## Updated at UTC 2026-02-22T03:51:32.911905

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-2909 8.8 0.00% 4 0 2026-02-22T02:16:58.100000 A vulnerability was detected in Tenda HG9 300001138. This affects an unknown par
CVE-2026-2908 8.8 0.00% 2 0 2026-02-22T02:16:57.890000 A security vulnerability has been detected in Tenda HG9 300001138. Affected by t
CVE-2026-2907 8.8 0.00% 2 0 2026-02-22T02:16:57.703000 A weakness has been identified in Tenda HG9 300001138. Affected by this vulnerab
CVE-2026-2906 8.8 0.00% 2 0 2026-02-22T02:16:57.493000 A security flaw has been discovered in Tenda HG9 300001138. Affected is an unkno
CVE-2026-2905 8.8 0.00% 2 0 2026-02-22T02:16:56.380000 A vulnerability was identified in Tenda HG9 300001138. This impacts an unknown f
CVE-2026-2904 8.8 0.00% 4 0 2026-02-22T01:16:00.797000 A vulnerability was determined in UTT HiPER 810G 1.7.7-171114. This affects the
CVE-2026-2881 8.8 0.00% 2 0 2026-02-21T21:30:28 A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability af
CVE-2026-2883 8.8 0.00% 2 0 2026-02-21T21:30:28 A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the funct
CVE-2026-2882 8.8 0.00% 2 0 2026-02-21T21:30:27 A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the fun
CVE-2026-2877 8.8 0.00% 2 0 2026-02-21T21:30:27 A vulnerability has been found in Tenda A18 15.13.07.13. This affects the functi
CVE-2026-2886 8.8 0.00% 4 0 2026-02-21T21:16:11.217000 A weakness has been identified in Tenda A21 1.0.0.0. This affects the function s
CVE-2026-2885 8.8 0.00% 4 0 2026-02-21T21:16:10.907000 A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted ele
CVE-2026-2884 8.8 0.00% 2 0 2026-02-21T21:16:10.680000 A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element
CVE-2026-2874 8.8 0.00% 2 0 2026-02-21T18:31:23 A flaw has been found in Tenda A21 1.0.0.0. Impacted is the function form_fast_s
CVE-2026-2876 8.8 0.00% 2 0 2026-02-21T18:31:23 A vulnerability was determined in Tenda A18 15.13.07.13. This affects the functi
CVE-2026-2871 8.8 0.00% 2 0 2026-02-21T18:31:23 A weakness has been identified in Tenda A21 1.0.0.0. This affects the function f
CVE-2026-2873 8.8 0.00% 2 0 2026-02-21T18:31:22 A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the functi
CVE-2026-2872 8.8 0.00% 2 0 2026-02-21T18:31:22 A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerabil
CVE-2026-2870 8.8 0.00% 2 0 2026-02-21T15:31:37 A security flaw has been discovered in Tenda A21 1.0.0.0. Affected by this issue
CVE-2026-27464 7.7 0.03% 2 0 2026-02-21T08:16:10.553000 Metabase is an open-source data analytics platform. In versions prior to 0.57.13
CVE-2026-27198 8.8 0.04% 2 0 2026-02-21T06:17:00.543000 Formwork is a flat file-based Content Management System (CMS). In versions 2.0.0
CVE-2026-24708 8.2 0.04% 1 0 2026-02-21T05:17:17.817000 An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 3
CVE-2026-2635 9.8 1.17% 3 0 2026-02-21T00:31:55 MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnera
CVE-2026-2037 8.8 0.79% 2 0 2026-02-21T00:31:54 GFI Archiver MArc.Core Deserialization of Untrusted Data Remote Code Execution V
CVE-2026-2036 8.8 0.79% 2 0 2026-02-21T00:31:54 GFI Archiver MArc.Store Deserialization of Untrusted Data Remote Code Execution
CVE-2026-2034 7.8 0.04% 2 0 2026-02-21T00:31:54 Sante DICOM Viewer Pro DCM File Parsing Buffer Overflow Remote Code Execution Vu
CVE-2026-2045 7.8 0.06% 2 0 2026-02-21T00:31:54 GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. T
CVE-2026-2047 7.8 0.06% 2 0 2026-02-21T00:31:54 GIMP ICNS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerab
CVE-2026-0777 7.8 0.06% 4 0 2026-02-21T00:31:49 Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. Th
CVE-2026-2044 7.8 0.06% 2 0 2026-02-21T00:31:43 GIMP PGM File Parsing Uninitialized Memory Remote Code Execution Vulnerability.
CVE-2026-27203 8.3 0.04% 2 0 2026-02-21T00:16:17.463000 eBay API MCP Server is an open source local MCP server providing AI assistants w
CVE-2026-27168 8.8 0.02% 6 0 2026-02-21T00:16:16.640000 SAIL is a cross-platform library for loading and saving images with support for
CVE-2026-2048 7.8 0.06% 2 0 2026-02-20T23:16:05.167000 GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. T
CVE-2026-2033 8.1 10.53% 2 0 2026-02-20T23:16:03.093000 MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Executio
CVE-2026-27190 8.1 0.16% 2 0 2026-02-20T22:20:05 ## Summary A command injection vulnerability exists in Deno's `node:child_proces
CVE-2026-25896 9.3 0.03% 6 0 2026-02-20T22:19:56 # Entity encoding bypass via regex injection in DOCTYPE entity names ## Summary
CVE-2026-0797 7.8 0.06% 4 0 2026-02-20T22:16:19.280000 GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerabi
CVE-2026-22364 8.1 0.11% 2 0 2026-02-20T21:32:27 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22378 8.1 0.11% 2 0 2026-02-20T21:32:27 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-24950 7.5 0.03% 2 0 2026-02-20T21:32:27 Authorization Bypass Through User-Controlled Key vulnerability in themeplugs Aut
CVE-2026-2856 8.8 0.04% 2 0 2026-02-20T21:31:32 A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerabi
CVE-2026-2855 8.8 0.04% 2 0 2026-02-20T21:31:32 A vulnerability has been found in D-Link DWR-M960 1.01.07. Affected is the funct
CVE-2026-2854 8.8 0.04% 2 0 2026-02-20T21:31:24 A flaw has been found in D-Link DWR-M960 1.01.07. This impacts the function sub_
CVE-2026-2853 8.8 0.04% 2 0 2026-02-20T21:31:24 A vulnerability was detected in D-Link DWR-M960 1.01.07. This affects the functi
CVE-2026-22383 7.5 0.04% 2 0 2026-02-20T21:31:23 Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes
CVE-2026-22380 8.1 0.11% 2 0 2026-02-20T21:31:23 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22368 8.1 0.11% 2 0 2026-02-20T21:31:22 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22366 8.1 0.11% 2 0 2026-02-20T21:31:22 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22374 8.1 0.11% 2 0 2026-02-20T21:31:22 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22372 8.1 0.11% 2 0 2026-02-20T21:31:22 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22376 8.1 0.11% 2 0 2026-02-20T21:31:22 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2025-68461 7.2 14.26% 4 2 2026-02-20T21:31:16 Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a Cross-Site-S
CVE-2026-2857 8.8 0.04% 2 0 2026-02-20T21:19:30.823000 A vulnerability was determined in D-Link DWR-M960 1.01.07. Affected by this issu
CVE-2026-2441 8.8 0.46% 3 4 2026-02-20T21:19:30.107000 Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote a
CVE-2026-2329 9.8 0.14% 6 0 2026-02-20T20:57:50.360000 An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP
CVE-2026-26362 8.1 0.05% 3 0 2026-02-20T20:46:00.037000 Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Relative Path Travers
CVE-2026-24941 7.5 0.03% 2 0 2026-02-20T20:25:21.757000 Missing Authorization vulnerability in wpjobportal WP Job Portal wp-job-portal a
CVE-2026-22370 8.1 0.11% 2 0 2026-02-20T20:25:19.853000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22362 8.1 0.11% 2 0 2026-02-20T20:25:19.160000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2025-49113 9.9 89.96% 4 22 template 2026-02-20T20:25:18.363000 Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execu
CVE-2026-26286 8.5 0.03% 2 0 2026-02-20T19:45:52.563000 SillyTavern is a locally installed user interface that allows users to interact
CVE-2026-27487 7.6 0.05% 2 0 2026-02-20T19:26:57 ## Summary On macOS, the Claude CLI keychain credential refresh path constructed
CVE-2026-24959 8.5 0.03% 2 0 2026-02-20T19:23:15.067000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2021-35402 10.0 0.27% 1 0 2026-02-20T19:23:14.200000 PROLiNK PRC2402M 20190909 before 2021-06-13 allows live_api.cgi?page=satellite_l
CVE-2026-26996 7.5 0.04% 4 0 2026-02-20T19:12:33.527000 minimatch is a minimal matching utility for converting glob expressions into Jav
CVE-2026-26321 7.5 0.06% 2 0 2026-02-20T19:12:08.257000 OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Fe
CVE-2026-24891 7.5 0.05% 2 0 2026-02-20T18:57:15.973000 openITCOCKPIT is an open source monitoring tool built for different monitoring e
CVE-2026-25715 9.8 0.06% 2 0 2026-02-20T18:57:15.973000 The web management interface of the device allows the administrator username an
CVE-2026-27343 7.5 0.11% 2 0 2026-02-20T18:32:34 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-2818 8.2 0.07% 2 0 2026-02-20T18:31:51 A zip-slip path traversal vulnerability in Spring Data Geode's import snapshot f
CVE-2026-24790 8.2 0.06% 3 0 2026-02-20T18:31:49 The underlying PLC of the device can be remotely influenced, without proper safe
CVE-2026-26048 7.5 0.03% 2 0 2026-02-20T18:31:49 The Wi-Fi router is vulnerable to de-authentication attacks due to the absence
CVE-2026-24455 7.5 0.03% 2 0 2026-02-20T18:31:48 The embedded web interface of the device does not support HTTPS/TLS for authent
CVE-2026-20761 8.1 0.25% 4 0 2026-02-20T16:55:22.933000 A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and prior, w
CVE-2026-26980 9.4 0.07% 4 0 2026-02-20T16:48:10 ### Impact A SQL injection vulnerability existed in Ghost's Content API that al
CVE-2026-27002 None 0.04% 2 0 2026-02-20T16:47:05 ## Summary A configuration injection issue in the Docker tool sandbox could allo
CVE-2026-27001 None 0.02% 2 0 2026-02-20T16:47:00 ## Overview OpenClaw embedded the current working directory (workspace path) int
CVE-2026-26323 None 0.18% 2 0 2026-02-20T16:45:55 ### Summary Command injection in the maintainer/dev script `scripts/update-clawt
CVE-2026-26065 8.8 0.03% 6 0 2026-02-20T16:45:18.507000 calibre is a cross-platform e-book manager for viewing, converting, editing, and
CVE-2026-26324 7.5 0.01% 2 0 2026-02-20T16:44:49 ### Summary OpenClaw's SSRF protection could be bypassed using full-form IPv4-m
CVE-2026-26322 7.6 0.01% 2 0 2026-02-20T16:44:39 ## Summary The Gateway tool accepted a tool-supplied `gatewayUrl` without suffic
CVE-2026-26319 7.5 0.03% 2 0 2026-02-20T16:44:20 ## Summary In affected versions, OpenClaw's optional `@openclaw/voice-call` plu
CVE-2026-26316 7.5 0.06% 2 0 2026-02-20T16:44:14 ### Summary In affected versions, the optional BlueBubbles iMessage channel plu
CVE-2026-22267 8.1 0.01% 1 0 2026-02-20T16:33:47.890000 Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Incorre
CVE-2026-26339 9.8 0.17% 4 0 2026-02-20T15:32:04 Hyland Alfresco Transformation Service allows unauthenticated attackers to achie
CVE-2026-26337 8.2 0.11% 2 0 2026-02-20T15:20:29.797000 Hyland Alfresco Transformation Service allows unauthenticated attackers to achie
CVE-2026-26336 7.5 0.06% 2 0 2026-02-20T15:20:29.647000 Hyland Alfresco allows unauthenticated attackers to read arbitrary files from pr
CVE-2026-26050 7.8 0.01% 4 0 2026-02-20T13:49:47.623000 The installer for ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール versions prior to Ver.1.3.7 c
CVE-2026-26975 8.8 0.02% 4 0 2026-02-20T13:49:47.623000 Music Assistant is an open-source media library manager that integrates streamin
CVE-2025-30411 10.0 0.02% 4 0 2026-02-20T13:49:47.623000 Sensitive data disclosure and manipulation due to improper authentication. The f
CVE-2026-26275 7.5 0.02% 2 0 2026-02-20T13:49:47.623000 httpsig-hyper is a hyper extension for http message signatures. An issue was dis
CVE-2026-26278 7.5 0.05% 2 0 2026-02-20T13:49:47.623000 fast-xml-parser allows users to validate XML, parse XML to JS object, or build X
CVE-2026-25940 8.1 0.03% 2 0 2026-02-20T13:49:47.623000 jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control
CVE-2025-10970 9.8 0.03% 3 0 2026-02-20T12:31:26 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-30416 10.0 0.01% 2 0 2026-02-20T03:31:45 Sensitive data disclosure and manipulation due to missing authorization. The fol
CVE-2025-30412 10.0 0.02% 2 0 2026-02-20T03:31:45 Sensitive data disclosure and manipulation due to improper authentication. The f
CVE-2025-30410 9.8 0.02% 2 0 2026-02-20T03:31:45 Sensitive data disclosure and manipulation due to missing authentication. The fo
CVE-2026-0573 9.1 0.07% 2 0 2026-02-20T00:32:59 An URL redirection vulnerability was identified in GitHub Enterprise Server that
CVE-2026-23542 9.8 0.04% 2 0 2026-02-20T00:32:59 Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Restaurant g
CVE-2026-21535 8.2 0.10% 4 0 2026-02-20T00:31:59 Improper access control in Microsoft Teams allows an unauthorized attacker to di
CVE-2026-23549 9.8 0.04% 2 0 2026-02-20T00:31:53 Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage
CVE-2026-23544 8.8 0.05% 2 0 2026-02-19T22:16:41.747000 Deserialization of Untrusted Data vulnerability in codetipi Valenti valenti allo
CVE-2025-13590 9.1 0.21% 1 0 2026-02-19T22:11:44 A malicious actor with administrative privileges can upload an arbitrary file to
CVE-2026-27206 8.1 0.29% 2 0 2026-02-19T22:05:43 ### Description The `zumba/json-serializer` library allows deserialization of P
CVE-2026-27013 7.6 0.04% 2 0 2026-02-19T21:57:27 fabric.js applies `escapeXml()` to text content during SVG export (`src/shapes/T
CVE-2026-26318 8.8 0.04% 2 0 2026-02-19T21:57:18 # Command Injection via Unsanitized `locate` Output in `versions()` — systeminfo
CVE-2026-26280 8.4 0.06% 2 0 2026-02-19T21:57:03 ### Summary A command injection vulnerability in the `wifiNetworks()` function a
CVE-2026-26267 7.5 0.03% 2 0 2026-02-19T21:56:47 ### Impact The `#[contractimpl]` macro contains a bug in how it wires up functi
CVE-2026-27476 9.8 0.27% 4 0 2026-02-19T21:30:57 RustFly 2.0.0 contains a command injection vulnerability in its remote UI contro
CVE-2026-27475 8.1 0.05% 2 0 2026-02-19T21:30:47 SPIP before 4.4.9 allows Insecure Deserialization in the public area through the
CVE-2026-27052 7.5 0.11% 2 0 2026-02-19T21:30:46 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-25378 7.6 0.03% 2 0 2026-02-19T21:30:45 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-26016 None 0.04% 4 0 2026-02-19T21:30:31 ### Summary A missing authorization check in multiple controllers allows any us
CVE-2026-24834 None 0.01% 2 0 2026-02-19T21:30:21 ### Summary An issue in Kata with Cloud Hypervisor allows a user of the contain
CVE-2026-25474 7.5 0.01% 1 0 2026-02-19T21:23:55 ## Summary In Telegram webhook mode, if `channels.telegram.webhookSecret` is no
CVE-2026-25242 None 0.05% 2 1 2026-02-19T21:23:41 Security Advisory:Unauthenticated File Upload in Gogs Vulnerability Type: Unauth
CVE-2026-25232 None 0.03% 2 0 2026-02-19T21:14:58 ## Summary An access control bypass vulnerability in Gogs web interface allows
CVE-2026-27192 None 0.02% 2 0 2026-02-19T20:32:29 The origin validation uses `startsWith()` for comparison, allowing attackers to
CVE-2026-27196 8.1 0.02% 2 0 2026-02-19T20:30:39 ## Impact Stored XSS vulnerability in `html` fieldtypes allow authenticated use
CVE-2026-27212 None 0.03% 2 0 2026-02-19T20:28:39 ### Summary A prototype pollution vulnerability exists in the the npm package sw
CVE-2026-26030 10.0 0.09% 7 0 2026-02-19T19:34:15 ### Impact: An RCE vulnerability has been identified in Microsoft Semantic Kerne
CVE-2026-25418 7.6 0.03% 2 0 2026-02-19T19:22:28.717000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-2648 8.8 0.07% 2 0 2026-02-19T18:32:57 Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed
CVE-2026-2409 None 0.03% 2 0 2026-02-19T18:32:10 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-1581 7.5 0.07% 2 0 2026-02-19T18:32:09 The wpForo Forum plugin for WordPress is vulnerable to time-based SQL Injection
CVE-2026-2232 7.5 0.09% 2 0 2026-02-19T18:32:09 The Product Table and List Builder for WooCommerce Lite plugin for WordPress is
CVE-2025-71250 8.1 0.00% 2 0 2026-02-19T18:32:08 SPIP before 4.4.9 allows Insecure Deserialization in the public area through the
CVE-2025-71243 9.8 0.11% 1 1 2026-02-19T18:32:08 The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5
CVE-2025-12107 10.0 0.28% 2 0 2026-02-19T18:32:07 Due to the use of a vulnerable third-party Velocity template engine, a malicious
CVE-2026-26358 8.8 0.05% 3 0 2026-02-19T18:32:07 Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Missing Authorization
CVE-2026-26359 8.8 0.04% 1 0 2026-02-19T18:32:06 Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of
CVE-2026-26360 8.1 0.05% 2 0 2026-02-19T18:32:05 Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of
CVE-2026-1994 9.8 0.05% 2 0 2026-02-19T18:32:03 The s2Member plugin for WordPress is vulnerable to privilege escalation via acco
CVE-2025-4521 8.8 0.04% 2 0 2026-02-19T18:32:02 The IDonate – Blood Donation, Request And Donor Management System plugin for Wor
CVE-2025-4960 7.8 0.01% 2 0 2026-02-19T18:32:02 The com.epson.InstallNavi.helper tool, deployed with the EPSON printer driver in
CVE-2026-0926 9.8 0.19% 2 0 2026-02-19T18:32:02 The Prodigy Commerce plugin for WordPress is vulnerable to Local File Inclusion
CVE-2026-1405 9.8 0.15% 1 1 2026-02-19T18:32:02 The Slider Future plugin for WordPress is vulnerable to arbitrary file uploads d
CVE-2025-13851 9.8 0.06% 2 0 2026-02-19T18:32:01 The Buyent Classified plugin for WordPress (bundled with Buyent theme) is vulner
CVE-2026-0912 8.8 0.04% 1 0 2026-02-19T18:32:01 The Toret Manager plugin for WordPress is vulnerable to unauthorized modificatio
CVE-2025-12821 8.8 0.05% 2 0 2026-02-19T18:31:53 The NewsBlogger theme for WordPress is vulnerable to Cross-Site Request Forgery
CVE-2025-12707 7.5 0.07% 2 0 2026-02-19T18:31:53 The Library Management System plugin for WordPress is vulnerable to SQL Injectio
CVE-2025-12882 9.8 0.06% 2 0 2026-02-19T18:31:53 The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation
CVE-2025-11754 7.5 0.04% 2 0 2026-02-19T18:31:52 The GDPR Cookie Consent plugin for WordPress is vulnerable to unauthorized acces
CVE-2025-13563 9.8 0.06% 2 0 2026-02-19T18:31:50 The Lizza LMS Pro plugin for WordPress is vulnerable to Privilege Escalation in
CVE-2019-25364 9.8 0.18% 1 0 2026-02-19T15:53:02.850000 MailCarrier 2.51 contains a buffer overflow vulnerability in the POP3 USER comma
CVE-2025-12845 8.8 0.05% 2 0 2026-02-19T15:53:02.850000 The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluen
CVE-2025-13603 8.8 0.04% 2 0 2026-02-19T15:53:02.850000 The WP AUDIO GALLERY plugin for WordPress is vulnerable to Unauthorized Arbitrar
CVE-2026-0974 8.8 0.21% 2 0 2026-02-19T15:53:02.850000 The Orderable – WordPress Restaurant Online Ordering System and Food Ordering Pl
CVE-2026-27112 None 0.24% 2 0 2026-02-19T15:16:47 ## Summary The batch resource creation endpoints of both Kargo's legacy gRPC AP
CVE-2026-26990 8.8 0.01% 2 0 2026-02-18T22:31:38 ### Summary A time-based blind SQL injection vulnerability exists in `address-se
CVE-2026-26988 None 0.00% 2 1 2026-02-18T22:30:20 ### Summary *SQL Injection in IPv6 Address Search functionality via `address` pa
CVE-2026-22769 10.0 28.78% 3 0 2026-02-18T20:01:15.983000 Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a
CVE-2026-0714 6.8 0.01% 6 0 2026-02-18T18:31:27 A physical attack vulnerability exists in certain Moxa industrial computers usin
CVE-2021-22175 9.8 75.69% 2 0 template 2026-02-18T18:31:26 When requests to the internal network for webhooks are enabled, a server-side re
CVE-2026-1670 9.8 0.04% 4 0 2026-02-18T00:30:22 The affected products are vulnerable to an unauthenticated API endpoint exposure
CVE-2026-26119 8.8 0.07% 2 0 2026-02-18T00:30:22 Improper authentication in Windows Admin Center allows an authorized attacker to
CVE-2025-65716 8.8 0.05% 2 0 2026-02-17T15:32:42 An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allo
CVE-2026-2447 8.8 0.04% 3 0 2026-02-17T15:32:41 Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Fi
CVE-2026-1731 9.8 49.74% 16 4 template 2026-02-17T15:31:33 BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote
CVE-2026-20841 7.8 0.09% 3 10 2026-02-12T20:16:05.143000 Improper neutralization of special elements used in a command ('command injectio
CVE-2026-21509 7.8 9.21% 2 9 2026-02-11T15:40:33.473000 Reliance on untrusted inputs in a security decision in Microsoft Office allows a
CVE-2026-24423 9.8 24.64% 2 1 2026-02-06T18:30:29 SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated
CVE-2026-1281 9.8 54.31% 1 2 2026-01-30T00:31:29 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2026-1340 9.8 38.65% 1 2 2026-01-30T00:31:28 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2026-23760 9.8 55.75% 2 2 template 2026-01-27T16:16:55.327000 SmarterTools SmarterMail versions prior to build 9511 contain an authentication
CVE-2025-6571 6.0 0.02% 2 0 2025-11-11T09:30:36 A 3rd-party component exposed its password in process arguments, allowing for lo
CVE-2022-22265 7.8 0.16% 2 0 2025-10-22T00:32:28 An improper check or handling of exceptional conditions in NPU driver prior to S
CVE-2020-1472 10.0 94.38% 1 76 2025-10-22T00:31:58 An elevation of privilege vulnerability exists when an attacker establishes a vu
CVE-2025-29969 7.5 0.35% 4 1 2025-05-13T18:31:00 Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows
CVE-2023-51781 7.0 0.02% 1 0 2024-01-27T05:05:43 An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/app
CVE-2026-27574 0 0.05% 2 1 N/A
CVE-2026-27466 0 0.07% 2 0 N/A
CVE-2026-27467 0 0.03% 2 0 N/A
CVE-2026-27479 0 0.03% 2 0 N/A
CVE-2026-27471 0 0.04% 2 0 N/A
CVE-2026-27470 0 0.03% 2 1 N/A
CVE-2026-27452 0 0.04% 2 0 N/A
CVE-2026-27197 0 0.04% 4 0 N/A
CVE-2026-24892 0 0.31% 2 0 N/A
CVE-2026-27134 0 0.03% 4 0 N/A
CVE-2026-27169 0 0.04% 2 0 N/A
CVE-2026-27114 0 0.03% 2 0 N/A
CVE-2025-66039 0 32.61% 2 3 N/A
CVE-2025-61675 0 16.95% 2 3 N/A
CVE-2026-26064 0 0.05% 4 0 N/A
CVE-2026-26959 0 0.01% 4 0 N/A
CVE-2026-26202 0 0.05% 2 0 N/A
CVE-2026-26200 0 0.03% 2 0 N/A

CVE-2026-2909
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-22T02:16:58.100000

4 posts

A vulnerability was detected in Tenda HG9 300001138. This affects an unknown part of the file /boaform/formPing of the component Diagnostic Ping Endpoint. Performing a manipulation of the argument pingAddr results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.

offseq at 2026-02-22T03:00:26.179Z ##

🚨 HIGH-severity (CVSS 8.7): Stack buffer overflow in Tenda HG9 (v300001138) via /boaform/formPing. Remote code execution possible with public exploit available. Restrict access, monitor, and patch ASAP! Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-22T02:18:22.000Z ##

🟠 CVE-2026-2909 - High (8.8)

A vulnerability was detected in Tenda HG9 300001138. This affects an unknown part of the file /boaform/formPing of the component Diagnostic Ping Endpoint. Performing a manipulation of the argument pingAddr results in stack-based buffer overflow. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-22T03:00:26.000Z ##

🚨 HIGH-severity (CVSS 8.7): Stack buffer overflow in Tenda HG9 (v300001138) via /boaform/formPing. Remote code execution possible with public exploit available. Restrict access, monitor, and patch ASAP! Details: radar.offseq.com/threat/cve-20 #OffSeq #Infosec #Vuln #IoT

##

thehackerwire@mastodon.social at 2026-02-22T02:18:22.000Z ##

🟠 CVE-2026-2909 - High (8.8)

A vulnerability was detected in Tenda HG9 300001138. This affects an unknown part of the file /boaform/formPing of the component Diagnostic Ping Endpoint. Performing a manipulation of the argument pingAddr results in stack-based buffer overflow. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2908
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-22T02:16:57.890000

2 posts

A security vulnerability has been detected in Tenda HG9 300001138. Affected by this issue is some unknown functionality of the file /boaform/formLoopBack of the component Loopback Detection Configuration Endpoint. Such manipulation of the argument Ethtype leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-02-22T02:25:14.000Z ##

🟠 CVE-2026-2908 - High (8.8)

A security vulnerability has been detected in Tenda HG9 300001138. Affected by this issue is some unknown functionality of the file /boaform/formLoopBack of the component Loopback Detection Configuration Endpoint. Such manipulation of the argument...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-22T02:25:14.000Z ##

🟠 CVE-2026-2908 - High (8.8)

A security vulnerability has been detected in Tenda HG9 300001138. Affected by this issue is some unknown functionality of the file /boaform/formLoopBack of the component Loopback Detection Configuration Endpoint. Such manipulation of the argument...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2907
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-22T02:16:57.703000

2 posts

A weakness has been identified in Tenda HG9 300001138. Affected by this vulnerability is an unknown functionality of the file /boaform/formgponConf of the component GPON Configuration Endpoint. This manipulation of the argument fmgpon_loid/fmgpon_loid_password causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and co

thehackerwire@mastodon.social at 2026-02-22T02:18:43.000Z ##

🟠 CVE-2026-2907 - High (8.8)

A weakness has been identified in Tenda HG9 300001138. Affected by this vulnerability is an unknown functionality of the file /boaform/formgponConf of the component GPON Configuration Endpoint. This manipulation of the argument fmgpon_loid/fmgpon_...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-22T02:18:43.000Z ##

🟠 CVE-2026-2907 - High (8.8)

A weakness has been identified in Tenda HG9 300001138. Affected by this vulnerability is an unknown functionality of the file /boaform/formgponConf of the component GPON Configuration Endpoint. This manipulation of the argument fmgpon_loid/fmgpon_...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2906
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-22T02:16:57.493000

2 posts

A security flaw has been discovered in Tenda HG9 300001138. Affected is an unknown function of the file /boaform/formSamba of the component Samba Configuration Endpoint. The manipulation of the argument sambaCap results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-02-22T02:18:33.000Z ##

🟠 CVE-2026-2906 - High (8.8)

A security flaw has been discovered in Tenda HG9 300001138. Affected is an unknown function of the file /boaform/formSamba of the component Samba Configuration Endpoint. The manipulation of the argument sambaCap results in stack-based buffer overf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-22T02:18:33.000Z ##

🟠 CVE-2026-2906 - High (8.8)

A security flaw has been discovered in Tenda HG9 300001138. Affected is an unknown function of the file /boaform/formSamba of the component Samba Configuration Endpoint. The manipulation of the argument sambaCap results in stack-based buffer overf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2905
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-22T02:16:56.380000

2 posts

A vulnerability was identified in Tenda HG9 300001138. This impacts an unknown function of the file /boaform/formWlanSetup of the component Wireless Configuration Endpoint. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-02-22T02:25:23.000Z ##

🟠 CVE-2026-2905 - High (8.8)

A vulnerability was identified in Tenda HG9 300001138. This impacts an unknown function of the file /boaform/formWlanSetup of the component Wireless Configuration Endpoint. The manipulation of the argument ssid leads to stack-based buffer overflow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-22T02:25:23.000Z ##

🟠 CVE-2026-2905 - High (8.8)

A vulnerability was identified in Tenda HG9 300001138. This impacts an unknown function of the file /boaform/formWlanSetup of the component Wireless Configuration Endpoint. The manipulation of the argument ssid leads to stack-based buffer overflow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2904
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-22T01:16:00.797000

4 posts

A vulnerability was determined in UTT HiPER 810G 1.7.7-171114. This affects the function strcpy of the file /goform/ConfigExceptAli. Executing a manipulation can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

offseq at 2026-02-22T01:30:28.278Z ##

⚠️ CVE-2026-2904 (HIGH): Buffer overflow in UTT HiPER 810G v1.7.7-171114 via /goform/ConfigExceptAli. Remote, unauthenticated RCE/DoS risk. Public exploit code available — restrict access & monitor. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-22T01:20:04.000Z ##

🟠 CVE-2026-2904 - High (8.8)

A vulnerability was determined in UTT HiPER 810G 1.7.7-171114. This affects the function strcpy of the file /goform/ConfigExceptAli. Executing a manipulation can lead to buffer overflow. The attack can be launched remotely. The exploit has been pu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-22T01:30:28.000Z ##

⚠️ CVE-2026-2904 (HIGH): Buffer overflow in UTT HiPER 810G v1.7.7-171114 via /goform/ConfigExceptAli. Remote, unauthenticated RCE/DoS risk. Public exploit code available — restrict access & monitor. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #NetworkSecurity

##

thehackerwire@mastodon.social at 2026-02-22T01:20:04.000Z ##

🟠 CVE-2026-2904 - High (8.8)

A vulnerability was determined in UTT HiPER 810G 1.7.7-171114. This affects the function strcpy of the file /goform/ConfigExceptAli. Executing a manipulation can lead to buffer overflow. The attack can be launched remotely. The exploit has been pu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2881
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-21T21:30:28

2 posts

A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_425FF8 of the file /boafrm/formFirewallAdv of the component Advanced Firewall Configuration Endpoint. Such manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-02-21T20:24:13.000Z ##

🟠 CVE-2026-2881 - High (8.8)

A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_425FF8 of the file /boafrm/formFirewallAdv of the component Advanced Firewall Configuration Endpoint. Such manipulation of the argument submit-u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T20:24:13.000Z ##

🟠 CVE-2026-2881 - High (8.8)

A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_425FF8 of the file /boafrm/formFirewallAdv of the component Advanced Firewall Configuration Endpoint. Such manipulation of the argument submit-u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2883
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-21T21:30:28

2 posts

A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_427D74 of the file /boafrm/formIpQoS. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-02-21T20:24:03.000Z ##

🟠 CVE-2026-2883 - High (8.8)

A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_427D74 of the file /boafrm/formIpQoS. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T20:24:03.000Z ##

🟠 CVE-2026-2883 - High (8.8)

A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_427D74 of the file /boafrm/formIpQoS. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2882
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-21T21:30:27

2 posts

A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_46385C of the file /boafrm/formDosCfg. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-02-21T20:23:52.000Z ##

🟠 CVE-2026-2882 - High (8.8)

A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_46385C of the file /boafrm/formDosCfg. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. Remote exploitation of th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T20:23:52.000Z ##

🟠 CVE-2026-2882 - High (8.8)

A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_46385C of the file /boafrm/formDosCfg. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. Remote exploitation of th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2877
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-21T21:30:27

2 posts

A vulnerability has been found in Tenda A18 15.13.07.13. This affects the function strcpy of the file /goform/WifiExtraSet of the component Httpd Service. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-02-21T19:16:10.000Z ##

🟠 CVE-2026-2877 - High (8.8)

A vulnerability has been found in Tenda A18 15.13.07.13. This affects the function strcpy of the file /goform/WifiExtraSet of the component Httpd Service. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. It is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T19:16:10.000Z ##

🟠 CVE-2026-2877 - High (8.8)

A vulnerability has been found in Tenda A18 15.13.07.13. This affects the function strcpy of the file /goform/WifiExtraSet of the component Httpd Service. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. It is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2886
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-21T21:16:11.217000

4 posts

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function set_device_name of the file /goform/SetOnlineDevName. This manipulation of the argument devName causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-02-21T21:19:05.000Z ##

🟠 CVE-2026-2886 - High (8.8)

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function set_device_name of the file /goform/SetOnlineDevName. This manipulation of the argument devName causes stack-based buffer overflow. It is possible to initiate the attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T21:18:40.000Z ##

🟠 CVE-2026-2886 - High (8.8)

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function set_device_name of the file /goform/SetOnlineDevName. This manipulation of the argument devName causes stack-based buffer overflow. It is possible to initiate the attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T21:19:05.000Z ##

🟠 CVE-2026-2886 - High (8.8)

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function set_device_name of the file /goform/SetOnlineDevName. This manipulation of the argument devName causes stack-based buffer overflow. It is possible to initiate the attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T21:18:40.000Z ##

🟠 CVE-2026-2886 - High (8.8)

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function set_device_name of the file /goform/SetOnlineDevName. This manipulation of the argument devName causes stack-based buffer overflow. It is possible to initiate the attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2885
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-21T21:16:10.907000

4 posts

A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-02-21T21:19:16.000Z ##

🟠 CVE-2026-2885 - High (8.8)

A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T21:18:50.000Z ##

🟠 CVE-2026-2885 - High (8.8)

A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T21:19:16.000Z ##

🟠 CVE-2026-2885 - High (8.8)

A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T21:18:50.000Z ##

🟠 CVE-2026-2885 - High (8.8)

A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2884
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-21T21:16:10.680000

2 posts

A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element is the function sub_41914C of the file /boafrm/formWanConfigSetup of the component WAN Interface Setting Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-02-21T21:18:45.000Z ##

🟠 CVE-2026-2884 - High (8.8)

A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element is the function sub_41914C of the file /boafrm/formWanConfigSetup of the component WAN Interface Setting Handler. The manipulation of the argument submit-url leads to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T21:18:45.000Z ##

🟠 CVE-2026-2884 - High (8.8)

A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element is the function sub_41914C of the file /boafrm/formWanConfigSetup of the component WAN Interface Setting Handler. The manipulation of the argument submit-url leads to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2874
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-21T18:31:23

2 posts

A flaw has been found in Tenda A21 1.0.0.0. Impacted is the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. Executing a manipulation of the argument ssid can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-02-21T18:19:52.000Z ##

🟠 CVE-2026-2874 - High (8.8)

A flaw has been found in Tenda A21 1.0.0.0. Impacted is the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. Executing a manipulation of the argument ssid can lead to stack-based buffer overflow. It is possible to lau...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T18:19:52.000Z ##

🟠 CVE-2026-2874 - High (8.8)

A flaw has been found in Tenda A21 1.0.0.0. Impacted is the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. Executing a manipulation of the argument ssid can lead to stack-based buffer overflow. It is possible to lau...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2876
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-21T18:31:23

2 posts

A vulnerability was determined in Tenda A18 15.13.07.13. This affects the function parse_macfilter_rule of the file /goform/setBlackRule. This manipulation of the argument deviceList causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-02-21T18:19:42.000Z ##

🟠 CVE-2026-2876 - High (8.8)

A vulnerability was determined in Tenda A18 15.13.07.13. This affects the function parse_macfilter_rule of the file /goform/setBlackRule. This manipulation of the argument deviceList causes stack-based buffer overflow. The attack may be initiated ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T18:19:42.000Z ##

🟠 CVE-2026-2876 - High (8.8)

A vulnerability was determined in Tenda A18 15.13.07.13. This affects the function parse_macfilter_rule of the file /goform/setBlackRule. This manipulation of the argument deviceList causes stack-based buffer overflow. The attack may be initiated ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2871
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-21T18:31:23

2 posts

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of the file /goform/SetIpMacBind. This manipulation of the argument list causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-02-21T17:00:43.000Z ##

🟠 CVE-2026-2871 - High (8.8)

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of the file /goform/SetIpMacBind. This manipulation of the argument list causes stack-based buffer overflow. The attack is possible to be carried out r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T17:00:43.000Z ##

🟠 CVE-2026-2871 - High (8.8)

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of the file /goform/SetIpMacBind. This manipulation of the argument list causes stack-based buffer overflow. The attack is possible to be carried out r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2873
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-21T18:31:22

2 posts

A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-02-21T17:16:37.000Z ##

🟠 CVE-2026-2873 - High (8.8)

A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. It is ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T17:16:37.000Z ##

🟠 CVE-2026-2873 - High (8.8)

A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. It is ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2872
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-21T18:31:22

2 posts

A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerability affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. Such manipulation of the argument devName/mac leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-02-21T17:00:52.000Z ##

🟠 CVE-2026-2872 - High (8.8)

A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerability affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. Such manipulation of the argument devN...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T17:00:52.000Z ##

🟠 CVE-2026-2872 - High (8.8)

A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerability affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. Such manipulation of the argument devN...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2870
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-21T15:31:37

2 posts

A security flaw has been discovered in Tenda A21 1.0.0.0. Affected by this issue is the function set_qosMib_list of the file /goform/formSetQosBand. The manipulation of the argument list results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-02-21T15:25:18.000Z ##

🟠 CVE-2026-2870 - High (8.8)

A security flaw has been discovered in Tenda A21 1.0.0.0. Affected by this issue is the function set_qosMib_list of the file /goform/formSetQosBand. The manipulation of the argument list results in stack-based buffer overflow. The attack can be ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T15:25:18.000Z ##

🟠 CVE-2026-2870 - High (8.8)

A security flaw has been discovered in Tenda A21 1.0.0.0. Affected by this issue is the function set_qosMib_list of the file /goform/formSetQosBand. The manipulation of the argument list results in stack-based buffer overflow. The attack can be ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27464
(7.7 HIGH)

EPSS: 0.03%

updated 2026-02-21T08:16:10.553000

2 posts

Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. During testing, it was confirmed that a low-privileged user can extract sensitive information including database credentials, into the email body via templ

thehackerwire@mastodon.social at 2026-02-21T08:17:29.000Z ##

🟠 CVE-2026-27464 - High (7.7)

Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. Du...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T08:17:29.000Z ##

🟠 CVE-2026-27464 - High (7.7)

Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. Du...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27198
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-21T06:17:00.543000

2 posts

Formwork is a flat file-based Content Management System (CMS). In versions 2.0.0 through 2.3.3, the application fails to properly enforce role-based authorization during account creation. Although the system validates that the specified role exists, it does not verify whether the current user has sufficient privileges to assign highly privileged roles such as admin. As a result, an authenticated u

thehackerwire@mastodon.social at 2026-02-21T06:18:30.000Z ##

🟠 CVE-2026-27198 - High (8.8)

Formwork is a flat file-based Content Management System (CMS). In versions 2.0.0 through 2.3.3, the application fails to properly enforce role-based authorization during account creation. Although the system validates that the specified role exist...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T06:18:30.000Z ##

🟠 CVE-2026-27198 - High (8.8)

Formwork is a flat file-based Content Management System (CMS). In versions 2.0.0 through 2.3.3, the application fails to properly enforce role-based authorization during account creation. Although the system validates that the specified role exist...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24708
(8.2 HIGH)

EPSS: 0.04%

updated 2026-02-21T05:17:17.817000

1 posts

An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using th

linux@activitypub.awakari.com at 2026-02-19T20:53:28.000Z ## Debian DSA-6145-1 Nova Image Resize Issue CVE-2026-24708 Dan Smith discovered that nova, a cloud computing fabric controller, calls qemu-img without format restrictions for resize, which may result...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-2635
(9.8 CRITICAL)

EPSS: 1.17%

updated 2026-02-21T00:31:55

3 posts

MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the basic_auth.ini file. The file contains hard-coded default credentials. An attacker can leverage this vulnerability to bypass aut

Matchbook3469@mastodon.social at 2026-02-21T15:58:19.000Z ##

🔴 New security advisory:

CVE-2026-2635 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

thehackerwire@mastodon.social at 2026-02-21T00:00:13.000Z ##

🔴 CVE-2026-2635 - Critical (9.8)

MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability.

The specifi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:00:13.000Z ##

🔴 CVE-2026-2635 - Critical (9.8)

MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability.

The specifi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2037
(8.8 HIGH)

EPSS: 0.79%

updated 2026-02-21T00:31:54

2 posts

GFI Archiver MArc.Core Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the configuration of the MArc.Core.Remo

thehackerwire@mastodon.social at 2026-02-21T00:03:01.000Z ##

🟠 CVE-2026-2037 - High (8.8)

GFI Archiver MArc.Core Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:03:01.000Z ##

🟠 CVE-2026-2037 - High (8.8)

GFI Archiver MArc.Core Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2036
(8.8 HIGH)

EPSS: 0.79%

updated 2026-02-21T00:31:54

2 posts

GFI Archiver MArc.Store Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the configuration of the MArc.Store.Re

thehackerwire@mastodon.social at 2026-02-21T00:02:50.000Z ##

🟠 CVE-2026-2036 - High (8.8)

GFI Archiver MArc.Store Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:02:50.000Z ##

🟠 CVE-2026-2036 - High (8.8)

GFI Archiver MArc.Store Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2034
(7.8 HIGH)

EPSS: 0.04%

updated 2026-02-21T00:31:54

2 posts

Sante DICOM Viewer Pro DCM File Parsing Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DCM f

thehackerwire@mastodon.social at 2026-02-21T00:02:37.000Z ##

🟠 CVE-2026-2034 - High (7.8)

Sante DICOM Viewer Pro DCM File Parsing Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:02:37.000Z ##

🟠 CVE-2026-2034 - High (7.8)

Sante DICOM Viewer Pro DCM File Parsing Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2045
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-21T00:31:54

2 posts

GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XWD files. The issue results from the

thehackerwire@mastodon.social at 2026-02-21T00:02:00.000Z ##

🟠 CVE-2026-2045 - High (7.8)

GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:02:00.000Z ##

🟠 CVE-2026-2045 - High (7.8)

GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2047
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-21T00:31:54

2 posts

GIMP ICNS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ICNS files. The issue results

thehackerwire@mastodon.social at 2026-02-20T23:59:53.000Z ##

🟠 CVE-2026-2047 - High (7.8)

GIMP ICNS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabili...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T23:59:53.000Z ##

🟠 CVE-2026-2047 - High (7.8)

GIMP ICNS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabili...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0777
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-21T00:31:49

4 posts

Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xmind. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of attachments. When opening an attachm

thehackerwire@mastodon.social at 2026-02-21T00:20:19.000Z ##

🟠 CVE-2026-0777 - High (7.8)

Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xmind. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:24.000Z ##

🟠 CVE-2026-0777 - High (7.8)

Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xmind. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:20:19.000Z ##

🟠 CVE-2026-0777 - High (7.8)

Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xmind. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:24.000Z ##

🟠 CVE-2026-0777 - High (7.8)

Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xmind. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2044
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-21T00:31:43

2 posts

GIMP PGM File Parsing Uninitialized Memory Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PGM files. The issue results from th

thehackerwire@mastodon.social at 2026-02-21T00:01:51.000Z ##

🟠 CVE-2026-2044 - High (7.8)

GIMP PGM File Parsing Uninitialized Memory Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:01:51.000Z ##

🟠 CVE-2026-2044 - High (7.8)

GIMP PGM File Parsing Uninitialized Memory Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27203
(8.3 HIGH)

EPSS: 0.04%

updated 2026-02-21T00:16:17.463000

2 posts

eBay API MCP Server is an open source local MCP server providing AI assistants with comprehensive access to eBay's Sell APIs. All versions are vulnerable to Environment Variable Injection through the updateEnvFile function. The ebay_set_user_tokens tool allows updating the .env file with new tokens. The updateEnvFile function in src/auth/oauth.ts blindly appends or replaces values without validati

thehackerwire@mastodon.social at 2026-02-21T00:17:04.000Z ##

🟠 CVE-2026-27203 - High (8.3)

eBay API MCP Server is an open source local MCP server providing AI assistants with comprehensive access to eBay's Sell APIs. All versions are vulnerable to Environment Variable Injection through the updateEnvFile function. The ebay_set_user_token...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:04.000Z ##

🟠 CVE-2026-27203 - High (8.3)

eBay API MCP Server is an open source local MCP server providing AI assistants with comprehensive access to eBay's Sell APIs. All versions are vulnerable to Environment Variable Injection through the updateEnvFile function. The ebay_set_user_token...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27168
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-21T00:16:16.640000

6 posts

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os read directly from the file as the read size in io->strict_read(), and is never compared to the actual size of the destination buffer. An attacker can p

offseq at 2026-02-21T03:00:28.427Z ##

⚠️ CVE-2026-27168: HIGH severity heap overflow in HappySeaFox sail (≤0.9.10). Remote code execution possible via crafted XWD files — no patch yet. Audit, block untrusted XWDs, and monitor! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-21T00:19:57.000Z ##

🟠 CVE-2026-27168 - High (8.8)

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:14.000Z ##

🟠 CVE-2026-27168 - High (8.8)

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-21T03:00:28.000Z ##

⚠️ CVE-2026-27168: HIGH severity heap overflow in HappySeaFox sail (≤0.9.10). Remote code execution possible via crafted XWD files — no patch yet. Audit, block untrusted XWDs, and monitor! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #HappySeaFox #CyberAlert

##

thehackerwire@mastodon.social at 2026-02-21T00:19:57.000Z ##

🟠 CVE-2026-27168 - High (8.8)

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:14.000Z ##

🟠 CVE-2026-27168 - High (8.8)

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2048
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-20T23:16:05.167000

2 posts

GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XWD files. The issue results from the

thehackerwire@mastodon.social at 2026-02-21T00:00:03.000Z ##

🟠 CVE-2026-2048 - High (7.8)

GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:00:03.000Z ##

🟠 CVE-2026-2048 - High (7.8)

GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2033
(8.1 HIGH)

EPSS: 10.53%

updated 2026-02-20T23:16:03.093000

2 posts

MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of artifact file paths. The issue results from the lack of proper validat

thehackerwire@mastodon.social at 2026-02-21T00:02:10.000Z ##

🟠 CVE-2026-2033 - High (8.1)

MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not requir...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:02:10.000Z ##

🟠 CVE-2026-2033 - High (8.1)

MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not requir...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27190
(8.1 HIGH)

EPSS: 0.16%

updated 2026-02-20T22:20:05

2 posts

## Summary A command injection vulnerability exists in Deno's `node:child_process` implementation. ## Reproduction ```javascript import { spawnSync } from "node:child_process"; import * as fs from "node:fs"; // Cleanup try { fs.unlinkSync('/tmp/rce_proof'); } catch {} // Create legitimate script fs.writeFileSync('/tmp/legitimate.ts', 'console.log("normal");'); // Malicious input with newline

thehackerwire@mastodon.social at 2026-02-21T00:17:53.000Z ##

🟠 CVE-2026-27190 - High (8.1)

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to 2.6.8, a command injection vulnerability exists in Deno's node:child_process implementation. This vulnerability is fixed in 2.6.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:53.000Z ##

🟠 CVE-2026-27190 - High (8.1)

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to 2.6.8, a command injection vulnerability exists in Deno's node:child_process implementation. This vulnerability is fixed in 2.6.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25896
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-02-20T22:19:56

6 posts

# Entity encoding bypass via regex injection in DOCTYPE entity names ## Summary A dot (`.`) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (`&lt;`, `&gt;`, `&amp;`, `&quot;`, `&apos;`) with arbitrary values. This bypasses entity encoding and leads to XSS when parsed output is rendered. ## Details The fix f

endorlabs@mastodon.social at 2026-02-21T17:53:48.000Z ##

CVE-2026-25896 (CVSS 9.3) disclosed in fast-xml-parser

A critical entity encoding bypass affects fast-xml-parser (40M+ weekly npm downloads).
-Allows attackers to shadow built-in XML entities (<, >, &, ", ')
-Can lead to XSS or injection when parsing untrusted XML and rendering the output
-Exploitable with default settings (processEntities: true)
-Impacts >= 4.1.3 and < 5.3.5, including transitive dependencies

Fix: upgrade to v5.3.5+
Advisory: GHSA-m7jm-9gc2-mpf2

endorlabs.com/learn/cve-2026-2

##

offseq at 2026-02-21T01:30:31.106Z ##

🚨 CRITICAL: CVE-2026-25896 in fast-xml-parser (<5.3.5) lets attackers override built-in XML entities, enabling XSS via crafted XML. Affects web apps using vulnerable versions. Patch to 5.3.5+ ASAP! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-21T00:25:28.000Z ##

🔴 CVE-2026-25896 - Critical (9.3)

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during en...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

endorlabs@mastodon.social at 2026-02-21T17:53:48.000Z ##

CVE-2026-25896 (CVSS 9.3) disclosed in fast-xml-parser

A critical entity encoding bypass affects fast-xml-parser (40M+ weekly npm downloads).
-Allows attackers to shadow built-in XML entities (<, >, &, ", ')
-Can lead to XSS or injection when parsing untrusted XML and rendering the output
-Exploitable with default settings (processEntities: true)
-Impacts >= 4.1.3 and < 5.3.5, including transitive dependencies

Fix: upgrade to v5.3.5+
Advisory: GHSA-m7jm-9gc2-mpf2

endorlabs.com/learn/cve-2026-2

##

offseq@infosec.exchange at 2026-02-21T01:30:31.000Z ##

🚨 CRITICAL: CVE-2026-25896 in fast-xml-parser (<5.3.5) lets attackers override built-in XML entities, enabling XSS via crafted XML. Affects web apps using vulnerable versions. Patch to 5.3.5+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #XSS #NodeJS

##

thehackerwire@mastodon.social at 2026-02-21T00:25:28.000Z ##

🔴 CVE-2026-25896 - Critical (9.3)

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during en...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0797
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-20T22:16:19.280000

4 posts

GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ICO files. The issue results f

thehackerwire@mastodon.social at 2026-02-21T00:25:09.000Z ##

🟠 CVE-2026-0797 - High (7.8)

GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:33.000Z ##

🟠 CVE-2026-0797 - High (7.8)

GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:25:09.000Z ##

🟠 CVE-2026-0797 - High (7.8)

GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:33.000Z ##

🟠 CVE-2026-0797 - High (7.8)

GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22364
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:32:27

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes SevenTrees seventrees allows PHP Local File Inclusion.This issue affects SevenTrees: from n/a through <=1.0.2.

thehackerwire@mastodon.social at 2026-02-21T00:45:17.000Z ##

🟠 CVE-2026-22364 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes SevenTrees seventrees allows PHP Local File Inclusion.This issue affects SevenTrees: from n/a through &lt;=1.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:45:17.000Z ##

🟠 CVE-2026-22364 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes SevenTrees seventrees allows PHP Local File Inclusion.This issue affects SevenTrees: from n/a through &lt;=1.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22378
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:32:27

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Blabber blabber allows PHP Local File Inclusion.This issue affects Blabber: from n/a through <= 1.7.0.

thehackerwire@mastodon.social at 2026-02-20T21:01:28.000Z ##

🟠 CVE-2026-22378 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Blabber blabber allows PHP Local File Inclusion.This issue affects Blabber: from n/a through &lt;= 1.7.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T21:01:28.000Z ##

🟠 CVE-2026-22378 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Blabber blabber allows PHP Local File Inclusion.This issue affects Blabber: from n/a through &lt;= 1.7.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24950
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-20T21:32:27

2 posts

Authorization Bypass Through User-Controlled Key vulnerability in themeplugs Authorsy authorsy allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Authorsy: from n/a through <= 1.0.6.

thehackerwire@mastodon.social at 2026-02-20T19:45:24.000Z ##

🟠 CVE-2026-24950 - High (7.5)

Authorization Bypass Through User-Controlled Key vulnerability in themeplugs Authorsy authorsy allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Authorsy: from n/a through &lt;= 1.0.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T19:45:24.000Z ##

🟠 CVE-2026-24950 - High (7.5)

Authorization Bypass Through User-Controlled Key vulnerability in themeplugs Authorsy authorsy allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Authorsy: from n/a through &lt;= 1.0.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2856
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-20T21:31:32

2 posts

A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the component Filter Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-02-21T00:17:35.000Z ##

🟠 CVE-2026-2856 - High (8.8)

A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the component Filter Configuration Endpoint. The manipulation of the argument submit-url results in s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:35.000Z ##

🟠 CVE-2026-2856 - High (8.8)

A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the component Filter Configuration Endpoint. The manipulation of the argument submit-url results in s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2855
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-20T21:31:32

2 posts

A vulnerability has been found in D-Link DWR-M960 1.01.07. Affected is the function sub_4648F0 of the file /boafrm/formDdns of the component DDNS Settings Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-02-20T21:00:30.000Z ##

🟠 CVE-2026-2855 - High (8.8)

A vulnerability has been found in D-Link DWR-M960 1.01.07. Affected is the function sub_4648F0 of the file /boafrm/formDdns of the component DDNS Settings Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T21:00:30.000Z ##

🟠 CVE-2026-2855 - High (8.8)

A vulnerability has been found in D-Link DWR-M960 1.01.07. Affected is the function sub_4648F0 of the file /boafrm/formDdns of the component DDNS Settings Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2854
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-20T21:31:24

2 posts

A flaw has been found in D-Link DWR-M960 1.01.07. This impacts the function sub_4611CC of the file /boafrm/formNtp of the component NTP Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-02-20T21:00:20.000Z ##

🟠 CVE-2026-2854 - High (8.8)

A flaw has been found in D-Link DWR-M960 1.01.07. This impacts the function sub_4611CC of the file /boafrm/formNtp of the component NTP Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer over...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T21:00:20.000Z ##

🟠 CVE-2026-2854 - High (8.8)

A flaw has been found in D-Link DWR-M960 1.01.07. This impacts the function sub_4611CC of the file /boafrm/formNtp of the component NTP Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer over...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2853
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-20T21:31:24

2 posts

A vulnerability was detected in D-Link DWR-M960 1.01.07. This affects the function sub_462E14 of the file /boafrm/formSysLog of the component System Log Configuration Endpoint. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-02-20T21:00:10.000Z ##

🟠 CVE-2026-2853 - High (8.8)

A vulnerability was detected in D-Link DWR-M960 1.01.07. This affects the function sub_462E14 of the file /boafrm/formSysLog of the component System Log Configuration Endpoint. Performing a manipulation of the argument submit-url results in stack-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T21:00:10.000Z ##

🟠 CVE-2026-2853 - High (8.8)

A vulnerability was detected in D-Link DWR-M960 1.01.07. This affects the function sub_462E14 of the file /boafrm/formSysLog of the component System Log Configuration Endpoint. Performing a manipulation of the argument submit-url results in stack-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22383
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-20T21:31:23

2 posts

Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes PawFriends - Pet Shop and Veterinary WordPress Theme pawfriends allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PawFriends - Pet Shop and Veterinary WordPress Theme: from n/a through <= 1.3.

thehackerwire@mastodon.social at 2026-02-21T00:31:58.000Z ##

🟠 CVE-2026-22383 - High (7.5)

Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes PawFriends - Pet Shop and Veterinary WordPress Theme pawfriends allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PawFriends -...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:31:58.000Z ##

🟠 CVE-2026-22383 - High (7.5)

Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes PawFriends - Pet Shop and Veterinary WordPress Theme pawfriends allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PawFriends -...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22380
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:31:23

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes UnlimHost unlimhost allows PHP Local File Inclusion.This issue affects UnlimHost: from n/a through <= 1.2.3.

thehackerwire@mastodon.social at 2026-02-21T00:31:48.000Z ##

🟠 CVE-2026-22380 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes UnlimHost unlimhost allows PHP Local File Inclusion.This issue affects UnlimHost: from n/a through &lt;= 1.2.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:31:48.000Z ##

🟠 CVE-2026-22380 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes UnlimHost unlimhost allows PHP Local File Inclusion.This issue affects UnlimHost: from n/a through &lt;= 1.2.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22368
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:31:22

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Redy redy allows PHP Local File Inclusion.This issue affects Redy: from n/a through <= 1.0.2.

thehackerwire@mastodon.social at 2026-02-21T00:45:37.000Z ##

🟠 CVE-2026-22368 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Redy redy allows PHP Local File Inclusion.This issue affects Redy: from n/a through &lt;= 1.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:45:37.000Z ##

🟠 CVE-2026-22368 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Redy redy allows PHP Local File Inclusion.This issue affects Redy: from n/a through &lt;= 1.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22366
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:31:22

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Jude jude allows PHP Local File Inclusion.This issue affects Jude: from n/a through <= 1.3.0.

thehackerwire@mastodon.social at 2026-02-21T00:45:27.000Z ##

🟠 CVE-2026-22366 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Jude jude allows PHP Local File Inclusion.This issue affects Jude: from n/a through &lt;= 1.3.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:45:27.000Z ##

🟠 CVE-2026-22366 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Jude jude allows PHP Local File Inclusion.This issue affects Jude: from n/a through &lt;= 1.3.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22374
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:31:22

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Zio Alberto zioalberto allows PHP Local File Inclusion.This issue affects Zio Alberto: from n/a through <= 1.2.2.

thehackerwire@mastodon.social at 2026-02-21T00:44:41.000Z ##

🟠 CVE-2026-22374 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Zio Alberto zioalberto allows PHP Local File Inclusion.This issue affects Zio Alberto: from n/a through &lt;= 1.2.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:44:41.000Z ##

🟠 CVE-2026-22374 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Zio Alberto zioalberto allows PHP Local File Inclusion.This issue affects Zio Alberto: from n/a through &lt;= 1.2.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22372
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:31:22

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Isida isida allows PHP Local File Inclusion.This issue affects Isida: from n/a through <= 1.4.2.

thehackerwire@mastodon.social at 2026-02-21T00:44:32.000Z ##

🟠 CVE-2026-22372 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Isida isida allows PHP Local File Inclusion.This issue affects Isida: from n/a through &lt;= 1.4.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:44:32.000Z ##

🟠 CVE-2026-22372 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Isida isida allows PHP Local File Inclusion.This issue affects Isida: from n/a through &lt;= 1.4.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22376
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:31:22

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Parkivia parkivia allows PHP Local File Inclusion.This issue affects Parkivia: from n/a through <= 1.1.9.

thehackerwire@mastodon.social at 2026-02-20T21:01:18.000Z ##

🟠 CVE-2026-22376 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Parkivia parkivia allows PHP Local File Inclusion.This issue affects Parkivia: from n/a through &lt;= 1.1.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T21:01:18.000Z ##

🟠 CVE-2026-22376 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Parkivia parkivia allows PHP Local File Inclusion.This issue affects Parkivia: from n/a through &lt;= 1.1.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-68461
(7.2 HIGH)

EPSS: 14.26%

updated 2026-02-20T21:31:16

4 posts

Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a Cross-Site-Scripting (XSS) vulnerability via the animate tag in an SVG document.

2 repos

https://github.com/rxerium/CVE-2025-68461

https://github.com/gotr00t0day/CVE-2025-68461

secdb at 2026-02-20T22:00:20.281Z ##

🚨 [CISA-2026:0220] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-49113 (secdb.nttzen.cloud/cve/detail/)
- Name: RoundCube Webmail Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Roundcube
- Product: Webmail
- Notes: roundcube.net/news/2025/06/01/ ; github.com/roundcube/roundcube ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-68461 (secdb.nttzen.cloud/cve/detail/)
- Name: RoundCube Webmail Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Roundcube
- Product: Webmail
- Notes: roundcube.net/news/2025/12/13/ ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-02-20T21:01:15.000Z ##

CVE ID: CVE-2025-68461
Vendor: Roundcube
Product: Webmail
Date Added: 2026-02-20
Notes: roundcube.net/news/2025/12/13/ ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-02-20T22:00:20.000Z ##

🚨 [CISA-2026:0220] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-49113 (secdb.nttzen.cloud/cve/detail/)
- Name: RoundCube Webmail Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Roundcube
- Product: Webmail
- Notes: roundcube.net/news/2025/06/01/ ; github.com/roundcube/roundcube ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-68461 (secdb.nttzen.cloud/cve/detail/)
- Name: RoundCube Webmail Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Roundcube
- Product: Webmail
- Notes: roundcube.net/news/2025/12/13/ ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260220 #cisa20260220 #cve_2025_49113 #cve_2025_68461 #cve202549113 #cve202568461

##

cisakevtracker@mastodon.social at 2026-02-20T21:01:15.000Z ##

CVE ID: CVE-2025-68461
Vendor: Roundcube
Product: Webmail
Date Added: 2026-02-20
Notes: roundcube.net/news/2025/12/13/ ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-2857
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-20T21:19:30.823000

2 posts

A vulnerability was determined in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_423E00 of the file /boafrm/formPortFw of the component Port Forwarding Configuration Endpoint. This manipulation of the argument submit-url causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-02-21T00:17:44.000Z ##

🟠 CVE-2026-2857 - High (8.8)

A vulnerability was determined in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_423E00 of the file /boafrm/formPortFw of the component Port Forwarding Configuration Endpoint. This manipulation of the argument submit-url cause...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:44.000Z ##

🟠 CVE-2026-2857 - High (8.8)

A vulnerability was determined in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_423E00 of the file /boafrm/formPortFw of the component Port Forwarding Configuration Endpoint. This manipulation of the argument submit-url cause...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2441
(8.8 HIGH)

EPSS: 0.46%

updated 2026-02-20T21:19:30.107000

3 posts

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

4 repos

https://github.com/huseyinstif/CVE-2026-2441-PoC

https://github.com/b1gchoi/CVE-2026-2441_POC

https://github.com/washingtonmaister/CVE-2026-2441

https://github.com/theemperorspath/CVE-2026-2441-PoC

hackernewsrobot@mastodon.social at 2026-02-20T04:07:22.000Z ##

Zero-day CSS: CVE-2026-2441 exists in the wild chromereleases.googleblog.com/

##

cyclone at 2026-02-20T03:51:34.946Z ##

Chrome CSS Zero-Day (CVE-2026-2441)

Google has patched a CVSS 8.8 high-severity use-after-free bug in Chrome’s CSS engine that is being exploited in the wild. This also affects all Chrome-based browsers such as Brave, Edge and Opera.

forum.hashpwn.net/post/10273

##

cyclone@infosec.exchange at 2026-02-20T03:51:34.000Z ##

Chrome CSS Zero-Day (CVE-2026-2441)

Google has patched a CVSS 8.8 high-severity use-after-free bug in Chrome’s CSS engine that is being exploited in the wild. This also affects all Chrome-based browsers such as Brave, Edge and Opera.

forum.hashpwn.net/post/10273

#google #chrome #brave #edge #opera #browser #cybersecurity #css #zeroday #cve20262441 #news #hashpwn

##

CVE-2026-2329
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-02-20T20:57:50.360000

6 posts

An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.

offseq at 2026-02-22T00:00:38.572Z ##

CRITICAL: Grandstream VoIP phones hit by unauthenticated RCE (CVE-2026-2329) — allows call interception & device compromise. No patch yet. Restrict access, disable remote mgmt, and monitor for threats. radar.offseq.com/threat/critic

##

rusty__shackleford@mastodon.social at 2026-02-20T16:47:02.000Z ##

Hacking like the 1990s (cvss 9.8) —
A Cold War Style Vulnerability in Modern VoIP
‏ Presented by LowLevelTV –

[Invidious](yewtu.be/watch?v=I4brAvpjbrg)
[YouTube](youtube.com/watch?v=I4brAvpjbrg)

Writeups:

Douglas McKee
[The Phone is Listening: A Cold War–Style Vulnerability in Modern VoIP](rapid7.com/blog/post/ve-phone-)

Stephen Fewer:
[CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones](rapid7.com/blog/post/ve-cve-20)

#hacking #voip #security #infosec #osint #cve #bug

##

beyondmachines1 at 2026-02-20T08:01:23.035Z ##

Critical Unauthenticated Root Vulnerability in Grandstream GXP1600 VoIP Phones

Grandstream GXP1600 series VoIP phones contain a critical unauthenticated buffer overflow vulnerability (CVE-2026-2329) that allows attackers to gain root access and intercept calls.

**If you are using Grandstream GXP1600 phones, plan a quick update to firmware 1.0.7.81. As a first step, make sure to isolate VoIP hardware on a dedicated, firewalled VLAN and confirm that management interfaces are not reachable from untrusted networks.**

beyondmachines.net/event_detai

##

tierrasapiens@mastodon.social at 2026-02-19T18:54:10.000Z ##

🖲️ #Cybersecurity #Ciberseguridad #Ciberseguranca #Security #Seguridad #Seguranca #News #Noticia #Noticias #Tecnologia #Technology
⚫ Critical Grandstream VoIP Bug Highlights SMB Security Blind Spot
🔗 darkreading.com/threat-intelli

CVE-2026-2329 allows unauthenticated root-level access to SMB phone infrastructure, so attackers can intercept calls, commit toll fraud, and impersonate users.

##

offseq@infosec.exchange at 2026-02-22T00:00:38.000Z ##

CRITICAL: Grandstream VoIP phones hit by unauthenticated RCE (CVE-2026-2329) — allows call interception & device compromise. No patch yet. Restrict access, disable remote mgmt, and monitor for threats. radar.offseq.com/threat/critic #OffSeq #VoIP #Security #RCE

##

beyondmachines1@infosec.exchange at 2026-02-20T08:01:23.000Z ##

Critical Unauthenticated Root Vulnerability in Grandstream GXP1600 VoIP Phones

Grandstream GXP1600 series VoIP phones contain a critical unauthenticated buffer overflow vulnerability (CVE-2026-2329) that allows attackers to gain root access and intercept calls.

**If you are using Grandstream GXP1600 phones, plan a quick update to firmware 1.0.7.81. As a first step, make sure to isolate VoIP hardware on a dedicated, firewalled VLAN and confirm that management interfaces are not reachable from untrusted networks.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-26362
(8.1 HIGH)

EPSS: 0.05%

updated 2026-02-20T20:46:00.037000

3 posts

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Relative Path Traversal vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized modification of critical system files.

thehackerwire@mastodon.social at 2026-02-19T16:32:15.000Z ##

🟠 CVE-2026-26362 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Relative Path Traversal vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized modification of critical system fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:20:42.000Z ##

🟠 CVE-2026-26362 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Relative Path Traversal vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized modification of critical system fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:04:06.000Z ##

🟠 CVE-2026-26362 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Relative Path Traversal vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to unauthorized modification of critical system fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24941
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-20T20:25:21.757000

2 posts

Missing Authorization vulnerability in wpjobportal WP Job Portal wp-job-portal allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Job Portal: from n/a through <= 2.4.4.

thehackerwire@mastodon.social at 2026-02-20T21:01:08.000Z ##

🟠 CVE-2026-24941 - High (7.5)

Missing Authorization vulnerability in wpjobportal WP Job Portal wp-job-portal allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Job Portal: from n/a through &lt;= 2.4.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T21:01:08.000Z ##

🟠 CVE-2026-24941 - High (7.5)

Missing Authorization vulnerability in wpjobportal WP Job Portal wp-job-portal allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Job Portal: from n/a through &lt;= 2.4.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22370
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T20:25:19.853000

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Marveland marveland allows PHP Local File Inclusion.This issue affects Marveland: from n/a through <= 1.3.0.

thehackerwire@mastodon.social at 2026-02-21T00:32:08.000Z ##

🟠 CVE-2026-22370 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Marveland marveland allows PHP Local File Inclusion.This issue affects Marveland: from n/a through &lt;= 1.3.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:32:08.000Z ##

🟠 CVE-2026-22370 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Marveland marveland allows PHP Local File Inclusion.This issue affects Marveland: from n/a through &lt;= 1.3.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22362
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T20:25:19.160000

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Photolia photolia allows PHP Local File Inclusion.This issue affects Photolia: from n/a through <= 1.0.3.

thehackerwire@mastodon.social at 2026-02-21T00:44:50.000Z ##

🟠 CVE-2026-22362 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Photolia photolia allows PHP Local File Inclusion.This issue affects Photolia: from n/a through &lt;= 1.0.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:44:50.000Z ##

🟠 CVE-2026-22362 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Photolia photolia allows PHP Local File Inclusion.This issue affects Photolia: from n/a through &lt;= 1.0.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

secdb at 2026-02-20T22:00:20.281Z ##

🚨 [CISA-2026:0220] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-49113 (secdb.nttzen.cloud/cve/detail/)
- Name: RoundCube Webmail Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Roundcube
- Product: Webmail
- Notes: roundcube.net/news/2025/06/01/ ; github.com/roundcube/roundcube ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-68461 (secdb.nttzen.cloud/cve/detail/)
- Name: RoundCube Webmail Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Roundcube
- Product: Webmail
- Notes: roundcube.net/news/2025/12/13/ ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-02-20T21:00:59.000Z ##

CVE ID: CVE-2025-49113
Vendor: Roundcube
Product: Webmail
Date Added: 2026-02-20
Notes: roundcube.net/news/2025/06/01/ ; github.com/roundcube/roundcube ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-02-20T22:00:20.000Z ##

🚨 [CISA-2026:0220] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-49113 (secdb.nttzen.cloud/cve/detail/)
- Name: RoundCube Webmail Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Roundcube
- Product: Webmail
- Notes: roundcube.net/news/2025/06/01/ ; github.com/roundcube/roundcube ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-68461 (secdb.nttzen.cloud/cve/detail/)
- Name: RoundCube Webmail Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Roundcube
- Product: Webmail
- Notes: roundcube.net/news/2025/12/13/ ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260220 #cisa20260220 #cve_2025_49113 #cve_2025_68461 #cve202549113 #cve202568461

##

cisakevtracker@mastodon.social at 2026-02-20T21:00:59.000Z ##

CVE ID: CVE-2025-49113
Vendor: Roundcube
Product: Webmail
Date Added: 2026-02-20
Notes: roundcube.net/news/2025/06/01/ ; github.com/roundcube/roundcube ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-26286
(8.5 HIGH)

EPSS: 0.03%

updated 2026-02-20T19:45:52.563000

2 posts

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. In versions prior to 1.16.0, a Server-Side Request Forgery (SSRF) vulnerability in the asset download endpoint allows authenticated users to make arbitrary HTTP requests from the server and read the full response body

thehackerwire@mastodon.social at 2026-02-20T20:19:18.000Z ##

🟠 CVE-2026-26286 - High (8.5)

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. In versions prior to 1.16.0, a Server-Side Request Forgery (SSRF...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T20:19:18.000Z ##

🟠 CVE-2026-26286 - High (8.5)

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. In versions prior to 1.16.0, a Server-Side Request Forgery (SSRF...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27487
(7.6 HIGH)

EPSS: 0.05%

updated 2026-02-20T19:26:57

2 posts

## Summary On macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via `security add-generic-password -w ...`. Because OAuth tokens are user-controlled data, this created an OS command injection risk. The fix avoids invoking a shell by using `execFileSync("security", argv)` and passing the updated keychain payload as a lit

thehackerwire@mastodon.social at 2026-02-21T10:19:44.000Z ##

🟠 CVE-2026-27487 - High (7.6)

OpenClaw is a personal AI assistant. In versions 2026.2.13 and below, when using macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via security add-generic-password -w ....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T10:19:44.000Z ##

🟠 CVE-2026-27487 - High (7.6)

OpenClaw is a personal AI assistant. In versions 2026.2.13 and below, when using macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via security add-generic-password -w ....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24959
(8.5 HIGH)

EPSS: 0.03%

updated 2026-02-20T19:23:15.067000

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk js-support-ticket allows Blind SQL Injection.This issue affects JS Help Desk: from n/a through <= 3.0.1.

thehackerwire@mastodon.social at 2026-02-20T19:45:33.000Z ##

🟠 CVE-2026-24959 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk js-support-ticket allows Blind SQL Injection.This issue affects JS Help Desk: from n/a through &lt;= 3.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T19:45:33.000Z ##

🟠 CVE-2026-24959 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk js-support-ticket allows Blind SQL Injection.This issue affects JS Help Desk: from n/a through &lt;= 3.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2021-35402
(10.0 CRITICAL)

EPSS: 0.27%

updated 2026-02-20T19:23:14.200000

1 posts

PROLiNK PRC2402M 20190909 before 2021-06-13 allows live_api.cgi?page=satellite_list OS command injection via shell metacharacters in the ip parameter (for satellite_status).

Matchbook3469@mastodon.social at 2026-02-21T07:09:39.000Z ##

🔴 New security advisory:

CVE-2021-35402 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

CVE-2026-26996
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-20T19:12:33.527000

4 posts

minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V

thehackerwire@mastodon.social at 2026-02-20T19:14:05.000Z ##

🟠 CVE-2026-26996 - High (7.5)

minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildca...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-20T07:30:31.092Z ##

⚠️ CVE-2026-26996: HIGH severity ReDoS in isaacs minimatch (<10.2.1). User-controlled glob patterns can cause exponential backtracking & DoS. Upgrade to 10.2.1+ & validate input! Info: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-20T19:14:05.000Z ##

🟠 CVE-2026-26996 - High (7.5)

minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildca...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-20T07:30:31.000Z ##

⚠️ CVE-2026-26996: HIGH severity ReDoS in isaacs minimatch (<10.2.1). User-controlled glob patterns can cause exponential backtracking & DoS. Upgrade to 10.2.1+ & validate input! Info: radar.offseq.com/threat/cve-20 #OffSeq #ReDoS #NodeSecurity

##

CVE-2026-26321
(7.5 HIGH)

EPSS: 0.06%

updated 2026-02-20T19:12:08.257000

2 posts

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Feishu extension previously allowed `sendMediaFeishu` to treat attacker-controlled `mediaUrl` values as local filesystem paths and read them directly. If an attacker can influence tool calls (directly or via prompt injection), they may be able to exfiltrate local files by supplying paths such as `/etc/passwd` as `mediaUr

thehackerwire@mastodon.social at 2026-02-19T23:59:48.000Z ##

🟠 CVE-2026-26321 - High (7.5)

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Feishu extension previously allowed `sendMediaFeishu` to treat attacker-controlled `mediaUrl` values as local filesystem paths and read them directly. If an attacker can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T23:59:48.000Z ##

🟠 CVE-2026-26321 - High (7.5)

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Feishu extension previously allowed `sendMediaFeishu` to treat attacker-controlled `mediaUrl` values as local filesystem paths and read them directly. If an attacker can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24891
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-20T18:57:15.973000

2 posts

openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus. Versions 5.3.1 and below contain an unsafe deserialization sink in the Gearman worker implementation. The worker function registered as oitc_gearman calls PHP's unserialize() on job payloads without enforcing class restrictions or validating data origin. While the intended dep

thehackerwire@mastodon.social at 2026-02-20T18:32:03.000Z ##

🟠 CVE-2026-24891 - High (7.5)

openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus. Versions 5.3.1 and below contain an unsafe deserialization sink in the Gearman worker implementation. The worker function re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T18:32:03.000Z ##

🟠 CVE-2026-24891 - High (7.5)

openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus. Versions 5.3.1 and below contain an unsafe deserialization sink in the Gearman worker implementation. The worker function re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25715
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-02-20T18:57:15.973000

2 posts

The web management interface of the device allows the administrator username and password to be set to blank values. Once applied, the device permits authentication with empty credentials over the web management interface and Telnet service. This effectively disables authentication across all critical management channels, allowing any network-adjacent attacker to gain full administrative cont

thehackerwire@mastodon.social at 2026-02-20T17:51:09.000Z ##

🔴 CVE-2026-25715 - Critical (9.8)

The web management interface of the device allows the administrator
username and password to be set to blank values. Once applied, the
device permits authentication with empty credentials over the web
management interface and Telnet service. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T17:51:09.000Z ##

🔴 CVE-2026-25715 - Critical (9.8)

The web management interface of the device allows the administrator
username and password to be set to blank values. Once applied, the
device permits authentication with empty credentials over the web
management interface and Telnet service. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27343
(7.5 HIGH)

EPSS: 0.11%

updated 2026-02-20T18:32:34

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in VanKarWai Airtifact airtifact allows PHP Local File Inclusion.This issue affects Airtifact: from n/a through <= 1.2.91.

thehackerwire@mastodon.social at 2026-02-20T18:37:14.000Z ##

🟠 CVE-2026-27343 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in VanKarWai Airtifact airtifact allows PHP Local File Inclusion.This issue affects Airtifact: from n/a through &lt;= 1.2.91.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T18:37:14.000Z ##

🟠 CVE-2026-27343 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in VanKarWai Airtifact airtifact allows PHP Local File Inclusion.This issue affects Airtifact: from n/a through &lt;= 1.2.91.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2818
(8.2 HIGH)

EPSS: 0.07%

updated 2026-02-20T18:31:51

2 posts

A zip-slip path traversal vulnerability in Spring Data Geode's import snapshot functionality allows attackers to write files outside the intended extraction directory. This vulnerability appears to be susceptible on Windows OS only.

thehackerwire@mastodon.social at 2026-02-20T17:38:28.000Z ##

🟠 CVE-2026-2818 - High (8.2)

A zip-slip path traversal vulnerability in Spring Data Geode's import snapshot functionality allows attackers to write files outside the intended extraction directory. This vulnerability appears to be susceptible on Windows OS only.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T17:38:28.000Z ##

🟠 CVE-2026-2818 - High (8.2)

A zip-slip path traversal vulnerability in Spring Data Geode's import snapshot functionality allows attackers to write files outside the intended extraction directory. This vulnerability appears to be susceptible on Windows OS only.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24790
(8.2 HIGH)

EPSS: 0.06%

updated 2026-02-20T18:31:49

3 posts

The underlying PLC of the device can be remotely influenced, without proper safeguards or authentication.

undercodenews@mastodon.social at 2026-02-20T21:52:22.000Z ##

Critical Vulnerability in Industrial Control Systems: Unauthorized Odorization Threat in Welker System

A serious cybersecurity flaw has been identified in the Welker OdorEyes EcoSystem Pulse Bypass System with XL4 Controller, with the potential to trigger unauthorized odorization events. The vulnerability, tagged as CVE-2026-24790, has been classified by the Cybersecurity and Infrastructure Security Agency (CISA) with a CVSS score of 8.2, indicating a high risk of…

undercodenews.com/critical-vul

##

thehackerwire@mastodon.social at 2026-02-20T17:53:46.000Z ##

🟠 CVE-2026-24790 - High (8.2)

The underlying PLC of the device can be remotely influenced, without proper safeguards or authentication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T17:53:46.000Z ##

🟠 CVE-2026-24790 - High (8.2)

The underlying PLC of the device can be remotely influenced, without proper safeguards or authentication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26048
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-20T18:31:49

2 posts

The Wi-Fi router is vulnerable to de-authentication attacks due to the absence of management frame protection, allowing forged deauthentication and disassociation frames to be broadcast without authentication or encryption. An attacker can use this to cause unauthorized disruptions and create a denial-of-service condition.

thehackerwire@mastodon.social at 2026-02-20T17:51:19.000Z ##

🟠 CVE-2026-26048 - High (7.5)

The Wi-Fi router is vulnerable to de-authentication attacks due to the
absence of management frame protection, allowing forged deauthentication
and disassociation frames to be broadcast without authentication or
encryption. An attacker can use ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T17:51:19.000Z ##

🟠 CVE-2026-26048 - High (7.5)

The Wi-Fi router is vulnerable to de-authentication attacks due to the
absence of management frame protection, allowing forged deauthentication
and disassociation frames to be broadcast without authentication or
encryption. An attacker can use ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24455
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-20T18:31:48

2 posts

The embedded web interface of the device does not support HTTPS/TLS for authentication and uses HTTP Basic Authentication. Traffic is encoded but not encrypted, exposing user credentials to passive interception by attackers on the same network.

thehackerwire@mastodon.social at 2026-02-20T17:51:29.000Z ##

🟠 CVE-2026-24455 - High (7.5)

The embedded web interface of the device does not support HTTPS/TLS for
authentication and uses HTTP Basic Authentication. Traffic is encoded
but not encrypted, exposing user credentials to passive interception by
attackers on the same network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T17:51:29.000Z ##

🟠 CVE-2026-24455 - High (7.5)

The embedded web interface of the device does not support HTTPS/TLS for
authentication and uses HTTP Basic Authentication. Traffic is encoded
but not encrypted, exposing user credentials to passive interception by
attackers on the same network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20761
(8.1 HIGH)

EPSS: 0.25%

updated 2026-02-20T16:55:22.933000

4 posts

A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and prior, which would allow remote attackers, in the LON IP-852 management messages, to send specially crafted IP-852 messages resulting in arbitrary OS command execution on the device.

thehackerwire@mastodon.social at 2026-02-20T17:09:13.000Z ##

🟠 CVE-2026-20761 - High (8.1)

A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and
prior, which would allow remote attackers, in the LON IP-852 management
messages, to send specially crafted IP-852 messages resulting in
arbitrary OS command execution on th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T17:08:19.000Z ##

🟠 CVE-2026-20761 - High (8.1)

A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and
prior, which would allow remote attackers, in the LON IP-852 management
messages, to send specially crafted IP-852 messages resulting in
arbitrary OS command execution on th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T17:09:13.000Z ##

🟠 CVE-2026-20761 - High (8.1)

A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and
prior, which would allow remote attackers, in the LON IP-852 management
messages, to send specially crafted IP-852 messages resulting in
arbitrary OS command execution on th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T17:08:19.000Z ##

🟠 CVE-2026-20761 - High (8.1)

A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and
prior, which would allow remote attackers, in the LON IP-852 management
messages, to send specially crafted IP-852 messages resulting in
arbitrary OS command execution on th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26980
(9.4 CRITICAL)

EPSS: 0.07%

updated 2026-02-20T16:48:10

4 posts

### Impact A SQL injection vulnerability existed in Ghost's Content API that allowed unauthenticated attackers to read arbitrary data from the database. ### Vulnerable Versions This vulnerability is present in Ghost v3.24.0 to v6.19.0. ### Patches v6.19.1 contains a fix for this issue. ### Workarounds There is no application-level workaround. The Content API key is public by design, so res

offseq at 2026-02-20T06:00:31.615Z ##

⚠️ CVE-2026-26980: CRITICAL SQL Injection in TryGhost Ghost CMS (3.24.0 – 6.19.0). Unauth attackers can read DB data remotely. Patch to 6.19.1 now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-20T02:18:01.000Z ##

🔴 CVE-2026-26980 - Critical (9.4)

Ghost is a Node.js content management system. Versions 3.24.0 through 6.19.0 allow unauthenticated attackers to perform arbitrary reads from the database. This issue has been fixed in version 6.19.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-20T06:00:31.000Z ##

⚠️ CVE-2026-26980: CRITICAL SQL Injection in TryGhost Ghost CMS (3.24.0 – 6.19.0). Unauth attackers can read DB data remotely. Patch to 6.19.1 now! radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #GhostCMS #Vuln

##

thehackerwire@mastodon.social at 2026-02-20T02:18:01.000Z ##

🔴 CVE-2026-26980 - Critical (9.4)

Ghost is a Node.js content management system. Versions 3.24.0 through 6.19.0 allow unauthenticated attackers to perform arbitrary reads from the database. This issue has been fixed in version 6.19.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27002(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-02-20T16:47:05

2 posts

## Summary A configuration injection issue in the Docker tool sandbox could allow dangerous Docker options (bind mounts, host networking, unconfined profiles) to be applied, enabling container escape or host data access. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `<= 2026.2.14` - Fixed version: `>= 2026.2.15` (next release) ## Impact If an attacker can influ

thehackerwire@mastodon.social at 2026-02-20T18:21:34.000Z ##

🔴 CVE-2026-27002 - Critical (9.8)

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a configuration injection issue in the Docker tool sandbox could allow dangerous Docker options (bind mounts, host networking, unconfined profiles) to be applied, enabling container ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T18:21:34.000Z ##

🔴 CVE-2026-27002 - Critical (9.8)

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a configuration injection issue in the Docker tool sandbox could allow dangerous Docker options (bind mounts, host networking, unconfined profiles) to be applied, enabling container ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27001(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-02-20T16:47:00

2 posts

## Overview OpenClaw embedded the current working directory (workspace path) into the agent system prompt without sanitization. If an attacker can cause OpenClaw to run inside a directory whose name contains control/format characters (for example newlines or Unicode bidi/zero-width markers), those characters could break the prompt structure and inject attacker-controlled instructions. ## Impact P

thehackerwire@mastodon.social at 2026-02-20T18:21:24.000Z ##

🟠 CVE-2026-27001 - High (7.8)

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, OpenClaw embedded the current working directory (workspace path) into the agent system prompt without sanitization. If an attacker can cause OpenClaw to run inside a directory whose ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T18:21:24.000Z ##

🟠 CVE-2026-27001 - High (7.8)

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, OpenClaw embedded the current working directory (workspace path) into the agent system prompt without sanitization. If an attacker can cause OpenClaw to run inside a directory whose ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26323(CVSS UNKNOWN)

EPSS: 0.18%

updated 2026-02-20T16:45:55

2 posts

### Summary Command injection in the maintainer/dev script `scripts/update-clawtributors.ts`. ### Impact Affects contributors/maintainers (or CI) who run `bun scripts/update-clawtributors.ts` in a source checkout that contains a malicious commit author email (e.g. crafted `@users.noreply.github.com` values). Normal CLI usage is not affected (`npm i -g openclaw`): this script is not part of the s

thehackerwire@mastodon.social at 2026-02-20T19:14:14.000Z ##

🟠 CVE-2026-26323 - High (8.8)

OpenClaw is a personal AI assistant. Versions 2026.1.8 through 2026.2.13 have a command injection in the maintainer/dev script `scripts/update-clawtributors.ts`. The issue affects contributors/maintainers (or CI) who run `bun scripts/update-clawtr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T19:14:14.000Z ##

🟠 CVE-2026-26323 - High (8.8)

OpenClaw is a personal AI assistant. Versions 2026.1.8 through 2026.2.13 have a command injection in the maintainer/dev script `scripts/update-clawtributors.ts`. The issue affects contributors/maintainers (or CI) who run `bun scripts/update-clawtr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26065
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-20T16:45:18.507000

6 posts

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files are written in 'wb' mode, silently overwriting ex

thehackerwire@mastodon.social at 2026-02-20T18:21:14.000Z ##

🟠 CVE-2026-26065 - High (8.8)

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T17:08:28.000Z ##

🟠 CVE-2026-26065 - High (8.8)

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-20T03:00:30.589Z ##

⚠️ CRITICAL vuln: calibre <9.3.0 (CVE-2026-26065) allows arbitrary file writes via path traversal in PDB reader. Risks: code execution, DoS. Patch to 9.3.0+ ASAP! No known exploits yet. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-20T18:21:14.000Z ##

🟠 CVE-2026-26065 - High (8.8)

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T17:08:28.000Z ##

🟠 CVE-2026-26065 - High (8.8)

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-20T03:00:30.000Z ##

⚠️ CRITICAL vuln: calibre <9.3.0 (CVE-2026-26065) allows arbitrary file writes via path traversal in PDB reader. Risks: code execution, DoS. Patch to 9.3.0+ ASAP! No known exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Calibre #InfoSec

##

CVE-2026-26324
(7.5 HIGH)

EPSS: 0.01%

updated 2026-02-20T16:44:49

2 posts

### Summary OpenClaw's SSRF protection could be bypassed using full-form IPv4-mapped IPv6 literals such as `0:0:0:0:0:ffff:7f00:1` (which is `127.0.0.1`). This could allow requests that should be blocked (loopback / private network / link-local metadata) to pass the SSRF guard. - Vulnerable component: SSRF guard (`src/infra/net/ssrf.ts`) - Issue type: SSRF protection bypass ### Affected Package

thehackerwire@mastodon.social at 2026-02-20T00:00:08.000Z ##

🟠 CVE-2026-26324 - High (7.5)

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, OpenClaw's SSRF protection could be bypassed using full-form IPv4-mapped IPv6 literals such as `0:0:0:0:0:ffff:7f00:1` (which is `127.0.0.1`). This could allow requests that should b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:00:08.000Z ##

🟠 CVE-2026-26324 - High (7.5)

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, OpenClaw's SSRF protection could be bypassed using full-form IPv4-mapped IPv6 literals such as `0:0:0:0:0:ffff:7f00:1` (which is `127.0.0.1`). This could allow requests that should b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26322
(7.6 HIGH)

EPSS: 0.01%

updated 2026-02-20T16:44:39

2 posts

## Summary The Gateway tool accepted a tool-supplied `gatewayUrl` without sufficient restrictions, which could cause the OpenClaw host to attempt outbound WebSocket connections to user-specified targets. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `<= 2026.2.13` - Patched versions: `>= 2026.2.14` (planned) ## What Is Needed To Trigger This This requires the a

thehackerwire@mastodon.social at 2026-02-19T23:59:57.000Z ##

🟠 CVE-2026-26322 - High (7.6)

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Gateway tool accepted a tool-supplied `gatewayUrl` without sufficient restrictions, which could cause the OpenClaw host to attempt outbound WebSocket connections to user...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T23:59:57.000Z ##

🟠 CVE-2026-26322 - High (7.6)

OpenClaw is a personal AI assistant. Prior to OpenClaw version 2026.2.14, the Gateway tool accepted a tool-supplied `gatewayUrl` without sufficient restrictions, which could cause the OpenClaw host to attempt outbound WebSocket connections to user...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26319
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-20T16:44:20

2 posts

## Summary In affected versions, OpenClaw's optional `@openclaw/voice-call` plugin Telnyx webhook handler could accept unsigned inbound webhook requests when `telnyx.publicKey` was not configured, allowing unauthenticated callers to forge Telnyx events. This only impacts deployments where the Voice Call plugin is installed, enabled, and the webhook endpoint is reachable from the attacker (for ex

thehackerwire@mastodon.social at 2026-02-20T00:05:14.000Z ##

🟠 CVE-2026-26319 - High (7.5)

OpenClaw is a personal AI assistant. Versions 2026.2.13 and below allow the optional @openclaw/voice-call plugin Telnyx webhook handler to accept unsigned inbound webhook requests when telnyx.publicKey is not configured, enabling unauthenticated c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:05:14.000Z ##

🟠 CVE-2026-26319 - High (7.5)

OpenClaw is a personal AI assistant. Versions 2026.2.13 and below allow the optional @openclaw/voice-call plugin Telnyx webhook handler to accept unsigned inbound webhook requests when telnyx.publicKey is not configured, enabling unauthenticated c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26316
(7.5 HIGH)

EPSS: 0.06%

updated 2026-02-20T16:44:14

2 posts

### Summary In affected versions, the optional BlueBubbles iMessage channel plugin could accept webhook requests as authenticated based only on the TCP peer address being loopback (`127.0.0.1`, `::1`, `::ffff:127.0.0.1`) even when the configured webhook secret was missing or incorrect. This does not affect the default iMessage integration unless BlueBubbles is installed and enabled. ### Affected

thehackerwire@mastodon.social at 2026-02-20T00:05:24.000Z ##

🟠 CVE-2026-26316 - High (7.5)

OpenClaw is a personal AI assistant. Prior to 2026.2.13, the optional BlueBubbles iMessage channel plugin could accept webhook requests as authenticated based only on the TCP peer address being loopback (`127.0.0.1`, `::1`, `::ffff:127.0.0.1`) eve...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:05:24.000Z ##

🟠 CVE-2026-26316 - High (7.5)

OpenClaw is a personal AI assistant. Prior to 2026.2.13, the optional BlueBubbles iMessage channel plugin could accept webhook requests as authenticated based only on the TCP peer address being loopback (`127.0.0.1`, `::1`, `::ffff:127.0.0.1`) eve...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22267
(8.1 HIGH)

EPSS: 0.01%

updated 2026-02-20T16:33:47.890000

1 posts

Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Incorrect Privilege Assignment vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

thehackerwire@mastodon.social at 2026-02-19T15:44:45.000Z ##

🟠 CVE-2026-22267 - High (8.1)

Dell PowerProtect Data Manager, version(s) prior to 19.22, contain(s) an Incorrect Privilege Assignment vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26339
(9.8 CRITICAL)

EPSS: 0.17%

updated 2026-02-20T15:32:04

4 posts

Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve remote code execution through the argument injection vulnerability, which exists in the document processing functionality.

thehackerwire@mastodon.social at 2026-02-19T19:00:00.000Z ##

🔴 CVE-2026-26339 - Critical (9.8)

Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve remote code execution through the argument injection vulnerability, which exists in the document processing functionality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-19T18:00:22.175Z ##

🔎 CRITICAL: CVE-2026-26339 in Hyland Alfresco Transformation Service (Enterprise) enables unauthenticated SSRF → RCE. Restrict access, monitor for abuse, patch ASAP. All versions at risk. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-19T19:00:00.000Z ##

🔴 CVE-2026-26339 - Critical (9.8)

Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve remote code execution through the argument injection vulnerability, which exists in the document processing functionality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T18:00:22.000Z ##

🔎 CRITICAL: CVE-2026-26339 in Hyland Alfresco Transformation Service (Enterprise) enables unauthenticated SSRF → RCE. Restrict access, monitor for abuse, patch ASAP. All versions at risk. radar.offseq.com/threat/cve-20 #OffSeq #CVE202626339 #SSRF #RCE #Alfresco

##

CVE-2026-26337
(8.2 HIGH)

EPSS: 0.11%

updated 2026-02-20T15:20:29.797000

2 posts

Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve both arbitrary file read and server-side request forgery through the absolute path traversal.

thehackerwire@mastodon.social at 2026-02-19T19:00:10.000Z ##

🟠 CVE-2026-26337 - High (8.2)

Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve both arbitrary file read and server-side request forgery through the absolute path traversal.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T19:00:10.000Z ##

🟠 CVE-2026-26337 - High (8.2)

Hyland Alfresco Transformation Service allows unauthenticated attackers to achieve both arbitrary file read and server-side request forgery through the absolute path traversal.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26336
(7.5 HIGH)

EPSS: 0.06%

updated 2026-02-20T15:20:29.647000

2 posts

Hyland Alfresco allows unauthenticated attackers to read arbitrary files from protected directories (like WEB-INF) via the "/share/page/resource/" endpoint, thus leading to the disclosure of sensitive configuration files.

thehackerwire@mastodon.social at 2026-02-19T18:00:57.000Z ##

🟠 CVE-2026-26336 - High (7.5)

Hyland Alfresco allows unauthenticated attackers to read arbitrary files from protected directories (like WEB-INF) via the "/share/page/resource/" endpoint, thus leading to the disclosure of sensitive configuration files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T18:00:57.000Z ##

🟠 CVE-2026-26336 - High (7.5)

Hyland Alfresco allows unauthenticated attackers to read arbitrary files from protected directories (like WEB-INF) via the "/share/page/resource/" endpoint, thus leading to the disclosure of sensitive configuration files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26050
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-20T13:49:47.623000

4 posts

The installer for ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール versions prior to Ver.1.3.7 contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with administrative privileges.

offseq at 2026-02-20T10:30:33.789Z ##

🚨 Ricoh ジョブログ集計ツール (<1.3.7) has a HIGH severity DLL search path issue (CVE-2026-26050). Exploiting this enables admin-level code execution during install. Update to v1.3.7+ and restrict local access. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-20T09:19:41.000Z ##

🟠 CVE-2026-26050 - High (7.8)

The installer for ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール versions prior to Ver.1.3.7 contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-20T10:30:33.000Z ##

🚨 Ricoh ジョブログ集計ツール (<1.3.7) has a HIGH severity DLL search path issue (CVE-2026-26050). Exploiting this enables admin-level code execution during install. Update to v1.3.7+ and restrict local access. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Ricoh

##

thehackerwire@mastodon.social at 2026-02-20T09:19:41.000Z ##

🟠 CVE-2026-26050 - High (7.8)

The installer for ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール versions prior to Ver.1.3.7 contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26975
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-20T13:49:47.623000

4 posts

Music Assistant is an open-source media library manager that integrates streaming services with connected speakers. Versions 2.6.3 and below allow unauthenticated network-adjacent attackers to execute arbitrary code on affected installations. The music/playlists/update API allows users to bypass the .m3u extension enforcement and write files anywhere on the filesystem, which is exacerbated by the

offseq at 2026-02-20T01:30:28.762Z ##

🎵 CVE-2026-26975: HIGH severity RCE in Music Assistant server <2.7.0. Unauthenticated attackers can write arbitrary files via playlist update API — root compromise possible if running as root. Upgrade to 2.7.0+ now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-20T01:17:30.000Z ##

🟠 CVE-2026-26975 - High (8.8)

Music Assistant is an open-source media library manager that integrates streaming services with connected speakers. Versions 2.6.3 and below allow unauthenticated network-adjacent attackers to execute arbitrary code on affected installations. The ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-20T01:30:28.000Z ##

🎵 CVE-2026-26975: HIGH severity RCE in Music Assistant server <2.7.0. Unauthenticated attackers can write arbitrary files via playlist update API — root compromise possible if running as root. Upgrade to 2.7.0+ now! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #RCE #MusicAssistant

##

thehackerwire@mastodon.social at 2026-02-20T01:17:30.000Z ##

🟠 CVE-2026-26975 - High (8.8)

Music Assistant is an open-source media library manager that integrates streaming services with connected speakers. Versions 2.6.3 and below allow unauthenticated network-adjacent attackers to execute arbitrary code on affected installations. The ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-30411
(10.0 CRITICAL)

EPSS: 0.02%

updated 2026-02-20T13:49:47.623000

4 posts

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

thehackerwire@mastodon.social at 2026-02-20T01:18:46.000Z ##

🔴 CVE-2025-30411 - Critical (10)

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:17:50.000Z ##

🔴 CVE-2025-30411 - Critical (10)

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:18:46.000Z ##

🔴 CVE-2025-30411 - Critical (10)

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:17:50.000Z ##

🔴 CVE-2025-30411 - Critical (10)

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26275
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-20T13:49:47.623000

2 posts

httpsig-hyper is a hyper extension for http message signatures. An issue was discovered in `httpsig-hyper` prior to version 0.0.23 where Digest header verification could incorrectly succeed due to misuse of Rust's `matches!` macro. Specifically, the comparison `if matches!(digest, _expected_digest)` treated `_expected_digest` as a pattern binding rather than a value comparison, resulting in uncond

thehackerwire@mastodon.social at 2026-02-20T00:19:54.000Z ##

🟠 CVE-2026-26275 - High (7.5)

httpsig-hyper is a hyper extension for http message signatures. An issue was discovered in `httpsig-hyper` prior to version 0.0.23 where Digest header verification could incorrectly succeed due to misuse of Rust's `matches!` macro. Specifically, t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:19:54.000Z ##

🟠 CVE-2026-26275 - High (7.5)

httpsig-hyper is a hyper extension for http message signatures. An issue was discovered in `httpsig-hyper` prior to version 0.0.23 where Digest header verification could incorrectly succeed due to misuse of Rust's `matches!` macro. Specifically, t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26278
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-20T13:49:47.623000

2 posts

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.1.3 through 5.3.5, the XML parser can be forced to do an unlimited amount of entity expansion. With a very small XML input, it’s possible to make the parser spend seconds or even minutes processing a single request, effectively freezing the

thehackerwire@mastodon.social at 2026-02-19T21:01:19.000Z ##

🟠 CVE-2026-26278 - High (7.5)

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.1.3 through 5.3.5, the XML parser can be forced to do an unlimited amount of entity expa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T21:01:19.000Z ##

🟠 CVE-2026-26278 - High (7.5)

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 4.1.3 through 5.3.5, the XML parser can be forced to do an unlimited amount of entity expa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25940
(8.1 HIGH)

EPSS: 0.03%

updated 2026-02-20T13:49:47.623000

2 posts

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following property, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim hovers o

thehackerwire@mastodon.social at 2026-02-19T16:31:16.000Z ##

🟠 CVE-2026-25940 - High (8.1)

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T16:30:16.000Z ##

⚠️ HIGH severity: CVE-2026-25940 in jsPDF (<4.2.0) allows arbitrary PDF object injection via Acroform, leading to code execution on user interaction. Patch to 4.2.0+ & sanitize inputs now! radar.offseq.com/threat/cve-20 #OffSeq #jsPDF #vuln #AppSec

##

CVE-2025-10970
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-02-20T12:31:26

3 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kolay Software Inc. Talentics allows Blind SQL Injection.This issue affects Talentics: through 20022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Matchbook3469@mastodon.social at 2026-02-21T13:33:14.000Z ##

🔴 New security advisory:

CVE-2025-10970 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

thehackerwire@mastodon.social at 2026-02-20T13:01:09.000Z ##

🔴 CVE-2025-10970 - Critical (9.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kolay Software Inc. Talentics allows Blind SQL Injection.This issue affects Talentics: through 20022026.

NOTE: The vendor was contacted early ab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T13:01:09.000Z ##

🔴 CVE-2025-10970 - Critical (9.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kolay Software Inc. Talentics allows Blind SQL Injection.This issue affects Talentics: through 20022026.

NOTE: The vendor was contacted early ab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-30416
(10.0 CRITICAL)

EPSS: 0.01%

updated 2026-02-20T03:31:45

2 posts

Sensitive data disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

thehackerwire@mastodon.social at 2026-02-20T01:18:20.000Z ##

🔴 CVE-2025-30416 - Critical (10)

Sensitive data disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:18:20.000Z ##

🔴 CVE-2025-30416 - Critical (10)

Sensitive data disclosure and manipulation due to missing authorization. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-30412
(10.0 CRITICAL)

EPSS: 0.02%

updated 2026-02-20T03:31:45

2 posts

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

thehackerwire@mastodon.social at 2026-02-20T01:18:11.000Z ##

🔴 CVE-2025-30412 - Critical (10)

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:18:11.000Z ##

🔴 CVE-2025-30412 - Critical (10)

Sensitive data disclosure and manipulation due to improper authentication. The following products are affected: Acronis Cyber Protect 16 (Linux, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, Windows) before build 41800.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-30410
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-02-20T03:31:45

2 posts

Sensitive data disclosure and manipulation due to missing authentication. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 39870, Acronis Cyber Protect 16 (Linux, macOS, Windows) before build 39938, Acronis Cyber Protect 15 (Linux, macOS, Windows) before build 41800.

thehackerwire@mastodon.social at 2026-02-20T01:17:41.000Z ##

🔴 CVE-2025-30410 - Critical (9.8)

Sensitive data disclosure and manipulation due to missing authentication. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 39870, Acronis Cyber Protect 16 (Linux, macOS, Windows) before bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:17:41.000Z ##

🔴 CVE-2025-30410 - Critical (9.8)

Sensitive data disclosure and manipulation due to missing authentication. The following products are affected: Acronis Cyber Protect Cloud Agent (Linux, macOS, Windows) before build 39870, Acronis Cyber Protect 16 (Linux, macOS, Windows) before bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0573
(9.1 CRITICAL)

EPSS: 0.07%

updated 2026-02-20T00:32:59

2 posts

An URL redirection vulnerability was identified in GitHub Enterprise Server that allowed attacker-controlled redirects to leak sensitive authorization tokens. The repository_pages API insecurely followed HTTP redirects when fetching artifact URLs, preserving the authorization header containing a privileged JWT. An authenticated user could redirect these requests to an attacker-controlled domain, e

thehackerwire@mastodon.social at 2026-02-20T01:31:48.000Z ##

🔴 CVE-2026-0573 - Critical (9)

An URL redirection vulnerability was identified in GitHub Enterprise Server that allowed attacker-controlled redirects to leak sensitive authorization tokens. The repository_pages API insecurely followed HTTP redirects when fetching artifact URLs,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:31:48.000Z ##

🔴 CVE-2026-0573 - Critical (9)

An URL redirection vulnerability was identified in GitHub Enterprise Server that allowed attacker-controlled redirects to leak sensitive authorization tokens. The repository_pages API insecurely followed HTTP redirects when fetching artifact URLs,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23542
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-20T00:32:59

2 posts

Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Restaurant grandrestaurant allows Object Injection.This issue affects Grand Restaurant: from n/a through <= 7.0.10.

thehackerwire@mastodon.social at 2026-02-20T00:50:35.000Z ##

🔴 CVE-2026-23542 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Restaurant grandrestaurant allows Object Injection.This issue affects Grand Restaurant: from n/a through &lt;= 7.0.10.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:50:35.000Z ##

🔴 CVE-2026-23542 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in ThemeGoods Grand Restaurant grandrestaurant allows Object Injection.This issue affects Grand Restaurant: from n/a through &lt;= 7.0.10.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21535
(8.2 HIGH)

EPSS: 0.10%

updated 2026-02-20T00:31:59

4 posts

Improper access control in Microsoft Teams allows an unauthorized attacker to disclose information over a network.

AAKL at 2026-02-20T18:47:40.292Z ##

If you missed this, Microsoft posted this advisory yesterday:

Critical: CVE-2026-21535: Microsoft Teams Information Disclosure Vulnerability msrc.microsoft.com/update-guid

##

thehackerwire@mastodon.social at 2026-02-20T00:05:04.000Z ##

🟠 CVE-2026-21535 - High (8.2)

Improper access control in Microsoft Teams allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-02-20T18:47:40.000Z ##

If you missed this, Microsoft posted this advisory yesterday:

Critical: CVE-2026-21535: Microsoft Teams Information Disclosure Vulnerability msrc.microsoft.com/update-guid #infosec #Microsoft #Teams

##

thehackerwire@mastodon.social at 2026-02-20T00:05:04.000Z ##

🟠 CVE-2026-21535 - High (8.2)

Improper access control in Microsoft Teams allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23549
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-20T00:31:53

2 posts

Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through <= 5.1.1.

thehackerwire@mastodon.social at 2026-02-20T01:28:18.000Z ##

🔴 CVE-2026-23549 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through &lt;= 5.1.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:28:18.000Z ##

🔴 CVE-2026-23549 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in magepeopleteam WpEvently mage-eventpress allows Object Injection.This issue affects WpEvently: from n/a through &lt;= 5.1.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23544
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-19T22:16:41.747000

2 posts

Deserialization of Untrusted Data vulnerability in codetipi Valenti valenti allows Object Injection.This issue affects Valenti: from n/a through <= 5.6.3.5.

thehackerwire@mastodon.social at 2026-02-20T00:50:45.000Z ##

🟠 CVE-2026-23544 - High (8.8)

Deserialization of Untrusted Data vulnerability in codetipi Valenti valenti allows Object Injection.This issue affects Valenti: from n/a through &lt;= 5.6.3.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:50:45.000Z ##

🟠 CVE-2026-23544 - High (8.8)

Deserialization of Untrusted Data vulnerability in codetipi Valenti valenti allows Object Injection.This issue affects Valenti: from n/a through &lt;= 5.6.3.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13590
(9.1 CRITICAL)

EPSS: 0.21%

updated 2026-02-19T22:11:44

1 posts

A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution. By leveraging the vulnerability, a malicious actor may perform Remote Code Execution by uploading a specially crafted payload.

thehackerwire@mastodon.social at 2026-02-19T15:44:34.000Z ##

🔴 CVE-2025-13590 - Critical (9.1)

A malicious actor with administrative privileges can upload an arbitrary file to a user-controlled location within the deployment via a system REST API. Successful uploads may lead to remote code execution.

By leveraging the vulnerability, a ma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27206
(8.1 HIGH)

EPSS: 0.29%

updated 2026-02-19T22:05:43

2 posts

### Description The `zumba/json-serializer` library allows deserialization of PHP objects from JSON using a special `@type` field. Prior to version 3.2.3, the deserializer would instantiate any class specified in the `@type` field without restriction. When processing untrusted JSON input, this behavior may allow an attacker to instantiate arbitrary classes available in the application. If a vul

thehackerwire@mastodon.social at 2026-02-21T07:17:59.000Z ##

🟠 CVE-2026-27206 - High (8.1)

Zumba Json Serializer is a library to serialize PHP variables in JSON format. In versions 3.2.2 and below, the library allows deserialization of PHP objects from JSON using a special @type field. The deserializer instantiates any class specified i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T07:17:59.000Z ##

🟠 CVE-2026-27206 - High (8.1)

Zumba Json Serializer is a library to serialize PHP variables in JSON format. In versions 3.2.2 and below, the library allows deserialization of PHP objects from JSON using a special @type field. The deserializer instantiates any class specified i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27013
(7.6 HIGH)

EPSS: 0.04%

updated 2026-02-19T21:57:27

2 posts

fabric.js applies `escapeXml()` to text content during SVG export (`src/shapes/Text/TextSVGExportMixin.ts:186`) but fails to apply it to other user-controlled string values that are interpolated into SVG attribute markup. When attacker-controlled JSON is loaded via `loadFromJSON()` and later exported via `toSVG()`, the unescaped values break out of XML attributes and inject arbitrary SVG elements

thehackerwire@mastodon.social at 2026-02-19T21:00:20.000Z ##

🟠 CVE-2026-27013 - High (7.6)

Fabric.js is a Javascript HTML5 canvas library. Prior to version 7.2.0, Fabric.js applies `escapeXml()` to text content during SVG export (`src/shapes/Text/TextSVGExportMixin.ts:186`) but fails to apply it to other user-controlled string values th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T21:00:20.000Z ##

🟠 CVE-2026-27013 - High (7.6)

Fabric.js is a Javascript HTML5 canvas library. Prior to version 7.2.0, Fabric.js applies `escapeXml()` to text content during SVG export (`src/shapes/Text/TextSVGExportMixin.ts:186`) but fails to apply it to other user-controlled string values th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26318
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-19T21:57:18

2 posts

# Command Injection via Unsanitized `locate` Output in `versions()` — systeminformation **Package:** systeminformation (npm) **Tested Version:** 5.30.7 **Affected Platform:** Linux **Author:** Sebastian Hildebrandt **Weekly Downloads:** ~5,000,000+ **Repository:** https://github.com/sebhildebrandt/systeminformation **Severity:** Medium **CWE:** CWE-78 (OS Command Injection) ---

thehackerwire@mastodon.social at 2026-02-19T21:00:11.000Z ##

🟠 CVE-2026-26318 - High (8.8)

systeminformation is a System and OS information library for node.js. Versions prior to 5.31.0 are vulnerable to command injection via unsanitized `locate` output in `versions()`. Version 5.31.0 fixes the issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T21:00:11.000Z ##

🟠 CVE-2026-26318 - High (8.8)

systeminformation is a System and OS information library for node.js. Versions prior to 5.31.0 are vulnerable to command injection via unsanitized `locate` output in `versions()`. Version 5.31.0 fixes the issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26280
(8.4 HIGH)

EPSS: 0.06%

updated 2026-02-19T21:57:03

2 posts

### Summary A command injection vulnerability in the `wifiNetworks()` function allows an attacker to execute arbitrary OS commands via an unsanitized network interface parameter in the retry code path. ### Details In `lib/wifi.js`, the `wifiNetworks()` function sanitizes the `iface` parameter on the initial call (line 437). However, when the initial scan returns empty results, a `setTimeout` retr

thehackerwire@mastodon.social at 2026-02-19T21:01:29.000Z ##

🟠 CVE-2026-26280 - High (8.4)

systeminformation is a System and OS information library for node.js. In versions prior to 5.30.8, a command injection vulnerability in the `wifiNetworks()` function allows an attacker to execute arbitrary OS commands via an unsanitized network in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T21:01:29.000Z ##

🟠 CVE-2026-26280 - High (8.4)

systeminformation is a System and OS information library for node.js. In versions prior to 5.30.8, a command injection vulnerability in the `wifiNetworks()` function allows an attacker to execute arbitrary OS commands via an unsanitized network in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26267
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-19T21:56:47

2 posts

### Impact The `#[contractimpl]` macro contains a bug in how it wires up function calls. In Rust, you can define functions on a type in two ways: - Directly on the type as an inherent function: ```rust impl MyContract { fn value() { ... } } ``` - Through a trait ```rust impl Trait for MyContract { fn value() { ... } } ``` These are two separate functions that happen

thehackerwire@mastodon.social at 2026-02-19T21:00:29.000Z ##

🟠 CVE-2026-26267 - High (7.5)

soroban-sdk is a Rust SDK for Soroban contracts. Prior to versions 22.0.10, 23.5.2, and 25.1.1, the `#[contractimpl]` macro contains a bug in how it wires up function calls. `#[contractimpl]` generates code that uses `MyContract::value()` style ca...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T21:00:29.000Z ##

🟠 CVE-2026-26267 - High (7.5)

soroban-sdk is a Rust SDK for Soroban contracts. Prior to versions 22.0.10, 23.5.2, and 25.1.1, the `#[contractimpl]` macro contains a bug in how it wires up function calls. `#[contractimpl]` generates code that uses `MyContract::value()` style ca...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27476
(9.8 CRITICAL)

EPSS: 0.27%

updated 2026-02-19T21:30:57

4 posts

RustFly 2.0.0 contains a command injection vulnerability in its remote UI control mechanism that accepts hex-encoded instructions over UDP port 5005 without proper sanitization. Attackers can send crafted hex-encoded payloads containing system commands to execute arbitrary operations on the target system, including reverse shell establishment and command execution.

offseq at 2026-02-20T09:00:32.018Z ##

⚠️ CRITICAL: CVE-2026-27476 in Bixat RustFly 2.0.0 lets remote attackers run arbitrary system commands over UDP port 5005 — no auth needed. Block 5005, monitor for hex payloads, & audit systems now. Patch ASAP! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-20T00:20:03.000Z ##

🔴 CVE-2026-27476 - Critical (9.8)

RustFly 2.0.0 contains a command injection vulnerability in its remote UI control mechanism that accepts hex-encoded instructions over UDP port 5005 without proper sanitization. Attackers can send crafted hex-encoded payloads containing system com...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-20T09:00:32.000Z ##

⚠️ CRITICAL: CVE-2026-27476 in Bixat RustFly 2.0.0 lets remote attackers run arbitrary system commands over UDP port 5005 — no auth needed. Block 5005, monitor for hex payloads, & audit systems now. Patch ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Infosec

##

thehackerwire@mastodon.social at 2026-02-20T00:20:03.000Z ##

🔴 CVE-2026-27476 - Critical (9.8)

RustFly 2.0.0 contains a command injection vulnerability in its remote UI control mechanism that accepts hex-encoded instructions over UDP port 5005 without proper sanitization. Attackers can send crafted hex-encoded payloads containing system com...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27475
(8.1 HIGH)

EPSS: 0.05%

updated 2026-02-19T21:30:47

2 posts

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior access or another vulnerability) can trigger arbitrary object instantiation and potentially achieve code execution. The use of serialized data in these compon

thehackerwire@mastodon.social at 2026-02-19T19:34:45.000Z ##

🟠 CVE-2026-27475 - High (8.1)

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior acces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T19:34:45.000Z ##

🟠 CVE-2026-27475 - High (8.1)

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior acces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27052
(7.5 HIGH)

EPSS: 0.11%

updated 2026-02-19T21:30:46

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in villatheme Sales Countdown Timer for WooCommerce and WordPress sctv-sales-countdown-timer allows PHP Local File Inclusion.This issue affects Sales Countdown Timer for WooCommerce and WordPress: from n/a through <= 1.1.8.1.

thehackerwire@mastodon.social at 2026-02-19T20:15:49.000Z ##

🟠 CVE-2026-27052 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in villatheme Sales Countdown Timer for WooCommerce and WordPress sctv-sales-countdown-timer allows PHP Local File Inclusion.This...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T20:15:49.000Z ##

🟠 CVE-2026-27052 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in villatheme Sales Countdown Timer for WooCommerce and WordPress sctv-sales-countdown-timer allows PHP Local File Inclusion.This...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25378
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-19T21:30:45

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Blind SQL Injection.This issue affects Nelio AB Testing: from n/a through <= 8.2.4.

thehackerwire@mastodon.social at 2026-02-20T00:50:25.000Z ##

🟠 CVE-2026-25378 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Blind SQL Injection.This issue affects Nelio AB Testing: from n/a through &lt;= 8.2.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T00:50:25.000Z ##

🟠 CVE-2026-25378 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Blind SQL Injection.This issue affects Nelio AB Testing: from n/a through &lt;= 8.2.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26016(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-02-19T21:30:31

4 posts

### Summary A missing authorization check in multiple controllers allows any user with access to a node secret token to fetch information about any server on a Pterodactyl instance, even if that server is associated with a different node. This issue stems from missing logic to verify that the node requesting server data is the same node that the server is associated with. Any authenticated Wings

thehackerwire@mastodon.social at 2026-02-20T19:14:25.000Z ##

🟠 CVE-2026-26016 - High (8.1)

Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.1, a missing authorization check in multiple controllers allows any user with access to a node secret token to fetch informa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-19T22:30:13.542Z ##

⚠️ CRITICAL: Pterodactyl Panel <1.12.1 has an auth bypass (CVE-2026-26016). Wings node token = full access to all servers, data loss risk. Upgrade to 1.12.1 ASAP & secure tokens! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-20T19:14:25.000Z ##

🟠 CVE-2026-26016 - High (8.1)

Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.1, a missing authorization check in multiple controllers allows any user with access to a node secret token to fetch informa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-19T22:30:13.000Z ##

⚠️ CRITICAL: Pterodactyl Panel <1.12.1 has an auth bypass (CVE-2026-26016). Wings node token = full access to all servers, data loss risk. Upgrade to 1.12.1 ASAP & secure tokens! radar.offseq.com/threat/cve-20 #OffSeq #Pterodactyl #CVE202626016 #Vulnerability

##

CVE-2026-24834(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-02-19T21:30:21

2 posts

### Summary An issue in Kata with Cloud Hypervisor allows a user of the container to modify the file system used by the Guest micro VM ultimately achieving arbitrary code execution as root in said VM. The current understinding is this doesn’t impact the security of the Host or of other containers / VMs running on that Host (note that arm64 QEMU lacks NVDIMM read-only support: It is believed that

thehackerwire@mastodon.social at 2026-02-19T18:02:02.000Z ##

🔴 CVE-2026-24834 - Critical (9.3)

Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.27.0, an issue in Kata with Cloud Hypervisor allows a user of the container ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T18:02:02.000Z ##

🔴 CVE-2026-24834 - Critical (9.3)

Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.27.0, an issue in Kata with Cloud Hypervisor allows a user of the container ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25474
(7.5 HIGH)

EPSS: 0.01%

updated 2026-02-19T21:23:55

1 posts

## Summary In Telegram webhook mode, if `channels.telegram.webhookSecret` is not set, OpenClaw may accept webhook HTTP requests without verifying Telegram’s secret token header. In deployments where the webhook endpoint is reachable by an attacker, this can allow forged Telegram updates (for example spoofing `message.from.id`). Note: Telegram webhook mode is not enabled by default. It is enabled

thehackerwire@mastodon.social at 2026-02-19T16:04:31.000Z ##

🟠 CVE-2026-25474 - High (7.5)

OpenClaw is a personal AI assistant. In versions 2026.1.30 and below, if channels.telegram.webhookSecret is not set when in Telegram webhook mode, OpenClaw may accept webhook HTTP requests without verifying Telegram’s secret token header. In dep...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25242(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-02-19T21:23:41

2 posts

Security Advisory:Unauthenticated File Upload in Gogs Vulnerability Type: Unauthenticated File Upload Date: Aug 5, 2025 Discoverer: OpenAI Security Research ## Summary Gogs exposes unauthenticated file upload endpoints by default. When the global RequireSigninView setting is disabled (default), any remote user can upload arbitrary files to the server via /releases/attachments and /issues/attachme

1 repos

https://github.com/mindkernel/CVE-2026-25242

thehackerwire@mastodon.social at 2026-02-19T20:20:47.000Z ##

🔴 CVE-2026-25242 - Critical (9.8)

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below expose unauthenticated file upload endpoints by default. When the global RequireSigninView setting is disabled (default), any remote user can upload arbitrary files to the s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T20:20:47.000Z ##

🔴 CVE-2026-25242 - Critical (9.8)

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below expose unauthenticated file upload endpoints by default. When the global RequireSigninView setting is disabled (default), any remote user can upload arbitrary files to the s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25232(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-02-19T21:14:58

2 posts

## Summary An access control bypass vulnerability in Gogs web interface allows any repository collaborator with Write permissions to delete protected branches (including the default branch) by sending a direct POST request, completely bypassing the branch protection mechanism. This vulnerability enables privilege escalation from Write to Admin level, allowing low-privilege users to perform danger

thehackerwire@mastodon.social at 2026-02-19T20:20:38.000Z ##

🟠 CVE-2026-25232 - High (8.8)

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below have an access control bypass vulnerability which allows any repository collaborator with Write permissions to delete protected branches (including the default branch) by se...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T20:20:38.000Z ##

🟠 CVE-2026-25232 - High (8.8)

Gogs is an open source self-hosted Git service. Versions 0.13.4 and below have an access control bypass vulnerability which allows any repository collaborator with Write permissions to delete protected branches (including the default branch) by se...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27192(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-02-19T20:32:29

2 posts

The origin validation uses `startsWith()` for comparison, allowing attackers to bypass the check by registering a domain that shares a common prefix with an allowed origin. The `getAllowedOrigin()` function checks if the Referer header starts with any allowed origin: ```javascript // https://github.com/feathersjs/feathers/blob/dove/packages/authentication-oauth/src/strategy.ts#L75 const allowedOr

offseq at 2026-02-21T04:30:27.490Z ##

⚠️ CVE-2026-27192: Feathersjs (<5.0.40) suffers a HIGH-severity origin validation error (CWE-346). Prefix-based checks let attackers steal OAuth tokens, risking account takeover. Upgrade to 5.0.40+! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-21T04:30:27.000Z ##

⚠️ CVE-2026-27192: Feathersjs (<5.0.40) suffers a HIGH-severity origin validation error (CWE-346). Prefix-based checks let attackers steal OAuth tokens, risking account takeover. Upgrade to 5.0.40+! radar.offseq.com/threat/cve-20 #OffSeq #Feathersjs #OAuth #CVE202627192

##

CVE-2026-27196
(8.1 HIGH)

EPSS: 0.02%

updated 2026-02-19T20:30:39

2 posts

## Impact Stored XSS vulnerability in `html` fieldtypes allow authenticated users with field management permissions to inject malicious JavaScript that executes when viewed by higher-privileged users. ## Patches This has been fixed in 6.3.2 and 5.73.9.

thehackerwire@mastodon.social at 2026-02-21T05:21:36.000Z ##

🟠 CVE-2026-27196 - High (8.1)

Statmatic is a Laravel and Git powered content management system (CMS). Versions 5.73.8 and below in addition to 6.0.0-alpha.1 through 6.3.1 have a Stored XSS vulnerability in html fieldtypes which allows authenticated users with field management ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T05:21:36.000Z ##

🟠 CVE-2026-27196 - High (8.1)

Statmatic is a Laravel and Git powered content management system (CMS). Versions 5.73.8 and below in addition to 6.0.0-alpha.1 through 6.3.1 have a Stored XSS vulnerability in html fieldtypes which allows authenticated users with field management ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27212(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-02-19T20:28:39

2 posts

### Summary A prototype pollution vulnerability exists in the the npm package swiper (>=6.5.1, < 12.1.2). Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute `Object.prototype` via a crafted input using Array.prototype. The exploit works across Windows and Linux and on Node and Bun runtimes.

offseq at 2026-02-21T10:30:30.204Z ##

🚨 CRITICAL: CVE-2026-27212 in nolimits4web swiper (6.5.1 – 12.1.1) enables prototype pollution, risking auth bypass, DoS, & RCE. Affects Node & Bun, Windows & Linux. Upgrade to 12.1.2 now! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-21T10:30:30.000Z ##

🚨 CRITICAL: CVE-2026-27212 in nolimits4web swiper (6.5.1 – 12.1.1) enables prototype pollution, risking auth bypass, DoS, & RCE. Affects Node & Bun, Windows & Linux. Upgrade to 12.1.2 now! radar.offseq.com/threat/cve-20 #OffSeq #CVE202627212 #AppSec #JavaScript

##

CVE-2026-26030
(10.0 CRITICAL)

EPSS: 0.09%

updated 2026-02-19T19:34:15

7 posts

### Impact: An RCE vulnerability has been identified in Microsoft Semantic Kernel Python SDK, specifically within the `InMemoryVectorStore` filter functionality. ### Patches: The problem has been fixed in [python-1.39.4](https://github.com/microsoft/semantic-kernel/releases/tag/python-1.39.4). Users should upgrade this version or higher. ### Workarounds: Avoid using `InMemoryVectorStore` for pro

Matchbook3469@mastodon.social at 2026-02-20T11:29:20.000Z ##

🚨 New security advisory:

CVE-2026-26030 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #VulnerabilityManagement #CyberSec

##

cerebrix at 2026-02-20T01:18:15.274Z ##

Unbelievable.... digg.com/cybersecurity/yCL5Ang

##

offseq at 2026-02-19T21:00:12.944Z ##

⚠️ CRITICAL RCE: CVE-2026-26030 in Microsoft Semantic Kernel (<1.39.4) lets remote attackers execute code via InMemoryVectorStore filter. Upgrade to 1.39.4+ ASAP or avoid this component in prod. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-19T18:00:48.000Z ##

🔴 CVE-2026-26030 - Critical (9.9)

Semantic Kernel, Microsoft's semantic kernel Python SDK, has a remote code execution vulnerability in versions prior to 1.39.4, specifically within the `InMemoryVectorStore` filter functionality. The problem has been fixed in version `python-1.39....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cerebrix@infosec.exchange at 2026-02-20T01:18:15.000Z ##

Unbelievable.... digg.com/cybersecurity/yCL5Ang

##

offseq@infosec.exchange at 2026-02-19T21:00:12.000Z ##

⚠️ CRITICAL RCE: CVE-2026-26030 in Microsoft Semantic Kernel (<1.39.4) lets remote attackers execute code via InMemoryVectorStore filter. Upgrade to 1.39.4+ ASAP or avoid this component in prod. Details: radar.offseq.com/threat/cve-20
#OffSeq #CVE #infosec #Python #AIsecurity

##

thehackerwire@mastodon.social at 2026-02-19T18:00:48.000Z ##

🔴 CVE-2026-26030 - Critical (9.9)

Semantic Kernel, Microsoft's semantic kernel Python SDK, has a remote code execution vulnerability in versions prior to 1.39.4, specifically within the `InMemoryVectorStore` filter functionality. The problem has been fixed in version `python-1.39....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25418
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-19T19:22:28.717000

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bitpressadmin Bit Form bit-form allows SQL Injection.This issue affects Bit Form: from n/a through <= 2.21.10.

thehackerwire@mastodon.social at 2026-02-19T20:15:58.000Z ##

🟠 CVE-2026-25418 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bitpressadmin Bit Form bit-form allows SQL Injection.This issue affects Bit Form: from n/a through &lt;= 2.21.10.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T20:15:58.000Z ##

🟠 CVE-2026-25418 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bitpressadmin Bit Form bit-form allows SQL Injection.This issue affects Bit Form: from n/a through &lt;= 2.21.10.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2648
(8.8 HIGH)

EPSS: 0.07%

updated 2026-02-19T18:32:57

2 posts

Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to perform an out of bounds memory write via a crafted PDF file. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-02-20T01:28:38.000Z ##

🟠 CVE-2026-2648 - High (8.8)

Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to perform an out of bounds memory write via a crafted PDF file. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:28:38.000Z ##

🟠 CVE-2026-2648 - High (8.8)

Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to perform an out of bounds memory write via a crafted PDF file. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2409(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-02-19T18:32:10

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Delinea Cloud Suite allows Argument Injection.This issue affects Cloud Suite: before 25.2 HF1.

offseq at 2026-02-19T19:30:17.787Z ##

🚨 CRITICAL: CVE-2026-2409 in Delinea Cloud Suite (<25.2 HF1) enables remote SQL Injection by low-priv users — risking sensitive data. Patch urgently, validate inputs, and monitor DB activity! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-19T19:30:17.000Z ##

🚨 CRITICAL: CVE-2026-2409 in Delinea Cloud Suite (<25.2 HF1) enables remote SQL Injection by low-priv users — risking sensitive data. Patch urgently, validate inputs, and monitor DB activity! radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Delinea #Vuln

##

CVE-2026-1581
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-19T18:32:09

2 posts

The wpForo Forum plugin for WordPress is vulnerable to time-based SQL Injection via the 'wpfob' parameter in all versions up to, and including, 2.4.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be

thehackerwire@mastodon.social at 2026-02-19T18:02:11.000Z ##

🟠 CVE-2026-1581 - High (7.5)

The wpForo Forum plugin for WordPress is vulnerable to time-based SQL Injection via the 'wpfob' parameter in all versions up to, and including, 2.4.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T18:02:11.000Z ##

🟠 CVE-2026-1581 - High (7.5)

The wpForo Forum plugin for WordPress is vulnerable to time-based SQL Injection via the 'wpfob' parameter in all versions up to, and including, 2.4.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2232
(7.5 HIGH)

EPSS: 0.09%

updated 2026-02-19T18:32:09

2 posts

The Product Table and List Builder for WooCommerce Lite plugin for WordPress is vulnerable to time-based SQL Injection via the 'search' parameter in all versions up to, and including, 4.6.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries in

thehackerwire@mastodon.social at 2026-02-19T18:00:39.000Z ##

🟠 CVE-2026-2232 - High (7.5)

The Product Table and List Builder for WooCommerce Lite plugin for WordPress is vulnerable to time-based SQL Injection via the 'search' parameter in all versions up to, and including, 4.6.2 due to insufficient escaping on the user supplied paramet...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T18:00:39.000Z ##

🟠 CVE-2026-2232 - High (7.5)

The Product Table and List Builder for WooCommerce Lite plugin for WordPress is vulnerable to time-based SQL Injection via the 'search' parameter in all versions up to, and including, 4.6.2 due to insufficient escaping on the user supplied paramet...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71250
(8.1 HIGH)

EPSS: 0.00%

updated 2026-02-19T18:32:08

2 posts

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior access or another vulnerability) can trigger arbitrary object instantiation and potentially achieve code execution. The use of serialized data in these compon

thehackerwire@mastodon.social at 2026-02-19T16:32:05.000Z ##

🟠 CVE-2025-71250 - High (8.1)

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior acces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:31:16.000Z ##

🟠 CVE-2025-71250 - High (8.1)

SPIP before 4.4.9 allows Insecure Deserialization in the public area through the table_valeur filter and the DATA iterator, which accept serialized data. An attacker who can place malicious serialized content (a pre-condition requiring prior acces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71243
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-02-19T18:32:08

1 posts

The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should immediately update to version 5.11.1 or later.

1 repos

https://github.com/Chocapikk/CVE-2025-71243

thehackerwire@mastodon.social at 2026-02-19T16:31:25.000Z ##

🔴 CVE-2025-71243 - Critical (9.8)

The 'Saisies pour formulaire' (Saisies) plugin for SPIP versions 5.4.0 through 5.11.0 contains a critical Remote Code Execution (RCE) vulnerability. An attacker can exploit this vulnerability to execute arbitrary code on the server. Users should i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-12107
(10.0 CRITICAL)

EPSS: 0.28%

updated 2026-02-19T18:32:07

2 posts

Due to the use of a vulnerable third-party Velocity template engine, a malicious actor with admin privilege may inject and execute arbitrary template syntax within server-side templates. Successful exploitation of this vulnerability could allow a malicious actor with admin privilege to inject and execute arbitrary template code on the server, potentially leading to remote code execution, data m

Matchbook3469@mastodon.social at 2026-02-20T08:06:36.000Z ##

🚨 New security advisory:

CVE-2025-12107 affects Wso2 Identity Server.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

thehackerwire@mastodon.social at 2026-02-19T15:44:55.000Z ##

🔴 CVE-2025-12107 - Critical (10)

Due to the use of a vulnerable third-party Velocity template engine, a malicious actor with admin privilege may inject and execute arbitrary template syntax within server-side templates.

Successful exploitation of this vulnerability could allow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26358
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-19T18:32:07

3 posts

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

thehackerwire@mastodon.social at 2026-02-19T16:32:25.000Z ##

🟠 CVE-2026-26358 - High (8.8)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:20:51.000Z ##

🟠 CVE-2026-26358 - High (8.8)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:04:15.000Z ##

🟠 CVE-2026-26358 - High (8.8)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26359
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-19T18:32:06

1 posts

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to the ability to overwrite arbitrary files.

thehackerwire@mastodon.social at 2026-02-19T16:04:22.000Z ##

🟠 CVE-2026-26359 - High (8.8)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to the ability to overwrite arbitra...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26360
(8.1 HIGH)

EPSS: 0.05%

updated 2026-02-19T18:32:05

2 posts

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability to delete arbitrary files.

thehackerwire@mastodon.social at 2026-02-19T16:20:53.000Z ##

🟠 CVE-2026-26360 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability to delete arbitrary files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T16:04:25.000Z ##

🟠 CVE-2026-26360 - High (8.1)

Dell Unisphere for PowerMax, version(s) 10.2, contain(s) an External Control of File Name or Path vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability to delete arbitrary files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1994
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-02-19T18:32:03

2 posts

The s2Member plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 260127. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their

Matchbook3469@mastodon.social at 2026-02-21T10:19:40.000Z ##

🔴 New security advisory:

CVE-2026-1994 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #VulnerabilityManagement #CyberSec

##

thehackerwire@mastodon.social at 2026-02-19T16:04:40.000Z ##

🔴 CVE-2026-1994 - Critical (9.8)

The s2Member plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 260127. This is due to the plugin not properly validating a user's identity prior to updating their password. This m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-4521
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-19T18:32:02

2 posts

The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the idonate_donor_profile() function in versions 2.1.5 to 2.1.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to hijack any account by reassigning its email address (via the donor_id they sup

thehackerwire@mastodon.social at 2026-02-19T17:16:16.000Z ##

🟠 CVE-2025-4521 - High (8.8)

The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the idonate_donor_profile() function in versions 2.1.5 to 2.1.9. This makes it poss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T17:16:16.000Z ##

🟠 CVE-2025-4521 - High (8.8)

The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the idonate_donor_profile() function in versions 2.1.5 to 2.1.9. This makes it poss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-4960
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-19T18:32:02

2 posts

The com.epson.InstallNavi.helper tool, deployed with the EPSON printer driver installer, contains a local privilege escalation vulnerability due to multiple flaws in its implementation. It fails to properly authenticate clients over the XPC protocol and does not correctly enforce macOS’s authorization model, exposing privileged functionality to untrusted users. Although it invokes the Authorizatio

thehackerwire@mastodon.social at 2026-02-19T17:16:07.000Z ##

🟠 CVE-2025-4960 - High (7.8)

The com.epson.InstallNavi.helper tool, deployed with the EPSON printer driver installer, contains a local privilege escalation vulnerability due to multiple flaws in its implementation. It fails to properly authenticate clients over the XPC protoc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T17:16:07.000Z ##

🟠 CVE-2025-4960 - High (7.8)

The com.epson.InstallNavi.helper tool, deployed with the EPSON printer driver installer, contains a local privilege escalation vulnerability due to multiple flaws in its implementation. It fails to properly authenticate clients over the XPC protoc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0926
(9.8 CRITICAL)

EPSS: 0.19%

updated 2026-02-19T18:32:02

2 posts

The Prodigy Commerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.2.9 via the 'parameters[template_name]' parameter. This makes it possible for unauthenticated attackers to include and read arbitrary files or execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls,

thehackerwire@mastodon.social at 2026-02-19T17:06:51.000Z ##

🔴 CVE-2026-0926 - Critical (9.8)

The Prodigy Commerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.2.9 via the 'parameters[template_name]' parameter. This makes it possible for unauthenticated attackers to include and read arb...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T17:06:51.000Z ##

🔴 CVE-2026-0926 - Critical (9.8)

The Prodigy Commerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.2.9 via the 'parameters[template_name]' parameter. This makes it possible for unauthenticated attackers to include and read arb...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1405
(9.8 CRITICAL)

EPSS: 0.15%

updated 2026-02-19T18:32:02

1 posts

The Slider Future plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'slider_future_handle_image_upload' function in all versions up to, and including, 1.0.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

1 repos

https://github.com/Nxploited/CVE-2026-1405

thehackerwire@mastodon.social at 2026-02-19T17:06:32.000Z ##

🔴 CVE-2026-1405 - Critical (9.8)

The Slider Future plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'slider_future_handle_image_upload' function in all versions up to, and including, 1.0.5. This makes it possible for unauthen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13851
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-02-19T18:32:01

2 posts

The Buyent Classified plugin for WordPress (bundled with Buyent theme) is vulnerable to privilege escalation via user registration in all versions up to, and including, 1.0.7. This is due to the plugin not validating or restricting the user role during registration via the REST API endpoint. This makes it possible for unauthenticated attackers to register accounts with arbitrary roles, including a

thehackerwire@mastodon.social at 2026-02-19T18:17:24.000Z ##

🔴 CVE-2025-13851 - Critical (9.8)

The Buyent Classified plugin for WordPress (bundled with Buyent theme) is vulnerable to privilege escalation via user registration in all versions up to, and including, 1.0.7. This is due to the plugin not validating or restricting the user role d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T18:17:24.000Z ##

🔴 CVE-2025-13851 - Critical (9.8)

The Buyent Classified plugin for WordPress (bundled with Buyent theme) is vulnerable to privilege escalation via user registration in all versions up to, and including, 1.0.7. This is due to the plugin not validating or restricting the user role d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0912
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-19T18:32:01

1 posts

The Toret Manager plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'trman_save_option' function and on the 'trman_save_option_items' in all versions up to, and including, 1.2.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options

thehackerwire@mastodon.social at 2026-02-19T17:06:42.000Z ##

🟠 CVE-2026-0912 - High (8.8)

The Toret Manager plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'trman_save_option' function and on the 'trman_save_option_items' in all versi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-12821
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-19T18:31:53

2 posts

The NewsBlogger theme for WordPress is vulnerable to Cross-Site Request Forgery in versions 0.2.5.6 to 0.2.6.1. This is due to missing or incorrect nonce validation on the newsblogger_install_and_activate_plugin() function. This makes it possible for unauthenticated attackers to upload arbitrary files and achieve remote code execution via a forged request granted they can trick a site administrat

thehackerwire@mastodon.social at 2026-02-19T19:01:03.000Z ##

🟠 CVE-2025-12821 - High (8.8)

The NewsBlogger theme for WordPress is vulnerable to Cross-Site Request Forgery in versions 0.2.5.6 to 0.2.6.1. This is due to missing or incorrect nonce validation on the newsblogger_install_and_activate_plugin() function. This makes it possible...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T19:01:03.000Z ##

🟠 CVE-2025-12821 - High (8.8)

The NewsBlogger theme for WordPress is vulnerable to Cross-Site Request Forgery in versions 0.2.5.6 to 0.2.6.1. This is due to missing or incorrect nonce validation on the newsblogger_install_and_activate_plugin() function. This makes it possible...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-12707
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-19T18:31:53

2 posts

The Library Management System plugin for WordPress is vulnerable to SQL Injection via the 'bid' parameter in all versions up to, and including, 3.2.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be

thehackerwire@mastodon.social at 2026-02-19T19:00:54.000Z ##

🟠 CVE-2025-12707 - High (7.5)

The Library Management System plugin for WordPress is vulnerable to SQL Injection via the 'bid' parameter in all versions up to, and including, 3.2.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T19:00:54.000Z ##

🟠 CVE-2025-12707 - High (7.5)

The Library Management System plugin for WordPress is vulnerable to SQL Injection via the 'bid' parameter in all versions up to, and including, 3.2.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-12882
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-02-19T18:31:53

2 posts

The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0. This is due to the plugin allowing users who are registering new accounts to set their own role by supplying the 'listing_user_role' parameter. This makes it possible for unauthenticated attackers to gain elevated privileges by registering an account with the administrator role.

thehackerwire@mastodon.social at 2026-02-19T19:00:44.000Z ##

🔴 CVE-2025-12882 - Critical (9.8)

The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0. This is due to the plugin allowing users who are registering new accounts to set their own role by supplying the 'listing_user_...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T19:00:44.000Z ##

🔴 CVE-2025-12882 - Critical (9.8)

The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0. This is due to the plugin allowing users who are registering new accounts to set their own role by supplying the 'listing_user_...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-11754
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-19T18:31:52

2 posts

The GDPR Cookie Consent plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'gdpr/v1/settings' REST API endpoint in all versions up to, and including, 4.1.2. This makes it possible for unauthenticated attackers to retrieve sensitive plugin settings including API tokens, email addresses, account IDs, and site keys.

thehackerwire@mastodon.social at 2026-02-20T01:28:28.000Z ##

🟠 CVE-2025-11754 - High (7.5)

The GDPR Cookie Consent plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'gdpr/v1/settings' REST API endpoint in all versions up to, and including, 4.1.2. This makes it possible for unauthe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T01:28:28.000Z ##

🟠 CVE-2025-11754 - High (7.5)

The GDPR Cookie Consent plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'gdpr/v1/settings' REST API endpoint in all versions up to, and including, 4.1.2. This makes it possible for unauthe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13563
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-02-19T18:31:50

2 posts

The Lizza LMS Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'lizza_lms_pro_register_user_front_end' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.

thehackerwire@mastodon.social at 2026-02-19T18:17:44.000Z ##

🔴 CVE-2025-13563 - Critical (9.8)

The Lizza LMS Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'lizza_lms_pro_register_user_front_end' function not restricting what user roles a user can register with....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T18:17:44.000Z ##

🔴 CVE-2025-13563 - Critical (9.8)

The Lizza LMS Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'lizza_lms_pro_register_user_front_end' function not restricting what user roles a user can register with....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2019-25364
(9.8 CRITICAL)

EPSS: 0.18%

updated 2026-02-19T15:53:02.850000

1 posts

MailCarrier 2.51 contains a buffer overflow vulnerability in the POP3 USER command that allows remote attackers to execute arbitrary code. Attackers can send a crafted oversized buffer to the POP3 service, overwriting memory and potentially gaining remote system access.

Matchbook3469@mastodon.social at 2026-02-20T14:28:26.000Z ##

🚨 New security advisory:

CVE-2019-25364 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

CVE-2025-12845
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-19T15:53:02.850000

2 posts

The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluent plugin for WordPress is vulnerable to unauthorized access of data that leads to privilege escalation due to a missing capability check on the get_table_data() function in versions 0.5.4 to 1.2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve plugin table data

thehackerwire@mastodon.social at 2026-02-19T20:20:56.000Z ##

🟠 CVE-2025-12845 - High (8.8)

The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluent plugin for WordPress is vulnerable to unauthorized access of data that leads to privilege escalation due to a missing capability check on the get_table_data() fu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T20:20:56.000Z ##

🟠 CVE-2025-12845 - High (8.8)

The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluent plugin for WordPress is vulnerable to unauthorized access of data that leads to privilege escalation due to a missing capability check on the get_table_data() fu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13603
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-19T15:53:02.850000

2 posts

The WP AUDIO GALLERY plugin for WordPress is vulnerable to Unauthorized Arbitrary File Read in all versions up to, and including, 2.0. This is due to insufficient capability checks and lack of nonce verification on the "wpag_htaccess_callback" function This makes it possible for authenticated attackers, with subscriber-level access and above, to overwrite the site's .htaccess file with arbitrary c

thehackerwire@mastodon.social at 2026-02-19T18:17:33.000Z ##

🟠 CVE-2025-13603 - High (8.8)

The WP AUDIO GALLERY plugin for WordPress is vulnerable to Unauthorized Arbitrary File Read in all versions up to, and including, 2.0. This is due to insufficient capability checks and lack of nonce verification on the "wpag_htaccess_callback" fun...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T18:17:33.000Z ##

🟠 CVE-2025-13603 - High (8.8)

The WP AUDIO GALLERY plugin for WordPress is vulnerable to Unauthorized Arbitrary File Read in all versions up to, and including, 2.0. This is due to insufficient capability checks and lack of nonce verification on the "wpag_htaccess_callback" fun...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0974
(8.8 HIGH)

EPSS: 0.21%

updated 2026-02-19T15:53:02.850000

2 posts

The Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the 'install_plugin' function in all versions up to, and including, 1.20.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install arbitrary plugins, which can

thehackerwire@mastodon.social at 2026-02-19T17:15:58.000Z ##

🟠 CVE-2026-0974 - High (8.8)

The Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the 'install_plugin' function in all versions up to,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T17:15:58.000Z ##

🟠 CVE-2026-0974 - High (8.8)

The Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the 'install_plugin' function in all versions up to,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27112(CVSS UNKNOWN)

EPSS: 0.24%

updated 2026-02-19T15:16:47

2 posts

## Summary The batch resource creation endpoints of both Kargo's legacy gRPC API and newer REST API accept multi-document YAML payloads. When either endpoint creates a `Project` resource, creation of subsequent resources from that same payload belonging in that Project's underlying Kubernetes namespace, by design, proceeds using the API server's own permissions. The creator of a new Project autom

offseq at 2026-02-21T00:00:41.567Z ##

🚨 CRITICAL vuln: CVE-2026-27112 in akuity kargo (v1.7.0 – 1.9.2) enables resource injection & privilege escalation via batch API endpoints. Patch to 1.7.8/1.8.11/1.9.3+ ASAP. Monitor logs & restrict API access. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-21T00:00:41.000Z ##

🚨 CRITICAL vuln: CVE-2026-27112 in akuity kargo (v1.7.0 – 1.9.2) enables resource injection & privilege escalation via batch API endpoints. Patch to 1.7.8/1.8.11/1.9.3+ ASAP. Monitor logs & restrict API access. radar.offseq.com/threat/cve-20 #OffSeq #Kubernetes #InfoSec

##

CVE-2026-26990
(8.8 HIGH)

EPSS: 0.01%

updated 2026-02-18T22:31:38

2 posts

### Summary A time-based blind SQL injection vulnerability exists in `address-search.inc.php` via the `address` parameter. When a crafted subnet prefix is supplied, the prefix value is concatenated directly into an SQL query without proper parameter binding, allowing an attacker to manipulate query logic and infer database information through time-based conditional responses. ### Details This vu

thehackerwire@mastodon.social at 2026-02-20T02:18:11.000Z ##

🟠 CVE-2026-26990 - High (8.8)

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below have a Time-Based Blind SQL Injection vulnerability in address-search.inc.php via the address parameter. When a crafted subnet prefix is suppl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T02:18:11.000Z ##

🟠 CVE-2026-26990 - High (8.8)

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below have a Time-Based Blind SQL Injection vulnerability in address-search.inc.php via the address parameter. When a crafted subnet prefix is suppl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26988(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-02-18T22:30:20

2 posts

### Summary *SQL Injection in IPv6 Address Search functionality via `address` parameter** A SQL injection vulnerability exists in the `ajax_table.php` endpoint. The application fails to properly sanitize or parameterize user input when processing IPv6 address searches. Specifically, the `address` parameter is split into an address and a prefix, and the prefix portion is directly concatenated into

1 repos

https://github.com/mbanyamer/CVE-2026-26988-LibreNMS-SQLi

thehackerwire@mastodon.social at 2026-02-20T17:08:20.000Z ##

🔴 CVE-2026-26988 - Critical (9.1)

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below contain an SQL Injection vulnerability in the ajax_table.php endpoint. The application fails to properly sanitize or parameterize user input w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T17:08:20.000Z ##

🔴 CVE-2026-26988 - Critical (9.1)

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below contain an SQL Injection vulnerability in the ajax_table.php endpoint. The application fails to properly sanitize or parameterize user input w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22769
(10.0 CRITICAL)

EPSS: 28.78%

updated 2026-02-18T20:01:15.983000

3 posts

Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgr

secdb at 2026-02-20T00:00:19.764Z ##

🚨 [CISA-2026:0218] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22175 (secdb.nttzen.cloud/cve/detail/)
- Name: GitLab Server-Side Request Forgery (SSRF) Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: GitLab
- Product: GitLab
- Notes: gitlab.com/gitlab-org/cves/-/b ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-22769 (secdb.nttzen.cloud/cve/detail/)
- Name: Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Dell
- Product: RecoverPoint for Virtual Machines (RP4VMs)
- Notes: dell.com/support/kbdoc/en-us/0 ; dell.com/support/kbdoc/en-us/0 ; cloud.google.com/blog/topics/t ; nvd.nist.gov/vuln/detail/CVE-2

##

StringsVsAtoms@mastodon.social at 2026-02-19T18:40:00.000Z ##

The issue, officially named CVE-2026-22769, involves hardcoded credentials. This means the software came with a built-in username and password that could not be easily changed.
5/10

##

secdb@infosec.exchange at 2026-02-20T00:00:19.000Z ##

🚨 [CISA-2026:0218] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22175 (secdb.nttzen.cloud/cve/detail/)
- Name: GitLab Server-Side Request Forgery (SSRF) Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: GitLab
- Product: GitLab
- Notes: gitlab.com/gitlab-org/cves/-/b ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-22769 (secdb.nttzen.cloud/cve/detail/)
- Name: Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Dell
- Product: RecoverPoint for Virtual Machines (RP4VMs)
- Notes: dell.com/support/kbdoc/en-us/0 ; dell.com/support/kbdoc/en-us/0 ; cloud.google.com/blog/topics/t ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260218 #cisa20260218 #cve_2021_22175 #cve_2026_22769 #cve202122175 #cve202622769

##

CVE-2026-0714
(6.8 MEDIUM)

EPSS: 0.01%

updated 2026-02-18T18:31:27

6 posts

A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data m

CVE-2021-22175
(9.8 CRITICAL)

EPSS: 75.69%

updated 2026-02-18T18:31:26

2 posts

When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled

Nuclei template

secdb at 2026-02-20T00:00:19.764Z ##

🚨 [CISA-2026:0218] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22175 (secdb.nttzen.cloud/cve/detail/)
- Name: GitLab Server-Side Request Forgery (SSRF) Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: GitLab
- Product: GitLab
- Notes: gitlab.com/gitlab-org/cves/-/b ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-22769 (secdb.nttzen.cloud/cve/detail/)
- Name: Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Dell
- Product: RecoverPoint for Virtual Machines (RP4VMs)
- Notes: dell.com/support/kbdoc/en-us/0 ; dell.com/support/kbdoc/en-us/0 ; cloud.google.com/blog/topics/t ; nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-02-20T00:00:19.000Z ##

🚨 [CISA-2026:0218] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22175 (secdb.nttzen.cloud/cve/detail/)
- Name: GitLab Server-Side Request Forgery (SSRF) Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: GitLab
- Product: GitLab
- Notes: gitlab.com/gitlab-org/cves/-/b ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-22769 (secdb.nttzen.cloud/cve/detail/)
- Name: Dell RecoverPoint for Virtual Machines (RP4VMs) Use of Hard-coded Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Dell
- Product: RecoverPoint for Virtual Machines (RP4VMs)
- Notes: dell.com/support/kbdoc/en-us/0 ; dell.com/support/kbdoc/en-us/0 ; cloud.google.com/blog/topics/t ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260218 #cisa20260218 #cve_2021_22175 #cve_2026_22769 #cve202122175 #cve202622769

##

CVE-2026-1670
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-18T00:30:22

4 posts

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

TomSellers at 2026-02-20T15:24:10.504Z ##

Why TF does the NVD not include the CVE title, vendor, or other useful information. If you look at the following you have no what's impacted and have to hunt details in the links.

nvd.nist.gov/vuln/detail/CVE-2

The backing CVE data contains all of this:

cveawg.mitre.org/api/cve/CVE-2

##

thecybermind at 2026-02-20T13:18:58.450Z ##

CRITICAL INTEL: Honeywell CVSS 9.8 (CVE-2026-1670) is here. 🚨 Unauthenticated API exploitation means total compromise. I’m breaking down the Sovereign Sentry strategy using Raspberry Pi & Suricata to harden your network. thecybermind.co/2026/02/20/cve

thecybermind.co/2026/02/20/cve

##

TomSellers@infosec.exchange at 2026-02-20T15:24:10.000Z ##

Why TF does the NVD not include the CVE title, vendor, or other useful information. If you look at the following you have no what's impacted and have to hunt details in the links.

nvd.nist.gov/vuln/detail/CVE-2

The backing CVE data contains all of this:

cveawg.mitre.org/api/cve/CVE-2

#security #cve #nvd

##

thecybermind@infosec.exchange at 2026-02-20T13:18:58.000Z ##

CRITICAL INTEL: Honeywell CVSS 9.8 (CVE-2026-1670) is here. 🚨 Unauthenticated API exploitation means total compromise. I’m breaking down the Sovereign Sentry strategy using Raspberry Pi & Suricata to harden your network. thecybermind.co/2026/02/20/cve
#exploit

thecybermind.co/2026/02/20/cve

##

CVE-2026-26119
(8.8 HIGH)

EPSS: 0.07%

updated 2026-02-18T00:30:22

2 posts

Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.

CVE-2025-65716
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-17T15:32:42

2 posts

An issue in Visual Studio Code Extensions Markdown Preview Enhanced v0.8.18 allows attackers to execute arbitrary code via uploading a crafted .Md file.

nuthatch at 2026-02-19T23:01:58.666Z ##

"OX Security discovered a vulnerability (CVE-2025-65716) in Markdown Preview Enhanced that enables a crafted Markdown file to execute JavaScript in the Markdown preview, allowing local port enumeration and exfiltration to an attacker-controlled server."

ox.security/blog/cve-2025-6571

##

nuthatch@infosec.exchange at 2026-02-19T23:01:58.000Z ##

"OX Security discovered a vulnerability (CVE-2025-65716) in Markdown Preview Enhanced that enables a crafted Markdown file to execute JavaScript in the Markdown preview, allowing local port enumeration and exfiltration to an attacker-controlled server."

ox.security/blog/cve-2025-6571

##

CVE-2026-2447
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-17T15:32:41

3 posts

Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, and Firefox ESR < 115.32.1.

cyberveille@mastobot.ping.moi at 2026-02-20T20:00:07.000Z ##

📢 Firefox 147.0.4 corrige la faille à haut risque CVE-2026-2447 dans libvpx (RCE)
📝 Selon The Cyber Express, Firefox v147.0.4 corrige la vulnérabilité CVE-2026-2447, décrite comme un débordement de tampon du tas dans la bibliothèque libvp...
📖 cyberveille : cyberveille.ch/posts/2026-02-1
🌐 source : thecyberexpress.com/firefox-v1
#CVE_2026_2447 #Firefox #Cyberveille

##

Mozilla@activitypub.awakari.com at 2026-02-19T06:10:18.000Z ## Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147 Mozilla has released an out-of-band security update to address a critical vulnerability affecting its browser. The up...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2026-2447 #CVSS #Firefox #v147 #Mozilla #The

Origin | Interest | Match ##

Mozilla@activitypub.awakari.com at 2026-02-19T06:10:18.000Z ## Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147 Mozilla has released an out-of-band security update to address a critical vulnerability affecting its browser. The up...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2026-2447 #CVSS #Firefox #v147 #Mozilla #The

Origin | Interest | Match ##

CVE-2026-1731
(9.8 CRITICAL)

EPSS: 49.74%

updated 2026-02-17T15:31:33

16 posts

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Nuclei template

4 repos

https://github.com/jakubie07/CVE-2026-1731

https://github.com/win3zz/CVE-2026-1731

https://github.com/richardpaimu34/CVE-2026-1731

https://github.com/cybrdude/cve-2026-1731-scanner

technadu at 2026-02-21T10:48:45.979Z ##

Critical CVE-2026-1731 in BeyondTrust RS/PRA is under active exploitation.

Web shells. RATs. PostgreSQL dumps.
Now listed in CISA KEV & tied to ransomware.

Remote support appliances are high-value targets.

Are we giving PAM systems enough monitoring visibility?

Source: thehackernews.com/2026/02/beyo

Follow @technadu for independent cybersecurity reporting.

Like and join the discussion below.

##

undercodenews@mastodon.social at 2026-02-21T04:32:05.000Z ##

CISA Sounds the Alarm: Actively Exploited BeyondTrust Flaw Opens the Door to Pre-Auth RCE Attacks

Introduction: A Quiet Vulnerability With Loud Consequences U.S. cybersecurity authorities have issued a high-priority warning after discovering active exploitation of a critical vulnerability affecting BeyondTrust Remote Support. The flaw, tracked as CVE-2026-1731, allows attackers to execute arbitrary operating system commands before authentication, turning trusted remote…

undercodenews.com/cisa-sounds-

##

gtronix at 2026-02-20T18:00:48.293Z ##

"CISA: BeyondTrust RCE flaw now exploited in ransomware attacks"

"[...] Cybersecurity and Infrastructure Security Agency (CISA) warns. Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S."

bleepingcomputer.com/news/secu

##

oversecurity@mastodon.social at 2026-02-20T17:20:07.000Z ##

CISA: BeyondTrust RCE flaw now exploited in ransomware attacks

Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S. Cybersecurity and...

🔗️ [Bleepingcomputer] link.is.it/nNcFd0

##

defendopsdiaries at 2026-02-20T17:15:44.346Z ##

Ransomware gangs found a new shortcut into company networks with CVE-2026-1731—no passwords needed, attacks automated, and defenders caught off guard. How did this flaw become their go-to weapon almost overnight?

thedefendopsdiaries.com/how-cv

##

undercodenews@mastodon.social at 2026-02-20T16:42:39.000Z ##

Critical Vulnerability in BeyondTrust Products: A Threat Actor’s Playground

A serious cybersecurity vulnerability has been discovered in BeyondTrust’s Remote Support (RS) and Privileged Remote Access (PRA) products, impacting numerous sectors worldwide. This flaw, identified as CVE-2026-1731, has already been exploited by cybercriminals for a range of malicious activities, putting sensitive data and networks at severe risk. the Vulnerability The vulnerability, with a…

undercodenews.com/critical-vul

##

hackerworkspace at 2026-02-20T08:06:26.701Z ##

VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)

unit42.paloaltonetworks.com/be

##

threatcodex at 2026-02-20T01:30:02.302Z ##

VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)

unit42.paloaltonetworks.com/be

##

kev_Stalker at 2026-02-19T22:18:30.240Z ##

CVE-2026-1731 - Changed to Known Ransomware Status

BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection VulnerabilityVendor: BeyondTrustProduct: Remote Support (RS) and Privileged Remote Access (PRA)BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)contain an OS command injection vulnerability. Successful exploitation could allow an unauthenticated remote attacker to execute operating system nvd.nist.gov/vuln/detail/CVE-2

##

technadu@infosec.exchange at 2026-02-21T10:48:45.000Z ##

Critical CVE-2026-1731 in BeyondTrust RS/PRA is under active exploitation.

Web shells. RATs. PostgreSQL dumps.
Now listed in CISA KEV & tied to ransomware.

Remote support appliances are high-value targets.

Are we giving PAM systems enough monitoring visibility?

Source: thehackernews.com/2026/02/beyo

Follow @technadu for independent cybersecurity reporting.

Like and join the discussion below.

#CyberSecurity #Infosec #ZeroDay #Ransomware #PAM #ThreatIntel #SecurityCommunity #CVE20261731

##

gtronix@infosec.exchange at 2026-02-20T18:00:48.000Z ##

"CISA: BeyondTrust RCE flaw now exploited in ransomware attacks"

"[...] Cybersecurity and Infrastructure Security Agency (CISA) warns. Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S."

bleepingcomputer.com/news/secu

#Cybersecurity

##

oversecurity@mastodon.social at 2026-02-20T17:20:07.000Z ##

CISA: BeyondTrust RCE flaw now exploited in ransomware attacks

Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S. Cybersecurity and...

🔗️ [Bleepingcomputer] link.is.it/nNcFd0

##

defendopsdiaries@infosec.exchange at 2026-02-20T17:15:44.000Z ##

Ransomware gangs found a new shortcut into company networks with CVE-2026-1731—no passwords needed, attacks automated, and defenders caught off guard. How did this flaw become their go-to weapon almost overnight?

thedefendopsdiaries.com/how-cv

##

hackerworkspace@infosec.exchange at 2026-02-20T08:06:26.000Z ##

VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)

unit42.paloaltonetworks.com/be

#threatintelligence #vulnerability #exploit

##

threatcodex@infosec.exchange at 2026-02-20T01:30:02.000Z ##

VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)
#CVE_2026_1731 #Vshell #SparkRAT
unit42.paloaltonetworks.com/be

##

kev_Stalker@infosec.exchange at 2026-02-19T22:18:30.000Z ##

CVE-2026-1731 - Changed to Known Ransomware Status

BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) OS Command Injection VulnerabilityVendor: BeyondTrustProduct: Remote Support (RS) and Privileged Remote Access (PRA)BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)contain an OS command injection vulnerability. Successful exploitation could allow an unauthenticated remote attacker to execute operating system nvd.nist.gov/vuln/detail/CVE-2

##

glitterbean@wehavecookies.social at 2026-02-19T22:19:17.000Z ##

CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad thezdi.com/blog/2026/2/19/cve-

##

thezdi at 2026-02-19T21:27:24.615Z ##

CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad - The TrendAI Research team takes a deep dive into this recently patched file parsing bug to show you root cause, source code walk through, and provide detection guidance. Read the details at zerodayinitiative.com/blog/202

##

thezdi@infosec.exchange at 2026-02-19T21:27:24.000Z ##

CVE-2026-20841: Arbitrary Code Execution in the Windows Notepad - The TrendAI Research team takes a deep dive into this recently patched file parsing bug to show you root cause, source code walk through, and provide detection guidance. Read the details at zerodayinitiative.com/blog/202

##

hackerworkspace at 2026-02-19T19:29:15.594Z ##

The video discusses a recently patched Microsoft Office zero-day vulnerability (CVE-2026-21509) being actively exploited by Russian hackers. It emphasizes the rapid weaponization of vulnerabilities after patches and the importance of threat intelligence for managing exposed attack surfaces.
youtube.com/watch?v=Ck8IPInn74A

##

hackerworkspace@infosec.exchange at 2026-02-19T19:29:15.000Z ##

The video discusses a recently patched Microsoft Office zero-day vulnerability (CVE-2026-21509) being actively exploited by Russian hackers. It emphasizes the rapid weaponization of vulnerabilities after patches and the importance of threat intelligence for managing exposed attack surfaces.
youtube.com/watch?v=Ck8IPInn74A

#threatintelligence #exploit #zeroday

##

CVE-2026-24423
(9.8 CRITICAL)

EPSS: 24.64%

updated 2026-02-06T18:30:29

2 posts

SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.

1 repos

https://github.com/aavamin/CVE-2026-24423

steelefortress at 2026-02-20T12:00:21.696Z ##

Rapid weaponization of SmarterMail flaws exposed through underground Telegram channels. Just days after CVE-2026-24423 and CVE-2026-23760 were disclosed, exploit PoCs and stolen admin credentials were shared among these communities, highlighting the urgent need for...

Read more: steelefortress.com/dlk923

##

steelefortress@infosec.exchange at 2026-02-20T12:00:21.000Z ##

Rapid weaponization of SmarterMail flaws exposed through underground Telegram channels. Just days after CVE-2026-24423 and CVE-2026-23760 were disclosed, exploit PoCs and stolen admin credentials were shared among these communities, highlighting the urgent need for...

Read more: steelefortress.com/dlk923

#Security #ThreatIntel #CyberDefense

##

CVE-2026-1281
(9.8 CRITICAL)

EPSS: 54.31%

updated 2026-01-30T00:31:29

1 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

2 repos

https://github.com/YunfeiGE18/CVE-2026-1281-CVE-2026-1340-Ivanti-EPMM-RCE

https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE

CVE-2026-1340
(9.8 CRITICAL)

EPSS: 38.65%

updated 2026-01-30T00:31:28

1 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

2 repos

https://github.com/YunfeiGE18/CVE-2026-1281-CVE-2026-1340-Ivanti-EPMM-RCE

https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE

CVE-2026-23760
(9.8 CRITICAL)

EPSS: 55.75%

updated 2026-01-27T16:16:55.327000

2 posts

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the acc

Nuclei template

2 repos

https://github.com/MaxMnMl/smartermail-CVE-2026-23760-poc

https://github.com/hilwa24/CVE-2026-23760_SmarterMail-Auth-Bypass-and-RCE

steelefortress at 2026-02-20T12:00:21.696Z ##

Rapid weaponization of SmarterMail flaws exposed through underground Telegram channels. Just days after CVE-2026-24423 and CVE-2026-23760 were disclosed, exploit PoCs and stolen admin credentials were shared among these communities, highlighting the urgent need for...

Read more: steelefortress.com/dlk923

##

steelefortress@infosec.exchange at 2026-02-20T12:00:21.000Z ##

Rapid weaponization of SmarterMail flaws exposed through underground Telegram channels. Just days after CVE-2026-24423 and CVE-2026-23760 were disclosed, exploit PoCs and stolen admin credentials were shared among these communities, highlighting the urgent need for...

Read more: steelefortress.com/dlk923

#Security #ThreatIntel #CyberDefense

##

CVE-2025-6571
(6.0 MEDIUM)

EPSS: 0.02%

updated 2025-11-11T09:30:36

2 posts

A 3rd-party component exposed its password in process arguments, allowing for low-privileged users to access it.

nuthatch at 2026-02-19T23:01:58.666Z ##

"OX Security discovered a vulnerability (CVE-2025-65716) in Markdown Preview Enhanced that enables a crafted Markdown file to execute JavaScript in the Markdown preview, allowing local port enumeration and exfiltration to an attacker-controlled server."

ox.security/blog/cve-2025-6571

##

nuthatch@infosec.exchange at 2026-02-19T23:01:58.000Z ##

"OX Security discovered a vulnerability (CVE-2025-65716) in Markdown Preview Enhanced that enables a crafted Markdown file to execute JavaScript in the Markdown preview, allowing local port enumeration and exfiltration to an attacker-controlled server."

ox.security/blog/cve-2025-6571

##

CVE-2022-22265
(7.8 HIGH)

EPSS: 0.16%

updated 2025-10-22T00:32:28

2 posts

An improper check or handling of exceptional conditions in NPU driver prior to SMR Jan-2022 Release 1 allows arbitrary memory write and code execution.

pancake at 2026-02-20T12:56:31.935Z ##

Here's the good read of the day, more interesting part is the exploitation tricks at the end of the post soez.github.io/posts/CVE-2022- by @javierprtd

##

pancake@infosec.exchange at 2026-02-20T12:56:31.000Z ##

Here's the good read of the day, more interesting part is the exploitation tricks at the end of the post soez.github.io/posts/CVE-2022- by @javierprtd

##

CVE-2020-1472
(10.0 CRITICAL)

EPSS: 94.38%

updated 2025-10-22T00:31:58

1 posts

An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka 'Netlogon Elevation of Privilege Vulnerability'.

76 repos

https://github.com/striveben/CVE-2020-1472

https://github.com/Whippet0/CVE-2020-1472

https://github.com/dr4g0n23/CVE-2020-1472

https://github.com/rhymeswithmogul/Set-ZerologonMitigation

https://github.com/JayP232/The_big_Zero

https://github.com/CanciuCostin/CVE-2020-1472

https://github.com/carlos55ml/zerologon

https://github.com/sho-luv/zerologon

https://github.com/grupooruss/CVE-2020-1472

https://github.com/thatonesecguy/zerologon-CVE-2020-1472

https://github.com/blackh00d/zerologon-poc

https://github.com/k8gege/CVE-2020-1472-EXP

https://github.com/Rvn0xsy/ZeroLogon

https://github.com/victim10wq3/CVE-2020-1472

https://github.com/mingchen-script/CVE-2020-1472-visualizer

https://github.com/nyambiblaise/Domain-Controller-DC-Exploitation-with-Metasploit-Impacket

https://github.com/TheJoyOfHacking/SecuraBV-CVE-2020-1472

https://github.com/hell-moon/ZeroLogon-Exploit

https://github.com/B34MR/zeroscan

https://github.com/TuanCui22/ZerologonWithImpacket-CVE2020-1472

https://github.com/RicYaben/CVE-2020-1472-LAB

https://github.com/TheJoyOfHacking/dirkjanm-CVE-2020-1472

https://github.com/JolynNgSC/Zerologon_CVE-2020-1472

https://github.com/cube0x0/CVE-2020-1472

https://github.com/Udyz/Zerologon

https://github.com/mods20hh/ZeroLogon-PoC-DC-Pwn

https://github.com/commit2main/zerologon-lab

https://github.com/dirkjanm/CVE-2020-1472

https://github.com/midpipps/CVE-2020-1472-Easy

https://github.com/VoidSec/CVE-2020-1472

https://github.com/Fa1c0n35/CVE-2020-1472-02-

https://github.com/jiushill/CVE-2020-1472

https://github.com/NAXG/CVE-2020-1472

https://github.com/0xcccc666/cve-2020-1472_Tool-collection

https://github.com/risksense/zerologon

https://github.com/Tobey123/CVE-2020-1472-visualizer

https://github.com/sv3nbeast/CVE-2020-1472

https://github.com/WiIs0n/Zerologon_CVE-2020-1472

https://github.com/npocmak/CVE-2020-1472

https://github.com/murataydemir/CVE-2020-1472

https://github.com/Privia-Security/ADZero

https://github.com/Ken-Abruzzi/cve-2020-1472

https://github.com/itssmikefm/CVE-2020-1472

https://github.com/PakwanSK/Simulating-and-preventing-Zerologon-CVE-2020-1472-vulnerability-attacks.

https://github.com/shanfenglan/cve-2020-1472

https://github.com/johnpathe/zerologon-cve-2020-1472-notes

https://github.com/maikelnight/zerologon

https://github.com/whoami-chmod777/Zerologon-Attack-CVE-2020-1472-POC

https://github.com/t31m0/CVE-2020-1472

https://github.com/wrathfulDiety/zerologon

https://github.com/0xkami/CVE-2020-1472

https://github.com/zeronetworks/zerologon

https://github.com/logg-1/0logon

https://github.com/CPO-EH/CVE-2020-1472_ZeroLogonChecker

https://github.com/bb00/zer0dump

https://github.com/likeww/MassZeroLogon

https://github.com/hectorgie/CVE-2020-1472

https://github.com/b1ack0wl/CVE-2020-1472

https://github.com/mos165/CVE-20200-1472

https://github.com/Akash7350/CVE-2020-1472

https://github.com/SaharAttackit/CVE-2020-1472

https://github.com/100HnoMeuNome/ZeroLogon-CVE-2020-1472-lab

https://github.com/technion/ZeroLogonAssess

https://github.com/guglia001/MassZeroLogon

https://github.com/mstxq17/cve-2020-1472

https://github.com/YossiSassi/ZeroLogon-Exploitation-Check

https://github.com/Anonymous-Family/CVE-2020-1472

https://github.com/McKinnonIT/zabbix-template-CVE-2020-1472

https://github.com/Fa1c0n35/CVE-2020-1472

https://github.com/Sajuwithgithub/CVE2020-1472

https://github.com/bvcyber/CVE-2020-1472

https://github.com/Fa1c0n35/SecuraBV-CVE-2020-1472

https://github.com/tdevworks/CVE-2020-1472-ZeroLogon-Demo-Detection-Mitigation

https://github.com/puckiestyle/CVE-2020-1472

https://github.com/c3rrberu5/ZeroLogon-to-Shell

https://github.com/Anonymous-Family/Zero-day-scanning

cvedatabase@techhub.social at 2026-02-20T18:26:00.000Z ##

What’s more dangerous?
A) Zero-days
B) Unpatched one-year-old CVEs
C) Assets you forgot existed
Attackers already chose B + C.
Example:
CVE-2020-1472 (Zerologon) — still exploited in 2026.
🔗 Why it still works:
cvedatabase.com/cve/CVE-2020-1
#CyberSecurity #VulnerabilityManagement

##

CVE-2025-29969
(7.5 HIGH)

EPSS: 0.35%

updated 2025-05-13T18:31:00

4 posts

Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network.

1 repos

https://github.com/SafeBreach-Labs/EventLogin-CVE-2025-29969

_r_netsec at 2026-02-20T12:13:05.178Z ##

Discovery & Analysis of CVE-2025-29969 safebreach.com/blog/safebreach

##

threatcodex at 2026-02-19T19:51:29.333Z ##

EventLog-in: Propagating With Weak Credentials Using the Eventlog Service in Microsoft Windows (CVE-2025-29969)

safebreach.com/blog/safebreach

##

_r_netsec@infosec.exchange at 2026-02-20T12:13:05.000Z ##

Discovery & Analysis of CVE-2025-29969 safebreach.com/blog/safebreach

##

threatcodex@infosec.exchange at 2026-02-19T19:51:29.000Z ##

EventLog-in: Propagating With Weak Credentials Using the Eventlog Service in Microsoft Windows (CVE-2025-29969)
#CVE_2025_29969
safebreach.com/blog/safebreach

##

CVE-2023-51781
(7.0 None)

EPSS: 0.02%

updated 2024-01-27T05:05:43

1 posts

An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.

linux@activitypub.awakari.com at 2026-02-18T10:53:08.000Z ## CVE-2023-51781 An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition. Information published.

#CVE

Origin | Interest | Match ##

thehackerwire@mastodon.social at 2026-02-21T11:18:41.000Z ##

🔴 CVE-2026-27574 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's node:vm module (explicitly documented as not a security mechanism) to execute user-supplied code, a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T11:18:41.000Z ##

🔴 CVE-2026-27574 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's node:vm module (explicitly documented as not a security mechanism) to execute user-supplied code, a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27466
(0 None)

EPSS: 0.07%

2 posts

N/A

0x3e4@cyberplace.social at 2026-02-21T09:18:34.000Z ##

BigBlueButton on < 3.0.22 with two new CVEs today: CVE-2026-27466 & CVE-2026-27467

hecate.pw/vulnerabilities?sear

Feel free to use the AI slop analyses (Gemini for student with free API configured).. Hecate is a prototype app for my master thesis

#vulnerability #cve #security #InfoSec #bigbluebutton

##

0x3e4@cyberplace.social at 2026-02-21T09:18:34.000Z ##

BigBlueButton on < 3.0.22 with two new CVEs today: CVE-2026-27466 & CVE-2026-27467

hecate.pw/vulnerabilities?sear

Feel free to use the AI slop analyses (Gemini for student with free API configured).. Hecate is a prototype app for my master thesis

#vulnerability #cve #security #InfoSec #bigbluebutton

##

CVE-2026-27467
(0 None)

EPSS: 0.03%

2 posts

N/A

0x3e4@cyberplace.social at 2026-02-21T09:18:34.000Z ##

BigBlueButton on < 3.0.22 with two new CVEs today: CVE-2026-27466 & CVE-2026-27467

hecate.pw/vulnerabilities?sear

Feel free to use the AI slop analyses (Gemini for student with free API configured).. Hecate is a prototype app for my master thesis

#vulnerability #cve #security #InfoSec #bigbluebutton

##

0x3e4@cyberplace.social at 2026-02-21T09:18:34.000Z ##

BigBlueButton on < 3.0.22 with two new CVEs today: CVE-2026-27466 & CVE-2026-27467

hecate.pw/vulnerabilities?sear

Feel free to use the AI slop analyses (Gemini for student with free API configured).. Hecate is a prototype app for my master thesis

#vulnerability #cve #security #InfoSec #bigbluebutton

##

CVE-2026-27479
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-21T09:16:50.000Z ##

🟠 CVE-2026-27479 - High (7.7)

Wallos is an open-source, self-hostable personal subscription tracker. Versions 4.6.0 and below contain a Server-Side Request Forgery (SSRF) vulnerability in the subscription and payment logo/icon upload functionality. The application validates th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T09:16:50.000Z ##

🟠 CVE-2026-27479 - High (7.7)

Wallos is an open-source, self-hostable personal subscription tracker. Versions 4.6.0 and below contain a Server-Side Request Forgery (SSRF) vulnerability in the subscription and payment logo/icon upload functionality. The application validates th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27471
(0 None)

EPSS: 0.04%

2 posts

N/A

offseq at 2026-02-21T09:00:27.007Z ##

🚨 CRITICAL: CVE-2026-27471 in ERPNext (≤15.98.0, 16.0.0-rc.1 – 16.6.0) lets unauth attackers access sensitive docs via missing API auth. Upgrade to 15.98.1/16.6.1+ & restrict access now. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-21T09:00:27.000Z ##

🚨 CRITICAL: CVE-2026-27471 in ERPNext (≤15.98.0, 16.0.0-rc.1 – 16.6.0) lets unauth attackers access sensitive docs via missing API auth. Upgrade to 15.98.1/16.6.1+ & restrict access now. radar.offseq.com/threat/cve-20 #OffSeq #ERPNext #CVE202627471 #Infosec

##

CVE-2026-27470
(0 None)

EPSS: 0.03%

2 posts

N/A

1 repos

https://github.com/kocaemre/CVE-2026-27470

thehackerwire@mastodon.social at 2026-02-21T08:17:17.000Z ##

🟠 CVE-2026-27470 - High (8.8)

ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvent...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T08:17:17.000Z ##

🟠 CVE-2026-27470 - High (8.8)

ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvent...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27452
(0 None)

EPSS: 0.04%

2 posts

N/A

offseq at 2026-02-21T07:30:34.836Z ##

🛡️ CRITICAL: CVE-2026-27452 in JonathanWilbur asn1-ts (<=11.0.5) — Decoding INTEGERs may leak ArrayBuffer, exposing sensitive data. Upgrade to 11.0.6 urgently. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-21T07:30:34.000Z ##

🛡️ CRITICAL: CVE-2026-27452 in JonathanWilbur asn1-ts (<=11.0.5) — Decoding INTEGERs may leak ArrayBuffer, exposing sensitive data. Upgrade to 11.0.6 urgently. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Security #CVE202627452

##

CVE-2026-27197
(0 None)

EPSS: 0.04%

4 posts

N/A

offseq at 2026-02-21T06:00:28.636Z ##

🚨 Critical SAML SSO vuln (CVE-2026-27197, CVSS 9.1) in Sentry 21.12.0 – 26.1.0 allows remote account takeover in multi-org instances. Upgrade to 26.2.0+, enable user 2FA, audit SSO settings! Full details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-21T05:21:46.000Z ##

🔴 CVE-2026-27197 - Critical (9.1)

Sentry is a developer-first error tracking and performance monitoring tool. Versions 21.12.0 through 26.1.0 have a critical vulnerability in its SAML SSO implementation which allows an attacker to take over any user account by using a malicious S...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-21T06:00:28.000Z ##

🚨 Critical SAML SSO vuln (CVE-2026-27197, CVSS 9.1) in Sentry 21.12.0 – 26.1.0 allows remote account takeover in multi-org instances. Upgrade to 26.2.0+, enable user 2FA, audit SSO settings! Full details: radar.offseq.com/threat/cve-20 #OffSeq #Sentry #CVE202627197 #infosec

##

thehackerwire@mastodon.social at 2026-02-21T05:21:46.000Z ##

🔴 CVE-2026-27197 - Critical (9.1)

Sentry is a developer-first error tracking and performance monitoring tool. Versions 21.12.0 through 26.1.0 have a critical vulnerability in its SAML SSO implementation which allows an attacker to take over any user account by using a malicious S...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24892
(0 None)

EPSS: 0.31%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-21T00:25:18.000Z ##

🟠 CVE-2026-24892 - High (7.5)

openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus. openITCOCKPIT Community Edition 5.3.1 and earlier contains an unsafe PHP deserialization pattern in the processing of change...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:25:18.000Z ##

🟠 CVE-2026-24892 - High (7.5)

openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus. openITCOCKPIT Community Edition 5.3.1 and earlier contains an unsafe PHP deserialization pattern in the processing of change...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27134
(0 None)

EPSS: 0.03%

4 posts

N/A

thehackerwire@mastodon.social at 2026-02-21T00:20:07.000Z ##

🟠 CVE-2026-27134 - High (8.1)

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. In versions 0.49.0 through 0.50.0, when using a custom Cluster or Clients CA with a multistage CA chain consisting of multiple ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:24.000Z ##

🟠 CVE-2026-27134 - High (8.1)

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. In versions 0.49.0 through 0.50.0, when using a custom Cluster or Clients CA with a multistage CA chain consisting of multiple ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:20:07.000Z ##

🟠 CVE-2026-27134 - High (8.1)

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. In versions 0.49.0 through 0.50.0, when using a custom Cluster or Clients CA with a multistage CA chain consisting of multiple ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:24.000Z ##

🟠 CVE-2026-27134 - High (8.1)

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. In versions 0.49.0 through 0.50.0, when using a custom Cluster or Clients CA with a multistage CA chain consisting of multiple ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27169
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-21T00:17:15.000Z ##

🟠 CVE-2026-27169 - High (8.9)

OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Versions 1.1.2-alpha and below render untrusted user/model content in chat tool UI surfaces using unsafe HTML interpolation patterns, leading t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:15.000Z ##

🟠 CVE-2026-27169 - High (8.9)

OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Versions 1.1.2-alpha and below render untrusted user/model content in chat tool UI surfaces using unsafe HTML interpolation patterns, leading t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27114
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-20T19:45:43.000Z ##

🟠 CVE-2026-27114 - High (7.5)

NanaZip is an open source file archive Starting in version 5.0.1252.0 and prior to version 6.0.1630.0, circular `NextOffset` chains cause an infinite loop in the ROMFS archive parser. Version 6.0.1630.0 patches the issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T19:45:43.000Z ##

🟠 CVE-2026-27114 - High (7.5)

NanaZip is an open source file archive Starting in version 5.0.1252.0 and prior to version 6.0.1630.0, circular `NextOffset` chains cause an infinite loop in the ROMFS archive parser. Version 6.0.1630.0 patches the issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

benrothke at 2026-02-20T17:30:42.595Z ##

is a popular open-source IP PBX management tool. @FreePBX manages communications & requires high availability & relatively open access, making it a very attractive target for threat actors. It now has serious CVE vulns. HT @PicusSecurity cybersec.picussecurity.com/s/c

##

benrothke@infosec.exchange at 2026-02-20T17:30:42.000Z ##

#FreePBX is a popular open-source IP PBX management tool. @FreePBX manages #VoIP communications & requires high availability & relatively open access, making it a very attractive target for threat actors. It now has serious CVE vulns. HT @PicusSecurity cybersec.picussecurity.com/s/c

##

benrothke at 2026-02-20T17:30:42.595Z ##

is a popular open-source IP PBX management tool. @FreePBX manages communications & requires high availability & relatively open access, making it a very attractive target for threat actors. It now has serious CVE vulns. HT @PicusSecurity cybersec.picussecurity.com/s/c

##

benrothke@infosec.exchange at 2026-02-20T17:30:42.000Z ##

#FreePBX is a popular open-source IP PBX management tool. @FreePBX manages #VoIP communications & requires high availability & relatively open access, making it a very attractive target for threat actors. It now has serious CVE vulns. HT @PicusSecurity cybersec.picussecurity.com/s/c

##

CVE-2026-26064
(0 None)

EPSS: 0.05%

4 posts

N/A

thehackerwire@mastodon.social at 2026-02-20T17:08:30.000Z ##

🟠 CVE-2026-26064 - High (8.8)

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below contain a Path Traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Wind...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-20T04:30:31.438Z ##

🛑 CRITICAL CVE-2026-26064 in calibre <9.3.0: Path traversal in extract_pictures enables arbitrary file writes & remote code execution on Windows. Patch to 9.3.0+ ASAP. User interaction required. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-20T17:08:30.000Z ##

🟠 CVE-2026-26064 - High (8.8)

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below contain a Path Traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Wind...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-20T04:30:31.000Z ##

🛑 CRITICAL CVE-2026-26064 in calibre <9.3.0: Path traversal in extract_pictures enables arbitrary file writes & remote code execution on Windows. Patch to 9.3.0+ ASAP. User interaction required. Details: radar.offseq.com/threat/cve-20 #OffSeq #Calibre #Vuln #InfoSec

##

CVE-2026-26959
(0 None)

EPSS: 0.01%

4 posts

N/A

thehackerwire@mastodon.social at 2026-02-20T00:19:37.000Z ##

🟠 CVE-2026-26959 - High (7.8)

ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below fail to validate the integrity or authenticity of the ADB binary path specified in the ManualAdbPath setting before executing it, allowing arbitrary code execution with t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-02-20T00:00:43.324Z ##

CVE-2026-26959: HIGH severity vuln in Alex4SSB ADB-Explorer (<0.9.26021). Malicious config (App.txt) can trigger code execution if users launch app with a crafted argument. Upgrade ASAP! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-20T00:19:37.000Z ##

🟠 CVE-2026-26959 - High (7.8)

ADB Explorer is a fluent UI for ADB on Windows. Versions 0.9.26020 and below fail to validate the integrity or authenticity of the ADB binary path specified in the ManualAdbPath setting before executing it, allowing arbitrary code execution with t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-20T00:00:43.000Z ##

CVE-2026-26959: HIGH severity vuln in Alex4SSB ADB-Explorer (<0.9.26021). Malicious config (App.txt) can trigger code execution if users launch app with a crafted argument. Upgrade ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Security #CVE202626959

##

CVE-2026-26202
(0 None)

EPSS: 0.05%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-19T21:01:54.000Z ##

🟠 CVE-2026-26202 - High (7.5)

Penpot is an open-source design tool for design and code collaboration. Prior to version 2.13.2, an authenticated user can read arbitrary files from the server by supplying a local file path (e.g. `/etc/passwd`) as a font data chunk in the `create...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T21:01:54.000Z ##

🟠 CVE-2026-26202 - High (7.5)

Penpot is an open-source design tool for design and code collaboration. Prior to version 2.13.2, an authenticated user can read arbitrary files from the server by supplying a local file path (e.g. `/etc/passwd`) as a font data chunk in the `create...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26200
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-19T21:01:39.000Z ##

🟠 CVE-2026-26200 - High (7.8)

HDF5 is software for managing data. Prior to version 1.14.4-2, an attacker who can control an `h5` file parsed by HDF5 can trigger a write-based heap buffer overflow condition. This can lead to a denial-of-service condition, and potentially furthe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-19T21:01:39.000Z ##

🟠 CVE-2026-26200 - High (7.8)

HDF5 is software for managing data. Prior to version 1.14.4-2, an attacker who can control an `h5` file parsed by HDF5 can trigger a write-based heap buffer overflow condition. This can lead to a denial-of-service condition, and potentially furthe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites