus module https://nvd.nist.gov/vuln/detail/cve-2026-27884
##