## Updated at UTC 2026-03-06T03:41:29.180174

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-3544 8.8 0.03% 2 0 2026-03-06T00:32:36 Heap buffer overflow in WebCodecs in Google Chrome prior to 145.0.7632.159 allow
CVE-2026-3437 7.8 0.01% 1 0 2026-03-06T00:32:32 An Improper Restriction of Operations within the Bounds of a Memory Buffer vulne
CVE-2026-22552 9.4 0.00% 3 0 2026-03-06T00:16:10.347000 WebSocket endpoints lack proper authentication mechanisms, enabling attackers to
CVE-2026-21536 9.8 0.00% 2 0 2026-03-05T23:16:18.447000 Microsoft Devices Pricing Program Remote Code Execution Vulnerability
CVE-2026-29054 7.5 0.00% 2 0 2026-03-05T22:37:27 ## Impact There is a potential vulnerability in Traefik managing the `Connectio
CVE-2026-26999 7.5 0.00% 4 0 2026-03-05T22:29:01 ## Impact There is a potential vulnerability in Traefik managing TLS handshake
CVE-2026-26022 8.7 0.00% 2 0 2026-03-05T22:28:36 ### Summary A Stored Cross-site Scripting (XSS) vulnerability exists in the comm
CVE-2026-28474 9.8 0.00% 2 0 2026-03-05T22:16:21.423000 OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matc
CVE-2026-28289 10.0 0.04% 2 1 2026-03-05T22:16:15.213000 FreeScout is a free help desk and shared inbox built with PHP's Laravel framewor
CVE-2026-3545 9.6 0.03% 2 0 2026-03-05T21:57:27.147000 Insufficient data validation in Navigation in Google Chrome prior to 145.0.7632.
CVE-2026-3540 8.8 0.03% 2 0 2026-03-05T21:56:46.790000 Inappropriate implementation in WebAudio in Google Chrome prior to 145.0.7632.15
CVE-2026-28115 9.3 0.02% 2 0 2026-03-05T21:31:51 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-24457 9.1 0.00% 2 0 2026-03-05T21:30:57 An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read ar
CVE-2026-3009 8.1 0.00% 2 0 2026-03-05T21:30:57 A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak a
CVE-2026-3459 8.1 0.00% 2 0 2026-03-05T21:30:54 The Drag and Drop Multiple File Upload - Contact Form 7 plugin for WordPress is
CVE-2025-40931 9.1 0.02% 2 0 2026-03-05T21:30:39 Apache::Session::Generate::MD5 versions through 1.94 for Perl create insecure se
CVE-2026-1605 7.5 0.04% 1 0 2026-03-05T21:28:00 ### Description (as reported) There is a memory leak when using `GzipHandler` i
CVE-2026-2835 None 0.05% 1 0 2026-03-05T20:56:22 ### Impact Pingora versions prior to 0.8.0 improperly allowed HTTP/1.0 request b
CVE-2026-2833 None 0.05% 1 0 2026-03-05T20:55:30 ### Impact Pingora versions prior to 0.8.0 would immediately forward bytes follo
CVE-2026-25673 7.5 0.10% 1 0 2026-03-05T20:31:31 An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4
CVE-2026-3047 8.8 0.00% 2 0 2026-03-05T20:16:17.137000 A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion
CVE-2023-43000 8.8 0.05% 8 0 2026-03-05T20:16:09.657000 A use-after-free issue was addressed with improved memory management. This issue
CVE-2023-41974 7.8 0.31% 8 0 2026-03-05T20:16:09.293000 A use-after-free issue was addressed with improved memory management. This issue
CVE-2021-30952 7.8 0.33% 8 0 2026-03-05T20:16:08.867000 An integer overflow was addressed with improved input validation. This issue is
CVE-2021-22681 9.8 0.18% 6 0 2026-03-05T20:16:08.583000 Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogi
CVE-2017-7921 9.8 94.10% 6 25 template 2026-03-05T20:16:08.180000 An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Serie
CVE-2026-20101 8.6 0.10% 2 0 2026-03-05T19:39:11.967000 A vulnerability in the SAML 2.0 single sign-on (SSO) feature of Cisco Secure Fir
CVE-2025-70219 9.8 0.02% 2 0 2026-03-05T19:39:11.967000 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the goform/formD
CVE-2026-20103 8.6 0.05% 2 0 2026-03-05T19:39:11.967000 A vulnerability in the Remote Access SSL VPN functionality of Cisco Secure Firew
CVE-2026-20131 10.0 0.44% 6 0 2026-03-05T19:39:11.967000 A vulnerability in the web-based management interface of Cisco Secure Firewall M
CVE-2026-0847 8.6 0.19% 1 0 2026-03-05T19:39:11.967000 A vulnerability in NLTK versions up to and including 3.9.2 allows arbitrary file
CVE-2025-70223 9.8 0.04% 1 0 2026-03-05T19:39:11.967000 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2026-20100 7.7 0.15% 2 0 2026-03-05T19:39:11.967000 A vulnerability in the LUA interperter of the Remote Access SSL VPN feature of C
CVE-2025-40926 9.8 0.02% 2 0 2026-03-05T19:38:53.383000 Plack::Middleware::Session::Simple versions through 0.04 for Perl generates sess
CVE-2025-70222 9.8 0.02% 2 0 2026-03-05T19:38:53.383000 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2025-68553 9.9 0.02% 2 0 2026-03-05T19:38:53.383000 Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Lend
CVE-2025-54001 9.8 0.02% 2 0 2026-03-05T19:38:53.383000 Deserialization of Untrusted Data vulnerability in ThemeREX Classter classter al
CVE-2025-69340 7.5 0.02% 2 0 2026-03-05T19:38:53.383000 Missing Authorization vulnerability in BuddhaThemes WeDesignTech Ultimate Bookin
CVE-2026-27803 8.3 0.04% 2 0 2026-03-05T19:38:53.383000 Vaultwarden is an unofficial Bitwarden compatible server written in Rust, former
CVE-2026-27802 8.3 0.04% 1 0 2026-03-05T19:38:53.383000 Vaultwarden is an unofficial Bitwarden compatible server written in Rust, former
CVE-2026-25921 9.3 0.00% 2 0 2026-03-05T19:38:33.877000 Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwri
CVE-2026-27944 9.8 0.00% 4 0 2026-03-05T19:38:33.877000 Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.
CVE-2026-28119 8.1 0.05% 2 0 2026-03-05T19:38:33.877000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-28124 8.1 0.05% 2 0 2026-03-05T19:38:33.877000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-28129 8.1 0.05% 2 0 2026-03-05T19:38:33.877000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-28128 8.1 0.05% 2 0 2026-03-05T19:38:33.877000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-28125 8.1 0.05% 2 0 2026-03-05T19:38:33.877000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-28134 8.5 0.03% 2 0 2026-03-05T19:38:33.877000 Improper Control of Generation of Code ('Code Injection') vulnerability in Croco
CVE-2026-1720 8.8 0.00% 2 0 2026-03-05T19:38:33.877000 The WowOptin: Next-Gen Popup Maker – Create Stunning Popups and Optins for Lead
CVE-2026-2599 9.8 0.00% 2 1 2026-03-05T19:38:33.877000 The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress i
CVE-2026-29053 7.6 0.05% 1 0 2026-03-05T19:38:33.877000 Ghost is a Node.js content management system. From version 0.7.2 to 6.19.0, spec
CVE-2026-1678 9.4 0.04% 1 0 2026-03-05T19:38:33.877000 dns_unpack_name() caches the buffer tailroom once and reuses it while appending
CVE-2025-70226 9.8 0.02% 2 0 2026-03-05T18:32:44 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2025-70225 9.8 0.02% 2 0 2026-03-05T18:32:44 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curtime para
CVE-2025-66944 9.8 0.04% 2 0 2026-03-05T18:32:43 SQL Injection vulnerability in vran-dev databaseir v.1.0.7 and before allows a r
CVE-2025-70218 9.8 0.02% 2 0 2026-03-05T18:32:43 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via POST to the gofo
CVE-2025-46108 9.8 0.02% 2 0 2026-03-05T18:32:43 D-link Dir-513 A1FW110 is vulnerable to Buffer Overflow in the function formTcpi
CVE-2025-70221 9.8 0.02% 2 0 2026-03-05T18:32:43 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2025-69338 9.3 0.02% 2 0 2026-03-05T18:32:43 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-68555 10.0 0.02% 2 0 2026-03-05T18:32:43 Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Nutr
CVE-2026-28117 8.1 0.05% 2 0 2026-03-05T18:32:43 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22891 9.8 0.10% 1 0 2026-03-05T18:15:20.593000 A heap-based buffer overflow vulnerability exists in the Intan CLP parsing funct
CVE-2026-26478 9.8 0.39% 1 0 2026-03-05T18:13:33.993000 A shell command injection vulnerability in Mobvoi Tichome Mini smart speaker 012
CVE-2026-26673 7.5 0.11% 2 0 2026-03-05T18:05:02.300000 An issue in DJI Mavic Mini, Spark, Mavic Air, Mini, Mini SE 0.1.00.0500 and belo
CVE-2026-27971 9.8 0.06% 1 0 2026-03-05T17:57:37.233000 Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable
CVE-2026-24113 9.8 0.04% 1 0 2026-03-05T16:16:15.673000 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit t
CVE-2025-59786 9.8 0.04% 2 0 2026-03-05T15:31:38 2N Access Commander version 3.4.2 and prior improperly invalidates session token
CVE-2025-69411 7.5 0.02% 2 0 2026-03-05T15:30:36 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v
CVE-2026-28121 8.1 0.05% 2 0 2026-03-05T15:30:36 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-28123 8.1 0.05% 2 0 2026-03-05T15:30:36 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-29045 7.5 0.03% 1 0 2026-03-05T15:26:34 ## Summary When using `serveStatic` together with route-based middleware protec
CVE-2025-66678 9.8 0.02% 2 1 2026-03-05T15:16:10.817000 An issue in the HwRwDrv.sys component of Nil Hardware Editor Hardware Read & Wri
CVE-2026-3204 9.8 0.04% 1 0 2026-03-05T15:04:34.670000 Improper input validation in the error message page in Devolutions Server 2025.
CVE-2026-2590 9.8 0.01% 2 0 2026-03-05T15:01:54.737000 Improper enforcement of the Disable password saving in vaults setting in the c
CVE-2026-21628 None 0.21% 1 0 2026-03-05T12:30:36 A improperly secured file management feature allows uploads of dangerous data ty
CVE-2026-1321 8.1 0.07% 1 0 2026-03-05T09:30:40 The Membership Plugin – Restrict Content plugin for WordPress is vulnerable to P
CVE-2026-28536 9.7 0.01% 2 0 2026-03-05T09:30:40 Authentication bypass vulnerability in the device authentication module. Impact:
CVE-2026-29127 None 0.01% 1 0 2026-03-05T06:31:28 The IDC SFX2100 Satellite Receiver sets overly permissive file system permission
CVE-2026-29128 None 0.01% 1 0 2026-03-05T06:30:38 IDC SFX2100 Satellite Receiver firmware ships with multiple daemon configuration
CVE-2026-29120 0 0.01% 1 0 2026-03-05T06:16:50.720000 The /root/anaconda-ks.cfg installation configuration file in International Datac
CVE-2026-26034 7.8 0.02% 1 0 2026-03-05T03:31:34 UPS Multi-UPS Management Console (MUMC) version 01.06.0001 (A03) contains an Inc
CVE-2026-29000 10.0 0.24% 5 1 2026-03-05T00:31:17 pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication by
CVE-2026-24848 9.9 0.21% 1 0 2026-03-04T21:58:33.060000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2026-24898 10.0 0.19% 1 0 2026-03-04T21:57:13.603000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2026-25146 9.6 0.04% 1 0 2026-03-04T21:56:00.543000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2025-70236 9.8 0.05% 1 0 2026-03-04T21:33:52 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2026-3539 8.8 0.01% 1 0 2026-03-04T21:32:57 Object lifecycle issue in DevTools in Google Chrome prior to 145.0.7632.159 allo
CVE-2025-70220 9.8 0.04% 1 0 2026-03-04T21:32:45 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2026-20122 5.4 0.04% 2 0 2026-03-04T21:25:22.193000 A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authe
CVE-2025-70241 9.8 0.06% 1 0 2026-03-04T21:16:03.260000 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2025-70239 9.8 0.06% 1 0 2026-03-04T21:16:03.077000 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2026-2256 6.5 1.80% 1 1 2026-03-04T21:14:09 A Command Injection vulnerability in ModelScope's MS-Agent versions v1.6.0rc1 an
CVE-2026-3130 9.8 0.02% 1 0 2026-03-04T20:36:33.843000 Improper Enforcement of Behavioral Controls in Devolutions Server 2025.3.15 and
CVE-2026-28518 7.8 0.01% 1 0 2026-03-04T20:25:41 OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path tra
CVE-2025-59059 9.8 0.29% 2 0 2026-03-04T20:17:03 Remote Code Execution Vulnerability in NashornScriptEngineCreator is reported in
CVE-2026-28697 None 0.28% 2 0 2026-03-04T18:39:04 ## Summary An authenticated administrator can achieve Remote Code Execution (RC
CVE-2026-2025 7.5 0.02% 1 9 2026-03-04T18:32:57 The Mail Mint WordPress plugin before 1.19.5 does not have authorization in one
CVE-2025-70341 7.8 0.02% 2 1 2026-03-04T18:32:57 Insecure permissions in App-Auto-Patch v3.4.2 create a race condition which allo
CVE-2026-20079 10.0 0.18% 6 1 2026-03-04T18:32:03 A vulnerability in the web interface of Cisco Secure Firewall Management Center
CVE-2026-20049 7.7 0.14% 2 0 2026-03-04T18:32:03 A vulnerability in the processing of Galois/Counter Mode (GCM)-encrypted Interne
CVE-2026-20105 7.7 0.08% 1 0 2026-03-04T18:32:03 A vulnerability in the Remote Access SSL VPN functionality of Cisco Secure Firew
CVE-2026-20082 8.6 0.11% 2 0 2026-03-04T18:32:02 A vulnerability in the handling of the embryonic connection limits in Cisco Secu
CVE-2026-20002 8.1 0.03% 2 0 2026-03-04T18:32:02 A vulnerability in the web-based management interface of Cisco Secure FMC Softwa
CVE-2026-20039 8.6 0.12% 2 0 2026-03-04T18:32:02 A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security
CVE-2026-20014 7.7 0.14% 1 0 2026-03-04T18:32:02 A vulnerability in the IKEv2 feature of Cisco Secure Firewall ASA Software and C
CVE-2026-26514 7.5 0.12% 2 0 2026-03-04T18:32:02 An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e.
CVE-2025-70237 9.8 0.06% 1 0 2026-03-04T18:31:51 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2025-70240 9.8 0.06% 1 0 2026-03-04T18:31:51 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2025-70234 9.8 0.06% 1 0 2026-03-04T18:31:51 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2026-21385 7.8 0.34% 6 1 2026-03-04T18:13:00.207000 Memory corruption while using alignments for memory allocation.
CVE-2025-66945 9.1 0.12% 1 0 2026-03-04T17:50:01.217000 A path traversal vulnerability exists in the ZIP extraction API of Zdir Pro 4.x.
CVE-2025-62814 7.5 0.04% 1 0 2026-03-04T17:40:21.317000 An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 148
CVE-2026-3224 9.8 0.05% 3 1 2026-03-04T15:31:42 Authentication bypass in the Microsoft Entra ID (Azure AD) authentication mode i
CVE-2025-66363 7.5 0.04% 1 0 2026-03-04T15:31:37 An issue was discovered in LBS in Samsung Mobile Processor Exynos 2200. There wa
CVE-2026-22719 8.1 7.35% 6 0 2026-03-04T15:08:13.743000 VMware Aria Operations contains a command injection vulnerability. A malicious u
CVE-2026-3485 9.8 0.33% 2 0 2026-03-04T14:07:42.520000 A flaw has been found in D-Link DIR-868L 110b03. This affects the function sub_1
CVE-2026-3094 7.8 0.01% 1 0 2026-03-04T09:31:14 Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file.
CVE-2026-27932 7.5 0.03% 1 0 2026-03-04T02:00:50 # Summary A resource exhaustion vulnerability in joserfc allows an unauthentic
CVE-2026-26279 9.1 0.23% 1 0 2026-03-04T02:00:01 ## Summary A typo in Froxlor's input validation code (`==` instead of `=`) comp
CVE-2025-52365 7.8 0.09% 1 0 2026-03-03T21:52:29.877000 A command injection vulnerability in the szc script of the ccurtsinger/stabilize
CVE-2025-69765 7.5 0.25% 1 0 2026-03-03T21:32:19 Tenda AX3 firmware v16.03.12.11 contains a stack overflow in formGetIptv functio
CVE-2026-0032 7.8 0.01% 2 0 2026-03-03T21:32:19 In multiple functions of mem_protect.c, there is a possible out-of-bounds write
CVE-2026-24502 8.8 0.01% 1 0 2026-03-03T21:31:24 Dell Command | Intel vPro Out of Band, versions prior to 4.7.0, contain an Uncon
CVE-2025-70252 7.5 0.04% 1 0 2026-03-03T20:16:44.803000 An issue was discovered in /goform/WifiWpsStart in Tenda AC6V2.0 V15.03.06.23_mu
CVE-2026-0029 8.4 0.01% 1 0 2026-03-03T19:39:28.533000 In __pkvm_init_vm of pkvm.c, there is a possible memory corruption due to a logi
CVE-2025-48645 7.8 0.01% 1 0 2026-03-03T19:23:29.340000 In loadDescription of DeviceAdminInfo.java, there is a possible persistent packa
CVE-2026-28399 8.8 0.05% 1 0 2026-03-03T19:02:04.290000 NocoDB is software for building databases as spreadsheets. Prior to version 0.30
CVE-2025-50199 9.1 0.05% 1 0 2026-03-03T18:47:26.910000 Chamilo is a learning management system. Prior to version 1.11.30, there is a bl
CVE-2026-0017 7.7 0.01% 1 0 2026-03-03T18:40:59.027000 In onChange of BiometricService.java, there is a possible way to enable fingerpr
CVE-2026-24112 9.8 0.04% 1 0 2026-03-03T18:32:36 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit t
CVE-2025-48605 8.4 0.01% 1 0 2026-03-03T18:32:35 In multiple functions of KeyguardViewMediator.java, there is a possible lockscre
CVE-2025-48654 7.8 0.01% 1 0 2026-03-03T18:32:35 In onStart of CompanionDeviceManagerService.java, there is a possible confused d
CVE-2025-48635 7.7 0.01% 1 0 2026-03-03T18:32:34 In multiple functions of TaskFragmentOrganizerController.java, there is a possib
CVE-2026-20777 8.1 0.10% 1 0 2026-03-03T18:31:33 A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing fun
CVE-2025-48613 7.8 0.01% 1 0 2026-03-03T18:31:32 In VBMeta, there is a possible way to modify and resign VBMeta using a test key,
CVE-2026-0011 8.4 0.01% 1 0 2026-03-03T18:31:32 In enableSystemPackageLPw of Settings.java, there is a possible way to prevent l
CVE-2025-48653 7.8 0.01% 1 0 2026-03-03T18:31:32 In loadDataAndPostValue of multiple files, there is a possible way to obscure pe
CVE-2026-24115 9.8 0.04% 1 0 2026-03-03T18:31:31 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the
CVE-2025-48602 8.4 0.01% 1 0 2026-03-03T18:31:31 In exitKeyguardAndFinishSurfaceBehindRemoteAnimation of KeyguardViewMediator.jav
CVE-2026-24114 9.8 0.04% 1 0 2026-03-03T18:31:30 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate `pP
CVE-2026-24111 9.8 0.04% 1 0 2026-03-03T18:31:29 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit t
CVE-2026-24109 9.8 0.04% 1 0 2026-03-03T18:31:29 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit t
CVE-2025-48609 9.1 0.04% 1 0 2026-03-03T18:13:43.183000 In multiple functions of MmsProvider.java, there is a possible way to arbitraril
CVE-2025-48619 8.4 0.01% 1 0 2026-03-03T18:13:02.407000 In multiple functions of ContentProvider.java, there is a possible way for an ap
CVE-2026-27012 9.8 0.03% 2 0 2026-03-03T17:43:50 ### Summary A privilege escalation and authentication bypass vulnerability in Op
CVE-2026-0010 8.4 0.01% 1 0 2026-03-03T16:16:19.067000 In onTransact of IDrmManagerService.cpp, there is a possible out of bounds write
CVE-2026-0025 7.8 0.01% 2 0 2026-03-03T15:31:40 In hasImage of Notification.java, there is a possible way to reveal information
CVE-2026-21902 9.8 0.28% 5 1 2026-03-03T15:31:37 An Incorrect Permission Assignment for Critical Resource vulnerability in the On
CVE-2026-20423 7.1 0.01% 1 0 2026-03-03T15:31:36 In wlan STA driver, there is a possible out of bounds write due to a missing bou
CVE-2026-24105 9.8 0.29% 1 0 2026-03-03T15:16:18.907000 An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.1
CVE-2026-1492 9.8 0.07% 3 0 2026-03-03T06:31:14 The User Registration & Membership – Custom Registration Form Builder, Custom Lo
CVE-2026-23600 None 0.20% 1 0 2026-03-02T15:31:31 A remote authentication bypass vulnerability  exists in HPE AutoPass License S
CVE-2026-27884 5.3 0.03% 2 0 2026-02-27T14:06:59.787000 NetExec is a network execution tool. Prior to version 1.5.1, the module spider_p
CVE-2026-3102 6.3 0.20% 2 0 2026-02-26T21:32:34 A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affe
CVE-2026-2781 9.8 0.04% 1 0 2026-02-26T21:28:58.090000 Integer overflow in the Libraries component in NSS. This vulnerability affects F
CVE-2026-20127 10.0 2.60% 3 4 2026-02-26T16:20:02.187000 A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controlle
CVE-2026-27636 8.8 0.34% 1 1 2026-02-26T16:07:11.047000 FreeScout is a free help desk and shared inbox built with PHP's Laravel framewor
CVE-2026-20128 7.6 0.02% 2 0 2026-02-25T18:31:45 A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-
CVE-2026-20126 8.8 0.04% 2 0 2026-02-25T18:31:44 A vulnerability in Cisco Catalyst SD-WAN Manager could allow an authenticated, l
CVE-2026-24061 9.8 81.03% 1 63 template 2026-02-11T15:40:42.937000 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "
CVE-2026-21524 7.4 0.06% 1 0 2026-01-23T00:31:24 Exposure of sensitive information to an unauthorized actor in Azure Data Explore
CVE-2025-38617 4.7 0.00% 2 0 2026-01-07T18:30:21 In the Linux kernel, the following vulnerability has been resolved: net/packet:
CVE-2025-14500 9.8 1.29% 2 0 2025-12-29T15:58:56.260000 IceWarp14 X-File-Operation Command Injection Remote Code Execution Vulnerability
CVE-2025-59718 9.8 1.97% 1 2 2025-12-16T21:30:51 A improper verification of cryptographic signature vulnerability in Fortinet For
CVE-2025-23299 6.7 0.02% 1 0 2025-10-22T18:30:45 NVIDIA Bluefield and ConnectX contain a vulnerability in the management interfac
CVE-2025-0282 9.1 94.19% 2 10 template 2025-10-22T00:34:17 A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5,
CVE-2025-55315 9.9 0.36% 1 7 2025-10-21T21:04:55 # Microsoft Security Advisory CVE-2025-55315: .NET Security Feature Bypass Vulne
CVE-2025-59536 None 0.04% 2 0 2025-10-03T14:16:36 Due to a bug in the startup trust dialog implementation, Claude Code could be tr
CVE-2026-28435 0 0.04% 1 0 N/A
CVE-2025-69969 0 0.03% 1 0 N/A
CVE-2025-50192 0 0.03% 1 0 N/A
CVE-2025-50190 0 0.03% 1 0 N/A
CVE-2025-50189 0 0.06% 1 0 N/A
CVE-2026-26266 0 0.03% 1 0 N/A
CVE-2025-52998 0 0.10% 1 0 N/A
CVE-2026-27826 0 0.00% 1 1 N/A
CVE-2026-27825 0 0.00% 1 1 N/A

CVE-2026-3544
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-06T00:32:36

2 posts

Heap buffer overflow in WebCodecs in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-05T14:48:53.000Z ##

🟠 CVE-2026-3544 - High (8.8)

Heap buffer overflow in WebCodecs in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T14:48:53.000Z ##

🟠 CVE-2026-3544 - High (8.8)

Heap buffer overflow in WebCodecs in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3437
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-06T00:32:32

1 posts

An Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Portwell Engineering Toolkits version 4.8.2 could allow a local authenticated attacker to read and write to arbitrary memory via the Portwell Engineering Toolkits driver. Successful exploitation of this vulnerability could result in escalation of privileges or cause a denial-of-service condition.

offseq@infosec.exchange at 2026-03-04T07:30:25.000Z ##

🚨 CVE-2026-3437 (CRITICAL, CVSS 9.3): Portwell Engineering Toolkits 4.8.2 lets local users escalate privileges or trigger DoS via memory access in driver. No patch yet — restrict local access, audit users, monitor! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #ICS #InfoSec

##

CVE-2026-22552
(9.4 CRITICAL)

EPSS: 0.00%

updated 2026-03-06T00:16:10.347000

3 posts

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this

offseq at 2026-03-06T00:00:46.683Z ##

⚠️ CRITICAL vuln in ePower epower.ie (all versions): Unauthenticated OCPP WebSocket endpoints allow station impersonation & backend manipulation. Privilege escalation risk is HIGH — patch or mitigate now! CVE-2026-22552 radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-06T00:00:46.000Z ##

⚠️ CRITICAL vuln in ePower epower.ie (all versions): Unauthenticated OCPP WebSocket endpoints allow station impersonation & backend manipulation. Privilege escalation risk is HIGH — patch or mitigate now! CVE-2026-22552 radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #EVCharging

##

beyondmachines1@infosec.exchange at 2026-03-04T16:01:11.000Z ##

CISA warns of multiple vulnerabilities in ePower EV charging stations

CISA warns of multiple vulnerabilities in ePower charging stations, including a critical authentication bypass (CVE-2026-22552), that allow unauthenticated attackers to hijack EV infrastructure and disrupt services.

**Make sure your ePower charging station is isolated from the internet and behind a firewall or VPN. Since the vendor has not released a patch that's your only defense until the vendor does something or you replace these systems.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-21536
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-05T23:16:18.447000

2 posts

Microsoft Devices Pricing Program Remote Code Execution Vulnerability

offseq at 2026-03-06T01:30:28.223Z ##

⚠️ CVE-2026-21536 (CRITICAL, CVSS 9.8): RCE in Microsoft Devices Pricing Program via unrestricted file upload (CWE-434). No patch — restrict uploads, monitor endpoints. High risk for enterprise. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-06T01:30:28.000Z ##

⚠️ CVE-2026-21536 (CRITICAL, CVSS 9.8): RCE in Microsoft Devices Pricing Program via unrestricted file upload (CWE-434). No patch — restrict uploads, monitor endpoints. High risk for enterprise. radar.offseq.com/threat/cve-20 #OffSeq #Microsoft #Vuln #RCE

##

CVE-2026-29054
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-05T22:37:27

2 posts

## Impact There is a potential vulnerability in Traefik managing the `Connection` header with `X-Forwarded` headers. When Traefik processes HTTP/1.1 requests, the protection put in place to prevent the removal of Traefik-managed `X-Forwarded` headers (such as `X-Real-Ip`, `X-Forwarded-Host`, `X-Forwarded-Port`, etc.) via the `Connection` header does not handle case sensitivity correctly. The `Co

thehackerwire@mastodon.social at 2026-03-05T19:17:41.000Z ##

🟠 CVE-2026-29054 - High (7.5)

Traefik is an HTTP reverse proxy and load balancer. From version 2.11.9 to 2.11.37 and from version 3.1.3 to 3.6.8, there is a potential vulnerability in Traefik managing the Connection header with X-Forwarded headers. When Traefik processes HTTP/...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T19:17:41.000Z ##

🟠 CVE-2026-29054 - High (7.5)

Traefik is an HTTP reverse proxy and load balancer. From version 2.11.9 to 2.11.37 and from version 3.1.3 to 3.6.8, there is a potential vulnerability in Traefik managing the Connection header with X-Forwarded headers. When Traefik processes HTTP/...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26999
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-05T22:29:01

4 posts

## Impact There is a potential vulnerability in Traefik managing TLS handshake on TCP routers. When Traefik processes a TLS connection on a TCP router, the read deadline used to bound protocol sniffing is cleared before the TLS handshake is completed. When a TLS handshake read error occurs, the code attempts a second handshake with different connection parameters, silently ignoring the initial e

thehackerwire@mastodon.social at 2026-03-05T19:20:49.000Z ##

🟠 CVE-2026-26999 - High (7.5)

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a potential vulnerability in Traefik managing TLS handshake on TCP routers. When Traefik processes a TLS connection on a TCP router, the read deadlin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T19:18:24.000Z ##

🟠 CVE-2026-26999 - High (7.5)

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a potential vulnerability in Traefik managing TLS handshake on TCP routers. When Traefik processes a TLS connection on a TCP router, the read deadlin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T19:20:49.000Z ##

🟠 CVE-2026-26999 - High (7.5)

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a potential vulnerability in Traefik managing TLS handshake on TCP routers. When Traefik processes a TLS connection on a TCP router, the read deadlin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T19:18:24.000Z ##

🟠 CVE-2026-26999 - High (7.5)

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.38 and 3.6.9, there is a potential vulnerability in Traefik managing TLS handshake on TCP routers. When Traefik processes a TLS connection on a TCP router, the read deadlin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26022
(8.7 HIGH)

EPSS: 0.00%

updated 2026-03-05T22:28:36

2 posts

### Summary A Stored Cross-site Scripting (XSS) vulnerability exists in the comment and issue description functionality. The application's HTML sanitizer explicitly allows `data:` URI schemes, enabling authenticated users to inject arbitrary JavaScript execution via malicious links. ### Details The vulnerability is located in `internal/markup/sanitizer.go`. The application uses the `bluemonday` H

thehackerwire@mastodon.social at 2026-03-05T19:18:37.000Z ##

🟠 CVE-2026-26022 - High (8.7)

Gogs is an open source self-hosted Git service. Prior to version 0.14.2, a stored cross-site scripting (XSS) vulnerability exists in the comment and issue description functionality. The application's HTML sanitizer explicitly allows data: URI sche...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T19:18:37.000Z ##

🟠 CVE-2026-26022 - High (8.7)

Gogs is an open source self-hosted Git service. Prior to version 0.14.2, a stored cross-site scripting (XSS) vulnerability exists in the comment and issue description functionality. The application's HTML sanitizer explicitly allows data: URI sche...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28474
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-05T22:16:21.423000

2 posts

OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matching on the mutable actor.name display name field for allowlist validation, allowing attackers to bypass DM and room allowlists. An attacker can change their Nextcloud display name to match an allowlisted user ID and gain unauthorized access to restricted conversations.

offseq at 2026-03-06T03:00:29.544Z ##

⚠️ CRITICAL: CVE-2026-28474 in OpenClaw nextcloud-talk (pre-2026.2.6) lets attackers bypass allowlists by matching display names. No auth needed — patch now! Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-06T03:00:29.000Z ##

⚠️ CRITICAL: CVE-2026-28474 in OpenClaw nextcloud-talk (pre-2026.2.6) lets attackers bypass allowlists by matching display names. No auth needed — patch now! Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Nextcloud #Security

##

CVE-2026-28289
(10.0 CRITICAL)

EPSS: 0.04%

updated 2026-03-05T22:16:15.213000

2 posts

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with file upload permissions to achieve Remote Code Execution (RCE) on the server by uploading a malicious .htaccess file using a zero-width space character prefix to bypass the security check. The vulnerab

1 repos

https://github.com/0xAshwesker/CVE-2026-28289

thehackerwire@mastodon.social at 2026-03-04T07:49:29.000Z ##

🔴 CVE-2026-28289 - Critical (10)

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with file upload permissions to achieve Remote Code E...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-04T03:00:27.000Z ##

⚠️ CRITICAL: CVE-2026-28289 in FreeScout <1.8.207 allows RCE via file upload bypass (zero-width space in .htaccess). Authenticated users can compromise servers. Patch to 1.8.207+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #FreeScout #Vuln #RCE

##

CVE-2026-3545
(9.6 CRITICAL)

EPSS: 0.03%

updated 2026-03-05T21:57:27.147000

2 posts

Insufficient data validation in Navigation in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-05T18:39:30.000Z ##

🔴 CVE-2026-3545 - Critical (9.6)

Insufficient data validation in Navigation in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T18:39:30.000Z ##

🔴 CVE-2026-3545 - Critical (9.6)

Insufficient data validation in Navigation in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3540
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-05T21:56:46.790000

2 posts

Inappropriate implementation in WebAudio in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-05T14:48:43.000Z ##

🟠 CVE-2026-3540 - High (8.8)

Inappropriate implementation in WebAudio in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T14:48:43.000Z ##

🟠 CVE-2026-3540 - High (8.8)

Inappropriate implementation in WebAudio in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28115
(9.3 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T21:31:51

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in loopus WP Attractive Donations System - Easy Stripe & Paypal donations WP_AttractiveDonationsSystem allows Blind SQL Injection.This issue affects WP Attractive Donations System - Easy Stripe & Paypal donations: from n/a through <= 1.25.

thehackerwire@mastodon.social at 2026-03-05T19:18:46.000Z ##

🔴 CVE-2026-28115 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in loopus WP Attractive Donations System - Easy Stripe & Paypal donations WP_AttractiveDonationsSystem allows Blind SQL Injection.This issue affects...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T19:18:46.000Z ##

🔴 CVE-2026-28115 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in loopus WP Attractive Donations System - Easy Stripe & Paypal donations WP_AttractiveDonationsSystem allows Blind SQL Injection.This issue affects...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24457
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-03-05T21:30:57

2 posts

An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read arbitrary files from a MQ Broker's server. A full exploitation could read unauthorized files of the OpenMQ’s host OS. In some scenarios RCE could be achieved.

thehackerwire@mastodon.social at 2026-03-05T19:18:43.000Z ##

🔴 CVE-2026-24457 - Critical (9.1)

An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read arbitrary files from a MQ Broker's server. A full exploitation could read unauthorized files of the OpenMQ’s host OS. In some scenarios RCE could be achieved.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T19:18:43.000Z ##

🔴 CVE-2026-24457 - Critical (9.1)

An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read arbitrary files from a MQ Broker's server. A full exploitation could read unauthorized files of the OpenMQ’s host OS. In some scenarios RCE could be achieved.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3009
(8.1 HIGH)

EPSS: 0.00%

updated 2026-03-05T21:30:57

2 posts

A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a previously generated login request to bypass the administrative restriction. This undermines access control enforcement and may allow unauthorized authent

thehackerwire@mastodon.social at 2026-03-05T19:17:16.000Z ##

🟠 CVE-2026-3009 - High (8.1)

A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T19:17:16.000Z ##

🟠 CVE-2026-3009 - High (8.1)

A security flaw in the IdentityBrokerService.performLogin endpoint of Keycloak allows authentication to proceed using an Identity Provider (IdP) even after it has been disabled by an administrator. An attacker who knows the IdP alias can reuse a p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3459
(8.1 HIGH)

EPSS: 0.00%

updated 2026-03-05T21:30:54

2 posts

The Drag and Drop Multiple File Upload - Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'dnd_upload_cf7_upload' function in versions up to, and including, 1.3.7.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Thi

thehackerwire@mastodon.social at 2026-03-05T19:17:06.000Z ##

🟠 CVE-2026-3459 - High (8.1)

The Drag and Drop Multiple File Upload - Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'dnd_upload_cf7_upload' function in versions up to, and including, 1.3.7.3. This m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T19:17:06.000Z ##

🟠 CVE-2026-3459 - High (8.1)

The Drag and Drop Multiple File Upload - Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'dnd_upload_cf7_upload' function in versions up to, and including, 1.3.7.3. This m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40931
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T21:30:39

2 posts

Apache::Session::Generate::MD5 versions through 1.94 for Perl create insecure session id. Apache::Session::Generate::MD5 generates session ids insecurely. The default session id generator returns a MD5 hash seeded with the built-in rand() function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date

thehackerwire@mastodon.social at 2026-03-05T19:16:27.000Z ##

🔴 CVE-2025-40931 - Critical (9.1)

Apache::Session::Generate::MD5 versions through 1.94 for Perl create insecure session id.

Apache::Session::Generate::MD5 generates session ids insecurely. The default session id generator returns a MD5 hash seeded with the built-in rand() functio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T19:16:27.000Z ##

🔴 CVE-2025-40931 - Critical (9.1)

Apache::Session::Generate::MD5 versions through 1.94 for Perl create insecure session id.

Apache::Session::Generate::MD5 generates session ids insecurely. The default session id generator returns a MD5 hash seeded with the built-in rand() functio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1605
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-05T21:28:00

1 posts

### Description (as reported) There is a memory leak when using `GzipHandler` in jetty-12.0.30 that can cause off-heap OOMs. This can be used for DoS attacks so I'm reporting this as a vulnerability. The leak is created by requests where the request is inflated (`Content-Encoding: gzip`) and the response is not deflated (no `Accept-Encoding: gzip`). In these conditions, a new inflator will be cr

thehackerwire@mastodon.social at 2026-03-05T10:18:26.000Z ##

🟠 CVE-2026-1605 - High (7.5)

In Eclipse Jetty, versions 12.0.0-12.0.31 and 12.1.0-12.0.5, class GzipHandler exposes a vulnerability when a compressed HTTP request, with Content-Encoding: gzip, is processed and the corresponding response is not compressed.

This happens becau...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2835(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-03-05T20:56:22

1 posts

### Impact Pingora versions prior to 0.8.0 improperly allowed HTTP/1.0 request bodies to be close-delimited and incorrectly handled multiple Transfer-Encoding values. This allows an attacker to desync Pingora's request framing from backend servers and smuggle requests to the backend. This vulnerability primarily affects standalone Pingora deployments in front of certain backends that accept HTTP/

offseq@infosec.exchange at 2026-03-05T00:00:41.000Z ##

🚨 CRITICAL: CVE-2026-2835 in Cloudflare Pingora enables HTTP request smuggling via improper HTTP/1.0 and Transfer-Encoding handling. Impacts standalone Pingora. Upgrade to v0.8.0+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Cloudflare #HTTPsmuggling #infosec

##

CVE-2026-2833(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-03-05T20:55:30

1 posts

### Impact Pingora versions prior to 0.8.0 would immediately forward bytes following a request with an Upgrade header to the backend, without waiting for a 101 Switching Protocols response. This allows an attacker to smuggle requests to the backend and bypass proxy-level security controls. This vulnerability primarily affects standalone Pingora deployments where a Pingora proxy is exposed to exte

offseq@infosec.exchange at 2026-03-05T01:30:26.000Z ##

⚠️ CRITICAL: CVE-2026-2833 in Cloudflare Pingora enables HTTP request smuggling — attackers can bypass proxy ACLs/WAFs, poison caches, and hijack sessions. Upgrade to v0.8.0+ or filter Upgrade headers. More info: radar.offseq.com/threat/cve-20 #OffSeq #Pingora #Vuln

##

CVE-2026-25673
(7.5 HIGH)

EPSS: 0.10%

updated 2026-03-05T20:31:31

1 posts

An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29. `URLField.to_python()` in Django calls `urllib.parse.urlsplit()`, which performs NFKC normalization on Windows that is disproportionately slow for certain Unicode characters, allowing a remote attacker to cause denial of service via large URL inputs containing these characters. Earlier, unsupported Django seri

thehackerwire@mastodon.social at 2026-03-03T16:20:15.000Z ##

🟠 CVE-2026-25673 - High (7.5)

An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29.
`URLField.to_python()` in Django calls `urllib.parse.urlsplit()`, which performs NFKC normalization on Windows that is disproportionately slow for certain Unico...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3047
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-05T20:16:17.137000

2 posts

A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Single Sign-On (SSO) session. This allows a remote attacker to gain unauthorized access to other enabled clients without re-authentication, effectively bypa

thehackerwire@mastodon.social at 2026-03-05T19:17:26.000Z ##

🟠 CVE-2026-3047 - High (8.8)

A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Sin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T19:17:26.000Z ##

🟠 CVE-2026-3047 - High (8.8)

A flaw was found in org.keycloak.broker.saml. When a disabled Security Assertion Markup Language (SAML) client is configured as an Identity Provider (IdP)-initiated broker landing target, it can still complete the login process and establish a Sin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2023-43000
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-05T20:16:09.657000

8 posts

A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.5, iOS 16.6 and iPadOS 16.6, Safari 16.6. Processing maliciously crafted web content may lead to memory corruption.

secdb at 2026-03-05T22:00:22.172Z ##

🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2017-7921 (secdb.nttzen.cloud/cve/detail/)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: hikvision.com/us-en/support/do ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-22681 (secdb.nttzen.cloud/cve/detail/)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: support.rockwellautomation.com ; cisa.gov/news-events/ics-advis ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-30952 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-41974 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: support.apple.com/en-us/HT2139 ; support.apple.com/kb/HT213938 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-43000 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/120324 ; support.apple.com/en-us/120331 ; support.apple.com/en-us/120338 ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-03-05T20:01:41.000Z ##

CVE ID: CVE-2023-43000
Vendor: Apple
Product: Multiple Products
Date Added: 2026-03-05
Notes: support.apple.com/en-us/120324 ; support.apple.com/en-us/120331 ; support.apple.com/en-us/120338 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

k3ym0 at 2026-03-05T19:30:15.270Z ##

CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM EST

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
  • CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
  • CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
  • CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
  • CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability

THREE Apple CVE's added to CISA KEV.

Patch your shit, people.

##

AAKL at 2026-03-05T19:21:28.748Z ##

CISA has updated the KEV catalogue. Apple posted its security advisories yesterday: support.apple.com/en-us/100100

- CVE-2023-41974L Apple iOS and iPadOS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2021-30952L Apple Multiple Products Integer Overflow or Wraparound Vulnerability cve.org/CVERecord?id=CVE-2021-

- CVE-2023-43000: Apple Multiple products Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2023-

Several industrial advisories: cisa.gov/

##

secdb@infosec.exchange at 2026-03-05T22:00:22.000Z ##

🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2017-7921 (secdb.nttzen.cloud/cve/detail/)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: hikvision.com/us-en/support/do ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-22681 (secdb.nttzen.cloud/cve/detail/)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: support.rockwellautomation.com ; cisa.gov/news-events/ics-advis ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-30952 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-41974 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: support.apple.com/en-us/HT2139 ; support.apple.com/kb/HT213938 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-43000 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/120324 ; support.apple.com/en-us/120331 ; support.apple.com/en-us/120338 ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260305 #cisa20260305 #cve_2017_7921 #cve_2021_22681 #cve_2021_30952 #cve_2023_41974 #cve_2023_43000 #cve20177921 #cve202122681 #cve202130952 #cve202341974 #cve202343000

##

cisakevtracker@mastodon.social at 2026-03-05T20:01:41.000Z ##

CVE ID: CVE-2023-43000
Vendor: Apple
Product: Multiple Products
Date Added: 2026-03-05
Notes: support.apple.com/en-us/120324 ; support.apple.com/en-us/120331 ; support.apple.com/en-us/120338 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

k3ym0@infosec.exchange at 2026-03-05T19:30:15.000Z ##

CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM EST

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
  • CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
  • CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
  • CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
  • CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability

THREE Apple CVE's added to CISA KEV.

Patch your shit, people.

##

AAKL@infosec.exchange at 2026-03-05T19:21:28.000Z ##

CISA has updated the KEV catalogue. Apple posted its security advisories yesterday: support.apple.com/en-us/100100

- CVE-2023-41974L Apple iOS and iPadOS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2021-30952L Apple Multiple Products Integer Overflow or Wraparound Vulnerability cve.org/CVERecord?id=CVE-2021-

- CVE-2023-43000: Apple Multiple products Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2023-

Several industrial advisories: cisa.gov/ #CISA #vulnerability #infosec #Apple

##

CVE-2023-41974
(7.8 HIGH)

EPSS: 0.31%

updated 2026-03-05T20:16:09.293000

8 posts

A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges.

secdb at 2026-03-05T22:00:22.172Z ##

🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2017-7921 (secdb.nttzen.cloud/cve/detail/)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: hikvision.com/us-en/support/do ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-22681 (secdb.nttzen.cloud/cve/detail/)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: support.rockwellautomation.com ; cisa.gov/news-events/ics-advis ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-30952 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-41974 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: support.apple.com/en-us/HT2139 ; support.apple.com/kb/HT213938 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-43000 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/120324 ; support.apple.com/en-us/120331 ; support.apple.com/en-us/120338 ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-03-05T20:02:12.000Z ##

CVE ID: CVE-2023-41974
Vendor: Apple
Product: iOS and iPadOS
Date Added: 2026-03-05
Notes: support.apple.com/en-us/HT2139 ; support.apple.com/kb/HT213938 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

k3ym0 at 2026-03-05T19:30:15.270Z ##

CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM EST

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
  • CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
  • CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
  • CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
  • CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability

THREE Apple CVE's added to CISA KEV.

Patch your shit, people.

##

AAKL at 2026-03-05T19:21:28.748Z ##

CISA has updated the KEV catalogue. Apple posted its security advisories yesterday: support.apple.com/en-us/100100

- CVE-2023-41974L Apple iOS and iPadOS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2021-30952L Apple Multiple Products Integer Overflow or Wraparound Vulnerability cve.org/CVERecord?id=CVE-2021-

- CVE-2023-43000: Apple Multiple products Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2023-

Several industrial advisories: cisa.gov/

##

secdb@infosec.exchange at 2026-03-05T22:00:22.000Z ##

🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2017-7921 (secdb.nttzen.cloud/cve/detail/)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: hikvision.com/us-en/support/do ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-22681 (secdb.nttzen.cloud/cve/detail/)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: support.rockwellautomation.com ; cisa.gov/news-events/ics-advis ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-30952 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-41974 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: support.apple.com/en-us/HT2139 ; support.apple.com/kb/HT213938 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-43000 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/120324 ; support.apple.com/en-us/120331 ; support.apple.com/en-us/120338 ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260305 #cisa20260305 #cve_2017_7921 #cve_2021_22681 #cve_2021_30952 #cve_2023_41974 #cve_2023_43000 #cve20177921 #cve202122681 #cve202130952 #cve202341974 #cve202343000

##

cisakevtracker@mastodon.social at 2026-03-05T20:02:12.000Z ##

CVE ID: CVE-2023-41974
Vendor: Apple
Product: iOS and iPadOS
Date Added: 2026-03-05
Notes: support.apple.com/en-us/HT2139 ; support.apple.com/kb/HT213938 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

k3ym0@infosec.exchange at 2026-03-05T19:30:15.000Z ##

CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM EST

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
  • CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
  • CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
  • CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
  • CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability

THREE Apple CVE's added to CISA KEV.

Patch your shit, people.

##

AAKL@infosec.exchange at 2026-03-05T19:21:28.000Z ##

CISA has updated the KEV catalogue. Apple posted its security advisories yesterday: support.apple.com/en-us/100100

- CVE-2023-41974L Apple iOS and iPadOS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2021-30952L Apple Multiple Products Integer Overflow or Wraparound Vulnerability cve.org/CVERecord?id=CVE-2021-

- CVE-2023-43000: Apple Multiple products Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2023-

Several industrial advisories: cisa.gov/ #CISA #vulnerability #infosec #Apple

##

CVE-2021-30952
(7.8 HIGH)

EPSS: 0.33%

updated 2026-03-05T20:16:08.867000

8 posts

An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.

secdb at 2026-03-05T22:00:22.172Z ##

🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2017-7921 (secdb.nttzen.cloud/cve/detail/)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: hikvision.com/us-en/support/do ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-22681 (secdb.nttzen.cloud/cve/detail/)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: support.rockwellautomation.com ; cisa.gov/news-events/ics-advis ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-30952 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-41974 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: support.apple.com/en-us/HT2139 ; support.apple.com/kb/HT213938 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-43000 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/120324 ; support.apple.com/en-us/120331 ; support.apple.com/en-us/120338 ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-03-05T20:01:56.000Z ##

CVE ID: CVE-2021-30952
Vendor: Apple
Product: Multiple Products
Date Added: 2026-03-05
Notes: support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

k3ym0 at 2026-03-05T19:30:15.270Z ##

CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM EST

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
  • CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
  • CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
  • CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
  • CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability

THREE Apple CVE's added to CISA KEV.

Patch your shit, people.

##

AAKL at 2026-03-05T19:21:28.748Z ##

CISA has updated the KEV catalogue. Apple posted its security advisories yesterday: support.apple.com/en-us/100100

- CVE-2023-41974L Apple iOS and iPadOS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2021-30952L Apple Multiple Products Integer Overflow or Wraparound Vulnerability cve.org/CVERecord?id=CVE-2021-

- CVE-2023-43000: Apple Multiple products Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2023-

Several industrial advisories: cisa.gov/

##

secdb@infosec.exchange at 2026-03-05T22:00:22.000Z ##

🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2017-7921 (secdb.nttzen.cloud/cve/detail/)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: hikvision.com/us-en/support/do ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-22681 (secdb.nttzen.cloud/cve/detail/)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: support.rockwellautomation.com ; cisa.gov/news-events/ics-advis ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-30952 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-41974 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: support.apple.com/en-us/HT2139 ; support.apple.com/kb/HT213938 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-43000 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/120324 ; support.apple.com/en-us/120331 ; support.apple.com/en-us/120338 ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260305 #cisa20260305 #cve_2017_7921 #cve_2021_22681 #cve_2021_30952 #cve_2023_41974 #cve_2023_43000 #cve20177921 #cve202122681 #cve202130952 #cve202341974 #cve202343000

##

cisakevtracker@mastodon.social at 2026-03-05T20:01:56.000Z ##

CVE ID: CVE-2021-30952
Vendor: Apple
Product: Multiple Products
Date Added: 2026-03-05
Notes: support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

k3ym0@infosec.exchange at 2026-03-05T19:30:15.000Z ##

CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM EST

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
  • CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
  • CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
  • CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
  • CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability

THREE Apple CVE's added to CISA KEV.

Patch your shit, people.

##

AAKL@infosec.exchange at 2026-03-05T19:21:28.000Z ##

CISA has updated the KEV catalogue. Apple posted its security advisories yesterday: support.apple.com/en-us/100100

- CVE-2023-41974L Apple iOS and iPadOS Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2023-

- CVE-2021-30952L Apple Multiple Products Integer Overflow or Wraparound Vulnerability cve.org/CVERecord?id=CVE-2021-

- CVE-2023-43000: Apple Multiple products Use-After-Free Vulnerability cve.org/CVERecord?id=CVE-2023-

Several industrial advisories: cisa.gov/ #CISA #vulnerability #infosec #Apple

##

CVE-2021-22681
(9.8 CRITICAL)

EPSS: 0.18%

updated 2026-03-05T20:16:08.583000

6 posts

Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio

secdb at 2026-03-05T22:00:22.172Z ##

🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2017-7921 (secdb.nttzen.cloud/cve/detail/)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: hikvision.com/us-en/support/do ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-22681 (secdb.nttzen.cloud/cve/detail/)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: support.rockwellautomation.com ; cisa.gov/news-events/ics-advis ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-30952 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-41974 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: support.apple.com/en-us/HT2139 ; support.apple.com/kb/HT213938 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-43000 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/120324 ; support.apple.com/en-us/120331 ; support.apple.com/en-us/120338 ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-03-05T20:01:26.000Z ##

CVE ID: CVE-2021-22681
Vendor: Rockwell
Product: Multiple Products
Date Added: 2026-03-05
Notes: support.rockwellautomation.com ; cisa.gov/news-events/ics-advis ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

k3ym0 at 2026-03-05T19:30:15.270Z ##

CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM EST

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
  • CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
  • CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
  • CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
  • CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability

THREE Apple CVE's added to CISA KEV.

Patch your shit, people.

##

secdb@infosec.exchange at 2026-03-05T22:00:22.000Z ##

🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2017-7921 (secdb.nttzen.cloud/cve/detail/)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: hikvision.com/us-en/support/do ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-22681 (secdb.nttzen.cloud/cve/detail/)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: support.rockwellautomation.com ; cisa.gov/news-events/ics-advis ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-30952 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-41974 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: support.apple.com/en-us/HT2139 ; support.apple.com/kb/HT213938 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-43000 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/120324 ; support.apple.com/en-us/120331 ; support.apple.com/en-us/120338 ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260305 #cisa20260305 #cve_2017_7921 #cve_2021_22681 #cve_2021_30952 #cve_2023_41974 #cve_2023_43000 #cve20177921 #cve202122681 #cve202130952 #cve202341974 #cve202343000

##

cisakevtracker@mastodon.social at 2026-03-05T20:01:26.000Z ##

CVE ID: CVE-2021-22681
Vendor: Rockwell
Product: Multiple Products
Date Added: 2026-03-05
Notes: support.rockwellautomation.com ; cisa.gov/news-events/ics-advis ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

k3ym0@infosec.exchange at 2026-03-05T19:30:15.000Z ##

CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM EST

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
  • CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
  • CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
  • CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
  • CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability

THREE Apple CVE's added to CISA KEV.

Patch your shit, people.

##

CVE-2017-7921
(9.8 CRITICAL)

EPSS: 94.10%

updated 2026-03-05T20:16:08.180000

6 posts

An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5

Nuclei template

25 repos

https://github.com/saaydmr/hikvision-exploiter

https://github.com/BurnyMcDull/CVE-2017-7921

https://github.com/voidsshadows/Hikvision-City-Hunter

https://github.com/JrDw0/CVE-2017-7921-EXP

https://github.com/aengussong/hikvision_probe

https://github.com/MartinxMax/BloodCat

https://github.com/GabrielAvls/CVE-2017-7921

https://github.com/chrisjd20/hikvision_CVE-2017-7921_auth_bypass_config_decryptor

https://github.com/0xf3d0rq/CVE-2017-7921

https://github.com/201646613/CVE-2017-7921

https://github.com/KelvinWin10/CVE-2017-7921-rewrite

https://github.com/mverschu/CVE-2017-7921

https://github.com/MisakaMikato/cve-2017-7921-golang

https://github.com/AnonkiGroup/AnonHik

https://github.com/jorhelp/Ingram

https://github.com/K3ysTr0K3R/CVE-2017-7921-EXPLOIT

https://github.com/lastvocher/Hikvision-CVE-2017-7921-decryptor

https://github.com/b3pwn3d/CVE-2017-7921

https://github.com/krypton612/hikivision

https://github.com/kooroshsanaei/HikVision-CVE-2017-7921

https://github.com/p4tq/hikvision_CVE-2017-7921_auth_bypass_config_decryptor

https://github.com/Wyl-cmd/CVE-2017-7921-Research-Toolkit

https://github.com/yousouf-Tasfin/cve-2017-7921-Mass-Exploit

https://github.com/inj3ction/CVE-2017-7921-EXP

https://github.com/D2550/CVE_2017_7921_EXP

secdb at 2026-03-05T22:00:22.172Z ##

🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2017-7921 (secdb.nttzen.cloud/cve/detail/)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: hikvision.com/us-en/support/do ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-22681 (secdb.nttzen.cloud/cve/detail/)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: support.rockwellautomation.com ; cisa.gov/news-events/ics-advis ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-30952 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-41974 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: support.apple.com/en-us/HT2139 ; support.apple.com/kb/HT213938 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-43000 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/120324 ; support.apple.com/en-us/120331 ; support.apple.com/en-us/120338 ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-03-05T20:01:10.000Z ##

CVE ID: CVE-2017-7921
Vendor: Hikvision
Product: Multiple Products
Date Added: 2026-03-05
Notes: hikvision.com/us-en/support/do ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

k3ym0 at 2026-03-05T19:30:15.270Z ##

CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM EST

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
  • CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
  • CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
  • CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
  • CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability

THREE Apple CVE's added to CISA KEV.

Patch your shit, people.

##

secdb@infosec.exchange at 2026-03-05T22:00:22.000Z ##

🚨 [CISA-2026:0305] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2017-7921 (secdb.nttzen.cloud/cve/detail/)
- Name: Hikvision Multiple Products Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Hikvision
- Product: Multiple Products
- Notes: hikvision.com/us-en/support/do ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-22681 (secdb.nttzen.cloud/cve/detail/)
- Name: Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Rockwell
- Product: Multiple Products
- Notes: support.rockwellautomation.com ; cisa.gov/news-events/ics-advis ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2021-30952 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Integer Overflow or Wraparound Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; support.apple.com/en-us/HT2129 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-41974 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple iOS and iPadOS Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: iOS and iPadOS
- Notes: support.apple.com/en-us/HT2139 ; support.apple.com/kb/HT213938 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2023-43000 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple products Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/120324 ; support.apple.com/en-us/120331 ; support.apple.com/en-us/120338 ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260305 #cisa20260305 #cve_2017_7921 #cve_2021_22681 #cve_2021_30952 #cve_2023_41974 #cve_2023_43000 #cve20177921 #cve202122681 #cve202130952 #cve202341974 #cve202343000

##

cisakevtracker@mastodon.social at 2026-03-05T20:01:10.000Z ##

CVE ID: CVE-2017-7921
Vendor: Hikvision
Product: Multiple Products
Date Added: 2026-03-05
Notes: hikvision.com/us-en/support/do ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

k3ym0@infosec.exchange at 2026-03-05T19:30:15.000Z ##

CISA Adds Five Known Exploited Vulnerabilities to Catalog
03/05/2026 02:30 PM EST

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2017-7921 Hikvision Multiple Products Improper Authentication Vulnerability
  • CVE-2021-22681 Rockwell Multiple Products Insufficient Protected Credentials Vulnerability
  • CVE-2021-30952 Apple Multiple Products Integer Overflow or Wraparound Vulnerability
  • CVE-2023-41974 Apple iOS and iPadOS Use-After-Free Vulnerability
  • CVE-2023-43000 Apple Multiple products Use-After-Free Vulnerability

THREE Apple CVE's added to CISA KEV.

Patch your shit, people.

##

CVE-2026-20101
(8.6 HIGH)

EPSS: 0.10%

updated 2026-03-05T19:39:11.967000

2 posts

A vulnerability in the SAML 2.0 single sign-on (SSO) feature of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a DoS condition. This vulnerability is due to insufficient error checking when processing SAML messages. An attacker could exploit this vulnerability by sending crafted

Matchbook3469@mastodon.social at 2026-03-05T23:36:53.000Z ##

🟠 New security advisory:

CVE-2026-20101 affects multiple systems.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

thehackerwire@mastodon.social at 2026-03-04T18:20:29.000Z ##

🟠 CVE-2026-20101 - High (8.6)

A vulnerability in the SAML 2.0 single sign-on (SSO) feature of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a DoS condition.

...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70219
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T19:39:11.967000

2 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the goform/formDeviceReboot.

thehackerwire@mastodon.social at 2026-03-05T18:39:40.000Z ##

🔴 CVE-2025-70219 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the goform/formDeviceReboot.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T18:39:40.000Z ##

🔴 CVE-2025-70219 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the goform/formDeviceReboot.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20103
(8.6 HIGH)

EPSS: 0.05%

updated 2026-03-05T19:39:11.967000

2 posts

A vulnerability in the Remote Access SSL VPN functionality of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to exhaust device memory resulting in a denial of service (DoS) condition to new Remote Access SSL VPN connections. This does not affect the management interface, though it ma

Matchbook3469@mastodon.social at 2026-03-05T15:13:23.000Z ##

🟠 New security advisory:

CVE-2026-20103 affects multiple systems.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

thehackerwire@mastodon.social at 2026-03-04T18:23:16.000Z ##

🟠 CVE-2026-20103 - High (8.6)

A vulnerability in the Remote Access SSL VPN functionality of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to exhaust device memo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20131
(10.0 CRITICAL)

EPSS: 0.44%

updated 2026-03-05T19:39:11.967000

6 posts

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java ob

beyondmachines1@infosec.exchange at 2026-03-05T09:01:12.000Z ##

Cisco Issues Emergency Patches for Critical Root-Level Firewall Management Flaws

Cisco patched two critical vulnerabilities (CVE-2026-20079 and CVE-2026-20131) in its Secure Firewall Management Center that allow unauthenticated remote attackers to gain root access and execute arbitrary code.

**If you are using Cisco FMC on premise, this is urgent and important. Make sure the web interface of the FMC is isolated and accessible only from trusted networks. Then apply a very quick patch, since even if isolated, a lot of attackers will be building tools to attack it after they do a successful phishing or endpoint compromise.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

jbz@indieweb.social at 2026-03-04T23:22:00.000Z ##

💥 Cisco warns of max severity Secure FMC flaws giving root access

「 Both vulnerabilities can be exploited remotely by unauthenticated attackers: the authentication bypass flaw (CVE-2026-20079) allows attackers to gain root access to the underlying operating system, while the remote code execution (RCE) vulnerability (CVE-2026-20131) lets them execute arbitrary Java code as root on unpatched devices 」

#cisco #rce #cybersecurity
bleepingcomputer.com/news/secu

##

0x3e4@cyberplace.social at 2026-03-04T20:41:44.000Z ##

yikes.. 50 CVEs for Cisco today incl. two max severity CVE-2026-20131 & CVE-2026-20079 with auth bypass 🫡

hecate.pw/vulnerabilities?sear

🚬

#vulnerability #cve #cisco

##

thehackerwire@mastodon.social at 2026-03-04T18:20:09.000Z ##

🔴 CVE-2026-20131 - Critical (10)

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device.

This vulnerability is ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

mttaggart@infosec.exchange at 2026-03-04T18:07:42.000Z ##

Second is CVE-2026-20131: remote code execution in the same product by way of, aww yiss, Java deserialization.

sec.cloudapps.cisco.com/securi

##

AAKL@infosec.exchange at 2026-03-04T16:23:04.000Z ##

Oops.

A long list of Cisco vulnerabilities, two critical, several high-severity.

- Critical: CVE-2026-20079-CWE-288: Cisco Secure Firewall Management Center Software Authentication Bypass Vulnerability sec.cloudapps.cisco.com/securi

- Critical: CVE-2026-20131-CWE-502: Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

More. Grab a coffee sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #vulnerability #Cisco

@cR0w

##

CVE-2026-0847
(8.6 HIGH)

EPSS: 0.19%

updated 2026-03-05T19:39:11.967000

1 posts

A vulnerability in NLTK versions up to and including 3.9.2 allows arbitrary file read via path traversal in multiple CorpusReader classes, including WordListCorpusReader, TaggedCorpusReader, and BracketParseCorpusReader. These classes fail to properly sanitize or validate file paths, enabling attackers to traverse directories and access sensitive files on the server. This issue is particularly cri

thehackerwire@mastodon.social at 2026-03-04T19:31:23.000Z ##

🟠 CVE-2026-0847 - High (8.6)

A vulnerability in NLTK versions up to and including 3.9.2 allows arbitrary file read via path traversal in multiple CorpusReader classes, including WordListCorpusReader, TaggedCorpusReader, and BracketParseCorpusReader. These classes fail to prop...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70223
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-05T19:39:11.967000

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formAdvNetwork.

thehackerwire@mastodon.social at 2026-03-04T19:31:13.000Z ##

🔴 CVE-2025-70223 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formAdvNetwork.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20100
(7.7 HIGH)

EPSS: 0.15%

updated 2026-03-05T19:39:11.967000

2 posts

A vulnerability in the LUA interperter of the Remote Access SSL VPN feature of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker with a valid VPN connection to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition. This does not affect the management or

thehackerwire@mastodon.social at 2026-03-04T18:38:44.000Z ##

🟠 CVE-2026-20100 - High (7.7)

A vulnerability in the LUA interperter of the Remote Access SSL VPN feature of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker with a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-04T18:28:38.000Z ##

🟠 CVE-2026-20100 - High (7.7)

A vulnerability in the LUA interperter of the Remote Access SSL VPN feature of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker with a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40926
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T19:38:53.383000

2 posts

Plack::Middleware::Session::Simple versions through 0.04 for Perl generates session ids insecurely. The default session id generator returns a SHA-1 hash seeded with the built-in rand function, the epoch time, and the PID. The PID will come from a small set of numbers, and the epoch time may be guessed, if it is not leaked from the HTTP Date header. The built-in rand function is unsuitable for cr

thehackerwire@mastodon.social at 2026-03-05T19:16:18.000Z ##

🔴 CVE-2025-40926 - Critical (9.8)

Plack::Middleware::Session::Simple versions through 0.04 for Perl generates session ids insecurely.

The default session id generator returns a SHA-1 hash seeded with the built-in rand function, the epoch time, and the PID. The PID will come from ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T19:16:18.000Z ##

🔴 CVE-2025-40926 - Critical (9.8)

Plack::Middleware::Session::Simple versions through 0.04 for Perl generates session ids insecurely.

The default session id generator returns a SHA-1 hash seeded with the built-in rand function, the epoch time, and the PID. The PID will come from ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70222
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T19:38:53.383000

2 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formLogin,goform/getAuthCode.

thehackerwire@mastodon.social at 2026-03-05T18:01:19.000Z ##

🔴 CVE-2025-70222 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formLogin,goform/getAuthCode.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T18:01:19.000Z ##

🔴 CVE-2025-70222 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formLogin,goform/getAuthCode.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-68553
(9.9 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T19:38:53.383000

2 posts

Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Lendiz lendiz allows Upload a Web Shell to a Web Server.This issue affects Lendiz: from n/a through < 2.0.1.

thehackerwire@mastodon.social at 2026-03-05T17:22:59.000Z ##

🔴 CVE-2025-68553 - Critical (9.9)

Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Lendiz lendiz allows Upload a Web Shell to a Web Server.This issue affects Lendiz: from n/a through &lt; 2.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T17:22:59.000Z ##

🔴 CVE-2025-68553 - Critical (9.9)

Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Lendiz lendiz allows Upload a Web Shell to a Web Server.This issue affects Lendiz: from n/a through &lt; 2.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-54001
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T19:38:53.383000

2 posts

Deserialization of Untrusted Data vulnerability in ThemeREX Classter classter allows Object Injection.This issue affects Classter: from n/a through <= 2.5.

thehackerwire@mastodon.social at 2026-03-05T17:22:50.000Z ##

🔴 CVE-2025-54001 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in ThemeREX Classter classter allows Object Injection.This issue affects Classter: from n/a through &lt;= 2.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T17:22:50.000Z ##

🔴 CVE-2025-54001 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in ThemeREX Classter classter allows Object Injection.This issue affects Classter: from n/a through &lt;= 2.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69340
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-05T19:38:53.383000

2 posts

Missing Authorization vulnerability in BuddhaThemes WeDesignTech Ultimate Booking Addon wedesigntech-ultimate-booking-addon allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WeDesignTech Ultimate Booking Addon: from n/a through <= 1.0.3.

thehackerwire@mastodon.social at 2026-03-05T17:00:48.000Z ##

🟠 CVE-2025-69340 - High (7.5)

Missing Authorization vulnerability in BuddhaThemes WeDesignTech Ultimate Booking Addon wedesigntech-ultimate-booking-addon allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WeDesignTech Ultimate Booking Ad...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T17:00:48.000Z ##

🟠 CVE-2025-69340 - High (7.5)

Missing Authorization vulnerability in BuddhaThemes WeDesignTech Ultimate Booking Addon wedesigntech-ultimate-booking-addon allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WeDesignTech Ultimate Booking Ad...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27803
(8.3 HIGH)

EPSS: 0.04%

updated 2026-03-05T19:38:53.383000

2 posts

Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to version 1.35.4, when a Manager has manage=false for a given collection, they can still perform several management operations as long as they have access to the collection. This issue has been patched in version 1.35.4.

thehackerwire@mastodon.social at 2026-03-05T08:30:51.000Z ##

🟠 CVE-2026-27803 - High (8.3)

Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to version 1.35.4, when a Manager has manage=false for a given collection, they can still perform several management operations as long...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T08:30:29.000Z ##

🟠 CVE-2026-27803 - High (8.3)

Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to version 1.35.4, when a Manager has manage=false for a given collection, they can still perform several management operations as long...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27802
(8.3 HIGH)

EPSS: 0.04%

updated 2026-03-05T19:38:53.383000

1 posts

Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to version 1.35.4, there is a privilege escalation vulnerability via bulk permission update to unauthorized collections by Manager. This issue has been patched in version 1.35.4.

thehackerwire@mastodon.social at 2026-03-05T08:02:14.000Z ##

🟠 CVE-2026-27802 - High (8.3)

Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to version 1.35.4, there is a privilege escalation vulnerability via bulk permission update to unauthorized collections by Manager. Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25921
(9.3 CRITICAL)

EPSS: 0.00%

updated 2026-03-05T19:38:33.877000

2 posts

Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwritable LFS object across different repos leads to supply-chain attack, all LFS objects are vulnerable to be maliciously overwritten by malicious attackers. This issue has been patched in version 0.14.2.

thehackerwire@mastodon.social at 2026-03-05T19:18:33.000Z ##

🔴 CVE-2026-25921 - Critical (9.3)

Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwritable LFS object across different repos leads to supply-chain attack, all LFS objects are vulnerable to be maliciously overwritten by malicious attackers. This issue h...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T19:18:33.000Z ##

🔴 CVE-2026-25921 - Critical (9.3)

Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwritable LFS object across different repos leads to supply-chain attack, all LFS objects are vulnerable to be maliciously overwritten by malicious attackers. This issue h...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27944
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-05T19:38:33.877000

4 posts

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.3, the /api/backup endpoint is accessible without authentication and discloses the encryption keys required to decrypt the backup in the X-Backup-Security response header. This allows an unauthenticated attacker to download a full system backup containing sensitive data (user credentials, session tokens, SSL private ke

thehackerwire@mastodon.social at 2026-03-05T19:18:27.000Z ##

🔴 CVE-2026-27944 - Critical (9.8)

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.3, the /api/backup endpoint is accessible without authentication and discloses the encryption keys required to decrypt the backup in the X-Backup-Security response hea...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL at 2026-03-05T17:58:42.607Z ##

New.

Tenable research advisories have added critical vulnerability CVE-2026-27944: Nginx UI - Unauthenticated Backup Download with Encryption Key Disclosure tenable.com/security/research/ @tenable

##

thehackerwire@mastodon.social at 2026-03-05T19:18:27.000Z ##

🔴 CVE-2026-27944 - Critical (9.8)

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.3, the /api/backup endpoint is accessible without authentication and discloses the encryption keys required to decrypt the backup in the X-Backup-Security response hea...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-03-05T17:58:42.000Z ##

New.

Tenable research advisories have added critical vulnerability CVE-2026-27944: Nginx UI - Unauthenticated Backup Download with Encryption Key Disclosure tenable.com/security/research/ @tenable #infosec #vulnerability

##

CVE-2026-28119
(8.1 HIGH)

EPSS: 0.05%

updated 2026-03-05T19:38:33.877000

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Nirvana nirvana allows PHP Local File Inclusion.This issue affects Nirvana: from n/a through <= 2.6.

thehackerwire@mastodon.social at 2026-03-05T16:24:31.000Z ##

🟠 CVE-2026-28119 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Nirvana nirvana allows PHP Local File Inclusion.This issue affects Nirvana: from n/a through &lt;= 2.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T16:24:31.000Z ##

🟠 CVE-2026-28119 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Nirvana nirvana allows PHP Local File Inclusion.This issue affects Nirvana: from n/a through &lt;= 2.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28124
(8.1 HIGH)

EPSS: 0.05%

updated 2026-03-05T19:38:33.877000

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Notarius notarius allows PHP Local File Inclusion.This issue affects Notarius: from n/a through <= 1.9.

thehackerwire@mastodon.social at 2026-03-05T16:24:12.000Z ##

🟠 CVE-2026-28124 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Notarius notarius allows PHP Local File Inclusion.This issue affects Notarius: from n/a through &lt;= 1.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T16:24:12.000Z ##

🟠 CVE-2026-28124 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Notarius notarius allows PHP Local File Inclusion.This issue affects Notarius: from n/a through &lt;= 1.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28129
(8.1 HIGH)

EPSS: 0.05%

updated 2026-03-05T19:38:33.877000

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Little Birdies little-birdies allows PHP Local File Inclusion.This issue affects Little Birdies: from n/a through <= 1.3.16.

thehackerwire@mastodon.social at 2026-03-05T16:00:46.000Z ##

🟠 CVE-2026-28129 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Little Birdies little-birdies allows PHP Local File Inclusion.This issue affects Little Birdies: from n/a through ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T16:00:46.000Z ##

🟠 CVE-2026-28129 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Little Birdies little-birdies allows PHP Local File Inclusion.This issue affects Little Birdies: from n/a through ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28128
(8.1 HIGH)

EPSS: 0.05%

updated 2026-03-05T19:38:33.877000

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Verse verse allows PHP Local File Inclusion.This issue affects Verse: from n/a through <= 1.7.0.

thehackerwire@mastodon.social at 2026-03-05T16:00:37.000Z ##

🟠 CVE-2026-28128 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Verse verse allows PHP Local File Inclusion.This issue affects Verse: from n/a through &lt;= 1.7.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T16:00:37.000Z ##

🟠 CVE-2026-28128 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Verse verse allows PHP Local File Inclusion.This issue affects Verse: from n/a through &lt;= 1.7.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28125
(8.1 HIGH)

EPSS: 0.05%

updated 2026-03-05T19:38:33.877000

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Midi midi allows PHP Local File Inclusion.This issue affects Midi: from n/a through <= 1.14.

thehackerwire@mastodon.social at 2026-03-05T15:17:55.000Z ##

🟠 CVE-2026-28125 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Midi midi allows PHP Local File Inclusion.This issue affects Midi: from n/a through &lt;= 1.14.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T15:17:55.000Z ##

🟠 CVE-2026-28125 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Midi midi allows PHP Local File Inclusion.This issue affects Midi: from n/a through &lt;= 1.14.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28134
(8.5 HIGH)

EPSS: 0.03%

updated 2026-03-05T19:38:33.877000

2 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in Crocoblock JetEngine jet-engine allows Remote Code Inclusion.This issue affects JetEngine: from n/a through <= 3.7.2.

thehackerwire@mastodon.social at 2026-03-05T15:17:35.000Z ##

🟠 CVE-2026-28134 - High (8.5)

Improper Control of Generation of Code ('Code Injection') vulnerability in Crocoblock JetEngine jet-engine allows Remote Code Inclusion.This issue affects JetEngine: from n/a through &lt;= 3.7.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T15:17:35.000Z ##

🟠 CVE-2026-28134 - High (8.5)

Improper Control of Generation of Code ('Code Injection') vulnerability in Crocoblock JetEngine jet-engine allows Remote Code Inclusion.This issue affects JetEngine: from n/a through &lt;= 3.7.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1720
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-05T19:38:33.877000

2 posts

The WowOptin: Next-Gen Popup Maker – Create Stunning Popups and Optins for Lead Generation plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the 'install_and_active_plugin' function in all versions up to, and including, 1.4.24. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install a

thehackerwire@mastodon.social at 2026-03-05T14:19:25.000Z ##

🟠 CVE-2026-1720 - High (8.8)

The WowOptin: Next-Gen Popup Maker – Create Stunning Popups and Optins for Lead Generation plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the 'install_and_active_plugin' func...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T14:19:25.000Z ##

🟠 CVE-2026-1720 - High (8.8)

The WowOptin: Next-Gen Popup Maker – Create Stunning Popups and Optins for Lead Generation plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the 'install_and_active_plugin' func...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2599
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-05T19:38:33.877000

2 posts

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input in the 'download_csv' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability ha

1 repos

https://github.com/drkim-dev/CVE-2026-25991

thehackerwire@mastodon.social at 2026-03-05T13:20:20.000Z ##

🔴 CVE-2026-2599 - Critical (9.8)

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input in the 'download_csv' function. This makes it p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T13:20:20.000Z ##

🔴 CVE-2026-2599 - Critical (9.8)

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input in the 'download_csv' function. This makes it p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29053
(7.6 HIGH)

EPSS: 0.05%

updated 2026-03-05T19:38:33.877000

1 posts

Ghost is a Node.js content management system. From version 0.7.2 to 6.19.0, specifically crafted malicious themes can execute arbitrary code on the server running Ghost. This issue has been patched in version 6.19.1.

thehackerwire@mastodon.social at 2026-03-05T08:01:31.000Z ##

🟠 CVE-2026-29053 - High (7.6)

Ghost is a Node.js content management system. From version 0.7.2 to 6.19.0, specifically crafted malicious themes can execute arbitrary code on the server running Ghost. This issue has been patched in version 6.19.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1678
(9.4 CRITICAL)

EPSS: 0.04%

updated 2026-03-05T19:38:33.877000

1 posts

dns_unpack_name() caches the buffer tailroom once and reuses it while appending DNS labels. As the buffer grows, the cached size becomes incorrect, and the final null terminator can be written past the buffer. With assertions disabled (default), a malicious DNS response can trigger an out-of-bounds write when CONFIG_DNS_RESOLVER is enabled.

thehackerwire@mastodon.social at 2026-03-05T08:01:22.000Z ##

🔴 CVE-2026-1678 - Critical (9.4)

dns_unpack_name() caches the buffer tailroom once and reuses it while appending DNS labels. As the buffer grows, the cached size becomes incorrect, and the final null terminator can be written past the buffer. With assertions disabled (default), a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70226
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T18:32:44

2 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formEasySetupWizard.

thehackerwire@mastodon.social at 2026-03-05T18:39:55.000Z ##

🔴 CVE-2025-70226 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formEasySetupWizard.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T18:39:55.000Z ##

🔴 CVE-2025-70226 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formEasySetupWizard.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70225
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T18:32:44

2 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curtime parameter to the goform/formEasySetupWWConfig component

thehackerwire@mastodon.social at 2026-03-05T18:01:41.000Z ##

🔴 CVE-2025-70225 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curtime parameter to the goform/formEasySetupWWConfig component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T18:01:41.000Z ##

🔴 CVE-2025-70225 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curtime parameter to the goform/formEasySetupWWConfig component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66944
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-05T18:32:43

2 posts

SQL Injection vulnerability in vran-dev databaseir v.1.0.7 and before allows a remote attacker to execute arbitrary code via the query parameter in the search API endpoint

thehackerwire@mastodon.social at 2026-03-05T19:00:54.000Z ##

🔴 CVE-2025-66944 - Critical (9.8)

SQL Injection vulnerability in vran-dev databaseir v.1.0.7 and before allows a remote attacker to execute arbitrary code via the query parameter in the search API endpoint

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T19:00:54.000Z ##

🔴 CVE-2025-66944 - Critical (9.8)

SQL Injection vulnerability in vran-dev databaseir v.1.0.7 and before allows a remote attacker to execute arbitrary code via the query parameter in the search API endpoint

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70218
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T18:32:43

2 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via POST to the goform/formAdvFirewall component.

thehackerwire@mastodon.social at 2026-03-05T18:40:05.000Z ##

🔴 CVE-2025-70218 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via POST to the goform/formAdvFirewall component.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T18:40:05.000Z ##

🔴 CVE-2025-70218 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via POST to the goform/formAdvFirewall component.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-46108
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T18:32:43

2 posts

D-link Dir-513 A1FW110 is vulnerable to Buffer Overflow in the function formTcpipSetup.

thehackerwire@mastodon.social at 2026-03-05T18:39:21.000Z ##

🔴 CVE-2025-46108 - Critical (9.8)

D-link Dir-513 A1FW110 is vulnerable to Buffer Overflow in the function formTcpipSetup.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T18:39:21.000Z ##

🔴 CVE-2025-46108 - Critical (9.8)

D-link Dir-513 A1FW110 is vulnerable to Buffer Overflow in the function formTcpipSetup.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70221
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T18:32:43

2 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formLogin.

thehackerwire@mastodon.social at 2026-03-05T18:01:29.000Z ##

🔴 CVE-2025-70221 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formLogin.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T18:01:29.000Z ##

🔴 CVE-2025-70221 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formLogin.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69338
(9.3 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T18:32:43

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in don-themes Riode Core riode-core allows Blind SQL Injection.This issue affects Riode Core: from n/a through <= 1.6.26.

thehackerwire@mastodon.social at 2026-03-05T17:00:37.000Z ##

🔴 CVE-2025-69338 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in don-themes Riode Core riode-core allows Blind SQL Injection.This issue affects Riode Core: from n/a through &lt;= 1.6.26.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T17:00:37.000Z ##

🔴 CVE-2025-69338 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in don-themes Riode Core riode-core allows Blind SQL Injection.This issue affects Riode Core: from n/a through &lt;= 1.6.26.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-68555
(10.0 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T18:32:43

2 posts

Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Nutrie nutrie allows Upload a Web Shell to a Web Server.This issue affects Nutrie: from n/a through < 2.0.1.

thehackerwire@mastodon.social at 2026-03-05T17:00:27.000Z ##

🔴 CVE-2025-68555 - Critical (9.9)

Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Nutrie nutrie allows Upload a Web Shell to a Web Server.This issue affects Nutrie: from n/a through &lt; 2.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T17:00:27.000Z ##

🔴 CVE-2025-68555 - Critical (9.9)

Unrestricted Upload of File with Dangerous Type vulnerability in zozothemes Nutrie nutrie allows Upload a Web Shell to a Web Server.This issue affects Nutrie: from n/a through &lt; 2.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28117
(8.1 HIGH)

EPSS: 0.05%

updated 2026-03-05T18:32:43

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes smart SEO smartSEO allows PHP Local File Inclusion.This issue affects smart SEO: from n/a through <= 2.9.

thehackerwire@mastodon.social at 2026-03-05T16:24:21.000Z ##

🟠 CVE-2026-28117 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes smart SEO smartSEO allows PHP Local File Inclusion.This issue affects smart SEO: from n/a through &lt;= 2.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T16:24:21.000Z ##

🟠 CVE-2026-28117 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes smart SEO smartSEO allows PHP Local File Inclusion.This issue affects smart SEO: from n/a through &lt;= 2.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22891
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-03-05T18:15:20.593000

1 posts

A heap-based buffer overflow vulnerability exists in the Intan CLP parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted Intan CLP file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

thehackerwire@mastodon.social at 2026-03-03T15:37:07.000Z ##

🔴 CVE-2026-22891 - Critical (9.8)

A heap-based buffer overflow vulnerability exists in the Intan CLP parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted Intan CLP file can lead to arbitrary code execution. An attacker can p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26478
(9.8 CRITICAL)

EPSS: 0.39%

updated 2026-03-05T18:13:33.993000

1 posts

A shell command injection vulnerability in Mobvoi Tichome Mini smart speaker 012-18853 and 027-58389 allows remote attackers to send a specially crafted UDP datagram and execute arbitrary shell code as the root account.

thehackerwire@mastodon.social at 2026-03-04T17:30:58.000Z ##

🔴 CVE-2026-26478 - Critical (9.8)

A shell command injection vulnerability in Mobvoi Tichome Mini smart speaker 012-18853 and 027-58389 allows remote attackers to send a specially crafted UDP datagram and execute arbitrary shell code as the root account.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26673
(7.5 HIGH)

EPSS: 0.11%

updated 2026-03-05T18:05:02.300000

2 posts

An issue in DJI Mavic Mini, Spark, Mavic Air, Mini, Mini SE 0.1.00.0500 and below allows a remote attacker to cause a denial of service via the DJI Enhanced-WiFi transmission subsystem

thehackerwire@mastodon.social at 2026-03-04T19:33:43.000Z ##

🟠 CVE-2026-26673 - High (7.5)

An issue in DJI Mavic Mini, Spark, Mavic Air, Mini, Mini SE 0.1.00.0500 and below allows a remote attacker to cause a denial of service via the DJI Enhanced-WiFi transmission subsystem

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-04T18:29:28.000Z ##

🟠 CVE-2026-26673 - High (7.5)

An issue in DJI Mavic Mini, Spark, Mavic Air, Mini, Mini SE 0.1.00.0500 and below allows a remote attacker to cause a denial of service via the DJI Enhanced-WiFi transmission subsystem

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27971
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-05T17:57:37.233000

1 posts

Qwik is a performance focused javascript framework. qwik <=1.19.0 is vulnerable to RCE due to an unsafe deserialization vulnerability in the server$ RPC mechanism that allows any unauthenticated user to execute arbitrary code on the server with a single HTTP request. Affects any deployment where require() is available at runtime. This vulnerability is fixed in 1.19.1.

offseq@infosec.exchange at 2026-03-04T04:30:28.000Z ##

⚠️ CVE-2026-27971: QwikDev qwik <1.19.1 has a CRITICAL RCE flaw via unsafe deserialization in server-side RPC. No auth needed — patch to 1.19.1+ now! Exploits are trivial if require() is exposed. radar.offseq.com/threat/cve-20 #OffSeq #CVE202627971 #RCE #JavaScript #InfoSec

##

CVE-2026-24113
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-05T16:16:15.673000

1 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `nptr`. When this value is passed into the `getMibPrefix` function and concatenated using `sprintf` without proper size validation, it could lead to a buffer overflow vulnerability.

thehackerwire@mastodon.social at 2026-03-03T16:03:21.000Z ##

🔴 CVE-2026-24113 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `nptr`. When this value is passed into the `getMibPrefix` function and concatenated using `sprintf` without proper size va...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-59786
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-05T15:31:38

2 posts

2N Access Commander version 3.4.2 and prior improperly invalidates session tokens, allowing multiple session cookies to remain active after logout in web application.

thehackerwire@mastodon.social at 2026-03-05T14:49:03.000Z ##

🔴 CVE-2025-59786 - Critical (9.8)

2N Access Commander version 3.4.2 and prior improperly invalidates session tokens, allowing multiple session cookies to remain active after logout in web application.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T14:49:03.000Z ##

🔴 CVE-2025-59786 - Critical (9.8)

2N Access Commander version 3.4.2 and prior improperly invalidates session tokens, allowing multiple session cookies to remain active after logout in web application.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69411
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-05T15:30:36

2 posts

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Robert Seyfriedsberger ionCube tester plus ioncube-tester-plus allows Path Traversal.This issue affects ionCube tester plus: from n/a through <= 1.3.

thehackerwire@mastodon.social at 2026-03-05T17:22:40.000Z ##

🟠 CVE-2025-69411 - High (7.5)

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Robert Seyfriedsberger ionCube tester plus ioncube-tester-plus allows Path Traversal.This issue affects ionCube tester plus: from n/a through &lt;= 1.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T17:22:40.000Z ##

🟠 CVE-2025-69411 - High (7.5)

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Robert Seyfriedsberger ionCube tester plus ioncube-tester-plus allows Path Traversal.This issue affects ionCube tester plus: from n/a through &lt;= 1.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28121
(8.1 HIGH)

EPSS: 0.05%

updated 2026-03-05T15:30:36

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Anderson andersonclinic allows PHP Local File Inclusion.This issue affects Anderson: from n/a through <= 1.4.2.

thehackerwire@mastodon.social at 2026-03-05T16:00:55.000Z ##

🟠 CVE-2026-28121 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Anderson andersonclinic allows PHP Local File Inclusion.This issue affects Anderson: from n/a through &lt;= 1.4.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T16:00:55.000Z ##

🟠 CVE-2026-28121 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Anderson andersonclinic allows PHP Local File Inclusion.This issue affects Anderson: from n/a through &lt;= 1.4.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28123
(8.1 HIGH)

EPSS: 0.05%

updated 2026-03-05T15:30:36

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Veil veil allows PHP Local File Inclusion.This issue affects Veil: from n/a through <= 1.9.

thehackerwire@mastodon.social at 2026-03-05T15:17:45.000Z ##

🟠 CVE-2026-28123 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Veil veil allows PHP Local File Inclusion.This issue affects Veil: from n/a through &lt;= 1.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T15:17:45.000Z ##

🟠 CVE-2026-28123 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Veil veil allows PHP Local File Inclusion.This issue affects Veil: from n/a through &lt;= 1.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29045
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-05T15:26:34

1 posts

## Summary When using `serveStatic` together with route-based middleware protections (e.g. `app.use('/admin/*', ...)`), inconsistent URL decoding allowed protected static resources to be accessed without authorization. The router used `decodeURI`, while `serveStatic` used `decodeURIComponent`. This mismatch allowed paths containing encoded slashes (`%2F`) to bypass middleware protections while s

thehackerwire@mastodon.social at 2026-03-05T08:02:05.000Z ##

🟠 CVE-2026-29045 - High (7.5)

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to version 4.12.4, when using serveStatic together with route-based middleware protections (e.g. app.use('/admin/*', ...)), inconsistent URL decoding allow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66678
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-05T15:16:10.817000

2 posts

An issue in the HwRwDrv.sys component of Nil Hardware Editor Hardware Read & Write Utility v1.25.11.26 and earlier allows attackers to execute arbitrary read and write operations via a crafted request.

1 repos

https://github.com/cwjchoi01/CVE-2025-66678

thehackerwire@mastodon.social at 2026-03-05T18:40:14.000Z ##

🔴 CVE-2025-66678 - Critical (9.8)

An issue in the HwRwDrv.sys component of Nil Hardware Editor Hardware Read & Write Utility v1.25.11.26 and earlier allows attackers to execute arbitrary read and write operations via a crafted request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T18:40:14.000Z ##

🔴 CVE-2025-66678 - Critical (9.8)

An issue in the HwRwDrv.sys component of Nil Hardware Editor Hardware Read & Write Utility v1.25.11.26 and earlier allows attackers to execute arbitrary read and write operations via a crafted request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3204
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-05T15:04:34.670000

1 posts

Improper input validation in the error message page in Devolutions Server 2025.3.16 and earlier allows remote attackers to spoof the displayed error message via a specially crafted URL.

thehackerwire@mastodon.social at 2026-03-04T16:21:02.000Z ##

🔴 CVE-2026-3204 - Critical (9.8)

Improper
input validation in the error message page in Devolutions Server 2025.3.15 and earlier allows remote attackers to spoof the displayed error message via a specially crafted URL.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2590
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-03-05T15:01:54.737000

2 posts

Improper enforcement of the Disable password saving in vaults setting in the connection entry component in Devolutions Remote Desktop Manager 2025.3.30 and earlier allows an authenticated user to persist credentials in vault entries, potentially exposing sensitive information to other users, by creating or editing certain connection types while password saving is disabled.

thehackerwire@mastodon.social at 2026-03-04T16:22:06.000Z ##

🔴 CVE-2026-2590 - Critical (9.8)

Improper
enforcement of the Disable password saving in vaults setting in the
connection entry component in Devolutions Remote Desktop Manager 2025.3.30 and earlier allows an authenticated user to persist credentials in vault entries,
potentiall...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-04T16:20:49.000Z ##

🔴 CVE-2026-2590 - Critical (9.8)

Improper
enforcement of the Disable password saving in vaults setting in the
connection entry component in Devolutions Remote Desktop Manager 2025.3.30 and earlier allows an authenticated user to persist credentials in vault entries,
potentiall...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21628(CVSS UNKNOWN)

EPSS: 0.21%

updated 2026-03-05T12:30:36

1 posts

A improperly secured file management feature allows uploads of dangerous data types for unauthenticated users, leading to remote code execution.

offseq@infosec.exchange at 2026-03-05T10:30:31.000Z ##

🚨 CVE-2026-21628: CRITICAL RCE in Astroid Template Framework (2.0.0 – 3.3.10) for Joomla. Unauthenticated file uploads allow remote code execution. No patch yet — restrict uploads and monitor systems! radar.offseq.com/threat/cve-20 #OffSeq #Joomla #CVE202621628 #RCE

##

CVE-2026-1321
(8.1 HIGH)

EPSS: 0.07%

updated 2026-03-05T09:30:40

1 posts

The Membership Plugin – Restrict Content plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.20. This is due to the `rcp_setup_registration_init()` function accepting any membership level ID via the `rcp_level` POST parameter without validating that the level is active or that payment is required. Combined with the `add_user_role()` method which ass

thehackerwire@mastodon.social at 2026-03-05T08:16:41.000Z ##

🟠 CVE-2026-1321 - High (8.1)

The Membership Plugin – Restrict Content plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.20. This is due to the `rcp_setup_registration_init()` function accepting any membership level ID via t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28536
(9.7 CRITICAL)

EPSS: 0.01%

updated 2026-03-05T09:30:40

2 posts

Authentication bypass vulnerability in the device authentication module. Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.

thehackerwire@mastodon.social at 2026-03-05T08:01:11.000Z ##

🔴 CVE-2026-28536 - Critical (9.6)

Authentication bypass vulnerability in the device authentication module. Impact: Successful exploitation of this vulnerability will affect integrity and confidentiality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-05T07:30:26.000Z ##

🚨 CRITICAL auth bypass (CVE-2026-28536) impacts Huawei HarmonyOS 6.0.0 & 5.1.0. Exploitation risks device integrity & confidentiality. No mitigation yet — monitor for updates! radar.offseq.com/threat/cve-20 #OffSeq #Huawei #Vuln #InfoSec

##

CVE-2026-29127(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-03-05T06:31:28

1 posts

The IDC SFX2100 Satellite Receiver sets overly permissive file system permissions on the monitor user's home directory. The directory is configured with permissions 0777, granting read, write, and execute access to all local users on the system, which may cause local privilege escalation depending on conditions of the system due to the presence of highly privileged processes and binaries residing

offseq@infosec.exchange at 2026-03-05T04:30:30.000Z ##

🚨 CVE-2026-29127 (CRITICAL, CVSS 9.2): SFX2100 Satellite Receiver allows local privilege escalation via 0777 monitor user directory. Audit & restrict permissions to 0700. No exploits yet, but high risk! radar.offseq.com/threat/cve-20 #OffSeq #CVE #Infosec #PrivilegeEscalation

##

CVE-2026-29128(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-03-05T06:30:38

1 posts

IDC SFX2100 Satellite Receiver firmware ships with multiple daemon configuration files for routing components (e.g., zebra, bgpd, ospfd, and ripd) that are owned by root but world-readable. The configuration files (e.g., zebra.conf, bgpd.conf, ospfd.conf, ripd.conf) contain hardcoded or otherwise insecure plaintext passwords (including “enable”/privileged-mode credentials). A remote actor is able

offseq@infosec.exchange at 2026-03-05T06:00:29.000Z ##

🛰️ CVE-2026-29128: HIGH-severity vuln in IDC SFX2100 Satellite Receiver. World-readable config files leak root creds — risking unauthorized access. Audit & secure files, update creds, monitor for abuse. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Infosec #Satellite

##

CVE-2026-29120
(0 None)

EPSS: 0.01%

updated 2026-03-05T06:16:50.720000

1 posts

The /root/anaconda-ks.cfg installation configuration file in International Datacasting Corporation (IDC) SFX Series(SFX2100) SuperFlex Satellite Receiver insecurely stores the hardcoded root password hash. The password itself is highly insecure and susceptible to offline dictionary attacks using the rockyou.txt wordlist. Because direct root SSH login is disabled, an attacker must first obtain low-

offseq@infosec.exchange at 2026-03-04T09:00:28.000Z ##

🛰️ CRITICAL: CVE-2026-29120 in IDC SFX2100 Satellite Receiver — hardcoded root hash in /root/anaconda-ks.cfg. Local attackers can escalate to root via offline cracking. Restrict access & monitor for abuse. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202629120 #IoTSecurity

##

CVE-2026-26034
(7.8 HIGH)

EPSS: 0.02%

updated 2026-03-05T03:31:34

1 posts

UPS Multi-UPS Management Console (MUMC) version 01.06.0001 (A03) contains an Incorrect Default Permissions (CWE-276) vulnerability that allows an attacker to execute arbitrary code with SYSTEM privileges by causing the application to load a specially crafted DLL.

thehackerwire@mastodon.social at 2026-03-05T08:01:54.000Z ##

🟠 CVE-2026-26034 - High (7.8)

UPS Multi-UPS Management Console (MUMC) version 01.06.0001 (A03) contains an Incorrect Default Permissions (CWE-276) vulnerability that allows an attacker to execute arbitrary code with SYSTEM privileges by causing the application to load a specia...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29000
(10.0 CRITICAL)

EPSS: 0.24%

updated 2026-03-05T00:31:17

5 posts

pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication bypass vulnerability in JwtAuthenticator when processing encrypted JWTs that allows remote attackers to forge authentication tokens. Attackers who possess the server's RSA public key can create a JWE-wrapped PlainJWT with arbitrary subject and role claims, bypassing signature verification to authenticate as any user incl

1 repos

https://github.com/kernelzeroday/CVE-2026-29000

chrismerkel at 2026-03-05T13:05:15.085Z ##

Every day is like a loot box drop in software supply chain security

app.opencve.io/cve/CVE-2026-29

##

chrismerkel@infosec.exchange at 2026-03-05T13:05:15.000Z ##

Every day is like a loot box drop in software supply chain security

app.opencve.io/cve/CVE-2026-29

##

thehackerwire@mastodon.social at 2026-03-05T08:31:01.000Z ##

🔴 CVE-2026-29000 - Critical (10)

pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication bypass vulnerability in JwtAuthenticator when processing encrypted JWTs that allows remote attackers to forge authentication tokens. Attackers who possess the server's R...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T08:30:39.000Z ##

🔴 CVE-2026-29000 - Critical (10)

pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication bypass vulnerability in JwtAuthenticator when processing encrypted JWTs that allows remote attackers to forge authentication tokens. Attackers who possess the server's R...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-05T03:00:28.000Z ##

🚨 CRITICAL: pac4j-jwt (pre-4.5.9/5.7.9/6.3.3) vulnerable to auth bypass (CVE-2026-29000). Attackers w/ RSA public key can forge JWTs, impersonate any user. Patch now & audit JWT usage! radar.offseq.com/threat/cve-20 #OffSeq #CVE202629000 #JWT #Security

##

CVE-2026-24848
(9.9 CRITICAL)

EPSS: 0.21%

updated 2026-03-04T21:58:33.060000

1 posts

OpenEMR is a free and open source electronic health records and medical practice management application. In 7.0.4 and earlier, the disposeDocument() method in EtherFaxActions.php allows authenticated users to write arbitrary content to arbitrary locations on the server filesystem. This vulnerability can be exploited to achieve Remote Code Execution (RCE) by uploading malicious PHP web shells.

thehackerwire@mastodon.social at 2026-03-04T21:59:52.000Z ##

🔴 CVE-2026-24848 - Critical (9.9)

OpenEMR is a free and open source electronic health records and medical practice management application. In 7.0.4 and earlier, the disposeDocument() method in EtherFaxActions.php allows authenticated users to write arbitrary content to arbitrary l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24898
(10.0 CRITICAL)

EPSS: 0.19%

updated 2026-03-04T21:57:13.603000

1 posts

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0, an unauthenticated token disclosure vulnerability in the MedEx callback endpoint allows any unauthenticated visitor to obtain the practice's MedEx API tokens, leading to complete third-party service compromise, PHI exfiltration, unauthorized actions on the MedEx platform, and HI

thehackerwire@mastodon.social at 2026-03-04T08:00:25.000Z ##

🔴 CVE-2026-24898 - Critical (10)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0, an unauthenticated token disclosure vulnerability in the MedEx callback endpoint allows any unauthenticated visitor to obtain ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25146
(9.6 CRITICAL)

EPSS: 0.04%

updated 2026-03-04T21:56:00.543000

1 posts

OpenEMR is a free and open source electronic health records and medical practice management application. From 5.0.2 to before 8.0.0, there are (at least) two paths where the gateway_api_key secret value is rendered to the client in plaintext. These secret keys being leaked could result in arbitrary money movement or broad account takeover of payment gateway APIs. This vulnerability is fixed in 8.0

thehackerwire@mastodon.social at 2026-03-04T08:00:37.000Z ##

🔴 CVE-2026-25146 - Critical (9.6)

OpenEMR is a free and open source electronic health records and medical practice management application. From 5.0.2 to before 8.0.0, there are (at least) two paths where the gateway_api_key secret value is rendered to the client in plaintext. Thes...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70236
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-04T21:33:52

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDomainFilter.

thehackerwire@mastodon.social at 2026-03-04T17:03:04.000Z ##

🔴 CVE-2025-70236 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDomainFilter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3539
(8.8 HIGH)

EPSS: 0.01%

updated 2026-03-04T21:32:57

1 posts

Object lifecycle issue in DevTools in Google Chrome prior to 145.0.7632.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-04T20:18:03.000Z ##

🟠 CVE-2026-3539 - High (8.8)

Object lifecycle issue in DevTools in Google Chrome prior to 145.0.7632.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70220
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-04T21:32:45

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formAutoDetecWAN_wizard4.

thehackerwire@mastodon.social at 2026-03-04T19:31:33.000Z ##

🔴 CVE-2025-70220 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formAutoDetecWAN_wizard4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20122
(5.4 MEDIUM)

EPSS: 0.04%

updated 2026-03-04T21:25:22.193000

2 posts

A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system. This vulnerability is due to improper file handling on the API interface of an affected system. An attacker could

AAKL at 2026-03-05T16:15:11.639Z ##

Important. Patch, patch, patch.

New.

Critical: CVE-2026-20122; CVE-2026-20126; and CVE-2026-20128: Cisco Catalyst SD-WAN Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

##

AAKL@infosec.exchange at 2026-03-05T16:15:11.000Z ##

Important. Patch, patch, patch.

New.

Critical: CVE-2026-20122; CVE-2026-20126; and CVE-2026-20128: Cisco Catalyst SD-WAN Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #patchNOW

##

CVE-2025-70241
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-04T21:16:03.260000

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWANType_Wizard5.

thehackerwire@mastodon.social at 2026-03-04T17:14:01.000Z ##

🔴 CVE-2025-70241 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWANType_Wizard5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70239
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-04T21:16:03.077000

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard55.

thehackerwire@mastodon.social at 2026-03-04T16:31:14.000Z ##

🔴 CVE-2025-70239 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard55.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2256
(6.5 MEDIUM)

EPSS: 1.80%

updated 2026-03-04T21:14:09

1 posts

A Command Injection vulnerability in ModelScope's MS-Agent versions v1.6.0rc1 and earlier exists, allowing an attacker to execute arbitrary operating system commands through crafted prompt-derived input.

1 repos

https://github.com/Itamar-Yochpaz/CVE-2026-2256-PoC

beyondmachines1@infosec.exchange at 2026-03-04T08:01:10.000Z ##

Critical MS-Agent Vulnerability Allows Full System Takeover via AI Prompt Injection

ModelScope's MS-Agent framework contains a critical command injection vulnerability (CVE-2026-2256) that allows attackers to execute arbitrary system commands via malicious AI prompts.

**If you are using ModelScope's MS-Agent, this is important and urgent. There's a critical command injection flaw, a public PoC and no patch. Isolate the system as much as possible and until a patch is released, disable the Shell tool or implement strict command allowlists to prevent remote code execution. Treat AI agents with shell access as high-risk assets and isolate them in sandboxed environments.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-3130
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-04T20:36:33.843000

1 posts

Improper Enforcement of Behavioral Controls in Devolutions Server 2025.3.15 and earlier allows an authenticated attacker with the delete permission to delete a PAM account that is currently checked out by selecting it alongside at least one non-checked-out account and performing a bulk deletion.

thehackerwire@mastodon.social at 2026-03-04T16:20:53.000Z ##

🔴 CVE-2026-3130 - Critical (9.8)

Improper Enforcement of Behavioral Controls in Devolutions Server 2025.3.15 and earlier allows an authenticated attacker with the delete permission to delete a PAM account that is currently checked out by selecting it alongside at least one non-c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28518
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-04T20:25:41

1 posts

OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path traversal vulnerability in the .ovpack import handling that allows attackers to write files outside the intended import directory. Attackers can craft malicious ZIP archives with traversal sequences, absolute paths, or drive prefixes in member names to overwrite or create arbitrary files with the importing process privile

thehackerwire@mastodon.social at 2026-03-03T15:26:00.000Z ##

🟠 CVE-2026-28518 - High (7.8)

OpenViking versions 0.2.1 and prior, fixed in commit 46b3e76, contain a path traversal vulnerability in the .ovpack import handling that allows attackers to write files outside the intended import directory. Attackers can craft malicious ZIP arch...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-59059
(9.8 CRITICAL)

EPSS: 0.29%

updated 2026-03-04T20:17:03

2 posts

Remote Code Execution Vulnerability in NashornScriptEngineCreator is reported in Apache Ranger versions <= 2.7.0. Users are recommended to upgrade to version 2.8.0, which fixes this issue.

thehackerwire@mastodon.social at 2026-03-03T15:38:24.000Z ##

🔴 CVE-2025-59059 - Critical (9.8)

Remote Code Execution Vulnerability in NashornScriptEngineCreator is reported in Apache Ranger versions &lt;= 2.7.0.
Users are recommended to upgrade to version 2.8.0, which fixes this issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:37:12.000Z ##

🔴 CVE-2025-59059 - Critical (9.8)

Remote Code Execution Vulnerability in NashornScriptEngineCreator is reported in Apache Ranger versions &lt;= 2.7.0.
Users are recommended to upgrade to version 2.8.0, which fixes this issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28697(CVSS UNKNOWN)

EPSS: 0.28%

updated 2026-03-04T18:39:04

2 posts

## Summary An authenticated administrator can achieve Remote Code Execution (RCE) by injecting a Server-Side Template Injection (SSTI) payload into Twig template fields (e.g., Email Templates). By calling the `craft.app.fs.write()` method, an attacker can write a malicious PHP script to a web-accessible directory and subsequently access it via the browser to execute arbitrary system commands. --

thehackerwire@mastodon.social at 2026-03-05T12:00:22.000Z ##

🔴 CVE-2026-28697 - Critical (9.1)

Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-beta.1, an authenticated administrator can achieve Remote Code Execution (RCE) by injecting a Server-Side Template Injection (SSTI) payload into Twig template fields (e.g...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-05T12:00:22.000Z ##

🔴 CVE-2026-28697 - Critical (9.1)

Craft is a content management system (CMS). Prior to 4.17.0-beta.1 and 5.9.0-beta.1, an authenticated administrator can achieve Remote Code Execution (RCE) by injecting a Server-Side Template Injection (SSTI) payload into Twig template fields (e.g...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-04T18:29:31.000Z ##

🟠 CVE-2026-2025 - High (7.5)

The Mail Mint WordPress plugin before 1.19.5 does not have authorization in one of its REST API endpoint, allowing unauthenticated users to call it and retrieve the email addresses of users on the blog

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70341
(7.8 HIGH)

EPSS: 0.02%

updated 2026-03-04T18:32:57

2 posts

Insecure permissions in App-Auto-Patch v3.4.2 create a race condition which allows attackers to write arbitrary files.

1 repos

https://github.com/malvector/CVE-2025-70341

thehackerwire@mastodon.social at 2026-03-04T16:21:57.000Z ##

🟠 CVE-2025-70341 - High (7.8)

Insecure permissions in App-Auto-Patch v3.4.2 create a race condition which allows attackers to write arbitrary files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-04T16:20:39.000Z ##

🟠 CVE-2025-70341 - High (7.8)

Insecure permissions in App-Auto-Patch v3.4.2 create a race condition which allows attackers to write arbitrary files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20079
(10.0 CRITICAL)

EPSS: 0.18%

updated 2026-03-04T18:32:03

6 posts

A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on an affected device to obtain root access to the underlying operating system. This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerab

1 repos

https://github.com/b1gchoi/CVE-2026-20079

beyondmachines1@infosec.exchange at 2026-03-05T09:01:12.000Z ##

Cisco Issues Emergency Patches for Critical Root-Level Firewall Management Flaws

Cisco patched two critical vulnerabilities (CVE-2026-20079 and CVE-2026-20131) in its Secure Firewall Management Center that allow unauthenticated remote attackers to gain root access and execute arbitrary code.

**If you are using Cisco FMC on premise, this is urgent and important. Make sure the web interface of the FMC is isolated and accessible only from trusted networks. Then apply a very quick patch, since even if isolated, a lot of attackers will be building tools to attack it after they do a successful phishing or endpoint compromise.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

jbz@indieweb.social at 2026-03-04T23:22:00.000Z ##

💥 Cisco warns of max severity Secure FMC flaws giving root access

「 Both vulnerabilities can be exploited remotely by unauthenticated attackers: the authentication bypass flaw (CVE-2026-20079) allows attackers to gain root access to the underlying operating system, while the remote code execution (RCE) vulnerability (CVE-2026-20131) lets them execute arbitrary Java code as root on unpatched devices 」

#cisco #rce #cybersecurity
bleepingcomputer.com/news/secu

##

0x3e4@cyberplace.social at 2026-03-04T20:41:44.000Z ##

yikes.. 50 CVEs for Cisco today incl. two max severity CVE-2026-20131 & CVE-2026-20079 with auth bypass 🫡

hecate.pw/vulnerabilities?sear

🚬

#vulnerability #cve #cisco

##

thehackerwire@mastodon.social at 2026-03-04T18:23:27.000Z ##

🔴 CVE-2026-20079 - Critical (10)

A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on an affected device to obtain root access to the und...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

mttaggart@infosec.exchange at 2026-03-04T18:07:36.000Z ##

2 perfect 10s from Cisco today! First up, CVE-2026-20079, auth bypass in Cisco Secure Firewall Management, by way of a...rogue process launched at boot?

sec.cloudapps.cisco.com/securi

##

AAKL@infosec.exchange at 2026-03-04T16:23:04.000Z ##

Oops.

A long list of Cisco vulnerabilities, two critical, several high-severity.

- Critical: CVE-2026-20079-CWE-288: Cisco Secure Firewall Management Center Software Authentication Bypass Vulnerability sec.cloudapps.cisco.com/securi

- Critical: CVE-2026-20131-CWE-502: Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

More. Grab a coffee sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #vulnerability #Cisco

@cR0w

##

CVE-2026-20049
(7.7 HIGH)

EPSS: 0.14%

updated 2026-03-04T18:32:03

2 posts

A vulnerability in the processing of Galois/Counter Mode (GCM)-encrypted Internet Key Exchange version 2 (IKEv2) IPsec traffic of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to the

thehackerwire@mastodon.social at 2026-03-04T19:01:16.000Z ##

🟠 CVE-2026-20049 - High (7.7)

A vulnerability in the processing of Galois/Counter Mode (GCM)-encrypted Internet Key Exchange version 2 (IKEv2) IPsec traffic of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Softw...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-04T18:28:58.000Z ##

🟠 CVE-2026-20049 - High (7.7)

A vulnerability in the processing of Galois/Counter Mode (GCM)-encrypted Internet Key Exchange version 2 (IKEv2) IPsec traffic of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Softw...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20105
(7.7 HIGH)

EPSS: 0.08%

updated 2026-03-04T18:32:03

1 posts

A vulnerability in the Remote Access SSL VPN functionality of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker with a valid VPN connection to exhaust device memory resulting in a denial of service (DoS) condition.This does not affect the management or MUS interfaces. This vulnerability

thehackerwire@mastodon.social at 2026-03-04T18:20:19.000Z ##

🟠 CVE-2026-20105 - High (7.7)

A vulnerability in the Remote Access SSL VPN functionality of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker with a valid VPN connect...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20082
(8.6 HIGH)

EPSS: 0.11%

updated 2026-03-04T18:32:02

2 posts

A vulnerability in the handling of the embryonic connection limits in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause incoming TCP SYN packets to be dropped incorrectly. This vulnerability is due to improper handling of new, incoming TCP connections that are destined to management or data interfaces when the device is unde

Matchbook3469@mastodon.social at 2026-03-05T13:56:13.000Z ##

🟠 New security advisory:

CVE-2026-20082 affects multiple systems.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #VulnerabilityManagement #CyberSec

##

thehackerwire@mastodon.social at 2026-03-04T18:23:37.000Z ##

🟠 CVE-2026-20082 - High (8.6)

A vulnerability in the handling of the embryonic connection limits in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause incoming TCP SYN packets to be dropped incorrectly.

...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20002
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-04T18:32:02

2 posts

A vulnerability in the web-based management interface of Cisco Secure FMC Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability is due to inadequate validation of user-supplied input. An attacker could exploit this vulnerability by sending crafted requests to an affected device. A successful exploit could allow the attac

thehackerwire@mastodon.social at 2026-03-04T19:01:25.000Z ##

🟠 CVE-2026-20002 - High (8.1)

A vulnerability in the web-based management interface of Cisco Secure FMC Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.

This vulnerability is due to inadequate validation of user-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-04T18:29:18.000Z ##

🟠 CVE-2026-20002 - High (8.1)

A vulnerability in the web-based management interface of Cisco Secure FMC Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.

This vulnerability is due to inadequate validation of user-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20039
(8.6 HIGH)

EPSS: 0.12%

updated 2026-03-04T18:32:02

2 posts

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to ineffective memory management of the VPN web server. An attacker could exploit this vulnerab

thehackerwire@mastodon.social at 2026-03-04T19:00:32.000Z ##

🟠 CVE-2026-20039 - High (8.6)

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-04T18:28:48.000Z ##

🟠 CVE-2026-20039 - High (8.6)

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20014
(7.7 HIGH)

EPSS: 0.14%

updated 2026-03-04T18:32:02

1 posts

A vulnerability in the IKEv2 feature of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an authenticated, remote attacker with valid VPN user credentials to cause a DoS condition on an affected device that may also impact the availability of services to devices elsewhere in the network. This vulnerability is due to the improper processing of IKEv2 packets. An attacke

thehackerwire@mastodon.social at 2026-03-04T18:29:08.000Z ##

🟠 CVE-2026-20014 - High (7.7)

A vulnerability in the IKEv2 feature of Cisco Secure Firewall ASA Software and Cisco Secure FTD Software could allow an authenticated, remote attacker with valid VPN user credentials to cause a DoS condition on an affected device that may also imp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26514
(7.5 HIGH)

EPSS: 0.12%

updated 2026-03-04T18:32:02

2 posts

An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. The traceroute module uses shlex.Split to parse user input without validation, allowing remote attackers to inject arbitrary flags (e.g., -w, -q) via the q parameter. This can be exploited to cause a Denial of Service (DoS) by exhausting system resources.

thehackerwire@mastodon.social at 2026-03-04T16:21:45.000Z ##

🟠 CVE-2026-26514 - High (7.5)

An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. The traceroute module uses shlex.Split to parse user input without validation, allowing remote attackers to inject arbitrary flags (e.g., -w, -q) via the q parameter. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-04T16:20:29.000Z ##

🟠 CVE-2026-26514 - High (7.5)

An Argument Injection vulnerability exists in bird-lg-go before commit 6187a4e. The traceroute module uses shlex.Split to parse user input without validation, allowing remote attackers to inject arbitrary flags (e.g., -w, -q) via the q parameter. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70237
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-04T18:31:51

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetPortTr.

thehackerwire@mastodon.social at 2026-03-04T17:13:51.000Z ##

🔴 CVE-2025-70237 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetPortTr.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70240
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-04T18:31:51

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard51.

thehackerwire@mastodon.social at 2026-03-04T17:02:45.000Z ##

🔴 CVE-2025-70240 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard51.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70234
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-04T18:31:51

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetQoS.

thehackerwire@mastodon.social at 2026-03-04T16:31:05.000Z ##

🔴 CVE-2025-70234 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetQoS.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21385
(7.8 HIGH)

EPSS: 0.34%

updated 2026-03-04T18:13:00.207000

6 posts

Memory corruption while using alignments for memory allocation.

1 repos

https://github.com/automate-it0/qualcomm-vulnerability-scanner

osma@mas.to at 2026-03-04T14:36:32.000Z ##

Google notifying Android user of high-severity vuln CVE-2026-21385 and March 2026 security update might work better if that link the "AI Mode" #slopgenerator did not link to December 2025 bulletin.

##

jbhall56@infosec.exchange at 2026-03-04T13:19:54.000Z ##

The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups. darkreading.com/threat-intelli

##

secdb@infosec.exchange at 2026-03-04T00:00:20.000Z ##

🚨 [CISA-2026:0303] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-21385 (secdb.nttzen.cloud/cve/detail/)
- Name: Qualcomm Multiple Chipsets Memory Corruption Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Qualcomm
- Product: Multiple Chipsets
- Notes: source.android.com/docs/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-22719 (secdb.nttzen.cloud/cve/detail/)
- Name: Broadcom VMware Aria Operations Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Broadcom
- Product: VMware Aria Operations
- Notes: support.broadcom.com/web/ecx/s ; knowledge.broadcom.com/externa ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260303 #cisa20260303 #cve_2026_21385 #cve_2026_22719 #cve202621385 #cve202622719

##

cisakevtracker@mastodon.social at 2026-03-03T19:01:13.000Z ##

CVE ID: CVE-2026-21385
Vendor: Qualcomm
Product: Multiple Chipsets
Date Added: 2026-03-03
Notes: source.android.com/docs/securi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

oversecurity@mastodon.social at 2026-03-03T15:50:04.000Z ##

Aggiornamenti Android marzo 2026, corretta una zero-day già sfruttata: cosa fare subito

Google ha rilasciato l’Android Security Bulletin di marzo 2026, il più corposo dell’anno: 129 vulnerabilità corrette di cui una, la CVE-2026-21385...

🔗️ [Cybersecurity360] link.is.it/AC1JZ9

##

threatcodex@infosec.exchange at 2026-03-03T15:40:18.000Z ##

Google confirms that the Qualcomm Android vulnerability CVE-2026-21385 was exploited in real-world attacks.
#CVE_2026_21385
securityaffairs.com/188823/sec

##

CVE-2025-66945
(9.1 CRITICAL)

EPSS: 0.12%

updated 2026-03-04T17:50:01.217000

1 posts

A path traversal vulnerability exists in the ZIP extraction API of Zdir Pro 4.x. When a crafted ZIP archive is processed by the backend at /api/extract, files may be written outside the intended directory, leading to arbitrary file overwrite and potentially remote code execution

thehackerwire@mastodon.social at 2026-03-04T17:02:54.000Z ##

🔴 CVE-2025-66945 - Critical (9.1)

A path traversal vulnerability exists in the ZIP extraction API of Zdir Pro 4.x. When a crafted ZIP archive is processed by the backend at /api/extract, files may be written outside the intended directory, leading to arbitrary file overwrite and p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-62814
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-04T17:40:21.317000

1 posts

An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, and 2400. A NULL pointer dereference of ft_handle in load_fw_utc_vector() causes a denial of service.

thehackerwire@mastodon.social at 2026-03-04T17:14:11.000Z ##

🟠 CVE-2025-62814 - High (7.5)

An issue was discovered in Samsung Mobile Processor Exynos 1280, 2200, 1380, 1480, and 2400. A NULL pointer dereference of ft_handle in load_fw_utc_vector() causes a denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3224
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-04T15:31:42

3 posts

Authentication bypass in the Microsoft Entra ID (Azure AD) authentication mode in Devolutions Server 2025.3.15.0 and earlier allows an unauthenticated user to authenticate as an arbitrary Entra ID user via a forged JSON Web Token (JWT).

1 repos

https://github.com/HiZisec/CVE-2026-3224-Exploit

thehackerwire@mastodon.social at 2026-03-04T16:30:54.000Z ##

🔴 CVE-2026-3224 - Critical (9.8)

Authentication bypass in the Microsoft Entra ID (Azure AD) authentication mode in Devolutions Server 2025.3.15.0 and earlier allows an unauthenticated user to authenticate as an arbitrary Entra ID user via a forged JSON Web Token (JWT).

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-04T16:21:13.000Z ##

🔴 CVE-2026-3224 - Critical (9.8)

Authentication bypass in the Microsoft Entra ID (Azure AD) authentication mode in Devolutions Server 2025.3.15.0 and earlier allows an unauthenticated user to authenticate as an arbitrary Entra ID user via a forged JSON Web Token (JWT).

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-04T00:00:41.000Z ##

🚨 CVE-2026-3224: CRITICAL auth bypass in Devolutions Server <=2025.3.15.0 using Microsoft Entra ID. Attackers can forge JWTs for full access. No known exploits, but patch ASAP & tighten token validation. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #CyberSecurity #JWT

##

CVE-2025-66363
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-04T15:31:37

1 posts

An issue was discovered in LBS in Samsung Mobile Processor Exynos 2200. There was no check for memory initialization within DL NAS Transport messages.

thehackerwire@mastodon.social at 2026-03-04T17:14:51.000Z ##

🟠 CVE-2025-66363 - High (7.5)

An issue was discovered in LBS in Samsung Mobile Processor Exynos 2200. There was no check for memory initialization within DL NAS Transport messages.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22719
(8.1 HIGH)

EPSS: 7.35%

updated 2026-03-04T15:08:13.743000

6 posts

VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.  To remediate CVE-2026-22719, apply the patches listed in the 'Fixed Version' column of the ' Response Matrix https://supp

beyondmachines1@infosec.exchange at 2026-03-05T08:01:12.000Z ##

CISA Reports Active Exploitation of VMware Aria Operations

CISA reports active exploitation a VMware Aria Operations command injection vulnerability (CVE-2026-22719).

**If you are using VMware Aria Operations, this is urgent. Your systems are under attack, so patch ASAP. If you can't patch, run the official workaround script to disable the migration service and block the primary attack path.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

jbz@indieweb.social at 2026-03-05T03:22:00.000Z ##

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability tracked as CVE-2026-22719 to its Known Exploited Vulnerabilities catalog, flagging the flaw as exploited in attacks.

bleepingcomputer.com/news/secu

#cybersecurity

##

jbhall56@infosec.exchange at 2026-03-04T13:02:02.000Z ##

The recently patched CVE-2026-22719 can be exploited by an unauthenticated attacker for remote code execution. securityweek.com/vmware-aria-o

##

secdb@infosec.exchange at 2026-03-04T00:00:20.000Z ##

🚨 [CISA-2026:0303] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-21385 (secdb.nttzen.cloud/cve/detail/)
- Name: Qualcomm Multiple Chipsets Memory Corruption Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Qualcomm
- Product: Multiple Chipsets
- Notes: source.android.com/docs/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-22719 (secdb.nttzen.cloud/cve/detail/)
- Name: Broadcom VMware Aria Operations Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Broadcom
- Product: VMware Aria Operations
- Notes: support.broadcom.com/web/ecx/s ; knowledge.broadcom.com/externa ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260303 #cisa20260303 #cve_2026_21385 #cve_2026_22719 #cve202621385 #cve202622719

##

oversecurity@mastodon.social at 2026-03-03T23:50:16.000Z ##

CISA flags VMware Aria Operations RCE flaw as exploited in attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability tracked as CVE-2026-22719 to its...

🔗️ [Bleepingcomputer] link.is.it/bR3nUY

##

cisakevtracker@mastodon.social at 2026-03-03T19:00:58.000Z ##

CVE ID: CVE-2026-22719
Vendor: Broadcom
Product: VMware Aria Operations
Date Added: 2026-03-03
Notes: support.broadcom.com/web/ecx/s ; knowledge.broadcom.com/externa ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-3485
(9.8 CRITICAL)

EPSS: 0.33%

updated 2026-03-04T14:07:42.520000

2 posts

A flaw has been found in D-Link DIR-868L 110b03. This affects the function sub_1BF84 of the component SSDP Service. This manipulation of the argument ST causes os command injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

thehackerwire@mastodon.social at 2026-03-04T08:17:44.000Z ##

🔴 CVE-2026-3485 - Critical (9.8)

A flaw has been found in D-Link DIR-868L 110b03. This affects the function sub_1BF84 of the component SSDP Service. This manipulation of the argument ST causes os command injection. It is possible to initiate the attack remotely. The exploit has b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-04T01:30:30.000Z ##

⚠️ CRITICAL: CVE-2026-3485 enables remote OS command injection in D-Link DIR-868L (110b03) via SSDP (UPnP). Exploit is public, no patch. Replace or isolate device ASAP — block SSDP, monitor traffic. radar.offseq.com/threat/cve-20 #OffSeq #CVE20263485 #RouterSecurity #Vuln

##

CVE-2026-3094
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-04T09:31:14

1 posts

Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

thehackerwire@mastodon.social at 2026-03-04T09:18:48.000Z ##

🟠 CVE-2026-3094 - High (7.8)

Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27932
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-04T02:00:50

1 posts

# Summary A resource exhaustion vulnerability in joserfc allows an unauthenticated attacker to cause a Denial of Service (DoS) via CPU exhaustion. When the library decrypts a JSON Web Encryption (JWE) token using Password-Based Encryption (PBES2) algorithms, it reads the p2c (PBES2 Count) parameter directly from the token's protected header. This parameter defines the number of iterations for th

thehackerwire@mastodon.social at 2026-03-04T07:49:19.000Z ##

🟠 CVE-2026-27932 - High (7.5)

joserfc is a Python library that provides an implementation of several JSON Object Signing and Encryption (JOSE) standards. In 1.6.2 and earlier, a resource exhaustion vulnerability in joserfc allows an unauthenticated attacker to cause a Denial o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26279
(9.1 CRITICAL)

EPSS: 0.23%

updated 2026-03-04T02:00:01

1 posts

## Summary A typo in Froxlor's input validation code (`==` instead of `=`) completely disables email format checking for all settings fields declared as email type. This allows an authenticated admin to store arbitrary strings — including shell metacharacters — in the `panel.adminmail` setting. This value is later concatenated into a shell command executed as **root** by a cron job, where the pip

thehackerwire@mastodon.social at 2026-03-04T07:49:38.000Z ##

🔴 CVE-2026-26279 - Critical (9.1)

Froxlor is open source server administration software. Prior to 2.3.4, a typo in Froxlor's input validation code (== instead of =) completely disables email format checking for all settings fields declared as email type. This allows an authenticat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-52365
(7.8 HIGH)

EPSS: 0.09%

updated 2026-03-03T21:52:29.877000

1 posts

A command injection vulnerability in the szc script of the ccurtsinger/stabilizer repository allows remote attackers to execute arbitrary system commands via unsanitized user input passed to os.system(). The vulnerability arises from improper input handling where command-line arguments are directly concatenated into shell commands without validation

thehackerwire@mastodon.social at 2026-03-03T16:20:24.000Z ##

🟠 CVE-2025-52365 - High (7.8)

A command injection vulnerability in the szc script of the ccurtsinger/stabilizer repository allows remote attackers to execute arbitrary system commands via unsanitized user input passed to os.system(). The vulnerability arises from improper inpu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69765
(7.5 HIGH)

EPSS: 0.25%

updated 2026-03-03T21:32:19

1 posts

Tenda AX3 firmware v16.03.12.11 contains a stack overflow in formGetIptv function and the list parameter, which can cause memory corruption and enable remote code execution.

thehackerwire@mastodon.social at 2026-03-04T09:00:18.000Z ##

🟠 CVE-2025-69765 - High (7.5)

Tenda AX3 firmware v16.03.12.11 contains a stack overflow in formGetIptv function and the list parameter, which can cause memory corruption and enable remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0032
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T21:32:19

2 posts

In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T15:38:33.000Z ##

🟠 CVE-2026-0032 - High (7.8)

In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:37:29.000Z ##

🟠 CVE-2026-0032 - High (7.8)

In multiple functions of mem_protect.c, there is a possible out-of-bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24502
(8.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T21:31:24

1 posts

Dell Command | Intel vPro Out of Band, versions prior to 4.7.0, contain an Uncontrolled Search Path Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

thehackerwire@mastodon.social at 2026-03-04T08:17:54.000Z ##

🟠 CVE-2026-24502 - High (8.8)

Dell Command | Intel vPro Out of Band, versions prior to 4.7.0, contain an Uncontrolled Search Path Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70252
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-03T20:16:44.803000

1 posts

An issue was discovered in /goform/WifiWpsStart in Tenda AC6V2.0 V15.03.06.23_multi. The index and mode are controllable. If the conditions are met to sprintf, they will be spliced into tmp. It is worth noting that there is no size check,which leads to a stack overflow vulnerability.

thehackerwire@mastodon.social at 2026-03-04T09:00:39.000Z ##

🟠 CVE-2025-70252 - High (7.5)

An issue was discovered in /goform/WifiWpsStart in Tenda AC6V2.0 V15.03.06.23_multi. The index and mode are controllable. If the conditions are met to sprintf, they will be spliced into tmp. It is worth noting that there is no size check,which lea...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0029
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T19:39:28.533000

1 posts

In __pkvm_init_vm of pkvm.c, there is a possible memory corruption due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T15:37:18.000Z ##

🔴 CVE-2026-0029 - Critical (9.8)

In __pkvm_init_vm of pkvm.c, there is a possible memory corruption due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48645
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T19:23:29.340000

1 posts

In loadDescription of DeviceAdminInfo.java, there is a possible persistent package due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T15:46:06.000Z ##

🟠 CVE-2025-48645 - High (7.8)

In loadDescription of DeviceAdminInfo.java, there is a possible persistent package due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed fo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28399
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-03T19:02:04.290000

1 posts

NocoDB is software for building databases as spreadsheets. Prior to version 0.301.3, an authenticated user with Creator role can inject arbitrary SQL via the DATEADD formula's unit parameter. This issue has been patched in version 0.301.3.

thehackerwire@mastodon.social at 2026-03-04T09:00:29.000Z ##

🟠 CVE-2026-28399 - High (8.8)

NocoDB is software for building databases as spreadsheets. Prior to version 0.301.3, an authenticated user with Creator role can inject arbitrary SQL via the DATEADD formula's unit parameter. This issue has been patched in version 0.301.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-50199
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-03-03T18:47:26.910000

1 posts

Chamilo is a learning management system. Prior to version 1.11.30, there is a blind SSRF vulnerability in /index.php via the POST openid_url parameter. This issue has been patched in version 1.11.30.

thehackerwire@mastodon.social at 2026-03-04T11:01:19.000Z ##

🔴 CVE-2025-50199 - Critical (9.1)

Chamilo is a learning management system. Prior to version 1.11.30, there is a blind SSRF vulnerability in /index.php via the POST openid_url parameter. This issue has been patched in version 1.11.30.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0017
(7.7 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:40:59.027000

1 posts

In onChange of BiometricService.java, there is a possible way to enable fingerprint unlock due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T16:20:34.000Z ##

🟠 CVE-2026-0017 - High (7.7)

In onChange of BiometricService.java, there is a possible way to enable fingerprint unlock due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24112
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-03T18:32:36

1 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by specifying the value of `userInfo`. When `userInfo` is passed into the `addWewifiWhiteUser` function and processed by `sscanf` without size validation, it could lead to a buffer overflow vulnerability.

thehackerwire@mastodon.social at 2026-03-03T16:00:19.000Z ##

🔴 CVE-2026-24112 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by specifying the value of `userInfo`. When `userInfo` is passed into the `addWewifiWhiteUser` function and processed by `sscanf` without size validat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48605
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:32:35

1 posts

In multiple functions of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T16:32:18.000Z ##

🟠 CVE-2025-48605 - High (8.4)

In multiple functions of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not ne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48654
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:32:35

1 posts

In onStart of CompanionDeviceManagerService.java, there is a possible confused deputy due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T15:46:26.000Z ##

🟠 CVE-2025-48654 - High (7.8)

In onStart of CompanionDeviceManagerService.java, there is a possible confused deputy due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48635
(7.7 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:32:34

1 posts

In multiple functions of TaskFragmentOrganizerController.java, there is a possible activity token leak due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T17:35:38.000Z ##

🟠 CVE-2025-48635 - High (7.7)

In multiple functions of TaskFragmentOrganizerController.java, there is a possible activity token leak due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interact...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20777
(8.1 HIGH)

EPSS: 0.10%

updated 2026-03-03T18:31:33

1 posts

A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted .wft file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

thehackerwire@mastodon.social at 2026-03-03T15:36:57.000Z ##

🟠 CVE-2026-20777 - High (8.1)

A heap-based buffer overflow vulnerability exists in the Nicolet WFT parsing functionality of The Biosig Project libbiosig 3.9.2 and Master Branch (db9a9a63). A specially crafted .wft file can lead to arbitrary code execution. An attacker can prov...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48613
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:31:32

1 posts

In VBMeta, there is a possible way to modify and resign VBMeta using a test key, assuming the original image was previously signed with the same key. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T16:21:43.000Z ##

🟠 CVE-2025-48613 - High (7.8)

In VBMeta, there is a possible way to modify and resign VBMeta using a test key, assuming the original image was previously signed with the same key. This could lead to local escalation of privilege with no additional execution privileges needed. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0011
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:31:32

1 posts

In enableSystemPackageLPw of Settings.java, there is a possible way to prevent location access from working due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T16:21:23.000Z ##

🟠 CVE-2026-0011 - High (8.4)

In enableSystemPackageLPw of Settings.java, there is a possible way to prevent location access from working due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User int...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48653
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:31:32

1 posts

In loadDataAndPostValue of multiple files, there is a possible way to obscure permission usage due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T15:46:16.000Z ##

🟠 CVE-2025-48653 - High (7.8)

In loadDataAndPostValue of multiple files, there is a possible way to obscure permission usage due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24115
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-03T18:31:31

1 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the sizes of `gstup` and `gstdwn` before concatenating them into `gstruleQos` may lead to buffer overflow.

thehackerwire@mastodon.social at 2026-03-03T17:00:26.000Z ##

🔴 CVE-2026-24115 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the sizes of `gstup` and `gstdwn` before concatenating them into `gstruleQos` may lead to buffer overflow.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48602
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:31:31

1 posts

In exitKeyguardAndFinishSurfaceBehindRemoteAnimation of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T16:32:08.000Z ##

🟠 CVE-2025-48602 - High (8.4)

In exitKeyguardAndFinishSurfaceBehindRemoteAnimation of KeyguardViewMediator.java, there is a possible lockscreen bypass due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges nee...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24114
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-03T18:31:30

1 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate `pPortMapIndex` may lead to buffer overflows when using `strcpy`.

thehackerwire@mastodon.social at 2026-03-03T16:03:31.000Z ##

🔴 CVE-2026-24114 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate `pPortMapIndex` may lead to buffer overflows when using `strcpy`.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24111
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-03T18:31:29

1 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by specifying the value of `userInfo`. When `userInfo` is passed into the `addAuthUser` function and processed by `sscanf` without size validation, it could lead to buffer overflow.

thehackerwire@mastodon.social at 2026-03-03T16:03:11.000Z ##

🔴 CVE-2026-24111 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by specifying the value of `userInfo`. When `userInfo` is passed into the `addAuthUser` function and processed by `sscanf` without size validation, it...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24109
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-03T18:31:29

1 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `picName`. When this value is used in `sprintf` without validating variable sizes, it could lead to a buffer overflow vulnerability.

thehackerwire@mastodon.social at 2026-03-03T16:00:30.000Z ##

🔴 CVE-2026-24109 - Critical (9.8)

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Attackers may exploit the vulnerability by controlling the value of `picName`. When this value is used in `sprintf` without validating variable sizes, it could lead to a buffer overflow vuln...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48609
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-03T18:13:43.183000

1 posts

In multiple functions of MmsProvider.java, there is a possible way to arbitrarily delete files which affect telephony, SMS, and MMS functionalities due to a path traversal error. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T16:21:33.000Z ##

🔴 CVE-2025-48609 - Critical (9.1)

In multiple functions of MmsProvider.java, there is a possible way to arbitrarily delete files which affect telephony, SMS, and MMS functionalities due to a path traversal error. This could lead to local denial of service with no additional execut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-48619
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T18:13:02.407000

1 posts

In multiple functions of ContentProvider.java, there is a possible way for an app with read-only access to truncate files due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T16:31:57.000Z ##

🟠 CVE-2025-48619 - High (8.4)

In multiple functions of ContentProvider.java, there is a possible way for an app with read-only access to truncate files due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges ne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27012
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-03T17:43:50

2 posts

### Summary A privilege escalation and authentication bypass vulnerability in OpenSTAManager allows any attacker to arbitrarily change a user's group (`idgruppo`) by directly calling `modules/utenti/actions.php`. This can promote an existing account (e.g. agent) into the Amministratori group as well as demote any user including existing administrators. ### Details `modules/utenti/actions.php` is

thehackerwire@mastodon.social at 2026-03-04T08:17:35.000Z ##

🔴 CVE-2026-27012 - Critical (9.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, a privilege escalation and authentication bypass vulnerability in OpenSTAManager allows any attacker to arbitrarily change a user's ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-04T06:00:29.000Z ##

⚠️ CRITICAL: OpenSTAManager <=2.9.8 hit by CVE-2026-27012 (CVSS 9.8). Unauthenticated users can escalate privileges by altering user group IDs via modules/utenti/actions.php. Restrict access & monitor logs! Details: radar.offseq.com/threat/cve-20 #OffSeq #infosec #CVE202627012

##

CVE-2026-0010
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-03T16:16:19.067000

1 posts

In onTransact of IDrmManagerService.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T14:18:21.000Z ##

🟠 CVE-2026-0010 - High (8.4)

In onTransact of IDrmManagerService.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0025
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-03T15:31:40

2 posts

In hasImage of Notification.java, there is a possible way to reveal information across users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

thehackerwire@mastodon.social at 2026-03-03T15:38:43.000Z ##

🟠 CVE-2026-0025 - High (7.8)

In hasImage of Notification.java, there is a possible way to reveal information across users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not need...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-03T15:37:40.000Z ##

🟠 CVE-2026-0025 - High (7.8)

In hasImage of Notification.java, there is a possible way to reveal information across users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not need...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21902
(9.8 CRITICAL)

EPSS: 0.28%

updated 2026-03-03T15:31:37

5 posts

An Incorrect Permission Assignment for Critical Resource vulnerability in the On-Box Anomaly detection framework of Juniper Networks Junos OS Evolved on PTX Series allows an unauthenticated, network-based attacker to execute code as root. The On-Box Anomaly detection framework should only be reachable by other internal processes over the internal routing instance, but not over an externally expos

1 repos

https://github.com/watchtowrlabs/watchTowr-vs-JunosEvolved-CVE-2026-21902

cyberveille@mastobot.ping.moi at 2026-03-05T20:00:12.000Z ##

📢 CVE-2026-21902: exécution de code pré-auth sur Juniper Junos OS Evolved (PTX) via API d'anomalies
📝 Selon watchTowr Labs (labs.watchtowr.com), une vulnérabilit...
📖 cyberveille : cyberveille.ch/posts/2026-03-0
🌐 source : labs.watchtowr.com/sometimes-y
#CVE_2026_21902 #IOC #Cyberveille

##

hackerworkspace@infosec.exchange at 2026-03-04T17:46:49.000Z ##

Sometimes, You Can Just Feel The Security In The Design (Juniper Junos Evolved CVE-2026-21902 Pre-Auth RCE)

labs.watchtowr.com/sometimes-y

#cybersecurity #vulnerability

##

AAKL@infosec.exchange at 2026-03-03T19:04:13.000Z ##

New.

WatchTower: Sometimes, You Can Just Feel The Security In The Design (Juniper Junos Evolved CVE-2026-21902 Pre-Auth RCE) labs.watchtowr.com/sometimes-y #infosec #threatresearch

##

threatcodex@infosec.exchange at 2026-03-03T17:36:53.000Z ##

Sometimes, You Can Just Feel The Security In The Design (Junos OS Evolved CVE-2026-21902 RCE)
#CVE_2026_21902
labs.watchtowr.com/sometimes-y

##

_r_netsec@infosec.exchange at 2026-03-03T14:28:05.000Z ##

Sometimes, You Can Just Feel The Security In The Design (Junos OS Evolved CVE-2026-21902 RCE) - watchTowr Labs labs.watchtowr.com/sometimes-y

##

CVE-2026-20423
(7.1 HIGH)

EPSS: 0.01%

updated 2026-03-03T15:31:36

1 posts

In wlan STA driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00465314; Issue ID: MSV-4956.

thehackerwire@mastodon.social at 2026-03-03T17:59:53.000Z ##

🟠 CVE-2026-20423 - High (7.8)

In wlan STA driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR0046...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24105
(9.8 CRITICAL)

EPSS: 0.29%

updated 2026-03-03T15:16:18.907000

1 posts

An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.18_multi. The value of `v1` was not checked, potentially leading to a command injection vulnerability if injected into doSystemCmd.

thehackerwire@mastodon.social at 2026-03-03T16:00:08.000Z ##

🔴 CVE-2026-24105 - Critical (9.8)

An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.18_multi. The value of `v1` was not checked, potentially leading to a command injection vulnerability if injected into doSystemCmd.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1492
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-03-03T06:31:14

3 posts

The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to improper privilege management in all versions up to, and including, 5.1.2. This is due to the plugin accepting a user-supplied role during membership registration without properly enforcing a server-side allowlist. Thi

jbz@indieweb.social at 2026-03-05T19:55:01.000Z ##

⚠️ WordPress membership plugin bug exploited to create admin accounts

「 The security vulnerability is tracked as CVE-2026-1492 and received a critical severity rating of 9.8. Because the plugin accepts a user-supplied role during membership registration, hackers can create administrator accounts without authentication 」

bleepingcomputer.com/news/secu

#wordpress #cybersecurity

##

jbz@indieweb.social at 2026-03-05T19:55:01.000Z ##

⚠️ WordPress membership plugin bug exploited to create admin accounts

「 The security vulnerability is tracked as CVE-2026-1492 and received a critical severity rating of 9.8. Because the plugin accepts a user-supplied role during membership registration, hackers can create administrator accounts without authentication 」

bleepingcomputer.com/news/secu

#wordpress #cybersecurity

##

beyondmachines1@infosec.exchange at 2026-03-04T10:01:11.000Z ##

Critical Privilege Escalation Vulnerability Reported in WordPress User Registration Plugin

A critical vulnerability (CVE-2026-1492) in the WordPress User Registration & Membership plugin allows unauthenticated attackers to create administrator accounts by exploiting a lack of server-side role validation. Active exploitation has already been detected.

**If you are using User Registration & Membership plugin, this is urgent. Update to version 5.1.3 immediately, because this is an actively exploited flaw. If you can't update, disable user registration.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2026-23600(CVSS UNKNOWN)

EPSS: 0.20%

updated 2026-03-02T15:31:31

1 posts

A remote authentication bypass vulnerability  exists in HPE AutoPass License Server (APLS).

beyondmachines1@infosec.exchange at 2026-03-04T11:01:11.000Z ##

HPE Reports Flaw in AutoPass License Server Enabling Authentication Bypass

HPE reports an authentication bypass vulnerability (CVE-2026-23600) in its AutoPass License Server that allows remote attackers to gain full control over the system.

**Treat your license servers as part of high-priority infrastructure because they often hold the keys to your entire software environment. Immediately update HPE APLS to version 9.19 and ensure these servers are never exposed to the public internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-27884
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-02-27T14:06:59.787000

2 posts

NetExec is a network execution tool. Prior to version 1.5.1, the module spider_plus improperly creates the output file and folder path when saving files from SMB shares. It does not take into account that it is possible for Linux SMB shares to have path traversal characters such as `../` in them. An attacker can craft a filename in an SMB share that includes these characters, which when spider_plu

obivan at 2026-03-05T21:51:32.582Z ##

NetExec vulnerable to arbitrary file write via path traversal in spider_plus module nvd.nist.gov/vuln/detail/cve-2

##

obivan@infosec.exchange at 2026-03-05T21:51:32.000Z ##

NetExec vulnerable to arbitrary file write via path traversal in spider_plus module nvd.nist.gov/vuln/detail/cve-2

##

CVE-2026-3102
(6.3 MEDIUM)

EPSS: 0.20%

updated 2026-02-26T21:32:34

2 posts

A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affects the function SetMacOSTags of the file lib/Image/ExifTool/MacOS.pm of the component PNG File Parser. This manipulation of the argument DateTimeOriginal causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 13.

esmichelson@mas.to at 2026-03-05T17:04:21.000Z ##

Photographers, news orgs, researchers: If you’re using ExifTool on Macintosh update it to version 13.52 (current at this writing). A critical vulnerability in ExifTool is fixed. Maliciously crafted metadata embedded in an image file can run commands on the system. kaspersky.co.uk/blog/exiftool-

#press #photography #OSINT

##

esmichelson@mas.to at 2026-03-05T17:04:21.000Z ##

Photographers, news orgs, researchers: If you’re using ExifTool on Macintosh update it to version 13.52 (current at this writing). A critical vulnerability in ExifTool is fixed. Maliciously crafted metadata embedded in an image file can run commands on the system. kaspersky.co.uk/blog/exiftool-

#press #photography #OSINT

##

CVE-2026-2781
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-26T21:28:58.090000

1 posts

Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.

linux@activitypub.awakari.com at 2026-03-05T14:47:32.000Z ## Ubuntu 20.04 LTS NSS Critical DoS Risk USN-8071-2 CVE-2026-2781 NSS could be made to crash or run programs if it received specially crafted network traffic.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-20127
(10.0 CRITICAL)

EPSS: 2.60%

updated 2026-02-26T16:20:02.187000

3 posts

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is n

4 repos

https://github.com/leemuun/CVE-2026-20127

https://github.com/BugFor-Pings/CVE-2026-20127_EXP

https://github.com/zerozenxlabs/CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE

https://github.com/bluefalconink/cisa-ed-26-03-tracker

cyclone at 2026-03-05T19:42:37.963Z ##

Cisco Catalyst SD-WAN CVSS 10.0 zero-day (CVE-2026-20127) has been actively exploited, with attackers gaining admin access.

Full technical breakdown: forum.hashpwn.net/post/10802

##

cyclone@infosec.exchange at 2026-03-05T19:42:37.000Z ##

Cisco Catalyst SD-WAN CVSS 10.0 zero-day (CVE-2026-20127) has been actively exploited, with attackers gaining admin access.

Full technical breakdown: forum.hashpwn.net/post/10802

#cisco #sdwan #cvss10 #cve202620127 #exploit #cybersecurity #infosec #news #hashpwn

##

AAKL@infosec.exchange at 2026-03-03T18:37:54.000Z ##

Broadcom has an updated advisory for a low-severity vulnerability: Datacom SQL Performance Analyzer 1.2 - Vulnerabilities in Third Party Dependencies support.broadcom.com/web/ecx/s

Updated advisory from Cisco:

Critical: CVE-2026-20127-CWE-287: Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability sec.cloudapps.cisco.com/securi

Also from Cisco: VTK tagged for a zero-day report talosintelligence.com/vulnerab @TalosSecurity #Cisco #Broadcom #infosec #vulnerability #zeroday

##

CVE-2026-27636
(8.8 HIGH)

EPSS: 0.34%

updated 2026-02-26T16:07:11.047000

1 posts

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Prior to version 1.8.206, FreeScout's file upload restriction list in `app/Misc/Helper.php` does not include `.htaccess` or `.user.ini` files. On Apache servers with `AllowOverride All` (a common configuration), an authenticated user can upload a `.htaccess` file to redefine how files are processed, enabling Remote

1 repos

https://github.com/rav1010/CVE-2026-27636

thehackerwire@mastodon.social at 2026-03-04T07:49:29.000Z ##

🔴 CVE-2026-28289 - Critical (10)

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. A patch bypass vulnerability for CVE-2026-27636 in FreeScout 1.8.206 and earlier allows any authenticated user with file upload permissions to achieve Remote Code E...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20128
(7.6 HIGH)

EPSS: 0.02%

updated 2026-02-25T18:31:45

2 posts

A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA user privileges on an affected system. To exploit this vulnerability, the attacker must have valid&nbsp;vmanage credentials on the affected system. This vulnerability is due to the presence of a credential file for the DCA user on an affected system.

AAKL at 2026-03-05T16:15:11.639Z ##

Important. Patch, patch, patch.

New.

Critical: CVE-2026-20122; CVE-2026-20126; and CVE-2026-20128: Cisco Catalyst SD-WAN Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

##

AAKL@infosec.exchange at 2026-03-05T16:15:11.000Z ##

Important. Patch, patch, patch.

New.

Critical: CVE-2026-20122; CVE-2026-20126; and CVE-2026-20128: Cisco Catalyst SD-WAN Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #patchNOW

##

CVE-2026-20126
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-25T18:31:44

2 posts

A vulnerability in Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker with low privileges to gain root privileges on the underlying operating system. This vulnerability is due to an insufficient user authentication mechanism in the REST API. An attacker could exploit this vulnerability by sending a request to the REST API of the affected system. A successful exploit could

AAKL at 2026-03-05T16:15:11.639Z ##

Important. Patch, patch, patch.

New.

Critical: CVE-2026-20122; CVE-2026-20126; and CVE-2026-20128: Cisco Catalyst SD-WAN Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

##

AAKL@infosec.exchange at 2026-03-05T16:15:11.000Z ##

Important. Patch, patch, patch.

New.

Critical: CVE-2026-20122; CVE-2026-20126; and CVE-2026-20128: Cisco Catalyst SD-WAN Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #patchNOW

##

CVE-2026-24061
(9.8 CRITICAL)

EPSS: 81.03%

updated 2026-02-11T15:40:42.937000

1 posts

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Nuclei template

63 repos

https://github.com/SeptembersEND/CVE--2026-24061

https://github.com/duy-31/CVE-2026-24061---telnetd

https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061

https://github.com/scumfrog/cve-2026-24061

https://github.com/0x7556/CVE-2026-24061

https://github.com/Gabs-hub/CVE-2026-24061_Lab

https://github.com/ridpath/Terrminus-CVE-2026-2406

https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-

https://github.com/0p5cur/CVE-2026-24061-POC

https://github.com/buzz075/CVE-2026-24061

https://github.com/Remnant-DB/CVE-2026-24061

https://github.com/Parad0x7e/CVE-2026-24061

https://github.com/BrainBob/CVE-2026-24061

https://github.com/typeconfused/CVE-2026-24061

https://github.com/tiborscholtz/CVE-2026-24061

https://github.com/punitdarji/telnetd-cve-2026-24061

https://github.com/JayGLXR/CVE-2026-24061-POC

https://github.com/m3ngx1ng/cve_2026_24061_cli

https://github.com/setuju/telnetd

https://github.com/hyu164/Terrminus-CVE-2026-2406

https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061

https://github.com/hackingyseguridad/root

https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root

https://github.com/xuemian168/CVE-2026-24061

https://github.com/r00tuser111/CVE-2026-24061

https://github.com/madfxr/Twenty-Three-Scanner

https://github.com/parameciumzhang/Tell-Me-Root

https://github.com/X-croot/CVE-2026-24061_POC

https://github.com/obrunolima1910/CVE-2026-24061

https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester

https://github.com/novitahk/Exploit-CVE-2026-24061

https://github.com/ibrahmsql/CVE-2026-24061-PoC

https://github.com/cumakurt/tscan

https://github.com/hilwa24/CVE-2026-24061

https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd

https://github.com/z3n70/CVE-2026-24061

https://github.com/lavabyte/telnet-CVE-2026-24061

https://github.com/monstertsl/CVE-2026-24061

https://github.com/yanxinwu946/CVE-2026-24061--telnetd

https://github.com/ms0x08-dev/CVE-2026-24061-POC

https://github.com/midox008/CVE-2026-24061

https://github.com/mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-

https://github.com/XsanFlip/CVE-2026-24061-Scanner

https://github.com/balgan/CVE-2026-24061

https://github.com/killsystema/scan-cve-2026-24061

https://github.com/infat0x/CVE-2026-24061

https://github.com/ilostmypassword/Melissae

https://github.com/leonjza/inetutils-telnetd-auth-bypass

https://github.com/franckferman/CVE_2026_24061_PoC

https://github.com/shivam-bathla/CVE-2026-24061-setup

https://github.com/Chocapikk/CVE-2026-24061

https://github.com/SystemVll/CVE-2026-24061

https://github.com/SafeBreach-Labs/CVE-2026-24061

https://github.com/LucasPDiniz/CVE-2026-24061

https://github.com/h3athen/CVE-2026-24061

https://github.com/Mefhika120/Ashwesker-CVE-2026-24061

https://github.com/Mr-Zapi/CVE-2026-24061

https://github.com/Alter-N0X/CVE-2026-24061-POC

https://github.com/TryA9ain/CVE-2026-24061

https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061

https://github.com/Lingzesec/CVE-2026-24061-GUI

https://github.com/Ali-brarou/telnest

https://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-Detector

CVE-2026-21524
(7.4 HIGH)

EPSS: 0.06%

updated 2026-01-23T00:31:24

1 posts

Exposure of sensitive information to an unauthorized actor in Azure Data Explorer allows an unauthorized attacker to disclose information over a network.

AAKL@infosec.exchange at 2026-03-04T16:48:14.000Z ##

New.

Tenable has added this critical vulnerability to its research advisories:

Critical: CVE-2026-21524: Microsoft Azure Data Explorer Cross-Tenant Data Leak with Custom Dashboard tenable.com/security/research/ @tenable #infosec #vulnerability #Microsoft #Azure

##

CVE-2025-38617
(4.7 MEDIUM)

EPSS: 0.00%

updated 2026-01-07T18:30:21

2 posts

In the Linux kernel, the following vulnerability has been resolved: net/packet: fix a race in packet_set_ring() and packet_notifier() When packet_set_ring() releases po->bind_lock, another thread can run packet_notifier() and process an NETDEV_UP event. This race and the fix are both similar to that of commit 15fe076edea7 ("net/packet: fix a race in packet_bind() and packet_notifier()"). There

CVE-2025-14500
(9.8 CRITICAL)

EPSS: 1.29%

updated 2025-12-29T15:58:56.260000

2 posts

IceWarp14 X-File-Operation Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IceWarp. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the X-File-Operation header. The issue results from the lack of proper validation of a user-supplied

beyondmachines1 at 2026-03-05T20:01:11.118Z ##

Critical Unauthenticated RCE Vulnerability in IceWarp Leaves 1,200 Servers Exposed

IceWarp patched a critical unauthenticated remote code execution vulnerability (CVE-2025-14500) that allows attackers to run commands with system privileges via a malicious HTTP header. Over 1,200 servers remain exposed, posing a significant risk to corporate communication data and internal network security.

**If you are using IceWarp, this is important. Unauthenticated attackers can take full control of your entire mail server without needing a password. Apply the latest IceWarp security updates to close this vulnerability. If possible, isolate the platform from the internet.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-03-05T20:01:11.000Z ##

Critical Unauthenticated RCE Vulnerability in IceWarp Leaves 1,200 Servers Exposed

IceWarp patched a critical unauthenticated remote code execution vulnerability (CVE-2025-14500) that allows attackers to run commands with system privileges via a malicious HTTP header. Over 1,200 servers remain exposed, posing a significant risk to corporate communication data and internal network security.

**If you are using IceWarp, this is important. Unauthenticated attackers can take full control of your entire mail server without needing a password. Apply the latest IceWarp security updates to close this vulnerability. If possible, isolate the platform from the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-59718
(9.8 CRITICAL)

EPSS: 1.97%

updated 2025-12-16T21:30:51

1 posts

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7

2 repos

https://github.com/exfil0/CVE-2025-59718-PoC

https://github.com/moften/CVE-2025-59718-Fortinet-Poc

CVE-2025-23299
(6.7 MEDIUM)

EPSS: 0.02%

updated 2025-10-22T18:30:45

1 posts

NVIDIA Bluefield and ConnectX contain a vulnerability in the management interface that could allow a malicious actor with high privilege access to execute arbitrary code.

CVE-2025-0282
(9.1 CRITICAL)

EPSS: 94.19%

updated 2025-10-22T00:34:17

2 posts

A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution.

Nuclei template

10 repos

https://github.com/gmh5225/Blackash-CVE-2025-0282

https://github.com/rxwx/pulse-meter

https://github.com/AdaniKamal/CVE-2025-0282

https://github.com/almanatra/CVE-2025-0282

https://github.com/AnonStorks/CVE-2025-0282-Full-version

https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit

https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser

https://github.com/punitdarji/Ivanti-CVE-2025-0282

https://github.com/sfewer-r7/CVE-2025-0282

https://github.com/watchtowrlabs/CVE-2025-0282

hackmag at 2026-03-05T18:30:03.777Z ##

⚪️ “Dormant” RESURGE Malware Discovered on Ivanti Devices

🗨️ The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its information on the RESURGE malware, which was used in attacks against Ivanti Connect Secure devices via the zero-day vulnerability CVE-2025-0282. This malware was first documented back in March of…

🔗 hackmag.com/news/resurge?utm_s

##

hackmag@infosec.exchange at 2026-03-05T18:30:03.000Z ##

⚪️ “Dormant” RESURGE Malware Discovered on Ivanti Devices

🗨️ The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its information on the RESURGE malware, which was used in attacks against Ivanti Connect Secure devices via the zero-day vulnerability CVE-2025-0282. This malware was first documented back in March of…

🔗 hackmag.com/news/resurge?utm_s

#news

##

CVE-2025-55315
(9.9 CRITICAL)

EPSS: 0.36%

updated 2025-10-21T21:04:55

1 posts

# Microsoft Security Advisory CVE-2025-55315: .NET Security Feature Bypass Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET Core 10.0 , ASP.NET Core 9.0 , ASP.NET Core 8.0, and ASP.NET Core 2.3. This advisory also provides guidance on what developers can do to update their appl

7 repos

https://github.com/sirredbeard/CVE-2025-55315-repro

https://github.com/MartinFabianIonut/CVE-2025-55315

https://github.com/jlinebau/CVE-2025-55315-Scanner-Monitor

https://github.com/RootAid/CVE-2025-55315

https://github.com/nickcopi/CVE-2025-55315-detection-playground

https://github.com/ZemarKhos/CVE-2025-55315-PoC-Exploit

https://github.com/7huukdlnkjkjba/CVE-2025-55315-

certvde@infosec.exchange at 2026-03-04T08:56:25.000Z ##

#OT #Advisory VDE-2026-001
METTLER TOLEDO: ASP.NET core vulnerability in LabX

LabX 21.2.12 (formerly known as LabX Cloud 1.2.12) is affected by the ASP.NET core vulnerability CVE-2025-55315.
#CVE CVE-2025-55315

certvde.com/en/advisories/vde-
#oCSAF
#CSAF mettler-toledo.csaf-tp.certvde

##

CVE-2025-59536(CVSS UNKNOWN)

EPSS: 0.04%

updated 2025-10-03T14:16:36

2 posts

Due to a bug in the startup trust dialog implementation, Claude Code could be tricked to execute code contained in a project before the user accepted the startup trust dialog. Exploiting this requires a user to start Claude Code in an untrusted directory. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to

daniel1820815 at 2026-03-05T16:24:01.202Z ##

Research has discovered critical in ’s Code that allow attackers to achieve remote code execution and steal API credentials through malicious project configurations. Stolen keys can provide access to shared Workspaces for file access and tampering. Anthropic patched the issues, including CVE-2025-59536.

research.checkpoint.com/2026/r

##

daniel1820815@infosec.exchange at 2026-03-05T16:24:01.000Z ##

#CheckPoint Research has discovered critical #vulnerabilities in #Anthropic’s #Claude Code that allow attackers to achieve remote code execution and steal API credentials through malicious project configurations. Stolen keys can provide access to shared Workspaces for file access and tampering. Anthropic patched the issues, including CVE-2025-59536.

research.checkpoint.com/2026/r

##

CVE-2026-28435
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-04T20:18:14.000Z ##

🟠 CVE-2026-28435 - High (7.5)

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.35.0, cpp-httplib (httplib.h) does not enforce Server::set_payload_max_length() on the decompressed request body when using HandlerWithContentReader (stre...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69969
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-04T17:30:00.000Z ##

🔴 CVE-2025-69969 - Critical (9.6)

A lack of authentication and authorization mechanisms in the Bluetooth Low Energy (BLE) communication protocol of SRK Powertech Pvt Ltd Pebble Prism Ultra v2.9.2 allows attackers to reverse engineer the protocol and execute arbitrary commands on t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-50192
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-04T14:00:19.000Z ##

🔴 CVE-2025-50192 - Critical (9.8)

Chamilo is a learning management system. Prior to version 1.11.30, there is a time-based SQL Injection in found in /main/webservices/registration.soap.php. This issue has been patched in version 1.11.30.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-50190
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-04T11:01:42.000Z ##

🔴 CVE-2025-50190 - Critical (9.8)

Chamilo is a learning management system. Prior to version 1.11.30, there is an error-based SQL Injection via the GET openid.assoc_handle parameter with the /index.php script. This issue has been patched in version 1.11.30.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-50189
(0 None)

EPSS: 0.06%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-04T11:01:31.000Z ##

🟠 CVE-2025-50189 - High (8.8)

Chamilo is a learning management system. Prior to version 1.11.30, the application performs insufficient validation of data coming from the user from the POST resource[document][SQL_INJECTION_HERE] and POST login parameters found in /main/courseco...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26266
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-04T08:00:12.000Z ##

🔴 CVE-2026-26266 - Critical (9.3)

AliasVault is a privacy-first password manager with built-in email aliasing. A stored cross-site scripting (XSS) vulnerability was identified in the email rendering feature of AliasVault Web Client versions 0.25.3 and lower. When viewing received ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-52998
(0 None)

EPSS: 0.10%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-03T19:00:16.000Z ##

🔴 CVE-2025-52998 - Critical (9.8)

Chamilo is a learning management system. Prior to version 1.11.30, in the application, deserialization of data is performed, the data can be spoofed. An attacker can create objects of arbitrary classes, as well as fully control their properties, a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27826
(0 None)

EPSS: 0.00%

1 posts

N/A

1 repos

https://github.com/plutosecurity/MCPwnfluence

beyondmachines1@infosec.exchange at 2026-03-03T17:01:11.000Z ##

Critical RCE and SSRF Vulnerabilities Discovered in Popular mcp-atlassian Server

mcp-atlassian versions before 0.17.0 contain vulnerabilities (CVE-2026-27825 and CVE-2026-27826) that allow unauthenticated attackers to execute remote code and perform SSRF attacks by exploiting missing path validation and insecure header handling.

**If you use mcp-atlassian, update to version 0.17.0 ASAP. Since these servers run with high privileges and no authentication by default, network isolation is your first defense against unauthorized access and lateral movement withing environments.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-27825
(0 None)

EPSS: 0.00%

1 posts

N/A

1 repos

https://github.com/plutosecurity/MCPwnfluence

beyondmachines1@infosec.exchange at 2026-03-03T17:01:11.000Z ##

Critical RCE and SSRF Vulnerabilities Discovered in Popular mcp-atlassian Server

mcp-atlassian versions before 0.17.0 contain vulnerabilities (CVE-2026-27825 and CVE-2026-27826) that allow unauthenticated attackers to execute remote code and perform SSRF attacks by exploiting missing path validation and insecure header handling.

**If you use mcp-atlassian, update to version 0.17.0 ASAP. Since these servers run with high privileges and no authentication by default, network isolation is your first defense against unauthorized access and lateral movement withing environments.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

Visit counter For Websites