## Updated at UTC 2026-02-25T03:49:58.117479

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-25131 8.8 0.00% 2 0 2026-02-25T02:16:22.967000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2026-24849 9.9 0.00% 2 0 2026-02-25T02:16:22.197000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2025-69231 8.7 0.00% 2 0 2026-02-25T02:16:21.707000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2025-67752 8.1 0.00% 2 0 2026-02-25T02:16:21.377000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2026-0797 7.8 0.06% 2 0 2026-02-25T00:31:22 GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerabi
CVE-2026-27593 9.3 0.00% 6 0 2026-02-24T22:39:03.967000 Statmatic is a Laravel and Git powered content management system (CMS). Prior to
CVE-2026-25899 7.5 0.00% 2 0 2026-02-24T22:39:03.967000 Fiber is an Express inspired web framework written in Go. In versions on the v3
CVE-2026-26222 0 0.00% 2 0 2026-02-24T21:52:01.367000 Altec DocLink (now maintained by Beyond Limits Inc.) version 4.0.336.0 exposes i
CVE-2026-26341 0 0.00% 2 0 2026-02-24T21:52:01.367000 Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and pr
CVE-2026-21410 9.8 0.00% 4 0 2026-02-24T21:52:01.367000 InSAT MasterSCADA BUK-TS is susceptible to SQL Injection through its main web in
CVE-2026-22553 9.8 0.00% 4 0 2026-02-24T21:52:01.367000 All versions of InSAT MasterSCADA BUK-TS are susceptible to OS command injection
CVE-2025-33180 8.0 0.00% 6 0 2026-02-24T21:52:01.367000 NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE inter
CVE-2026-3105 7.6 0.00% 2 0 2026-02-24T21:52:01.367000 SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint
CVE-2025-33179 8.0 0.00% 4 0 2026-02-24T21:52:01.367000 NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE inter
CVE-2026-24241 4.3 0.00% 2 0 2026-02-24T21:52:01.367000 NVIDIA Delegated Licensing Service for all appliance platforms contains a vulner
CVE-2026-27519 7.5 0.00% 2 0 2026-02-24T21:52:01.367000 Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior
CVE-2026-2769 8.8 0.00% 2 0 2026-02-24T21:52:01.367000 Use-after-free in the Storage: IndexedDB component. This vulnerability affects F
CVE-2026-27208 9.2 0.00% 2 0 2026-02-24T21:52:01.367000 bleon-ethical/api-gateway-deploy provides API gateway deployment. Version 1.0.0
CVE-2026-2038 9.8 0.42% 2 0 2026-02-24T21:43:04.817000 GFI Archiver MArc.Core Missing Authorization Authentication Bypass Vulnerability
CVE-2026-2039 9.8 0.42% 2 0 2026-02-24T21:42:14.183000 GFI Archiver MArc.Store Missing Authorization Authentication Bypass Vulnerabilit
CVE-2026-2037 8.8 0.79% 1 0 2026-02-24T21:41:45.897000 GFI Archiver MArc.Core Deserialization of Untrusted Data Remote Code Execution V
CVE-2026-2045 7.8 0.06% 1 0 2026-02-24T21:41:19.147000 GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. T
CVE-2026-3044 8.8 0.05% 3 0 2026-02-24T21:39:12.990000 A vulnerability has been found in Tenda AC8 16.03.34.06. This affects the functi
CVE-2026-25108 8.8 0.33% 6 0 2026-02-24T21:38:18.607000 FileZen contains an OS command injection vulnerability. When FileZen Antivirus C
CVE-2026-22765 8.8 0.00% 2 0 2026-02-24T21:31:50 Dell Wyse Management Suite, versions prior to WMS 5.5, contain a Missing Authori
CVE-2025-33181 7.3 0.00% 2 0 2026-02-24T21:31:50 NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE inter
CVE-2026-2798 8.8 0.00% 2 0 2026-02-24T21:31:46 Use-after-free in the DOM: Core & HTML component. This vulnerability affects Fir
CVE-2026-26746 8.8 0.21% 1 1 2026-02-24T20:42:28.327000 OpenSourcePOS 3.4.1 contains a Local File Inclusion (LFI) vulnerability in the S
CVE-2025-70329 8.0 0.43% 1 0 2026-02-24T20:38:09.483000 TOTOLink X5000R v9.1.0cu_2415_B20250515 contains an OS command injection vulnera
CVE-2026-27483 8.8 0.00% 2 0 2026-02-24T20:07:59 ### Summary There is a path traversal vulnerability in Mindsdb's /api/files int
CVE-2026-2980 7.2 0.04% 1 0 2026-02-24T20:04:10.060000 A vulnerability has been found in UTT HiPER 810G up to 1.7.7-1711. Impacted is t
CVE-2026-23693 10.0 0.15% 3 0 2026-02-24T19:21:41.843000 ElementsKit Elementor Addons – Advanced Widgets & Templates Addons for Elementor
CVE-2026-25989 7.5 0.04% 1 0 2026-02-24T18:43:16.560000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2025-15386 8.8 0.03% 2 0 2026-02-24T18:32:04 The Responsive Lightbox & Gallery WordPress plugin before 2.6.1 is vulnerable to
CVE-2026-27515 9.1 0.00% 2 0 2026-02-24T18:31:09 Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209
CVE-2026-23678 8.8 0.00% 2 0 2026-02-24T18:31:09 Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior
CVE-2026-27520 7.5 0.00% 2 0 2026-02-24T18:31:09 Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 
CVE-2026-27507 9.8 0.00% 2 1 2026-02-24T18:31:08 Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior
CVE-2026-27516 8.1 0.00% 2 0 2026-02-24T18:31:08 Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior 
CVE-2026-2904 8.8 0.04% 2 0 2026-02-24T18:31:01 A vulnerability was determined in UTT HiPER 810G 1.7.7-171114. This affects the
CVE-2025-40541 9.1 0.04% 1 0 2026-02-24T17:56:16.030000 An Insecure Direct Object Reference (IDOR) vulnerability exists in Serv-U, which
CVE-2026-25794 8.2 0.04% 1 0 2026-02-24T17:28:54.433000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-27211 10.0 0.05% 2 1 2026-02-24T17:08:14.463000 Cloud Hypervisor is a Virtual Machine Monitor for Cloud workloads. Versions 34.0
CVE-2026-25802 7.6 0.03% 2 0 2026-02-24T16:08:21 ### Summary A potential unsafe operation occurs in component `MarkdownRenderer.
CVE-2026-25591 None 0.04% 2 0 2026-02-24T16:08:14 ### Summary A SQL LIKE wildcard injection vulnerability in the `/api/token/searc
CVE-2026-27574 10.0 0.05% 1 1 2026-02-24T16:00:57 ### Summary OneUptime lets project members write custom JavaScript that runs in
CVE-2026-25985 7.5 0.04% 1 0 2026-02-24T15:44:21 A crafted SVG file containing an malicious element causes ImageMagick to attempt
CVE-2026-24481 7.5 0.03% 1 0 2026-02-24T15:27:31 ### Description A heap information disclosure vulnerability exists in ImageMagic
CVE-2026-27212 7.8 0.03% 3 0 2026-02-24T15:16:56.670000 Swiper is a free and mobile touch slider with hardware accelerated transitions a
CVE-2026-27471 9.1 0.04% 3 0 2026-02-24T14:52:50.073000 ERP is a free and open source Enterprise Resource Planning tool. In versions up
CVE-2026-27479 7.7 0.03% 1 0 2026-02-24T14:47:06.290000 Wallos is an open-source, self-hostable personal subscription tracker. Versions
CVE-2026-27127 0 0.01% 1 0 2026-02-24T14:13:49.320000 Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.1
CVE-2026-26198 9.8 0.04% 2 1 2026-02-24T14:13:49.320000 Ormar is a async mini ORM for Python. In versions 0.9.9 through 0.22.0, when per
CVE-2025-13943 8.8 0.32% 2 0 2026-02-24T14:13:49.320000 A post-authentication command injection vulnerability in the log file download f
CVE-2026-26331 8.8 0.12% 1 1 2026-02-24T14:13:49.320000 yt-dlp is a command-line audio/video downloader. Starting in version 2023.06.21
CVE-2026-25965 8.6 0.03% 1 0 2026-02-24T14:13:49.320000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-24485 7.5 0.04% 1 0 2026-02-24T14:13:49.320000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-25648 8.7 0.03% 1 0 2026-02-24T14:13:49.320000 Versions of the Traccar open-source GPS tracking system starting with 6.11.1 con
CVE-2026-21863 7.5 0.01% 2 0 2026-02-24T14:13:49.320000 Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.
CVE-2026-2041 8.8 1.25% 3 0 2026-02-24T13:18:09.610000 Nagios Host zabbixagent_configwizard_func Command Injection Remote Code Executio
CVE-2026-27161 7.5 0.07% 2 0 2026-02-24T13:10:07.530000 GetSimple CMS is a content management system. All versions of GetSimple CMS rely
CVE-2025-40538 9.1 0.03% 4 0 2026-02-24T09:31:31 A broken access control vulnerability exists in Serv-U which when exploited, giv
CVE-2025-40539 9.1 0.04% 2 0 2026-02-24T09:31:31 A type confusion vulnerability exists in Serv-U which when exploited, gives a ma
CVE-2025-40540 9.1 0.04% 1 0 2026-02-24T09:31:31 A type confusion vulnerability exists in Serv-U which when exploited, gives a ma
CVE-2026-1459 7.2 0.10% 1 0 2026-02-24T03:30:30 A post-authentication command injection vulnerability in the TR-369 certificate
CVE-2025-13942 9.8 0.39% 1 0 2026-02-24T03:30:27 A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 fi
CVE-2026-27487 7.6 0.05% 1 0 2026-02-23T22:28:28 ## Summary On macOS, the Claude CLI keychain credential refresh path constructed
CVE-2026-27198 8.8 0.04% 1 0 2026-02-23T22:27:31 ### Summary The application fails to properly enforce role-based authorization
CVE-2026-27196 8.1 0.02% 1 0 2026-02-23T22:26:22 ## Impact Stored XSS vulnerability in `html` fieldtypes allow authenticated use
CVE-2026-27203 8.3 0.04% 1 0 2026-02-23T22:23:46 The `ebay_set_user_tokens` tool allows updating the `.env` file with new tokens.
CVE-2025-69700 7.5 0.04% 1 0 2026-02-23T21:31:30 Tenda FH1203 V2.0.1.6 contains a stack-based buffer overflow vulnerability in th
CVE-2025-69380 7.5 0.04% 1 0 2026-02-23T21:31:28 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v
CVE-2026-26722 9.4 0.10% 1 0 2026-02-23T21:31:26 An issue in Key Systems Inc Global Facilities Management Software v.20230721a al
CVE-2026-26723 8.2 0.06% 1 0 2026-02-23T21:31:25 Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Manageme
CVE-2025-70833 9.4 0.08% 1 0 2026-02-23T21:31:25 An Authentication Bypass vulnerability in Smanga 3.2.7 allows an unauthenticated
CVE-2026-26747 9.1 0.04% 1 0 2026-02-23T21:19:12.023000 A Host Header Poisoning vulnerability exists in Monica 4.1.2 due to improper han
CVE-2026-26725 9.8 0.10% 1 0 2026-02-23T21:19:11.473000 An issue in edu Business Solutions Print Shop Pro WebDesk v.18.34 allows a remot
CVE-2026-26724 7.6 0.05% 1 0 2026-02-23T21:19:11.287000 Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Manageme
CVE-2025-70831 9.8 0.22% 1 0 2026-02-23T21:19:09.510000 A Remote Code Execution (RCE) vulnerability was found in Smanga 3.2.7 in the /ph
CVE-2025-69393 7.5 0.03% 1 0 2026-02-23T21:19:08.873000 Missing Authorization vulnerability in Jthemes Exzo exzo allows Exploiting Incor
CVE-2026-2886 8.8 0.08% 2 0 2026-02-23T21:00:35.513000 A weakness has been identified in Tenda A21 1.0.0.0. This affects the function s
CVE-2026-2871 8.8 0.03% 1 0 2026-02-23T20:59:13.240000 A weakness has been identified in Tenda A21 1.0.0.0. This affects the function f
CVE-2026-27169 8.9 0.05% 1 0 2026-02-23T20:50:36.870000 OpenSift is an AI study tool that sifts through large datasets using semantic se
CVE-2026-27194 9.8 0.29% 1 0 2026-02-23T20:47:29.423000 D-Tale is a visualizer for pandas data structures. Versions prior to 3.20.0 are
CVE-2026-27197 9.1 0.04% 2 0 2026-02-23T20:45:01.957000 Sentry is a developer-first error tracking and performance monitoring tool. Vers
CVE-2026-2876 8.8 0.07% 1 0 2026-02-23T20:33:02.043000 A vulnerability was determined in Tenda A18 15.13.07.13. This affects the functi
CVE-2026-2588 9.1 0.04% 1 0 2026-02-23T20:28:55.517000 Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw
CVE-2026-24956 9.3 0.03% 1 0 2026-02-23T20:28:54.140000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-2856 8.8 0.03% 1 0 2026-02-23T20:27:19.517000 A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerabi
CVE-2026-2857 8.8 0.03% 1 0 2026-02-23T20:26:36.483000 A vulnerability was determined in D-Link DWR-M960 1.01.07. Affected by this issu
CVE-2026-2907 8.8 0.08% 1 0 2026-02-23T20:21:53.467000 A weakness has been identified in Tenda HG9 300001138. Affected by this vulnerab
CVE-2026-2908 8.8 0.08% 1 0 2026-02-23T20:21:45.490000 A security vulnerability has been detected in Tenda HG9 300001138. Affected by t
CVE-2026-2911 8.8 0.08% 1 0 2026-02-23T20:21:22.323000 A vulnerability has been found in Tenda FH451 up to 1.0.0.9. This issue affects
CVE-2026-2874 8.8 0.08% 1 0 2026-02-23T20:09:11.397000 A flaw has been found in Tenda A21 1.0.0.0. Impacted is the function form_fast_s
CVE-2026-2883 8.8 0.01% 1 0 2026-02-23T19:41:14.377000 A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the funct
CVE-2026-2929 8.8 0.03% 2 0 2026-02-23T19:39:25.350000 A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the funct
CVE-2026-2926 8.8 0.03% 2 0 2026-02-23T19:35:45.083000 A flaw has been found in D-Link DWR-M960 1.01.07. This affects the function sub_
CVE-2026-2928 8.8 0.02% 2 0 2026-02-23T19:29:03.767000 A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the fun
CVE-2026-2959 8.8 0.03% 3 0 2026-02-23T19:28:20.650000 A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulner
CVE-2026-2960 8.8 0.03% 2 0 2026-02-23T19:24:49.953000 A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the
CVE-2026-23552 9.1 0.01% 2 1 2026-02-23T18:33:04 Cross-Realm Token Acceptance Bypass in KeycloakSecurityPolicy Apache Camel Keycl
CVE-2025-70043 9.1 0.02% 2 0 2026-02-23T18:32:09 An issue pertaining to CWE-295: Improper Certificate Validation was discovered i
CVE-2026-3016 8.8 0.04% 1 0 2026-02-23T18:32:05 A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. The affecte
CVE-2026-3015 8.8 0.04% 2 0 2026-02-23T18:32:04 A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is
CVE-2019-25441 9.8 2.65% 1 0 2026-02-23T18:14:13.887000 thesystem 1.0 contains a command injection vulnerability that allows unauthentic
CVE-2026-25896 9.3 0.03% 3 0 2026-02-23T18:14:13.887000 fast-xml-parser allows users to validate XML, parse XML to JS object, or build X
CVE-2026-24892 7.5 0.31% 1 0 2026-02-23T18:14:13.887000 openITCOCKPIT is an open source monitoring tool built for different monitoring e
CVE-2026-22567 7.6 0.04% 1 0 2026-02-23T18:13:53.397000 Improper validation of user-supplied input in the ZIA Admin UI could allow an au
CVE-2026-24494 9.8 0.05% 2 0 2026-02-23T18:13:53.397000 SQL Injection vulnerability in the /api/integrations/getintegrations endpoint of
CVE-2026-27466 7.2 0.07% 1 0 2026-02-23T18:13:53.397000 BigBlueButton is an open-source virtual classroom. In versions 3.0.21 and below,
CVE-2026-27467 2.0 0.03% 1 0 2026-02-23T18:13:53.397000 BigBlueButton is an open-source virtual classroom. In versions 3.0.19 and below,
CVE-2026-27464 7.7 0.03% 1 0 2026-02-23T18:13:53.397000 Metabase is an open-source data analytics platform. In versions prior to 0.57.13
CVE-2026-27206 8.1 0.29% 1 0 2026-02-23T18:13:53.397000 Zumba Json Serializer is a library to serialize PHP variables in JSON format. In
CVE-2026-27192 0 0.02% 1 0 2026-02-23T18:13:53.397000 Feathersjs is a framework for creating web APIs and real-time applications with
CVE-2026-27134 8.1 0.03% 2 0 2026-02-23T18:13:53.397000 Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift
CVE-2026-2441 8.8 0.34% 9 6 2026-02-23T13:24:55.920000 Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote a
CVE-2025-49113 9.9 89.37% 1 22 template 2026-02-23T13:24:21.387000 Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execu
CVE-2025-68461 7.2 6.89% 1 2 2026-02-23T13:24:12.310000 Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a Cross-Site-S
CVE-2026-2981 8.8 0.04% 2 0 2026-02-23T09:31:29 A vulnerability was found in UTT HiPER 810G up to 1.7.7-1711. The affected eleme
CVE-2026-1367 8.3 0.18% 1 0 2026-02-23T09:31:29 Zohocorp ManageEngine ADSelfService Plus versions 6522 and below are vulnerable
CVE-2026-2998 7.8 0.01% 2 0 2026-02-23T06:30:18 ERP developed by eAI Technologies has a DLL Hijacking vulnerability, allowing au
CVE-2026-2962 8.8 0.03% 2 0 2026-02-23T03:30:27 A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects
CVE-2026-2961 8.8 0.03% 2 0 2026-02-23T03:30:22 A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the func
CVE-2026-2958 8.8 0.03% 2 0 2026-02-23T00:30:32 A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected
CVE-2026-2927 8.8 0.03% 2 0 2026-02-22T06:30:24 A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability af
CVE-2026-2925 8.8 0.03% 2 0 2026-02-22T06:30:24 A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this issue
CVE-2026-2910 8.8 0.08% 1 0 2026-02-22T06:30:24 A flaw has been found in Tenda HG9 300001138. This vulnerability affects unknown
CVE-2026-2906 8.8 0.08% 1 0 2026-02-22T03:30:34 A security flaw has been discovered in Tenda HG9 300001138. Affected is an unkno
CVE-2026-2909 8.8 0.08% 2 0 2026-02-22T03:30:33 A vulnerability was detected in Tenda HG9 300001138. This affects an unknown par
CVE-2026-2905 8.8 0.08% 1 0 2026-02-22T03:30:33 A vulnerability was identified in Tenda HG9 300001138. This impacts an unknown f
CVE-2026-2884 8.8 0.03% 1 0 2026-02-21T21:30:33 A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element
CVE-2026-2885 8.8 0.03% 2 0 2026-02-21T21:30:32 A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted ele
CVE-2026-2881 8.8 0.03% 1 0 2026-02-21T21:30:28 A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability af
CVE-2026-2882 8.8 0.03% 1 0 2026-02-21T21:30:27 A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the fun
CVE-2026-2877 8.8 0.07% 1 0 2026-02-21T21:30:27 A vulnerability has been found in Tenda A18 15.13.07.13. This affects the functi
CVE-2026-2873 8.8 0.08% 1 0 2026-02-21T18:31:22 A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the functi
CVE-2026-2872 8.8 0.08% 1 0 2026-02-21T18:31:22 A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerabil
CVE-2026-2870 8.8 0.08% 1 0 2026-02-21T15:31:37 A security flaw has been discovered in Tenda A21 1.0.0.0. Affected by this issue
CVE-2026-2635 9.8 1.17% 1 0 2026-02-21T00:31:55 MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnera
CVE-2026-2043 7.2 0.47% 2 0 2026-02-21T00:31:54 Nagios Host esensors_websensor_configwizard_func Command Injection Remote Code E
CVE-2026-2033 8.1 10.53% 2 0 2026-02-21T00:31:54 MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Executio
CVE-2026-2036 8.8 0.79% 1 0 2026-02-21T00:31:54 GFI Archiver MArc.Store Deserialization of Untrusted Data Remote Code Execution
CVE-2026-2034 7.8 0.04% 1 0 2026-02-21T00:31:54 Sante DICOM Viewer Pro DCM File Parsing Buffer Overflow Remote Code Execution Vu
CVE-2026-0777 7.8 0.06% 2 0 2026-02-21T00:31:49 Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. Th
CVE-2026-2042 7.2 1.25% 3 0 2026-02-21T00:31:43 Nagios Host monitoringwizard Command Injection Remote Code Execution Vulnerabili
CVE-2026-27190 8.1 0.16% 1 0 2026-02-20T22:20:05 ## Summary A command injection vulnerability exists in Deno's `node:child_proces
CVE-2026-22370 8.1 0.11% 1 0 2026-02-20T21:32:27 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22383 7.5 0.04% 1 0 2026-02-20T21:31:23 Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes
CVE-2026-22380 8.1 0.11% 1 0 2026-02-20T21:31:23 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22368 8.1 0.11% 1 0 2026-02-20T21:31:22 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-2329 9.8 0.19% 2 0 2026-02-20T20:57:50.360000 An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP
CVE-2026-22374 8.1 0.11% 1 0 2026-02-20T20:25:20.203000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22372 8.1 0.11% 1 0 2026-02-20T20:25:20.027000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22366 8.1 0.11% 1 0 2026-02-20T20:25:19.503000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22364 8.1 0.11% 1 0 2026-02-20T20:25:19.337000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22362 8.1 0.11% 1 0 2026-02-20T20:25:19.160000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22769 10.0 34.16% 1 0 2026-02-20T02:00:02.830000 Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a
CVE-2026-26030 10.0 0.08% 1 1 2026-02-19T19:34:15 ### Impact: An RCE vulnerability has been identified in Microsoft Semantic Kerne
CVE-2026-0714 6.8 0.01% 1 0 2026-02-18T18:31:27 A physical attack vulnerability exists in certain Moxa industrial computers usin
CVE-2026-2533 7.3 2.14% 1 0 2026-02-18T17:52:22.253000 A flaw has been found in Tosei Self-service Washing Machine 4.02. Impacted is an
CVE-2026-2548 6.3 1.41% 1 0 2026-02-18T17:52:22.253000 A flaw has been found in WAYOS FBM-220G 24.10.19. This affects the function sub_
CVE-2026-2426 6.5 2.57% 1 0 2026-02-18T12:31:15 The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in a
CVE-2026-1731 9.8 52.96% 2 5 template 2026-02-17T15:31:33 BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote
CVE-2026-2544 7.3 2.14% 1 0 2026-02-16T09:30:36 A security flaw has been discovered in yued-fe LuLu UI up to 3.0.0. This issue a
CVE-2026-21513 8.8 4.12% 2 0 2026-02-10T21:31:29 Protection mechanism failure in MSHTML Framework allows an unauthorized attacker
CVE-2026-1281 9.8 57.41% 2 2 2026-01-30T13:28:18.610000 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2026-1340 9.8 41.91% 2 2 2026-01-30T00:31:28 A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve
CVE-2025-12543 9.6 0.08% 1 0 2026-01-08T23:15:42.690000 A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBo
CVE-2025-67511 9.7 0.12% 2 0 2025-12-11T17:22:16 ### Summary A command injection vulnerability is present in the function tool `
CVE-2023-46604 10.0 94.44% 2 33 template 2025-11-04T16:41:16.217000 The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. T
CVE-2025-59201 7.8 0.10% 2 0 2025-10-14T18:30:36 Improper access control in Network Connection Status Indicator (NCSI) allows an
CVE-2025-8277 3.1 0.05% 1 0 2025-09-09T12:30:49 A flaw was found in libssh's handling of key exchange (KEX) processes when a cli
CVE-2025-47943 6.3 0.05% 2 0 2025-07-30T17:45:41 ### Summary A stored XSS is present in Gogs which allows client-side Javascript
CVE-2025-0037 6.6 0.03% 2 0 2025-06-10T00:30:36 In AMD Versal Adaptive SoC devices, the lack of address validation when executin
CVE-2025-47809 8.2 0.02% 1 0 2025-05-16T14:42:18.700000 Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately af
CVE-2025-25362 9.8 0.45% 2 0 2025-04-02T13:15:44.063000 A Server-Side Template Injection (SSTI) vulnerability in Spacy-LLM v0.7.2 allows
CVE-2023-31364 0 0.00% 2 0 N/A
CVE-2026-27202 0 0.06% 2 0 N/A
CVE-2025-67733 0 0.02% 2 1 N/A
CVE-2026-27623 0 0.06% 2 0 N/A
CVE-2026-27470 0 0.03% 1 1 N/A
CVE-2026-27452 0 0.04% 1 0 N/A
CVE-2026-27168 0 0.02% 3 0 N/A

CVE-2026-25131
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-25T02:16:22.967000

2 posts

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a Broken Access Control vulnerability exists in the OpenEMR order types management system, allowing low-privilege users (such as Receptionist) to add and modify procedure types without proper authorization. This vulnerability is present in the /openemr/interface/orders/t

thehackerwire@mastodon.social at 2026-02-25T02:18:26.000Z ##

🟠 CVE-2026-25131 - High (8.8)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a Broken Access Control vulnerability exists in the OpenEMR order types management system, allowing low-privilege user...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-25T02:18:26.000Z ##

🟠 CVE-2026-25131 - High (8.8)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a Broken Access Control vulnerability exists in the OpenEMR order types management system, allowing low-privilege user...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24849
(9.9 CRITICAL)

EPSS: 0.00%

updated 2026-02-25T02:16:22.197000

2 posts

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, the `disposeDocument()` method in `EtherFaxActions.php` allows authenticated users to read arbitrary files from the server filesystem. Any authenticated user (regardless of privilege level) can exploit this vulnerability to read sensitive files. Version 7.0.4 patches the

thehackerwire@mastodon.social at 2026-02-25T02:18:16.000Z ##

🔴 CVE-2026-24849 - Critical (9.9)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, the `disposeDocument()` method in `EtherFaxActions.php` allows authenticated users to read arbitrary files from th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-25T02:18:16.000Z ##

🔴 CVE-2026-24849 - Critical (9.9)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, the `disposeDocument()` method in `EtherFaxActions.php` allows authenticated users to read arbitrary files from th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69231
(8.7 HIGH)

EPSS: 0.00%

updated 2026-02-25T02:16:21.707000

2 posts

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a stored cross-site scripting vulnerability in the GAD-7 anxiety assessment form allows authenticated users with clinician privileges to inject malicious JavaScript that executes when other users view the form. This enables session hijacking, account takeover, and privil

thehackerwire@mastodon.social at 2026-02-25T02:22:31.000Z ##

🟠 CVE-2025-69231 - High (8.7)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a stored cross-site scripting vulnerability in the GAD-7 anxiety assessment form allows authenticated users with clini...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-25T02:22:31.000Z ##

🟠 CVE-2025-69231 - High (8.7)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, a stored cross-site scripting vulnerability in the GAD-7 anxiety assessment form allows authenticated users with clini...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67752
(8.1 HIGH)

EPSS: 0.00%

updated 2026-02-25T02:16:21.377000

2 posts

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, OpenEMR's HTTP client wrapper (`oeHttp`/`oeHttpRequest`) disables SSL/TLS certificate verification by default (`verify: false`), making all external HTTPS connections vulnerable to man-in-the-middle (MITM) attacks. This affects communication with government healthcare AP

thehackerwire@mastodon.social at 2026-02-25T02:18:36.000Z ##

🟠 CVE-2025-67752 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, OpenEMR's HTTP client wrapper (`oeHttp`/`oeHttpRequest`) disables SSL/TLS certificate verification by default (`verify...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-25T02:18:36.000Z ##

🟠 CVE-2025-67752 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 7.0.4, OpenEMR's HTTP client wrapper (`oeHttp`/`oeHttpRequest`) disables SSL/TLS certificate verification by default (`verify...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0797
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-25T00:31:22

2 posts

GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ICO files. The issue results f

thehackerwire@mastodon.social at 2026-02-21T00:25:09.000Z ##

🟠 CVE-2026-0797 - High (7.8)

GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:33.000Z ##

🟠 CVE-2026-0797 - High (7.8)

GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27593
(9.3 CRITICAL)

EPSS: 0.00%

updated 2026-02-24T22:39:03.967000

6 posts

Statmatic is a Laravel and Git powered content management system (CMS). Prior to versions 6.3.3 and 5.73.10, an attacker may leverage a vulnerability in the password reset feature to capture a user's token and reset the password on their behalf. The attacker must know the email address of a valid account on the site, and the actual user must blindly click the link in their email even though they d

valorin@phpc.social at 2026-02-25T00:36:30.000Z ##

PSA for Statamic folks - update your sites ASAP! ⚠️

A CRITICAL vuln was discovered that allows full account takeover via password resets! 😱

All the details: cvereports.com/reports/CVE-202 #Laravel

##

offseq at 2026-02-24T23:00:29.531Z ##

🚨 Statamic CMS CRITICAL vuln (CVE-2026-27593): Weak password reset lets attackers hijack accounts if users click a malicious link. Patch to 6.3.3/5.73.10+, educate users, enable MFA. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-24T22:17:21.000Z ##

🔴 CVE-2026-27593 - Critical (9.3)

Statmatic is a Laravel and Git powered content management system (CMS). Prior to versions 6.3.3 and 5.73.10, an attacker may leverage a vulnerability in the password reset feature to capture a user's token and reset the password on their behalf. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

valorin@phpc.social at 2026-02-25T00:36:30.000Z ##

PSA for Statamic folks - update your sites ASAP! ⚠️

A CRITICAL vuln was discovered that allows full account takeover via password resets! 😱

All the details: cvereports.com/reports/CVE-202 #Laravel

##

offseq@infosec.exchange at 2026-02-24T23:00:29.000Z ##

🚨 Statamic CMS CRITICAL vuln (CVE-2026-27593): Weak password reset lets attackers hijack accounts if users click a malicious link. Patch to 6.3.3/5.73.10+, educate users, enable MFA. Details: radar.offseq.com/threat/cve-20 #OffSeq #Statamic #CVE202627593 #infosec

##

thehackerwire@mastodon.social at 2026-02-24T22:17:21.000Z ##

🔴 CVE-2026-27593 - Critical (9.3)

Statmatic is a Laravel and Git powered content management system (CMS). Prior to versions 6.3.3 and 5.73.10, an attacker may leverage a vulnerability in the password reset feature to capture a user's token and reset the password on their behalf. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25899
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-24T22:39:03.967000

2 posts

Fiber is an Express inspired web framework written in Go. In versions on the v3 branch prior to 3.1.0, the use of the `fiber_flash` cookie can force an unbounded allocation on any server. A crafted 10-character cookie value triggers an attempt to allocate up to 85GB of memory via unvalidated msgpack deserialization. No authentication is required. Every GoFiber v3 endpoint is affected regardless of

thehackerwire@mastodon.social at 2026-02-24T22:17:38.000Z ##

🟠 CVE-2026-25899 - High (7.5)

Fiber is an Express inspired web framework written in Go. In versions on the v3 branch prior to 3.1.0, the use of the `fiber_flash` cookie can force an unbounded allocation on any server. A crafted 10-character cookie value triggers an attempt to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T22:17:38.000Z ##

🟠 CVE-2026-25899 - High (7.5)

Fiber is an Express inspired web framework written in Go. In versions on the v3 branch prior to 3.1.0, the use of the `fiber_flash` cookie can force an unbounded allocation on any server. A crafted 10-character cookie value triggers an attempt to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26222
(0 None)

EPSS: 0.00%

updated 2026-02-24T21:52:01.367000

2 posts

Altec DocLink (now maintained by Beyond Limits Inc.) version 4.0.336.0 exposes insecure .NET Remoting endpoints over TCP and HTTP/SOAP via Altec.RDCHostService.exe using the ObjectURI "doclinkServer.soap". The service does not require authentication and is vulnerable to unsafe object unmarshalling, allowing remote attackers to read arbitrary files from the underlying system by specifying local fil

offseq at 2026-02-25T03:00:29.143Z ##

🚩 CRITICAL: CVE-2026-26222 in Altec DocLink 4.0.336.0 enables unauthenticated remote code execution & file access via unsafe .NET deserialization. No patch yet — immediately restrict/segment endpoints & monitor. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-25T03:00:29.000Z ##

🚩 CRITICAL: CVE-2026-26222 in Altec DocLink 4.0.336.0 enables unauthenticated remote code execution & file access via unsafe .NET deserialization. No patch yet — immediately restrict/segment endpoints & monitor. Details: radar.offseq.com/threat/cve-20
#OffSeq #CVE202626222 #Vuln #RCE

##

CVE-2026-26341
(0 None)

EPSS: 0.00%

updated 2026-02-24T21:52:01.367000

2 posts

Tattile Smart+, Vega, and Basic device families firmware versions 1.181.5 and prior ship with default credentials that are not forced to be changed during installation or commissioning. An attacker who can reach the management interface can authenticate using the default credentials and gain administrative access, enabling unauthorized access to device configuration and data.

offseq at 2026-02-25T01:30:28.186Z ##

⚠️ CRITICAL: CVE-2026-26341 in Tattile Smart+, Vega & Basic (fw ≤1.181.5) — default creds allow admin access if device is reachable. Change passwords, restrict interface access ASAP. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-25T01:30:28.000Z ##

⚠️ CRITICAL: CVE-2026-26341 in Tattile Smart+, Vega & Basic (fw ≤1.181.5) — default creds allow admin access if device is reachable. Change passwords, restrict interface access ASAP. Details: radar.offseq.com/threat/cve-20 #OffSeq #IoTSecurity #DefaultCreds #Vuln

##

CVE-2026-21410
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-24T21:52:01.367000

4 posts

InSAT MasterSCADA BUK-TS is susceptible to SQL Injection through its main web interface. Malicious users that use the vulnerable endpoint are potentially able to cause remote code execution.

offseq at 2026-02-25T00:00:42.090Z ##

🚨 CRITICAL SQL Injection (CVE-2026-21410) affects all InSAT MasterSCADA BUK-TS versions. Unauthenticated RCE possible — industrial ops at risk. Restrict access & monitor until patched. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-24T21:28:48.000Z ##

🔴 CVE-2026-21410 - Critical (9.8)

InSAT MasterSCADA BUK-TS is susceptible to SQL Injection through its main web interface. Malicious users that use the vulnerable endpoint are potentially able to cause remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-25T00:00:42.000Z ##

🚨 CRITICAL SQL Injection (CVE-2026-21410) affects all InSAT MasterSCADA BUK-TS versions. Unauthenticated RCE possible — industrial ops at risk. Restrict access & monitor until patched. Details: radar.offseq.com/threat/cve-20 #OffSeq #ICS #SCADA #Vulnerability

##

thehackerwire@mastodon.social at 2026-02-24T21:28:48.000Z ##

🔴 CVE-2026-21410 - Critical (9.8)

InSAT MasterSCADA BUK-TS is susceptible to SQL Injection through its main web interface. Malicious users that use the vulnerable endpoint are potentially able to cause remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22553
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-24T21:52:01.367000

4 posts

All versions of InSAT MasterSCADA BUK-TS are susceptible to OS command injection through a field in its MMadmServ web interface. Malicious users that use the vulnerable endpoint are potentially able to cause remote code execution.

offseq at 2026-02-24T21:30:31.796Z ##

🚨 CVE-2026-22553: CRITICAL OS command injection in InSAT MasterSCADA BUK-TS (all versions) via MMadmServ web interface. Unauthenticated RCE risk — no patch yet. Isolate, monitor, and apply WAF mitigations. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-24T21:28:39.000Z ##

🔴 CVE-2026-22553 - Critical (9.8)

All versions of InSAT MasterSCADA BUK-TS are susceptible to OS command injection through a field in its MMadmServ web interface. Malicious users that use the vulnerable endpoint are potentially able to cause remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-24T21:30:31.000Z ##

🚨 CVE-2026-22553: CRITICAL OS command injection in InSAT MasterSCADA BUK-TS (all versions) via MMadmServ web interface. Unauthenticated RCE risk — no patch yet. Isolate, monitor, and apply WAF mitigations. radar.offseq.com/threat/cve-20 #OffSeq #ICS #SCADA #Infosec

##

thehackerwire@mastodon.social at 2026-02-24T21:28:39.000Z ##

🔴 CVE-2026-22553 - Critical (9.8)

All versions of InSAT MasterSCADA BUK-TS are susceptible to OS command injection through a field in its MMadmServ web interface. Malicious users that use the vulnerable endpoint are potentially able to cause remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33180
(8.0 HIGH)

EPSS: 0.00%

updated 2026-02-24T21:52:01.367000

6 posts

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could inject a command. A successful exploit of this vulnerability might lead to escalation of privileges.

thehackerwire@mastodon.social at 2026-02-24T20:29:12.000Z ##

🟠 CVE-2025-33180 - High (8)

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could inject a command. A successful exploit of this vulnerability might lead to escalation of privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T20:28:52.000Z ##

🟠 CVE-2025-33180 - High (8)

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could inject a command. A successful exploit of this vulnerability might lead to escalation of privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL at 2026-02-24T17:04:48.489Z ##

Two advisories from AMD, one new, one updated:

-  CVE-2025-0037: Versal Adaptive SoC –Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

- CVE-2023-31364: Guest Initiated Machine Check Errors amd.com/en/resources/product-s

Two new ones from NVIDIA:

- CVE-2025-33179, CVE-2025-33180, and CVE-2025-33181: NVIDIA Cumulus Linux and NVOS - February 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24241: NVIDIA License System - February 2026 nvidia.custhelp.com/app/answer

##

thehackerwire@mastodon.social at 2026-02-24T20:29:12.000Z ##

🟠 CVE-2025-33180 - High (8)

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could inject a command. A successful exploit of this vulnerability might lead to escalation of privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T20:28:52.000Z ##

🟠 CVE-2025-33180 - High (8)

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could inject a command. A successful exploit of this vulnerability might lead to escalation of privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-02-24T17:04:48.000Z ##

Two advisories from AMD, one new, one updated:

-  CVE-2025-0037: Versal Adaptive SoC –Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

- CVE-2023-31364: Guest Initiated Machine Check Errors amd.com/en/resources/product-s

Two new ones from NVIDIA:

- CVE-2025-33179, CVE-2025-33180, and CVE-2025-33181: NVIDIA Cumulus Linux and NVOS - February 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24241: NVIDIA License System - February 2026 nvidia.custhelp.com/app/answer #Nvidia #infosec #AMD #vulnerability #Linux

##

CVE-2026-3105
(7.6 HIGH)

EPSS: 0.00%

updated 2026-02-24T21:52:01.367000

2 posts

SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determining the sort direction was not strictly validated against an allowlist, potentially allowing authenticated users to inject arbitrary SQL commands via th

thehackerwire@mastodon.social at 2026-02-24T20:29:04.000Z ##

🟠 CVE-2026-3105 - High (7.6)

SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T20:29:04.000Z ##

🟠 CVE-2026-3105 - High (7.6)

SummaryThis advisory addresses a SQL injection vulnerability in the API endpoint used for retrieving contact activities. A vulnerability exists in the query construction for the Contact Activity timeline where the parameter responsible for determi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33179
(8.0 HIGH)

EPSS: 0.00%

updated 2026-02-24T21:52:01.367000

4 posts

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could run an unauthorized command. A successful exploit of this vulnerability might lead to escalation of privileges.

thehackerwire@mastodon.social at 2026-02-24T20:28:42.000Z ##

🟠 CVE-2025-33179 - High (8)

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could run an unauthorized command. A successful exploit of this vulnerability might lead to escalation of privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL at 2026-02-24T17:04:48.489Z ##

Two advisories from AMD, one new, one updated:

-  CVE-2025-0037: Versal Adaptive SoC –Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

- CVE-2023-31364: Guest Initiated Machine Check Errors amd.com/en/resources/product-s

Two new ones from NVIDIA:

- CVE-2025-33179, CVE-2025-33180, and CVE-2025-33181: NVIDIA Cumulus Linux and NVOS - February 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24241: NVIDIA License System - February 2026 nvidia.custhelp.com/app/answer

##

thehackerwire@mastodon.social at 2026-02-24T20:28:42.000Z ##

🟠 CVE-2025-33179 - High (8)

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could run an unauthorized command. A successful exploit of this vulnerability might lead to escalation of privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-02-24T17:04:48.000Z ##

Two advisories from AMD, one new, one updated:

-  CVE-2025-0037: Versal Adaptive SoC –Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

- CVE-2023-31364: Guest Initiated Machine Check Errors amd.com/en/resources/product-s

Two new ones from NVIDIA:

- CVE-2025-33179, CVE-2025-33180, and CVE-2025-33181: NVIDIA Cumulus Linux and NVOS - February 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24241: NVIDIA License System - February 2026 nvidia.custhelp.com/app/answer #Nvidia #infosec #AMD #vulnerability #Linux

##

CVE-2026-24241
(4.3 MEDIUM)

EPSS: 0.00%

updated 2026-02-24T21:52:01.367000

2 posts

NVIDIA Delegated Licensing Service for all appliance platforms contains a vulnerability where an attacker could exploit an improper authentication issue. A successful exploit of this vulnerability might lead to information disclosure.

AAKL at 2026-02-24T17:04:48.489Z ##

Two advisories from AMD, one new, one updated:

-  CVE-2025-0037: Versal Adaptive SoC –Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

- CVE-2023-31364: Guest Initiated Machine Check Errors amd.com/en/resources/product-s

Two new ones from NVIDIA:

- CVE-2025-33179, CVE-2025-33180, and CVE-2025-33181: NVIDIA Cumulus Linux and NVOS - February 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24241: NVIDIA License System - February 2026 nvidia.custhelp.com/app/answer

##

AAKL@infosec.exchange at 2026-02-24T17:04:48.000Z ##

Two advisories from AMD, one new, one updated:

-  CVE-2025-0037: Versal Adaptive SoC –Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

- CVE-2023-31364: Guest Initiated Machine Check Errors amd.com/en/resources/product-s

Two new ones from NVIDIA:

- CVE-2025-33179, CVE-2025-33180, and CVE-2025-33181: NVIDIA Cumulus Linux and NVOS - February 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24241: NVIDIA License System - February 2026 nvidia.custhelp.com/app/answer #Nvidia #infosec #AMD #vulnerability #Linux

##

CVE-2026-27519
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-24T21:52:01.367000

2 posts

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior use RC4 with a hard-coded key embedded in client-side JavaScript. Because the key is static and exposed, an attacker can decrypt protected values and defeat confidentiality protections.

thehackerwire@mastodon.social at 2026-02-24T16:31:51.000Z ##

🟠 CVE-2026-27519 - High (7.5)

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior use RC4 with a hard-coded key embedded in client-side JavaScript. Because the key is static and exposed, an attacker can decrypt protected values and defeat confident...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T16:31:51.000Z ##

🟠 CVE-2026-27519 - High (7.5)

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior use RC4 with a hard-coded key embedded in client-side JavaScript. Because the key is static and exposed, an attacker can decrypt protected values and defeat confident...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2769
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-24T21:52:01.367000

2 posts

Use-after-free in the Storage: IndexedDB component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.

thehackerwire@mastodon.social at 2026-02-24T15:57:37.000Z ##

🟠 CVE-2026-2769 - High (8.8)

Use-after-free in the Storage: IndexedDB component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, and Firefox ESR &lt; 140.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T15:57:37.000Z ##

🟠 CVE-2026-2769 - High (8.8)

Use-after-free in the Storage: IndexedDB component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, and Firefox ESR &lt; 140.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27208
(9.2 CRITICAL)

EPSS: 0.00%

updated 2026-02-24T21:52:01.367000

2 posts

bleon-ethical/api-gateway-deploy provides API gateway deployment. Version 1.0.0 is vulnerable to an attack chain involving OS Command Injection and Privilege Escalation. This allows an attacker to execute arbitrary commands with root privileges within the container, potentially leading to a container escape and unauthorized infrastructure modifications. This is fixed in version 1.0.1 by implementi

thehackerwire@mastodon.social at 2026-02-24T15:57:28.000Z ##

🔴 CVE-2026-27208 - Critical (9.2)

bleon-ethical/api-gateway-deploy provides API gateway deployment. Version 1.0.0 is vulnerable to an attack chain involving OS Command Injection and Privilege Escalation. This allows an attacker to execute arbitrary commands with root privileges wi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T15:57:28.000Z ##

🔴 CVE-2026-27208 - Critical (9.2)

bleon-ethical/api-gateway-deploy provides API gateway deployment. Version 1.0.0 is vulnerable to an attack chain involving OS Command Injection and Privilege Escalation. This allows an attacker to execute arbitrary commands with root privileges wi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2038
(9.8 CRITICAL)

EPSS: 0.42%

updated 2026-02-24T21:43:04.817000

2 posts

GFI Archiver MArc.Core Missing Authorization Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of GFI Archiver. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the MArc.Core.Remoting.exe process, which listens on port 8017. The issue results from the

thehackerwire@mastodon.social at 2026-02-24T22:02:17.000Z ##

🔴 CVE-2026-2038 - Critical (9.8)

GFI Archiver MArc.Core Missing Authorization Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of GFI Archiver. Authentication is not required to exploit this vulnera...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T22:02:17.000Z ##

🔴 CVE-2026-2038 - Critical (9.8)

GFI Archiver MArc.Core Missing Authorization Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of GFI Archiver. Authentication is not required to exploit this vulnera...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2039
(9.8 CRITICAL)

EPSS: 0.42%

updated 2026-02-24T21:42:14.183000

2 posts

GFI Archiver MArc.Store Missing Authorization Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of GFI Archiver. Authentication is not required to exploit this vulnerability. The specific flaw exists within the configuration of the MArc.Store.Remoting.exe process, which listens on port 8018. The issue results from th

thehackerwire@mastodon.social at 2026-02-24T22:02:26.000Z ##

🔴 CVE-2026-2039 - Critical (9.8)

GFI Archiver MArc.Store Missing Authorization Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of GFI Archiver. Authentication is not required to exploit this vulner...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T22:02:26.000Z ##

🔴 CVE-2026-2039 - Critical (9.8)

GFI Archiver MArc.Store Missing Authorization Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of GFI Archiver. Authentication is not required to exploit this vulner...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2037
(8.8 HIGH)

EPSS: 0.79%

updated 2026-02-24T21:41:45.897000

1 posts

GFI Archiver MArc.Core Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the configuration of the MArc.Core.Remo

thehackerwire@mastodon.social at 2026-02-21T00:03:01.000Z ##

🟠 CVE-2026-2037 - High (8.8)

GFI Archiver MArc.Core Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2045
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-24T21:41:19.147000

1 posts

GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XWD files. The issue results from the

thehackerwire@mastodon.social at 2026-02-21T00:02:00.000Z ##

🟠 CVE-2026-2045 - High (7.8)

GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3044
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-24T21:39:12.990000

3 posts

A vulnerability has been found in Tenda AC8 16.03.34.06. This affects the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component Httpd Service. The manipulation of the argument boundary leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

offseq at 2026-02-24T10:30:31.008Z ##

🚨 CVE-2026-3044: HIGH severity stack buffer overflow in Tenda AC8 (16.03.34.06) — remote exploit published! Restrict /cgi-bin/UploadCfg, monitor traffic, and disable remote mgmt. Await patches or consider device replacement. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-24T10:30:31.000Z ##

🚨 CVE-2026-3044: HIGH severity stack buffer overflow in Tenda AC8 (16.03.34.06) — remote exploit published! Restrict /cgi-bin/UploadCfg, monitor traffic, and disable remote mgmt. Await patches or consider device replacement. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Tenda

##

thehackerwire@mastodon.social at 2026-02-24T00:17:14.000Z ##

🟠 CVE-2026-3044 - High (8.8)

A vulnerability has been found in Tenda AC8 16.03.34.06. This affects the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component Httpd Service. The manipulation of the argument boundary leads to stack-based buffer overflow. I...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25108
(8.8 HIGH)

EPSS: 0.33%

updated 2026-02-24T21:38:18.607000

6 posts

FileZen contains an OS command injection vulnerability. When FileZen Antivirus Check Option is enabled, a logged-in user may send a specially crafted HTTP request to execute an arbitrary OS command.

secdb at 2026-02-24T22:00:18.502Z ##

🚨 [CISA-2026:0224] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-25108 (secdb.nttzen.cloud/cve/detail/)
- Name: Soliton Systems K.K FileZen OS Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Soliton Systems K.K
- Product: FileZen
- Notes: jvn.jp/en/jp/JVN84622767/ ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-02-24T19:00:52.000Z ##

CVE ID: CVE-2026-25108
Vendor: Soliton Systems K.K
Product: FileZen
Date Added: 2026-02-24
Notes: jvn.jp/en/jp/JVN84622767/ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL at 2026-02-24T18:20:53.042Z ##

CISA has updated the KEV catalogue.

- CVE-2026-25108: Soliton Systems K.K FileZen OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- Three industrial advisories: cisa.gov/

##

secdb@infosec.exchange at 2026-02-24T22:00:18.000Z ##

🚨 [CISA-2026:0224] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-25108 (secdb.nttzen.cloud/cve/detail/)
- Name: Soliton Systems K.K FileZen OS Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Soliton Systems K.K
- Product: FileZen
- Notes: jvn.jp/en/jp/JVN84622767/ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260224 #cisa20260224 #cve_2026_25108 #cve202625108

##

cisakevtracker@mastodon.social at 2026-02-24T19:00:52.000Z ##

CVE ID: CVE-2026-25108
Vendor: Soliton Systems K.K
Product: FileZen
Date Added: 2026-02-24
Notes: jvn.jp/en/jp/JVN84622767/ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-02-24T18:20:53.000Z ##

CISA has updated the KEV catalogue.

- CVE-2026-25108: Soliton Systems K.K FileZen OS Command Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

- Three industrial advisories: cisa.gov/ #CISA #infosec #vulnerability

##

CVE-2026-22765
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-24T21:31:50

2 posts

Dell Wyse Management Suite, versions prior to WMS 5.5, contain a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of Privileges.

thehackerwire@mastodon.social at 2026-02-24T20:28:32.000Z ##

🟠 CVE-2026-22765 - High (8.8)

Dell Wyse Management Suite, versions prior to WMS 5.5, contain a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of Privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T20:28:32.000Z ##

🟠 CVE-2026-22765 - High (8.8)

Dell Wyse Management Suite, versions prior to WMS 5.5, contain a Missing Authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of Privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33181
(7.3 HIGH)

EPSS: 0.00%

updated 2026-02-24T21:31:50

2 posts

NVIDIA Cumulus Linux and NVOS products contain a vulnerability in the NVUE interface, where a low-privileged user could inject a command. A successful exploit of this vulnerability might lead to escalation of privileges.

AAKL at 2026-02-24T17:04:48.489Z ##

Two advisories from AMD, one new, one updated:

-  CVE-2025-0037: Versal Adaptive SoC –Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

- CVE-2023-31364: Guest Initiated Machine Check Errors amd.com/en/resources/product-s

Two new ones from NVIDIA:

- CVE-2025-33179, CVE-2025-33180, and CVE-2025-33181: NVIDIA Cumulus Linux and NVOS - February 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24241: NVIDIA License System - February 2026 nvidia.custhelp.com/app/answer

##

AAKL@infosec.exchange at 2026-02-24T17:04:48.000Z ##

Two advisories from AMD, one new, one updated:

-  CVE-2025-0037: Versal Adaptive SoC –Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

- CVE-2023-31364: Guest Initiated Machine Check Errors amd.com/en/resources/product-s

Two new ones from NVIDIA:

- CVE-2025-33179, CVE-2025-33180, and CVE-2025-33181: NVIDIA Cumulus Linux and NVOS - February 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24241: NVIDIA License System - February 2026 nvidia.custhelp.com/app/answer #Nvidia #infosec #AMD #vulnerability #Linux

##

CVE-2026-2798
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-24T21:31:46

2 posts

Use-after-free in the DOM: Core & HTML component. This vulnerability affects Firefox < 148.

thehackerwire@mastodon.social at 2026-02-24T20:10:22.000Z ##

🟠 CVE-2026-2798 - High (8.8)

Use-after-free in the DOM: Core & HTML component. This vulnerability affects Firefox &lt; 148 and Thunderbird &lt; 148.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T20:10:22.000Z ##

🟠 CVE-2026-2798 - High (8.8)

Use-after-free in the DOM: Core & HTML component. This vulnerability affects Firefox &lt; 148 and Thunderbird &lt; 148.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26746
(8.8 HIGH)

EPSS: 0.21%

updated 2026-02-24T20:42:28.327000

1 posts

OpenSourcePOS 3.4.1 contains a Local File Inclusion (LFI) vulnerability in the Sales.php::getInvoice() function. An attacker can read arbitrary files on the web server by manipulating the Invoice Type configuration. This issue can be chained with the file upload functionality to achieve Remote Code Execution (RCE).

1 repos

https://github.com/hungnqdz/CVE-2026-26746

thehackerwire@mastodon.social at 2026-02-23T22:00:37.000Z ##

🟠 CVE-2026-26746 - High (8.8)

OpenSourcePOS 3.4.1 contains a Local File Inclusion (LFI) vulnerability in the Sales.php::getInvoice() function. An attacker can read arbitrary files on the web server by manipulating the Invoice Type configuration. This issue can be chained with ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70329
(8.0 HIGH)

EPSS: 0.43%

updated 2026-02-24T20:38:09.483000

1 posts

TOTOLink X5000R v9.1.0cu_2415_B20250515 contains an OS command injection vulnerability in the setIptvCfg handler of the /usr/sbin/lighttpd executable. The vlanVidLan1 (and other vlanVidLanX) parameters are retrieved via Uci_Get_Str and passed to the CsteSystem function without adequate validation or filtering. This allows an authenticated attacker to execute arbitrary shell commands with root priv

thehackerwire@mastodon.social at 2026-02-23T20:30:42.000Z ##

🟠 CVE-2025-70329 - High (8)

TOTOLink X5000R v9.1.0cu_2415_B20250515 contains an OS command injection vulnerability in the setIptvCfg handler of the /usr/sbin/lighttpd executable. The vlanVidLan1 (and other vlanVidLanX) parameters are retrieved via Uci_Get_Str and passed to t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27483
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-24T20:07:59

2 posts

### Summary There is a path traversal vulnerability in Mindsdb's /api/files interface, which an authenticated attacker can exploit to achieve remote command execution. ### Details The vulnerability exists in the "Upload File" module, which corresponds to the API endpoint /api/files. The affected code is located at mindsdb/api/http/namespaces/file.py: ```python @ns_conf.route("/<name>") @ns_conf

thehackerwire@mastodon.social at 2026-02-24T15:57:18.000Z ##

🟠 CVE-2026-27483 - High (8.8)

MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.9.1.1, there is a path traversal vulnerability in Mindsdb's /api/files interface, which an authenticated attacker can exploit to achieve remote co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T15:57:18.000Z ##

🟠 CVE-2026-27483 - High (8.8)

MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 25.9.1.1, there is a path traversal vulnerability in Mindsdb's /api/files interface, which an authenticated attacker can exploit to achieve remote co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2980
(7.2 HIGH)

EPSS: 0.04%

updated 2026-02-24T20:04:10.060000

1 posts

A vulnerability has been found in UTT HiPER 810G up to 1.7.7-1711. Impacted is the function strcpy of the file /goform/setSysAdm. The manipulation of the argument passwd1 leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

offseq@infosec.exchange at 2026-02-23T09:00:30.000Z ##

⚠️ HIGH severity buffer overflow in UTT HiPER 810G (≤1.7.7-1711) — remote exploitation possible via passwd1 in /goform/setSysAdm. Exploit is public. Monitor devices & restrict access until patch available. CVE-2026-2980 radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Infosec

##

CVE-2026-23693
(10.0 CRITICAL)

EPSS: 0.15%

updated 2026-02-24T19:21:41.843000

3 posts

ElementsKit Elementor Addons – Advanced Widgets & Templates Addons for Elementor (elementskit-lite) WordPress plugin versions prior to 3.7.9 expose the REST endpoint /wp-json/elementskit/v1/widget/mailchimp/subscribe without authentication. The endpoint accepts client-supplied Mailchimp API credentials and insufficiently validates certain parameters, including the list parameter, when constructing

Matchbook3469@mastodon.social at 2026-02-24T11:05:46.000Z ##

🔴 New security advisory:

CVE-2026-23693 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #VulnerabilityManagement #CyberSec

##

offseq@infosec.exchange at 2026-02-24T01:30:31.000Z ##

⚠️ CVE-2026-23693 (CRITICAL, CVSS 9.3) in ElementsKit Lite <3.7.9 exposes a Mailchimp REST endpoint to unauth’d abuse — risking API quota exhaustion & data manipulation. Patch ASAP & block /wp-json/elementskit/v1/widget/mailchimp/subscribe. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

thehackerwire@mastodon.social at 2026-02-23T21:21:38.000Z ##

🔴 CVE-2026-23693 - Critical (10)

ElementsKit Lite (elementskit-lite) WordPress plugin versions prior to 3.7.9 expose the REST endpoint /wp-json/elementskit/v1/widget/mailchimp/subscribe without authentication. The endpoint accepts client-supplied Mailchimp API credentials and ins...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25989
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-24T18:43:16.560000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file can cause a denial of service. An off-by-one boundary check (`>` instead of `>=`) that allows bypass the guard and reach an undefined `(size_t)` cast. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

thehackerwire@mastodon.social at 2026-02-24T04:00:50.000Z ##

🟠 CVE-2026-25989 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file can cause a denial of service. An off-by-one boundary check (`>` instead of `>=`) that allo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15386
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-24T18:32:04

2 posts

The Responsive Lightbox & Gallery WordPress plugin before 2.6.1 is vulnerable to an Unauthenticated Stored-XSS attack due to flawed regex replacement rules that can be abused by posting a comment with a malicious link when lightbox for comments are enabled and then approved.

thehackerwire@mastodon.social at 2026-02-24T17:41:10.000Z ##

🟠 CVE-2025-15386 - High (8.8)

The Responsive Lightbox & Gallery WordPress plugin before 2.6.1 is vulnerable to an Unauthenticated Stored-XSS attack due to flawed regex replacement rules that can be abused by posting a comment with a malicious link when lightbox for comments ar...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T17:41:10.000Z ##

🟠 CVE-2025-15386 - High (8.8)

The Responsive Lightbox & Gallery WordPress plugin before 2.6.1 is vulnerable to an Unauthenticated Stored-XSS attack due to flawed regex replacement rules that can be abused by posting a comment with a malicious link when lightbox for comments ar...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27515
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-02-24T18:31:09

2 posts

Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 generate predictable numeric session identifiers in the web management interface. An attacker can guess valid session IDs and hijack authenticated sessions.

thehackerwire@mastodon.social at 2026-02-24T16:37:43.000Z ##

🔴 CVE-2026-27515 - Critical (9.1)

Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 generate predictable numeric session identifiers in the web management interface. An attacker can guess valid session IDs and hijack authenticated sessions.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T16:37:43.000Z ##

🔴 CVE-2026-27515 - Critical (9.1)

Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 generate predictable numeric session identifiers in the web management interface. An attacker can guess valid session IDs and hijack authenticated sessions.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23678
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-24T18:31:09

2 posts

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain a command injection vulnerability in the traceroute diagnostic function of the affected device web management interface. By injecting the %1a character into the hostname parameter, an authenticated attacker with access to the web interface can execute arbitrary CLI commands on the device.

thehackerwire@mastodon.social at 2026-02-24T16:37:23.000Z ##

🟠 CVE-2026-23678 - High (8.8)

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain a command injection vulnerability in the traceroute diagnostic function of the affected device web management interface. By injecting the character into the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T16:37:23.000Z ##

🟠 CVE-2026-23678 - High (8.8)

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain a command injection vulnerability in the traceroute diagnostic function of the affected device web management interface. By injecting the character into the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27520
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-24T18:31:09

2 posts

Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 store a user password in a client-side cookie as a Base64-encoded value accessible via the web interface. Because Base64 is reversible and provides no confidentiality, an attacker who can access the cookie value can recover the plaintext password.

thehackerwire@mastodon.social at 2026-02-24T16:32:02.000Z ##

🟠 CVE-2026-27520 - High (7.5)

Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 store a user password in a client-side cookie as a Base64-encoded value accessible via the web interface. Because Base64 is reversible and provides no confidentialit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T16:32:02.000Z ##

🟠 CVE-2026-27520 - High (7.5)

Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 store a user password in a client-side cookie as a Base64-encoded value accessible via the web interface. Because Base64 is reversible and provides no confidentialit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27507
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-24T18:31:08

2 posts

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain hard-coded administrative credentials that cannot be changed by users. Knowledge of these credentials allows full administrative access to the device.

1 repos

https://github.com/RootAid/CVE-2026-27507

thehackerwire@mastodon.social at 2026-02-24T16:37:33.000Z ##

🔴 CVE-2026-27507 - Critical (9.8)

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain hard-coded administrative credentials that cannot be changed by users. Knowledge of these credentials allows full administrative access to the device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T16:37:33.000Z ##

🔴 CVE-2026-27507 - Critical (9.8)

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain hard-coded administrative credentials that cannot be changed by users. Knowledge of these credentials allows full administrative access to the device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27516
(8.1 HIGH)

EPSS: 0.00%

updated 2026-02-24T18:31:08

2 posts

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior expose user passwords in plaintext within the administrative interface and HTTP responses, allowing recovery of valid credentials.

thehackerwire@mastodon.social at 2026-02-24T16:31:39.000Z ##

🟠 CVE-2026-27516 - High (8.1)

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior expose user passwords in plaintext within the administrative interface and HTTP responses, allowing recovery of valid credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T16:31:39.000Z ##

🟠 CVE-2026-27516 - High (8.1)

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior expose user passwords in plaintext within the administrative interface and HTTP responses, allowing recovery of valid credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2904
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-24T18:31:01

2 posts

A vulnerability was determined in UTT HiPER 810G 1.7.7-171114. This affects the function strcpy of the file /goform/ConfigExceptAli. Executing a manipulation can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

offseq@infosec.exchange at 2026-02-22T01:30:28.000Z ##

⚠️ CVE-2026-2904 (HIGH): Buffer overflow in UTT HiPER 810G v1.7.7-171114 via /goform/ConfigExceptAli. Remote, unauthenticated RCE/DoS risk. Public exploit code available — restrict access & monitor. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #NetworkSecurity

##

thehackerwire@mastodon.social at 2026-02-22T01:20:04.000Z ##

🟠 CVE-2026-2904 - High (8.8)

A vulnerability was determined in UTT HiPER 810G 1.7.7-171114. This affects the function strcpy of the file /goform/ConfigExceptAli. Executing a manipulation can lead to buffer overflow. The attack can be launched remotely. The exploit has been pu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40541
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-02-24T17:56:16.030000

1 posts

An Insecure Direct Object Reference (IDOR) vulnerability exists in Serv-U, which when exploited, gives a malicious actor the ability to execute native code as a privileged account. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.

thehackerwire@mastodon.social at 2026-02-24T08:19:21.000Z ##

🔴 CVE-2025-40541 - Critical (9.1)

An Insecure Direct Object Reference (IDOR) vulnerability exists in Serv-U, which when exploited, gives a malicious actor the ability to execute native code as a privileged account.

This issue requires administrative privileges to abuse. On Window...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25794
(8.2 HIGH)

EPSS: 0.04%

updated 2026-02-24T17:28:54.433000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. `WriteUHDRImage` in `coders/uhdr.c` uses `int` arithmetic to compute the pixel buffer size. Prior to version 7.1.2-15, when image dimensions are large, the multiplication overflows 32-bit `int`, causing an undersized heap allocation followed by an out-of-bounds write. This can crash the process or potent

thehackerwire@mastodon.social at 2026-02-24T01:35:57.000Z ##

🟠 CVE-2026-25794 - High (8.2)

ImageMagick is free and open-source software used for editing and manipulating digital images. `WriteUHDRImage` in `coders/uhdr.c` uses `int` arithmetic to compute the pixel buffer size. Prior to version 7.1.2-15, when image dimensions are large, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27211
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-02-24T17:08:14.463000

2 posts

Cloud Hypervisor is a Virtual Machine Monitor for Cloud workloads. Versions 34.0 through 50.0 arevulnerable to arbitrary host file exfiltration (constrained by process privileges) when using virtio-block devices backed by raw images. A malicious guest can overwrite its disk header with a crafted QCOW2 structure pointing to a sensitive host path. Upon the next VM boot or disk scan, the image format

1 repos

https://github.com/glitchhawks/CVE-2026-27211

thehackerwire@mastodon.social at 2026-02-24T17:41:21.000Z ##

🔴 CVE-2026-27211 - Critical (10)

Cloud Hypervisor is a Virtual Machine Monitor for Cloud workloads. Versions 34.0 through 50.0 arevulnerable to arbitrary host file exfiltration (constrained by process privileges) when using virtio-block devices backed by raw images. A malicious g...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T17:41:21.000Z ##

🔴 CVE-2026-27211 - Critical (10)

Cloud Hypervisor is a Virtual Machine Monitor for Cloud workloads. Versions 34.0 through 50.0 arevulnerable to arbitrary host file exfiltration (constrained by process privileges) when using virtio-block devices backed by raw images. A malicious g...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25802
(7.6 HIGH)

EPSS: 0.03%

updated 2026-02-24T16:08:21

2 posts

### Summary A potential unsafe operation occurs in component `MarkdownRenderer.jsx`, allowing for Cross-Site Scripting(XSS) when the model outputs items containing `<script>` tag. ### Details Line 212-231 of `MarkdownRenderer.jsx` is unsafe, it use dangerouslySetInnerHTML to preview html the model generates. This can trigger malcious scripts. ### PoC A simple way to exploit that is to ask the

offseq@infosec.exchange at 2026-02-24T03:00:29.000Z ##

🛡️ HIGH-severity XSS (CVE-2026-25802) in QuantumNous new-api (<0.10.8-alpha.9): Unsafe MarkdownRenderer.jsx allows script injection with user interaction. Upgrade ASAP & implement CSP! radar.offseq.com/threat/cve-20 #OffSeq #XSS #InfoSec #AIsecurity

##

thehackerwire@mastodon.social at 2026-02-24T01:19:11.000Z ##

🟠 CVE-2026-25802 - High (7.6)

New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.10.8-alpha.9, a potential unsafe operation occurs in component `MarkdownRenderer.jsx`, allowing for Cross-Site Scripting(XS...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25591(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-02-24T16:08:14

2 posts

### Summary A SQL LIKE wildcard injection vulnerability in the `/api/token/search` endpoint allows authenticated users to cause Denial of Service through resource exhaustion by crafting malicious search patterns. ### Details The token search endpoint accepts user-supplied `keyword` and `token` parameters that are directly concatenated into SQL LIKE clauses without escaping wildcard characters (`%

offseq at 2026-02-24T09:00:28.169Z ##

🚨 CVE-2026-25591 (HIGH): QuantumNous new-api <0.10.8-alpha.10 vulnerable to SQL LIKE wildcard injection in /api/token/search. Auth users can cause DoS via crafted search patterns. Patch ASAP! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-24T09:00:28.000Z ##

🚨 CVE-2026-25591 (HIGH): QuantumNous new-api <0.10.8-alpha.10 vulnerable to SQL LIKE wildcard injection in /api/token/search. Auth users can cause DoS via crafted search patterns. Patch ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #SQLInjection #Vulnerability

##

CVE-2026-27574
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-02-24T16:00:57

1 posts

### Summary OneUptime lets project members write custom JavaScript that runs inside monitors. The problem is it executes that code using Node.js's built-in `vm` module, which Node.js itself documents as "not a security mechanism — do not use it to run untrusted code." The classic one-liner escape gives full access to the underlying process, and since the probe runs with host networking and holds

1 repos

https://github.com/mbanyamer/CVE-2026-27574-OneUptime-RCE

thehackerwire@mastodon.social at 2026-02-21T11:18:41.000Z ##

🔴 CVE-2026-27574 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's node:vm module (explicitly documented as not a security mechanism) to execute user-supplied code, a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25985
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-24T15:44:21

1 posts

A crafted SVG file containing an malicious element causes ImageMagick to attempt to allocate ~674 GB of memory, leading to an out-of-memory abort. Found via AFL++ fuzzing with afl-clang-lto instrumentation and AddressSanitizer.

thehackerwire@mastodon.social at 2026-02-24T02:17:50.000Z ##

🟠 CVE-2026-25985 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file containing an malicious element causes ImageMagick to attempt to allocate ~674 GB of memory...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24481
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-24T15:27:31

1 posts

### Description A heap information disclosure vulnerability exists in ImageMagick's PSD (Adobe Photoshop) format handler. When processing a maliciously crafted PSD file containing ZIP-compressed layer data that decompresses to less than the expected size, uninitialized heap memory is leaked into the output image. ### Expected Impact Information disclosure leading to potential exposure of sensitiv

thehackerwire@mastodon.social at 2026-02-24T01:36:07.000Z ##

🟠 CVE-2026-24481 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap information disclosure vulnerability exists in ImageMagick's PSD (Adobe Photoshop) format handler. When...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27212
(7.8 HIGH)

EPSS: 0.03%

updated 2026-02-24T15:16:56.670000

3 posts

Swiper is a free and mobile touch slider with hardware accelerated transitions and native behavior. Versions 6.5.1 through 12.1.1 have a Prototype pollution vulnerability. The vulnerability resides in line 94 of shared/utils.mjs, where the indexOf() function is used to check whether user provided input contain forbidden strings. Despite a previous fix that attempted to mitigate prototype pollution

thehackerwire@mastodon.social at 2026-02-24T16:06:57.000Z ##

🟠 CVE-2026-27212 - High (7.8)

Swiper is a free and mobile touch slider with hardware accelerated transitions and native behavior. Versions 6.5.1 through 12.1.1 have a Prototype pollution vulnerability. The vulnerability resides in line 94 of shared/utils.mjs, where the indexOf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T16:06:57.000Z ##

🟠 CVE-2026-27212 - High (7.8)

Swiper is a free and mobile touch slider with hardware accelerated transitions and native behavior. Versions 6.5.1 through 12.1.1 have a Prototype pollution vulnerability. The vulnerability resides in line 94 of shared/utils.mjs, where the indexOf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-21T10:30:30.000Z ##

🚨 CRITICAL: CVE-2026-27212 in nolimits4web swiper (6.5.1 – 12.1.1) enables prototype pollution, risking auth bypass, DoS, & RCE. Affects Node & Bun, Windows & Linux. Upgrade to 12.1.2 now! radar.offseq.com/threat/cve-20 #OffSeq #CVE202627212 #AppSec #JavaScript

##

CVE-2026-27471
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-02-24T14:52:50.073000

3 posts

ERP is a free and open source Enterprise Resource Planning tool. In versions up to 15.98.0 and 16.0.0-rc.1 and through 16.6.0, certain endpoints lacked access validation which allowed for unauthorized document access. This issue has been fixed in versions 15.98.1 and 16.6.1.

thehackerwire@mastodon.social at 2026-02-24T16:06:47.000Z ##

🔴 CVE-2026-27471 - Critical (9.1)

ERP is a free and open source Enterprise Resource Planning tool. In versions up to 15.98.0 and 16.0.0-rc.1 and through 16.6.0, certain endpoints lacked access validation which allowed for unauthorized document access. This issue has been fixed in ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T16:06:47.000Z ##

🔴 CVE-2026-27471 - Critical (9.1)

ERP is a free and open source Enterprise Resource Planning tool. In versions up to 15.98.0 and 16.0.0-rc.1 and through 16.6.0, certain endpoints lacked access validation which allowed for unauthorized document access. This issue has been fixed in ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-21T09:00:27.000Z ##

🚨 CRITICAL: CVE-2026-27471 in ERPNext (≤15.98.0, 16.0.0-rc.1 – 16.6.0) lets unauth attackers access sensitive docs via missing API auth. Upgrade to 15.98.1/16.6.1+ & restrict access now. radar.offseq.com/threat/cve-20 #OffSeq #ERPNext #CVE202627471 #Infosec

##

CVE-2026-27479
(7.7 HIGH)

EPSS: 0.03%

updated 2026-02-24T14:47:06.290000

1 posts

Wallos is an open-source, self-hostable personal subscription tracker. Versions 4.6.0 and below contain a Server-Side Request Forgery (SSRF) vulnerability in the subscription and payment logo/icon upload functionality. The application validates the IP address of the provided URL before making the request, but allows HTTP redirects (CURLOPT_FOLLOWLOCATION = true), enabling an attacker to bypass the

thehackerwire@mastodon.social at 2026-02-21T09:16:50.000Z ##

🟠 CVE-2026-27479 - High (7.7)

Wallos is an open-source, self-hostable personal subscription tracker. Versions 4.6.0 and below contain a Server-Side Request Forgery (SSRF) vulnerability in the subscription and payment logo/icon upload functionality. The application validates th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27127
(0 None)

EPSS: 0.01%

updated 2026-02-24T14:13:49.320000

1 posts

Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22, the SSRF validation in Craft CMS’s GraphQL Asset mutation performs DNS resolution separately from the HTTP request. This Time-of-Check-Time-of-Use (TOCTOU) vulnerability enables DNS rebinding attacks, where an attacker’s DNS server returns different IP addresses for validation compared t

offseq@infosec.exchange at 2026-02-24T07:30:32.000Z ##

🔍 HIGH severity: CVE-2026-27127 in Craft CMS (4.5.0-RC1 – 4.16.18, 5.0.0-RC1 – 5.8.22) enables DNS rebinding via TOCTOU in GraphQL Asset mutation. Patch to 4.16.19/5.8.23+ & review GraphQL permissions. radar.offseq.com/threat/cve-20 #OffSeq #CraftCMS #SSRF #Vuln

##

CVE-2026-26198
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-24T14:13:49.320000

2 posts

Ormar is a async mini ORM for Python. In versions 0.9.9 through 0.22.0, when performing aggregate queries, Ormar ORM constructs SQL expressions by passing user-supplied column names directly into `sqlalchemy.text()` without any validation or sanitization. The `min()` and `max()` methods in the `QuerySet` class accept arbitrary string input as the column parameter. While `sum()` and `avg()` are par

1 repos

https://github.com/blackhatlegend/CVE-2026-26198

offseq@infosec.exchange at 2026-02-24T04:30:28.000Z ##

🛡️ CVE-2026-26198: CRITICAL SQLi in Ormar Python ORM (0.9.9 – 0.22.0). min() & max() allow injection — no auth needed! Patch with v0.23.0+. Audit & monitor now. Details: radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Python

##

thehackerwire@mastodon.social at 2026-02-24T04:00:03.000Z ##

🔴 CVE-2026-26198 - Critical (9.8)

Ormar is a async mini ORM for Python. In versions 0.9.9 through 0.22.0, when performing aggregate queries, Ormar ORM constructs SQL expressions by passing user-supplied column names directly into `sqlalchemy.text()` without any validation or sanit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13943
(8.8 HIGH)

EPSS: 0.32%

updated 2026-02-24T14:13:49.320000

2 posts

A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7)C0 could allow an authenticated attacker to execute operating system (OS) commands on an affected device.

thehackerwire@mastodon.social at 2026-02-24T04:09:35.000Z ##

🟠 CVE-2025-13943 - High (8.8)

A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7)C0 could allow an authenticated attacker to execute operating system (OS) commands on an affected...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T04:00:46.000Z ##

🟠 CVE-2025-13943 - High (8.8)

A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7)C0 could allow an authenticated attacker to execute operating system (OS) commands on an affected...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26331
(8.8 HIGH)

EPSS: 0.12%

updated 2026-02-24T14:13:49.320000

1 posts

yt-dlp is a command-line audio/video downloader. Starting in version 2023.06.21 and prior to version 2026.02.21, when yt-dlp's `--netrc-cmd` command-line option (or `netrc_cmd` Python API parameter) is used, an attacker could achieve arbitrary command injection on the user's system with a maliciously crafted URL. yt-dlp maintainers assume the impact of this vulnerability to be high for anyone who

1 repos

https://github.com/dxlerYT/CVE-2026-26331

thehackerwire@mastodon.social at 2026-02-24T04:00:13.000Z ##

🟠 CVE-2026-26331 - High (8.8)

yt-dlp is a command-line audio/video downloader. Starting in version 2023.06.21 and prior to version 2026.02.21, when yt-dlp's `--netrc-cmd` command-line option (or `netrc_cmd` Python API parameter) is used, an attacker could achieve arbitrary com...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25965
(8.6 HIGH)

EPSS: 0.03%

updated 2026-02-24T14:13:49.320000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick’s path security policy is enforced on the raw filename string before the filesystem resolves it. As a result, a policy rule such as /etc/* can be bypassed by a path traversal. The OS resolves the traversal and opens the sensitive file, but the policy

thehackerwire@mastodon.social at 2026-02-24T02:17:59.000Z ##

🟠 CVE-2026-25965 - High (8.6)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick’s path security policy is enforced on the raw filename string before the filesystem resolves it....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24485
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-24T14:13:49.320000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, when a PCD file does not contain a valid Sync marker, the DecodeImage() function becomes trapped in an infinite loop while searching for the Sync marker, causing the program to become unresponsive and continuously consume CPU resources, ultimately leading to syst

thehackerwire@mastodon.social at 2026-02-24T01:36:16.000Z ##

🟠 CVE-2026-24485 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, when a PCD file does not contain a valid Sync marker, the DecodeImage() function becomes trapped in an infinit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25648
(8.7 HIGH)

EPSS: 0.03%

updated 2026-02-24T14:13:49.320000

1 posts

Versions of the Traccar open-source GPS tracking system starting with 6.11.1 contain an issue in which authenticated users can execute arbitrary JavaScript in the context of other users' browsers by uploading malicious SVG files as device images. The application accepts SVG file uploads without sanitization and serves them with the `image/svg+xml` Content-Type, allowing embedded JavaScript to exec

thehackerwire@mastodon.social at 2026-02-23T21:21:49.000Z ##

🟠 CVE-2026-25648 - High (8.7)

Versions of the Traccar open-source GPS tracking system starting with 6.11.1 contain an issue in which authenticated users can execute arbitrary JavaScript in the context of other users' browsers by uploading malicious SVG files as device images. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21863
(7.5 HIGH)

EPSS: 0.01%

updated 2026-02-24T14:13:49.320000

2 posts

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extension packet is located within buffer of the cluste

thehackerwire@mastodon.social at 2026-02-23T20:32:44.000Z ##

🟠 CVE-2026-21863 - High (7.5)

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the syste...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:30:46.000Z ##

🟠 CVE-2026-21863 - High (7.5)

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the syste...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2041
(8.8 HIGH)

EPSS: 1.25%

updated 2026-02-24T13:18:09.610000

3 posts

Nagios Host zabbixagent_configwizard_func Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Nagios Host. Authentication is required to exploit this vulnerability. The specific flaw exists within the zabbixagent_configwizard_func method. The issue results from the lack of proper validation of a u

thehackerwire@mastodon.social at 2026-02-24T18:13:28.000Z ##

🟠 CVE-2026-2041 - High (8.8)

Nagios Host zabbixagent_configwizard_func Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Nagios Host. Authentication is required to exploit t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T18:13:28.000Z ##

🟠 CVE-2026-2041 - High (8.8)

Nagios Host zabbixagent_configwizard_func Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Nagios Host. Authentication is required to exploit t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-27161
(7.5 HIGH)

EPSS: 0.07%

updated 2026-02-24T13:10:07.530000

2 posts

GetSimple CMS is a content management system. All versions of GetSimple CMS rely on .htaccess files to restrict access to sensitive directories such as /data/ and /backups/. If Apache AllowOverride is disabled (common in hardened or shared hosting environments), these protections are silently ignored, allowing unauthenticated attackers to list and download sensitive files including authorization.x

thehackerwire@mastodon.social at 2026-02-24T17:41:31.000Z ##

🟠 CVE-2026-27161 - High (7.5)

GetSimple CMS is a content management system. All versions of GetSimple CMS rely on .htaccess files to restrict access to sensitive directories such as /data/ and /backups/. If Apache AllowOverride is disabled (common in hardened or shared hosting...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T17:41:31.000Z ##

🟠 CVE-2026-27161 - High (7.5)

GetSimple CMS is a content management system. All versions of GetSimple CMS rely on .htaccess files to restrict access to sensitive directories such as /data/ and /backups/. If Apache AllowOverride is disabled (common in hardened or shared hosting...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40538
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-02-24T09:31:31

4 posts

A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via domain admin or group admin privileges. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privile

jbhall56 at 2026-02-24T13:30:54.214Z ##

The most severe of the four security flaws patched by SolarWinds today in Serv-U 15.5.4 is tracked as CVE-2025-40538, and it allows attackers with high privileges to gain root or admin permissions on vulnerable servers. bleepingcomputer.com/news/secu

##

thehackerwire@mastodon.social at 2026-02-24T08:19:32.000Z ##

🔴 CVE-2025-40538 - Critical (9.1)

A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via domain admin or group admin privileges.

This iss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

jbhall56@infosec.exchange at 2026-02-24T13:30:54.000Z ##

The most severe of the four security flaws patched by SolarWinds today in Serv-U 15.5.4 is tracked as CVE-2025-40538, and it allows attackers with high privileges to gain root or admin permissions on vulnerable servers. bleepingcomputer.com/news/secu

##

thehackerwire@mastodon.social at 2026-02-24T08:19:32.000Z ##

🔴 CVE-2025-40538 - Critical (9.1)

A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via domain admin or group admin privileges.

This iss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40539
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-02-24T09:31:31

2 posts

A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.

thehackerwire@mastodon.social at 2026-02-24T08:20:11.000Z ##

🔴 CVE-2025-40539 - Critical (9.1)

A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account.

This issue requires administrative privileges to abuse. On Windows deployments, the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T08:20:11.000Z ##

🔴 CVE-2025-40539 - Critical (9.1)

A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account.

This issue requires administrative privileges to abuse. On Windows deployments, the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40540
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-02-24T09:31:31

1 posts

A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.

thehackerwire@mastodon.social at 2026-02-24T08:19:11.000Z ##

🔴 CVE-2025-40540 - Critical (9.1)

A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account.

This issue requires administrative privileges to abuse. On Windows deployments, the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1459
(7.2 HIGH)

EPSS: 0.10%

updated 2026-02-24T03:30:30

1 posts

A post-authentication command injection vulnerability in the TR-369 certificate download CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.7)C0 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on an affected device.

offseq@infosec.exchange at 2026-02-24T06:00:31.000Z ##

⚠️ CVE-2026-1459: HIGH-severity OS command injection in Zyxel VMG3625-T50B firmware ≤5.50(ABPM.9.7)C0. Authenticated admin can run arbitrary commands. Restrict admin access & monitor. Patch ASAP when released! radar.offseq.com/threat/cve-20 #OffSeq #Zyxel #CVE20261459 #InfoSec

##

CVE-2025-13942
(9.8 CRITICAL)

EPSS: 0.39%

updated 2026-02-24T03:30:27

1 posts

A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UPnP SOAP requests.

thehackerwire@mastodon.social at 2026-02-24T04:00:41.000Z ##

🔴 CVE-2025-13942 - Critical (9.8)

A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UP...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27487
(7.6 HIGH)

EPSS: 0.05%

updated 2026-02-23T22:28:28

1 posts

## Summary On macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via `security add-generic-password -w ...`. Because OAuth tokens are user-controlled data, this created an OS command injection risk. The fix avoids invoking a shell by using `execFileSync("security", argv)` and passing the updated keychain payload as a lit

thehackerwire@mastodon.social at 2026-02-21T10:19:44.000Z ##

🟠 CVE-2026-27487 - High (7.6)

OpenClaw is a personal AI assistant. In versions 2026.2.13 and below, when using macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via security add-generic-password -w ....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27198
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T22:27:31

1 posts

### Summary The application fails to properly enforce role-based authorization during account creation. Although the system validates that the specified role exists, it does not verify whether the current user has sufficient privileges to assign highly privileged roles such as admin. As a result, an authenticated user with the editor role can create a new account with administrative privileges, l

thehackerwire@mastodon.social at 2026-02-21T06:18:30.000Z ##

🟠 CVE-2026-27198 - High (8.8)

Formwork is a flat file-based Content Management System (CMS). In versions 2.0.0 through 2.3.3, the application fails to properly enforce role-based authorization during account creation. Although the system validates that the specified role exist...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27196
(8.1 HIGH)

EPSS: 0.02%

updated 2026-02-23T22:26:22

1 posts

## Impact Stored XSS vulnerability in `html` fieldtypes allow authenticated users with field management permissions to inject malicious JavaScript that executes when viewed by higher-privileged users. ## Patches This has been fixed in 6.3.2 and 5.73.9.

thehackerwire@mastodon.social at 2026-02-21T05:21:36.000Z ##

🟠 CVE-2026-27196 - High (8.1)

Statmatic is a Laravel and Git powered content management system (CMS). Versions 5.73.8 and below in addition to 6.0.0-alpha.1 through 6.3.1 have a Stored XSS vulnerability in html fieldtypes which allows authenticated users with field management ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27203
(8.3 HIGH)

EPSS: 0.04%

updated 2026-02-23T22:23:46

1 posts

The `ebay_set_user_tokens` tool allows updating the `.env` file with new tokens. The `updateEnvFile` function in `src/auth/oauth.ts` blindly appends or replaces values without validating them for newlines or quotes. This allows an attacker to inject arbitrary environment variables into the configuration file. ### Impact An attacker can inject arbitrary environment variables into the `.env` file.

thehackerwire@mastodon.social at 2026-02-21T00:17:04.000Z ##

🟠 CVE-2026-27203 - High (8.3)

eBay API MCP Server is an open source local MCP server providing AI assistants with comprehensive access to eBay's Sell APIs. All versions are vulnerable to Environment Variable Injection through the updateEnvFile function. The ebay_set_user_token...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69700
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-23T21:31:30

1 posts

Tenda FH1203 V2.0.1.6 contains a stack-based buffer overflow vulnerability in the modify_add_client_prio function, which is reachable via the formSetClientPrio CGI handler.

thehackerwire@mastodon.social at 2026-02-23T20:30:52.000Z ##

🟠 CVE-2025-69700 - High (7.5)

Tenda FH1203 V2.0.1.6 contains a stack-based buffer overflow vulnerability in the modify_add_client_prio function, which is reachable via the formSetClientPrio CGI handler.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69380
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-23T21:31:28

1 posts

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in vanquish Upload Files Anywhere wp-upload-files-anywhere allows Path Traversal.This issue affects Upload Files Anywhere: from n/a through <= 2.8.

thehackerwire@mastodon.social at 2026-02-24T00:22:50.000Z ##

🟠 CVE-2025-69380 - High (7.5)

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in vanquish Upload Files Anywhere wp-upload-files-anywhere allows Path Traversal.This issue affects Upload Files Anywhere: from n/a through &lt;= 2.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26722
(9.4 CRITICAL)

EPSS: 0.10%

updated 2026-02-23T21:31:26

1 posts

An issue in Key Systems Inc Global Facilities Management Software v.20230721a allows a remote attacker to escalate privileges via PIN component of the login functionality.

thehackerwire@mastodon.social at 2026-02-23T21:59:38.000Z ##

🔴 CVE-2026-26722 - Critical (9.4)

An issue in Key Systems Inc Global Facilities Management Software v.20230721a allows a remote attacker to escalate privileges via PIN component of the login functionality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26723
(8.2 HIGH)

EPSS: 0.06%

updated 2026-02-23T21:31:25

1 posts

Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the function parameter.

thehackerwire@mastodon.social at 2026-02-23T21:05:37.000Z ##

🟠 CVE-2026-26723 - High (8.2)

Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the function parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70833
(9.4 CRITICAL)

EPSS: 0.08%

updated 2026-02-23T21:31:25

1 posts

An Authentication Bypass vulnerability in Smanga 3.2.7 allows an unauthenticated attacker to reset the password of any user (including the administrator) and fully takeover the account by manipulating POST parameters. The issue stems from insecure permission validation in check-power.php.

thehackerwire@mastodon.social at 2026-02-23T19:32:56.000Z ##

🔴 CVE-2025-70833 - Critical (9.4)

An Authentication Bypass vulnerability in Smanga 3.2.7 allows an unauthenticated attacker to reset the password of any user (including the administrator) and fully takeover the account by manipulating POST parameters. The issue stems from insecure...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26747
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-02-23T21:19:12.023000

1 posts

A Host Header Poisoning vulnerability exists in Monica 4.1.2 due to improper handling of the HTTP Host header in app/Providers/AppServiceProvider.php, combined with the default misconfiguration where the "app.force_url" is not set and default is "false". The application generates absolute URLs (such as those used in password reset emails) using the user-supplied Host header. This allows remote att

thehackerwire@mastodon.social at 2026-02-23T21:22:00.000Z ##

🔴 CVE-2026-26747 - Critical (9.1)

A Host Header Poisoning vulnerability exists in Monica 4.1.2 due to improper handling of the HTTP Host header in app/Providers/AppServiceProvider.php, combined with the default misconfiguration where the "app.force_url" is not set and default is "...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26725
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-02-23T21:19:11.473000

1 posts

An issue in edu Business Solutions Print Shop Pro WebDesk v.18.34 allows a remote attacker to escalate privileges via the AccessID parameter.

thehackerwire@mastodon.social at 2026-02-23T22:00:07.000Z ##

🔴 CVE-2026-26725 - Critical (9.8)

An issue in edu Business Solutions Print Shop Pro WebDesk v.18.34 allows a remote attacker to escalate privileges via the AccessID parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26724
(7.6 HIGH)

EPSS: 0.05%

updated 2026-02-23T21:19:11.287000

1 posts

Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the selectgroup and gn parameters on the /?Function=Groups endpoint.

thehackerwire@mastodon.social at 2026-02-23T21:59:53.000Z ##

🟠 CVE-2026-26724 - High (7.6)

Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the selectgroup and gn parameters on the /?Function=Groups endpoint.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70831
(9.8 CRITICAL)

EPSS: 0.22%

updated 2026-02-23T21:19:09.510000

1 posts

A Remote Code Execution (RCE) vulnerability was found in Smanga 3.2.7 in the /php/path/rescan.php interface. The application fails to properly sanitize user-supplied input in the mediaId parameter before using it in a system shell command. This allows an unauthenticated attacker to inject arbitrary operating system commands, leading to complete server compromise.

thehackerwire@mastodon.social at 2026-02-24T00:22:31.000Z ##

🔴 CVE-2025-70831 - Critical (9.8)

A Remote Code Execution (RCE) vulnerability was found in Smanga 3.2.7 in the /php/path/rescan.php interface. The application fails to properly sanitize user-supplied input in the mediaId parameter before using it in a system shell command. This al...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69393
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-23T21:19:08.873000

1 posts

Missing Authorization vulnerability in Jthemes Exzo exzo allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Exzo: from n/a through <= 1.2.4.

thehackerwire@mastodon.social at 2026-02-24T00:22:41.000Z ##

🟠 CVE-2025-69393 - High (7.5)

Missing Authorization vulnerability in Jthemes Exzo exzo allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Exzo: from n/a through &lt;= 1.2.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2886
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-23T21:00:35.513000

2 posts

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function set_device_name of the file /goform/SetOnlineDevName. This manipulation of the argument devName causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-02-21T21:19:05.000Z ##

🟠 CVE-2026-2886 - High (8.8)

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function set_device_name of the file /goform/SetOnlineDevName. This manipulation of the argument devName causes stack-based buffer overflow. It is possible to initiate the attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T21:18:40.000Z ##

🟠 CVE-2026-2886 - High (8.8)

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function set_device_name of the file /goform/SetOnlineDevName. This manipulation of the argument devName causes stack-based buffer overflow. It is possible to initiate the attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2871
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-23T20:59:13.240000

1 posts

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of the file /goform/SetIpMacBind. This manipulation of the argument list causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-02-21T17:00:43.000Z ##

🟠 CVE-2026-2871 - High (8.8)

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of the file /goform/SetIpMacBind. This manipulation of the argument list causes stack-based buffer overflow. The attack is possible to be carried out r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27169
(8.9 HIGH)

EPSS: 0.05%

updated 2026-02-23T20:50:36.870000

1 posts

OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Versions 1.1.2-alpha and below render untrusted user/model content in chat tool UI surfaces using unsafe HTML interpolation patterns, leading to XSS. Stored content can execute JavaScript when later viewed in authenticated sessions. An attacker who can influence stored study/quiz/flashcard conte

thehackerwire@mastodon.social at 2026-02-21T00:17:15.000Z ##

🟠 CVE-2026-27169 - High (8.9)

OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Versions 1.1.2-alpha and below render untrusted user/model content in chat tool UI surfaces using unsafe HTML interpolation patterns, leading t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27194
(9.8 CRITICAL)

EPSS: 0.29%

updated 2026-02-23T20:47:29.423000

1 posts

D-Tale is a visualizer for pandas data structures. Versions prior to 3.20.0 are vulnerable to Remote Code Execution through the /save-column-filter endpoint. Users hosting D-Tale publicly can be vulnerable to remote code execution allowing attackers to run malicious code on the server. This issue has been fixed in version 3.20.0.

thehackerwire@mastodon.social at 2026-02-23T21:02:06.000Z ##

🔴 CVE-2026-27194 - Critical (9.8)

D-Tale is a visualizer for pandas data structures. Versions prior to 3.20.0 are vulnerable to Remote Code Execution through the /save-column-filter endpoint. Users hosting D-Tale publicly can be vulnerable to remote code execution allowing attacke...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27197
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-02-23T20:45:01.957000

2 posts

Sentry is a developer-first error tracking and performance monitoring tool. Versions 21.12.0 through 26.1.0 have a critical vulnerability in its SAML SSO implementation which allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance. Self-hosted users are only at risk if the following criteria is met: ore than

offseq@infosec.exchange at 2026-02-21T06:00:28.000Z ##

🚨 Critical SAML SSO vuln (CVE-2026-27197, CVSS 9.1) in Sentry 21.12.0 – 26.1.0 allows remote account takeover in multi-org instances. Upgrade to 26.2.0+, enable user 2FA, audit SSO settings! Full details: radar.offseq.com/threat/cve-20 #OffSeq #Sentry #CVE202627197 #infosec

##

thehackerwire@mastodon.social at 2026-02-21T05:21:46.000Z ##

🔴 CVE-2026-27197 - Critical (9.1)

Sentry is a developer-first error tracking and performance monitoring tool. Versions 21.12.0 through 26.1.0 have a critical vulnerability in its SAML SSO implementation which allows an attacker to take over any user account by using a malicious S...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2876
(8.8 HIGH)

EPSS: 0.07%

updated 2026-02-23T20:33:02.043000

1 posts

A vulnerability was determined in Tenda A18 15.13.07.13. This affects the function parse_macfilter_rule of the file /goform/setBlackRule. This manipulation of the argument deviceList causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-02-21T18:19:42.000Z ##

🟠 CVE-2026-2876 - High (8.8)

A vulnerability was determined in Tenda A18 15.13.07.13. This affects the function parse_macfilter_rule of the file /goform/setBlackRule. This manipulation of the argument deviceList causes stack-based buffer overflow. The attack may be initiated ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2588
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-02-23T20:28:55.517000

1 posts

Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw on 32-bit systems. Sodium.xs casts a STRLEN (size_t) to unsigned long long when passing a length pointer to libsodium functions. On 32-bit systems size_t is typically 32-bits while an unsigned long long is at least 64-bits.

thehackerwire@mastodon.social at 2026-02-23T20:31:03.000Z ##

🔴 CVE-2026-2588 - Critical (9.1)

Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw on 32-bit systems.

Sodium.xs casts a STRLEN (size_t) to unsigned long long when passing a length pointer to libsodium functions. On 32-bit systems size_t is typical...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24956
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-02-23T20:28:54.140000

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Shahjada Download Manager Addons for Elementor wpdm-elementor allows Blind SQL Injection.This issue affects Download Manager Addons for Elementor: from n/a through <= 1.3.0.

thehackerwire@mastodon.social at 2026-02-23T21:05:47.000Z ##

🔴 CVE-2026-24956 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Shahjada Download Manager Addons for Elementor wpdm-elementor allows Blind SQL Injection.This issue affects Download Manager Addons for Elementor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2856
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-23T20:27:19.517000

1 posts

A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the component Filter Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-02-21T00:17:35.000Z ##

🟠 CVE-2026-2856 - High (8.8)

A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the component Filter Configuration Endpoint. The manipulation of the argument submit-url results in s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2857
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-23T20:26:36.483000

1 posts

A vulnerability was determined in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_423E00 of the file /boafrm/formPortFw of the component Port Forwarding Configuration Endpoint. This manipulation of the argument submit-url causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-02-21T00:17:44.000Z ##

🟠 CVE-2026-2857 - High (8.8)

A vulnerability was determined in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_423E00 of the file /boafrm/formPortFw of the component Port Forwarding Configuration Endpoint. This manipulation of the argument submit-url cause...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2907
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-23T20:21:53.467000

1 posts

A weakness has been identified in Tenda HG9 300001138. Affected by this vulnerability is an unknown functionality of the file /boaform/formgponConf of the component GPON Configuration Endpoint. This manipulation of the argument fmgpon_loid/fmgpon_loid_password causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and co

thehackerwire@mastodon.social at 2026-02-22T02:18:43.000Z ##

🟠 CVE-2026-2907 - High (8.8)

A weakness has been identified in Tenda HG9 300001138. Affected by this vulnerability is an unknown functionality of the file /boaform/formgponConf of the component GPON Configuration Endpoint. This manipulation of the argument fmgpon_loid/fmgpon_...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2908
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-23T20:21:45.490000

1 posts

A security vulnerability has been detected in Tenda HG9 300001138. Affected by this issue is some unknown functionality of the file /boaform/formLoopBack of the component Loopback Detection Configuration Endpoint. Such manipulation of the argument Ethtype leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-02-22T02:25:14.000Z ##

🟠 CVE-2026-2908 - High (8.8)

A security vulnerability has been detected in Tenda HG9 300001138. Affected by this issue is some unknown functionality of the file /boaform/formLoopBack of the component Loopback Detection Configuration Endpoint. Such manipulation of the argument...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2911
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-23T20:21:22.323000

1 posts

A vulnerability has been found in Tenda FH451 up to 1.0.0.9. This issue affects some unknown processing of the file /goform/GstDhcpSetSer. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-02-22T04:20:22.000Z ##

🟠 CVE-2026-2911 - High (8.8)

A vulnerability has been found in Tenda FH451 up to 1.0.0.9. This issue affects some unknown processing of the file /goform/GstDhcpSetSer. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2874
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-23T20:09:11.397000

1 posts

A flaw has been found in Tenda A21 1.0.0.0. Impacted is the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. Executing a manipulation of the argument ssid can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-02-21T18:19:52.000Z ##

🟠 CVE-2026-2874 - High (8.8)

A flaw has been found in Tenda A21 1.0.0.0. Impacted is the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. Executing a manipulation of the argument ssid can lead to stack-based buffer overflow. It is possible to lau...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2883
(8.8 HIGH)

EPSS: 0.01%

updated 2026-02-23T19:41:14.377000

1 posts

A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_427D74 of the file /boafrm/formIpQoS. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-02-21T20:24:03.000Z ##

🟠 CVE-2026-2883 - High (8.8)

A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_427D74 of the file /boafrm/formIpQoS. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2929
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-23T19:39:25.350000

2 posts

A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_453140 of the file /boafrm/formWlAc of the component Wireless Access Control Endpoint. This manipulation of the argument submit-url causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-02-22T06:18:02.000Z ##

🟠 CVE-2026-2929 - High (8.8)

A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_453140 of the file /boafrm/formWlAc of the component Wireless Access Control Endpoint. This manipulation of the argument submit-url causes stack-based buffer o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-22T06:00:28.000Z ##

⚠️ HIGH severity: Stack-based buffer overflow in D-Link DWR-M960 (v1.01.07) via /boafrm/formWlAc (CVE-2026-2929) enables remote code execution. Public exploit is out — review defenses now! radar.offseq.com/threat/cve-20 #OffSeq #CVE20262929 #DLink #Vuln

##

CVE-2026-2926
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-23T19:35:45.083000

2 posts

A flaw has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4237AC of the file /boafrm/formLteSetup of the component LTE Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.

offseq@infosec.exchange at 2026-02-22T10:30:29.000Z ##

CVE-2026-2926: HIGH-severity stack buffer overflow in D-Link DWR-M960 v1.01.07. Remote, unauthenticated code execution possible. Public PoC released — no vendor patch yet. Isolate devices, monitor endpoints, restrict access. Details: radar.offseq.com/threat/cve-20 #OffSeq #DLink #Infosec

##

thehackerwire@mastodon.social at 2026-02-22T05:26:57.000Z ##

🟠 CVE-2026-2926 - High (8.8)

A flaw has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4237AC of the file /boafrm/formLteSetup of the component LTE Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2928
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-23T19:29:03.767000

2 posts

A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_452CCC of the file /boafrm/formWlEncrypt of the component WLAN Encryption Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.

offseq@infosec.exchange at 2026-02-22T07:30:27.000Z ##

CVE-2026-2928: HIGH-severity stack buffer overflow in D-Link DWR-M960 (v1.01.07) enables remote code execution — no auth needed. Public exploit code is out. Isolate & restrict access, monitor for attacks, patch ASAP. radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln #BlueTeam

##

thehackerwire@mastodon.social at 2026-02-22T05:26:48.000Z ##

🟠 CVE-2026-2928 - High (8.8)

A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_452CCC of the file /boafrm/formWlEncrypt of the component WLAN Encryption Configuration Endpoint. The manipulation of the argument submit-url results in stac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2959
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-23T19:28:20.650000

3 posts

A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-02-23T01:00:35.000Z ##

🟠 CVE-2026-2959 - High (8.8)

A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url results in stack-based buffer overflow. Remote ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T01:00:23.000Z ##

🟠 CVE-2026-2959 - High (8.8)

A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url results in stack-based buffer overflow. Remote ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-23T00:00:38.000Z ##

⚠️ HIGH severity: D-Link DWR-M960 v1.01.07 hit by stack-based buffer overflow (CVE-2026-2959) via /boafrm/formNewSchedule. Remote exploitation possible — public exploit available! Assess & monitor. radar.offseq.com/threat/cve-20 #OffSeq #DLink #CVE20262959 #Security

##

CVE-2026-2960
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-23T19:24:49.953000

2 posts

A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.

offseq@infosec.exchange at 2026-02-23T07:30:27.000Z ##

🛡️ CVE-2026-2960: HIGH severity stack-based buffer overflow in D-Link DWR-M960 (fw 1.01.07). Remote, unauthenticated RCE possible; PoC exploit published. Patch or restrict access now! radar.offseq.com/threat/cve-20 #OffSeq #DLink #Infosec #Vulnerability

##

thehackerwire@mastodon.social at 2026-02-23T01:18:13.000Z ##

🟠 CVE-2026-2960 - High (8.8)

A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be exe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23552
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-02-23T18:33:04

2 posts

Cross-Realm Token Acceptance Bypass in KeycloakSecurityPolicy Apache Camel Keycloak component.  The Camel-Keycloak KeycloakSecurityPolicy does not validate the iss (issuer) claim of JWT tokens against the configured realm. A token issued by one Keycloak realm is silently accepted by a policy configured for a completely different realm, breaking tenant isolation. This issue affects Apache Camel: f

1 repos

https://github.com/oscerd/CVE-2026-23552

offseq@infosec.exchange at 2026-02-24T00:00:39.000Z ##

🚨 CRITICAL: CVE-2026-23552 in Apache Camel 4.15.0 – 4.17.x breaks tenant isolation — JWT tokens from any Keycloak realm may be accepted! Upgrade to 4.18.0 ASAP to secure multi-tenant systems. radar.offseq.com/threat/cve-20 #OffSeq #ApacheCamel #Vuln #Keycloak

##

thehackerwire@mastodon.social at 2026-02-23T17:09:44.000Z ##

🔴 CVE-2026-23552 - Critical (9.1)

Cross-Realm Token Acceptance Bypass in KeycloakSecurityPolicy Apache Camel Keycloak component. 

The Camel-Keycloak KeycloakSecurityPolicy does not validate the iss (issuer) claim of JWT tokens against the configured realm. A token issued by one ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70043
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-02-23T18:32:09

2 posts

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in Ayms node-To master. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in TLS socket options

Matchbook3469@mastodon.social at 2026-02-24T18:10:25.000Z ##

🔴 New security advisory:

CVE-2025-70043 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

thehackerwire@mastodon.social at 2026-02-23T17:55:24.000Z ##

🔴 CVE-2025-70043 - Critical (9.1)

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in Ayms node-To master. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in TLS socket options

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3016
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T18:32:05

1 posts

A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. The affected element is the function strcpy of the file /goform/formP2PLimitConfig. The manipulation of the argument except leads to buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-02-23T17:09:35.000Z ##

🟠 CVE-2026-3016 - High (8.8)

A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. The affected element is the function strcpy of the file /goform/formP2PLimitConfig. The manipulation of the argument except leads to buffer overflow. Remote exploitation of the a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3015
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T18:32:04

2 posts

A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/formPolicyRouteConf. Executing a manipulation of the argument GroupName can lead to buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-02-23T17:10:39.000Z ##

🟠 CVE-2026-3015 - High (8.8)

A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/formPolicyRouteConf. Executing a manipulation of the argument GroupName can lead to buffer overflow. The attack may be launche...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T17:09:39.000Z ##

🟠 CVE-2026-3015 - High (8.8)

A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/formPolicyRouteConf. Executing a manipulation of the argument GroupName can lead to buffer overflow. The attack may be launche...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2019-25441
(9.8 CRITICAL)

EPSS: 2.65%

updated 2026-02-23T18:14:13.887000

1 posts

thesystem 1.0 contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious input to the run_command endpoint. Attackers can send POST requests with shell commands in the command parameter to execute arbitrary code on the server without authentication.

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-25896
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-02-23T18:14:13.887000

3 posts

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (&lt;, &gt;, &amp;, &quot;, &apos;) with arbitrary values. This bypasses entity en

endorlabs@mastodon.social at 2026-02-21T17:53:48.000Z ##

CVE-2026-25896 (CVSS 9.3) disclosed in fast-xml-parser

A critical entity encoding bypass affects fast-xml-parser (40M+ weekly npm downloads).
-Allows attackers to shadow built-in XML entities (<, >, &, ", ')
-Can lead to XSS or injection when parsing untrusted XML and rendering the output
-Exploitable with default settings (processEntities: true)
-Impacts >= 4.1.3 and < 5.3.5, including transitive dependencies

Fix: upgrade to v5.3.5+
Advisory: GHSA-m7jm-9gc2-mpf2

endorlabs.com/learn/cve-2026-2

##

offseq@infosec.exchange at 2026-02-21T01:30:31.000Z ##

🚨 CRITICAL: CVE-2026-25896 in fast-xml-parser (<5.3.5) lets attackers override built-in XML entities, enabling XSS via crafted XML. Affects web apps using vulnerable versions. Patch to 5.3.5+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #XSS #NodeJS

##

thehackerwire@mastodon.social at 2026-02-21T00:25:28.000Z ##

🔴 CVE-2026-25896 - Critical (9.3)

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during en...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24892
(7.5 HIGH)

EPSS: 0.31%

updated 2026-02-23T18:14:13.887000

1 posts

openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus. openITCOCKPIT Community Edition 5.3.1 and earlier contains an unsafe PHP deserialization pattern in the processing of changelog entries. Serialized changelog data derived from attacker-influenced application state is unserialized without restricting allowed classes. Although n

thehackerwire@mastodon.social at 2026-02-21T00:25:18.000Z ##

🟠 CVE-2026-24892 - High (7.5)

openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus. openITCOCKPIT Community Edition 5.3.1 and earlier contains an unsafe PHP deserialization pattern in the processing of change...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22567
(7.6 HIGH)

EPSS: 0.04%

updated 2026-02-23T18:13:53.397000

1 posts

Improper validation of user-supplied input in the ZIA Admin UI could allow an authenticated administrator to initiate backend functions through specific input fields in limited scenarios.

thehackerwire@mastodon.social at 2026-02-23T17:55:12.000Z ##

🟠 CVE-2026-22567 - High (7.6)

Improper validation of user-supplied input in the ZIA Admin UI could allow an authenticated administrator to initiate backend functions through specific input fields in limited scenarios.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24494
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-02-23T18:13:53.397000

2 posts

SQL Injection vulnerability in the /api/integrations/getintegrations endpoint of Order Up Online Ordering System 1.0 allows an unauthenticated attacker to access sensitive backend database data via a crafted store_id parameter in a POST request.

offseq@infosec.exchange at 2026-02-23T03:00:27.000Z ##

⚠️ CVE-2026-24494 (CRITICAL, CVSS 9.8): SQL Injection in Order Up Online Ordering System v1.0 lets unauthenticated attackers run arbitrary SQL via /api/integrations/getintegrations. Patch or mitigate now! radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Vulnerability #Infosec

##

thehackerwire@mastodon.social at 2026-02-23T02:29:18.000Z ##

🔴 CVE-2026-24494 - Critical (9.8)

SQL Injection vulnerability in the /api/integrations/getintegrations endpoint of Order Up Online Ordering System 1.0 allows an unauthenticated attacker to access sensitive backend database data via a crafted store_id parameter in a POST request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27466
(7.2 HIGH)

EPSS: 0.07%

updated 2026-02-23T18:13:53.397000

1 posts

BigBlueButton is an open-source virtual classroom. In versions 3.0.21 and below, the official documentation for "Server Customization" on Support for ClamAV as presentation file scanner contains instructions that leave a BBB server vulnerable for Denial of Service. The flawed command exposes both ports (3310 and 7357) to the internet. A remote attacker can use this to send complex or large documen

0x3e4@cyberplace.social at 2026-02-21T09:18:34.000Z ##

BigBlueButton on < 3.0.22 with two new CVEs today: CVE-2026-27466 & CVE-2026-27467

hecate.pw/vulnerabilities?sear

Feel free to use the AI slop analyses (Gemini for student with free API configured).. Hecate is a prototype app for my master thesis

#vulnerability #cve #security #InfoSec #bigbluebutton

##

CVE-2026-27467
(2.0 LOW)

EPSS: 0.03%

updated 2026-02-23T18:13:53.397000

1 posts

BigBlueButton is an open-source virtual classroom. In versions 3.0.19 and below, when first joining a session with the microphone muted, the client sends audio to the server regardless of mute state. Media is discarded at the server side, so it isn't audible to any participants, but this may allow for malicious server operators to access audio data. The behavior is only incorrect between joining t

0x3e4@cyberplace.social at 2026-02-21T09:18:34.000Z ##

BigBlueButton on < 3.0.22 with two new CVEs today: CVE-2026-27466 & CVE-2026-27467

hecate.pw/vulnerabilities?sear

Feel free to use the AI slop analyses (Gemini for student with free API configured).. Hecate is a prototype app for my master thesis

#vulnerability #cve #security #InfoSec #bigbluebutton

##

CVE-2026-27464
(7.7 HIGH)

EPSS: 0.03%

updated 2026-02-23T18:13:53.397000

1 posts

Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. During testing, it was confirmed that a low-privileged user can extract sensitive information including database credentials, into the email body via templ

thehackerwire@mastodon.social at 2026-02-21T08:17:29.000Z ##

🟠 CVE-2026-27464 - High (7.7)

Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. Du...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27206
(8.1 HIGH)

EPSS: 0.29%

updated 2026-02-23T18:13:53.397000

1 posts

Zumba Json Serializer is a library to serialize PHP variables in JSON format. In versions 3.2.2 and below, the library allows deserialization of PHP objects from JSON using a special @type field. The deserializer instantiates any class specified in the @type field without restriction. When processing untrusted JSON input, this behavior may allow an attacker to instantiate arbitrary classes availab

thehackerwire@mastodon.social at 2026-02-21T07:17:59.000Z ##

🟠 CVE-2026-27206 - High (8.1)

Zumba Json Serializer is a library to serialize PHP variables in JSON format. In versions 3.2.2 and below, the library allows deserialization of PHP objects from JSON using a special @type field. The deserializer instantiates any class specified i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27192
(0 None)

EPSS: 0.02%

updated 2026-02-23T18:13:53.397000

1 posts

Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. In versions 5.0.39 and below, origin validation uses startsWith() for comparison, allowing attackers to bypass the check by registering a domain that shares a common prefix with an allowed origin.The getAllowedOrigin() function checks if the Referer header starts with any allowed origin, and t

offseq@infosec.exchange at 2026-02-21T04:30:27.000Z ##

⚠️ CVE-2026-27192: Feathersjs (<5.0.40) suffers a HIGH-severity origin validation error (CWE-346). Prefix-based checks let attackers steal OAuth tokens, risking account takeover. Upgrade to 5.0.40+! radar.offseq.com/threat/cve-20 #OffSeq #Feathersjs #OAuth #CVE202627192

##

CVE-2026-27134
(8.1 HIGH)

EPSS: 0.03%

updated 2026-02-23T18:13:53.397000

2 posts

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. In versions 0.49.0 through 0.50.0, when using a custom Cluster or Clients CA with a multistage CA chain consisting of multiple CAs, Strimzi incorrectly configures the trusted certificates for mTLS authentication on the internal as well as user-configured listeners. All CAs from t

thehackerwire@mastodon.social at 2026-02-21T00:20:07.000Z ##

🟠 CVE-2026-27134 - High (8.1)

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. In versions 0.49.0 through 0.50.0, when using a custom Cluster or Clients CA with a multistage CA chain consisting of multiple ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:24.000Z ##

🟠 CVE-2026-27134 - High (8.1)

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. In versions 0.49.0 through 0.50.0, when using a custom Cluster or Clients CA with a multistage CA chain consisting of multiple ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2441
(8.8 HIGH)

EPSS: 0.34%

updated 2026-02-23T13:24:55.920000

9 posts

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

6 repos

https://github.com/atiilla/CVE-2026-2441_PoC

https://github.com/washingtonmaister/CVE-2026-2441

https://github.com/NetVanguard-cmd/CVE-2026-2441

https://github.com/b1gchoi/CVE-2026-2441_POC

https://github.com/huseyinstif/CVE-2026-2441-PoC

https://github.com/theemperorspath/CVE-2026-2441-PoC

Andy_Thompson at 2026-02-24T23:06:37.582Z ##

BREAKING: 25M+ US Breach + Chrome Zero-Day + AI Malware (Feb 24,2026)

🚨 Conduent Breach Now Largest in US History - 25+ Million Affected 🚨
🌐 Chrome Zero-Day CVE-2026-2441 Actively Exploited 🌐
🤖 AI Prompts Are The New Malware 🤖

🔗 youtu.be/p4Ky1l4X_c4

##

_r_netsec at 2026-02-24T22:43:05.103Z ##

Chrome CVE made me go digging and I found a container image in prod that hasn't been updated since 2023 cve.org/CVERecord?id=CVE-2026-

##

siltaer@piaille.fr at 2026-02-24T10:38:55.000Z ##

Une vulnérabilité Chromium en pure CSS qui permet de récupérer des données sensibles comme le token CSRF (CVE-2026-2441)
sitepoint.com/zero-day-css-cve

Zero-Day CSS: Deconstructing CVE-2026-2441

#Chrome #Chromium #CSS #CSRF #CVE

##

Andy_Thompson@infosec.exchange at 2026-02-24T23:06:37.000Z ##

BREAKING: 25M+ US Breach + Chrome Zero-Day + AI Malware (Feb 24,2026)

🚨 Conduent Breach Now Largest in US History - 25+ Million Affected 🚨
🌐 Chrome Zero-Day CVE-2026-2441 Actively Exploited 🌐
🤖 AI Prompts Are The New Malware 🤖

🔗 youtu.be/p4Ky1l4X_c4

##

_r_netsec@infosec.exchange at 2026-02-24T22:43:05.000Z ##

Chrome CVE made me go digging and I found a container image in prod that hasn't been updated since 2023 cve.org/CVERecord?id=CVE-2026-

##

siltaer@piaille.fr at 2026-02-24T10:38:55.000Z ##

Une vulnérabilité Chromium en pure CSS qui permet de récupérer des données sensibles comme le token CSRF (CVE-2026-2441)
sitepoint.com/zero-day-css-cve

Zero-Day CSS: Deconstructing CVE-2026-2441

#Chrome #Chromium #CSS #CSRF #CVE

##

youranonnewsirc@nerdculture.de at 2026-02-24T07:44:38.000Z ##

Recent reports highlight significant activity across global sectors.

**Cybersecurity:** The University of Mississippi Medical Center closed clinics (Feb 23-24) following a ransomware attack. A critical Chromium zero-day (CVE-2026-2441) is actively exploited, mandating urgent patching for browsers. Figure Fintech reported a major 1 million account data breach stemming from a sophisticated vishing attack. The U.S. implemented new CIRCIA regulations, requiring critical infrastructure to report cyber incidents within 72 hours and ransom payments within 24 hours.

**Technology:** Google's $32 billion acquisition of Wiz has received European Commission approval, marking a significant consolidation in cloud security.

**Geopolitics:** U.S.-China competition continues to be a driving force, alongside new U.S. tariffs, contributing to global market volatility.

#Cybersecurity #Geopolitics #TechNews

##

hackmag@infosec.exchange at 2026-02-23T19:00:15.000Z ##

⚪ Google Chrome patches first zero‑day vulnerability of the year

🗨️ This week, Google developers released an emergency update for the Chrome browser, patching the first zero-day vulnerability of the year, CVE-2026-2441, which hackers were already exploiting. The company has confirmed the existence of a working exploit for this bug.

🔗 hackmag.com/news/chrome-fisrt-

#news

##

nu11secur1ty@infosec.exchange at 2026-02-23T12:39:29.000Z ##

patreon.com/posts/cve-2026-244

##

beyondmachines1@infosec.exchange at 2026-02-23T16:01:19.000Z ##

CISA Warns of Active Exploitation Targeting Roundcube Webmail Vulnerabilities

CISA has warned of active exploitation targeting two Roundcube Webmail vulnerabilities, including a critical remote code execution flaw (CVE-2025-49113) and a high-severity XSS bug (CVE-2025-68461).

**If you are using Roundcube Webmail, this is important. Upddate to version 1.5.12 or 1.6.12 ASAP. Your webmail interface is under attack.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2025-68461
(7.2 HIGH)

EPSS: 6.89%

updated 2026-02-23T13:24:12.310000

1 posts

Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a Cross-Site-Scripting (XSS) vulnerability via the animate tag in an SVG document.

2 repos

https://github.com/rxerium/CVE-2025-68461

https://github.com/gotr00t0day/CVE-2025-68461

beyondmachines1@infosec.exchange at 2026-02-23T16:01:19.000Z ##

CISA Warns of Active Exploitation Targeting Roundcube Webmail Vulnerabilities

CISA has warned of active exploitation targeting two Roundcube Webmail vulnerabilities, including a critical remote code execution flaw (CVE-2025-49113) and a high-severity XSS bug (CVE-2025-68461).

**If you are using Roundcube Webmail, this is important. Upddate to version 1.5.12 or 1.6.12 ASAP. Your webmail interface is under attack.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2026-2981
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T09:31:29

2 posts

A vulnerability was found in UTT HiPER 810G up to 1.7.7-1711. The affected element is the function strcpy of the file /goform/formTaskEdit_ap. The manipulation of the argument txtMin2 results in buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.

offseq@infosec.exchange at 2026-02-23T10:30:29.000Z ##

🚨 HIGH severity: CVE-2026-2981 affects UTT HiPER 810G ≤1.7.7-1711. Remote, unauthenticated buffer overflow in /goform/formTaskEdit_ap. Exploit code is public — patch unavailable. Restrict access & monitor endpoints! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Cybersecurity

##

thehackerwire@mastodon.social at 2026-02-23T10:01:20.000Z ##

🟠 CVE-2026-2981 - High (8.8)

A vulnerability was found in UTT HiPER 810G up to 1.7.7-1711. The affected element is the function strcpy of the file /goform/formTaskEdit_ap. The manipulation of the argument txtMin2 results in buffer overflow. The attack may be launched remotely...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1367
(8.3 HIGH)

EPSS: 0.18%

updated 2026-02-23T09:31:29

1 posts

Zohocorp ManageEngine ADSelfService Plus versions 6522 and below are vulnerable to authenticated SQL Injection in the search report option.

thehackerwire@mastodon.social at 2026-02-23T08:21:06.000Z ##

🟠 CVE-2026-1367 - High (8.3)

Zohocorp ManageEngine ADSelfService Plus versions 6522 and below are vulnerable to authenticated SQL Injection in the search report option.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2998
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-23T06:30:18

2 posts

ERP developed by eAI Technologies has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a crafted DLL file in the same directory as the program, thereby executing arbitrary code.

offseq@infosec.exchange at 2026-02-23T04:30:26.000Z ##

⚠️ CVE-2026-2998 (HIGH): eAI Technologies ERP F2 hit by DLL hijacking (CWE-426), allowing local code execution. No patch yet. Restrict local access, monitor DLLs, and implement whitelisting. Details: radar.offseq.com/threat/cve-20 #OffSeq #Cybersecurity #Vuln #ERP

##

thehackerwire@mastodon.social at 2026-02-23T04:18:33.000Z ##

🟠 CVE-2026-2998 - High (7.8)

ERP developed by eAI Technologies has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a crafted DLL file in the same directory as the program, thereby executing arbitrary code.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2962
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-23T03:30:27

2 posts

A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.

offseq@infosec.exchange at 2026-02-23T01:30:30.000Z ##

🛡️ HIGH severity: CVE-2026-2962 impacts D-Link DWR-M960 (1.01.07). Remote, unauthenticated stack buffer overflow in /boafrm/formDateReboot — public exploit available! Patch or restrict access immediately. radar.offseq.com/threat/cve-20 #OffSeq #CVE20262962 #DLink #Infosec

##

thehackerwire@mastodon.social at 2026-02-23T01:18:32.000Z ##

🟠 CVE-2026-2962 - High (8.8)

A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. The manipulation of the argument submit-url resul...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2961
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-23T03:30:22

2 posts

A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.

offseq@infosec.exchange at 2026-02-23T06:00:32.000Z ##

🔒 CVE-2026-2961: HIGH-severity stack buffer overflow in D-Link DWR-M960 (fw 1.01.07). Remote, unauthenticated exploit possible — public PoC released. Restrict config access & monitor for abuse! radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln #InfoSec

##

thehackerwire@mastodon.social at 2026-02-23T01:18:22.000Z ##

🟠 CVE-2026-2961 - High (8.8)

A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2958
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-23T00:30:32

2 posts

A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-02-23T01:01:31.000Z ##

🟠 CVE-2026-2958 - High (8.8)

A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-based buffer overflow. The attack may be launched r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T01:00:22.000Z ##

🟠 CVE-2026-2958 - High (8.8)

A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-based buffer overflow. The attack may be launched r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2927
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-22T06:30:24

2 posts

A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_462590 of the file /boafrm/formOpMode of the component Operation Mode Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

offseq@infosec.exchange at 2026-02-22T09:00:29.000Z ##

🚨 CVE-2026-2927: HIGH-severity stack buffer overflow in D-Link DWR-M960 (v1.01.07). Remote, unauthenticated RCE risk — exploit details public. Patch or restrict access! More: radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln #BlueTeam

##

thehackerwire@mastodon.social at 2026-02-22T05:26:39.000Z ##

🟠 CVE-2026-2927 - High (8.8)

A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_462590 of the file /boafrm/formOpMode of the component Operation Mode Configuration Endpoint. The manipulation of the argument submit-url leads ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2925
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-22T06:30:24

2 posts

A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_42B5A0 of the file /boafrm/formBridgeVlan of the component Bridge VLAN Configuration Endpoint. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-02-22T04:30:27.000Z ##

🔎 HIGH severity: D-Link DWR-M960 v1.01.07 vulnerable to stack-based buffer overflow (CVE-2026-2925) via Bridge VLAN config. Remote exploit now public — monitor exposure & await patches. radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln

##

thehackerwire@mastodon.social at 2026-02-22T04:20:12.000Z ##

🟠 CVE-2026-2925 - High (8.8)

A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_42B5A0 of the file /boafrm/formBridgeVlan of the component Bridge VLAN Configuration Endpoint. Performing a manipulation of the argument submit-url...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2910
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-22T06:30:24

1 posts

A flaw has been found in Tenda HG9 300001138. This vulnerability affects unknown code of the file /boaform/formPing6. Executing a manipulation of the argument pingAddr can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-02-22T04:20:34.000Z ##

🟠 CVE-2026-2910 - High (8.8)

A flaw has been found in Tenda HG9 300001138. This vulnerability affects unknown code of the file /boaform/formPing6. Executing a manipulation of the argument pingAddr can lead to stack-based buffer overflow. The attack may be performed from remot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2906
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-22T03:30:34

1 posts

A security flaw has been discovered in Tenda HG9 300001138. Affected is an unknown function of the file /boaform/formSamba of the component Samba Configuration Endpoint. The manipulation of the argument sambaCap results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-02-22T02:18:33.000Z ##

🟠 CVE-2026-2906 - High (8.8)

A security flaw has been discovered in Tenda HG9 300001138. Affected is an unknown function of the file /boaform/formSamba of the component Samba Configuration Endpoint. The manipulation of the argument sambaCap results in stack-based buffer overf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2909
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-22T03:30:33

2 posts

A vulnerability was detected in Tenda HG9 300001138. This affects an unknown part of the file /boaform/formPing of the component Diagnostic Ping Endpoint. Performing a manipulation of the argument pingAddr results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-02-22T03:00:26.000Z ##

🚨 HIGH-severity (CVSS 8.7): Stack buffer overflow in Tenda HG9 (v300001138) via /boaform/formPing. Remote code execution possible with public exploit available. Restrict access, monitor, and patch ASAP! Details: radar.offseq.com/threat/cve-20 #OffSeq #Infosec #Vuln #IoT

##

thehackerwire@mastodon.social at 2026-02-22T02:18:22.000Z ##

🟠 CVE-2026-2909 - High (8.8)

A vulnerability was detected in Tenda HG9 300001138. This affects an unknown part of the file /boaform/formPing of the component Diagnostic Ping Endpoint. Performing a manipulation of the argument pingAddr results in stack-based buffer overflow. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2905
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-22T03:30:33

1 posts

A vulnerability was identified in Tenda HG9 300001138. This impacts an unknown function of the file /boaform/formWlanSetup of the component Wireless Configuration Endpoint. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-02-22T02:25:23.000Z ##

🟠 CVE-2026-2905 - High (8.8)

A vulnerability was identified in Tenda HG9 300001138. This impacts an unknown function of the file /boaform/formWlanSetup of the component Wireless Configuration Endpoint. The manipulation of the argument ssid leads to stack-based buffer overflow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2884
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-21T21:30:33

1 posts

A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element is the function sub_41914C of the file /boafrm/formWanConfigSetup of the component WAN Interface Setting Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-02-21T21:18:45.000Z ##

🟠 CVE-2026-2884 - High (8.8)

A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element is the function sub_41914C of the file /boafrm/formWanConfigSetup of the component WAN Interface Setting Handler. The manipulation of the argument submit-url leads to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2885
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-21T21:30:32

2 posts

A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-02-21T21:19:16.000Z ##

🟠 CVE-2026-2885 - High (8.8)

A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T21:18:50.000Z ##

🟠 CVE-2026-2885 - High (8.8)

A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2881
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-21T21:30:28

1 posts

A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_425FF8 of the file /boafrm/formFirewallAdv of the component Advanced Firewall Configuration Endpoint. Such manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-02-21T20:24:13.000Z ##

🟠 CVE-2026-2881 - High (8.8)

A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_425FF8 of the file /boafrm/formFirewallAdv of the component Advanced Firewall Configuration Endpoint. Such manipulation of the argument submit-u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2882
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-21T21:30:27

1 posts

A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_46385C of the file /boafrm/formDosCfg. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-02-21T20:23:52.000Z ##

🟠 CVE-2026-2882 - High (8.8)

A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_46385C of the file /boafrm/formDosCfg. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. Remote exploitation of th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2877
(8.8 HIGH)

EPSS: 0.07%

updated 2026-02-21T21:30:27

1 posts

A vulnerability has been found in Tenda A18 15.13.07.13. This affects the function strcpy of the file /goform/WifiExtraSet of the component Httpd Service. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-02-21T19:16:10.000Z ##

🟠 CVE-2026-2877 - High (8.8)

A vulnerability has been found in Tenda A18 15.13.07.13. This affects the function strcpy of the file /goform/WifiExtraSet of the component Httpd Service. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. It is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2873
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-21T18:31:22

1 posts

A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-02-21T17:16:37.000Z ##

🟠 CVE-2026-2873 - High (8.8)

A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. It is ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2872
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-21T18:31:22

1 posts

A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerability affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. Such manipulation of the argument devName/mac leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-02-21T17:00:52.000Z ##

🟠 CVE-2026-2872 - High (8.8)

A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerability affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. Such manipulation of the argument devN...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2870
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-21T15:31:37

1 posts

A security flaw has been discovered in Tenda A21 1.0.0.0. Affected by this issue is the function set_qosMib_list of the file /goform/formSetQosBand. The manipulation of the argument list results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-02-21T15:25:18.000Z ##

🟠 CVE-2026-2870 - High (8.8)

A security flaw has been discovered in Tenda A21 1.0.0.0. Affected by this issue is the function set_qosMib_list of the file /goform/formSetQosBand. The manipulation of the argument list results in stack-based buffer overflow. The attack can be ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2635
(9.8 CRITICAL)

EPSS: 1.17%

updated 2026-02-21T00:31:55

1 posts

MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the basic_auth.ini file. The file contains hard-coded default credentials. An attacker can leverage this vulnerability to bypass aut

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-2043
(7.2 HIGH)

EPSS: 0.47%

updated 2026-02-21T00:31:54

2 posts

Nagios Host esensors_websensor_configwizard_func Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Nagios Host. Authentication is required to exploit this vulnerability. The specific flaw exists within the esensors_websensor_configwizard_func method. The issue results from the lack of proper val

thehackerwire@mastodon.social at 2026-02-24T18:13:46.000Z ##

🟠 CVE-2026-2043 - High (8.8)

Nagios Host esensors_websensor_configwizard_func Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Nagios Host. Authentication is required to ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T18:13:46.000Z ##

🟠 CVE-2026-2043 - High (8.8)

Nagios Host esensors_websensor_configwizard_func Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Nagios Host. Authentication is required to ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2033
(8.1 HIGH)

EPSS: 10.53%

updated 2026-02-21T00:31:54

2 posts

MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of artifact file paths. The issue results from the lack of proper validat

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

thehackerwire@mastodon.social at 2026-02-21T00:02:10.000Z ##

🟠 CVE-2026-2033 - High (8.1)

MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not requir...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2036
(8.8 HIGH)

EPSS: 0.79%

updated 2026-02-21T00:31:54

1 posts

GFI Archiver MArc.Store Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the configuration of the MArc.Store.Re

thehackerwire@mastodon.social at 2026-02-21T00:02:50.000Z ##

🟠 CVE-2026-2036 - High (8.8)

GFI Archiver MArc.Store Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2034
(7.8 HIGH)

EPSS: 0.04%

updated 2026-02-21T00:31:54

1 posts

Sante DICOM Viewer Pro DCM File Parsing Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DCM f

thehackerwire@mastodon.social at 2026-02-21T00:02:37.000Z ##

🟠 CVE-2026-2034 - High (7.8)

Sante DICOM Viewer Pro DCM File Parsing Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0777
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-21T00:31:49

2 posts

Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xmind. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of attachments. When opening an attachm

thehackerwire@mastodon.social at 2026-02-21T00:20:19.000Z ##

🟠 CVE-2026-0777 - High (7.8)

Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xmind. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:24.000Z ##

🟠 CVE-2026-0777 - High (7.8)

Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xmind. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2042
(7.2 HIGH)

EPSS: 1.25%

updated 2026-02-21T00:31:43

3 posts

Nagios Host monitoringwizard Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Nagios Host. Authentication is required to exploit this vulnerability. The specific flaw exists within the monitoringwizard module. The issue results from the lack of proper validation of a user-supplied string before

thehackerwire@mastodon.social at 2026-02-24T18:13:37.000Z ##

🟠 CVE-2026-2042 - High (8.8)

Nagios Host monitoringwizard Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Nagios Host. Authentication is required to exploit this vulnerabi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T18:13:37.000Z ##

🟠 CVE-2026-2042 - High (8.8)

Nagios Host monitoringwizard Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Nagios Host. Authentication is required to exploit this vulnerabi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-27190
(8.1 HIGH)

EPSS: 0.16%

updated 2026-02-20T22:20:05

1 posts

## Summary A command injection vulnerability exists in Deno's `node:child_process` implementation. ## Reproduction ```javascript import { spawnSync } from "node:child_process"; import * as fs from "node:fs"; // Cleanup try { fs.unlinkSync('/tmp/rce_proof'); } catch {} // Create legitimate script fs.writeFileSync('/tmp/legitimate.ts', 'console.log("normal");'); // Malicious input with newline

thehackerwire@mastodon.social at 2026-02-21T00:17:53.000Z ##

🟠 CVE-2026-27190 - High (8.1)

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to 2.6.8, a command injection vulnerability exists in Deno's node:child_process implementation. This vulnerability is fixed in 2.6.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22370
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:32:27

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Marveland marveland allows PHP Local File Inclusion.This issue affects Marveland: from n/a through <= 1.3.0.

thehackerwire@mastodon.social at 2026-02-21T00:32:08.000Z ##

🟠 CVE-2026-22370 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Marveland marveland allows PHP Local File Inclusion.This issue affects Marveland: from n/a through &lt;= 1.3.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22383
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-20T21:31:23

1 posts

Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes PawFriends - Pet Shop and Veterinary WordPress Theme pawfriends allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PawFriends - Pet Shop and Veterinary WordPress Theme: from n/a through <= 1.3.

thehackerwire@mastodon.social at 2026-02-21T00:31:58.000Z ##

🟠 CVE-2026-22383 - High (7.5)

Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes PawFriends - Pet Shop and Veterinary WordPress Theme pawfriends allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PawFriends -...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22380
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:31:23

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes UnlimHost unlimhost allows PHP Local File Inclusion.This issue affects UnlimHost: from n/a through <= 1.2.3.

thehackerwire@mastodon.social at 2026-02-21T00:31:48.000Z ##

🟠 CVE-2026-22380 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes UnlimHost unlimhost allows PHP Local File Inclusion.This issue affects UnlimHost: from n/a through &lt;= 1.2.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22368
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:31:22

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Redy redy allows PHP Local File Inclusion.This issue affects Redy: from n/a through <= 1.0.2.

thehackerwire@mastodon.social at 2026-02-21T00:45:37.000Z ##

🟠 CVE-2026-22368 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Redy redy allows PHP Local File Inclusion.This issue affects Redy: from n/a through &lt;= 1.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2329
(9.8 CRITICAL)

EPSS: 0.19%

updated 2026-02-20T20:57:50.360000

2 posts

An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.

technadu@infosec.exchange at 2026-02-23T16:24:21.000Z ##

CVE-2026-2329 — Critical VoIP RCE
Affects: Grandstream GXP1600
Type: Stack-based buffer overflow
Impact: Unauthenticated RCE (root)

Attack Path:
• Extract SIP credentials
• Modify SIP proxy settings
• Transparent call interception

Operational risk:
• SMB exposure
• Flat networks
• Insufficient VoIP monitoring

Patch available: Firmware 1.0.7.81.
Community question:
Are you incorporating VoIP firmware into vulnerability scanning pipelines?

Do you log and monitor SIP configuration changes?

Source: securityweek.com/critical-gran

Engage below and follow TechNadu for detailed CVE intelligence and technical breakdowns.

#ThreatIntel #VoIPSecurity #CVE20262329 #RCE #VulnerabilityManagement #NetworkDefense #Infosec #CyberRisk

##

offseq@infosec.exchange at 2026-02-22T00:00:38.000Z ##

CRITICAL: Grandstream VoIP phones hit by unauthenticated RCE (CVE-2026-2329) — allows call interception & device compromise. No patch yet. Restrict access, disable remote mgmt, and monitor for threats. radar.offseq.com/threat/critic #OffSeq #VoIP #Security #RCE

##

CVE-2026-22374
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T20:25:20.203000

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Zio Alberto zioalberto allows PHP Local File Inclusion.This issue affects Zio Alberto: from n/a through <= 1.2.2.

thehackerwire@mastodon.social at 2026-02-21T00:44:41.000Z ##

🟠 CVE-2026-22374 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Zio Alberto zioalberto allows PHP Local File Inclusion.This issue affects Zio Alberto: from n/a through &lt;= 1.2.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22372
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T20:25:20.027000

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Isida isida allows PHP Local File Inclusion.This issue affects Isida: from n/a through <= 1.4.2.

thehackerwire@mastodon.social at 2026-02-21T00:44:32.000Z ##

🟠 CVE-2026-22372 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Isida isida allows PHP Local File Inclusion.This issue affects Isida: from n/a through &lt;= 1.4.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22366
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T20:25:19.503000

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Jude jude allows PHP Local File Inclusion.This issue affects Jude: from n/a through <= 1.3.0.

thehackerwire@mastodon.social at 2026-02-21T00:45:27.000Z ##

🟠 CVE-2026-22366 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Jude jude allows PHP Local File Inclusion.This issue affects Jude: from n/a through &lt;= 1.3.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22364
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T20:25:19.337000

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes SevenTrees seventrees allows PHP Local File Inclusion.This issue affects SevenTrees: from n/a through <=1.0.2.

thehackerwire@mastodon.social at 2026-02-21T00:45:17.000Z ##

🟠 CVE-2026-22364 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes SevenTrees seventrees allows PHP Local File Inclusion.This issue affects SevenTrees: from n/a through &lt;=1.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22362
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T20:25:19.160000

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Photolia photolia allows PHP Local File Inclusion.This issue affects Photolia: from n/a through <= 1.0.3.

thehackerwire@mastodon.social at 2026-02-21T00:44:50.000Z ##

🟠 CVE-2026-22362 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Photolia photolia allows PHP Local File Inclusion.This issue affects Photolia: from n/a through &lt;= 1.0.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22769
(10.0 CRITICAL)

EPSS: 34.16%

updated 2026-02-20T02:00:02.830000

1 posts

Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgr

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-26030
(10.0 CRITICAL)

EPSS: 0.08%

updated 2026-02-19T19:34:15

1 posts

### Impact: An RCE vulnerability has been identified in Microsoft Semantic Kernel Python SDK, specifically within the `InMemoryVectorStore` filter functionality. ### Patches: The problem has been fixed in [python-1.39.4](https://github.com/microsoft/semantic-kernel/releases/tag/python-1.39.4). Users should upgrade this version or higher. ### Workarounds: Avoid using `InMemoryVectorStore` for pro

1 repos

https://github.com/mbanyamer/CVE-2026-26030-Microsoft-Semantic-Kernel-1.39.4-RCE

dendrite_soup@defcon.social at 2026-02-23T19:39:40.000Z ##

been thinking about CVE-2026-26030 and why the patch feels hollow. they added a confirmation flag. opt-in. the default is still trust. that's not a security fix, that's a liability fix. wrote it up: dev.to/dendrite_soup/opt-in-sa #infosec #aisecurity

##

CVE-2026-0714
(6.8 MEDIUM)

EPSS: 0.01%

updated 2026-02-18T18:31:27

1 posts

A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data m

CVE-2026-2533
(7.3 HIGH)

EPSS: 2.14%

updated 2026-02-18T17:52:22.253000

1 posts

A flaw has been found in Tosei Self-service Washing Machine 4.02. Impacted is an unknown function of the file /cgi-bin/tosei_datasend.php. Executing a manipulation of the argument adr_txt_1 can lead to command injection. It is possible to launch the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-2548
(6.3 MEDIUM)

EPSS: 1.41%

updated 2026-02-18T17:52:22.253000

1 posts

A flaw has been found in WAYOS FBM-220G 24.10.19. This affects the function sub_40F820 of the file rc. Executing a manipulation of the argument upnp_waniface/upnp_ssdp_interval/upnp_max_age can lead to command injection. The attack can be executed remotely. The vendor was contacted early about this disclosure but did not respond in any way.

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-2426
(6.5 MEDIUM)

EPSS: 2.57%

updated 2026-02-18T12:31:15

1 posts

The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.69 via the 'file' parameter in the file deletion functionality. This is due to insufficient validation of user-supplied file paths, allowing directory traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitra

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-1731
(9.8 CRITICAL)

EPSS: 52.96%

updated 2026-02-17T15:31:33

2 posts

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Nuclei template

5 repos

https://github.com/win3zz/CVE-2026-1731

https://github.com/hexissam/CVE-2026-1731

https://github.com/richardpaimu34/CVE-2026-1731

https://github.com/jakubie07/CVE-2026-1731

https://github.com/cybrdude/cve-2026-1731-scanner

youranonnewsirc@nerdculture.de at 2026-02-23T13:44:39.000Z ##

Geopolitical tensions heighten as US-Iran nuclear talks near. Technology advances with Tesla's Cybercab launch and Uber's significant investment in autonomous EV charging. Cybersecurity faces active exploitation of CVE-2026-1731 in BeyondTrust products, AI-powered FortiGate breaches, and AI-assisted malware from MuddyWater.

#Cybersecurity #TechNews #Geopolitics

##

technadu@infosec.exchange at 2026-02-21T10:48:45.000Z ##

Critical CVE-2026-1731 in BeyondTrust RS/PRA is under active exploitation.

Web shells. RATs. PostgreSQL dumps.
Now listed in CISA KEV & tied to ransomware.

Remote support appliances are high-value targets.

Are we giving PAM systems enough monitoring visibility?

Source: thehackernews.com/2026/02/beyo

Follow @technadu for independent cybersecurity reporting.

Like and join the discussion below.

#CyberSecurity #Infosec #ZeroDay #Ransomware #PAM #ThreatIntel #SecurityCommunity #CVE20261731

##

CVE-2026-2544
(7.3 HIGH)

EPSS: 2.14%

updated 2026-02-16T09:30:36

1 posts

A security flaw has been discovered in yued-fe LuLu UI up to 3.0.0. This issue affects the function child_process.exec of the file run.js. The manipulation results in os command injection. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-21513
(8.8 HIGH)

EPSS: 4.12%

updated 2026-02-10T21:31:29

2 posts

Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.

CVE-2026-1281
(9.8 CRITICAL)

EPSS: 57.41%

updated 2026-01-30T13:28:18.610000

2 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

2 repos

https://github.com/YunfeiGE18/CVE-2026-1281-CVE-2026-1340-Ivanti-EPMM-RCE

https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE

christopherkunz@chaos.social at 2026-02-24T12:42:14.000Z ##

@kantorkel Mit den Lücken, die u.a. für den Einbruch in den Niederlanden, Finnland und womöglich auch bei der EU genutzt wurden, kann man auf jeden Fall viel Spaß haben - und sei es beim Lesen des großartigen WatchTowr-Blogs labs.watchtowr.com/someone-kno (oder Hören unserer Passwort-Episode dazu, ab 17:08 cku.gt/2SFCN).

##

christopherkunz@chaos.social at 2026-02-24T12:42:14.000Z ##

@kantorkel Mit den Lücken, die u.a. für den Einbruch in den Niederlanden, Finnland und womöglich auch bei der EU genutzt wurden, kann man auf jeden Fall viel Spaß haben - und sei es beim Lesen des großartigen WatchTowr-Blogs labs.watchtowr.com/someone-kno (oder Hören unserer Passwort-Episode dazu, ab 17:08 cku.gt/2SFCN).

##

CVE-2026-1340
(9.8 CRITICAL)

EPSS: 41.91%

updated 2026-01-30T00:31:28

2 posts

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

2 repos

https://github.com/YunfeiGE18/CVE-2026-1281-CVE-2026-1340-Ivanti-EPMM-RCE

https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE

christopherkunz@chaos.social at 2026-02-24T12:42:14.000Z ##

@kantorkel Mit den Lücken, die u.a. für den Einbruch in den Niederlanden, Finnland und womöglich auch bei der EU genutzt wurden, kann man auf jeden Fall viel Spaß haben - und sei es beim Lesen des großartigen WatchTowr-Blogs labs.watchtowr.com/someone-kno (oder Hören unserer Passwort-Episode dazu, ab 17:08 cku.gt/2SFCN).

##

christopherkunz@chaos.social at 2026-02-24T12:42:14.000Z ##

@kantorkel Mit den Lücken, die u.a. für den Einbruch in den Niederlanden, Finnland und womöglich auch bei der EU genutzt wurden, kann man auf jeden Fall viel Spaß haben - und sei es beim Lesen des großartigen WatchTowr-Blogs labs.watchtowr.com/someone-kno (oder Hören unserer Passwort-Episode dazu, ab 17:08 cku.gt/2SFCN).

##

CVE-2025-12543
(9.6 CRITICAL)

EPSS: 0.08%

updated 2026-01-08T23:15:42.690000

1 posts

A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user session

beyondmachines1@infosec.exchange at 2026-02-24T08:01:19.000Z ##

HPE Patches Critical Access Bypass in Telco Service Activator

HPE patched a critical access bypass vulnerability (CVE-2025-12543) in its Telco Service Activator that allows unauthenticated attackers to hijack sessions or disrupt telecom services by exploiting improper Host header validation.

**If you are using Telco Service Activator, make sure it's isolated from the internet and accessible from trusted networks only. Then plan an update to version 10.5.0 ASAP. Coordinate the patch window with your support teams to manage any potential service disruptions that could impact your customers' experience.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-67511
(9.7 CRITICAL)

EPSS: 0.12%

updated 2025-12-11T17:22:16

2 posts

### Summary A command injection vulnerability is present in the function tool `run_ssh_command_with_credentials()` available to AI agents. ### Details This is the source code of the function tool `run_ssh_command_with_credentials()` ([code](https://github.com/aliasrobotics/cai/blob/0.5.9/src/cai/tools/command_and_control/sshpass.py#L20)): ```python @function_tool def run_ssh_command_with_crede

oversecurity@mastodon.social at 2026-02-24T17:53:39.000Z ##

CVE-2025-67511: Tricking a Security AI Agent Into Pwning Itself

Hacktive Security - Advanced Cyber Security Services

🔗️ [Hacktivesecurity] link.is.it/PaW4AT

##

oversecurity@mastodon.social at 2026-02-24T17:53:39.000Z ##

CVE-2025-67511: Tricking a Security AI Agent Into Pwning Itself

Hacktive Security - Advanced Cyber Security Services

🔗️ [Hacktivesecurity] link.is.it/PaW4AT

##

CVE-2023-46604
(10.0 CRITICAL)

EPSS: 94.44%

updated 2025-11-04T16:41:16.217000

2 posts

The Java OpenWire protocol marshaller is vulnerable to Remote Code Execution. This vulnerability may allow a remote attacker with network access to either a Java-based OpenWire broker or client to run arbitrary shell commands by manipulating serialized class types in the OpenWire protocol to cause either the client or the broker (respectively) to instantiate any class on the classpath. Users

Nuclei template

33 repos

https://github.com/CCIEVoice2009/CVE-2023-46604

https://github.com/infokek/activemq-honeypot

https://github.com/fiza-naeem0902/Vulnerability-Assessment

https://github.com/SaumyajeetDas/CVE-2023-46604-RCE-Reverse-Shell-Apache-ActiveMQ

https://github.com/tomasmussi/activemq-cve-2023-46604

https://github.com/thinkycx/activemq-rce-cve-2023-46604

https://github.com/stegano5/ExploitScript-CVE-2023-46604

https://github.com/cuanh2333/CVE-2023-46604

https://github.com/vjayant93/CVE-2023-46604-POC

https://github.com/trganda/ActiveMQ-RCE

https://github.com/minhangxiaohui/ActiveMQ_CVE-2023-46604

https://github.com/vaishnavucv/Project-Vuln-Detection-N-Mitigation_101

https://github.com/Anekant-Singhai/Exploits

https://github.com/evkl1d/CVE-2023-46604

https://github.com/duck-sec/CVE-2023-46604-ActiveMQ-RCE-pseudoshell

https://github.com/justdoit-cai/CVE-2023-46604-Apache-ActiveMQ-RCE-exp

https://github.com/dcm2406/CVE-Lab

https://github.com/skrkcb2/CVE-2023-46604

https://github.com/pulentoski/CVE-2023-46604

https://github.com/nitzanoligo/CVE-2023-46604-demo

https://github.com/mranv/honeypot.rs

https://github.com/NKeshawarz/CVE-2023-46604-RCE

https://github.com/Arlenhiack/ActiveMQ-RCE-Exploit

https://github.com/ImuSpirit/ActiveMQ_RCE_Pro_Max

https://github.com/pavanaa4k/CVE-2023-46604-LAB

https://github.com/Mudoleto/Broker_ApacheMQ

https://github.com/dcm2406/CVE-2023-46604

https://github.com/vulncheck-oss/cve-2023-46604

https://github.com/mrpentst/CVE-2023-46604

https://github.com/hh-hunter/cve-2023-46604

https://github.com/LiritoShawshark/CVE-2023-46604_ActiveMQ_RCE_Recurrence

https://github.com/h3x3h0g/ActiveMQ-RCE-CVE-2023-46604-Write-up

https://github.com/RockyDesigne/SSP-Assignment-3-RCEYouLater

VirusBulletin at 2026-02-24T11:11:59.582Z ##

The DFIR Report documents the exploitation of an unpatched ActiveMQ server by CVE-2023-46604. The threat actor used Metasploit tooling for privilege escalation, LSASS access and lateral movement, before LockBit was deployed via RDP using stolen credentials. thedfirreport.com/2026/02/23/a

##

VirusBulletin@infosec.exchange at 2026-02-24T11:11:59.000Z ##

The DFIR Report documents the exploitation of an unpatched ActiveMQ server by CVE-2023-46604. The threat actor used Metasploit tooling for privilege escalation, LSASS access and lateral movement, before LockBit was deployed via RDP using stolen credentials. thedfirreport.com/2026/02/23/a

##

CVE-2025-59201
(7.8 HIGH)

EPSS: 0.10%

updated 2025-10-14T18:30:36

2 posts

Improper access control in Network Connection Status Indicator (NCSI) allows an authorized attacker to elevate privileges locally.

itm4n at 2026-02-24T20:12:05.679Z ##

It's a blog post I should have published months ago, but here we finally are.

"CVE-2025-59201 - Network Connection Status Indicator (NCSI) EoP"

Credit goes to t0zhang (on X) for the discovery.

👉 itm4n.github.io/cve-2025-59201

I'd like to write more of those but it's so time-consuming. 😔

##

itm4n@infosec.exchange at 2026-02-24T20:12:05.000Z ##

It's a blog post I should have published months ago, but here we finally are.

"CVE-2025-59201 - Network Connection Status Indicator (NCSI) EoP"

Credit goes to t0zhang (on X) for the discovery.

👉 itm4n.github.io/cve-2025-59201

I'd like to write more of those but it's so time-consuming. 😔

#cve #windows

##

CVE-2025-8277
(3.1 LOW)

EPSS: 0.05%

updated 2025-09-09T12:30:49

1 posts

A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.

linux@activitypub.awakari.com at 2026-02-23T20:21:54.000Z ## Ubuntu 20.04 LTS libssh Important DDoS Risks USN-8051-2 CVE-2025-8277 Several security issues were fixed in libssh.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-47943
(6.3 MEDIUM)

EPSS: 0.05%

updated 2025-07-30T17:45:41

2 posts

### Summary A stored XSS is present in Gogs which allows client-side Javascript code execution. ### Details Gogs Version: ``` docker images REPOSITORY TAG IMAGE ID CREATED SIZE gogs/gogs latest fe92583bc4fe 10 hours ago 99.3MB ``` Application version: `0.14.0+dev` Local setup using: ```bash # Pull image from Docker Hub. docker pull gogs/gogs # Create local dire

oversecurity@mastodon.social at 2026-02-24T17:52:18.000Z ##

CVE-2025-47943: Stored XSS in Gogs via PDF

Hacktive Security - Advanced Cyber Security Services

🔗️ [Hacktivesecurity] link.is.it/5Dz9cj

##

oversecurity@mastodon.social at 2026-02-24T17:52:18.000Z ##

CVE-2025-47943: Stored XSS in Gogs via PDF

Hacktive Security - Advanced Cyber Security Services

🔗️ [Hacktivesecurity] link.is.it/5Dz9cj

##

CVE-2025-0037
(6.6 MEDIUM)

EPSS: 0.03%

updated 2025-06-10T00:30:36

2 posts

In AMD Versal Adaptive SoC devices, the lack of address validation when executing PLM runtime services through the PLM firmware can allow access to isolated or protected memory spaces, resulting in the loss of integrity and confidentiality.

AAKL at 2026-02-24T17:04:48.489Z ##

Two advisories from AMD, one new, one updated:

-  CVE-2025-0037: Versal Adaptive SoC –Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

- CVE-2023-31364: Guest Initiated Machine Check Errors amd.com/en/resources/product-s

Two new ones from NVIDIA:

- CVE-2025-33179, CVE-2025-33180, and CVE-2025-33181: NVIDIA Cumulus Linux and NVOS - February 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24241: NVIDIA License System - February 2026 nvidia.custhelp.com/app/answer

##

AAKL@infosec.exchange at 2026-02-24T17:04:48.000Z ##

Two advisories from AMD, one new, one updated:

-  CVE-2025-0037: Versal Adaptive SoC –Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

- CVE-2023-31364: Guest Initiated Machine Check Errors amd.com/en/resources/product-s

Two new ones from NVIDIA:

- CVE-2025-33179, CVE-2025-33180, and CVE-2025-33181: NVIDIA Cumulus Linux and NVOS - February 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24241: NVIDIA License System - February 2026 nvidia.custhelp.com/app/answer #Nvidia #infosec #AMD #vulnerability #Linux

##

CVE-2025-47809
(8.2 HIGH)

EPSS: 0.02%

updated 2025-05-16T14:42:18.700000

1 posts

Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import Lic

certvde@infosec.exchange at 2026-02-23T07:36:39.000Z ##

#OT #Advisory VDE-2026-007
TRUMPF: Multiple products affected by Wibu CodeMeter vulnerability

The TRUMPF product versions listed below include a Wibu CodeMeter component that is vulnerable to a privilege escalation vulnerability through the CodeMeter installer on Windows.
#CVE CVE-2025-47809

certvde.com/en/advisories/vde-

#CSAF trumpf.csaf-tp.certvde.com/.we

##

CVE-2025-25362
(9.8 CRITICAL)

EPSS: 0.45%

updated 2025-04-02T13:15:44.063000

2 posts

A Server-Side Template Injection (SSTI) vulnerability in Spacy-LLM v0.7.2 allows attackers to execute arbitrary code via injecting a crafted payload into the template field.

oversecurity@mastodon.social at 2026-02-24T17:51:13.000Z ##

CVE-2025-25362: Old Vulnerabilities, New Victims – Breaking LLM Prompts with SSTI

Hacktive Security - Advanced Cyber Security Services

🔗️ [Hacktivesecurity] link.is.it/4bUqcZ

##

oversecurity@mastodon.social at 2026-02-24T17:51:13.000Z ##

CVE-2025-25362: Old Vulnerabilities, New Victims – Breaking LLM Prompts with SSTI

Hacktive Security - Advanced Cyber Security Services

🔗️ [Hacktivesecurity] link.is.it/4bUqcZ

##

CVE-2023-31364
(0 None)

EPSS: 0.00%

2 posts

N/A

AAKL at 2026-02-24T17:04:48.489Z ##

Two advisories from AMD, one new, one updated:

-  CVE-2025-0037: Versal Adaptive SoC –Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

- CVE-2023-31364: Guest Initiated Machine Check Errors amd.com/en/resources/product-s

Two new ones from NVIDIA:

- CVE-2025-33179, CVE-2025-33180, and CVE-2025-33181: NVIDIA Cumulus Linux and NVOS - February 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24241: NVIDIA License System - February 2026 nvidia.custhelp.com/app/answer

##

AAKL@infosec.exchange at 2026-02-24T17:04:48.000Z ##

Two advisories from AMD, one new, one updated:

-  CVE-2025-0037: Versal Adaptive SoC –Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

- CVE-2023-31364: Guest Initiated Machine Check Errors amd.com/en/resources/product-s

Two new ones from NVIDIA:

- CVE-2025-33179, CVE-2025-33180, and CVE-2025-33181: NVIDIA Cumulus Linux and NVOS - February 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24241: NVIDIA License System - February 2026 nvidia.custhelp.com/app/answer #Nvidia #infosec #AMD #vulnerability #Linux

##

CVE-2026-27202
(0 None)

EPSS: 0.06%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-24T16:07:07.000Z ##

🟠 CVE-2026-27202 - High (7.5)

GetSimple CMS is a content management system. All versions of GetSimple CMS have a flaw in the Uploaded Files feature that allows for arbitrary file reads. This issue has not been fixed at the time of publication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T16:07:07.000Z ##

🟠 CVE-2026-27202 - High (7.5)

GetSimple CMS is a content management system. All versions of GetSimple CMS have a flaw in the Uploaded Files feature that allows for arbitrary file reads. This issue has not been fixed at the time of publication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67733
(0 None)

EPSS: 0.02%

2 posts

N/A

1 repos

https://github.com/JYlab/CVE-2025-67733

thehackerwire@mastodon.social at 2026-02-23T20:32:34.000Z ##

🟠 CVE-2025-67733 - High (8.5)

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or ret...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:30:36.000Z ##

🟠 CVE-2025-67733 - High (8.5)

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or ret...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27623
(0 None)

EPSS: 0.06%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-23T20:32:24.000Z ##

🟠 CVE-2026-27623 - High (7.5)

Valkey is a distributed key-value database. Starting in version 9.0.0 and prior to version 9.0.3, a malicious actor with network access to Valkey can cause the system to abort by triggering an assertion. When processing incoming requests, the Valk...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:30:26.000Z ##

🟠 CVE-2026-27623 - High (7.5)

Valkey is a distributed key-value database. Starting in version 9.0.0 and prior to version 9.0.3, a malicious actor with network access to Valkey can cause the system to abort by triggering an assertion. When processing incoming requests, the Valk...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27470
(0 None)

EPSS: 0.03%

1 posts

N/A

1 repos

https://github.com/kocaemre/CVE-2026-27470

thehackerwire@mastodon.social at 2026-02-21T08:17:17.000Z ##

🟠 CVE-2026-27470 - High (8.8)

ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvent...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27452
(0 None)

EPSS: 0.04%

1 posts

N/A

offseq@infosec.exchange at 2026-02-21T07:30:34.000Z ##

🛡️ CRITICAL: CVE-2026-27452 in JonathanWilbur asn1-ts (<=11.0.5) — Decoding INTEGERs may leak ArrayBuffer, exposing sensitive data. Upgrade to 11.0.6 urgently. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Security #CVE202627452

##

CVE-2026-27168
(0 None)

EPSS: 0.02%

3 posts

N/A

offseq@infosec.exchange at 2026-02-21T03:00:28.000Z ##

⚠️ CVE-2026-27168: HIGH severity heap overflow in HappySeaFox sail (≤0.9.10). Remote code execution possible via crafted XWD files — no patch yet. Audit, block untrusted XWDs, and monitor! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #HappySeaFox #CyberAlert

##

thehackerwire@mastodon.social at 2026-02-21T00:19:57.000Z ##

🟠 CVE-2026-27168 - High (8.8)

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:14.000Z ##

🟠 CVE-2026-27168 - High (8.8)

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites