##
Updated at UTC 2026-03-26T17:52:07.604134
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-33636 | 7.6 | 0.00% | 2 | 0 | 2026-03-26T17:16:41.477000 | LIBPNG is a reference library for use in applications that read, create, and man | |
| CVE-2026-33416 | 7.5 | 0.00% | 2 | 0 | 2026-03-26T17:16:38.443000 | LIBPNG is a reference library for use in applications that read, create, and man | |
| CVE-2026-29785 | 7.5 | 0.07% | 2 | 0 | 2026-03-26T17:13:31.983000 | NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me | |
| CVE-2026-22739 | 8.6 | 0.02% | 1 | 0 | 2026-03-26T17:08:56 | Vulnerability in Spring Cloud when substituting the profile parameter from a req | |
| CVE-2026-33696 | 10.0 | 0.46% | 2 | 0 | 2026-03-26T16:41:02 | ## Impact An authenticated user with permission to create or modify workflows co | |
| CVE-2026-33017 | 9.8 | 6.14% | 2 | 4 | 2026-03-26T15:41:23 | ## Summary The `POST /api/v1/build_public_tmp/{flow_id}/flow` endpoint allows b | |
| CVE-2026-33348 | 8.7 | 0.03% | 2 | 0 | 2026-03-26T15:16:38.267000 | OpenEMR is a free and open source electronic health records and medical practice | |
| CVE-2026-20086 | 8.6 | 0.10% | 2 | 0 | 2026-03-26T15:13:33.940000 | A vulnerability in the processing of Control and Provisioning of Wireless Access | |
| CVE-2026-20084 | 8.6 | 0.11% | 1 | 0 | 2026-03-26T15:13:33.940000 | A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allo | |
| CVE-2026-24750 | 7.6 | 0.04% | 1 | 0 | 2026-03-26T15:13:15.790000 | Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior | |
| CVE-2026-30975 | 8.1 | 0.06% | 1 | 0 | 2026-03-26T15:13:15.790000 | Sonarr is a PVR for Usenet and BitTorrent users. Versions prior to 4.0.16.2942 h | |
| CVE-2026-2995 | 7.7 | 0.02% | 2 | 0 | 2026-03-26T15:13:15.790000 | GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 bef | |
| CVE-2026-3988 | 7.5 | 0.04% | 3 | 0 | 2026-03-26T15:13:15.790000 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 | |
| CVE-2026-4701 | 9.8 | 0.02% | 1 | 0 | 2026-03-26T14:16:13.893000 | Use-after-free in the JavaScript Engine component. This vulnerability affects Fi | |
| CVE-2026-4700 | 9.8 | 0.02% | 1 | 0 | 2026-03-26T13:16:30.367000 | Mitigation bypass in the Networking: HTTP component. This vulnerability affects | |
| CVE-2026-4698 | 9.8 | 0.02% | 1 | 0 | 2026-03-26T13:16:29.967000 | JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability a | |
| CVE-2026-33344 | 8.1 | 0.02% | 1 | 0 | 2026-03-26T13:03:13.500000 | Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0 | |
| CVE-2026-28760 | 7.8 | 0.01% | 4 | 0 | 2026-03-26T09:30:33 | The installer of RATOC RAID Monitoring Manager for Windows searches the current | |
| CVE-2026-32680 | 7.8 | 0.01% | 4 | 0 | 2026-03-26T09:30:33 | The installer of RATOC RAID Monitoring Manager for Windows allows to customize t | |
| CVE-2026-4840 | 8.8 | 0.15% | 4 | 0 | 2026-03-26T06:30:27 | A security flaw has been discovered in Netcore Power 15AX up to 3.0.0.6938. Affe | |
| CVE-2026-2931 | 8.8 | 0.04% | 2 | 0 | 2026-03-26T06:30:27 | The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object | |
| CVE-2026-4484 | 9.8 | 0.04% | 2 | 0 | 2026-03-26T03:30:34 | The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in | |
| CVE-2026-4758 | 8.8 | 0.25% | 2 | 0 | 2026-03-26T00:31:03 | The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion | |
| CVE-2026-24151 | 7.8 | 0.05% | 1 | 0 | 2026-03-25T21:57:49.383000 | NVIDIA Megatron-LM contains a vulnerability in inferencing where an Attacker may | |
| CVE-2026-24152 | 7.8 | 0.05% | 1 | 0 | 2026-03-25T21:56:52.887000 | NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attac | |
| CVE-2026-32537 | 7.5 | 0.11% | 1 | 0 | 2026-03-25T21:31:39 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2026-25447 | 9.1 | 0.04% | 2 | 0 | 2026-03-25T21:31:39 | Improper Control of Generation of Code ('Code Injection') vulnerability in Jonat | |
| CVE-2026-32546 | 7.5 | 0.03% | 2 | 0 | 2026-03-25T21:31:39 | Missing Authorization vulnerability in StellarWP Restrict Content restrict-conte | |
| CVE-2026-25001 | 8.6 | 0.05% | 1 | 0 | 2026-03-25T21:31:38 | Improper Control of Generation of Code ('Code Injection') vulnerability in Saad | |
| CVE-2026-32573 | 9.1 | 0.04% | 3 | 0 | 2026-03-25T21:30:36 | Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio | |
| CVE-2026-32531 | 8.1 | 0.11% | 1 | 0 | 2026-03-25T21:30:36 | Improper Control of Filename for Include/Require Statement in PHP Program ('PHP | |
| CVE-2026-32534 | 8.5 | 0.03% | 1 | 0 | 2026-03-25T21:30:36 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-32539 | 9.3 | 0.03% | 1 | 0 | 2026-03-25T21:30:36 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-25366 | 10.0 | 0.05% | 2 | 0 | 2026-03-25T21:30:35 | Improper Control of Generation of Code ('Code Injection') vulnerability in Theme | |
| CVE-2026-32513 | 8.8 | 0.05% | 1 | 0 | 2026-03-25T21:30:35 | Deserialization of Untrusted Data vulnerability in Miguel Useche JS Archive List | |
| CVE-2026-27044 | 10.0 | 0.05% | 2 | 0 | 2026-03-25T21:30:35 | Improper Control of Generation of Code ('Code Injection') vulnerability in Total | |
| CVE-2026-4719 | 7.5 | 0.01% | 1 | 0 | 2026-03-25T21:30:28 | Incorrect boundary conditions in the Graphics: Text component. This vulnerabilit | |
| CVE-2026-4705 | 9.8 | 0.02% | 1 | 0 | 2026-03-25T21:30:27 | Undefined behavior in the WebRTC: Signaling component. This vulnerability affect | |
| CVE-2026-4704 | 7.5 | 0.01% | 1 | 0 | 2026-03-25T21:30:27 | Denial-of-service in the WebRTC: Signaling component. This vulnerability affects | |
| CVE-2026-33680 | 7.5 | 0.03% | 1 | 0 | 2026-03-25T21:18:09 | ## Summary The `LinkSharing.ReadAll()` method allows link share authenticated u | |
| CVE-2026-33678 | 8.1 | 0.03% | 2 | 0 | 2026-03-25T21:17:43 | ## Summary `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id | |
| CVE-2026-32538 | 7.5 | 0.03% | 1 | 0 | 2026-03-25T21:16:46.347000 | Insertion of Sensitive Information Into Sent Data vulnerability in Noor Alam SMT | |
| CVE-2026-32536 | 9.9 | 0.04% | 1 | 0 | 2026-03-25T21:16:45.867000 | Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green | |
| CVE-2026-33660 | 10.0 | 0.11% | 2 | 0 | 2026-03-25T21:07:45 | ## Impact An authenticated user with permission to create or modify workflows co | |
| CVE-2026-33310 | 8.8 | 0.05% | 1 | 0 | 2026-03-25T20:54:34.937000 | Intake is a package for finding, investigating, loading and disseminating data. | |
| CVE-2026-33316 | 8.1 | 0.03% | 2 | 0 | 2026-03-25T20:53:33 | ### Summary A flaw in Vikunja’s password reset logic allows disabled users to r | |
| CVE-2026-29839 | 8.8 | 0.01% | 1 | 0 | 2026-03-25T20:53:05.983000 | DedeCMS v5.7.118 was discovered to contain a Cross-Site Request Forgery (CSRF) v | |
| CVE-2026-33211 | 9.6 | 0.02% | 2 | 0 | 2026-03-25T20:48:05 | ### Summary The Tekton Pipelines git resolver is vulnerable to path traversal v | |
| CVE-2026-4716 | 9.1 | 0.02% | 1 | 0 | 2026-03-25T20:16:37.020000 | Incorrect boundary conditions, uninitialized memory in the JavaScript Engine com | |
| CVE-2026-4715 | 9.1 | 0.02% | 1 | 0 | 2026-03-25T20:16:36.837000 | Uninitialized memory in the Graphics: Canvas2D component. This vulnerability aff | |
| CVE-2026-32525 | 9.9 | 0.05% | 1 | 0 | 2026-03-25T20:16:30.967000 | Improper Control of Generation of Code ('Code Injection') vulnerability in jetmo | |
| CVE-2026-20687 | 7.1 | 0.01% | 1 | 1 | 2026-03-25T20:07:15.087000 | A use after free issue was addressed with improved memory management. This issue | |
| CVE-2026-4712 | 7.5 | 0.01% | 1 | 0 | 2026-03-25T19:16:52.517000 | Information disclosure in the Widget: Cocoa component. This vulnerability affect | |
| CVE-2026-3857 | 8.1 | 0.01% | 3 | 0 | 2026-03-25T18:32:07 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 | |
| CVE-2026-20012 | 8.6 | 0.10% | 2 | 0 | 2026-03-25T18:31:51 | A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco | |
| CVE-2026-20125 | 7.7 | 0.14% | 1 | 0 | 2026-03-25T18:31:51 | A vulnerability in the HTTP Server feature of Cisco IOS Software and Cisco IOS X | |
| CVE-2026-26832 | 9.8 | 0.19% | 1 | 1 | 2026-03-25T18:31:51 | node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tessera | |
| CVE-2026-3608 | 7.5 | 0.02% | 1 | 0 | 2026-03-25T18:16:32.853000 | Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea- | |
| CVE-2026-33287 | 7.5 | 0.04% | 2 | 0 | 2026-03-25T17:44:24 | ### Summary The `replace_first` filter in LiquidJS uses JavaScript's `String.pro | |
| CVE-2026-33285 | 7.5 | 0.04% | 2 | 0 | 2026-03-25T17:40:53 | ### Summary LiquidJS's `memoryLimit` security mechanism can be completely bypas | |
| CVE-2026-20131 | 10.0 | 0.65% | 5 | 3 | 2026-03-25T17:39:46.247000 | A vulnerability in the web-based management interface of Cisco Secure Firewall M | |
| CVE-2026-33286 | 9.1 | 0.04% | 1 | 0 | 2026-03-25T17:18:23.687000 | Graphiti is a framework that sits on top of models and exposes them via a JSON:A | |
| CVE-2026-4711 | 9.8 | 0.02% | 1 | 0 | 2026-03-25T17:17:10.257000 | Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefo | |
| CVE-2026-27889 | 7.5 | 0.07% | 1 | 0 | 2026-03-25T17:07:53 | ### Background NATS.io is a high performance open source pub-sub distributed co | |
| CVE-2025-71275 | 0 | 0.00% | 1 | 0 | 2026-03-25T16:16:08.033000 | Rejected reason: This CVE was rejected due to being a duplicate of CVE-2024-4551 | |
| CVE-2025-32991 | 9.0 | 0.21% | 2 | 0 | 2026-03-25T16:16:07.650000 | In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful AP | |
| CVE-2026-2417 | 0 | 0.10% | 1 | 0 | 2026-03-25T15:41:58.280000 | A Missing Authentication for Critical Function vulnerability in Pharos Controls | |
| CVE-2025-33244 | 9.0 | 0.03% | 2 | 0 | 2026-03-25T15:41:58.280000 | NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker co | |
| CVE-2026-24157 | 7.8 | 0.12% | 1 | 0 | 2026-03-25T15:41:58.280000 | NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an at | |
| CVE-2026-24159 | 7.8 | 0.12% | 1 | 0 | 2026-03-25T15:41:58.280000 | NVIDIA NeMo Framework contains a vulnerability where an attacker may cause remot | |
| CVE-2026-33509 | 7.5 | 0.06% | 1 | 0 | 2026-03-25T15:41:58.280000 | pyLoad is a free and open-source download manager written in Python. From versio | |
| CVE-2026-33399 | 7.7 | 0.03% | 1 | 0 | 2026-03-25T15:41:58.280000 | Wallos is an open-source, self-hostable personal subscription tracker. Prior to | |
| CVE-2026-2072 | 8.2 | 0.04% | 1 | 0 | 2026-03-25T15:41:33.977000 | Cross-Site Scripting vulnerability in Hitachi Infrastructure Analytics Advisor ( | |
| CVE-2026-28877 | 0 | 0.02% | 1 | 0 | 2026-03-25T15:41:33.977000 | An authorization issue was addressed with improved state management. This issue | |
| CVE-2026-28864 | 3.3 | 0.01% | 1 | 0 | 2026-03-25T15:32:30 | This issue was addressed with improved permissions checking. This issue is fixed | |
| CVE-2026-3104 | 7.5 | 0.03% | 2 | 0 | 2026-03-25T15:31:37 | A specially crafted domain can be used to cause a memory leak in a BIND resolver | |
| CVE-2026-26830 | 9.8 | 0.25% | 2 | 2 | 2026-03-25T15:31:37 | pdf-image (npm package) through version 2.0.0 allows OS command injection via th | |
| CVE-2026-1519 | 7.5 | 0.04% | 2 | 0 | 2026-03-25T15:31:36 | If a BIND resolver is performing DNSSEC validation and encounters a maliciously | |
| CVE-2026-2343 | 5.3 | 0.03% | 1 | 0 | 2026-03-25T15:31:30 | The PeproDev Ultimate Invoice WordPress plugin through 2.2.5 has a bulk download | |
| CVE-2026-33634 | 0 | 0.07% | 2 | 1 | 2026-03-25T15:16:49.230000 | Trivy is a security scanner. On March 19, 2026, a threat actor used compromised | |
| CVE-2026-3909 | 8.8 | 4.44% | 1 | 0 | 2026-03-25T14:05:38.743000 | Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a re | |
| CVE-2026-26306 | 7.8 | 0.02% | 1 | 0 | 2026-03-25T06:30:35 | The installer for OM Workspace (Windows Edition) Ver 2.4 and earlier insecurely | |
| CVE-2026-33218 | 7.5 | 0.12% | 2 | 0 | 2026-03-24T21:45:30 | ### Background NATS.io is a high performance open source pub-sub distributed co | |
| CVE-2026-33216 | 8.6 | 0.03% | 2 | 0 | 2026-03-24T21:42:11 | ### Background NATS.io is a high performance open source pub-sub distributed co | |
| CVE-2026-4725 | 10.0 | 0.01% | 1 | 0 | 2026-03-24T21:32:29 | Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This v | |
| CVE-2026-4723 | 9.8 | 0.01% | 1 | 0 | 2026-03-24T21:32:29 | Use-after-free in the JavaScript Engine component. This vulnerability affects Fi | |
| CVE-2026-4717 | 9.8 | 0.02% | 1 | 0 | 2026-03-24T21:32:28 | Privilege escalation in the Netmonitor component. This vulnerability affects Fir | |
| CVE-2026-4714 | 7.5 | 0.01% | 1 | 0 | 2026-03-24T21:32:28 | Incorrect boundary conditions in the Audio/Video component. This vulnerability a | |
| CVE-2026-4713 | 7.5 | 0.01% | 1 | 0 | 2026-03-24T21:32:28 | Incorrect boundary conditions in the Graphics component. This vulnerability affe | |
| CVE-2026-30653 | 7.5 | 0.18% | 1 | 0 | 2026-03-24T21:32:28 | An issue in Free5GC v.4.2.0 and before allows a remote attacker to cause a denia | |
| CVE-2025-33254 | 7.5 | 0.03% | 1 | 0 | 2026-03-24T21:31:36 | NVIDIA Triton Inference Server contains a vulnerability where an attacker may ca | |
| CVE-2025-33248 | 7.8 | 0.05% | 1 | 0 | 2026-03-24T21:31:35 | NVIDIA Megatron-LM contains a vulnerability in the hybrid conversion script wher | |
| CVE-2025-33247 | 7.8 | 0.24% | 1 | 0 | 2026-03-24T21:31:35 | NVIDIA Megatron LM contains a vulnerability in quantization configuration loadin | |
| CVE-2025-33238 | 7.5 | 0.03% | 1 | 0 | 2026-03-24T21:31:35 | NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability wh | |
| CVE-2026-24158 | 7.5 | 0.04% | 1 | 0 | 2026-03-24T21:31:35 | NVIDIA Triton Inference Server contains a vulnerability in the HTTP endpoint whe | |
| CVE-2026-24150 | 7.8 | 0.05% | 1 | 0 | 2026-03-24T21:31:35 | NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attac | |
| CVE-2026-24141 | 7.8 | 0.06% | 1 | 0 | 2026-03-24T21:31:35 | NVIDIA Model Optimizer for Windows and Linux contains a vulnerability in the ONN | |
| CVE-2026-22559 | 8.8 | 0.07% | 1 | 0 | 2026-03-24T21:31:35 | An Improper Input Validation vulnerability in UniFi Network Server may allow una | |
| CVE-2026-4702 | 9.8 | 0.02% | 1 | 0 | 2026-03-24T21:31:22 | JIT miscompilation in the JavaScript Engine component. This vulnerability affect | |
| CVE-2026-4722 | 8.8 | 0.02% | 1 | 0 | 2026-03-24T21:16:34.063000 | Privilege escalation in the IPC component. This vulnerability affects Firefox < | |
| CVE-2026-33554 | 7.5 | 0.04% | 1 | 0 | 2026-03-24T20:16:30.357000 | ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response | |
| CVE-2026-33242 | 7.5 | 0.01% | 1 | 0 | 2026-03-24T19:37:42.130000 | Salvo is a Rust web framework. Versions 0.39.0 through 0.89.2 have a Path Traver | |
| CVE-2026-33497 | 7.5 | 0.01% | 1 | 0 | 2026-03-24T19:20:25.140000 | Langflow is a tool for building and deploying AI-powered agents and workflows. P | |
| CVE-2026-33484 | 7.5 | 0.02% | 1 | 0 | 2026-03-24T19:20:13.567000 | Langflow is a tool for building and deploying AI-powered agents and workflows. I | |
| CVE-2026-33418 | 7.5 | 0.04% | 1 | 0 | 2026-03-24T19:19:48.480000 | DiceBear is an avatar library for designers and developers. Prior to version 9.4 | |
| CVE-2026-4679 | 8.8 | 0.08% | 1 | 0 | 2026-03-24T18:31:34 | Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a rem | |
| CVE-2026-4675 | 8.8 | 0.07% | 1 | 0 | 2026-03-24T18:31:34 | Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a | |
| CVE-2026-4678 | 8.8 | 0.11% | 1 | 0 | 2026-03-24T17:50:27.517000 | Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remo | |
| CVE-2026-4680 | 8.8 | 0.13% | 1 | 0 | 2026-03-24T17:50:13.317000 | Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remot | |
| CVE-2026-4673 | 8.8 | 0.07% | 2 | 0 | 2026-03-24T16:54:37.343000 | Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowe | |
| CVE-2026-4674 | 8.8 | 0.08% | 2 | 0 | 2026-03-24T16:53:14.987000 | Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a rem | |
| CVE-2026-4676 | 8.8 | 0.11% | 1 | 0 | 2026-03-24T16:50:03.117000 | Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote | |
| CVE-2026-33056 | 6.5 | 0.01% | 2 | 0 | 2026-03-24T16:17:11.623000 | tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and | |
| CVE-2026-3055 | 0 | 0.02% | 5 | 0 | 2026-03-24T15:54:09.400000 | Insufficient input validation in NetScaler ADC and NetScaler Gateway when config | |
| CVE-2025-15605 | 0 | 0.01% | 2 | 0 | 2026-03-24T15:54:09.400000 | A hardcoded cryptographic key within the configuration mechanism on TP-Link Arch | |
| CVE-2026-4368 | 0 | 0.02% | 2 | 0 | 2026-03-24T15:54:09.400000 | Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configur | |
| CVE-2026-4681 | 0 | 0.38% | 1 | 0 | 2026-03-24T15:53:48.067000 | A critical remote code execution (RCE) vulnerability has been reported in PTC Wi | |
| CVE-2026-27651 | 7.5 | 0.03% | 2 | 0 | 2026-03-24T15:53:48.067000 | When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open | |
| CVE-2026-27654 | 8.2 | 0.02% | 1 | 0 | 2026-03-24T15:53:48.067000 | NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module | |
| CVE-2026-4739 | 0 | 0.04% | 2 | 0 | 2026-03-24T15:53:48.067000 | Integer Overflow or Wraparound vulnerability in InsightSoftwareConsortium ITK ( | |
| CVE-2025-41660 | 8.8 | 0.21% | 1 | 0 | 2026-03-24T15:53:48.067000 | A low-privileged remote attacker may be able to replace the boot application of | |
| CVE-2026-4755 | 9.8 | 0.06% | 1 | 0 | 2026-03-24T15:53:48.067000 | CWE-20 vulnerability in MolotovCherry Android-ImageMagick7.This issue affects An | |
| CVE-2026-4746 | 0 | 0.04% | 1 | 0 | 2026-03-24T15:53:48.067000 | Out-of-bounds Write vulnerability in timeplus-io proton (base/poco/Foundation/sr | |
| CVE-2026-4662 | 7.5 | 0.08% | 1 | 0 | 2026-03-24T15:53:48.067000 | The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listi | |
| CVE-2026-33298 | 7.8 | 0.04% | 2 | 0 | 2026-03-24T15:53:48.067000 | llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an int | |
| CVE-2026-27784 | 7.8 | 0.01% | 2 | 0 | 2026-03-24T15:30:36 | The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_ht | |
| CVE-2026-32647 | 7.8 | 0.01% | 2 | 0 | 2026-03-24T15:30:36 | NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module | |
| CVE-2026-4775 | 7.8 | 0.06% | 1 | 0 | 2026-03-24T15:30:36 | A flaw was found in the libtiff library. A remote attacker could exploit a signe | |
| CVE-2026-3509 | 7.5 | 0.08% | 1 | 0 | 2026-03-24T09:30:41 | An unauthenticated remote attacker may be able to control the format string of m | |
| CVE-2026-4745 | None | 0.05% | 1 | 0 | 2026-03-24T06:31:25 | Improper Control of Generation of Code ('Code Injection') vulnerability in dendi | |
| CVE-2026-4753 | 9.1 | 0.04% | 1 | 0 | 2026-03-24T06:31:25 | Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects Re | |
| CVE-2026-4750 | 9.1 | 0.04% | 1 | 0 | 2026-03-24T06:31:25 | Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof | |
| CVE-2026-4640 | 7.5 | 0.07% | 1 | 0 | 2026-03-24T06:31:25 | Vitals ESP developed by Galaxy Software Services has a Missing Authentication vu | |
| CVE-2026-4283 | 9.1 | 0.10% | 2 | 0 | 2026-03-24T06:31:20 | The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized acc | |
| CVE-2026-4639 | 8.8 | 0.10% | 2 | 0 | 2026-03-24T06:31:14 | Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization v | |
| CVE-2026-4744 | None | 0.01% | 1 | 0 | 2026-03-24T06:31:14 | Out-of-bounds Read vulnerability in rizonesoft Notepad3 (scintilla/oniguruma/sr | |
| CVE-2026-4677 | 8.8 | 0.07% | 1 | 0 | 2026-03-24T03:31:25 | Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.16 | |
| CVE-2025-15517 | None | 0.04% | 2 | 0 | 2026-03-23T18:30:39 | A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210 | |
| CVE-2026-32746 | 9.8 | 0.03% | 3 | 5 | 2026-03-23T15:31:40 | telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMO | |
| CVE-2025-31277 | 8.8 | 0.27% | 1 | 0 | 2026-03-20T18:53:35.083000 | The issue was addressed with improved memory handling. This issue is fixed in Sa | |
| CVE-2025-43520 | 5.5 | 0.47% | 8 | 0 | 2026-03-20T18:32:19 | A memory corruption issue was addressed with improved memory handling. This issu | |
| CVE-2026-33331 | 8.2 | 0.01% | 1 | 0 | 2026-03-20T17:25:56 | A Stored Cross-Site Scripting (XSS) vulnerability exists in the OpenAPI document | |
| CVE-2026-21992 | 9.8 | 0.06% | 1 | 0 | 2026-03-20T15:32:14 | Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware | |
| CVE-2026-3888 | 7.8 | 0.01% | 1 | 5 | 2026-03-18T04:17:30.720000 | Local privilege escalation in snapd on Linux allows local attackers to get root | |
| CVE-2026-32116 | 8.1 | 0.08% | 1 | 0 | 2026-03-16T18:02:21.613000 | Magic Wormhole makes it possible to get arbitrary-sized files and directories fr | |
| CVE-2026-26123 | 5.5 | 0.05% | 2 | 0 | 2026-03-10T21:32:18 | Cwe is not in rca categories in Microsoft Authenticator allows an unauthorized a | |
| CVE-2026-27598 | 6.5 | 0.11% | 1 | 0 | 2026-02-25T20:23:36.483000 | Dagu is a workflow engine with a built-in Web user interface. In versions up to | |
| CVE-2026-27210 | None | 0.03% | 1 | 0 | 2026-02-23T22:27:55 | ### Impact The hot spot `attributes` configuration property allowed any attribut | |
| CVE-2025-43529 | 8.8 | 0.17% | 1 | 8 | 2025-12-17T21:31:01 | A use-after-free issue was addressed with improved memory management. This issue | |
| CVE-2025-24201 | 7.1 | 0.10% | 1 | 3 | 2025-11-13T21:31:15 | An out-of-bounds write issue was addressed with improved checks to prevent unaut | |
| CVE-2023-38606 | 5.5 | 0.12% | 2 | 0 | 2025-10-31T14:43:10.643000 | This issue was addressed with improved state management. This issue is fixed in | |
| CVE-2023-32434 | 7.8 | 61.25% | 4 | 2 | 2025-10-23T18:48:05.013000 | An integer overflow was addressed with improved input validation. This issue is | |
| CVE-2026-3650 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-15518 | 0 | 0.00% | 4 | 0 | N/A | ||
| CVE-2026-15519 | 0 | 0.00% | 4 | 0 | N/A | ||
| CVE-2026-33526 | 0 | 1.98% | 2 | 0 | N/A | ||
| CVE-2026-33918 | 0 | 0.03% | 4 | 0 | N/A | ||
| CVE-2026-33917 | 0 | 0.03% | 4 | 1 | N/A | ||
| CVE-2026-33932 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-34056 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-34055 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-23514 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-29187 | 0 | 0.02% | 4 | 1 | N/A | ||
| CVE-2026-33913 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-32628 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-30976 | 0 | 0.06% | 1 | 0 | N/A | ||
| CVE-2026-33656 | 0 | 0.00% | 1 | 1 | N/A | ||
| CVE-2026-28373 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-33870 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-33871 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-33329 | 0 | 0.07% | 1 | 0 | N/A | ||
| CVE-2026-33340 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-30840 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2026-30839 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-33307 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-33250 | 0 | 0.21% | 1 | 0 | N/A |
updated 2026-03-26T17:16:41.477000
2 posts
#libpng 1.6.56 fixes two high-severity vulnerabilities: CVE-2026-33416 and CVE-2026-33636.
Out of these CVE-2026-33416: Use-after-free via pointer aliasing in png_set_tRNS and png_set_PLTE is particularly serious as arbitrary code execution has been demonstrated. Applications that call png_free_data() to release memory between png_read_info() and png_read_update_info() are affected.
https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7j
The second vulnerability CVE-2026-33636: Out-of-bounds read/write in the palette expansion on ARM Neon is of more limited concern as only crashes has been demonstrated. More serious impacts have not been ruled out, however.
https://github.com/pnggroup/libpng/security/advisories/GHSA-wjr5-c57x-95m2
###libpng 1.6.56 fixes two high-severity vulnerabilities: CVE-2026-33416 and CVE-2026-33636.
Out of these CVE-2026-33416: Use-after-free via pointer aliasing in png_set_tRNS and png_set_PLTE is particularly serious as arbitrary code execution has been demonstrated. Applications that call png_free_data() to release memory between png_read_info() and png_read_update_info() are affected.
https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7j
The second vulnerability CVE-2026-33636: Out-of-bounds read/write in the palette expansion on ARM Neon is of more limited concern as only crashes has been demonstrated. More serious impacts have not been ruled out, however.
https://github.com/pnggroup/libpng/security/advisories/GHSA-wjr5-c57x-95m2
##updated 2026-03-26T17:16:38.443000
2 posts
#libpng 1.6.56 fixes two high-severity vulnerabilities: CVE-2026-33416 and CVE-2026-33636.
Out of these CVE-2026-33416: Use-after-free via pointer aliasing in png_set_tRNS and png_set_PLTE is particularly serious as arbitrary code execution has been demonstrated. Applications that call png_free_data() to release memory between png_read_info() and png_read_update_info() are affected.
https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7j
The second vulnerability CVE-2026-33636: Out-of-bounds read/write in the palette expansion on ARM Neon is of more limited concern as only crashes has been demonstrated. More serious impacts have not been ruled out, however.
https://github.com/pnggroup/libpng/security/advisories/GHSA-wjr5-c57x-95m2
###libpng 1.6.56 fixes two high-severity vulnerabilities: CVE-2026-33416 and CVE-2026-33636.
Out of these CVE-2026-33416: Use-after-free via pointer aliasing in png_set_tRNS and png_set_PLTE is particularly serious as arbitrary code execution has been demonstrated. Applications that call png_free_data() to release memory between png_read_info() and png_read_update_info() are affected.
https://github.com/pnggroup/libpng/security/advisories/GHSA-m4pc-p4q3-4c7j
The second vulnerability CVE-2026-33636: Out-of-bounds read/write in the palette expansion on ARM Neon is of more limited concern as only crashes has been demonstrated. More serious impacts have not been ruled out, however.
https://github.com/pnggroup/libpng/security/advisories/GHSA-wjr5-c57x-95m2
##updated 2026-03-26T17:13:31.983000
2 posts
🟠 CVE-2026-29785 - High (7.5)
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29785/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29785 - High (7.5)
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29785/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T17:08:56
1 posts
🟠 CVE-2026-22739 - High (8.6)
Vulnerability in Spring Cloud when substituting the profile parameter from a request made to the Spring Cloud Config Server configured to the native file system as a backend, because it was possible to access files outside of the configured search...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22739/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T16:41:02
2 posts
🚩 CRITICAL: CVE-2026-33696 in n8n-io n8n (CVSS 9.4) - Prototype pollution enables remote code execution via XML/GSuiteAdmin nodes. Patch to 2.14.1, 2.13.3, or 1.123.27+. Restrict permissions & disable XML node as temp fix. https://radar.offseq.com/threat/cve-2026-33696-cwe-1321-improperly-controlled-modi-9ddf2aba #OffSeq #n8n #CVE2026_33696
##🚩 CRITICAL: CVE-2026-33696 in n8n-io n8n (CVSS 9.4) - Prototype pollution enables remote code execution via XML/GSuiteAdmin nodes. Patch to 2.14.1, 2.13.3, or 1.123.27+. Restrict permissions & disable XML node as temp fix. https://radar.offseq.com/threat/cve-2026-33696-cwe-1321-improperly-controlled-modi-9ddf2aba #OffSeq #n8n #CVE2026_33696
##updated 2026-03-26T15:41:23
2 posts
4 repos
https://github.com/rootdirective-sec/CVE-2026-33017-Lab
https://github.com/omer-efe-curkus/CVE-2026-33017-Langflow-RCE-PoC
CVE ID: CVE-2026-33017
Vendor: Langflow
Product: Langflow
Date Added: 2026-03-25
Notes: https://github.com/langflow-ai/langflow/security/advisories/GHSA-vwmf-pq79-vjvx ; https://nvd.nist.gov/vuln/detail/CVE-2026-33017
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-33017
CISA has updated the KEV catalogue.
- CVE-2026-33017: Langflow Code Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-33017 #CISA #infosec #vulnerability
##updated 2026-03-26T15:16:38.267000
2 posts
🟠 CVE-2026-33348 - High (8.7)
OpenEMR is a free and open source electronic health records and medical practice management application. Users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form are displayed on the en...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33348/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33348 - High (8.7)
OpenEMR is a free and open source electronic health records and medical practice management application. Users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form are displayed on the en...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33348/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:13:33.940000
2 posts
🟠 CVE-2026-20086 - High (8.6)
A vulnerability in the processing of Control and Provisioning of Wireless Access Points (CAPWAP) packets of Cisco IOS XE Wireless Controller Software for the Catalyst CW9800 Family could allow an unauthenticated, remote attacker to cause a denial ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20086/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-20086 - High (8.6)
A vulnerability in the processing of Control and Provisioning of Wireless Access Points (CAPWAP) packets of Cisco IOS XE Wireless Controller Software for the Catalyst CW9800 Family could allow an unauthenticated, remote attacker to cause a denial ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20086/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:13:33.940000
1 posts
🟠 CVE-2026-20084 - High (8.6)
A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause BOOTP packets to be forwarded between VLANs, resulting in a denial of service (DoS) condition.
This vulnerability is...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20084/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:13:15.790000
1 posts
🟠 CVE-2026-24750 - High (7.6)
Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior to version 9.2.1, an authenticated attacker could exploit an Improper Neutralization of Input During Web Page Generation as Stored XSS when modifying forms. Upgrade Ki...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24750/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:13:15.790000
1 posts
🟠 CVE-2026-30975 - High (8.1)
Sonarr is a PVR for Usenet and BitTorrent users. Versions prior to 4.0.16.2942 have an authentication bypass that affected users that had disabled authentication for local addresses (Authentication Required set to: `Disabled for Local Addresses`) ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30975/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:13:15.790000
2 posts
🟠 CVE-2026-2995 - High (7.7)
GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2995 - High (7.7)
GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T15:13:15.790000
3 posts
🟠 CVE-2026-3988 - High (7.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3988/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3988 - High (7.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3988/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3988 - High (7.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3988/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T14:16:13.893000
1 posts
🔴 CVE-2026-4701 - Critical (9.8)
Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4701/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T13:16:30.367000
1 posts
🔴 CVE-2026-4700 - Critical (9.8)
Mitigation bypass in the Networking: HTTP component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4700/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T13:16:29.967000
1 posts
🔴 New security advisory:
CVE-2026-4698 affects Mozilla Firefox.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-4698-firefox-jit-compiler-vulnerability
updated 2026-03-26T13:03:13.500000
1 posts
🟠 CVE-2026-33344 - High (8.1)
Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0 to before version 2.3.1, the fix for CVE-2026-27598 added ValidateDAGName to CreateNewDAG and rewrote generateFilePath to use filepath.Base. This patched the CREATE p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33344/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T09:30:33
4 posts
🛡️ HIGH-severity: CVE-2026-28760 in RATOC RAID Monitoring Manager for Windows (<2.00.009.260220) allows DLL hijacking — local attackers may run code as admin. Patch ASAP, restrict installer access, and audit installs. https://radar.offseq.com/threat/cve-2026-28760-uncontrolled-search-path-element-in-f4dfdefd #OffSeq #infosec #vuln #windows
##🟠 CVE-2026-28760 - High (7.8)
The installer of RATOC RAID Monitoring Manager for Windows searches the current directory to load certain DLLs. If a user is directed to place a crafted DLL with the installer, an arbitrary code may be executed with the administrator privilege.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28760/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🛡️ HIGH-severity: CVE-2026-28760 in RATOC RAID Monitoring Manager for Windows (<2.00.009.260220) allows DLL hijacking — local attackers may run code as admin. Patch ASAP, restrict installer access, and audit installs. https://radar.offseq.com/threat/cve-2026-28760-uncontrolled-search-path-element-in-f4dfdefd #OffSeq #infosec #vuln #windows
##🟠 CVE-2026-28760 - High (7.8)
The installer of RATOC RAID Monitoring Manager for Windows searches the current directory to load certain DLLs. If a user is directed to place a crafted DLL with the installer, an arbitrary code may be executed with the administrator privilege.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28760/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T09:30:33
4 posts
HIGH severity alert: RATOC RAID Monitoring Manager for Windows (<2.00.009.260220) can leave custom install folders with insecure ACLs, letting non-admins run code as SYSTEM. Check permissions & update! CVE-2026-32680 https://radar.offseq.com/threat/cve-2026-32680-incorrect-default-permissions-in-ra-38982bf7 #OffSeq #Vuln #Windows #SysAdmin
##🟠 CVE-2026-32680 - High (7.8)
The installer of RATOC RAID Monitoring Manager for Windows allows to customize the installation folder. If the installation folder is customized to some non-default one, the folder may be left with un-secure ACLs and non-administrative users can a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32680/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##HIGH severity alert: RATOC RAID Monitoring Manager for Windows (<2.00.009.260220) can leave custom install folders with insecure ACLs, letting non-admins run code as SYSTEM. Check permissions & update! CVE-2026-32680 https://radar.offseq.com/threat/cve-2026-32680-incorrect-default-permissions-in-ra-38982bf7 #OffSeq #Vuln #Windows #SysAdmin
##🟠 CVE-2026-32680 - High (7.8)
The installer of RATOC RAID Monitoring Manager for Windows allows to customize the installation folder. If the installation folder is customized to some non-default one, the folder may be left with un-secure ACLs and non-administrative users can a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32680/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T06:30:27
4 posts
🔥 CVE-2026-4840: HIGH-severity OS command injection in Netcore Power 15AX (≤3.0.0.6938). No patch, public exploit out. Remote code execution possible — immediate mitigation needed! Full compromise risk. Details: https://radar.offseq.com/threat/cve-2026-4840-os-command-injection-in-netcore-powe-abf3a5bc #OffSeq #Netcore #Security #CVE20264840
##🟠 CVE-2026-4840 - High (8.8)
A security flaw has been discovered in Netcore Power 15AX up to 3.0.0.6938. Affected by this issue is the function setTools of the file /bin/netis.cgi of the component Diagnostic Tool Interface. Performing a manipulation of the argument IpAddr res...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4840/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔥 CVE-2026-4840: HIGH-severity OS command injection in Netcore Power 15AX (≤3.0.0.6938). No patch, public exploit out. Remote code execution possible — immediate mitigation needed! Full compromise risk. Details: https://radar.offseq.com/threat/cve-2026-4840-os-command-injection-in-netcore-powe-abf3a5bc #OffSeq #Netcore #Security #CVE20264840
##🟠 CVE-2026-4840 - High (8.8)
A security flaw has been discovered in Netcore Power 15AX up to 3.0.0.6938. Affected by this issue is the function setTools of the file /bin/netis.cgi of the component Diagnostic Tool Interface. Performing a manipulation of the argument IpAddr res...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4840/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T06:30:27
2 posts
🟠 CVE-2026-2931 - High (8.8)
The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 9.1.2. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and acce...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2931/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2931 - High (8.8)
The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 9.1.2. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and acce...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2931/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T03:30:34
2 posts
🔴 CVE-2026-4484 - Critical (9.8)
The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.6. This is due to the plugin allowing a user to update the user role through the 'InstructorsController::prepare_object_for_data...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4484/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-4484 - Critical (9.8)
The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.6. This is due to the plugin allowing a user to update the user role through the 'InstructorsController::prepare_object_for_data...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4484/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-26T00:31:03
2 posts
🟠 CVE-2026-4758 - High (8.8)
The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possibl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4758/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4758 - High (8.8)
The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possibl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4758/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:57:49.383000
1 posts
🟠 CVE-2026-24151 - High (7.8)
NVIDIA Megatron-LM contains a vulnerability in inferencing where an Attacker may cause an RCE by convincing a user to load a maliciously crafted input. A successful exploit of this vulnerability may lead to code execution, escalation of privileges...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24151/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:56:52.887000
1 posts
🟠 CVE-2026-24152 - High (7.8)
NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of priv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24152/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:31:39
1 posts
🟠 CVE-2026-32537 - High (7.5)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nK Visual Portfolio, Photo Gallery & Post Grid visual-portfolio allows PHP Local File Inclusion.This issue affects Visual Port...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32537/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:31:39
2 posts
🔴 CVE-2026-25447 - Critical (9.1)
Improper Control of Generation of Code ('Code Injection') vulnerability in Jonathan Daggerhart Widget Wrangler widget-wrangler allows Code Injection.This issue affects Widget Wrangler: from n/a through <= 2.3.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25447/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25447 - Critical (9.1)
Improper Control of Generation of Code ('Code Injection') vulnerability in Jonathan Daggerhart Widget Wrangler widget-wrangler allows Code Injection.This issue affects Widget Wrangler: from n/a through <= 2.3.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25447/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:31:39
2 posts
🟠 CVE-2026-32546 - High (7.5)
Missing Authorization vulnerability in StellarWP Restrict Content restrict-content allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Content: from n/a through <= 3.2.22.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32546/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-32546 - High (7.5)
Missing Authorization vulnerability in StellarWP Restrict Content restrict-content allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Content: from n/a through <= 3.2.22.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32546/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:31:38
1 posts
🟠 CVE-2026-25001 - High (8.5)
Improper Control of Generation of Code ('Code Injection') vulnerability in Saad Iqbal Post Snippets post-snippets allows Remote Code Inclusion.This issue affects Post Snippets: from n/a through <= 4.0.12.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25001/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:36
3 posts
🚨 CRITICAL: CVE-2026-32573 in Nelio AB Testing plugin (≤8.2.7) enables code injection on WordPress sites. No active exploits, but risk of remote code execution. Monitor for patches & harden configs. https://radar.offseq.com/threat/cve-2026-32573-improper-control-of-generation-of-c-2c0edccd #OffSeq #WordPress #Vuln
##🚨 CRITICAL: CVE-2026-32573 in Nelio AB Testing plugin (≤8.2.7) enables code injection on WordPress sites. No active exploits, but risk of remote code execution. Monitor for patches & harden configs. https://radar.offseq.com/threat/cve-2026-32573-improper-control-of-generation-of-c-2c0edccd #OffSeq #WordPress #Vuln
##🔴 CVE-2026-32573 - Critical (9.1)
Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Code Injection.This issue affects Nelio AB Testing: from n/a through <= 8.2.7.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32573/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:36
1 posts
🟠 CVE-2026-32531 - High (8.1)
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in gavias Kunco kunco allows PHP Local File Inclusion.This issue affects Kunco: from n/a through < 1.4.5.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32531/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:36
1 posts
🟠 CVE-2026-32534 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk js-support-ticket allows Blind SQL Injection.This issue affects JS Help Desk: from n/a through <= 3.0.3.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32534/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:36
1 posts
🔴 CVE-2026-32539 - Critical (9.3)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PublishPress PublishPress Revisions revisionary allows Blind SQL Injection.This issue affects PublishPress Revisions: from n/a through <= 3.7.23.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32539/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:35
2 posts
🔴 New security advisory:
CVE-2026-25366 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-25366-woody-ad-snippets-code-injection-update-immediately
🔴 CVE-2026-25366 - Critical (9.9)
Improper Control of Generation of Code ('Code Injection') vulnerability in Themeisle Woody ad snippets insert-php allows Code Injection.This issue affects Woody ad snippets: from n/a through <= 2.7.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25366/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:35
1 posts
🟠 CVE-2026-32513 - High (8.8)
Deserialization of Untrusted Data vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows Object Injection.This issue affects JS Archive List: from n/a through <= 6.1.7.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32513/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:35
2 posts
🔴 CVE-2026-27044 - Critical (9.9)
Improper Control of Generation of Code ('Code Injection') vulnerability in TotalSuite Total Poll Lite totalpoll-lite allows Remote Code Inclusion.This issue affects Total Poll Lite: from n/a through <= 4.12.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27044/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-27044 - Critical (9.9)
Improper Control of Generation of Code ('Code Injection') vulnerability in TotalSuite Total Poll Lite totalpoll-lite allows Remote Code Inclusion.This issue affects Total Poll Lite: from n/a through <= 4.12.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27044/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:28
1 posts
🟠 CVE-2026-4719 - High (7.5)
Incorrect boundary conditions in the Graphics: Text component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4719/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:27
1 posts
🔴 CVE-2026-4705 - Critical (9.8)
Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4705/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:30:27
1 posts
🟠 CVE-2026-4704 - High (7.5)
Denial-of-service in the WebRTC: Signaling component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4704/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:18:09
1 posts
🟠 CVE-2026-33680 - High (7.5)
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.2, the `LinkSharing.ReadAll()` method allows link share authenticated users to list all link shares for a project, including their secret hashes. While `LinkShari...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33680/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:17:43
2 posts
🛡️ #Cybersecurity news & tips across the #fediverse
“🟠 CVE-2026-33678 - High (8.1) Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id = ?`), ignoring the task ID fro...”
https://mastodon.social/@thehackerwire/116285975900964242
🤖 via RSS feed. Not an endorsement.
##🟠 CVE-2026-33678 - High (8.1)
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id = ?`), ignoring the task ID from the URL path. The permission check in `CanRead()` validat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33678/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:16:46.347000
1 posts
🟠 CVE-2026-32538 - High (7.5)
Insertion of Sensitive Information Into Sent Data vulnerability in Noor Alam SMTP Mailer smtp-mailer allows Retrieve Embedded Sensitive Data.This issue affects SMTP Mailer: from n/a through <= 1.1.24.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32538/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:16:45.867000
1 posts
🔴 CVE-2026-32536 - Critical (9.9)
Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green Downloads halfdata-paypal-green-downloads allows Using Malicious Files.This issue affects Green Downloads: from n/a through <= 2.08.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32536/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T21:07:45
2 posts
⚠️ CRITICAL RCE in n8n (CVE-2026-33660): Auth'd users can exploit Merge node SQL to read files & execute code on n8n host. Patch to 2.14.1/2.13.3/1.123.26 ASAP. Limit permissions if you can't patch yet. https://radar.offseq.com/threat/cve-2026-33660-cwe-94-improper-control-of-generati-e1c73d20 #OffSeq #n8n #infosec #CVE202633660
##⚠️ CRITICAL RCE in n8n (CVE-2026-33660): Auth'd users can exploit Merge node SQL to read files & execute code on n8n host. Patch to 2.14.1/2.13.3/1.123.26 ASAP. Limit permissions if you can't patch yet. https://radar.offseq.com/threat/cve-2026-33660-cwe-94-improper-control-of-generati-e1c73d20 #OffSeq #n8n #infosec #CVE202633660
##updated 2026-03-25T20:54:34.937000
1 posts
🟠 CVE-2026-33310 - High (8.8)
Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contai...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33310/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T20:53:33
2 posts
🟠 CVE-2026-33316 - High (8.1)
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, a flaw in Vikunja’s password reset logic allows disabled users to regain access to their accounts. The `ResetPassword()` function sets the user’s status to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33316/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33316 - High (8.1)
Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, a flaw in Vikunja’s password reset logic allows disabled users to regain access to their accounts. The `ResetPassword()` function sets the user’s status to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33316/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T20:53:05.983000
1 posts
🟠 CVE-2026-29839 - High (8.8)
DedeCMS v5.7.118 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability in /sys_task_add.php.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29839/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T20:48:05
2 posts
🚨 CRITICAL: CVE-2026-33211 in Tekton Pipelines (git resolver) enables path traversal attacks via pathInRepo, exposing sensitive files (like ServiceAccount tokens). Upgrade to fixed versions immediately. Details: https://radar.offseq.com/threat/cve-2026-33211-cwe-22-improper-limitation-of-a-pat-2bb49643 #OffSeq #Tekton #Kubernetes #Infosec
##🔴 CVE-2026-33211 - Critical (9.6)
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 1.0.0 and prior to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, the Tekton Pipelines git resolver is vulnerable to path traversal vi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33211/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T20:16:37.020000
1 posts
🔴 CVE-2026-4716 - Critical (9.1)
Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4716/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T20:16:36.837000
1 posts
🔴 CVE-2026-4715 - Critical (9.1)
Uninitialized memory in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4715/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T20:16:30.967000
1 posts
🔴 CVE-2026-32525 - Critical (9.9)
Improper Control of Generation of Code ('Code Injection') vulnerability in jetmonsters JetFormBuilder jetformbuilder allows Code Injection.This issue affects JetFormBuilder: from n/a through <= 3.5.6.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32525/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T20:07:15.087000
1 posts
1 repos
https://github.com/zeroxjf/CVE-2026-20687-AppleSEPKeyStore-UAF
CVE-2026-20687 (CRITICAL): Use-after-free in Apple iOS/iPadOS/macOS/tvOS/watchOS lets malicious apps crash devices or write kernel memory. Patch to iOS/iPadOS 18.7.7/26.4, macOS Sequoia 15.7.5, Tahoe 26.4+ ASAP. https://radar.offseq.com/threat/cve-2026-20687-an-app-may-be-able-to-cause-unexpec-a39ac789 #OffSeq #AppleSecurity #InfoSec
##updated 2026-03-25T19:16:52.517000
1 posts
🟠 CVE-2026-4712 - High (7.5)
Information disclosure in the Widget: Cocoa component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4712/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T18:32:07
3 posts
🟠 CVE-2026-3857 - High (8.1)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3857/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3857 - High (8.1)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3857/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3857 - High (8.1)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3857/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T18:31:51
2 posts
🟠 CVE-2026-20012 - High (8.6)
A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco IOS Software, Cisco IOS XE Software, Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, and Cisco Secure Firewall Threat Defense (FTD) Software could al...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20012/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-20012 - High (8.6)
A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco IOS Software, Cisco IOS XE Software, Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, and Cisco Secure Firewall Threat Defense (FTD) Software could al...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20012/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T18:31:51
1 posts
🟠 CVE-2026-20125 - High (7.7)
A vulnerability in the HTTP Server feature of Cisco IOS Software and Cisco IOS XE Software Release 3E could allow an authenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) conditio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20125/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T18:31:51
1 posts
1 repos
🔴 CVE-2026-26832 - Critical (9.8)
node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tesseract OCR. In all versions through 2.2.1, the recognize() function in src/index.js is vulnerable to OS Command Injection. The file path parameter is concatenated into a s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26832/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T18:16:32.853000
1 posts
🚨 CVE-2026-3608: HIGH-severity vuln in ISC Kea DHCP (2.6.0 – 2.6.4, 3.0.0 – 3.0.2). Remote attackers can crash daemons, causing DoS. Restrict API/HA access, monitor traffic, and prep failover. Details: https://radar.offseq.com/threat/cve-2026-3608-cwe-617-reachable-assertion-in-isc-k-fed4f439 #OffSeq #CVE #DHCP #Infosec
##updated 2026-03-25T17:44:24
2 posts
🟠 CVE-2026-33287 - High (7.5)
LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, the `replace_first` filter in LiquidJS uses JavaScript's `String.prototype.replace()` which interprets `$&` as a back reference to the ma...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33287/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33287 - High (7.5)
LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, the `replace_first` filter in LiquidJS uses JavaScript's `String.prototype.replace()` which interprets `$&` as a back reference to the ma...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33287/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T17:40:53
2 posts
🟠 CVE-2026-33285 - High (7.5)
LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, LiquidJS's `memoryLimit` security mechanism can be completely bypassed by using reverse range expressions (e.g., `(100000000..1)`), allow...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33285/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33285 - High (7.5)
LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, LiquidJS's `memoryLimit` security mechanism can be completely bypassed by using reverse range expressions (e.g., `(100000000..1)`), allow...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33285/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T17:39:46.247000
5 posts
3 repos
https://github.com/p3Nt3st3r-sTAr/CVE-2026-20131-POC
📰 Cisco Firewall Zero-Day Exploited by Interlock Ransomware for Over a Month Before Patch
🚨 ZERO-DAY: A critical Cisco Firewall flaw (CVE-2026-20131) was exploited by Interlock ransomware for 36 days before a patch. CISA has added it to the KEV catalog. Patch now and restrict management interface access! #0day #Ransomware #Cisco
##Cisco Secure FMC: Schwachstelle CVE-2026-20131 erlaubt Remote-Codeausführung – Updates verfügbar
Eine Sicherheitslücke mit dem höchstmöglichen CVSS-Wert von 10,0 betrifft Ciscos Secure Firewall Management Center (FMC). Angreifer können ohne Authentifizierung aus der Ferne beliebigen Code ausführen.
##Grab a coffee. Cisco has a long list of advisories today, one is critical, several are high-severity.
This was first published on March 4:
Critical: CVE-2026-20131: Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh
More: https://sec.cloudapps.cisco.com/security/center/publicationListing.x @TalosSecurity
Also, Cisco has tagged GeoVision and MediaArea for zero-day reports https://talosintelligence.com/vulnerability_info #Zeroday #Cisco #infosec #vulnerability
##Critical patch alert: The US government has ordered a maximum severity patch for a Cisco vulnerability (CVE-2026-20131) that's being exploited in ransomware campaigns.
Read more: https://steelefortress.com/86cy1e
#Encryption #ThreatIntel #Security #DataPrivacy #CyberDefense
##updated 2026-03-25T17:18:23.687000
1 posts
🚨 CRITICAL: CVE-2026-33286 in Graphiti (<1.10.2) lets unauthenticated attackers invoke arbitrary public methods via JSONAPI write requests. Patch to v1.10.2, restrict access, and validate inputs! https://radar.offseq.com/threat/cve-2026-33286-cwe-913-improper-control-of-dynamic-fd76d864 #OffSeq #CVE202633286 #Ruby #APIsecurity
##updated 2026-03-25T17:17:10.257000
1 posts
🔴 CVE-2026-4711 - Critical (9.8)
Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4711/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T17:07:53
1 posts
🟠 CVE-2026-27889 - High (7.5)
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Starting in version 2.2.0 and prior to versions 2.11.14 and 2.12.5, a missing sanity check on a WebSockets frame could trigger a server panic in the na...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27889/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T16:16:08.033000
1 posts
🔴 CVE-2025-71275 - Critical (9.8)
Zimbra Collaboration Suite (ZCS) PostJournal service version 8.8.15 contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary system commands by exploiting improper sanitization of the RCPT TO parameter ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71275/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T16:16:07.650000
2 posts
🔴 CVE-2025-32991 - Critical (9)
In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful API results in remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32991/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-32991 - Critical (9)
In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful API results in remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-32991/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T15:41:58.280000
1 posts
Pharos Controls Patches Critical Root Access Flaw in Mosaic Show Controllers
Pharos Controls patched a critical vulnerability (CVE-2026-2417) in its Mosaic Show Controller that allows unauthenticated attackers to execute arbitrary commands with root privileges.
**Make sure all Pharos Mosaic Show Controllers are isolated from the internet and accessible from trusted networks only. Check your version, if you are running 2.15.3, you are at risk. Plan an update the firmware to version 2.16 or later.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/pharos-controls-patches-critical-root-access-flaw-in-mosaic-show-controllers-1-6-s-3-0/gD2P6Ple2L
updated 2026-03-25T15:41:58.280000
2 posts
🔴 CVE-2025-33244 - Critical (9)
NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker could cause a deserialization of untrusted data. This vulnerability affects environments that use PyTorch versions earlier than 2.6. A successful exploit of this vulnera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33244/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##New Nvidia advisories. This is a long list of vulnerabilities with varying severity.
Of note is the critical CVE-2025-33244: Security Bulletin: NVIDIA Apex - March 2026 https://nvidia.custhelp.com/app/answers/detail/a_id/5782
The rest: https://www.nvidia.com/en-us/product-security/ #infosec #Nvidia #vulnerability
##updated 2026-03-25T15:41:58.280000
1 posts
🟠 CVE-2026-24157 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24157/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T15:41:58.280000
1 posts
🟠 CVE-2026-24159 - High (7.8)
NVIDIA NeMo Framework contains a vulnerability where an attacker may cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and data tampering.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24159/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T15:41:58.280000
1 posts
🟠 CVE-2026-33509 - High (7.5)
pyLoad is a free and open-source download manager written in Python. From version 0.4.0 to before version 0.5.0b3.dev97, the set_config_value() API endpoint allows users with the non-admin SETTINGS permission to modify any configuration option wit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33509/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T15:41:58.280000
1 posts
🟠 CVE-2026-33399 - High (7.7)
Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, the SSRF fix applied in version 4.6.2 for CVE-2026-30839 and CVE-2026-30840 is incomplete. The validate_webhook_url_for_ssrf() protection was added to t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33399/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T15:41:33.977000
1 posts
⚠️ HIGH-severity XSS (CVE-2026-2072, CVSS 8.2) in Hitachi Infrastructure Analytics Advisor & Ops Center Analyzer <11.0.5-00. Exploitable by low-privilege users. Patch when available, restrict access, enable WAF. https://radar.offseq.com/threat/cve-2026-2072-cwe-79-improper-neutralization-of-in-c6f3add7 #OffSeq #XSS #Vuln #Hitachi
##updated 2026-03-25T15:41:33.977000
1 posts
I updated the “Device Name” section of my “How to Fingerprint iOS Users” article to note that iOS 26.4 fixes CVE-2026-28877, which leaked the device name without needing a proper entitlement.
https://paradisefacade.com/blog/2026/3/9/how-to-fingerprint-users
##updated 2026-03-25T15:32:30
1 posts
🔒 CVE-2026-28864 (HIGH): Local attackers can access Apple Keychain items on iOS, iPadOS, macOS, visionOS, watchOS. Patch to latest OS releases now to protect credentials. No known exploits yet. https://radar.offseq.com/threat/cve-2026-28864-a-local-attacker-may-gain-access-to-881070fb #OffSeq #Apple #Security #Keychain
##updated 2026-03-25T15:31:37
2 posts
🟠 CVE-2026-3104 - High (7.5)
A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain.
This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1.
BIND 9 versions 9...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3104/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3104 - High (7.5)
A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain.
This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1.
BIND 9 versions 9...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3104/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T15:31:37
2 posts
2 repos
🔴 CVE-2026-26830 - Critical (9.8)
pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shel...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-26830 - Critical (9.8)
pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shel...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T15:31:36
2 posts
🟠 CVE-2026-1519 - High (7.5)
If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1519/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1519 - High (7.5)
If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1519/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-25T15:31:30
1 posts
⚠️ HIGH: CVE-2026-2343 in PeproDev Ultimate Invoice ≤2.2.5 exposes PII via predictable ZIP archive names in bulk downloads. No auth needed — risk of mass data leaks! Disable feature, restrict access, monitor logs. https://radar.offseq.com/threat/cve-2026-2343-cwe-200-information-exposure-in-pepr-b24bfe87 #OffSeq #WordPress #Vuln
##updated 2026-03-25T15:16:49.230000
2 posts
1 repos
CVE ID: CVE-2026-33634
Vendor: Aquasecurity
Product: Trivy
Date Added: 2026-03-26
Notes: This vulnerability involves a supply‑chain compromise in a product that may be used across multiple products and environments. Additional vendor‑provided guidance must be followed to ensure full remediation. For more information, please see: https://github.com/advisories/GHSA-69fq-xp46-6x23 ; https://nvd.nist.gov/vuln/detail/CVE-2026-33634
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-33634
CVE ID: CVE-2026-33634
Vendor: Aquasecurity
Product: Trivy
Date Added: 2026-03-26
Notes: This vulnerability involves a supply‑chain compromise in a product that may be used across multiple products and environments. Additional vendor‑provided guidance must be followed to ensure full remediation. For more information, please see: https://github.com/advisories/GHSA-69fq-xp46-6x23 ; https://nvd.nist.gov/vuln/detail/CVE-2026-33634
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-33634
updated 2026-03-25T14:05:38.743000
1 posts
Global cybersecurity alerts include active exploitation of Chrome Zero-Days (CVE-2026-3909/3910) and a Quest KACE SMA flaw for credential harvesting. Advanced threats like Android haptic keyloggers and deepfake identity fraud are emerging. Geopolitically, Persian Gulf tensions remain high, while the US announced a new cyber strategy to defend companies from foreign adversaries. In tech, NVIDIA Nemotron 3 Super is now on Amazon Bedrock.
##updated 2026-03-25T06:30:35
1 posts
⚠️ CVE-2026-26306 (HIGH): OM Workspace (Windows ≤2.4) vulnerable to DLL hijacking. Local attackers can execute code via unsafe installer DLL loading. Patch urgently or restrict installs & use Safe DLL Search Mode. https://radar.offseq.com/threat/cve-2026-26306-uncontrolled-search-path-element-in-ee774158 #OffSeq #Vulnerability #Windows
##updated 2026-03-24T21:45:30
2 posts
🟠 CVE-2026-33218 - High (7.5)
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, a client which can connect to the leafnode port can crash the nats-server with a certain malformed message pre-au...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33218 - High (7.5)
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, a client which can connect to the leafnode port can crash the nats-server with a certain malformed message pre-au...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:42:11
2 posts
🟠 CVE-2026-33216 - High (8.6)
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, for MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33216/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33216 - High (8.6)
NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, for MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33216/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:32:29
1 posts
🔴 CVE-2026-4725 - Critical (10)
Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4725/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:32:29
1 posts
🔴 CVE-2026-4723 - Critical (9.8)
Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 149.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4723/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:32:28
1 posts
🔴 CVE-2026-4717 - Critical (9.8)
Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:32:28
1 posts
🟠 CVE-2026-4714 - High (7.5)
Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4714/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:32:28
1 posts
🟠 CVE-2026-4713 - High (7.5)
Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4713/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:32:28
1 posts
🟠 CVE-2026-30653 - High (7.5)
An issue in Free5GC v.4.2.0 and before allows a remote attacker to cause a denial of service via the function HandleAuthenticationFailure of the component AMF
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30653/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:36
1 posts
🟠 CVE-2025-33254 - High (7.5)
NVIDIA Triton Inference Server contains a vulnerability where an attacker may cause internal state corruption. A successful exploit of this vulnerability may lead to a denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33254/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:35
1 posts
🟠 CVE-2025-33248 - High (7.8)
NVIDIA Megatron-LM contains a vulnerability in the hybrid conversion script where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33248/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:35
1 posts
🟠 CVE-2025-33247 - High (7.8)
NVIDIA Megatron LM contains a vulnerability in quantization configuration loading, which could allow remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33247/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:35
1 posts
🟠 CVE-2025-33238 - High (7.5)
NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability where an attacker may cause an exception. A successful exploit of this vulnerability may lead to denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-33238/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:35
1 posts
🟠 CVE-2026-24158 - High (7.5)
NVIDIA Triton Inference Server contains a vulnerability in the HTTP endpoint where an attacker may cause a denial of service by providing a large compressed payload. A successful exploit of this vulnerability may lead to denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24158/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:35
1 posts
🟠 CVE-2026-24150 - High (7.8)
NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of priv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24150/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:35
1 posts
🟠 CVE-2026-24141 - High (7.8)
NVIDIA Model Optimizer for Windows and Linux contains a vulnerability in the ONNX quantization feature, where a user could cause unsafe deserialization by providing a specially crafted input file. A successful exploit of this vulnerability might l...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24141/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:35
1 posts
🟠 CVE-2026-22559 - High (8.8)
An Improper Input Validation vulnerability in UniFi Network Server may allow unauthorized access to an account if the account owner is socially engineered into clicking a malicious link.
Affected Products:
UniFi Network Server (Version 10.1....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22559/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:31:22
1 posts
🔴 CVE-2026-4702 - Critical (9.8)
JIT miscompilation in the JavaScript Engine component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4702/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T21:16:34.063000
1 posts
🟠 CVE-2026-4722 - High (8.8)
Privilege escalation in the IPC component. This vulnerability affects Firefox < 149.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4722/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T20:16:30.357000
1 posts
🟠 CVE-2026-33554 - High (7.5)
ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33554/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T19:37:42.130000
1 posts
🟠 CVE-2026-33242 - High (7.5)
Salvo is a Rust web framework. Versions 0.39.0 through 0.89.2 have a Path Traversal and Access Control Bypass vulnerability in the salvo-proxy component. The vulnerability allows an unauthenticated external attacker to bypass proxy routing constra...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33242/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T19:20:25.140000
1 posts
🟠 CVE-2026-33497 - High (7.5)
Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.1, in the download_profile_picture function of the /profile_pictures/{folder_name}/{file_name} endpoint, the folder_name and file_name parameters a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33497/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T19:20:13.567000
1 posts
🟠 CVE-2026-33484 - High (7.5)
Langflow is a tool for building and deploying AI-powered agents and workflows. In versions 1.0.0 through 1.8.1, the `/api/v1/files/images/{flow_id}/{file_name}` endpoint serves image files without any authentication or ownership check. Any unauthe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33484/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T19:19:48.480000
1 posts
🟠 CVE-2026-33418 - High (7.5)
DiceBear is an avatar library for designers and developers. Prior to version 9.4.2, the `ensureSize()` function in `@dicebear/converter` used a regex-based approach to rewrite SVG `width`/`height` attributes, capping them at 2048px to prevent deni...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33418/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T18:31:34
1 posts
🟠 CVE-2026-4679 - High (8.8)
Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4679/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T18:31:34
1 posts
🟠 CVE-2026-4675 - High (8.8)
Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4675/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T17:50:27.517000
1 posts
🟠 CVE-2026-4678 - High (8.8)
Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4678/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T17:50:13.317000
1 posts
🟠 CVE-2026-4680 - High (8.8)
Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4680/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T16:54:37.343000
2 posts
🟠 CVE-2026-4673 - High (8.8)
Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4673/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4673 - High (8.8)
Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4673/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T16:53:14.987000
2 posts
🟠 CVE-2026-4674 - High (8.8)
Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4674/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4674 - High (8.8)
Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4674/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T16:50:03.117000
1 posts
🟠 CVE-2026-4676 - High (8.8)
Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4676/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T16:17:11.623000
2 posts
updated 2026-03-24T15:54:09.400000
5 posts
CVE-2026-3055 : appliquez ce patch Citrix avant qu’il ne soit trop tard https://www.it-connect.fr/cve-2026-3055-appliquez-ce-patch-citrix-avant-quil-ne-soit-trop-tard/ #ActuCybersécurité #Vulnérabilités #Cybersécurité
##CVE-2026-3055 : appliquez ce patch Citrix avant qu’il ne soit trop tard https://www.it-connect.fr/cve-2026-3055-appliquez-ce-patch-citrix-avant-quil-ne-soit-trop-tard/ #ActuCybersécurité #Vulnérabilités #Cybersécurité
##Aww yiss another critical Citrix vuln.
Detection/remediation details here: https://docs.netscaler.com/en-us/netscaler-console-service/instance-advisory/remediate-vulnerabilities-cve-2026-3055
##Citrix patched this yesterday.
Arctic Wolf: CVE‑2026‑3055: Critical Unauthenticated Memory-Read Vulnerability in Citrix NetScaler ADC and Gateway https://arcticwolf.com/resources/blog/cve-2026-3055/
Citrix: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368 https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300&articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2026_3055_and_CVE_2026_4368 #infosec #vulnerability
##Critical Memory Leak and Session Hijacking Vulnerabilities Patched in Citrix NetScaler
Citrix patched a critical memory overread (CVE-2026-3055) and a high-severity session-swapping race condition (CVE-2026-4368) in NetScaler ADC and Gateway. These vulnerabilities allow unauthenticated attackers to leak sensitive memory data or hijack user sessions in environments configured for SAML or VPN services.
**If possible, make sure your NetScaler ADC and Gateway appliances are isolated from the internet and accessible from trusted networks only. Them plan a quick update. If you can't isolate from the internet, this is urgent. Update the firmware to the fixed versions (14.1-66.59, 13.1-62.23, or 13.1-37.262 for FIPS/NDcPP). Attackers have previously exploited similar flaws via the CitrixBleed exploit.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-memory-leak-and-session-hijacking-vulnerabilities-patched-in-citrix-netscaler-s-x-0-i-0/gD2P6Ple2L
updated 2026-03-24T15:54:09.400000
2 posts
Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.
https://feedly.com/cve/CVE-2026-15518 and https://feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations
https://feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access
##Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.
https://feedly.com/cve/CVE-2026-15518 and https://feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations
https://feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access
##updated 2026-03-24T15:54:09.400000
2 posts
Citrix patched this yesterday.
Arctic Wolf: CVE‑2026‑3055: Critical Unauthenticated Memory-Read Vulnerability in Citrix NetScaler ADC and Gateway https://arcticwolf.com/resources/blog/cve-2026-3055/
Citrix: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368 https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX696300&articleURL=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2026_3055_and_CVE_2026_4368 #infosec #vulnerability
##Critical Memory Leak and Session Hijacking Vulnerabilities Patched in Citrix NetScaler
Citrix patched a critical memory overread (CVE-2026-3055) and a high-severity session-swapping race condition (CVE-2026-4368) in NetScaler ADC and Gateway. These vulnerabilities allow unauthenticated attackers to leak sensitive memory data or hijack user sessions in environments configured for SAML or VPN services.
**If possible, make sure your NetScaler ADC and Gateway appliances are isolated from the internet and accessible from trusted networks only. Them plan a quick update. If you can't isolate from the internet, this is urgent. Update the firmware to the fixed versions (14.1-66.59, 13.1-62.23, or 13.1-37.262 for FIPS/NDcPP). Attackers have previously exploited similar flaws via the CitrixBleed exploit.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-memory-leak-and-session-hijacking-vulnerabilities-patched-in-citrix-netscaler-s-x-0-i-0/gD2P6Ple2L
updated 2026-03-24T15:53:48.067000
1 posts
PTC Warns of Imminent RCE Threat in Windchill and FlexPLM Systems
PTC reports a critical RCE vulnerability (CVE-2026-4681) in Windchill and FlexPLM software, leading to emergency warnings from German police due to an imminent threat of exploitation.
**If you're running PTC Windchill or FlexPLM, make sure these systems are isolated from the internet and accessible from trusted networks only. This one is a perfect 10.0 severity with no patch yet, so apply the recommended rewrite rules to block the WindchillGW and WindchillAuthGW servlet paths immediately. Also check your servers for signs of compromise like GW.class, payload.bin, or dpr_*.jsp files, and if you can't apply the workarounds, shut down the affected services until PTC releases an official patch.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/ptc-warns-of-imminent-rce-threat-in-windchill-and-flexplm-systems-8-k-p-i-c/gD2P6Ple2L
updated 2026-03-24T15:53:48.067000
2 posts
🟠 CVE-2026-27651 - High (7.5)
When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentic...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27651/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27651 - High (7.5)
When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentic...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27651/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T15:53:48.067000
1 posts
🟠 CVE-2026-27654 - High (8.2)
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27654/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T15:53:48.067000
2 posts
🛡️ #Cybersecurity news & tips across the #fediverse 👇
“🚨 CVE-2026-4739 (CRITICAL, CVSS 9.4) in ITK: Integer overflow in Expat XML parser enables remote code execution or DoS in medical/scientific apps. Update to v2.7.1 now. User interaction required. Details: https:// ra...”
https://infosec.exchange/@offseq/116283685757971538
🤖 via RSS feed. Not an endorsement.
##🚨 CVE-2026-4739 (CRITICAL, CVSS 9.4) in ITK: Integer overflow in Expat XML parser enables remote code execution or DoS in medical/scientific apps. Update to v2.7.1 now. User interaction required. Details: https://radar.offseq.com/threat/cve-2026-4739-cwe-190-integer-overflow-or-wraparou-4dc9a6b8 #OffSeq #Vulnerability #ITK #Infosec
##updated 2026-03-24T15:53:48.067000
1 posts
#OT #Advisory VDE-2026-011
CODESYS Control V3 - Untrusted boot application
The CODESYS Control runtime system provides a user management mechanism with multiple privilege groups. While only the privileged Administrators and Developer groups are intended to load or debug applications on the controller, users in the restricted Service group are allowed to perform maintenance operations, including explicitly replacing the boot application.
#CVE CVE-2025-41660
https://certvde.com/en/advisories/vde-2026-011/
#CSAF https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2026/advisory2026-02_vde-2026-011.json
##updated 2026-03-24T15:53:48.067000
1 posts
⚠️ CVE-2026-4755: Critical vuln in MolotovCherry Android-ImageMagick7 (<7.1.2-11). Remote, unauthenticated RCE possible due to improper input validation. Patch ASAP & enforce input checks. Details: https://radar.offseq.com/threat/cve-2026-4755-cwe-20-cwe-20-in-molotovcherry-andro-fb2c95b0 #OffSeq #Android #Vuln #ImageMagick #CVE2026_4755
##updated 2026-03-24T15:53:48.067000
1 posts
🚨 CRITICAL: CVE-2026-4746 in timeplus-io proton (<1.6.16) allows remote out-of-bounds writes — risk of code execution, system takeover. No auth or user action needed. Patch when available, restrict access now. Details: https://radar.offseq.com/threat/cve-2026-4746-cwe-787-out-of-bounds-write-in-timep-fbe0e14b #OffSeq #CVE20264746 #Vuln
##updated 2026-03-24T15:53:48.067000
1 posts
🟠 CVE-2026-4662 - High (7.5)
The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listing_load_more` AJAX action in all versions up to, and including, 3.8.6.1. This is due to the `filtered_query` parameter being excluded from the HMAC signature validatio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4662/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T15:53:48.067000
2 posts
🟠 CVE-2026-33298 - High (7.8)
llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an integer overflow vulnerability in the `ggml_nbytes` function allows an attacker to bypass memory validation by crafting a GGUF file with specific tensor dimensions. This ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33298/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33298 - High (7.8)
llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an integer overflow vulnerability in the `ggml_nbytes` function allows an attacker to bypass memory validation by crafting a GGUF file with specific tensor dimensions. This ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33298/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T15:30:36
2 posts
🟠 CVE-2026-27784 - High (7.8)
The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. Th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27784/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27784 - High (7.8)
The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. Th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27784/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T15:30:36
2 posts
🟠 CVE-2026-32647 - High (7.8)
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32647/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-32647 - High (7.8)
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32647/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T15:30:36
1 posts
🟠 CVE-2026-4775 - High (7.8)
A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4775/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T09:30:41
1 posts
#OT #Advisory VDE-2026-018
CODESYS Control V3 - Externally-controlled format string in Auditlog
The CODESYS Control runtime system's CmpAuditLog component allows potentially unauthenticated remote attackers to control the format string of processed log messages. Due to the internal processing logic, the impact is limited to a crash of the CODESYS Control runtime.
#CVE CVE-2026-3509
https://certvde.com/en/advisories/vde-2026-018/
#CSAF https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2026/advisory2026-03_vde-2026-018.json
##updated 2026-03-24T06:31:25
1 posts
🚨 CRITICAL: CVE-2026-4745 in dendibakh perf-ninja (CVSS 10) — remote code injection flaw in labs/misc/pgo/lua & ldo.C. No exploits yet, but restrict access, monitor logs, and prep for urgent patches. Full system compromise risk. https://radar.offseq.com/threat/cve-2026-4745-cwe-94-improper-control-of-generatio-1708b5aa #OffSeq #Vuln #AppSec
##updated 2026-03-24T06:31:25
1 posts
🔴 CVE-2026-4753 - Critical (9.1)
Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects RetroDebugger: before v0.64.72.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4753/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T06:31:25
1 posts
🔴 CVE-2026-4750 - Critical (9.1)
Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof: before woof_15.3.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4750/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T06:31:25
1 posts
🟠 CVE-2026-4640 - High (7.5)
Vitals ESP developed by Galaxy Software Services has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to execute certain functions to obtain sensitive information.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4640/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T06:31:20
2 posts
🚨 CRITICAL: CVE-2026-4283 in WP DSGVO Tools (GDPR) plugin allows unauthenticated attackers to irreversibly destroy non-admin accounts via 'super-unsubscribe' AJAX. All versions ≤3.1.38 affected. Remove '[unsubscribe_form]' & monitor for abuse. https://radar.offseq.com/threat/cve-2026-4283-cwe-862-missing-authorization-in-leg-b0b3a8d9 #OffSeq #WordPress #Infosec
##🔴 CVE-2026-4283 - Critical (9.1)
The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthentica...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4283/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T06:31:14
2 posts
🛡️ #Cybersecurity news & tips across the #fediverse 👇
“🟠 CVE-2026-4639 - High (8.8) Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby es...”
https://mastodon.social/@thehackerwire/116282484405537793
🤖 via RSS feed. Not an endorsement.
##🟠 CVE-2026-4639 - High (8.8)
Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby escalating privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4639/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-24T06:31:14
1 posts
🛡️ CRITICAL: CVE-2026-4744 in rizonesoft Notepad3 (<6.25.714.1) enables out-of-bounds reads — possible data disclosure & crashes. Patch ASAP, restrict access, and avoid untrusted files. More info: https://radar.offseq.com/threat/cve-2026-4744-cwe-125-out-of-bounds-read-in-rizone-16fef5f9 #OffSeq #CVE20264744 #infosec #vuln
##updated 2026-03-24T03:31:25
1 posts
🟠 CVE-2026-4677 - High (8.8)
Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4677/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-23T18:30:39
2 posts
TP-Link Patches Multiple Flaws Including Authentication Bypass in Archer NX Routers
TP-Link patched four high-severity vulnerabilities in its Archer NX router series, including a authentication bypass (CVE-2025-15517) that allows unauthenticated attackers to upload malicious firmware and take full control of the device.
**If you own a TP-Link Archer NX router (NX600, NX500, NX210, or NX200), make sure it is isolated from the internet and accessible from trusted networks only. Then plan a quick patch to the latest firmware from the official TP-Link Support portal for your specific hardware version. Disable remote management and ensure the admin interface is only reachable from your internal network.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/tp-link-patches-multiple-flaws-including-authentication-bypass-in-archer-nx-routers-7-i-6-1-m/gD2P6Ple2L
TP-Link Patches Multiple Flaws Including Authentication Bypass in Archer NX Routers
TP-Link patched four high-severity vulnerabilities in its Archer NX router series, including a authentication bypass (CVE-2025-15517) that allows unauthenticated attackers to upload malicious firmware and take full control of the device.
**If you own a TP-Link Archer NX router (NX600, NX500, NX210, or NX200), make sure it is isolated from the internet and accessible from trusted networks only. Then plan a quick patch to the latest firmware from the official TP-Link Support portal for your specific hardware version. Disable remote management and ensure the admin interface is only reachable from your internal network.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/tp-link-patches-multiple-flaws-including-authentication-bypass-in-archer-nx-routers-7-i-6-1-m/gD2P6Ple2L
updated 2026-03-23T15:31:40
3 posts
5 repos
https://github.com/chosenonehacks/CVE-2026-32746
https://github.com/danindiana/cve-2026-32746-mitigation
https://github.com/watchtowrlabs/watchtowr-vs-telnetd-CVE-2026-32746
A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils CVE-2026-32746) https://lobste.rs/s/udbivp #c #security
https://labs.watchtowr.com/a-32-year-old-bug-walks-into-a-telnet-server-gnu-inetutils-telnetd-cve-2026-32746/
##Yes, the vulnerability is so old, it dates from a time when networks charged on a ‘per-packet basis’.
enjoyed this telnetd analysis. (if you can’t believe anyone has a legitimate operational reason to run telnet, you live in a cozy world indeed) https://labs.watchtowr.com/a-32-year-old-bug-walks-into-a-telnet-server-gnu-inetutils-telnetd-cve-2026-32746/
##updated 2026-03-20T18:53:35.083000
1 posts
@gknauss I think the thing is to move to 18.7.3, which is patched.
For devices running versions of iOS prior to 18.6, DarkSword uses CVE-2025-31277, a JIT optimization/type confusion bug which was patched by Apple in iOS 18.6. For devices running iOS 18.6-18.7, DarkSword uses CVE-2025-43529, a garbage collection bug in the Data Flow Graph (DFG) JIT layer of JavaScriptCore which was patched by Apple in iOS 18.7.3 and 26.2 after it was reported by GTIG. Both exploits develop their own fakeobj/addrof primitives, and then build arbitrary read/write primitives the same way on top of them.
I'm unaware of a compelling reason or hardware limitation to not upgrade from 18.6 to 18.7
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/
##updated 2026-03-20T18:32:19
8 posts
Unfortunately it looks like CVE-2025-43520 was patched in iOS 26.1b4, the exact build I happened to leave my test device on...
I might play around with it on my Mac or in one of the new iOS pccvre VMs though.
##There has been a lot of sloppy reporting regarding DarkSword, with basically every news outlet saying that iOS 18 is vulnerable. It’s not, if you have the latest 18.7.3.
Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.
TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
##@peternlewis sloppy reporting, as usual.
Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.
TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
##Google has a more in-depth analysis, with a lot more information on the specific versions of iOS that are affected.
TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
##@helge the reporting on DarkSword is incredibly sloppy.
Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.
TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
##@slightlyoff @owa
Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.
TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
##@9to5Mac sloppy reporting, as usual.
Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.
TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
##Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.
TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain
##updated 2026-03-20T17:25:56
1 posts
🟠 CVE-2026-33331 - High (8.2)
oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.9, a stored cross-site scripting (XSS) vulnerability exists in the OpenAPI documentation generation of orpc. If an attacker ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33331/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-20T15:32:14
1 posts
CVE-2026-21992 can be used without authentication for remote code execution and it may have been exploited in the wild. https://www.securityweek.com/oracle-releases-emergency-patch-for-critical-identity-manager-vulnerability/
##updated 2026-03-18T04:17:30.720000
1 posts
5 repos
https://github.com/Many-Hat-Group/Ubuntu-CVE-2026-3888-patcher
https://github.com/netw0rk7/CVE-2026-3888-PoC
https://github.com/fevar54/CVE-2026-3888-POC-all-from-the-Qualys-platform.
https://github.com/TheCyberGeek/CVE-2026-3888-snap-confine-systemd-tmpfiles-LPE
A new Ubuntu vulnerability (CVE-2026-3888) allows local users to escalate privileges to root via a timing-based exploit in Ubuntu Desktop 24.04 and newer. ⏱️
The flaw affects systems using older versions of snapd and requires immediate patching. 🔐
🔗 https://www.infosecurity-magazine.com/news/ubuntu-flaw-enables-root-access/
#TechNews #Ubuntu #Linux #SecurityFlaw #CVE #PrivilegeEscalation #RootAccess #Cybersecurity #LinuxSecurity #PatchNow #Snap #SystemVulnerabilities #DataProtection #TechUpdates #Privacy #OpenSource #Canonical
##updated 2026-03-16T18:02:21.613000
1 posts
This month's exciting release fixes our first official[1] CVE for magic wormhole!
To improve your local machine's safety, please upgrade to magic wormhole 0.23.0
##updated 2026-03-10T21:32:18
2 posts
Microsoft Authenticator’s Unclaimed Deep Link: A Full Account Takeover Story (CVE-2026–26123)
This vulnerability is an Authentication Bypass, specifically a session hijacking issue affecting the Microsoft Authenticator app. The root cause was improper handling of deep links within the application, which allowed malicious actors to craft unclaimed deep links containing account tokens. When users clicked these links, their active sessions were hijacked, resulting in full account takeover without requiring any user interaction other than clicking a link. To exploit this, an attacker could generate a malicious deep link with an embedded account token and share it via SMS or email. The session hijack occurred due to the application's failure to verify the authenticity of deep links before processing them. This vulnerability has been assigned CVE-2026–26123. Microsoft rewarded $50,000 for this find and immediately patched the issue. To prevent similar vulnerabilities, it is crucial to thoroughly validate and sanitize all user-controlled inputs, including deep links. Key lesson: Always verify the authenticity of user-supplied data before processing it. #BugBounty #Cybersecurity #AuthenticationBypass #SessionHijacking #Infosec
Microsoft Authenticator’s Unclaimed Deep Link: A Full Account Takeover Story (CVE-2026–26123)
This vulnerability is an Authentication Bypass, specifically a session hijacking issue affecting the Microsoft Authenticator app. The root cause was improper handling of deep links within the application, which allowed malicious actors to craft unclaimed deep links containing account tokens. When users clicked these links, their active sessions were hijacked, resulting in full account takeover without requiring any user interaction other than clicking a link. To exploit this, an attacker could generate a malicious deep link with an embedded account token and share it via SMS or email. The session hijack occurred due to the application's failure to verify the authenticity of deep links before processing them. This vulnerability has been assigned CVE-2026–26123. Microsoft rewarded $50,000 for this find and immediately patched the issue. To prevent similar vulnerabilities, it is crucial to thoroughly validate and sanitize all user-controlled inputs, including deep links. Key lesson: Always verify the authenticity of user-supplied data before processing it. #BugBounty #Cybersecurity #AuthenticationBypass #SessionHijacking #Infosec
updated 2026-02-25T20:23:36.483000
1 posts
🟠 CVE-2026-33344 - High (8.1)
Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0 to before version 2.3.1, the fix for CVE-2026-27598 added ValidateDAGName to CreateNewDAG and rewrote generateFilePath to use filepath.Base. This patched the CREATE p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33344/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-02-23T22:27:55
1 posts
Dios mio! While researching a particular type of Colombian folk music, we stumbled across a .edu domain selling... accordions? Our first thought was potentially domain hijacking, but it appears to be more likely an exploitation of CVE-2026-27210 (TLDR; cross-site scripting). While the vulnerability has been patched in the plugin itself, not all pages have updated their plugins, and search engines have already indexed the poisoned pages! Pivoting led to 50+ additional domains found spread across three risky TLDs: .sbs, .pics, and .shop. The domains on .sbs and .pics appear to be config servers to exploit the vulnerability; the domains on .shop are the landing pages where victims can be scammed.
IOCs:
000o[.]sbs,0pen[.]sbs,123buys[.]shop,123me[.]shop,1bg[.]pics,1ki[.]pics,1mage[.]sbs,1ql[.]pics,1ty[.]pics,1vi[.]pics,1wr[.]pics,2ty[.]pics,569oagri[.]shop,66buys[.]shop,6ip[.]pics,6ym[.]pics,7rt[.]pics,8pi[.]pics,99buys[.]shop,99i[.]pics,9gwe[.]shop,a25n[.]shop,bk2[.]pics,bk59t[.]shop,buysok[.]shop,c68k[.]shop,cc1[.]pics,doo[.]pics,ep7[.]pics,estore-1[.]com,g9gvv[.]sbs,gaer896[.]shop,gm5[.]pics,gosok[.]shop,gt3[.]pics,h66p[.]shop,hh6[.]pics,iilvw[.]sbs,im9[.]pics,img1[.]sbs,in6[.]pics,jj3[.]pics,kk9[.]pics,lilil[.]sbs,llvvw[.]sbs,m66p6[.]shop,mebuys[.]shop,mg6[.]pics,mh8f6k[.]shop,mkk[.]pics,ms1[.]pics,nn6[.]pics,onsgs[.]com,p6[.]pics,p888p[.]shop,pan1[.]top,pic1[.]sbs,pic2[.]sbs,pt11[.]sbs,py3y[.]com,qq1[.]pics,rey89p[.]shop,shop56[.]shop,t88t8[.]shop,tp1[.]pics,tp9[.]pics,trues[.]sbs,up9[.]pics,upimg[.]sbs,uu2[.]pics,vt5[.]pics,vteyu[.]shop,vvf1[.]sbs,vvp1[.]sbs,w2w[.]pics,w88p[.]shop,wp59q[.]shop,wvlll[.]sbs,wvv1[.]sbs,wvvvv[.]sbs,x2p[.]pics,xyaer548[.]shop,yi1[.]pics
#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #seo_poisoning #seopoisoning
##updated 2025-12-17T21:31:01
1 posts
8 repos
https://github.com/kmeps4/bugtest
https://github.com/SimoesCTT/CTT-Apple-Silicon-Refraction
https://github.com/zeroxjf/WebKit-UAF-ANGLE-OOB-Analysis
https://github.com/SgtBattenHA/Analysis
https://github.com/sakyu7/sakyu7.github.io
https://github.com/jir4vv1t/CVE-2025-43529
https://github.com/bjrjk/CVE-2025-43529
https://github.com/SimoesCTT/Convergent-Time-Theory-Enhanced-iOS-Safari-RCE-CVE-2025-43529-
@gknauss I think the thing is to move to 18.7.3, which is patched.
For devices running versions of iOS prior to 18.6, DarkSword uses CVE-2025-31277, a JIT optimization/type confusion bug which was patched by Apple in iOS 18.6. For devices running iOS 18.6-18.7, DarkSword uses CVE-2025-43529, a garbage collection bug in the Data Flow Graph (DFG) JIT layer of JavaScriptCore which was patched by Apple in iOS 18.7.3 and 26.2 after it was reported by GTIG. Both exploits develop their own fakeobj/addrof primitives, and then build arbitrary read/write primitives the same way on top of them.
I'm unaware of a compelling reason or hardware limitation to not upgrade from 18.6 to 18.7
https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain/
##updated 2025-11-13T21:31:15
1 posts
3 repos
https://github.com/5ky9uy/glass-cage-i18-2025-24085-and-cve-2025-24201
https://github.com/The-Maxu/CVE-2025-24201-WebKit-Vulnerability-Detector-PoC-
https://github.com/JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201
updated 2025-10-31T14:43:10.643000
2 posts
👆
🖼️
"Analysis of the kit showed that it relies on the exploitation of many previously patched vulnerabilities and also includes exploits for CVE-2023-32434 and CVE-2023-38606. These two vulnerabilities particularly caught our attention because they had been first first discovered as zero-days used in Operation Triangulation. "
👇
https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/
ah oueee... ça c'est une jolie "coïncidence" & plot twist
intéressant maintenant de voir quelles etaient les cibles...
##👆
🖼️
"Analysis of the kit showed that it relies on the exploitation of many previously patched vulnerabilities and also includes exploits for CVE-2023-32434 and CVE-2023-38606. These two vulnerabilities particularly caught our attention because they had been first first discovered as zero-days used in Operation Triangulation. "
👇
https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/
ah oueee... ça c'est une jolie "coïncidence" & plot twist
intéressant maintenant de voir quelles etaient les cibles...
##updated 2025-10-23T18:48:05.013000
4 posts
2 repos
👆
🖼️
"Analysis of the kit showed that it relies on the exploitation of many previously patched vulnerabilities and also includes exploits for CVE-2023-32434 and CVE-2023-38606. These two vulnerabilities particularly caught our attention because they had been first first discovered as zero-days used in Operation Triangulation. "
👇
https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/
ah oueee... ça c'est une jolie "coïncidence" & plot twist
intéressant maintenant de voir quelles etaient les cibles...
##Coruna: the framework used in Operation Triangulation
Kaspersky GReAT experts look into the Coruna exploit kit targeting iPhones. We discovered that the kernel exploit for CVE-2023-32434 and...
🔗️ [Securelist] https://link.is.it/XwhkQ8
##👆
🖼️
"Analysis of the kit showed that it relies on the exploitation of many previously patched vulnerabilities and also includes exploits for CVE-2023-32434 and CVE-2023-38606. These two vulnerabilities particularly caught our attention because they had been first first discovered as zero-days used in Operation Triangulation. "
👇
https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/
ah oueee... ça c'est une jolie "coïncidence" & plot twist
intéressant maintenant de voir quelles etaient les cibles...
##Coruna: the framework used in Operation Triangulation
Kaspersky GReAT experts look into the Coruna exploit kit targeting iPhones. We discovered that the kernel exploit for CVE-2023-32434 and...
🔗️ [Securelist] https://link.is.it/XwhkQ8
##CVE-2026-3650 in Grassroots DICOM (GDCM):
• Memory leak via malformed DICOM parsing
• CVSS 7.5 → DoS risk
• No patch, no maintainer response
• Impacts healthcare imaging pipelines
Mitigate via isolation + strict input controls.
Source: https://www.hipaajournal.com/grassroots-dicom-vulnerability-march-2026/
Follow @technadu for more.
##CVE-2026-3650 in Grassroots DICOM (GDCM):
• Memory leak via malformed DICOM parsing
• CVSS 7.5 → DoS risk
• No patch, no maintainer response
• Impacts healthcare imaging pipelines
Mitigate via isolation + strict input controls.
Source: https://www.hipaajournal.com/grassroots-dicom-vulnerability-march-2026/
Follow @technadu for more.
##Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.
https://feedly.com/cve/CVE-2026-15518 and https://feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations
https://feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access
##Ehm:
> Für die Ausnutzung zwei weiterer Schwachstellen (CVE-2026-15518, CVE-2026-15519) benötigen Angreifer Adminrechte. Ist das gegeben, können sie eigene Befehle auf Ebene des Betriebssystems ausführen.
Wenn jemand Adminrechte dafür braucht, ist das KEINE Schwachstelle...
##Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.
https://feedly.com/cve/CVE-2026-15518 and https://feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations
https://feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access
##Ehm:
> Für die Ausnutzung zwei weiterer Schwachstellen (CVE-2026-15518, CVE-2026-15519) benötigen Angreifer Adminrechte. Ist das gegeben, können sie eigene Befehle auf Ebene des Betriebssystems ausführen.
Wenn jemand Adminrechte dafür braucht, ist das KEINE Schwachstelle...
##Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.
https://feedly.com/cve/CVE-2026-15518 and https://feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations
https://feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access
##Ehm:
> Für die Ausnutzung zwei weiterer Schwachstellen (CVE-2026-15518, CVE-2026-15519) benötigen Angreifer Adminrechte. Ist das gegeben, können sie eigene Befehle auf Ebene des Betriebssystems ausführen.
Wenn jemand Adminrechte dafür braucht, ist das KEINE Schwachstelle...
##Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.
https://feedly.com/cve/CVE-2026-15518 and https://feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations
https://feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access
##Ehm:
> Für die Ausnutzung zwei weiterer Schwachstellen (CVE-2026-15518, CVE-2026-15519) benötigen Angreifer Adminrechte. Ist das gegeben, können sie eigene Befehle auf Ebene des Betriebssystems ausführen.
Wenn jemand Adminrechte dafür braucht, ist das KEINE Schwachstelle...
##🚨 CVE-2026-33526: Critical Use-After-Free in Squid (<7.5) allows remote attackers to crash Squid via ICP traffic. icp_access rules are ineffective. Upgrade to 7.5+ or disable ICP (icp_port=0) ASAP! https://radar.offseq.com/threat/cve-2026-33526-cwe-416-use-after-free-in-squid-cac-5f2ea159 #OffSeq #Squid #Vuln #DoS
##🚨 CVE-2026-33526: Critical Use-After-Free in Squid (<7.5) allows remote attackers to crash Squid via ICP traffic. icp_access rules are ineffective. Upgrade to 7.5+ or disable ICP (icp_port=0) ASAP! https://radar.offseq.com/threat/cve-2026-33526-cwe-416-use-after-free-in-squid-cac-5f2ea159 #OffSeq #Squid #Vuln #DoS
##🟠 CVE-2026-33918 - High (7.6)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33918/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33918 - High (7.6)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33918/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33918 - High (7.6)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33918/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33918 - High (7.6)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33918/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##4 posts
1 repos
https://github.com/ChrisSub08/CVE-2026-33917_SqlInjectionVulnerabilityOpenEMR8.0.0
🟠 CVE-2026-33917 - High (8.8)
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33917/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33917 - High (8.8)
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33917/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33917 - High (8.8)
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33917/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33917 - High (8.8)
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33917/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33932 - High (7.6)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a stored cross-site scripting vulnerability in the CCDA document preview allows an attacker who can upload or send a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33932/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33932 - High (7.6)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a stored cross-site scripting vulnerability in the CCDA document preview allows an attacker who can upload or send a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33932/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34056 - High (7.7)
OpenEMR is a free and open source electronic health records and medical practice management application. A Broken Access Control vulnerability in OpenEMR up to and including version 8.0.0.3 allows low-privilege users to view and download Ensora eR...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34056/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34056 - High (7.7)
OpenEMR is a free and open source electronic health records and medical practice management application. A Broken Access Control vulnerability in OpenEMR up to and including version 8.0.0.3 allows low-privilege users to view and download Ensora eR...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34056/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34055 - High (8.1)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the legacy patient notes functions in `library/pnotes.inc.php` perform updates and deletes using `WHERE id = ?` with...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34055/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34055 - High (8.1)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the legacy patient notes functions in `library/pnotes.inc.php` perform updates and deletes using `WHERE id = ?` with...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34055/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23514 - High (8.8)
Kiteworks is a private data network (PDN). Versions 9.2.0 and 9.2.1 of Kiteworks Core have an access control vulnerability that allows authenticated users to access unauthorized content. Upgrade Kiteworks Core to version 9.2.2 or later to receive ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23514/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23514 - High (8.8)
Kiteworks is a private data network (PDN). Versions 9.2.0 and 9.2.1 of Kiteworks Core have an access control vulnerability that allows authenticated users to access unauthorized content. Upgrade Kiteworks Core to version 9.2.2 or later to receive ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23514/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##4 posts
1 repos
https://github.com/ChrisSub08/CVE-2026-29187_SqlInjectionVulnerabilityOpenEMR7.0.4
🟠 CVE-2026-29187 - High (8.1)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29187/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29187 - High (8.1)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29187/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29187 - High (8.1)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29187/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29187 - High (8.1)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29187/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33913 - High (7.7)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated user with access to the Carecoordination module can upload a crafted CCDA document containing `` to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33913/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33913 - High (7.7)
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated user with access to the Carecoordination module can upload a crafted CCDA document containing `` to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33913/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-30976 - High (8.6)
Sonarr is a PVR for Usenet and BitTorrent users. In versions on the 4.x branch prior to 4.0.17.2950, an unauthenticated remote attacker can potentially read any file readable by the Sonarr process. These include application configuration files (co...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30976/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##1 posts
1 repos
https://github.com/JivaSecurity/ESPOCRM-RCE-POC-CVE-2026-33656
CVE-2026-33656: EspoCRM ≤ 9.3.3 — Formula engine ACL gap + path traversal → authenticated RCE (full write-up + PoC) https://jivasecurity.com/writeups/espocrm-rce-cve-2026-33656
##Stackfield Desktop App: RCE via Path Traversal and Arbitrary File Write (CVE-2026-28373) https://www.rcesecurity.com/2026/03/stackfield-desktop-app-rce-via-path-traversal-and-arbitrary-file-write-cve-2026-28373/
##We're released Netty 4.2.11 and 4.1.132. These contain many bug fixes, and fixes for two CVEs both rated *high*:
- CVE-2026-33871: HTTP/2 CONTINUATION frame flood Denial of Service.
- CVE-2026-33870: HTTP/1.1 Request Smuggling vulnerability in chunked encoding parsing.
Release notes for 4.2.11: https://netty.io/news/2026/03/24/4-2-11-Final.html
Release notes for 4.1.132: https://netty.io/news/2026/03/24/4-1-132-Final.html
Also of note: We had 17 people contribute to Netty 4.2.11, of which 5 are new first time contributors 😲
##We're released Netty 4.2.11 and 4.1.132. These contain many bug fixes, and fixes for two CVEs both rated *high*:
- CVE-2026-33871: HTTP/2 CONTINUATION frame flood Denial of Service.
- CVE-2026-33870: HTTP/1.1 Request Smuggling vulnerability in chunked encoding parsing.
Release notes for 4.2.11: https://netty.io/news/2026/03/24/4-2-11-Final.html
Release notes for 4.1.132: https://netty.io/news/2026/03/24/4-1-132-Final.html
Also of note: We had 17 people contribute to Netty 4.2.11, of which 5 are new first time contributors 😲
##🟠 CVE-2026-33329 - High (8.1)
FileRise is a self-hosted web file manager / WebDAV server. From version 1.0.1 to before version 3.10.0, the resumableIdentifier parameter in the Resumable.js chunked upload handler (UploadModel::handleUpload()) is concatenated directly into files...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33329/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-33340 - Critical (9.1)
LoLLMs WEBUI provides the Web user interface for Lord of Large Language and Multi modal Systems. A critical Server-Side Request Forgery (SSRF) vulnerability has been identified in all known existing versions of `lollms-webui`. The `@router.post("/...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33340/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33399 - High (7.7)
Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, the SSRF fix applied in version 4.6.2 for CVE-2026-30839 and CVE-2026-30840 is incomplete. The validate_webhook_url_for_ssrf() protection was added to t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33399/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33399 - High (7.7)
Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, the SSRF fix applied in version 4.6.2 for CVE-2026-30839 and CVE-2026-30840 is incomplete. The validate_webhook_url_for_ssrf() protection was added to t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33399/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33307 - High (7.5)
Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. In versions prior to 0.12.3 and 0.13.0, code for client certificate verification imported the certificate chain sent by the client into a fixed size `gnutls_x509_crt_t x509[]` array with...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33307/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33250 - High (7.5)
Freeciv21 is a free open source, turn-based, empire-building strategy game. Versions prior to 3.1.1 crash with a stack overflow when receiving specially-crafted packets. A remote attacker can use this to take down any public server. A malicious se...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33250/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##