## Updated at UTC 2026-03-31T17:55:58.944887

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-26060 8.8 0.04% 2 0 2026-03-31T16:23:48.100000 Fleet is open source device management software. Prior to 4.81.0, a vulnerabilit
CVE-2026-5204 8.8 0.00% 2 0 2026-03-31T16:16:35.973000 A vulnerability was determined in Tenda CH22 1.0.0.1. Affected is the function f
CVE-2026-34243 9.8 0.00% 4 0 2026-03-31T16:16:33.253000 wenxian is a tool to generate BIBTEX files from given identifiers (DOI, PMID, ar
CVE-2026-34240 7.5 0.00% 2 0 2026-03-31T16:16:33.090000 JOSE is a Javascript Object Signing and Encryption (JOSE) library. Prior to vers
CVE-2026-30309 7.8 0.00% 2 0 2026-03-31T16:16:30.093000 InfCode's terminal auto-execution module contains a critical command filtering v
CVE-2026-29870 7.6 0.00% 2 0 2026-03-31T16:16:29.507000 A directory traversal vulnerability in the agentic-context-engine project versio
CVE-2026-33579 9.8 0.00% 2 0 2026-03-31T15:32:03 OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /
CVE-2026-33580 9.8 0.00% 2 0 2026-03-31T15:32:03 OpenClaw before 2026.3.28 contains a missing rate limiting vulnerability in the
CVE-2026-21710 7.5 0.01% 1 0 2026-03-31T15:31:56 A flaw in Node.js HTTP request handling causes an uncaught `TypeError` when a re
CVE-2026-3055 9.8 36.74% 27 4 template 2026-03-31T15:31:53 Insufficient input validation inΒ NetScaler ADC and NetScaler Gateway whenΒ config
CVE-2026-5121 9.8 0.05% 2 0 2026-03-31T15:16:22.173000 A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerabi
CVE-2026-34503 7.5 0.00% 2 0 2026-03-31T15:16:19.470000 OpenClaw before 2026.3.28 fails to disconnect active WebSocket sessions when dev
CVE-2026-33578 9.8 0.00% 4 0 2026-03-31T15:16:14.757000 OpenClaw before 2026.3.28 contains a sender policy bypass vulnerability in the G
CVE-2026-0596 9.6 0.00% 4 0 2026-03-31T15:16:10.843000 A command injection vulnerability exists in mlflow/mlflow when serving a model w
CVE-2025-15618 9.1 0.02% 2 0 2026-03-31T15:16:10.653000 Business::OnlinePayment::StoredTransaction versions through 0.01 for Perl uses a
CVE-2026-32920 9.8 0.05% 2 0 2026-03-31T12:31:42 OpenClaw before 2026.3.12 automatically discovers and loads plugins from .OpenCl
CVE-2026-32917 9.8 0.52% 2 0 2026-03-31T12:31:42 OpenClaw before 2026.3.13 contains a remote command injection vulnerability in t
CVE-2026-34506 7.5 0.03% 4 0 2026-03-31T12:31:42 OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its
CVE-2026-32988 7.5 0.01% 4 0 2026-03-31T12:31:42 OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in fs
CVE-2026-32916 7.7 0.07% 2 0 2026-03-31T12:31:42 OpenClaw versions 2026.3.7 before 2026.3.11 contain an authorization bypass vuln
CVE-2026-32982 7.5 0.03% 2 0 2026-03-31T12:31:42 OpenClaw before 2026.3.13 contains an information disclosure vulnerability in th
CVE-2026-4317 None 0.05% 2 0 2026-03-31T12:31:42 SQL inyection (SQLi) vulnerability in Umami Software web application through an
CVE-2026-34509 7.5 0.03% 2 0 2026-03-31T12:16:30.840000 OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its
CVE-2026-34505 9.8 0.06% 4 0 2026-03-31T12:16:30.237000 OpenClaw before 2026.3.12 applies rate limiting only after successful webhook au
CVE-2026-5201 7.5 0.09% 4 0 2026-03-31T09:31:49 A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vuln
CVE-2025-10551 8.7 0.03% 4 0 2026-03-31T09:31:48 A Stored Cross-site Scripting (XSS) vulnerability affecting Document Management
CVE-2025-10553 8.7 0.03% 2 0 2026-03-31T09:31:48 A Stored Cross-site Scripting (XSS) vulnerability affecting Factory Resource Man
CVE-2026-3300 9.8 0.22% 4 0 2026-03-31T03:31:35 The Everest Forms Pro plugin for WordPress is vulnerable to Remote Code Executio
CVE-2026-4020 7.5 0.05% 2 0 2026-03-31T03:31:35 The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exp
CVE-2026-34042 8.2 0.05% 2 0 2026-03-31T03:15:58.220000 act is a project which allows for local running of github actions. Prior to vers
CVE-2026-32727 8.1 0.05% 2 0 2026-03-31T03:15:57.340000 SciTokens is a reference library for generating and using SciTokens. Prior to ve
CVE-2026-30880 0 0.28% 2 0 2026-03-31T01:16:36.270000 baserCMS is a website development framework. Prior to version 5.2.3, baserCMS ha
CVE-2025-32957 8.7 0.04% 2 0 2026-03-31T01:16:34.530000 baserCMS is a website development framework. Prior to version 5.2.3, the applica
CVE-2026-5156 8.8 0.05% 2 0 2026-03-31T00:31:19 A vulnerability was determined in Tenda CH22 1.0.0.1. This impacts the function
CVE-2026-4257 9.8 0.22% 4 0 2026-03-31T00:31:19 The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side
CVE-2026-5130 8.8 0.02% 2 0 2026-03-31T00:31:19 The Debugger & Troubleshooter plugin for WordPress was vulnerable to Unauthentic
CVE-2026-5155 8.8 0.02% 2 0 2026-03-31T00:31:18 A vulnerability was found in Tenda CH22 1.0.0.1. This affects the function fromA
CVE-2026-5154 8.8 0.05% 2 0 2026-03-30T23:17:04.830000 A vulnerability has been found in Tenda CH22 1.0.0.1/1.If. The impacted element
CVE-2026-33984 7.5 0.04% 2 0 2026-03-30T22:16:19.567000 FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio
CVE-2026-29954 7.6 0.03% 1 1 2026-03-30T21:32:06 In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have
CVE-2026-30077 7.5 0.06% 1 0 2026-03-30T21:32:06 OpenAirInterface V2.2.0 AMF crashes when it fails to decode the message. Not all
CVE-2026-29872 8.2 0.05% 1 0 2026-03-30T21:32:06 A cross-session information disclosure vulnerability exists in the awesome-llm-a
CVE-2026-5043 8.8 0.08% 1 0 2026-03-30T21:32:06 A weakness has been identified in Belkin F9K1122 1.00.33. The impacted element i
CVE-2026-5033 7.3 0.02% 1 0 2026-03-30T21:32:06 A vulnerability was detected in code-projects Accounting System 1.0. Affected by
CVE-2026-5152 8.8 0.05% 2 0 2026-03-30T21:31:11 A vulnerability was detected in Tenda CH22 1.0.0.1. Impacted is the function for
CVE-2026-29924 7.6 0.06% 1 0 2026-03-30T21:31:10 Grav CMS v1.7.x and before is vulnerable to XML External Entity (XXE) through th
CVE-2026-34714 9.2 0.02% 2 0 2026-03-30T21:31:10 Vim before 9.2.0272 allows code execution that happens immediately upon opening
CVE-2026-3991 7.8 0.01% 1 0 2026-03-30T21:31:10 Symantec Data Loss Prevention Windows Endpoint, prior to 25.1 MP1, 16.1 MP2, 16.
CVE-2026-5024 8.8 0.03% 2 0 2026-03-30T21:31:03 A vulnerability was found in D-Link DIR-513 1.10. This issue affects the functio
CVE-2026-33030 8.8 0.02% 1 0 2026-03-30T21:26:12 ## Summary Nginx-UI contains an Insecure Direct Object Reference (IDOR) vulnera
CVE-2026-32877 8.2 0.04% 1 0 2026-03-30T21:17:09.767000 Botan is a C++ cryptography library. From version 2.3.0 to before version 3.11.0
CVE-2026-28228 8.8 0.05% 3 0 2026-03-30T21:17:08.740000 OpenOlat is an open source web-based e-learning platform for teaching, learning,
CVE-2026-33634 None 21.15% 1 3 2026-03-30T20:51:04 ## Summary On March 19, 2026, a threat actor used compromised credentials to pu
CVE-2026-32286 7.5 0.04% 1 0 2026-03-30T20:33:04 The DataRow.Decode function fails to properly validate field lengths. A maliciou
CVE-2026-29953 7.4 0.03% 1 0 2026-03-30T20:16:20.913000 SQL Injection vulnerability in SchemaHero 0.23.0 via the column parameter to the
CVE-2026-29925 7.7 0.03% 2 0 2026-03-30T20:16:20.743000 Invoice Ninja v5.12.46 and v5.12.48 is vulnerable to Server-Side Request Forgery
CVE-2026-3502 7.8 0.01% 2 0 2026-03-30T19:16:27.053000 TrueConf Client downloads application update code and applies it without perform
CVE-2026-33032 9.8 0.05% 2 0 2026-03-30T19:16:25.683000 Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and
CVE-2026-5044 8.8 0.08% 2 0 2026-03-30T19:02:07.003000 A security vulnerability has been detected in Belkin F9K1122 1.00.33. This affec
CVE-2026-5021 8.8 0.08% 2 0 2026-03-30T19:01:13.423000 A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromPPTPU
CVE-2026-5035 7.3 0.02% 1 0 2026-03-30T18:59:03.920000 A vulnerability has been found in code-projects Accounting System 1.0. This affe
CVE-2026-5042 8.8 0.08% 1 0 2026-03-30T18:58:01.433000 A security flaw has been discovered in Belkin F9K1122 1.00.33. The affected elem
CVE-2026-33711 7.8 0.01% 1 0 2026-03-30T18:51:41.500000 Incus is a system container and virtual machine manager. Incus provides an API t
CVE-2026-4046 7.5 0.04% 1 0 2026-03-30T18:31:24 The iconv() function in the GNU C Library versions 2.43 and earlier may crash du
CVE-2026-34156 10.0 0.00% 2 0 template 2026-03-30T17:16:25 `##` Summary NocoBase's Workflow Script Node executes user-supplied JavaScript
CVE-2026-32978 8.0 0.04% 1 0 2026-03-30T17:15:43.657000 OpenClaw before 2026.3.11 contains an approval integrity vulnerability where sys
CVE-2026-4176 9.8 0.02% 2 0 2026-03-30T16:16:08.163000 Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from
CVE-2026-5045 8.8 0.08% 1 0 2026-03-30T15:46:42.200000 A vulnerability was detected in Tenda FH1201 1.2.0.14(408). This impacts the fun
CVE-2026-2370 8.1 0.01% 1 0 2026-03-30T15:44:26.737000 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 14.3
CVE-2026-3573 7.5 0.04% 1 0 2026-03-30T15:32:58 Incorrect Authorization vulnerability in Drupal AI (Artificial Intelligence) all
CVE-2026-4933 7.5 0.03% 1 0 2026-03-30T15:32:58 Incorrect Authorization vulnerability in Drupal Unpublished Node Permissions all
CVE-2026-21643 9.8 0.05% 7 2 2026-03-30T15:31:35 An improper neutralization of special elements used in an sql command ('sql inje
CVE-2026-4946 8.8 0.04% 2 0 2026-03-30T15:16:33.710000 Ghidra versions prior to 12.0.3 improperly process annotation directives embedde
CVE-2026-32287 7.5 0.04% 1 0 2026-03-30T15:16:28.290000 Boolean XPath expressions that evaluate to true can cause an infinite loop in lo
CVE-2026-32857 8.6 0.03% 1 0 2026-03-30T13:26:50.827000 Firecrawl version 2.8.0 and prior contain a server-side request forgery (SSRF) p
CVE-2026-33898 8.8 0.06% 1 0 2026-03-30T13:26:29.793000 Incus is a system container and virtual machine manager. Prior to version 6.23.0
CVE-2025-15379 10.0 0.17% 1 0 2026-03-30T13:26:07.647000 A command injection vulnerability exists in MLflow's model serving container ini
CVE-2026-4416 7.8 0.02% 1 0 2026-03-30T13:26:07.647000 The Performance Library component of Gigabyte Control Center has an Insecure Des
CVE-2026-3124 7.5 0.03% 2 0 2026-03-30T13:26:07.647000 The Download Monitor plugin for WordPress is vulnerable to Insecure Direct Objec
CVE-2026-0560 7.5 0.14% 2 0 2026-03-30T13:26:07.647000 A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms ver
CVE-2026-32915 8.8 0.01% 1 0 2026-03-30T13:26:07.647000 OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability allow
CVE-2026-32914 8.8 0.04% 1 0 2026-03-30T13:26:07.647000 OpenClaw before 2026.3.12 contains an insufficient access control vulnerability
CVE-2026-33572 8.4 0.01% 1 0 2026-03-30T13:26:07.647000 OpenClaw before 2026.2.17 creates session transcript JSONL files with overly bro
CVE-2026-5128 10.0 0.14% 1 0 2026-03-30T12:32:36 A sensitive information exposure vulnerability exists in ArthurFiorette steam-tr
CVE-2026-4415 8.1 0.37% 2 0 2026-03-30T09:31:38 Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulner
CVE-2026-3945 7.5 0.05% 1 0 2026-03-30T09:31:38 An integer overflow vulnerability in the HTTP chunked transfer encoding parser i
CVE-2026-2328 7.5 0.02% 2 0 2026-03-30T09:31:38 An unauthenticated remote attacker can exploit insufficient input validation to
CVE-2025-15036 9.6 0.05% 1 0 2026-03-30T03:30:24 A path traversal vulnerability exists in the `extract_archive_to_dir` function w
CVE-2026-34005 8.8 0.09% 2 1 2026-03-29T18:30:30 In Sofia on Xiongmai DVR/NVR (AHB7008T-MH-V2 and NBD7024H-P) 4.03.R11 devices, r
CVE-2026-0562 8.3 0.05% 2 0 2026-03-29T18:30:30 A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows
CVE-2026-0558 7.5 0.11% 2 0 2026-03-29T18:30:30 A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows un
CVE-2026-5046 8.8 0.08% 2 0 2026-03-29T15:30:29 A flaw has been found in Tenda FH1201 1.2.0.14(408). Affected is the function fo
CVE-2026-33573 8.8 0.04% 2 0 2026-03-29T15:30:29 OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in the
CVE-2026-32980 7.5 0.06% 2 0 2026-03-29T15:30:29 OpenClaw before 2026.3.13 reads and buffers Telegram webhook request bodies befo
CVE-2026-33575 7.5 0.03% 2 0 2026-03-29T15:30:29 OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly
CVE-2026-32987 9.8 0.04% 1 0 2026-03-29T15:30:29 OpenClaw before 2026.3.13 allows bootstrap setup codes to be replayed during dev
CVE-2026-32922 10.0 0.21% 2 0 2026-03-29T15:30:28 OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in devic
CVE-2026-32974 8.6 0.11% 3 0 2026-03-29T15:30:28 OpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Fei
CVE-2026-32973 9.8 0.06% 3 0 2026-03-29T15:30:28 OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where
CVE-2026-32924 9.8 0.04% 1 0 2026-03-29T15:30:28 OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where F
CVE-2026-32918 8.4 0.01% 1 0 2026-03-29T15:30:28 OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the
CVE-2026-32975 9.8 0.06% 1 0 2026-03-29T15:30:28 OpenClaw before 2026.3.12 contains a weak authorization vulnerability in Zalouse
CVE-2026-34214 7.7 0.00% 4 0 2026-03-29T15:13:31 ### Summary Iceberg connector REST catalog static credentials (access key) or v
CVE-2026-34209 7.5 0.00% 2 0 2026-03-29T15:10:05 ### Impact The `tempo/session` cooperative close handler validated the close vo
CVE-2026-5041 4.7 0.23% 1 0 2026-03-29T12:31:30 A vulnerability was identified in code-projects Chamber of Commerce Membership M
CVE-2026-5036 8.8 0.04% 2 0 2026-03-29T09:30:17 A vulnerability was found in Tenda 4G06 04.06.01.29. This vulnerability affects
CVE-2026-4851 None 0.09% 2 0 2026-03-29T03:30:17 GRID::Machine versions through 0.127 for Perl allows arbitrary code execution vi
CVE-2026-30457 9.8 0.07% 1 0 2026-03-28T03:32:30 An issue in the /parser/dwoo component of Daylight Studio FuelCMS v1.5.2 allows
CVE-2026-30458 9.1 0.03% 1 0 2026-03-28T03:32:30 An issue in Daylight Studio FuelCMS v1.5.2 allows attackers to exfiltrate users'
CVE-2026-33871 None 0.06% 1 0 2026-03-27T21:48:56 ### Summary A remote user can trigger a Denial of Service (DoS) against a Netty
CVE-2026-30463 7.7 0.03% 1 0 2026-03-27T21:32:39 Daylight Studio FuelCMS v1.5.2 was discovered to contain a SQL injection vulnera
CVE-2025-53521 7.5 19.92% 9 0 2026-03-27T21:31:32 When a BIG-IP APM Access Policy is configured on a virtual server, undisclosed t
CVE-2026-34070 7.5 0.19% 6 1 2026-03-27T19:45:01 ## Summary Multiple functions in `langchain_core.prompts.loading` read files fr
CVE-2026-34040 8.8 0.01% 2 0 2026-03-27T17:43:17 ## Summary A security vulnerability has been detected that allows attackers to
CVE-2026-33945 10.0 0.06% 1 0 2026-03-27T17:22:35 ### Summary Incus instances have an option to provide credentials to systemd in
CVE-2026-27893 8.8 0.03% 1 0 2026-03-27T15:27:20 ### Summary Two model implementation files hardcode `trust_remote_code=True`
CVE-2026-4905 8.8 0.05% 1 0 2026-03-27T00:31:32 A vulnerability was found in Tenda AC5 15.03.06.47. Impacted is the function for
CVE-2026-33017 9.8 5.65% 2 6 2026-03-26T13:26:16.393000 Langflow is a tool for building and deploying AI-powered agents and workflows. I
CVE-2019-25630 8.8 0.67% 1 0 2026-03-26T00:30:54 PhreeBooks ERP 5.2.3 contains an arbitrary file upload vulnerability in the Imag
CVE-2026-33478 10.0 1.95% 1 0 2026-03-24T18:51:55.653000 WWBN AVideo is an open source video platform. In versions up to and including 26
CVE-2025-15517 0 0.05% 1 0 2026-03-24T15:54:09.400000 A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210
CVE-2026-26829 7.5 1.25% 1 0 2026-03-24T15:54:09.400000 A NULL pointer dereference in the safe_atou64 function (src/misc.c) of owntone-s
CVE-2026-4611 7.2 1.01% 1 0 2026-03-24T00:30:29 A flaw has been found in TOTOLINK X6000R 9.4.0cu.1360_B20241207/9.4.0cu.1498_B20
CVE-2026-4438 5.4 0.03% 1 0 2026-03-23T15:31:41 Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that sp
CVE-2026-3584 9.8 0.29% 1 1 2026-03-21T00:32:48 The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in al
CVE-2026-4342 8.8 0.04% 2 1 2026-03-20T13:37:50.737000 A security issue was discovered in ingress-nginx where a combination of Ingress
CVE-2026-31853 5.7 0.01% 1 0 2026-03-19T18:26:38 An overflow on 32-bit systems can cause a crash in the SFW decoder when process
CVE-2026-30883 5.7 0.01% 1 0 2026-03-13T17:10:28.247000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-30931 6.8 0.01% 1 0 2026-03-13T16:59:45.720000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-3582 4.3 0.02% 1 0 2026-03-12T21:35:47 An Incorrect Authorization vulnerability was identified in GitHub Enterprise Ser
CVE-2026-28493 6.5 0.06% 1 0 2026-03-12T15:19:11.260000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-28688 4.0 0.04% 1 0 2026-03-12T15:08:20.260000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-30937 6.8 0.01% 1 0 2026-03-12T14:16:53 A 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an u
CVE-2026-30935 4.4 0.01% 1 0 2026-03-12T14:15:58 BilateralBlurImage contains a heap buffer over-read caused by an incorrect conve
CVE-2026-30929 7.7 0.01% 1 0 2026-03-12T14:15:25 MagnifyImage uses a fixed-size stack buffer. When using a specific image it is p
CVE-2026-28690 6.9 0.01% 1 0 2026-03-12T14:11:49 A stack buffer overflow vulnerability exists in the MNG encoder. There is a boun
CVE-2026-28687 5.3 0.05% 1 0 2026-03-12T14:09:34 A heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attac
CVE-2026-28686 6.8 0.02% 1 0 2026-03-12T14:09:13 A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersiz
CVE-2026-28494 7.1 0.01% 1 0 2026-03-12T14:08:48 A stack buffer overflow exists in ImageMagick's morphology kernel parsing functi
CVE-2026-30936 5.5 0.02% 1 0 2026-03-11T17:48:46.670000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-28693 8.1 0.06% 1 0 2026-03-11T17:44:47.320000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-28692 4.8 0.02% 1 0 2026-03-11T17:42:10.180000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-28691 7.5 0.06% 1 0 2026-03-11T17:40:00.793000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-28689 6.3 0.01% 1 0 2026-03-10T21:02:28 `domain="path"` authorization is checked before final file open/use. A symlink s
CVE-2026-0848 10.0 0.48% 2 3 2026-03-05T21:31:00 NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper
CVE-2026-27799 4.0 0.01% 1 0 2026-02-27T22:17:07 A heap Buffer Over-read vulnerability exists in the DJVU image format handler. T
CVE-2026-27798 4.0 0.01% 1 0 2026-02-27T16:03:31.390000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-24484 5.3 0.06% 1 0 2026-02-27T14:37:34.207000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-25637 5.3 0.06% 1 0 2026-02-27T14:32:59.663000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-25985 7.5 0.02% 1 0 2026-02-25T12:10:42.060000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-25795 5.3 0.06% 1 0 2026-02-24T18:46:49.677000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-25796 5.3 0.06% 1 0 2026-02-24T18:46:13.680000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-25798 5.3 0.15% 1 0 2026-02-24T18:45:31.173000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-25989 7.5 0.02% 1 0 2026-02-24T18:43:16.560000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-24481 7.5 0.05% 1 0 2026-02-24T17:42:17.567000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-26983 5.3 0.02% 1 0 2026-02-24T15:46:51 The MSL interpreter crashes when processing a invalid `<map>` element that cause
CVE-2026-26283 6.2 0.02% 1 0 2026-02-24T15:46:26 A `continue` statement in the JPEG extent binary search loop in the jpeg encoder
CVE-2026-26066 6.2 0.02% 1 0 2026-02-24T15:46:05 A crafted profile contain invalid IPTC data may cause an infinite loop when writ
CVE-2026-25988 5.3 0.02% 1 0 2026-02-24T15:45:15 Sometimes msl.c fails to update the stack index, so an image is stored in the wr
CVE-2026-25987 5.3 0.01% 1 0 2026-02-24T15:44:50 A heap buffer over-read vulnerability exists in the MAP image decoder when proce
CVE-2026-25983 5.3 0.03% 1 0 2026-02-24T15:43:55 A crafted MSL script triggers a heap-use-after-free. The operation element handl
CVE-2026-25969 5.3 0.06% 1 0 2026-02-24T15:43:30 Memory leak exists in `coders/ashlar.c`. The `WriteASHLARImage` allocates a stru
CVE-2026-25967 7.4 0.06% 1 0 2026-02-24T15:43:05 ### Summary A stack-based buffer overflow exists in the ImageMagick FTXT image r
CVE-2026-25966 5.9 0.01% 1 0 2026-02-24T15:42:39 The shipped β€œsecure” security policy includes a rule intended to prevent reading
CVE-2026-25965 8.6 0.05% 1 0 2026-02-24T15:40:08 ImageMagick’s path security policy is enforced on the raw filename string before
CVE-2026-25898 6.5 0.06% 1 0 2026-02-24T15:39:16 The UIL and XPM image encoder do not validate the pixel index value returned by
CVE-2026-25897 6.5 0.06% 1 0 2026-02-24T15:38:37 An Integer Overflow vulnerability exists in the sun decoder. On 32-bit systems/b
CVE-2026-25799 5.3 0.06% 1 0 2026-02-24T15:37:56 A logic error in YUV sampling factor validation allows an invalid sampling facto
CVE-2026-25797 5.7 0.03% 1 0 2026-02-24T15:34:27 The ps encoders, responsible for writing PostScript files, fails to sanitize the
CVE-2026-25794 8.2 0.06% 1 0 2026-02-24T15:31:59 `WriteUHDRImage` in `coders/uhdr.c` uses `int` arithmetic to compute the pixel b
CVE-2026-25638 5.3 0.06% 1 0 2026-02-24T15:30:59 Memory leak exists in `coders/msl.c`. In the `WriteMSLImage` function of the `ms
CVE-2026-25576 5.1 0.01% 1 0 2026-02-24T15:29:48 A heap buffer over-read vulnerability exists in multiple raw image format handle
CVE-2026-24485 7.5 0.06% 1 0 2026-02-24T15:29:16 When a PCD file does not contain a valid marker, the DecodeImage() function beco
CVE-2026-21858 10.0 8.49% 2 11 template 2026-01-13T15:05:00 ### Impact A vulnerability in n8n allows an attacker to access files on the unde
CVE-2025-14847 7.5 74.63% 2 39 template 2025-12-30T00:32:58 Mismatched length fields in Zlib compressed protocol headers may allow a read of
CVE-2025-68664 9.3 0.04% 2 2 2025-12-24T01:08:11 ## Summary A serialization injection vulnerability exists in LangChain's `dumps
CVE-2024-28956 5.6 0.09% 1 0 2025-11-03T21:34:57 Exposure of Sensitive Information in Shared Microarchitectural Structures during
CVE-2024-39279 6.5 0.02% 1 0 2025-11-03T21:32:43 Insufficient granularity of access control in UEFI firmware in some Intel(R) pro
CVE-2024-28047 5.3 0.01% 1 0 2025-11-03T21:32:41 Improper input validation in UEFI firmware for some Intel(R) Processors may allo
CVE-2025-32975 10.0 0.17% 1 0 2025-11-03T20:18:29.263000 Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef
CVE-2025-55315 9.9 0.21% 1 7 2025-10-21T21:04:55 # Microsoft Security Advisory CVE-2025-55315: .NET Security Feature Bypass Vulne
CVE-2022-47386 8.8 2.30% 2 0 2025-07-17T13:02:11.490000 An authenticated, remote attacker may use a stack based out-of-bounds write vuln
CVE-2022-47385 8.8 2.30% 2 0 2025-07-17T13:02:02.717000 An authenticated, remote attacker may use a stack based out-of-bounds write vuln
CVE-2022-47383 8.8 2.30% 2 0 2025-07-17T12:56:32.877000 An authenticated, remote attacker may use a stack based out-of-bounds write vuln
CVE-2022-47382 8.8 2.30% 2 0 2025-07-17T12:50:47.377000 An authenticated remote attacker may use a stack based out-of-bounds write vulne
CVE-2022-47381 8.8 2.30% 2 0 2025-07-17T12:46:26.603000 An authenticated remote attacker may use a stack based out-of-bounds write vulne
CVE-2022-47378 6.5 0.41% 2 0 2025-07-17T12:38:13.340000 Multiple CODESYS products in multiple versions are prone to a improper input val
CVE-2025-6514 9.7 1.29% 2 3 2025-07-09T18:08:46 mcp-remote is exposed to OS command injection when connecting to untrusted MCP s
CVE-2025-29970 7.8 0.74% 2 0 2025-05-19T14:20:49.300000 Use after free in Microsoft Brokering File System allows an authorized attacker
CVE-2025-1551 6.1 0.28% 1 0 2025-05-12T21:02:15.870000 IBM Operational Decision Manager 8.11.0.1, 8.11.1.0, 8.12.0.1, and 9.0.0.1 is vu
CVE-2022-47390 8.8 2.36% 2 0 2024-04-11T21:18:06 An authenticated, remote attacker may use a stack based out-of-bounds write vuln
CVE-2022-47392 6.5 0.31% 2 0 2024-04-04T05:43:07 An authenticated, remote attacker may use a improper input validation vulnerabil
CVE-2022-47389 8.8 4.37% 2 0 2024-04-04T05:43:04 An authenticated, remote attacker may use a stack based out-of-bounds write vuln
CVE-2022-47388 8.8 2.30% 2 0 2024-04-04T05:43:02 An authenticated, remote attacker may use a stack based out-of-bounds write vuln
CVE-2022-47387 8.8 2.30% 2 0 2024-04-04T05:43:02 An authenticated remote attacker may use a stack based out-of-bounds write vulne
CVE-2022-47384 8.8 2.30% 2 0 2024-04-04T05:42:57 An authenticated remote attacker may use a stack based out-of-bounds write vulne
CVE-2022-47380 8.8 2.30% 2 0 2024-04-04T05:42:52 An authenticated remote attacker may use a stack basedΒ  out-of-bounds write vuln
CVE-2022-47379 8.8 2.81% 2 0 2024-04-04T05:42:52 An authenticated, remote attacker may use a out-of-bounds write vulnerability in
CVE-2022-47393 6.5 0.52% 2 0 2024-04-04T04:05:11 An authenticated, remote attacker may use a Improper Restriction of Operations w
CVE-2022-47391 7.5 0.59% 2 0 2024-04-04T04:05:08 In multiple CODESYS products in multiple versions an unauthorized, remote attack
CVE-2019-11922 8.1 0.63% 2 0 2024-04-04T01:22:10 A race condition in the one-pass compression functions of Zstandard prior to ver
CVE-2024-3094 10.0 86.06% 2 78 template 2024-03-29T18:30:50 Malicious code was discovered in the upstream tarballs of xz, starting with vers
CVE-2026-34558 0 0.05% 5 0 N/A
CVE-2026-33577 0 0.00% 2 0 N/A
CVE-2026-33576 0 0.00% 2 0 N/A
CVE-2026-34162 0 0.00% 2 0 N/A
CVE-2026-34163 0 0.00% 2 0 N/A
CVE-2026-21861 0 0.17% 4 0 N/A
CVE-2026-32714 0 0.03% 2 0 N/A
CVE-2026-32716 0 0.03% 2 0 N/A
CVE-2026-34054 0 0.06% 2 0 N/A
CVE-2026-30877 0 0.17% 6 0 N/A
CVE-2026-33986 0 0.04% 2 0 N/A
CVE-2026-34557 0 0.05% 2 0 N/A
CVE-2026-31946 0 0.04% 1 0 N/A
CVE-2026-33691 0 0.00% 1 0 N/A
CVE-2026-31893 0 0.00% 1 0 N/A
CVE-2026-33526 0 1.30% 1 0 N/A
CVE-2026-32748 0 0.98% 1 0 N/A
CVE-2026-33515 0 0.12% 1 0 N/A
CVE-2026-32854 0 1.37% 1 0 N/A
CVE-2026-33396 0 0.76% 1 0 N/A
CVE-2026-33697 0 0.00% 1 0 N/A

CVE-2026-26060
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-31T16:23:48.100000

2 posts

Fleet is open source device management software. Prior to 4.81.0, a vulnerability in Fleet’s password management logic could allow previously issued password reset tokens to remain valid after a user changes their password. As a result, a stale password reset token could be reused to reset the account password even after a defensive password change. Version 4.81.0 patches the issue.

thehackerwire@mastodon.social at 2026-03-31T17:00:40.000Z ##

🟠 CVE-2026-26060 - High (8.8)

Fleet is open source device management software. Prior to 4.81.0, a vulnerability in Fleet’s password management logic could allow previously issued password reset tokens to remain valid after a user changes their password. As a result, a stale ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T17:00:40.000Z ##

🟠 CVE-2026-26060 - High (8.8)

Fleet is open source device management software. Prior to 4.81.0, a vulnerability in Fleet’s password management logic could allow previously issued password reset tokens to remain valid after a user changes their password. As a result, a stale ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5204
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-31T16:16:35.973000

2 posts

A vulnerability was determined in Tenda CH22 1.0.0.1. Affected is the function formWebTypeLibrary of the file /goform/webtypelibrary of the component Parameter Handler. This manipulation of the argument webSiteId causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-31T16:25:13.000Z ##

🟠 CVE-2026-5204 - High (8.8)

A vulnerability was determined in Tenda CH22 1.0.0.1. Affected is the function formWebTypeLibrary of the file /goform/webtypelibrary of the component Parameter Handler. This manipulation of the argument webSiteId causes stack-based buffer overflow...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:25:13.000Z ##

🟠 CVE-2026-5204 - High (8.8)

A vulnerability was determined in Tenda CH22 1.0.0.1. Affected is the function formWebTypeLibrary of the file /goform/webtypelibrary of the component Parameter Handler. This manipulation of the argument webSiteId causes stack-based buffer overflow...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34243
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-31T16:16:33.253000

4 posts

wenxian is a tool to generate BIBTEX files from given identifiers (DOI, PMID, arXiv ID, or paper title). In versions 0.3.1 and prior, a GitHub Actions workflow uses untrusted user input from issue_comment.body directly inside a shell command, allowing potential command injection and arbitrary code execution on the runner. At time of publication, there are no publicly available patches.

thehackerwire@mastodon.social at 2026-03-31T16:30:24.000Z ##

πŸ”΄ CVE-2026-34243 - Critical (9.8)

wenxian is a tool to generate BIBTEX files from given identifiers (DOI, PMID, arXiv ID, or paper title). In versions 0.3.1 and prior, a GitHub Actions workflow uses untrusted user input from issue_comment.body directly inside a shell command, allo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:28:22.000Z ##

πŸ”΄ CVE-2026-34243 - Critical (9.8)

wenxian is a tool to generate BIBTEX files from given identifiers (DOI, PMID, arXiv ID, or paper title). In versions 0.3.1 and prior, a GitHub Actions workflow uses untrusted user input from issue_comment.body directly inside a shell command, allo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:30:24.000Z ##

πŸ”΄ CVE-2026-34243 - Critical (9.8)

wenxian is a tool to generate BIBTEX files from given identifiers (DOI, PMID, arXiv ID, or paper title). In versions 0.3.1 and prior, a GitHub Actions workflow uses untrusted user input from issue_comment.body directly inside a shell command, allo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:28:22.000Z ##

πŸ”΄ CVE-2026-34243 - Critical (9.8)

wenxian is a tool to generate BIBTEX files from given identifiers (DOI, PMID, arXiv ID, or paper title). In versions 0.3.1 and prior, a GitHub Actions workflow uses untrusted user input from issue_comment.body directly inside a shell command, allo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34240
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-31T16:16:33.090000

2 posts

JOSE is a Javascript Object Signing and Encryption (JOSE) library. Prior to version 0.3.5+1, a vulnerability in jose could allow an unauthenticated, remote attacker to forge valid JWS/JWT tokens by using a key embedded in the JOSE header (jwk). The vulnerability exists because key selection could treat header-provided jwk as a verification candidate even when that key was not present in the truste

thehackerwire@mastodon.social at 2026-03-31T16:28:13.000Z ##

🟠 CVE-2026-34240 - High (7.5)

JOSE is a Javascript Object Signing and Encryption (JOSE) library. Prior to version 0.3.5+1, a vulnerability in jose could allow an unauthenticated, remote attacker to forge valid JWS/JWT tokens by using a key embedded in the JOSE header (jwk). Th...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:28:13.000Z ##

🟠 CVE-2026-34240 - High (7.5)

JOSE is a Javascript Object Signing and Encryption (JOSE) library. Prior to version 0.3.5+1, a vulnerability in jose could allow an unauthenticated, remote attacker to forge valid JWS/JWT tokens by using a key embedded in the JOSE header (jwk). Th...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30309
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-31T16:16:30.093000

2 posts

InfCode's terminal auto-execution module contains a critical command filtering vulnerability that renders its blacklist security mechanism completely ineffective. The predefined blocklist fails to cover native high-risk commands in Windows PowerShell (such as powershell), and the matching algorithm lacks dynamic semantic parsing unable to recognize string concatenation, variable assignment, or dou

thehackerwire@mastodon.social at 2026-03-31T16:28:54.000Z ##

🟠 CVE-2026-30309 - High (7.8)

InfCode's terminal auto-execution module contains a critical command filtering vulnerability that renders its blacklist security mechanism completely ineffective. The predefined blocklist fails to cover native high-risk commands in Windows PowerSh...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:28:54.000Z ##

🟠 CVE-2026-30309 - High (7.8)

InfCode's terminal auto-execution module contains a critical command filtering vulnerability that renders its blacklist security mechanism completely ineffective. The predefined blocklist fails to cover native high-risk commands in Windows PowerSh...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29870
(7.6 HIGH)

EPSS: 0.00%

updated 2026-03-31T16:16:29.507000

2 posts

A directory traversal vulnerability in the agentic-context-engine project versions up to 0.7.1 allows arbitrary file writes via the checkpoint_dir parameter in OfflineACE.run. The save_to_file method in ace/skillbook.py fails to normalize or validate filesystem paths, allowing traversal sequences to escape the intended checkpoint directory. This vulnerability allows attackers to overwrite arbitrar

thehackerwire@mastodon.social at 2026-03-31T16:28:45.000Z ##

🟠 CVE-2026-29870 - High (7.6)

A directory traversal vulnerability in the agentic-context-engine project versions up to 0.7.1 allows arbitrary file writes via the checkpoint_dir parameter in OfflineACE.run. The save_to_file method in ace/skillbook.py fails to normalize or valid...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:28:45.000Z ##

🟠 CVE-2026-29870 - High (7.6)

A directory traversal vulnerability in the agentic-context-engine project versions up to 0.7.1 allows arbitrary file writes via the checkpoint_dir parameter in OfflineACE.run. The save_to_file method in ace/skillbook.py fails to normalize or valid...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33579
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-31T15:32:03

2 posts

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve pending device requests asking for broader scopes including admin access by exploiting the missing scope validation in extensions/device-pair/index.ts and

thehackerwire@mastodon.social at 2026-03-31T16:16:31.000Z ##

πŸ”΄ CVE-2026-33579 - Critical (9.8)

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve p...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:16:31.000Z ##

πŸ”΄ CVE-2026-33579 - Critical (9.8)

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve p...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33580
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-31T15:32:03

2 posts

OpenClaw before 2026.3.28 contains a missing rate limiting vulnerability in the Nextcloud Talk webhook authentication that allows attackers to brute-force weak shared secrets. Attackers who can reach the webhook endpoint can exploit this to forge inbound webhook events by repeatedly attempting authentication without throttling.

thehackerwire@mastodon.social at 2026-03-31T15:32:56.000Z ##

πŸ”΄ CVE-2026-33580 - Critical (9.8)

OpenClaw before 2026.3.28 contains a missing rate limiting vulnerability in the Nextcloud Talk webhook authentication that allows attackers to brute-force weak shared secrets. Attackers who can reach the webhook endpoint can exploit this to forge ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T15:32:56.000Z ##

πŸ”΄ CVE-2026-33580 - Critical (9.8)

OpenClaw before 2026.3.28 contains a missing rate limiting vulnerability in the Nextcloud Talk webhook authentication that allows attackers to brute-force weak shared secrets. Attackers who can reach the webhook endpoint can exploit this to forge ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21710
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-31T15:31:56

1 posts

A flaw in Node.js HTTP request handling causes an uncaught `TypeError` when a request is received with a header named `__proto__` and the application accesses `req.headersDistinct`. When this occurs, `dest["__proto__"]` resolves to `Object.prototype` rather than `undefined`, causing `.push()` to be called on a non-array. This exception is thrown synchronously inside a property getter and cannot b

thehackerwire@mastodon.social at 2026-03-30T20:20:46.000Z ##

🟠 CVE-2026-21710 - High (7.5)

A flaw in Node.js HTTP request handling causes an uncaught `TypeError` when a request is received with a header named `__proto__` and the application accesses `req.headersDistinct`.

When this occurs, `dest["__proto__"]` resolves to `Object.prot...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3055
(9.8 CRITICAL)

EPSS: 36.74%

updated 2026-03-31T15:31:53

27 posts

Insufficient input validation inΒ NetScaler ADC and NetScaler Gateway whenΒ configured as a SAML IDPΒ leading toΒ memory overread

Nuclei template

4 repos

https://github.com/fevar54/CVE-2026-3055---Citrix-NetScaler-Memory-Overread-PoC

https://github.com/fevar54/CVE-2026-3055-Scanner---Herramienta-de-Detecci-n

https://github.com/0xBlackash/CVE-2026-3055

https://github.com/RootAid/CVE-2026-3055

beyondmachines1 at 2026-03-31T16:01:46.636Z ##

Critical Citrix NetScaler Vulnerability CVE-2026-3055 Exploited in the Wild

Citrix NetScaler ADC and Gateway are facing active exploitation of a critical memory overread vulnerability, CVE-2026-3055 (CVSS score 9.3), which allows unauthenticated attackers to steal administrative session IDs and sensitive data.

**If you are using NetScaler, this is now urgent - the devices are under attack. If possible, make sure your NetScaler ADC and Gateway appliances are isolated from the internet and accessible from trusted networks only. Them plan an urgent update. Update the firmware to the fixed versions (14.1-66.59, 13.1-62.23, or 13.1-37.262 for FIPS/NDcPP).**

beyondmachines.net/event_detai

##

erosalie at 2026-03-31T15:11:22.237Z ##

March 31, 2026

Cyber Operations

Axios npm Supply Chain Attack Deploys Cross-Platform RAT

A supply chain attack compromised the widely used Axios HTTP client library on npm, affecting versions 1.14.1 and 0.30.4. The attacker hijacked a maintainer account and injected a malicious dependency called "plain-crypto-js," which delivers a remote access trojan capable of executing arbitrary commands, exfiltrating data, and persisting across Windows, macOS, and Linux systems. Socket's automated detection flagged the package within six minutes of publication. With Axios receiving approximately 100 million weekly downloads, the blast radius is significant. The attack was carefully staged: payloads for three operating systems were pre-built, both release branches were hit within 39 minutes, and every trace was designed to self-destruct.

European Commission Confirms Cloud Data Breach

The European Commission confirmed a cyberattack affecting its cloud infrastructure hosting the Europa.eu platform. The ShinyHunters extortion gang claimed responsibility, posting screenshots suggesting possession of approximately 350 GB of data including mail server contents, databases, and confidential documents. The Commission stated its internal systems were not affected. This marks the second breach of EU institutions this year, following an earlier compromise of the Commission's mobile device management platform.

Citrix NetScaler Vulnerability Under Active Exploitation

CISA added CVE-2026-3055β€”a critical out-of-bounds read vulnerability (CVSS 9.3) in Citrix NetScaler ADC and Gatewayβ€”to its known exploited vulnerabilities list on March 30, based on evidence of active exploitation. The flaw affects systems configured as SAML Identity Providers and can leak sensitive memory contents. Threat actors have been probing honeypots to enumerate vulnerable configurations since at least March 27.

Iran-Linked Cyber Campaigns Escalate Amid Conflict

Iranian-linked groups have mounted nearly 5,800 cyberattacks since hostilities began, according to security firm DigiCert. A recent operation targeted Israeli Android users with texts offering bomb shelter information that instead downloaded spyware granting access to cameras, location data, and all device contents. Palo Alto's Unit 42 has identified 7,381 conflict-themed phishing URLs across 1,881 unique hostnames.

Information Operations & Foreign Influence

Iran's AI Deepfake Campaign Draws Hundreds of Millions of Views

A pro-Iran disinformation campaign has generated over 145 million views and nine million interactions across social media platforms. The New York Times identified more than 110 unique deepfakes conveying pro-Iran messaging in a two-week span. The majority are produced by Iranian government-linked networks and amplified by Russian and Chinese information ecosystems. The campaign uses tens of thousands of fake accounts to portray Iran as victorious and its adversaries as weakened. X announced it would penalize creators who post unlabeled AI war content by removing them from revenue-sharing for 90 days.

Russia–China–Iran Convergence in Cognitive Warfare

A Small Wars Journal analysis published March 18 documents how Russia, Iran, and China are coordinating narrative warfare to erode Western cohesion. Russia's 2026 budget increased information operations funding by 54%, adding $458 million for state-run media. Generative AI allows a single adversary to manage thousands of personas producing unique content at scale, while China uses state-aligned media accounts to echo anti-U.S. narratives.

Espionage

Russia Expels British Diplomat on Espionage Allegations

Russia's FSB ordered the expulsion of British Embassy second secretary Albertus Gerhardus Janse van Rensburg, accusing him of economic espionage and providing false information to obtain entry to Russia. The FSB alleged he attempted to obtain sensitive information during informal meetings with Russian economic experts. The British Embassy dismissed the allegations as "completely unacceptable." Russian state TV reported he is the 16th British diplomat expelled over the past two years.

Pakistan-Linked Spy Network Dismantled in India

Indian police arrested 22 individuals operating a Pakistan-linked espionage network that used solar-powered CCTV cameras and GPS-enabled apps to monitor troop movements and critical infrastructure. The network installed surveillance equipment along the Delhi-Jammu railway corridor, with cameras recovered from Delhi Cantonment and Haryana's Sonipat found actively transmitting footage to Pakistan-based handlers. Nearly 50 such installations were planned nationwide. The Indian government has ordered a nationwide CCTV audit in response.

Russia Shifts to Vulnerable Recruits for European Operations

Following the mass expulsion of Russian intelligence officers from Europe, the GRU and FSB have shifted to recruiting financially vulnerable Europeansβ€”including migrants, criminals, and the unemployedβ€”for low-level sabotage and surveillance. Former Wagner Group operatives have been tasked with identifying recruits willing to carry out arson, assaults, or vandalism for small payments. More than 150 suspected hybrid incidents linked to Russia have been reported across the EU and NATO in early 2026.

Assessments & Reports

ODNI Releases 2026 Annual Threat Assessment

DNI Gabbard released the 2026 Annual Threat Assessment on March 26. The report identifies lone wolf attackers as the most likely terrorist threat to the U.S. homeland, highlights Mexican cartels and Venezuelan organized crime as top domestic concerns, and warns that nuclear-capable adversaries could collectively field more than 16,000 missiles by 2035. The assessment also flags AI and quantum computing as critical emerging technology challenges, alongside cyberthreats from China and North Korea.

##

Matchbook3469@mastodon.social at 2026-03-31T11:41:58.000Z ##

πŸ”΅ THREAT INTELLIGENCE

Critical Citrix NetScaler memory flaw actively exploited in attacks

Vulnerability | CRITICAL
CVEs: CVE-2026-3055

Hackers are exploiting a critical severity vulnerability, tracked as CVE-2026-3055, in Citrix NetScaler ADC and NetScaler Gateway appliances to...

Full analysis:
yazoul.net/news/news/critical-

#CyberSecurity #APT #CyberNews

##

bsi@social.bund.de at 2026-03-31T09:36:23.000Z ##

RE: social.bund.de/@bsi/1162958905

πŸ“’βš οΈ Update zur Sicherheitswarnung: Version 1.1: #Citrix NetScaler ADC & Gateway – #Schwachstellen gefΓ€hrden Organisationen.

Seit dem Wochenende hΓ€ufen sich Berichte ΓΌber Angriffe auf Citrix-Systeme [WAT26], [XCO26]. So finden mindestens seit dem 27. MΓ€rz Angriffsversuche mithilfe von CVE-2026-3055 statt.

Mehr Informationen findet ihr hier: bsi.bund.de/dok/1195484

@certbund

##

decio at 2026-03-31T08:42:43.727Z ##

Comme suite Γ  la publication de la pertinente, agrΓ©able et incontournable PART 2 de l'analyse de watchTowr:
les nouveaux scans basΓ©s sur la prΓ©sence de
GET /wsfed/passive?wctx

aka "This is Badβ„’" 😁

plutΓ΄t que sur la version, rΓ©duisent considΓ©rablement le nombre d'appliances exposΓ©es.

On passe Γ  une petite centaine d'appliances potentiellement vulnΓ©rables sur les internets publics :gentleblob: , dont quelques-unes en Suisse selon ONYPHE. πŸ“‰

(CVE-2026-3055 couvre en rΓ©alitΓ© au moins deux vulnΓ©rabilitΓ©s distinctes de memory overread β€” /saml/login et /wsfed/passive?wctx ce qui est, disons… discutableβ„’" de la part de Citrix.)

##

Codebender_Cate at 2026-03-31T03:51:00.959Z ##

sentinelone.com/vulnerability-

##

beyondmachines1@infosec.exchange at 2026-03-31T16:01:46.000Z ##

Critical Citrix NetScaler Vulnerability CVE-2026-3055 Exploited in the Wild

Citrix NetScaler ADC and Gateway are facing active exploitation of a critical memory overread vulnerability, CVE-2026-3055 (CVSS score 9.3), which allows unauthenticated attackers to steal administrative session IDs and sensitive data.

**If you are using NetScaler, this is now urgent - the devices are under attack. If possible, make sure your NetScaler ADC and Gateway appliances are isolated from the internet and accessible from trusted networks only. Them plan an urgent update. Update the firmware to the fixed versions (14.1-66.59, 13.1-62.23, or 13.1-37.262 for FIPS/NDcPP).**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

erosalie@infosec.exchange at 2026-03-31T15:11:22.000Z ##

March 31, 2026

Cyber Operations

Axios npm Supply Chain Attack Deploys Cross-Platform RAT

A supply chain attack compromised the widely used Axios HTTP client library on npm, affecting versions 1.14.1 and 0.30.4. The attacker hijacked a maintainer account and injected a malicious dependency called "plain-crypto-js," which delivers a remote access trojan capable of executing arbitrary commands, exfiltrating data, and persisting across Windows, macOS, and Linux systems. Socket's automated detection flagged the package within six minutes of publication. With Axios receiving approximately 100 million weekly downloads, the blast radius is significant. The attack was carefully staged: payloads for three operating systems were pre-built, both release branches were hit within 39 minutes, and every trace was designed to self-destruct.

European Commission Confirms Cloud Data Breach

The European Commission confirmed a cyberattack affecting its cloud infrastructure hosting the Europa.eu platform. The ShinyHunters extortion gang claimed responsibility, posting screenshots suggesting possession of approximately 350 GB of data including mail server contents, databases, and confidential documents. The Commission stated its internal systems were not affected. This marks the second breach of EU institutions this year, following an earlier compromise of the Commission's mobile device management platform.

Citrix NetScaler Vulnerability Under Active Exploitation

CISA added CVE-2026-3055β€”a critical out-of-bounds read vulnerability (CVSS 9.3) in Citrix NetScaler ADC and Gatewayβ€”to its known exploited vulnerabilities list on March 30, based on evidence of active exploitation. The flaw affects systems configured as SAML Identity Providers and can leak sensitive memory contents. Threat actors have been probing honeypots to enumerate vulnerable configurations since at least March 27.

Iran-Linked Cyber Campaigns Escalate Amid Conflict

Iranian-linked groups have mounted nearly 5,800 cyberattacks since hostilities began, according to security firm DigiCert. A recent operation targeted Israeli Android users with texts offering bomb shelter information that instead downloaded spyware granting access to cameras, location data, and all device contents. Palo Alto's Unit 42 has identified 7,381 conflict-themed phishing URLs across 1,881 unique hostnames.

Information Operations & Foreign Influence

Iran's AI Deepfake Campaign Draws Hundreds of Millions of Views

A pro-Iran disinformation campaign has generated over 145 million views and nine million interactions across social media platforms. The New York Times identified more than 110 unique deepfakes conveying pro-Iran messaging in a two-week span. The majority are produced by Iranian government-linked networks and amplified by Russian and Chinese information ecosystems. The campaign uses tens of thousands of fake accounts to portray Iran as victorious and its adversaries as weakened. X announced it would penalize creators who post unlabeled AI war content by removing them from revenue-sharing for 90 days.

Russia–China–Iran Convergence in Cognitive Warfare

A Small Wars Journal analysis published March 18 documents how Russia, Iran, and China are coordinating narrative warfare to erode Western cohesion. Russia's 2026 budget increased information operations funding by 54%, adding $458 million for state-run media. Generative AI allows a single adversary to manage thousands of personas producing unique content at scale, while China uses state-aligned media accounts to echo anti-U.S. narratives.

Espionage

Russia Expels British Diplomat on Espionage Allegations

Russia's FSB ordered the expulsion of British Embassy second secretary Albertus Gerhardus Janse van Rensburg, accusing him of economic espionage and providing false information to obtain entry to Russia. The FSB alleged he attempted to obtain sensitive information during informal meetings with Russian economic experts. The British Embassy dismissed the allegations as "completely unacceptable." Russian state TV reported he is the 16th British diplomat expelled over the past two years.

Pakistan-Linked Spy Network Dismantled in India

Indian police arrested 22 individuals operating a Pakistan-linked espionage network that used solar-powered CCTV cameras and GPS-enabled apps to monitor troop movements and critical infrastructure. The network installed surveillance equipment along the Delhi-Jammu railway corridor, with cameras recovered from Delhi Cantonment and Haryana's Sonipat found actively transmitting footage to Pakistan-based handlers. Nearly 50 such installations were planned nationwide. The Indian government has ordered a nationwide CCTV audit in response.

Russia Shifts to Vulnerable Recruits for European Operations

Following the mass expulsion of Russian intelligence officers from Europe, the GRU and FSB have shifted to recruiting financially vulnerable Europeansβ€”including migrants, criminals, and the unemployedβ€”for low-level sabotage and surveillance. Former Wagner Group operatives have been tasked with identifying recruits willing to carry out arson, assaults, or vandalism for small payments. More than 150 suspected hybrid incidents linked to Russia have been reported across the EU and NATO in early 2026.

Assessments & Reports

ODNI Releases 2026 Annual Threat Assessment

DNI Gabbard released the 2026 Annual Threat Assessment on March 26. The report identifies lone wolf attackers as the most likely terrorist threat to the U.S. homeland, highlights Mexican cartels and Venezuelan organized crime as top domestic concerns, and warns that nuclear-capable adversaries could collectively field more than 16,000 missiles by 2035. The assessment also flags AI and quantum computing as critical emerging technology challenges, alongside cyberthreats from China and North Korea.

##

bsi@social.bund.de at 2026-03-31T09:36:23.000Z ##

RE: social.bund.de/@bsi/1162958905

πŸ“’βš οΈ Update zur Sicherheitswarnung: Version 1.1: #Citrix NetScaler ADC & Gateway – #Schwachstellen gefΓ€hrden Organisationen.

Seit dem Wochenende hΓ€ufen sich Berichte ΓΌber Angriffe auf Citrix-Systeme [WAT26], [XCO26]. So finden mindestens seit dem 27. MΓ€rz Angriffsversuche mithilfe von CVE-2026-3055 statt.

Mehr Informationen findet ihr hier: bsi.bund.de/dok/1195484

@certbund

##

decio@infosec.exchange at 2026-03-31T08:42:43.000Z ##

Comme suite Γ  la publication de la pertinente, agrΓ©able et incontournable PART 2 de l'analyse de watchTowr:
les nouveaux scans basΓ©s sur la prΓ©sence de
GET /wsfed/passive?wctx

aka "This is Badβ„’" 😁

plutΓ΄t que sur la version, rΓ©duisent considΓ©rablement le nombre d'appliances exposΓ©es.

On passe Γ  une petite centaine d'appliances potentiellement vulnΓ©rables sur les internets publics :gentleblob: , dont quelques-unes en Suisse selon ONYPHE. πŸ“‰

(CVE-2026-3055 couvre en rΓ©alitΓ© au moins deux vulnΓ©rabilitΓ©s distinctes de memory overread β€” /saml/login et /wsfed/passive?wctx ce qui est, disons… discutableβ„’" de la part de Citrix.)

#CyberVeille #Citrix #thisisbad #CVE_2026_3055

##

Codebender_Cate@infosec.exchange at 2026-03-31T03:51:00.000Z ##

sentinelone.com/vulnerability-

##

secdb@infosec.exchange at 2026-03-30T22:00:14.000Z ##

🚨 [CISA-2026:0330] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-3055 (secdb.nttzen.cloud/cve/detail/)
- Name: Citrix NetScaler Out-of-Bounds Read Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Citrix
- Product: NetScaler
- Notes: support.citrix.com/support-hom ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260330 #cisa20260330 #cve_2026_3055 #cve20263055

##

cisakevtracker@mastodon.social at 2026-03-30T20:00:57.000Z ##

CVE ID: CVE-2026-3055
Vendor: Citrix
Product: NetScaler
Date Added: 2026-03-30
Notes: support.citrix.com/support-hom ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-30T18:59:48.000Z ##

CISA has updated the KEV catalogue.

- CVE-2026-3055: Citrix NetScaler Out-of-Bounds Read Vulnerability cve.org/CVERecord?id=CVE-2026- #infosec #CISA #vulnerability

##

oversecurity@mastodon.social at 2026-03-30T18:40:06.000Z ##

Critical Citrix NetScaler memory flaw actively exploited in attacks

Hackers are exploiting a critical severity vulnerability, tracked as CVE-2026-3055, in Citrix NetScaler ADC and NetScaler Gateway appliances to...

πŸ”—οΈ [Bleepingcomputer] link.is.it/kDDWy1

##

threatcodex@infosec.exchange at 2026-03-30T15:11:05.000Z ##

Please, We Beg, Just One Weekend Free Of Appliances (Citrix NetScaler CVE-2026-3055 Memory Overread Part 2)
#CVE_2026_3055
labs.watchtowr.com/please-we-b

##

AAKL@infosec.exchange at 2026-03-30T14:46:43.000Z ##

Posted yesterday, if you missed it.

WatchTower: Please, We Beg, Just One Weekend Free Of Appliances (Citrix NetScaler CVE-2026-3055 Memory Overread Part 2) labs.watchtowr.com/please-we-b #infosec #Citrix #threatresearch

##

hackerworkspace@infosec.exchange at 2026-03-30T12:17:00.000Z ##

Please, We Beg, Just One Weekend Free Of Appliances (Citrix NetScaler CVE-2026-3055 Memory Overread Part 2)

labs.watchtowr.com/please-we-b

Short summary: hackerworkspace.com/article/pl

#threatintelligence #vulnerability #exploit

##

ErikJonker@mastodon.social at 2026-03-30T09:25:03.000Z ##

It just never stops those Citrix vulnerabilities...
thecyberexpress.com/cve-2026-3
#citrix #cybersecurity #cve

##

decio@infosec.exchange at 2026-03-30T07:37:38.000Z ##

la vulnΓ©rabilitΓ© est Γ  considΓ©rer comme activement exploitΓ©e selon watchTowr.

ils ont publiΓ© une analyse technique dΓ©taillΓ©e de la faille, utile pour mieux comprendre le mΓ©canisme d’exploitation
πŸ‘‡
labs.watchtowr.com/please-we-b

Pour les Γ©quipes concernΓ©es, on n’est plus dans l’anticipation mais dans la rΓ©action rapide.

#CyberVeille #Citrix #CVE_2026_3055

##

decio@infosec.exchange at 2026-03-30T07:26:04.000Z ##

⚠️ CVE-2026-3055 / Citrix NetScaler : la reconnaissance est en cours.

Des activitΓ©s de reconnaissance ciblent dΓ©jΓ  les appliances exposΓ©es, avec notamment des requΓͺtes vers /cgi/GetAuthMethods pour identifier les configs exploitables, en particulier les environnements SAML IdP.
GBHackers relaie ces observations
πŸ‘‡
gbhackers.com/hackers-probe-ci

CΓ΄tΓ© exposition, ONYPHE recense plus de 18000 IP uniques sur une version vulnΓ©rable, (dont environ +800 en Suisse).
πŸ‘‡
linkedin.com/posts/onyphe_vuln

Le pattern rappelle clairement les prΓ©cΓ©dents CitrixBleed : si du NetScaler est encore exposΓ©, la fenΓͺtre avant exploitation de masse pourrait Γͺtre trΓ¨s courte.

#CyberVeille #CVE_2026_3055 #Citrix

##

oversecurity@mastodon.social at 2026-03-30T06:20:08.000Z ##

Hackers Circle Citrix NetScaler Flaw Within Hours of Disclosure

A newly disclosed critical vulnerability, CVE-2026-3055, affecting Citrix NetScaler appliances is already drawing attention from threat actors,...

πŸ”—οΈ [Thecyberexpress] link.is.it/gNvuZX

##

patrickcmiller@infosec.exchange at 2026-03-30T00:42:00.000Z ##

Urgent Alert: NetScaler bug CVE-2026-3055 probed by attackers could leak sensitive data securityaffairs.com/190131/hac

##

_r_netsec@infosec.exchange at 2026-03-29T20:13:05.000Z ##

Please, We Beg, Just One Weekend Free Of Appliances (Citrix NetScaler CVE-2026-3055 Memory Overread Part 2) - watchTowr Labs labs.watchtowr.com/please-we-b

##

erosalie@infosec.exchange at 2026-03-29T15:49:02.000Z ##

March 24, 2026

Information Operations & Foreign Influence

A former NSA analyst published a detailed investigation exposing a coordinated multi-nation disinformation network on X involving Russia, China, Iran, and Turkey. The network used a central account called "Global Insight Journal" that followed a three-phase amplification strategy β€” Turkish seeding, Iranian boosting, and Russian boosting β€” to spread narratives favorable to those states during the U.S.-Iran conflict. Posting volume dropped between March 3–5, coinciding with the destruction of Iran's state propaganda headquarters (IRIB), suggesting operational dependency on Iranian state infrastructure.

The Foundation for Defense of Democracies published an analysis arguing the 2026 Annual Threat Assessment omits key Russian threats, particularly Moscow's routine probing of NORAD airspace near Alaska, GPS interference in the Arctic, and simulated strikes against NATO targets. NORAD responded nine times to Russian aircraft near Alaska in 2025 and twice already in 2026.

PolitiFact published a detailed overview of Iran's influence operations during the current conflict, documenting the use of AI-generated imagery through state-affiliated channels and inauthentic social media accounts to spread favorable messaging β€” conducted even as Iran's internet connectivity has been reduced to 1–4% since strikes began on February 28.

Cyber Operations

Citrix released security updates addressing two vulnerabilities in NetScaler ADC and NetScaler Gateway, including a critical flaw (CVE-2026-3055, CVSS 9.3) involving insufficient input validation that could allow unauthenticated remote attackers to leak sensitive information from appliance memory.

Threat actors are suspected of actively exploiting a maximum-severity flaw in Quest KACE Systems Management Appliance (CVE-2025-32975, CVSS 10.0). Malicious activity was first observed the week of March 9 in customer environments. The authentication bypass vulnerability allows attackers to impersonate legitimate users and take over administrative accounts.

Iran-linked cyber operations continue in the wake of the February 28 U.S.-Israel strikes. The Iran-linked group Handala previously claimed the cyberattack on Stryker, the medical device company, which was the first destructive cyberattack to hit a U.S.-based company during the war. Palo Alto Networks' Unit 42 continues to track the broader escalation of Iranian cyber risk, noting multiple state-aligned personas coordinating under an "Electronic Operations Room" formed on February 28, with some estimates of 60 individual hacktivist groups now active.

Espionage

Ukraine's Security Service (SBU) announced it had identified Hungarian military intelligence officer Zoltan Andre as the handler of a spy network in the Zakarpattia region. Andre allegedly exploited Hungarian diplomatic institutions to recruit agents from among locals applying for Hungarian citizenship. The network collected intelligence on Ukrainian defense force deployments, including attempts to identify air defense positions in western Ukraine. Two members of the cell were detained. This is the first time Ukraine has publicly exposed an intelligence network run by a NATO ally.

The U.S. Department of Justice unsealed an indictment charging three individuals β€” Yih-Shyan "Wally" Liaw (U.S. citizen), Ruei-Tsang "Steven" Chang, and Ting-Wei "Willy" Sun (both Taiwanese citizens) β€” with conspiring to illegally divert high-performance AI server technology to China. The defendants allegedly used false documents, staged dummy servers to mislead inspectors, and convoluted transshipment schemes to evade U.S. export controls. Liaw and Sun were arrested; Chang remains a fugitive.

In Vienna, the trial of former Austrian intelligence officer Egisto Ott continues β€” Austria's biggest espionage case in years. Ott is accused of passing information to Russian intelligence and fugitive Wirecard executive Jan Marsalek, including allegedly obtaining a laptop containing secret EU electronic security hardware that was handed to Russian intelligence in 2022.

##

erosalie@infosec.exchange at 2026-03-29T15:44:29.000Z ##

March 28, 2026

Cyber Operations

European Commission confirms breach of cloud infrastructure. The European Commission disclosed on March 27 that attackers compromised its AWS account hosting the Europa.eu web platform, potentially exfiltrating over 350 GB of data including databases. The Commission stated its internal systems were not affected and that it detected and contained the intrusion on March 24. An investigation is underway to determine the full scope of the breach and affected Union entities are being notified.

FDD analysis warns Iranian cyber operations exploit weakened U.S. defenses. A March 27 report from the Foundation for Defense of Democracies highlights that CISA is operating at roughly 60 percent furlough even as Iranian threat actors escalate attacks on U.S. critical infrastructure. The analysis cites two healthcare-sector incidents in two weeks: a late-February ransomware attack on an unnamed U.S. healthcare provider and the March 11 Handala wiper attack on medical device firm Stryker, which disrupted emergency medical services and hospitals in Maryland.

CISA adds critical F5 BIG-IP vulnerability to exploited catalog. CISA flagged a critical flaw in F5 BIG-IP Access Policy Manager (CVE-2025-53521, CVSS 9.3) as actively exploited, reclassifying it from denial-of-service to remote code execution after new intelligence obtained in March 2026. Separately, a critical Citrix NetScaler vulnerability (CVE-2026-3055, CVSS 9.3) is seeing active reconnaissance activity in the wild.

Handala reconstitutes after FBI domain seizure. On March 20, the DOJ and FBI seized four domains tied to Iran-linked Handala Hack Team, which had been used for psychological operations, extortion messaging, and doxxing. Within approximately one day, Handala restored its online presence and resumed publishing. The group remains one of several Iranian state-aligned collectives operating under the Electronic Operations Room established on February 28, 2026.

Information Operations & Foreign Influence

DNI Gabbard's 2026 Annual Threat Assessment omits foreign election interference. The ODNI released its 2026 Annual Threat Assessment on March 18. Notably, the report omits a section on foreign election interference that had been a consistent feature in prior years. The assessment identifies China, Russia, Iran, and North Korea as persistent cyber and intelligence threats to U.S. government and private-sector networks, and flags AI and quantum computing as critical emerging technology challenges.

Kremlin-aligned Matryoshka network targeted 2026 Winter Olympics. A Russian-linked influence network seeded at least 28 fabricated reports during the 2026 Winter Olympics, impersonating outlets such as CBC and Reuters. AI-enhanced clips falsely portrayed Ukrainian athletes as criminals and cheaters, continuing Moscow's pattern of weaponizing sporting events for narrative advantage.

Iran deploys AI-generated imagery in wartime messaging. Iranian state-affiliated channels have circulated AI-generated imagery to amplify wartime narratives, including a fabricated image of a bloody children's backpack posted by the Iranian embassy in Austria, falsely linked to a strike on a girls' school in Minab.

Espionage

UK espionage trial underway at Old Bailey. Chung Biu "Bill" Yuen and Chi Leung "Peter" Wai are currently on trial in London under the National Security Act 2023, charged with assisting a foreign intelligence service and foreign interference. The trial commenced in early March and is expected to conclude in April.

Three men arrested in UK on suspicion of spying for China. London Metropolitan Police counter-terrorism officers arrested three men on March 4 under the National Security Act 2023. Among those detained was David Taylor, 39, husband of Labour MP Joani Reid and director at Asia House, a London-based think tank. The arrests followed an MI5 espionage alert issued to UK parliamentarians in November warning that Chinese intelligence services were actively recruiting individuals with access to government.

U.S. charges individuals in AI technology diversion and North Korean sanctions evasion. In March 2026, the DOJ charged three individuals with conspiring to unlawfully divert U.S. artificial intelligence technology to China, and separately sentenced three others for facilitating computer access in a North Korean sanctions evasion scheme. The 2026 threat assessment noted that North Korea stole approximately $2 billion via a cryptocurrency heist in 2025 to fund weapons programs.

##

nyanbinary@infosec.exchange at 2026-03-29T07:12:00.000Z ##

Anyone got a CVE-2026-3055-vulnerable box I can throw my attempted detection script against? I mean, it's trivial, but still would like to have more certainty about our boxes NOT being impacted than "I think I understood the watchtowr blog & didn't fuck up" when we get asked if we need to emergency patch tomorrow :neobot_giggle:

##

CVE-2026-5121
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-31T15:16:22.173000

2 posts

A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.

thehackerwire@mastodon.social at 2026-03-31T16:30:44.000Z ##

πŸ”΄ CVE-2026-5121 - Critical (9.8)

A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap b...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:30:44.000Z ##

πŸ”΄ CVE-2026-5121 - Critical (9.8)

A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap b...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34503
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-31T15:16:19.470000

2 posts

OpenClaw before 2026.3.28 fails to disconnect active WebSocket sessions when devices are removed or tokens are revoked. Attackers with revoked credentials can maintain unauthorized access through existing live sessions until forced reconnection.

thehackerwire@mastodon.social at 2026-03-31T15:31:49.000Z ##

🟠 CVE-2026-34503 - High (7.5)

OpenClaw before 2026.3.28 fails to disconnect active WebSocket sessions when devices are removed or tokens are revoked. Attackers with revoked credentials can maintain unauthorized access through existing live sessions until forced reconnection.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T15:31:49.000Z ##

🟠 CVE-2026-34503 - High (7.5)

OpenClaw before 2026.3.28 fails to disconnect active WebSocket sessions when devices are removed or tokens are revoked. Attackers with revoked credentials can maintain unauthorized access through existing live sessions until forced reconnection.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33578
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-31T15:16:14.757000

4 posts

OpenClaw before 2026.3.28 contains a sender policy bypass vulnerability in the Google Chat and Zalouser extensions where route-level group allowlist policies silently downgrade to open policy. Attackers can exploit this policy resolution flaw to bypass sender restrictions and interact with bots despite configured allowlist restrictions.

thehackerwire@mastodon.social at 2026-03-31T16:28:36.000Z ##

πŸ”΄ CVE-2026-33578 - Critical (9.8)

OpenClaw before 2026.3.28 contains a sender policy bypass vulnerability in the Google Chat and Zalouser extensions where route-level group allowlist policies silently downgrade to open policy. Attackers can exploit this policy resolution flaw to b...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:16:29.000Z ##

πŸ”΄ CVE-2026-33578 - Critical (9.8)

OpenClaw before 2026.3.28 contains a sender policy bypass vulnerability in the Google Chat and Zalouser extensions where route-level group allowlist policies silently downgrade to open policy. Attackers can exploit this policy resolution flaw to b...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:28:36.000Z ##

πŸ”΄ CVE-2026-33578 - Critical (9.8)

OpenClaw before 2026.3.28 contains a sender policy bypass vulnerability in the Google Chat and Zalouser extensions where route-level group allowlist policies silently downgrade to open policy. Attackers can exploit this policy resolution flaw to b...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:16:29.000Z ##

πŸ”΄ CVE-2026-33578 - Critical (9.8)

OpenClaw before 2026.3.28 contains a sender policy bypass vulnerability in the Google Chat and Zalouser extensions where route-level group allowlist policies silently downgrade to open policy. Attackers can exploit this policy resolution flaw to b...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0596
(9.6 CRITICAL)

EPSS: 0.00%

updated 2026-03-31T15:16:10.843000

4 posts

A command injection vulnerability exists in mlflow/mlflow when serving a model with `enable_mlserver=True`. The `model_uri` is embedded directly into a shell command executed via `bash -c` without proper sanitization. If the `model_uri` contains shell metacharacters, such as `$()` or backticks, it allows for command substitution and execution of attacker-controlled commands. This vulnerability aff

thehackerwire@mastodon.social at 2026-03-31T16:30:34.000Z ##

πŸ”΄ CVE-2026-0596 - Critical (9.6)

A command injection vulnerability exists in mlflow/mlflow when serving a model with `enable_mlserver=True`. The `model_uri` is embedded directly into a shell command executed via `bash -c` without proper sanitization. If the `model_uri` contains s...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:16:39.000Z ##

πŸ”΄ CVE-2026-0596 - Critical (9.6)

A command injection vulnerability exists in mlflow/mlflow when serving a model with `enable_mlserver=True`. The `model_uri` is embedded directly into a shell command executed via `bash -c` without proper sanitization. If the `model_uri` contains s...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:30:34.000Z ##

πŸ”΄ CVE-2026-0596 - Critical (9.6)

A command injection vulnerability exists in mlflow/mlflow when serving a model with `enable_mlserver=True`. The `model_uri` is embedded directly into a shell command executed via `bash -c` without proper sanitization. If the `model_uri` contains s...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:16:39.000Z ##

πŸ”΄ CVE-2026-0596 - Critical (9.6)

A command injection vulnerability exists in mlflow/mlflow when serving a model with `enable_mlserver=True`. The `model_uri` is embedded directly into a shell command executed via `bash -c` without proper sanitization. If the `model_uri` contains s...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15618
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-03-31T15:16:10.653000

2 posts

Business::OnlinePayment::StoredTransaction versions through 0.01 for Perl uses an insecure secret key. Business::OnlinePayment::StoredTransaction generates a secret key by using a MD5 hash of a single call to the built-in rand function, which is unsuitable for cryptographic use. This key is intended for encrypting credit card transaction data.

thehackerwire@mastodon.social at 2026-03-31T16:16:41.000Z ##

πŸ”΄ CVE-2025-15618 - Critical (9.1)

Business::OnlinePayment::StoredTransaction versions through 0.01 for Perl uses an insecure secret key.

Business::OnlinePayment::StoredTransaction generates a secret key by using a MD5 hash of a single call to the built-in rand function, which is ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T16:16:41.000Z ##

πŸ”΄ CVE-2025-15618 - Critical (9.1)

Business::OnlinePayment::StoredTransaction versions through 0.01 for Perl uses an insecure secret key.

Business::OnlinePayment::StoredTransaction generates a secret key by using a MD5 hash of a single call to the built-in rand function, which is ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32920
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-31T12:31:42

2 posts

OpenClaw before 2026.3.12 automatically discovers and loads plugins from .OpenClaw/extensions/ without explicit trust verification, allowing arbitrary code execution. Attackers can execute malicious code by including crafted workspace plugins in cloned repositories that execute when users run OpenClaw from the directory.

thehackerwire@mastodon.social at 2026-03-31T12:28:49.000Z ##

πŸ”΄ CVE-2026-32920 - Critical (9.8)

OpenClaw before 2026.3.12 automatically discovers and loads plugins from .OpenClaw/extensions/ without explicit trust verification, allowing arbitrary code execution. Attackers can execute malicious code by including crafted workspace plugins in c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T12:28:49.000Z ##

πŸ”΄ CVE-2026-32920 - Critical (9.8)

OpenClaw before 2026.3.12 automatically discovers and loads plugins from .OpenClaw/extensions/ without explicit trust verification, allowing arbitrary code execution. Attackers can execute malicious code by including crafted workspace plugins in c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32917
(9.8 CRITICAL)

EPSS: 0.52%

updated 2026-03-31T12:31:42

2 posts

OpenClaw before 2026.3.13 contains a remote command injection vulnerability in the iMessage attachment staging flow that allows attackers to execute arbitrary commands on configured remote hosts. The vulnerability exists because unsanitized remote attachment paths containing shell metacharacters are passed directly to the SCP remote operand without validation, enabling command execution when remot

thehackerwire@mastodon.social at 2026-03-31T12:28:39.000Z ##

πŸ”΄ CVE-2026-32917 - Critical (9.8)

OpenClaw before 2026.3.13 contains a remote command injection vulnerability in the iMessage attachment staging flow that allows attackers to execute arbitrary commands on configured remote hosts. The vulnerability exists because unsanitized remote...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T12:28:39.000Z ##

πŸ”΄ CVE-2026-32917 - Critical (9.8)

OpenClaw before 2026.3.13 contains a remote command injection vulnerability in the iMessage attachment staging flow that allows attackers to execute arbitrary commands on configured remote hosts. The vulnerability exists because unsanitized remote...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34506
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-31T12:31:42

4 posts

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended authorization checks. When a team/channel route allowlist is configured with an empty groupAllowFrom parameter, the message handler synthesizes wildcard sender authorization, permitting any sender in the matched team/channel to trigger replies

thehackerwire@mastodon.social at 2026-03-31T12:27:02.000Z ##

🟠 CVE-2026-34506 - High (7.5)

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended authorization checks. When a team/channel route allowlist is configured with an empty group...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T12:25:16.000Z ##

🟠 CVE-2026-34506 - High (7.5)

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended authorization checks. When a team/channel route allowlist is configured with an empty group...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T12:27:02.000Z ##

🟠 CVE-2026-34506 - High (7.5)

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended authorization checks. When a team/channel route allowlist is configured with an empty group...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T12:25:16.000Z ##

🟠 CVE-2026-34506 - High (7.5)

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended authorization checks. When a team/channel route allowlist is configured with an empty group...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32988
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-31T12:31:42

4 posts

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in fs-bridge staged writes where temporary file creation and population are not pinned to a verified parent directory. Attackers can exploit a race condition in parent-path alias changes to write attacker-controlled bytes outside the intended validated path before the final guarded replace step executes.

thehackerwire@mastodon.social at 2026-03-31T12:26:43.000Z ##

🟠 CVE-2026-32988 - High (7.5)

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in fs-bridge staged writes where temporary file creation and population are not pinned to a verified parent directory. Attackers can exploit a race condition in parent-path...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T12:24:57.000Z ##

🟠 CVE-2026-32988 - High (7.5)

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in fs-bridge staged writes where temporary file creation and population are not pinned to a verified parent directory. Attackers can exploit a race condition in parent-path...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T12:26:43.000Z ##

🟠 CVE-2026-32988 - High (7.5)

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in fs-bridge staged writes where temporary file creation and population are not pinned to a verified parent directory. Attackers can exploit a race condition in parent-path...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T12:24:57.000Z ##

🟠 CVE-2026-32988 - High (7.5)

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability in fs-bridge staged writes where temporary file creation and population are not pinned to a verified parent directory. Attackers can exploit a race condition in parent-path...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32916
(7.7 HIGH)

EPSS: 0.07%

updated 2026-03-31T12:31:42

2 posts

OpenClaw versions 2026.3.7 before 2026.3.11 contain an authorization bypass vulnerability where plugin subagent routes execute gateway methods through a synthetic operator client with broad administrative scopes. Remote unauthenticated requests to plugin-owned routes can invoke runtime.subagent methods to perform privileged gateway actions including session deletion and agent execution.

thehackerwire@mastodon.social at 2026-03-31T12:25:56.000Z ##

🟠 CVE-2026-32916 - High (7.7)

OpenClaw versions 2026.3.7 before 2026.3.11 contain an authorization bypass vulnerability where plugin subagent routes execute gateway methods through a synthetic operator client with broad administrative scopes. Remote unauthenticated requests to...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T12:25:56.000Z ##

🟠 CVE-2026-32916 - High (7.7)

OpenClaw versions 2026.3.7 before 2026.3.11 contain an authorization bypass vulnerability where plugin subagent routes execute gateway methods through a synthetic operator client with broad administrative scopes. Remote unauthenticated requests to...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32982
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-31T12:31:42

2 posts

OpenClaw before 2026.3.13 contains an information disclosure vulnerability in the fetchRemoteMedia function that exposes Telegram bot tokens in error messages. When media downloads fail, the original Telegram file URLs containing bot tokens are embedded in MediaFetchError strings and leaked to logs and error surfaces.

thehackerwire@mastodon.social at 2026-03-31T12:25:47.000Z ##

🟠 CVE-2026-32982 - High (7.5)

OpenClaw before 2026.3.13 contains an information disclosure vulnerability in the fetchRemoteMedia function that exposes Telegram bot tokens in error messages. When media downloads fail, the original Telegram file URLs containing bot tokens are em...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T12:25:47.000Z ##

🟠 CVE-2026-32982 - High (7.5)

OpenClaw before 2026.3.13 contains an information disclosure vulnerability in the fetchRemoteMedia function that exposes Telegram bot tokens in error messages. When media downloads fail, the original Telegram file URLs containing bot tokens are em...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4317(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-03-31T12:31:42

2 posts

SQL inyection (SQLi) vulnerability in Umami Software web application through an improperly sanitized parameter, which could allow an authenticated attacker to execute arbitrary SQL commands in the database.Specifically, they could manipulate the value of the 'timezone' request parameter by including malicious characters and SQL payload. The application would interpolate these values directly into

offseq at 2026-03-31T10:30:28.759Z ##

πŸ”΄ CRITICAL: CVE-2026-4317 in Umami 3.0.2 enables authenticated SQL injection via 'timezone' param. No patch yet β€” sanitize inputs, use parameterized queries, and enforce least privilege. Protect your data! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-31T10:30:28.000Z ##

πŸ”΄ CRITICAL: CVE-2026-4317 in Umami 3.0.2 enables authenticated SQL injection via 'timezone' param. No patch yet β€” sanitize inputs, use parameterized queries, and enforce least privilege. Protect your data! radar.offseq.com/threat/cve-20 #OffSeq #CVE20264317 #SQLInjection #Vuln

##

CVE-2026-34509
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-31T12:16:30.840000

2 posts

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended authorization checks. When a team/channel route allowlist is configured with an empty groupAllowFrom parameter, the message handler synthesizes wildcard sender authorization, permitting any sender in the matched team/channel to trigger replies

thehackerwire@mastodon.social at 2026-03-31T12:25:38.000Z ##

🟠 CVE-2026-34509 - High (7.5)

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended authorization checks. When a team/channel route allowlist is configured with an empty group...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T12:25:38.000Z ##

🟠 CVE-2026-34509 - High (7.5)

OpenClaw before 2026.3.8 contains a sender allowlist bypass vulnerability in its Microsoft Teams plugin that allows unauthorized senders to bypass intended authorization checks. When a team/channel route allowlist is configured with an empty group...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34505
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-31T12:16:30.237000

4 posts

OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets. Attackers can submit repeated authentication requests with invalid secrets without triggering rate limit responses, enabling systematic secret guessing and subsequent forged webhook submission.

thehackerwire@mastodon.social at 2026-03-31T12:26:53.000Z ##

πŸ”΄ CVE-2026-34505 - Critical (9.8)

OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets. Attackers can submit repeated authentication requests with invalid secrets with...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T12:25:06.000Z ##

πŸ”΄ CVE-2026-34505 - Critical (9.8)

OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets. Attackers can submit repeated authentication requests with invalid secrets with...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T12:26:53.000Z ##

πŸ”΄ CVE-2026-34505 - Critical (9.8)

OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets. Attackers can submit repeated authentication requests with invalid secrets with...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T12:25:06.000Z ##

πŸ”΄ CVE-2026-34505 - Critical (9.8)

OpenClaw before 2026.3.12 applies rate limiting only after successful webhook authentication, allowing attackers to bypass rate limits and brute-force webhook secrets. Attackers can submit repeated authentication requests with invalid secrets with...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5201
(7.5 HIGH)

EPSS: 0.09%

updated 2026-03-31T09:31:49

4 posts

A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vulnerability occurs in the JPEG image loader due to improper validation of color component counts when processing a specially crafted JPEG image. A remote attacker can exploit this flaw without user interaction, for example, via thumbnail generation. Successful exploitation leads to application crashes and denial of servi

thehackerwire@mastodon.social at 2026-03-31T09:31:06.000Z ##

🟠 CVE-2026-5201 - High (7.5)

A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vulnerability occurs in the JPEG image loader due to improper validation of color component counts when processing a specially crafted JPEG image. A remote attacker can ex...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T09:21:37.000Z ##

🟠 CVE-2026-5201 - High (7.5)

A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vulnerability occurs in the JPEG image loader due to improper validation of color component counts when processing a specially crafted JPEG image. A remote attacker can ex...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T09:31:06.000Z ##

🟠 CVE-2026-5201 - High (7.5)

A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vulnerability occurs in the JPEG image loader due to improper validation of color component counts when processing a specially crafted JPEG image. A remote attacker can ex...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T09:21:37.000Z ##

🟠 CVE-2026-5201 - High (7.5)

A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vulnerability occurs in the JPEG image loader due to improper validation of color component counts when processing a specially crafted JPEG image. A remote attacker can ex...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-10551
(8.7 HIGH)

EPSS: 0.03%

updated 2026-03-31T09:31:48

4 posts

A Stored Cross-site Scripting (XSS) vulnerability affecting Document Management in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.

thehackerwire@mastodon.social at 2026-03-31T09:59:56.000Z ##

🟠 CVE-2025-10551 - High (8.7)

A Stored Cross-site Scripting (XSS) vulnerability affecting Document Management in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T09:21:47.000Z ##

🟠 CVE-2025-10551 - High (8.7)

A Stored Cross-site Scripting (XSS) vulnerability affecting Document Management in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T09:59:56.000Z ##

🟠 CVE-2025-10551 - High (8.7)

A Stored Cross-site Scripting (XSS) vulnerability affecting Document Management in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T09:21:47.000Z ##

🟠 CVE-2025-10551 - High (8.7)

A Stored Cross-site Scripting (XSS) vulnerability affecting Document Management in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-10553
(8.7 HIGH)

EPSS: 0.03%

updated 2026-03-31T09:31:48

2 posts

A Stored Cross-site Scripting (XSS) vulnerability affecting Factory Resource Management in DELMIA Factory Resource Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.

thehackerwire@mastodon.social at 2026-03-31T09:21:52.000Z ##

🟠 CVE-2025-10553 - High (8.7)

A Stored Cross-site Scripting (XSS) vulnerability affecting Factory Resource Management in DELMIA Factory Resource Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T09:21:52.000Z ##

🟠 CVE-2025-10553 - High (8.7)

A Stored Cross-site Scripting (XSS) vulnerability affecting Factory Resource Management in DELMIA Factory Resource Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3300
(9.8 CRITICAL)

EPSS: 0.22%

updated 2026-03-31T03:31:35

4 posts

The Everest Forms Pro plugin for WordPress is vulnerable to Remote Code Execution via PHP Code Injection in all versions up to, and including, 1.9.12. This is due to the Calculation Addon's process_filter() function concatenating user-submitted form field values into a PHP code string without proper escaping before passing it to eval(). The sanitize_text_field() function applied to input does not

offseq at 2026-03-31T03:00:27.566Z ##

🚨 CRITICAL: CVE-2026-3300 in Everest Forms Pro (all versions) enables unauthenticated RCE via "Complex Calculation" forms. Disable the feature or restrict access ASAP. No patch yet β€” monitor for updates. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-31T02:21:06.000Z ##

πŸ”΄ CVE-2026-3300 - Critical (9.8)

The Everest Forms Pro plugin for WordPress is vulnerable to Remote Code Execution via PHP Code Injection in all versions up to, and including, 1.9.12. This is due to the Calculation Addon's process_filter() function concatenating user-submitted fo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-31T03:00:27.000Z ##

🚨 CRITICAL: CVE-2026-3300 in Everest Forms Pro (all versions) enables unauthenticated RCE via "Complex Calculation" forms. Disable the feature or restrict access ASAP. No patch yet β€” monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE20263300 #RCE

##

thehackerwire@mastodon.social at 2026-03-31T02:21:06.000Z ##

πŸ”΄ CVE-2026-3300 - Critical (9.8)

The Everest Forms Pro plugin for WordPress is vulnerable to Remote Code Execution via PHP Code Injection in all versions up to, and including, 1.9.12. This is due to the Calculation Addon's process_filter() function concatenating user-submitted fo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4020
(7.5 HIGH)

EPSS: 0.05%

updated 2026-03-31T03:31:35

2 posts

The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.4. This is due to a REST API endpoint registered at /wp-json/gravitysmtp/v1/tests/mock-data with a permission_callback that unconditionally returns true, allowing any unauthenticated visitor to access it. When the ?page=gravitysmtp-settings query parameter is appended, th

thehackerwire@mastodon.social at 2026-03-31T02:21:17.000Z ##

🟠 CVE-2026-4020 - High (7.5)

The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.4. This is due to a REST API endpoint registered at /wp-json/gravitysmtp/v1/tests/mock-data with a permission_callback ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T02:21:17.000Z ##

🟠 CVE-2026-4020 - High (7.5)

The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.4. This is due to a REST API endpoint registered at /wp-json/gravitysmtp/v1/tests/mock-data with a permission_callback ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34042
(8.2 HIGH)

EPSS: 0.05%

updated 2026-03-31T03:15:58.220000

2 posts

act is a project which allows for local running of github actions. Prior to version 0.2.86, act's built in actions/cache server listens to connections on all interfaces and allows anyone who can connect to it including someone anywhere on the internet to create caches with arbitrary keys and retrieve all existing caches. If they can predict which cache keys will be used by local actions, they can

thehackerwire@mastodon.social at 2026-03-31T04:00:22.000Z ##

🟠 CVE-2026-34042 - High (8.2)

act is a project which allows for local running of github actions. Prior to version 0.2.86, act's built in actions/cache server listens to connections on all interfaces and allows anyone who can connect to it including someone anywhere on the inte...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T04:00:22.000Z ##

🟠 CVE-2026-34042 - High (8.2)

act is a project which allows for local running of github actions. Prior to version 0.2.86, act's built in actions/cache server listens to connections on all interfaces and allows anyone who can connect to it including someone anywhere on the inte...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32727
(8.1 HIGH)

EPSS: 0.05%

updated 2026-03-31T03:15:57.340000

2 posts

SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.7, the Enforcer is vulnerable to a path traversal attack where an attacker can use dot-dot (..) in the scope claim of a token to escape the intended directory restriction. This occurs because the library normalizes both the authorized path (from the token) and the requested path (from the application) before

thehackerwire@mastodon.social at 2026-03-31T04:01:44.000Z ##

🟠 CVE-2026-32727 - High (8.1)

SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.7, the Enforcer is vulnerable to a path traversal attack where an attacker can use dot-dot (..) in the scope claim of a token to escape the intended director...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T04:01:44.000Z ##

🟠 CVE-2026-32727 - High (8.1)

SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.7, the Enforcer is vulnerable to a path traversal attack where an attacker can use dot-dot (..) in the scope claim of a token to escape the intended director...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30880
(0 None)

EPSS: 0.28%

updated 2026-03-31T01:16:36.270000

2 posts

baserCMS is a website development framework. Prior to version 5.2.3, baserCMS has an OS command injection vulnerability in the installer. This issue has been patched in version 5.2.3.

offseq at 2026-03-31T04:30:27.632Z ##

baserCMS < 5.2.3 hit by CRITICAL OS command injection (CVE-2026-30880, CVSS 9.2). Remote unauthenticated RCE possible via installer. Patch to 5.2.3+ now or restrict installer access! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-31T04:30:27.000Z ##

baserCMS < 5.2.3 hit by CRITICAL OS command injection (CVE-2026-30880, CVSS 9.2). Remote unauthenticated RCE possible via installer. Patch to 5.2.3+ now or restrict installer access! radar.offseq.com/threat/cve-20 #OffSeq #baserCMS #Vuln #infosec

##

CVE-2025-32957
(8.7 HIGH)

EPSS: 0.04%

updated 2026-03-31T01:16:34.530000

2 posts

baserCMS is a website development framework. Prior to version 5.2.3, the application's restore function allows users to upload a .zip file, which is then automatically extracted. A PHP file inside the archive is included using require_once without validating or restricting the filename. An attacker can craft a malicious PHP file within the zip and achieve arbitrary code execution when it is includ

thehackerwire@mastodon.social at 2026-03-31T01:17:43.000Z ##

🟠 CVE-2025-32957 - High (8.7)

baserCMS is a website development framework. Prior to version 5.2.3, the application's restore function allows users to upload a .zip file, which is then automatically extracted. A PHP file inside the archive is included using require_once without...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T01:17:43.000Z ##

🟠 CVE-2025-32957 - High (8.7)

baserCMS is a website development framework. Prior to version 5.2.3, the application's restore function allows users to upload a .zip file, which is then automatically extracted. A PHP file inside the archive is included using require_once without...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5156
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-31T00:31:19

2 posts

A vulnerability was determined in Tenda CH22 1.0.0.1. This impacts the function formQuickIndex of the file /goform/QuickIndex of the component Parameter Handler. This manipulation of the argument mit_linktype causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-31T00:59:49.000Z ##

🟠 CVE-2026-5156 - High (8.8)

A vulnerability was determined in Tenda CH22 1.0.0.1. This impacts the function formQuickIndex of the file /goform/QuickIndex of the component Parameter Handler. This manipulation of the argument mit_linktype causes stack-based buffer overflow. Th...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T00:59:49.000Z ##

🟠 CVE-2026-5156 - High (8.8)

A vulnerability was determined in Tenda CH22 1.0.0.1. This impacts the function formQuickIndex of the file /goform/QuickIndex of the component Parameter Handler. This manipulation of the argument mit_linktype causes stack-based buffer overflow. Th...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4257
(9.8 CRITICAL)

EPSS: 0.22%

updated 2026-03-31T00:31:19

4 posts

The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side Template Injection (SSTI) leading to Remote Code Execution (RCE) in all versions up to, and including, 1.7.36. This is due to the plugin using the Twig `Twig_Loader_String` template engine without sandboxing, combined with the `cfsPreFill` prefill functionality that allows unauthenticated users to inject arbitrary Twig

offseq at 2026-03-31T00:00:40.531Z ##

🚨 CRITICAL: CVE-2026-4257 in Contact Form by Supsystic (all versions) enables unauth RCE via SSTI (Twig). No patch yet. Disable plugin or block endpoints ASAP. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-30T22:20:13.000Z ##

πŸ”΄ CVE-2026-4257 - Critical (9.8)

The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side Template Injection (SSTI) leading to Remote Code Execution (RCE) in all versions up to, and including, 1.7.36. This is due to the plugin using the Twig `Twig_Loader_St...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-31T00:00:40.000Z ##

🚨 CRITICAL: CVE-2026-4257 in Contact Form by Supsystic (all versions) enables unauth RCE via SSTI (Twig). No patch yet. Disable plugin or block endpoints ASAP. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE20264257 #SSTI #RCE

##

thehackerwire@mastodon.social at 2026-03-30T22:20:13.000Z ##

πŸ”΄ CVE-2026-4257 - Critical (9.8)

The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side Template Injection (SSTI) leading to Remote Code Execution (RCE) in all versions up to, and including, 1.7.36. This is due to the plugin using the Twig `Twig_Loader_St...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5130
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-31T00:31:19

2 posts

The Debugger & Troubleshooter plugin for WordPress was vulnerable to Unauthenticated Privilege Escalation in versions up to and including 1.3.2. This was due to the plugin accepting the wp_debug_troubleshoot_simulate_user cookie value directly as a user ID without any cryptographic validation or authorization checks. The cookie value was used to override the determine_current_user filter, which al

thehackerwire@mastodon.social at 2026-03-30T23:21:05.000Z ##

🟠 CVE-2026-5130 - High (8.8)

The Debugger & Troubleshooter plugin for WordPress was vulnerable to Unauthenticated Privilege Escalation in versions up to and including 1.3.2. This was due to the plugin accepting the wp_debug_troubleshoot_simulate_user cookie value directly as ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-30T23:21:05.000Z ##

🟠 CVE-2026-5130 - High (8.8)

The Debugger & Troubleshooter plugin for WordPress was vulnerable to Unauthenticated Privilege Escalation in versions up to and including 1.3.2. This was due to the plugin accepting the wp_debug_troubleshoot_simulate_user cookie value directly as ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5155
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-31T00:31:18

2 posts

A vulnerability was found in Tenda CH22 1.0.0.1. This affects the function fromAdvSetWan of the file /goform/AdvSetWan of the component Parameter Handler. The manipulation of the argument wanmode results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-03-30T23:20:55.000Z ##

🟠 CVE-2026-5155 - High (8.8)

A vulnerability was found in Tenda CH22 1.0.0.1. This affects the function fromAdvSetWan of the file /goform/AdvSetWan of the component Parameter Handler. The manipulation of the argument wanmode results in stack-based buffer overflow. The attack ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-30T23:20:55.000Z ##

🟠 CVE-2026-5155 - High (8.8)

A vulnerability was found in Tenda CH22 1.0.0.1. This affects the function fromAdvSetWan of the file /goform/AdvSetWan of the component Parameter Handler. The manipulation of the argument wanmode results in stack-based buffer overflow. The attack ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5154
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-30T23:17:04.830000

2 posts

A vulnerability has been found in Tenda CH22 1.0.0.1/1.If. The impacted element is the function fromSetCfm of the file /goform/setcfm of the component Parameter Handler. The manipulation of the argument funcname leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-03-30T23:21:14.000Z ##

🟠 CVE-2026-5154 - High (8.8)

A vulnerability has been found in Tenda CH22 1.0.0.1/1.If. The impacted element is the function fromSetCfm of the file /goform/setcfm of the component Parameter Handler. The manipulation of the argument funcname leads to stack-based buffer overflo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-30T23:21:14.000Z ##

🟠 CVE-2026-5154 - High (8.8)

A vulnerability has been found in Tenda CH22 1.0.0.1/1.If. The impacted element is the function fromSetCfm of the file /goform/setcfm of the component Parameter Handler. The manipulation of the argument funcname leads to stack-based buffer overflo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33984
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-30T22:16:19.567000

2 posts

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in resize_vbar_entry() in libfreerdp/codec/clear.c, vBarEntry->size is updated to vBarEntry->count before the winpr_aligned_recalloc() call. If realloc fails, size is inflated while pixels still points to the old, smaller buffer. On a subsequent call where count <= size (the inflated value), realloc is skippe

thehackerwire@mastodon.social at 2026-03-30T22:20:23.000Z ##

🟠 CVE-2026-33984 - High (7.5)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in resize_vbar_entry() in libfreerdp/codec/clear.c, vBarEntry->size is updated to vBarEntry->count before the winpr_aligned_recalloc() call. If realloc fails...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-30T22:20:23.000Z ##

🟠 CVE-2026-33984 - High (7.5)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in resize_vbar_entry() in libfreerdp/codec/clear.c, vBarEntry->size is updated to vBarEntry->count before the winpr_aligned_recalloc() call. If realloc fails...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29954
(7.6 HIGH)

EPSS: 0.03%

updated 2026-03-30T21:32:06

1 posts

In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have an SSRF vulnerability when processing the chartURL field of ResourceComposition resources. The field is only URL-encoded without validating the target address. More critically, when kubeconfiggenerator uses wget to download charts, the chartURL is directly concatenated into the command, allowing attackers to inject wge

1 repos

https://github.com/b0b0haha/CVE-2026-29954

thehackerwire@mastodon.social at 2026-03-30T19:34:34.000Z ##

🟠 CVE-2026-29954 - High (7.6)

In KubePlus 4.1.4, the mutating webhook and kubeconfiggenerator components have an SSRF vulnerability when processing the chartURL field of ResourceComposition resources. The field is only URL-encoded without validating the target address. More cr...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30077
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-30T21:32:06

1 posts

OpenAirInterface V2.2.0 AMF crashes when it fails to decode the message. Not all decode failures result in a crash. But the crash is consistent for particular inputs. An example input in hex stream is 80 00 00 0E 00 00 01 00 0F 80 02 02 40 00 58 00 01 88.

thehackerwire@mastodon.social at 2026-03-30T19:18:37.000Z ##

🟠 CVE-2026-30077 - High (7.5)

OpenAirInterface V2.2.0 AMF crashes when it fails to decode the message. Not all decode failures result in a crash. But the crash is consistent for particular inputs. An example input in hex stream is 80 00 00 0E 00 00 01 00 0F 80 02 02 40 00 58 0...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29872
(8.2 HIGH)

EPSS: 0.05%

updated 2026-03-30T21:32:06

1 posts

A cross-session information disclosure vulnerability exists in the awesome-llm-apps project in commit e46690f99c3f08be80a9877fab52acacf7ab8251 (2026-01-19). The affected Streamlit-based GitHub MCP Agent stores user-supplied API tokens in process-wide environment variables using os.environ without proper session isolation. Because Streamlit serves multiple concurrent users from a single Python proc

thehackerwire@mastodon.social at 2026-03-30T19:18:26.000Z ##

🟠 CVE-2026-29872 - High (8.2)

A cross-session information disclosure vulnerability exists in the awesome-llm-apps project in commit e46690f99c3f08be80a9877fab52acacf7ab8251 (2026-01-19). The affected Streamlit-based GitHub MCP Agent stores user-supplied API tokens in process-w...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5043
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-30T21:32:06

1 posts

A weakness has been identified in Belkin F9K1122 1.00.33. The impacted element is the function formSetPassword of the file /goform/formSetPassword of the component Parameter Handler. This manipulation of the argument webpage causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. The vendor

thehackerwire@mastodon.social at 2026-03-29T12:18:27.000Z ##

🟠 CVE-2026-5043 - High (8.8)

A weakness has been identified in Belkin F9K1122 1.00.33. The impacted element is the function formSetPassword of the file /goform/formSetPassword of the component Parameter Handler. This manipulation of the argument webpage causes stack-based buf...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5033
(7.3 HIGH)

EPSS: 0.02%

updated 2026-03-30T21:32:06

1 posts

A vulnerability was detected in code-projects Accounting System 1.0. Affected by this vulnerability is an unknown functionality of the file /view_costumer.php of the component Parameter Handler. The manipulation of the argument cos_id results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-03-29T06:00:29.000Z ##

🚨 CVE-2026-5033 (MEDIUM): SQL injection in code-projects Accounting System 1.0 (/view_costumer.php, cos_id) is being actively exploited. Remote risk β€” monitor and patch as soon as fixes arrive. More: radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #VulnResearch

##

CVE-2026-5152
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-30T21:31:11

2 posts

A vulnerability was detected in Tenda CH22 1.0.0.1. Impacted is the function formCreateFileName of the file /goform/createFileName. Performing a manipulation of the argument fileNameMit results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-03-30T22:02:41.000Z ##

🟠 CVE-2026-5152 - High (8.8)

A vulnerability was detected in Tenda CH22 1.0.0.1. Impacted is the function formCreateFileName of the file /goform/createFileName. Performing a manipulation of the argument fileNameMit results in stack-based buffer overflow. The attack may be ini...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-30T22:01:04.000Z ##

🟠 CVE-2026-5152 - High (8.8)

A vulnerability was detected in Tenda CH22 1.0.0.1. Impacted is the function formCreateFileName of the file /goform/createFileName. Performing a manipulation of the argument fileNameMit results in stack-based buffer overflow. The attack may be ini...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29924
(7.6 HIGH)

EPSS: 0.06%

updated 2026-03-30T21:31:10

1 posts

Grav CMS v1.7.x and before is vulnerable to XML External Entity (XXE) through the SVG file upload functionality in the admin panel and File Manager plugin.

thehackerwire@mastodon.social at 2026-03-30T20:59:49.000Z ##

🟠 CVE-2026-29924 - High (7.6)

Grav CMS v1.7.x and before is vulnerable to XML External Entity (XXE) through the SVG file upload functionality in the admin panel and File Manager plugin.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34714
(9.2 CRITICAL)

EPSS: 0.02%

updated 2026-03-30T21:31:10

2 posts

Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE.

thehackerwire@mastodon.social at 2026-03-30T19:20:52.000Z ##

πŸ”΄ CVE-2026-34714 - Critical (9.2)

Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-30T19:18:18.000Z ##

πŸ”΄ CVE-2026-34714 - Critical (9.2)

Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3991
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-30T21:31:10

1 posts

Symantec Data Loss Prevention Windows Endpoint, prior to 25.1 MP1, 16.1 MP2, 16.0 RU2 HF9, 16.0 RU1 MP1 HF12, and 16.0 MP2 HF15, may be susceptible to a Elevation of Privilege vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

thehackerwire@mastodon.social at 2026-03-30T19:18:17.000Z ##

🟠 CVE-2026-3991 - High (7.8)

Symantec Data Loss Prevention Windows Endpoint, prior to 25.1 MP1, 16.1 MP2, 16.0 RU2 HF9, 16.0 RU1 MP1 HF12, and 16.0 MP2 HF15, may be susceptible to a Elevation of Privilege vulnerability, which is a type of issue whereby an attacker may attempt...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5024
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-30T21:31:03

2 posts

A vulnerability was found in D-Link DIR-513 1.10. This issue affects the function formSetEmail of the file /goform/formSetEmail. Performing a manipulation of the argument curTime results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the m

offseq@infosec.exchange at 2026-03-29T04:30:27.000Z ##

πŸ”΄ CVE-2026-5024: HIGH-severity stack buffer overflow in D-Link DIR-513 (v1.10). Remote, no auth needed, public exploit released. Replace ASAP or isolate device & restrict access. No patch from vendor. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #RouterSecurity

##

thehackerwire@mastodon.social at 2026-03-29T04:19:49.000Z ##

🟠 CVE-2026-5024 - High (8.8)

A vulnerability was found in D-Link DIR-513 1.10. This issue affects the function formSetEmail of the file /goform/formSetEmail. Performing a manipulation of the argument curTime results in stack-based buffer overflow. The attack is possible to be...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33030
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-30T21:26:12

1 posts

## Summary Nginx-UI contains an Insecure Direct Object Reference (IDOR) vulnerability that allows any authenticated user to access, modify, and delete resources belonging to other users. The application's base `Model` struct lacks a `user_id` field, and all resource endpoints perform queries by ID without verifying user ownership, enabling complete authorization bypass in multi-user environments.

thehackerwire@mastodon.social at 2026-03-30T18:17:32.000Z ##

🟠 CVE-2026-33030 - High (8.8)

Nginx UI is a web user interface for the Nginx web server. In versions 2.3.3 and prior, Nginx-UI contains an Insecure Direct Object Reference (IDOR) vulnerability that allows any authenticated user to access, modify, and delete resources belonging...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32877
(8.2 HIGH)

EPSS: 0.04%

updated 2026-03-30T21:17:09.767000

1 posts

Botan is a C++ cryptography library. From version 2.3.0 to before version 3.11.0, during SM2 decryption, the code that checked the authentication code value (C3) failed to check that the encoded value was of the expected length prior to comparison. An invalid ciphertext can cause a heap over-read of up to 31 bytes, resulting in a crash or potentially other undefined behavior. This issue has been p

thehackerwire@mastodon.social at 2026-03-30T22:01:41.000Z ##

🟠 CVE-2026-32877 - High (8.2)

Botan is a C++ cryptography library. From version 2.3.0 to before version 3.11.0, during SM2 decryption, the code that checked the authentication code value (C3) failed to check that the encoded value was of the expected length prior to comparison...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28228
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-30T21:17:08.740000

3 posts

OpenOlat is an open source web-based e-learning platform for teaching, learning, assessment and communication. Prior to versions 19.1.31, 20.1.18, and 20.2.5, an authenticated user with the Author role can inject Velocity directives into a reminder email template. When the reminder is processed (either triggered manually or via the daily cron job), the injected directives are evaluated server-side

greg at 2026-03-31T12:47:40.241Z ##

Our colleague @mal had another look at OpenOLAT and found a nice RCE (CVE-2026-28228 and CVE-2026-28228). If you're interested, details can be found on our blog secfault-security.com/blog/ope

##

greg@infosec.exchange at 2026-03-31T12:47:40.000Z ##

Our colleague @mal had another look at OpenOLAT and found a nice RCE (CVE-2026-28228 and CVE-2026-28228). If you're interested, details can be found on our blog secfault-security.com/blog/ope

##

thehackerwire@mastodon.social at 2026-03-30T22:01:50.000Z ##

🟠 CVE-2026-28228 - High (8.8)

OpenOlat is an open source web-based e-learning platform for teaching, learning, assessment and communication. Prior to versions 19.1.31, 20.1.18, and 20.2.5, an authenticated user with the Author role can inject Velocity directives into a reminde...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33634(CVSS UNKNOWN)

EPSS: 21.15%

updated 2026-03-30T20:51:04

1 posts

## Summary On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credential-stealing malware, and replace all 7 tags in `aquasecurity/setup-trivy` with malicious commits. On March 22, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.5 and v0

3 repos

https://github.com/AshleyT3/docker-socket-risk-demos

https://github.com/fevar54/CVE-2026-33634-Scanner

https://github.com/ugurrates/teampcp-supply-chain-attack

secdb@infosec.exchange at 2026-03-30T00:01:00.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-23 - 2026-03-30)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1724

Severity:
- Critical: 160
- High: 649
- Medium: 676
- Low: 49
- None: 190

Status:
- : 20
- Analyzed: 407
- Awaiting Analysis: 410
- Modified: 55
- Received: 778
- Rejected: 23
- Undergoing Analysis: 31

Top CNAs:
- GitHub, Inc.: 426
- Patchstack: 248
- VulDB: 159
- VulnCheck: 124
- kernel.org: 122
- Apple Inc.: 87
- MITRE: 74
- Mozilla Corporation: 47
- Wordfence: 46
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 33

Top Affected Products:
- UNKNOWN: 1239
- Apple Macos: 76
- Mozilla Firefox: 45
- Apple Ipados: 41
- Apple Iphone Os: 41
- Wwbn Avideo: 34
- Apple Visionos: 28
- Apple Watchos: 21
- Open-emr Openemr: 20
- Hcltech Aftermarket Cloud: 17

Top EPSS Score:
- CVE-2026-33634 - 26.61 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33526 - 1.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33478 - 1.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32854 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32748 - 0.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33515 - 0.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33396 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4611 - 0.72 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26829 - 0.69 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25630 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-32286
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-30T20:33:04

1 posts

The DataRow.Decode function fails to properly validate field lengths. A malicious or compromised PostgreSQL server can send a DataRow message with a negative field length, causing a slice bounds out of range panic.

thehackerwire@mastodon.social at 2026-03-30T16:40:13.000Z ##

🟠 CVE-2026-32286 - High (7.5)

The DataRow.Decode function fails to properly validate field lengths. A malicious or compromised PostgreSQL server can send a DataRow message with a negative field length, causing a slice bounds out of range panic.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29953
(7.4 HIGH)

EPSS: 0.03%

updated 2026-03-30T20:16:20.913000

1 posts

SQL Injection vulnerability in SchemaHero 0.23.0 via the column parameter to the columnAsInsert function in file plugins/postgres/lib/column.go.

thehackerwire@mastodon.social at 2026-03-30T19:34:43.000Z ##

🟠 CVE-2026-29953 - High (7.5)

SQL Injection vulnerability in SchemaHero 0.23.0 via the column parameter to the columnAsInsert function in file plugins/postgres/lib/column.go.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29925
(7.7 HIGH)

EPSS: 0.03%

updated 2026-03-30T20:16:20.743000

2 posts

Invoice Ninja v5.12.46 and v5.12.48 is vulnerable to Server-Side Request Forgery (SSRF) in CheckDatabaseRequest.php.

thehackerwire@mastodon.social at 2026-03-30T21:03:16.000Z ##

🟠 CVE-2026-29925 - High (7.7)

Invoice Ninja v5.12.46 and v5.12.48 is vulnerable to Server-Side Request Forgery (SSRF) in CheckDatabaseRequest.php.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-30T20:59:50.000Z ##

🟠 CVE-2026-29925 - High (7.7)

Invoice Ninja v5.12.46 and v5.12.48 is vulnerable to Server-Side Request Forgery (SSRF) in CheckDatabaseRequest.php.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3502
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-30T19:16:27.053000

2 posts

TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

thehackerwire@mastodon.social at 2026-03-30T19:20:42.000Z ##

🟠 CVE-2026-3502 - High (7.8)

TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by th...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-30T19:18:08.000Z ##

🟠 CVE-2026-3502 - High (7.8)

TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by th...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33032
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-30T19:16:25.683000

2 posts

Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and prior, the nginx-ui MCP (Model Context Protocol) integration exposes two HTTP endpoints: /mcp and /mcp_message. While /mcp requires both IP whitelisting and authentication (AuthRequired() middleware), the /mcp_message endpoint only applies IP whitelisting - and the default IP whitelist is empty, which the middleware t

Matchbook3469@mastodon.social at 2026-03-31T09:56:23.000Z ##

🚨 New security advisory:

CVE-2026-33032 affects multiple systems.

β€’ Impact: Remote code execution or complete system compromise possible
β€’ Risk: Attackers can gain full control of affected systems
β€’ Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #VulnerabilityManagement #CyberSec

##

thehackerwire@mastodon.social at 2026-03-30T18:17:42.000Z ##

πŸ”΄ CVE-2026-33032 - Critical (9.8)

Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and prior, the nginx-ui MCP (Model Context Protocol) integration exposes two HTTP endpoints: /mcp and /mcp_message. While /mcp requires both IP whitelisting and authentic...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5044
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-30T19:02:07.003000

2 posts

A security vulnerability has been detected in Belkin F9K1122 1.00.33. This affects the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. Such manipulation of the argument webpage leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early a

thehackerwire@mastodon.social at 2026-03-29T13:20:24.000Z ##

🟠 CVE-2026-5044 - High (8.8)

A security vulnerability has been detected in Belkin F9K1122 1.00.33. This affects the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. Such manipulation of the argument webpage leads to st...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-29T13:19:24.000Z ##

🟠 CVE-2026-5044 - High (8.8)

A security vulnerability has been detected in Belkin F9K1122 1.00.33. This affects the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. Such manipulation of the argument webpage leads to st...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5021
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-30T19:01:13.423000

2 posts

A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromPPTPUserSetting of the file /goform/PPTPUserSetting of the component httpd. This manipulation of the argument delno causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.

offseq@infosec.exchange at 2026-03-29T03:00:27.000Z ##

πŸ”Ž HIGH: CVE-2026-5021 in Tenda F453 v1.0.0.3 enables remote stack buffer overflow via /goform/PPTPUserSetting β€” no auth needed! PoC is public; patch/mitigate now to block total device compromise. radar.offseq.com/threat/cve-20 #OffSeq #CVE20265021 #Infosec #Router

##

thehackerwire@mastodon.social at 2026-03-29T02:17:28.000Z ##

🟠 CVE-2026-5021 - High (8.8)

A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromPPTPUserSetting of the file /goform/PPTPUserSetting of the component httpd. This manipulation of the argument delno causes stack-based buffer overflow. Remote exploitation ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5035
(7.3 HIGH)

EPSS: 0.02%

updated 2026-03-30T18:59:03.920000

1 posts

A vulnerability has been found in code-projects Accounting System 1.0. This affects an unknown part of the file /view_work.php of the component Parameter Handler. Such manipulation of the argument en_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

offseq@infosec.exchange at 2026-03-29T07:30:27.000Z ##

⚠️ MEDIUM severity SQL Injection (CVE-2026-5035) found in code-projects Accounting System 1.0 (/view_work.php, Parameter Handler). Public exploit available β€” review your systems and restrict access if possible. radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Vuln

##

CVE-2026-5042
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-30T18:58:01.433000

1 posts

A security flaw has been discovered in Belkin F9K1122 1.00.33. The affected element is the function formCrossBandSwitch of the file /goform/formCrossBandSwitch of the component Parameter Handler. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor wa

thehackerwire@mastodon.social at 2026-03-29T11:17:47.000Z ##

🟠 CVE-2026-5042 - High (8.8)

A security flaw has been discovered in Belkin F9K1122 1.00.33. The affected element is the function formCrossBandSwitch of the file /goform/formCrossBandSwitch of the component Parameter Handler. The manipulation of the argument webpage results in...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33711
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-30T18:51:41.500000

1 posts

Incus is a system container and virtual machine manager. Incus provides an API to retrieve VM screenshots. That API relies on the use of a temporary file for QEMU to write the screenshot to which is then picked up and sent to the user prior to deletion. As versions prior to 6.23.0 use predictable paths under /tmp for this, an attacker with local access to the system can abuse this mechanism by cre

thehackerwire@mastodon.social at 2026-03-30T19:00:12.000Z ##

🟠 CVE-2026-33711 - High (7.8)

Incus is a system container and virtual machine manager. Incus provides an API to retrieve VM screenshots. That API relies on the use of a temporary file for QEMU to write the screenshot to which is then picked up and sent to the user prior to del...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4046
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-30T18:31:24

1 posts

The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application. This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.

thehackerwire@mastodon.social at 2026-03-30T18:20:57.000Z ##

🟠 CVE-2026-4046 - High (7.5)

The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application.

This vulnerability ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34156
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-03-30T17:16:25

2 posts

`##` Summary NocoBase's Workflow Script Node executes user-supplied JavaScript inside a Node.js `vm` sandbox with a custom `require` allowlist (controlled by `WORKFLOW_SCRIPT_MODULES` env var). However, the `console` object passed into the sandbox context exposes host-realm `WritableWorkerStdio` stream objects via `console._stdout` and `console._stderr`. An authenticated attacker can traverse th

Nuclei template

thehackerwire@mastodon.social at 2026-03-31T14:55:04.000Z ##

πŸ”΄ CVE-2026-34156 - Critical (9.9)

NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.28, NocoBase's Workflow Script Node executes user-supplied JavaScript inside a Node.js vm sandbox with a custom r...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T14:55:04.000Z ##

πŸ”΄ CVE-2026-34156 - Critical (9.9)

NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.28, NocoBase's Workflow Script Node executes user-supplied JavaScript inside a Node.js vm sandbox with a custom r...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32978
(8.0 HIGH)

EPSS: 0.04%

updated 2026-03-30T17:15:43.657000

1 posts

OpenClaw before 2026.3.11 contains an approval integrity vulnerability where system.run approvals fail to bind mutable file operands for certain script runners like tsx and jiti. Attackers can obtain approval for benign script commands, rewrite referenced scripts on disk, and execute modified code under the approved run context.

thehackerwire@mastodon.social at 2026-03-29T13:33:25.000Z ##

🟠 CVE-2026-32978 - High (8)

OpenClaw before 2026.3.11 contains an approval integrity vulnerability where system.run approvals fail to bind mutable file operands for certain script runners like tsx and jiti. Attackers can obtain approval for benign script commands, rewrite re...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4176
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-30T16:16:08.163000

2 posts

Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib. Compress::Raw::Zlib is included in the Perl package as a dual-life core module, and is vulnerable to CVE-2026-3381 due to a vendored version of zlib which has several vulnerabilities, including CVE-2026-27171. The bundled Compress::Raw::Zlib was

thehackerwire@mastodon.social at 2026-03-30T16:19:13.000Z ##

πŸ”΄ CVE-2026-4176 - Critical (9.8)

Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib.

Compress::Raw::Zlib is included in the Perl package as a dual-life core module, and is vulne...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-29T22:30:12.000Z ##

⚠️ CVE-2026-4176 (HIGH): Perl Compress::Raw::Zlib uses a vulnerable zlib, risking memory corruption or code execution. Affects 5.9.4 – 5.43.0. Update to Compress::Raw::Zlib 2.221+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Perl #Vuln #SysAdmin

##

CVE-2026-5045
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-30T15:46:42.200000

1 posts

A vulnerability was detected in Tenda FH1201 1.2.0.14(408). This impacts the function WrlclientSet of the file /goform/WrlclientSet of the component Parameter Handler. Performing a manipulation of the argument GO results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-03-29T14:19:55.000Z ##

🟠 CVE-2026-5045 - High (8.8)

A vulnerability was detected in Tenda FH1201 1.2.0.14(408). This impacts the function WrlclientSet of the file /goform/WrlclientSet of the component Parameter Handler. Performing a manipulation of the argument GO results in stack-based buffer over...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2370
(8.1 HIGH)

EPSS: 0.01%

updated 2026-03-30T15:44:26.737000

1 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 14.3 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 affecting Jira Connect installations that could have allowed an authenticated user with minimal workspace permissions to obtain installation credentials and impersonate the GitLab app due to improper authorization checks.

thehackerwire@mastodon.social at 2026-03-30T00:20:18.000Z ##

🟠 CVE-2026-2370 - High (8.1)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 14.3 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 affecting Jira Connect installations that could have allowed an authenticated user with minimal workspace p...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3573
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-30T15:32:58

1 posts

Incorrect Authorization vulnerability in Drupal AI (Artificial Intelligence) allows Resource Injection.This issue affects AI (Artificial Intelligence): from 0.0.0 before 1.1.11, from 1.2.0 before 1.2.12.

thehackerwire@mastodon.social at 2026-03-30T16:40:03.000Z ##

🟠 CVE-2026-3573 - High (7.5)

Incorrect Authorization vulnerability in Drupal AI (Artificial Intelligence) allows Resource Injection.This issue affects AI (Artificial Intelligence): from 0.0.0 before 1.1.11, from 1.2.0 before 1.2.12.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4933
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-30T15:32:58

1 posts

Incorrect Authorization vulnerability in Drupal Unpublished Node Permissions allows Forceful Browsing.This issue affects Unpublished Node Permissions: from 0.0.0 before 1.7.0.

thehackerwire@mastodon.social at 2026-03-30T16:39:53.000Z ##

🟠 CVE-2026-4933 - High (7.5)

Incorrect Authorization vulnerability in Drupal Unpublished Node Permissions allows Forceful Browsing.This issue affects Unpublished Node Permissions: from 0.0.0 before 1.7.0.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21643
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-30T15:31:35

7 posts

An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

2 repos

https://github.com/0xBlackash/CVE-2026-21643

https://github.com/alirezac0/CVE-2026-21643

benzogaga33@mamot.fr at 2026-03-31T15:40:04.000Z ##

CVE-2026-21643 – Cette faille critique dans FortiClient EMS est exploitΓ©e ! it-connect.fr/cve-2026-21643-c #ActuCybersΓ©curitΓ© #CybersΓ©curitΓ© #Fortinet

##

threatcodex at 2026-03-31T13:18:12.154Z ##

Pre-Authentication SQL Injection in FortiClient EMS 7.4.4 - CVE-2026-21643

bishopfox.com/blog/cve-2026-21

##

youranonnewsirc@nerdculture.de at 2026-03-31T08:27:20.000Z ##

Critical supply chain attack on Axios npm distributed a Remote Access Trojan (RAT) via a `plain-crypto-js` dependency. Fortinet faces active exploitation of a critical SQL injection flaw (CVE-2026-21643). Geopolitically, Iran-US tensions escalate; a Kuwaiti oil tanker was hit, and Yemen launched strikes against Israeli sites.

#AnonNews_irc #Cybersecurity #News

##

benzogaga33@mamot.fr at 2026-03-31T15:40:04.000Z ##

CVE-2026-21643 – Cette faille critique dans FortiClient EMS est exploitΓ©e ! it-connect.fr/cve-2026-21643-c #ActuCybersΓ©curitΓ© #CybersΓ©curitΓ© #Fortinet

##

threatcodex@infosec.exchange at 2026-03-31T13:18:12.000Z ##

Pre-Authentication SQL Injection in FortiClient EMS 7.4.4 - CVE-2026-21643
#CVE_2026_21643
bishopfox.com/blog/cve-2026-21

##

youranonnewsirc@nerdculture.de at 2026-03-31T08:27:20.000Z ##

Critical supply chain attack on Axios npm distributed a Remote Access Trojan (RAT) via a `plain-crypto-js` dependency. Fortinet faces active exploitation of a critical SQL injection flaw (CVE-2026-21643). Geopolitically, Iran-US tensions escalate; a Kuwaiti oil tanker was hit, and Yemen launched strikes against Israeli sites.

#AnonNews_irc #Cybersecurity #News

##

rxerium@infosec.exchange at 2026-03-30T19:11:30.000Z ##

🚨 CVE-2026-21643 an SQL Injection vulnerability (CVSS 9.8) is seeing active exploitation in the wild as reported by @DefusedCyber

Vulnerability detection script available here:
github.com/rxerium/rxerium-tem

This vulnerability currently only affects FortiClientEMS 7.4.4 and it is recommended that you upgrade to 7.4.5 or later as reported by Fortinet:
fortiguard.fortinet.com/psirt/

##

CVE-2026-4946
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-30T15:16:33.710000

2 posts

Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This a

offseq@infosec.exchange at 2026-03-29T21:00:30.000Z ##

πŸ›‘ CVE-2026-4946: HIGH severity OS command injection in Ghidra <12.0.3. Crafted binaries can trigger arbitrary code via clickable @Execute annotations in the UI. Upgrade now & analyze unknown files in sandboxes. radar.offseq.com/threat/cve-20 #OffSeq #Ghidra #BlueTeam

##

thehackerwire@mastodon.social at 2026-03-29T20:18:49.000Z ##

🟠 CVE-2026-4946 - High (8.8)

Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32287
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-30T15:16:28.290000

1 posts

Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()".

thehackerwire@mastodon.social at 2026-03-30T16:59:57.000Z ##

🟠 CVE-2026-32287 - High (7.5)

Boolean XPath expressions that evaluate to true can cause an infinite loop in logicalQuery.Select, leading to 100% CPU usage. This can be triggered by top-level selectors such as "1=1" or "true()".

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32857
(8.6 HIGH)

EPSS: 0.03%

updated 2026-03-30T13:26:50.827000

1 posts

Firecrawl version 2.8.0 and prior contain a server-side request forgery (SSRF) protection bypass vulnerability in the Playwright scraping service where network policy validation is applied only to the initial user-supplied URL and not to subsequent redirect destinations. Attackers can supply an externally valid URL that passes validation and returns an HTTP redirect to an internal or restricted re

thehackerwire@mastodon.social at 2026-03-29T03:00:49.000Z ##

🟠 CVE-2026-32857 - High (8.6)

Firecrawl version 2.8.0 and prior contain a server-side request forgery (SSRF) protection bypass vulnerability in the Playwright scraping service where network policy validation is applied only to the initial user-supplied URL and not to subsequen...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33898
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-30T13:26:29.793000

1 posts

Incus is a system container and virtual machine manager. Prior to version 6.23.0, the web server spawned by `incus webui` incorrectly validates the authentication token such that an invalid value will be accepted. `incus webui` runs a local web server on a random localhost port. For authentication, it provides the user with a URL containing an authentication token. When accessed with that token, I

thehackerwire@mastodon.social at 2026-03-29T01:02:00.000Z ##

🟠 CVE-2026-33898 - High (8.8)

Incus is a system container and virtual machine manager. Prior to version 6.23.0, the web server spawned by `incus webui` incorrectly validates the authentication token such that an invalid value will be accepted. `incus webui` runs a local web se...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15379
(10.0 CRITICAL)

EPSS: 0.17%

updated 2026-03-30T13:26:07.647000

1 posts

A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_manager=LOCAL`, MLflow reads dependency specifications from the model artifact's `python_env.yaml` file and directly interpolates them into a shell command without sanitization. This allows an attacke

thehackerwire@mastodon.social at 2026-03-30T08:34:55.000Z ##

πŸ”΄ CVE-2025-15379 - Critical (10)

A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_manager=LOCAL`, MLflow reads dependency specifi...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4416
(7.8 HIGH)

EPSS: 0.02%

updated 2026-03-30T13:26:07.647000

1 posts

The Performance Library component of Gigabyte Control Center has an Insecure Deserialization vulnerability. Authenticated local attackers can send a malicious serialized payload to the EasyTune Engine service, resulting in privilege escalation.

thehackerwire@mastodon.social at 2026-03-30T08:18:00.000Z ##

🟠 CVE-2026-4416 - High (7.8)

The Performance Library component of Gigabyte Control Center has an Insecure Deserialization vulnerability. Authenticated local attackers can send a malicious serialized payload to the EasyTune Engine service, resulting in privilege escalation.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3124
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-30T13:26:07.647000

2 posts

The Download Monitor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.7 via the executePayment() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to complete arbitrary pending orders by exploiting a mismatch between the PayPal transaction token and the local order, allow

offseq@infosec.exchange at 2026-03-30T03:00:28.000Z ##

πŸ›‘ CVE-2026-3124: HIGH-severity IDOR in wpchill Download Monitor (all versions) lets unauth attackers finalize orders by reusing PayPal tokens β€” digital goods can be stolen. Patch or apply strict validation ASAP! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vulnerability #IDOR

##

thehackerwire@mastodon.social at 2026-03-30T02:20:36.000Z ##

🟠 CVE-2026-3124 - High (7.5)

The Download Monitor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.7 via the executePayment() function due to missing validation on a user controlled key. This makes it possible fo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0560
(7.5 HIGH)

EPSS: 0.14%

updated 2026-03-30T13:26:07.647000

2 posts

A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms versions prior to 2.2.0, specifically in the `/api/files/export-content` endpoint. The `_download_image_to_temp()` function in `backend/routers/files.py` fails to validate user-controlled URLs, allowing attackers to make arbitrary HTTP requests to internal services and cloud metadata endpoints. This vulnerability can lead

offseq@infosec.exchange at 2026-03-30T00:00:38.000Z ##

⚠️ CVE-2026-0560: HIGH-severity SSRF in parisneo/lollms (<2.2.0) allows remote attackers to access internal network/cloud endpoints via /api/files/export-content. Patch to 2.2.0+ or block unsafe URLs now! radar.offseq.com/threat/cve-20 #OffSeq #SSRF #Vuln #AppSec

##

thehackerwire@mastodon.social at 2026-03-29T18:38:17.000Z ##

🟠 CVE-2026-0560 - High (7.5)

A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms versions prior to 2.2.0, specifically in the `/api/files/export-content` endpoint. The `_download_image_to_temp()` function in `backend/routers/files.py` fails to validat...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32915
(8.8 HIGH)

EPSS: 0.01%

updated 2026-03-30T13:26:07.647000

1 posts

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability allowing leaf subagents to access the subagents control surface and resolve against parent requester scope instead of their own session tree. A low-privilege sandboxed leaf worker can steer or kill sibling runs and cause execution with broader tool policies by exploiting insufficient authorization checks on subagent control

thehackerwire@mastodon.social at 2026-03-29T13:35:58.000Z ##

🟠 CVE-2026-32915 - High (8.8)

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability allowing leaf subagents to access the subagents control surface and resolve against parent requester scope instead of their own session tree. A low-privilege sandboxed leaf...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32914
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-30T13:26:07.647000

1 posts

OpenClaw before 2026.3.12 contains an insufficient access control vulnerability in the /config and /debug command handlers that allows command-authorized non-owners to access owner-only surfaces. Attackers with command authorization can read or modify privileged configuration settings restricted to owners by exploiting missing owner-level permission checks.

thehackerwire@mastodon.social at 2026-03-29T13:35:49.000Z ##

🟠 CVE-2026-32914 - High (8.8)

OpenClaw before 2026.3.12 contains an insufficient access control vulnerability in the /config and /debug command handlers that allows command-authorized non-owners to access owner-only surfaces. Attackers with command authorization can read or mo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33572
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-30T13:26:07.647000

1 posts

OpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents. Attackers with local access can read transcript files to extract sensitive information including secrets from tool output.

thehackerwire@mastodon.social at 2026-03-29T13:19:49.000Z ##

🟠 CVE-2026-33572 - High (8.4)

OpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents. Attackers with local access can read transcript files to extract sensitive information includ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5128
(10.0 CRITICAL)

EPSS: 0.14%

updated 2026-03-30T12:32:36

1 posts

A sensitive information exposure vulnerability exists in ArthurFiorette steam-trader 2.1.1. An unauthenticated attacker can send a request to the /usersΒ API endpoint to retrieve highly sensitive Steam account data, including the account username, password, identity secret, and shared secret. In addition, application logs expose authentication artifacts such as access tokens, refresh tokens, and se

thehackerwire@mastodon.social at 2026-03-30T10:47:13.000Z ##

πŸ”΄ CVE-2026-5128 - Critical (10)

A sensitive information exposure vulnerability exists in ArthurFiorette steam-trader 2.1.1. An unauthenticated attacker can send a request to the /users API endpoint to retrieve highly sensitive Steam account data, including the account username,...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4415
(8.1 HIGH)

EPSS: 0.37%

updated 2026-03-30T09:31:38

2 posts

Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulnerability. When the pairing feature is enabled, unauthenticated remote attackers can write arbitrary files to any location on the underlying operating system, leading to arbitrary code execution or privilege escalation.

offseq@infosec.exchange at 2026-03-30T09:00:28.000Z ##

🚨 CVE-2026-4415 (CRITICAL, CVSS 9.2) hits Gigabyte Control Center: unauth’d remote attackers can write files anywhere if pairing is enabled. No patch yet β€” disable pairing & monitor for anomalies. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Gigabyte #Infosec

##

thehackerwire@mastodon.social at 2026-03-30T08:17:50.000Z ##

🟠 CVE-2026-4415 - High (8.1)

Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulnerability. When the pairing feature is enabled, unauthenticated remote attackers can write arbitrary files to any location on the underlying operating system, leading to...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3945
(7.5 HIGH)

EPSS: 0.05%

updated 2026-03-30T09:31:38

1 posts

An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG

thehackerwire@mastodon.social at 2026-03-30T08:34:45.000Z ##

🟠 CVE-2026-3945 - High (7.5)

An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2328
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-30T09:31:38

2 posts

An unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, resulting in exposure of sensitive information.

thehackerwire@mastodon.social at 2026-03-30T08:18:09.000Z ##

🟠 CVE-2026-2328 - High (7.5)

An unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, resulting in exposure of sensitive information.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

certvde@infosec.exchange at 2026-03-30T07:01:32.000Z ##

#OT #Advisory VDE-2026-010
WAGO: Multiple Vulnerabilities in WAGO Solution Builder and WAGO Device Sphere

Multiple vulnerabilities have been identified in WAGO Solution Builder and WAGO Device Sphere that affect components responsible for authentication and system communication.
#CVE CVE-2025-55315, CVE-2026-2328

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2025-15036
(9.6 CRITICAL)

EPSS: 0.05%

updated 2026-03-30T03:30:24

1 posts

A path traversal vulnerability exists in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artifact_cache.py` file of the mlflow/mlflow repository. This vulnerability, present in versions before v3.7.0, arises due to the lack of validation of tar member paths during extraction. An attacker with control over the tar.gz file can exploit this issue to overwrite arbitrary files

thehackerwire@mastodon.social at 2026-03-30T02:20:46.000Z ##

πŸ”΄ CVE-2025-15036 - Critical (9.6)

A path traversal vulnerability exists in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artifact_cache.py` file of the mlflow/mlflow repository. This vulnerability, present in versions before v3.7.0, arises due to the la...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34005
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-29T18:30:30

2 posts

In Sofia on Xiongmai DVR/NVR (AHB7008T-MH-V2 and NBD7024H-P) 4.03.R11 devices, root OS command injection can occur via shell metacharacters in the HostName value via an authenticated DVRIP protocol (TCP port 34567) request to the NetWork.NetCommon configuration handler, because system() is used.

1 repos

https://github.com/uky007/CVE-2026-34005

offseq@infosec.exchange at 2026-03-30T04:30:36.000Z ##

πŸ”Ž CVE-2026-34005 (HIGH): Xiongmai DVR/NVR (v4.03.R11) root OS command injection via DVRIP (port 34567). Authenticated attackers can fully compromise devices. Restrict access, monitor, and segment ASAP. radar.offseq.com/threat/cve-20 #OffSeq #Xiongmai #Infosec #Vuln

##

thehackerwire@mastodon.social at 2026-03-29T17:18:35.000Z ##

🟠 CVE-2026-34005 - High (8.8)

In Sofia on Xiongmai DVR/NVR (AHB7008T-MH-V2 and NBD7024H-P) 4.03.R11 devices, root OS command injection can occur via shell metacharacters in the HostName value via an authenticated DVRIP protocol (TCP port 34567) request to the NetWork.NetCommon...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0562
(8.3 HIGH)

EPSS: 0.05%

updated 2026-03-29T18:30:30

2 posts

A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows any authenticated user to accept or reject friend requests belonging to other users. The `respond_request()` function in `backend/routers/friends.py` does not implement proper authorization checks, enabling Insecure Direct Object Reference (IDOR) attacks. Specifically, the `/api/friends/requests/{friendship_id}` endpo

offseq@infosec.exchange at 2026-03-30T01:30:31.000Z ##

🚨 CVE-2026-0562 (HIGH, CVSS 8.3) in parisneo/lollms ≀2.2.0: Authenticated users can accept/reject others' friend requests via IDOR in /api/friends/requests/{friendship_id}. Upgrade to 2.2.0+ and audit API auth now! radar.offseq.com/threat/cve-20 #OffSeq #CVE20260562 #IDOR #AppSec

##

thehackerwire@mastodon.social at 2026-03-29T18:38:26.000Z ##

🟠 CVE-2026-0562 - High (8.3)

A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows any authenticated user to accept or reject friend requests belonging to other users. The `respond_request()` function in `backend/routers/friends.py` does not impleme...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0558
(7.5 HIGH)

EPSS: 0.11%

updated 2026-03-29T18:30:30

2 posts

A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows unauthenticated users to upload and process files through the `/api/files/extract-text` endpoint. This endpoint does not enforce authentication, unlike other file-related endpoints, and lacks the `Depends(get_current_active_user)` dependency. This issue can lead to denial of service (DoS) through resource exhaustion, inf

offseq@infosec.exchange at 2026-03-29T19:30:30.000Z ##

🚨 HIGH severity: CVE-2026-0558 in parisneo/lollms (≀2.2.0) β€” /api/files/extract-text allows unauthenticated file uploads, risking DoS & info leaks. Restrict access, enforce auth, and monitor activity. No patch yet. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #AppSec

##

thehackerwire@mastodon.social at 2026-03-29T18:38:35.000Z ##

🟠 CVE-2026-0558 - High (7.5)

A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows unauthenticated users to upload and process files through the `/api/files/extract-text` endpoint. This endpoint does not enforce authentication, unlike other file-relate...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5046
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-29T15:30:29

2 posts

A flaw has been found in Tenda FH1201 1.2.0.14(408). Affected is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component Parameter Handler. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been published and may be used.

offseq@infosec.exchange at 2026-03-30T06:00:27.000Z ##

⚠️ CVE-2026-5046 (HIGH): Tenda FH1201 v1.2.0.14(408) suffers stack-based buffer overflow via /goform/WrlExtraSet. Public exploit available β€” restrict remote access, monitor logs, and segment affected devices. radar.offseq.com/threat/cve-20 #OffSeq #Infosec #RouterSecurity

##

thehackerwire@mastodon.social at 2026-03-29T15:59:54.000Z ##

🟠 CVE-2026-5046 - High (8.8)

A flaw has been found in Tenda FH1201 1.2.0.14(408). Affected is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component Parameter Handler. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33573
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-29T15:30:29

2 posts

OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in the gateway agent RPC that allows authenticated operators with operator.write permission to override workspace boundaries by supplying attacker-controlled spawnedBy and workspaceDir values. Remote operators can escape the configured workspace boundary and execute arbitrary file and exec operations from any process-accessib

thehackerwire@mastodon.social at 2026-03-29T13:32:55.000Z ##

🟠 CVE-2026-33573 - High (8.8)

OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in the gateway agent RPC that allows authenticated operators with operator.write permission to override workspace boundaries by supplying attacker-controlled spawnedBy and wo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-29T13:19:58.000Z ##

🟠 CVE-2026-33573 - High (8.8)

OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in the gateway agent RPC that allows authenticated operators with operator.write permission to override workspace boundaries by supplying attacker-controlled spawnedBy and wo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32980
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-29T15:30:29

2 posts

OpenClaw before 2026.3.13 reads and buffers Telegram webhook request bodies before validating the x-telegram-bot-api-secret-token header, allowing unauthenticated attackers to exhaust server resources. Attackers can send POST requests to the webhook endpoint to force memory consumption, socket time, and JSON parsing work before authentication validation occurs.

thehackerwire@mastodon.social at 2026-03-29T13:20:33.000Z ##

🟠 CVE-2026-32980 - High (7.5)

OpenClaw before 2026.3.13 reads and buffers Telegram webhook request bodies before validating the x-telegram-bot-api-secret-token header, allowing unauthenticated attackers to exhaust server resources. Attackers can send POST requests to the webho...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-29T13:19:33.000Z ##

🟠 CVE-2026-32980 - High (7.5)

OpenClaw before 2026.3.13 reads and buffers Telegram webhook request bodies before validating the x-telegram-bot-api-secret-token header, allowing unauthenticated attackers to exhaust server resources. Attackers can send POST requests to the webho...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33575
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-29T15:30:29

2 posts

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can recover and reuse the shared gateway credential outside the intended one-time pairing flow.

thehackerwire@mastodon.social at 2026-03-29T13:20:15.000Z ##

🟠 CVE-2026-33575 - High (7.5)

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can rec...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-29T13:19:14.000Z ##

🟠 CVE-2026-33575 - High (7.5)

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can rec...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32987
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-29T15:30:29

1 posts

OpenClaw before 2026.3.13 allows bootstrap setup codes to be replayed during device pairing verification in src/infra/device-bootstrap.ts. Attackers can verify a valid bootstrap code multiple times before approval to escalate pending pairing scopes, including privilege escalation to operator.admin.

thehackerwire@mastodon.social at 2026-03-29T13:19:39.000Z ##

πŸ”΄ CVE-2026-32987 - Critical (9.8)

OpenClaw before 2026.3.13 allows bootstrap setup codes to be replayed during device pairing verification in src/infra/device-bootstrap.ts. Attackers can verify a valid bootstrap code multiple times before approval to escalate pending pairing scope...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32922
(10.0 CRITICAL)

EPSS: 0.21%

updated 2026-03-29T15:30:28

2 posts

OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in device.token.rotate that allows callers with operator.pairing scope to mint tokens with broader scopes by failing to constrain newly minted scopes to the caller's current scope set. Attackers can obtain operator.admin tokens for paired devices and achieve remote code execution on connected nodes via system.run or gain unaut

thehackerwire@mastodon.social at 2026-03-29T13:36:58.000Z ##

πŸ”΄ CVE-2026-32922 - Critical (9.9)

OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in device.token.rotate that allows callers with operator.pairing scope to mint tokens with broader scopes by failing to constrain newly minted scopes to the caller's current s...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-29T13:35:33.000Z ##

πŸ”΄ CVE-2026-32922 - Critical (9.9)

OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in device.token.rotate that allows callers with operator.pairing scope to mint tokens with broader scopes by failing to constrain newly minted scopes to the caller's current s...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32974
(8.6 HIGH)

EPSS: 0.11%

updated 2026-03-29T15:30:28

3 posts

OpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing acceptance of forged events. Unauthenticated network attackers can inject forged Feishu events and trigger downstream tool execution by reaching the webhook endpoint.

thehackerwire@mastodon.social at 2026-03-29T13:36:49.000Z ##

🟠 CVE-2026-32974 - High (8.6)

OpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing acceptance of forged events. Unauthenticated network attackers can inject forge...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-29T13:35:24.000Z ##

🟠 CVE-2026-32974 - High (8.6)

OpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing acceptance of forged events. Unauthenticated network attackers can inject forge...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-29T13:33:14.000Z ##

🟠 CVE-2026-32974 - High (8.6)

OpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing acceptance of forged events. Unauthenticated network attackers can inject forge...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32973
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-29T15:30:28

3 posts

OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where matchesExecAllowlistPattern improperly normalizes patterns with lowercasing and glob matching that overmatches on POSIX paths. Attackers can exploit the ? wildcard matching across path segments to execute commands or paths not intended by operators.

thehackerwire@mastodon.social at 2026-03-29T13:36:39.000Z ##

πŸ”΄ CVE-2026-32973 - Critical (9.8)

OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where matchesExecAllowlistPattern improperly normalizes patterns with lowercasing and glob matching that overmatches on POSIX paths. Attackers can exploit the ? wildcard mat...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-29T13:35:15.000Z ##

πŸ”΄ CVE-2026-32973 - Critical (9.8)

OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where matchesExecAllowlistPattern improperly normalizes patterns with lowercasing and glob matching that overmatches on POSIX paths. Attackers can exploit the ? wildcard mat...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-29T13:33:04.000Z ##

πŸ”΄ CVE-2026-32973 - Critical (9.8)

OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where matchesExecAllowlistPattern improperly normalizes patterns with lowercasing and glob matching that overmatches on POSIX paths. Attackers can exploit the ? wildcard mat...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32924
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-29T15:30:28

1 posts

OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where Feishu reaction events with omitted chat_type are misclassified as p2p conversations instead of group chats. Attackers can exploit this misclassification to bypass groupAllowFrom and requireMention protections in group chat reaction-derived events.

thehackerwire@mastodon.social at 2026-03-29T13:35:40.000Z ##

πŸ”΄ CVE-2026-32924 - Critical (9.8)

OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where Feishu reaction events with omitted chat_type are misclassified as p2p conversations instead of group chats. Attackers can exploit this misclassification to bypass grou...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32918
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-29T15:30:28

1 posts

OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool that allows sandboxed subagents to access parent or sibling session state. Attackers can supply arbitrary sessionKey values to read or modify session data outside their sandbox scope, including persisted model overrides.

thehackerwire@mastodon.social at 2026-03-29T13:33:34.000Z ##

🟠 CVE-2026-32918 - High (8.4)

OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool that allows sandboxed subagents to access parent or sibling session state. Attackers can supply arbitrary sessionKey values to read or modify sess...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32975
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-29T15:30:28

1 posts

OpenClaw before 2026.3.12 contains a weak authorization vulnerability in Zalouser allowlist mode that matches mutable group display names instead of stable group identifiers. Attackers can create groups with identical names to allowlisted groups to bypass channel authorization and route messages from unintended groups to the agent.

thehackerwire@mastodon.social at 2026-03-29T13:33:15.000Z ##

πŸ”΄ CVE-2026-32975 - Critical (9.8)

OpenClaw before 2026.3.12 contains a weak authorization vulnerability in Zalouser allowlist mode that matches mutable group display names instead of stable group identifiers. Attackers can create groups with identical names to allowlisted groups t...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34214
(7.7 HIGH)

EPSS: 0.00%

updated 2026-03-29T15:13:31

4 posts

### Summary Iceberg connector REST catalog static credentials (access key) or vended credentials (temporary access key) are accessible to users that have write privilege on SQL level. ### Details Iceberg REST catalog typically needs access to object storage. This access can be configured in multiple different ways. When storage access is achieved by static credentials (e.g. AWS S3 access key) o

thehackerwire@mastodon.social at 2026-03-31T15:41:43.000Z ##

🟠 CVE-2026-34214 - High (7.7)

Trino is a distributed SQL query engine for big data analytics. From version 439 to before version 480, Iceberg connector REST catalog static credentials (access key) or vended credentials (temporary access key) are accessible to users that have w...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T15:32:09.000Z ##

🟠 CVE-2026-34214 - High (7.7)

Trino is a distributed SQL query engine for big data analytics. From version 439 to before version 480, Iceberg connector REST catalog static credentials (access key) or vended credentials (temporary access key) are accessible to users that have w...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T15:41:43.000Z ##

🟠 CVE-2026-34214 - High (7.7)

Trino is a distributed SQL query engine for big data analytics. From version 439 to before version 480, Iceberg connector REST catalog static credentials (access key) or vended credentials (temporary access key) are accessible to users that have w...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T15:32:09.000Z ##

🟠 CVE-2026-34214 - High (7.7)

Trino is a distributed SQL query engine for big data analytics. From version 439 to before version 480, Iceberg connector REST catalog static credentials (access key) or vended credentials (temporary access key) are accessible to users that have w...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34209
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-29T15:10:05

2 posts

### Impact The `tempo/session` cooperative close handler validated the close voucher amount using `<` instead of `<=` against the on-chain settled amount. An attacker could submit a close voucher exactly equal to the settled amount, which would be accepted without committing any new funds, effectively closing or griefing the channel for free. ### Patches Fixed in 0.4.11. ### Workarounds There

thehackerwire@mastodon.social at 2026-03-31T15:32:00.000Z ##

🟠 CVE-2026-34209 - High (7.5)

mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the tempo/session cooperative close handler validated the close voucher amount using "&lt;&quot; instead of &quot;&lt;=&quot; against the on-chain settled amoun...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T15:32:00.000Z ##

🟠 CVE-2026-34209 - High (7.5)

mppx is a TypeScript interface for machine payments protocol. Prior to version 0.4.11, the tempo/session cooperative close handler validated the close voucher amount using "&lt;&quot; instead of &quot;&lt;=&quot; against the on-chain settled amoun...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5041
(4.7 MEDIUM)

EPSS: 0.23%

updated 2026-03-29T12:31:30

1 posts

A vulnerability was identified in code-projects Chamber of Commerce Membership Management System 1.0. Impacted is the function fwrite of the file admin/pageMail.php. The manipulation of the argument mailSubject/mailMessage leads to command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.

offseq@infosec.exchange at 2026-03-29T10:30:26.000Z ##

⚠️ CVE-2026-5041 (MEDIUM): Command injection in Chamber of Commerce Membership Mgmt System v1.0 via admin/pageMail.php. High privileges needed, public exploit exists. Input validation & patching advised. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #CommandInjection #InfoSec

##

CVE-2026-5036
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-29T09:30:17

2 posts

A vulnerability was found in Tenda 4G06 04.06.01.29. This vulnerability affects the function fromDhcpListClient of the file /goform/DhcpListClient of the component Endpoint. Performing a manipulation of the argument page results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used.

offseq@infosec.exchange at 2026-03-29T09:00:27.000Z ##

🚨 CVE-2026-5036: HIGH severity stack buffer overflow in Tenda 4G06 (04.06.01.29) enables remote code execution. Exploit code is public β€” patch or mitigate now. Watch for attacks on /goform/DhcpListClient. radar.offseq.com/threat/cve-20 #OffSeq #CVE20265036 #RouterSecurity

##

thehackerwire@mastodon.social at 2026-03-29T08:17:22.000Z ##

🟠 CVE-2026-5036 - High (8.8)

A vulnerability was found in Tenda 4G06 04.06.01.29. This vulnerability affects the function fromDhcpListClient of the file /goform/DhcpListClient of the component Endpoint. Performing a manipulation of the argument page results in stack-based buf...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4851(CVSS UNKNOWN)

EPSS: 0.09%

updated 2026-03-29T03:30:17

2 posts

GRID::Machine versions through 0.127 for Perl allows arbitrary code execution via unsafe deserialization. GRID::Machine provides Remote Procedure Calls (RPC) over SSH for Perl. The client connects to remote hosts to execute code on them. A compromised or malicious remote host can execute arbitrary code back on the client through unsafe deserialization in the RPC protocol. read_operation() in lib

barubary@infosec.exchange at 2026-03-29T05:31:32.000Z ##

@offseq

CRITICAL: CVE-2026-4851 affects CASIANO GRID::Machine

... which is abandonware last updated in 2011.

##

offseq@infosec.exchange at 2026-03-29T01:30:28.000Z ##

⚠️ CRITICAL: CVE-2026-4851 affects CASIANO GRID::Machine (≀0.127). Malicious remote hosts can trigger client-side RCE via unsafe eval() deserialization. Only connect to trusted hosts & review code paths. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE20264851 #Perl #Security

##

CVE-2026-30457
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-03-28T03:32:30

1 posts

An issue in the /parser/dwoo component of Daylight Studio FuelCMS v1.5.2 allows attackers to execute arbitrary code via crafted PHP code.

thehackerwire@mastodon.social at 2026-03-29T03:00:39.000Z ##

πŸ”΄ CVE-2026-30457 - Critical (9.8)

An issue in the /parser/dwoo component of Daylight Studio FuelCMS v1.5.2 allows attackers to execute arbitrary code via crafted PHP code.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30458
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-03-28T03:32:30

1 posts

An issue in Daylight Studio FuelCMS v1.5.2 allows attackers to exfiltrate users' password reset tokens via a mail splitting attack.

thehackerwire@mastodon.social at 2026-03-29T02:00:14.000Z ##

πŸ”΄ CVE-2026-30458 - Critical (9.1)

An issue in Daylight Studio FuelCMS v1.5.2 allows attackers to exfiltrate users' password reset tokens via a mail splitting attack.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33871(CVSS UNKNOWN)

EPSS: 0.06%

updated 2026-03-27T21:48:56

1 posts

### Summary A remote user can trigger a Denial of Service (DoS) against a Netty HTTP/2 server by sending a flood of `CONTINUATION` frames. The server's lack of a limit on the number of `CONTINUATION` frames, combined with a bypass of existing size-based mitigations using zero-byte frames, allows an user to cause excessive CPU consumption with minimal bandwidth, rendering the server unresponsive.

thehackerwire@mastodon.social at 2026-03-30T21:00:01.000Z ##

🟠 CVE-2026-33871 - High (7.5)

Netty is an asynchronous, event-driven network application framework. In versions prior to 4.1.132.Final and 4.2.10.Final, a remote user can trigger a Denial of Service (DoS) against a Netty HTTP/2 server by sending a flood of `CONTINUATION` frame...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30463
(7.7 HIGH)

EPSS: 0.03%

updated 2026-03-27T21:32:39

1 posts

Daylight Studio FuelCMS v1.5.2 was discovered to contain a SQL injection vulnerability via the /controllers/Login.php component.

thehackerwire@mastodon.social at 2026-03-29T03:00:30.000Z ##

🟠 CVE-2026-30463 - High (7.7)

Daylight Studio FuelCMS v1.5.2 was discovered to contain a SQL injection vulnerability via the /controllers/Login.php component.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-53521
(7.5 HIGH)

EPSS: 19.92%

updated 2026-03-27T21:31:32

9 posts

When a BIG-IP APM Access Policy is configured on a virtual server, undisclosed traffic can cause TMM to terminate.Β Β  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

cert_fr@social.numerique.gouv.fr at 2026-03-31T14:52:13.000Z ##

⚠️ Alerte CERT-FR ⚠️
La vulnΓ©rabilitΓ© CVE-2025-53521 est activement exploitΓ©e et permet de provoquer une exΓ©cution de code arbitraire Γ  distance dans F5 Big-IP APM.

cert.ssi.gouv.fr/alerte/CERTFR

##

bsi@social.bund.de at 2026-03-31T13:26:21.000Z ##

πŸ“’βš οΈ Sicherheitswarnung: Version 1.0: F5 BIG-IP – Aktive Ausnutzung einer #Schwachstelle im Access Policy Manager

Am 27.03.2026 gab der Hersteller F5 ein Advisory heraus, in dem Details zu beobachteten Angriffen auf BIG-IP-Instanzen beschrieben wurden. Im Bericht enthalten waren im Wesentlichen Indicators of Compromise (IoCs), anhand derer eine Ausnutzung von CVE-2025-53521 detektiert werden kann.

Mehr Informationen gibt's hier: bsi.bund.de/dok/1195766

@certbund

##

Hackread@mstdn.social at 2026-03-31T11:40:34.000Z ##

F5 BIG-IP APM vulnerability (CVE-2025-53521) escalates to critical 9.8 RCE, actively exploited. Patch now, check IoCs, and secure vulnerable systems immediately.

Read: hackread.com/critical-f5-big-i

#CyberSecurity #F5 #Vulnerability #DDoS #RCE

##

cert_fr@social.numerique.gouv.fr at 2026-03-31T14:52:13.000Z ##

⚠️ Alerte CERT-FR ⚠️
La vulnΓ©rabilitΓ© CVE-2025-53521 est activement exploitΓ©e et permet de provoquer une exΓ©cution de code arbitraire Γ  distance dans F5 Big-IP APM.

cert.ssi.gouv.fr/alerte/CERTFR

##

bsi@social.bund.de at 2026-03-31T13:26:21.000Z ##

πŸ“’βš οΈ Sicherheitswarnung: Version 1.0: F5 BIG-IP – Aktive Ausnutzung einer #Schwachstelle im Access Policy Manager

Am 27.03.2026 gab der Hersteller F5 ein Advisory heraus, in dem Details zu beobachteten Angriffen auf BIG-IP-Instanzen beschrieben wurden. Im Bericht enthalten waren im Wesentlichen Indicators of Compromise (IoCs), anhand derer eine Ausnutzung von CVE-2025-53521 detektiert werden kann.

Mehr Informationen gibt's hier: bsi.bund.de/dok/1195766

@certbund

##

Hackread@mstdn.social at 2026-03-31T11:40:34.000Z ##

F5 BIG-IP APM vulnerability (CVE-2025-53521) escalates to critical 9.8 RCE, actively exploited. Patch now, check IoCs, and secure vulnerable systems immediately.

Read: hackread.com/critical-f5-big-i

#CyberSecurity #F5 #Vulnerability #DDoS #RCE

##

TomSellers@infosec.exchange at 2026-03-30T11:25:21.000Z ##

@offseq There has literally been a CVE and patch for this since October - runzero.com/blog/f5-bigip-inst

##

erosalie@infosec.exchange at 2026-03-29T15:44:29.000Z ##

March 28, 2026

Cyber Operations

European Commission confirms breach of cloud infrastructure. The European Commission disclosed on March 27 that attackers compromised its AWS account hosting the Europa.eu web platform, potentially exfiltrating over 350 GB of data including databases. The Commission stated its internal systems were not affected and that it detected and contained the intrusion on March 24. An investigation is underway to determine the full scope of the breach and affected Union entities are being notified.

FDD analysis warns Iranian cyber operations exploit weakened U.S. defenses. A March 27 report from the Foundation for Defense of Democracies highlights that CISA is operating at roughly 60 percent furlough even as Iranian threat actors escalate attacks on U.S. critical infrastructure. The analysis cites two healthcare-sector incidents in two weeks: a late-February ransomware attack on an unnamed U.S. healthcare provider and the March 11 Handala wiper attack on medical device firm Stryker, which disrupted emergency medical services and hospitals in Maryland.

CISA adds critical F5 BIG-IP vulnerability to exploited catalog. CISA flagged a critical flaw in F5 BIG-IP Access Policy Manager (CVE-2025-53521, CVSS 9.3) as actively exploited, reclassifying it from denial-of-service to remote code execution after new intelligence obtained in March 2026. Separately, a critical Citrix NetScaler vulnerability (CVE-2026-3055, CVSS 9.3) is seeing active reconnaissance activity in the wild.

Handala reconstitutes after FBI domain seizure. On March 20, the DOJ and FBI seized four domains tied to Iran-linked Handala Hack Team, which had been used for psychological operations, extortion messaging, and doxxing. Within approximately one day, Handala restored its online presence and resumed publishing. The group remains one of several Iranian state-aligned collectives operating under the Electronic Operations Room established on February 28, 2026.

Information Operations & Foreign Influence

DNI Gabbard's 2026 Annual Threat Assessment omits foreign election interference. The ODNI released its 2026 Annual Threat Assessment on March 18. Notably, the report omits a section on foreign election interference that had been a consistent feature in prior years. The assessment identifies China, Russia, Iran, and North Korea as persistent cyber and intelligence threats to U.S. government and private-sector networks, and flags AI and quantum computing as critical emerging technology challenges.

Kremlin-aligned Matryoshka network targeted 2026 Winter Olympics. A Russian-linked influence network seeded at least 28 fabricated reports during the 2026 Winter Olympics, impersonating outlets such as CBC and Reuters. AI-enhanced clips falsely portrayed Ukrainian athletes as criminals and cheaters, continuing Moscow's pattern of weaponizing sporting events for narrative advantage.

Iran deploys AI-generated imagery in wartime messaging. Iranian state-affiliated channels have circulated AI-generated imagery to amplify wartime narratives, including a fabricated image of a bloody children's backpack posted by the Iranian embassy in Austria, falsely linked to a strike on a girls' school in Minab.

Espionage

UK espionage trial underway at Old Bailey. Chung Biu "Bill" Yuen and Chi Leung "Peter" Wai are currently on trial in London under the National Security Act 2023, charged with assisting a foreign intelligence service and foreign interference. The trial commenced in early March and is expected to conclude in April.

Three men arrested in UK on suspicion of spying for China. London Metropolitan Police counter-terrorism officers arrested three men on March 4 under the National Security Act 2023. Among those detained was David Taylor, 39, husband of Labour MP Joani Reid and director at Asia House, a London-based think tank. The arrests followed an MI5 espionage alert issued to UK parliamentarians in November warning that Chinese intelligence services were actively recruiting individuals with access to government.

U.S. charges individuals in AI technology diversion and North Korean sanctions evasion. In March 2026, the DOJ charged three individuals with conspiring to unlawfully divert U.S. artificial intelligence technology to China, and separately sentenced three others for facilitating computer access in a North Korean sanctions evasion scheme. The 2026 threat assessment noted that North Korea stole approximately $2 billion via a cryptocurrency heist in 2025 to fund weapons programs.

##

thecybermind@infosec.exchange at 2026-03-29T14:03:40.000Z ##

Confused by the recent F5 BIG-IP vulnerability alerts? 🚨 We broke down exactly what this legacy appliance is, why its centralized architecture is a massive single point of failure, and how to replace it with sovereign, zero-trust hardware. Read the plain breakdown.
#Ransier_Sentinel

thecybermind.co/2026/03/29/thr

##

CVE-2026-34070
(7.5 HIGH)

EPSS: 0.19%

updated 2026-03-27T19:45:01

6 posts

## Summary Multiple functions in `langchain_core.prompts.loading` read files from paths embedded in deserialized config dicts without validating against directory traversal or absolute path injection. When an application passes user-influenced prompt configurations to `load_prompt()` or `load_prompt_from_config()`, an attacker can read arbitrary files on the host filesystem, constrained only by f

1 repos

https://github.com/Rickidevs/CVE-2026-34070

thehackerwire@mastodon.social at 2026-03-31T04:06:03.000Z ##

🟠 CVE-2026-34070 - High (7.5)

LangChain is a framework for building agents and LLM-powered applications. Prior to version 1.2.22, multiple functions in langchain_core.prompts.loading read files from paths embedded in deserialized config dicts without validating against directo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T04:01:25.000Z ##

🟠 CVE-2026-34070 - High (7.5)

LangChain is a framework for building agents and LLM-powered applications. Prior to version 1.2.22, multiple functions in langchain_core.prompts.loading read files from paths embedded in deserialized config dicts without validating against directo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T04:00:42.000Z ##

🟠 CVE-2026-34070 - High (7.5)

LangChain is a framework for building agents and LLM-powered applications. Prior to version 1.2.22, multiple functions in langchain_core.prompts.loading read files from paths embedded in deserialized config dicts without validating against directo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T04:06:03.000Z ##

🟠 CVE-2026-34070 - High (7.5)

LangChain is a framework for building agents and LLM-powered applications. Prior to version 1.2.22, multiple functions in langchain_core.prompts.loading read files from paths embedded in deserialized config dicts without validating against directo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T04:01:25.000Z ##

🟠 CVE-2026-34070 - High (7.5)

LangChain is a framework for building agents and LLM-powered applications. Prior to version 1.2.22, multiple functions in langchain_core.prompts.loading read files from paths embedded in deserialized config dicts without validating against directo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T04:00:42.000Z ##

🟠 CVE-2026-34070 - High (7.5)

LangChain is a framework for building agents and LLM-powered applications. Prior to version 1.2.22, multiple functions in langchain_core.prompts.loading read files from paths embedded in deserialized config dicts without validating against directo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34040
(8.8 HIGH)

EPSS: 0.01%

updated 2026-03-27T17:43:17

2 posts

## Summary A security vulnerability has been detected that allows attackers to bypass [authorization plugins (AuthZ)](https://docs.docker.com/engine/extend/plugins_authorization/) under specific circumstances. The base likelihood of this being exploited is low. This is an incomplete fix for [CVE-2024-41110](https://github.com/moby/moby/security/advisories/GHSA-v23v-6jw2-98fq). ## Impact **If y

thehackerwire@mastodon.social at 2026-03-31T04:06:14.000Z ##

🟠 CVE-2026-34040 - High (8.8)

Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows attackers to bypass authorization plugins (AuthZ). This issue has been patched in version 29.3.1.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T04:06:14.000Z ##

🟠 CVE-2026-34040 - High (8.8)

Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows attackers to bypass authorization plugins (AuthZ). This issue has been patched in version 29.3.1.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33945
(10.0 CRITICAL)

EPSS: 0.06%

updated 2026-03-27T17:22:35

1 posts

### Summary Incus instances have an option to provide credentials to systemd in the guest. For containers, this is handled through a shared directory. An attacker can use the name of a systemd credential to escape that directory and overwrite arbitrary files on the host system. This can in turn be used to perform local privilege escalation or cause a DoS. ### Details An attacker can set a config

thehackerwire@mastodon.social at 2026-03-29T01:59:55.000Z ##

πŸ”΄ CVE-2026-33945 - Critical (9.9)

Incus is a system container and virtual machine manager. Incus instances have an option to provide credentials to systemd in the guest. For containers, this is handled through a shared directory. Prior to version 6.23.0, an attacker can set a conf...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27893
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-27T15:27:20

1 posts

### Summary Two model implementation files hardcode `trust_remote_code=True` when loading sub-components, bypassing the user's explicit `--trust-remote-code=False` security opt-out. This enables remote code execution via malicious model repositories even when the user has explicitly disabled remote code trust. ### Details **Affected files (latest main branch):** 1. `vllm/model_execut

thehackerwire@mastodon.social at 2026-03-29T02:00:04.000Z ##

🟠 CVE-2026-27893 - High (8.8)

vLLM is an inference and serving engine for large language models (LLMs). Starting in version 0.10.1 and prior to version 0.18.0, two model implementation files hardcode `trust_remote_code=True` when loading sub-components, bypassing the user's ex...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4905
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-27T00:31:32

1 posts

A vulnerability was found in Tenda AC5 15.03.06.47. Impacted is the function formWifiWpsOOB of the file /goform/WifiWpsOOB of the component POST Request Handler. Performing a manipulation of the argument index results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-03-29T01:01:41.000Z ##

🟠 CVE-2026-4905 - High (8.8)

A vulnerability was found in Tenda AC5 15.03.06.47. Impacted is the function formWifiWpsOOB of the file /goform/WifiWpsOOB of the component POST Request Handler. Performing a manipulation of the argument index results in stack-based buffer overflo...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33017
(9.8 CRITICAL)

EPSS: 5.65%

updated 2026-03-26T13:26:16.393000

2 posts

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored f

6 repos

https://github.com/EQSTLab/CVE-2026-33017

https://github.com/z4yd3/PoC-CVE-2026-33017

https://github.com/SimoesCTT/Sovereign-Echo-33017

https://github.com/rootdirective-sec/CVE-2026-33017-Lab

https://github.com/MaxMnMl/langflow-CVE-2026-33017-poc

https://github.com/omer-efe-curkus/CVE-2026-33017-Langflow-RCE-PoC

benzogaga33@mamot.fr at 2026-03-31T15:40:03.000Z ##

Langflow – Γ€ peine dΓ©voilΓ©e, dΓ©jΓ  exploitΓ©e : attention Γ  cette faille critique it-connect.fr/langflow-cve-202 #ActuCybersΓ©curitΓ© #CybersΓ©curitΓ©

##

benzogaga33@mamot.fr at 2026-03-31T15:40:03.000Z ##

Langflow – Γ€ peine dΓ©voilΓ©e, dΓ©jΓ  exploitΓ©e : attention Γ  cette faille critique it-connect.fr/langflow-cve-202 #ActuCybersΓ©curitΓ© #CybersΓ©curitΓ©

##

CVE-2019-25630
(8.8 HIGH)

EPSS: 0.67%

updated 2026-03-26T00:30:54

1 posts

PhreeBooks ERP 5.2.3 contains an arbitrary file upload vulnerability in the Image Manager component that allows authenticated attackers to upload malicious files by submitting requests to the image upload endpoint. Attackers can upload PHP files through the imgFile parameter to the bizuno/image/manager endpoint and execute them via the bizunoFS.php script for remote code execution.

secdb@infosec.exchange at 2026-03-30T00:01:00.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-23 - 2026-03-30)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1724

Severity:
- Critical: 160
- High: 649
- Medium: 676
- Low: 49
- None: 190

Status:
- : 20
- Analyzed: 407
- Awaiting Analysis: 410
- Modified: 55
- Received: 778
- Rejected: 23
- Undergoing Analysis: 31

Top CNAs:
- GitHub, Inc.: 426
- Patchstack: 248
- VulDB: 159
- VulnCheck: 124
- kernel.org: 122
- Apple Inc.: 87
- MITRE: 74
- Mozilla Corporation: 47
- Wordfence: 46
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 33

Top Affected Products:
- UNKNOWN: 1239
- Apple Macos: 76
- Mozilla Firefox: 45
- Apple Ipados: 41
- Apple Iphone Os: 41
- Wwbn Avideo: 34
- Apple Visionos: 28
- Apple Watchos: 21
- Open-emr Openemr: 20
- Hcltech Aftermarket Cloud: 17

Top EPSS Score:
- CVE-2026-33634 - 26.61 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33526 - 1.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33478 - 1.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32854 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32748 - 0.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33515 - 0.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33396 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4611 - 0.72 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26829 - 0.69 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25630 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-33478
(10.0 CRITICAL)

EPSS: 1.95%

updated 2026-03-24T18:51:55.653000

1 posts

WWBN AVideo is an open source video platform. In versions up to and including 26.0, multiple vulnerabilities in AVideo's CloneSite plugin chain together to allow a completely unauthenticated attacker to achieve remote code execution. The `clones.json.php` endpoint exposes clone secret keys without authentication, which can be used to trigger a full database dump via `cloneServer.json.php`. The dum

secdb@infosec.exchange at 2026-03-30T00:01:00.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-23 - 2026-03-30)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1724

Severity:
- Critical: 160
- High: 649
- Medium: 676
- Low: 49
- None: 190

Status:
- : 20
- Analyzed: 407
- Awaiting Analysis: 410
- Modified: 55
- Received: 778
- Rejected: 23
- Undergoing Analysis: 31

Top CNAs:
- GitHub, Inc.: 426
- Patchstack: 248
- VulDB: 159
- VulnCheck: 124
- kernel.org: 122
- Apple Inc.: 87
- MITRE: 74
- Mozilla Corporation: 47
- Wordfence: 46
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 33

Top Affected Products:
- UNKNOWN: 1239
- Apple Macos: 76
- Mozilla Firefox: 45
- Apple Ipados: 41
- Apple Iphone Os: 41
- Wwbn Avideo: 34
- Apple Visionos: 28
- Apple Watchos: 21
- Open-emr Openemr: 20
- Hcltech Aftermarket Cloud: 17

Top EPSS Score:
- CVE-2026-33634 - 26.61 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33526 - 1.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33478 - 1.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32854 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32748 - 0.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33515 - 0.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33396 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4611 - 0.72 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26829 - 0.69 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25630 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-15517
(0 None)

EPSS: 0.05%

updated 2026-03-24T15:54:09.400000

1 posts

A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600 to certain cgi endpoints allows unauthenticated access intended for authenticated users. An attacker may perform privileged HTTP actions without authentication, including firmware upload and configuration operations.

hackmag@infosec.exchange at 2026-03-30T18:00:03.000Z ##

βšͺ️ TP-Link Routers Patched for Critical Authentication Bypass Vulnerability

πŸ—¨οΈ TP-Link has released firmware updates for its Archer NX series routers, fixing several vulnerabilities at once. The most serious issue allowed attackers to upload arbitrary firmware to the device without any authentication. The critical vulnerability has been assigned the identifier…

πŸ”— hackmag.com/news/cve-2025-1551

#news

##

CVE-2026-26829
(7.5 HIGH)

EPSS: 1.25%

updated 2026-03-24T15:54:09.400000

1 posts

A NULL pointer dereference in the safe_atou64 function (src/misc.c) of owntone-server through commit c4d57aa allows attackers to cause a Denial of Service (DoS) via sending a series of crafted HTTP requests to the server.

secdb@infosec.exchange at 2026-03-30T00:01:00.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-23 - 2026-03-30)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1724

Severity:
- Critical: 160
- High: 649
- Medium: 676
- Low: 49
- None: 190

Status:
- : 20
- Analyzed: 407
- Awaiting Analysis: 410
- Modified: 55
- Received: 778
- Rejected: 23
- Undergoing Analysis: 31

Top CNAs:
- GitHub, Inc.: 426
- Patchstack: 248
- VulDB: 159
- VulnCheck: 124
- kernel.org: 122
- Apple Inc.: 87
- MITRE: 74
- Mozilla Corporation: 47
- Wordfence: 46
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 33

Top Affected Products:
- UNKNOWN: 1239
- Apple Macos: 76
- Mozilla Firefox: 45
- Apple Ipados: 41
- Apple Iphone Os: 41
- Wwbn Avideo: 34
- Apple Visionos: 28
- Apple Watchos: 21
- Open-emr Openemr: 20
- Hcltech Aftermarket Cloud: 17

Top EPSS Score:
- CVE-2026-33634 - 26.61 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33526 - 1.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33478 - 1.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32854 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32748 - 0.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33515 - 0.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33396 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4611 - 0.72 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26829 - 0.69 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25630 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-4611
(7.2 HIGH)

EPSS: 1.01%

updated 2026-03-24T00:30:29

1 posts

A flaw has been found in TOTOLINK X6000R 9.4.0cu.1360_B20241207/9.4.0cu.1498_B20250826. Affected by this issue is the function setLanCfg of the file /usr/sbin/shttpd. Executing a manipulation of the argument Hostname can lead to os command injection. The attack may be launched remotely.

secdb@infosec.exchange at 2026-03-30T00:01:00.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-23 - 2026-03-30)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1724

Severity:
- Critical: 160
- High: 649
- Medium: 676
- Low: 49
- None: 190

Status:
- : 20
- Analyzed: 407
- Awaiting Analysis: 410
- Modified: 55
- Received: 778
- Rejected: 23
- Undergoing Analysis: 31

Top CNAs:
- GitHub, Inc.: 426
- Patchstack: 248
- VulDB: 159
- VulnCheck: 124
- kernel.org: 122
- Apple Inc.: 87
- MITRE: 74
- Mozilla Corporation: 47
- Wordfence: 46
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 33

Top Affected Products:
- UNKNOWN: 1239
- Apple Macos: 76
- Mozilla Firefox: 45
- Apple Ipados: 41
- Apple Iphone Os: 41
- Wwbn Avideo: 34
- Apple Visionos: 28
- Apple Watchos: 21
- Open-emr Openemr: 20
- Hcltech Aftermarket Cloud: 17

Top EPSS Score:
- CVE-2026-33634 - 26.61 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33526 - 1.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33478 - 1.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32854 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32748 - 0.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33515 - 0.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33396 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4611 - 0.72 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26829 - 0.69 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25630 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-4438
(5.4 MEDIUM)

EPSS: 0.03%

updated 2026-03-23T15:31:41

1 posts

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the caller in violation of the DNS specification.

grawity@treehouse.systems at 2026-03-30T10:48:26.000Z ##

CVE-2026-4438 reminds me of that time I discovered BIND's "check-names no" and found out that "freenode/staff/foo.example.com" was a valid rDNS entry according to the ircd

##

CVE-2026-3584
(9.8 CRITICAL)

EPSS: 0.29%

updated 2026-03-21T00:32:48

1 posts

The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into internal placeholder storage, combined with the use of 'call_user_func' on these placeholder values. This makes it possible for unauthenticated attackers to ex

1 repos

https://github.com/Yucaerin/CVE-2026-3584

beyondmachines1@infosec.exchange at 2026-03-29T16:01:46.000Z ##

Critical RCE Vulnerability in Kali Forms Plugin Under Active Exploitation

Kali Forms for WordPress contains a critical unauthenticated remote code execution vulnerability (CVE-2026-3584) that is being exploited in the wild. Attackers can take full control of affected servers by sending malicious requests to the plugin's form processing function.

**If you are using Kali Forms, this is urgent. Immediately update to version 2.4.10 to block active exploitation. If you cannot patch right away, disable the plugin.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-4342
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-20T13:37:50.737000

2 posts

A security issue was discovered in ingress-nginx where a combination of Ingress annotations can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

1 repos

https://github.com/stuartMoorhouse/CVE-2026-4342

vitobotta@mastodon.social at 2026-03-31T14:08:20.000Z ##

CVE-2026-4342 in Kubernetes ingress-nginx: annotation combo = config injection = RCE + Secrets leak. CVSS 8.8. Default controller sees ALL cluster Secrets. Patch now.

##

vitobotta@mastodon.social at 2026-03-31T14:08:20.000Z ##

CVE-2026-4342 in Kubernetes ingress-nginx: annotation combo = config injection = RCE + Secrets leak. CVSS 8.8. Default controller sees ALL cluster Secrets. Patch now.

##

CVE-2026-31853
(5.7 MEDIUM)

EPSS: 0.01%

updated 2026-03-19T18:26:38

1 posts

An overflow on 32-bit systems can cause a crash in the SFW decoder when processing extremely large images.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-30883
(5.7 MEDIUM)

EPSS: 0.01%

updated 2026-03-13T17:10:28.247000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-30931
(6.8 MEDIUM)

EPSS: 0.01%

updated 2026-03-13T16:59:45.720000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, a heap-based buffer overflow in the UHDR encoder can happen due to truncation of a value and it would allow an out of bounds write. This vulnerability is fixed in 7.1.2-16.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-3582
(4.3 MEDIUM)

EPSS: 0.02%

updated 2026-03-12T21:35:47

1 posts

An Incorrect Authorization vulnerability was identified in GitHub Enterprise Server that allowed an authenticated user with a classic personal access token (PAT) lacking the repo scope to retrieve issues and commits from private and internal repositories via the search REST API endpoints. The user must have had existing access to the repository through organization membership or as a collaborator

vitobotta@mastodon.social at 2026-03-30T16:14:10.000Z ##

GitHub Enterprise bug bounty: PATs without repo scope could still leak private issues and commits via search endpoints. CVE-2026-3582 shows that token scopes need consistent enforcement across ALL API paths. Check your token boundaries.

##

CVE-2026-28493
(6.5 MEDIUM)

EPSS: 0.06%

updated 2026-03-12T15:19:11.260000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, an integer overflow vulnerability exists in the SIXEL decoer. The vulnerability allows an attacker to perform an out of bounds via a specially crafted image. This vulnerability is fixed in 7.1.2-16.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-28688
(4.0 MEDIUM)

EPSS: 0.04%

updated 2026-03-12T15:08:20.260000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap-use-after-free vulnerability exists in the MSL encoder, where a cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has been removed. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-30937
(6.8 MEDIUM)

EPSS: 0.01%

updated 2026-03-12T14:16:53

1 posts

A 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap write can occur. ``` ================================================================= ==741961==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x5020000083dc at pc 0x56553b4c4245 bp 0x7ffd9d20fef0 sp 0x7ffd9d20fee0

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-30935
(4.4 MEDIUM)

EPSS: 0.01%

updated 2026-03-12T14:15:58

1 posts

BilateralBlurImage contains a heap buffer over-read caused by an incorrect conversion. When processing a crafted image with the `-bilateral-blur` operation an out of bounds read can occur. ``` ================================================================= ==676172==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x50a0000079c0 at pc 0x57b483c722f7 bp 0x7fffc0acd380 sp 0x7fffc0acd370 R

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-30929
(7.7 HIGH)

EPSS: 0.01%

updated 2026-03-12T14:15:25

1 posts

MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-28690
(6.9 MEDIUM)

EPSS: 0.01%

updated 2026-03-12T14:11:49

1 posts

A stack buffer overflow vulnerability exists in the MNG encoder. There is a bounds checks missing that could corrupting the stack with attacker-controlled data. ``` ==2265506==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffec4971310 at pc 0x55e671b8a072 bp 0x7ffec4970f70 sp 0x7ffec4970f68 WRITE of size 1 at 0x7ffec4971310 thread T0 ```

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-28687
(5.3 MEDIUM)

EPSS: 0.05%

updated 2026-03-12T14:09:34

1 posts

A heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attacker to trigger access to freed memory by crafting an MSL file. ``` ================================================================= ==1500633==ERROR: AddressSanitizer: heap-use-after-free on address 0x527000011550 at pc 0x5612583fa212 bp 0x7ffedb86d160 sp 0x7ffedb86d150 READ of size 8 at 0x527000011550 thread T0 ```

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-28686
(6.8 MEDIUM)

EPSS: 0.02%

updated 2026-03-12T14:09:13

1 posts

A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. ``` WRITE of size 1 at 0x7e79f91f31a0 thread T0 ```

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-28494
(7.1 HIGH)

EPSS: 0.01%

updated 2026-03-12T14:08:48

1 posts

A stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size stack buffers via memcpy without bounds checking, resulting in stack corruption.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-30936
(5.5 MEDIUM)

EPSS: 0.02%

updated 2026-03-11T17:48:46.670000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a crafted image could cause an out of bounds heap write inside the WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of bounds write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-28693
(8.1 HIGH)

EPSS: 0.06%

updated 2026-03-11T17:44:47.320000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-28692
(4.8 MEDIUM)

EPSS: 0.02%

updated 2026-03-11T17:42:10.180000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-28691
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-11T17:40:00.793000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-28689
(6.3 MEDIUM)

EPSS: 0.01%

updated 2026-03-10T21:02:28

1 posts

`domain="path"` authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-0848
(10.0 CRITICAL)

EPSS: 0.48%

updated 2026-03-05T21:31:00

2 posts

NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper input validation in the StanfordSegmenter module. The module dynamically loads external Java .jar files without verification or sandboxing. An attacker can supply or replace the JAR file, enabling the execution of arbitrary Java bytecode at import time. This vulnerability can be exploited through methods such as model

3 repos

https://github.com/fevar54/CVE-2026-0848-Scanner---Herramienta-de-Detecci-n

https://github.com/HyperPS/CVE-2026-0848

https://github.com/fevar54/CVE-2026-0848-PoC-Improper-Input-Validation

cktodon@mas.to at 2026-03-30T14:00:04.000Z ##

CΓ³mo un fallo en una librerΓ­a de #Python puede comprometer sistemas de #IA (CVE-2026-0848)

unaaldia.hispasec.com/2026/03/

##

LLMs@activitypub.awakari.com at 2026-03-30T09:04:34.000Z ## CΓ³mo un fallo en una librerΓ­a de Python puede comprometer sistemas de IA (CVE-2026-0848) En los ΓΊltimos dΓ­as se ha hecho pΓΊblica una vulnerabilidad crΓ­tica en NLTK, una de las librerΓ­as mΓ‘s...

#Seguridad

Origin | Interest | Match ##

CVE-2026-27799
(4.0 None)

EPSS: 0.01%

updated 2026-02-27T22:17:07

1 posts

A heap Buffer Over-read vulnerability exists in the DJVU image format handler. The vulnerability occurs due to integer truncation when calculating the stride (row size) for pixel buffer allocation. The stride calculation overflows a 32-bit signed integer, resulting in an out-of-bounds memory reads.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-27798
(4.0 MEDIUM)

EPSS: 0.01%

updated 2026-02-27T16:03:31.390000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability occurs when processing an image with small dimension using the `-wavelet-denoise` operator. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-24484
(5.3 MEDIUM)

EPSS: 0.06%

updated 2026-02-27T14:37:34.207000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, Magick fails to check for multi-layer nested mvg conversions to svg, leading to DoS. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25637
(5.3 MEDIUM)

EPSS: 0.06%

updated 2026-02-27T14:32:59.663000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-15, a memory leak in the ASHLAR image writer allows an attacker to exhaust process memory by providing a crafted image that results in small objects that are allocated but never freed. Version 7.1.2-15 contains a patch.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25985
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-25T12:10:42.060000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file containing an malicious element causes ImageMagick to attempt to allocate ~674 GB of memory, leading to an out-of-memory abort. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25795
(5.3 MEDIUM)

EPSS: 0.06%

updated 2026-02-24T18:46:49.677000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, in `ReadSFWImage()` (`coders/sfw.c`), when temporary file creation fails, `read_info` is destroyed before its `filename` member is accessed, causing a NULL pointer dereference and crash. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25796
(5.3 MEDIUM)

EPSS: 0.06%

updated 2026-02-24T18:46:13.680000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, in `ReadSTEGANOImage()` (`coders/stegano.c`), the `watermark` Image object is not freed on three early-return paths, resulting in a definite memory leak (~13.5KB+ per invocation) that can be exploited for denial of service. Versions 7.1.2-15 and 6.9.13-40 contain

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25798
(5.3 MEDIUM)

EPSS: 0.15%

updated 2026-02-24T18:45:31.173000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a NULL pointer dereference in ClonePixelCacheRepository allows a remote attacker to crash any application linked against ImageMagick by supplying a crafted image file, resulting in denial of service. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25989
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-24T18:43:16.560000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file can cause a denial of service. An off-by-one boundary check (`>` instead of `>=`) that allows bypass the guard and reach an undefined `(size_t)` cast. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-24481
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-24T17:42:17.567000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap information disclosure vulnerability exists in ImageMagick's PSD (Adobe Photoshop) format handler. When processing a maliciously crafted PSD file containing ZIP-compressed layer data that decompresses to less than the expected size, uninitialized heap memo

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-26983
(5.3 MEDIUM)

EPSS: 0.02%

updated 2026-02-24T15:46:51

1 posts

The MSL interpreter crashes when processing a invalid `<map>` element that causes it to use an image after it has been freed.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-26283
(6.2 MEDIUM)

EPSS: 0.02%

updated 2026-02-24T15:46:26

1 posts

A `continue` statement in the JPEG extent binary search loop in the jpeg encoder causes an infinite loop when writing persistently fails. An attacker can trigger a 100% CPU consumption and process hang (Denial of Service) with a crafted image.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-26066
(6.2 MEDIUM)

EPSS: 0.02%

updated 2026-02-24T15:46:05

1 posts

A crafted profile contain invalid IPTC data may cause an infinite loop when writing it with `IPTCTEXT`.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25988
(5.3 MEDIUM)

EPSS: 0.02%

updated 2026-02-24T15:45:15

1 posts

Sometimes msl.c fails to update the stack index, so an image is stored in the wrong slot and never freed on error, causing leaks. ``` ==841485==ERROR: LeakSanitizer: detected memory leaks Direct leak of 13512 byte(s) in 1 object(s) allocated from: #0 0x7ff330759887 in __interceptor_malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:145 ```

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25987
(5.3 MEDIUM)

EPSS: 0.01%

updated 2026-02-24T15:44:50

1 posts

A heap buffer over-read vulnerability exists in the MAP image decoder when processing crafted MAP files, potentially leading to crashes or unintended memory disclosure during image decoding. ``` ================================================================= ==4070926==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x502000002b31 at pc 0x56517afbd910 bp 0x7ffc59e90000 sp 0x7ffc59e8fff

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25983
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-02-24T15:43:55

1 posts

A crafted MSL script triggers a heap-use-after-free. The operation element handler replaces and frees the image while the parser continues reading from it, leading to a UAF in ReadBlobString during further parsing.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25969
(5.3 MEDIUM)

EPSS: 0.06%

updated 2026-02-24T15:43:30

1 posts

Memory leak exists in `coders/ashlar.c`. The `WriteASHLARImage` allocates a structure. However, when an exception is thrown, the allocated memory is not properly released, resulting in a potential memory leak. ``` ```bash ==78968== Memcheck, a memory error detector ==78968== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al. ==78968== Using Valgrind-3.22.0 and LibVEX; rerun with -h

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25967
(7.4 HIGH)

EPSS: 0.06%

updated 2026-02-24T15:43:05

1 posts

### Summary A stack-based buffer overflow exists in the ImageMagick FTXT image reader. A crafted FTXT file can cause out-of-bounds writes on the stack, leading to a crash. ``` ================================================================= ==3537074==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffee4850ef0 at pc 0x5607c408fb33 bp 0x7ffee484fe50 sp 0x7ffee484fe40 WRITE of size 1

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25966
(5.9 MEDIUM)

EPSS: 0.01%

updated 2026-02-24T15:42:39

1 posts

The shipped β€œsecure” security policy includes a rule intended to prevent reading/writing from standard streams: ```xml <policy domain="path" rights="none" pattern="-"/> ``` However, ImageMagick also supports fd:<n> pseudo-filenames (e.g., fd:0, fd:1). This path form is not blocked by the secure policy templates, and therefore bypasses the protection goal of β€œno stdin/stdout”. To resolve this, u

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25965
(8.6 HIGH)

EPSS: 0.05%

updated 2026-02-24T15:40:08

1 posts

ImageMagick’s path security policy is enforced on the raw filename string before the filesystem resolves it. As a result, a policy rule such as /etc/* can be bypassed by a path traversal. The OS resolves the traversal and opens the sensitive file, but the policy matcher only sees the unnormalized path and therefore allows the read. This enables local file disclosure (LFI) even when policy-secure.x

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25898
(6.5 MEDIUM)

EPSS: 0.06%

updated 2026-02-24T15:39:16

1 posts

The UIL and XPM image encoder do not validate the pixel index value returned by `GetPixelIndex()` before using it as an array subscript. In HDRI builds, `Quantum` is a floating-point type, so pixel index values can be negative. An attacker can craft an image with negative pixel index values to trigger a global buffer overflow read during conversion, leading to information disclosure or a process c

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25897
(6.5 MEDIUM)

EPSS: 0.06%

updated 2026-02-24T15:38:37

1 posts

An Integer Overflow vulnerability exists in the sun decoder. On 32-bit systems/builds, a carefully crafted image can lead to an out of bounds heap write. ``` ================================================================= ==1967675==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf190b50e at pc 0x5eae8777 bp 0xffb0fdd8 sp 0xffb0fdd0 WRITE of size 1 at 0xf190b50e thread T0 ```

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25799
(5.3 MEDIUM)

EPSS: 0.06%

updated 2026-02-24T15:37:56

1 posts

A logic error in YUV sampling factor validation allows an invalid sampling factor to bypass checks and trigger a division-by-zero during image loading, resulting in a reliable denial-of-service. ``` coders/yuv.c:210:47: runtime error: division by zero AddressSanitizer:DEADLYSIGNAL ================================================================= ==3543373==ERROR: AddressSanitizer: UNKNOWN SIGNAL

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25797
(5.7 MEDIUM)

EPSS: 0.03%

updated 2026-02-24T15:34:27

1 posts

The ps encoders, responsible for writing PostScript files, fails to sanitize the input before writing it into the PostScript header. An attacker can provide a malicious file and inject arbitrary PostScript code. When the resulting file is processed by a printer or a viewer (like Ghostscript), the injected code is interpreted and executed. The html encoder does not properly escape strings that ar

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25794
(8.2 HIGH)

EPSS: 0.06%

updated 2026-02-24T15:31:59

1 posts

`WriteUHDRImage` in `coders/uhdr.c` uses `int` arithmetic to compute the pixel buffer size. When image dimensions are large, the multiplication overflows 32-bit `int`, causing an undersized heap allocation followed by an out-of-bounds write. This can crash the process or potentially lead to an out of bounds heap write. ``` ==1575126==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7fc38

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25638
(5.3 MEDIUM)

EPSS: 0.06%

updated 2026-02-24T15:30:59

1 posts

Memory leak exists in `coders/msl.c`. In the `WriteMSLImage` function of the `msl.c` file, resources are allocated. But the function returns early without releasing these allocated resources. ``` ==78983== Memcheck, a memory error detector ==78983== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al. ==78983== Using Valgrind-3.22.0 and LibVEX; rerun with -h for copyright info ==78983

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-25576
(5.1 MEDIUM)

EPSS: 0.01%

updated 2026-02-24T15:29:48

1 posts

A heap buffer over-read vulnerability exists in multiple raw image format handles. The vulnerability occurs when processing images with -extract dimensions larger than -size dimensions, causing out-of-bounds memory reads from a heap-allocated buffer.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-24485
(7.5 HIGH)

EPSS: 0.06%

updated 2026-02-24T15:29:16

1 posts

When a PCD file does not contain a valid marker, the DecodeImage() function becomes trapped in an infinite loop while searching for the marker, causing the program to become unresponsive and continuously consume CPU resources, ultimately leading to system resource exhaustion and denial of service.

certvde@infosec.exchange at 2026-03-30T07:02:30.000Z ##

#OT #Advisory VDE-2026-021
WAGO: Multiple Vulnerabilities in WAGO VC Hub

The VC Hub incorporates the Magick.NET‑Q16‑AnyCPU component, derived from ImageMagick, to process user‑uploaded images and generate thumbnails within the projects image library. Only authenticated users with the Design Project Permission can upload images.
#CVE CVE-2026-25983, CVE-2026-25897, CVE-2026-25987, CVE-2026-25898, CVE-2026-25794, CVE-2026-28693, CVE-2026-25966, CVE-2026-30929, CVE-2026-28691, CVE-2026-26283, CVE-2026-26066, CVE-2026-25989, CVE-2026-25988, CVE-2026-25985, CVE-2026-25969, CVE-2026-25967, CVE-2026-25965, CVE-2026-25799, CVE-2026-25798, CVE-2026-25796, CVE-2026-25795, CVE-2026-24485, CVE-2026-24481, CVE-2026-28494, CVE-2026-30937, CVE-2026-30931, CVE-2026-28686, CVE-2026-28690, CVE-2026-28493, CVE-2026-28689, CVE-2026-30883, CVE-2026-31853, CVE-2026-30936, CVE-2026-28687, CVE-2026-28688, CVE-2026-26983, CVE-2026-25797, CVE-2026-25638, CVE-2026-25637, CVE-2026-24484, CVE-2026-25576, CVE-2026-28692, CVE-2026-30935, CVE-2026-27799, CVE-2026-27798

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-21858
(10.0 CRITICAL)

EPSS: 8.49%

updated 2026-01-13T15:05:00

2 posts

### Impact A vulnerability in n8n allows an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker. This could result in exposure of sensitive information stored on the system and may enable further compromise depending on deployment configuration and workflow usage. ### Pa

Nuclei template

11 repos

https://github.com/cropnet/Ni8mare

https://github.com/sastraadiwiguna-purpleeliteteaming/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit

https://github.com/bamov970/CVE-2026-21858

https://github.com/Chocapikk/CVE-2026-21858

https://github.com/SystemVll/CVE-2026-21858

https://github.com/sec-dojo-com/CVE-2026-21858

https://github.com/EQSTLab/CVE-2026-21858

https://github.com/bgarz929/Ashwesker-CVE-2026-21858

https://github.com/0xBlackash/CVE-2026-21858

https://github.com/Yati2/Ni8mare-CVE-2026-21858

https://github.com/Alhakim88/CVE-2026-21858

CVE-2025-14847
(7.5 HIGH)

EPSS: 74.63%

updated 2025-12-30T00:32:58

2 posts

Mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client. This issue affects all MongoDB Server v7.0 prior to 7.0.28 versions, MongoDB Server v8.0 versions prior to 8.0.17, MongoDB Server v8.2 versions prior to 8.2.3, MongoDB Server v6.0 versions prior to 6.0.27, MongoDB Server v5.0 versions prior to 5.0.32, MongoDB Ser

Nuclei template

39 repos

https://github.com/vfa-tuannt/CVE-2025-14847

https://github.com/im-hanzou/mongobleed

https://github.com/Rishi-kaul/CVE-2025-14847-MongoBleed

https://github.com/nma-io/mongobleed

https://github.com/pedrocruz2202/pedrocruz2202.github.io

https://github.com/NoNameError/MongoBLEED---CVE-2025-14847-POC-

https://github.com/Systemhaus-Schulz/MongoBleed-CVE-2025-14847

https://github.com/sakthivel10q/sakthivel10q.github.io

https://github.com/peakcyber-security/CVE-2025-14847

https://github.com/Black1hp/mongobleed-scanner

https://github.com/amnnrth/CVE-2025-14847

https://github.com/joshuavanderpoll/CVE-2025-14847

https://github.com/kuyrathdaro/cve-2025-14847

https://github.com/sho-luv/MongoBleed

https://github.com/JemHadar/MongoBleed-DFIR-Triage-Script-CVE-2025-14847

https://github.com/waheeb71/CVE-2025-14847

https://github.com/tunahantekeoglu/MongoDeepDive

https://github.com/AdolfBharath/mongobleed

https://github.com/0xBlackash/CVE-2025-14847

https://github.com/sakthivel10q/CVE-2025-14847

https://github.com/franksec42/mongobleed-exploit-CVE-2025-14847

https://github.com/KingHacker353/CVE-2025-14847_Expolit

https://github.com/onewinner/CVE-2025-14847

https://github.com/Security-Phoenix-demo/mongobleed-exploit-CVE-2025-14847

https://github.com/chinaxploiter/CVE-2025-14847-PoC

https://github.com/sahar042/CVE-2025-14847

https://github.com/14mb1v45h/CYBERDUDEBIVASH-MONGODB-DETECTOR-v2026

https://github.com/CadGoose/MongoBleed-CVE-2025-14847-Fully-Automated-scanner

https://github.com/ElJoamy/MongoBleed-exploit

https://github.com/saereya/CVE-2025-14847---MongoBleed

https://github.com/cybertechajju/CVE-2025-14847_Expolit

https://github.com/ProbiusOfficial/CVE-2025-14847

https://github.com/j0lt-github/mongobleedburp

https://github.com/lincemorado97/CVE-2025-14847

https://github.com/pedrocruz2202/mongobleed-scanner

https://github.com/keraattin/Mongobleed-Detector-CVE-2025-14847

https://github.com/alexcyberx/CVE-2025-14847_Expolit

https://github.com/FurkanKAYAPINAR/CVE-2025-14847-MongoBleed-Exploit

https://github.com/InfoSecAntara/CVE-2025-14847-MongoDB

CVE-2025-68664
(9.3 CRITICAL)

EPSS: 0.04%

updated 2025-12-24T01:08:11

2 posts

## Summary A serialization injection vulnerability exists in LangChain's `dumps()` and `dumpd()` functions. The functions do not escape dictionaries with `'lc'` keys when serializing free-form dictionaries. The `'lc'` key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserial

2 repos

https://github.com/comerc/CVE-2025-68664

https://github.com/Ak-cybe/CVE-2025-68664-LangGrinch-PoC

_r_netsec at 2026-03-31T13:43:09.107Z ##

LangGrinch: A Bug in the Library, A Lesson for the Architecture amlalabs.com/blog/langgrinch-c

##

_r_netsec@infosec.exchange at 2026-03-31T13:43:09.000Z ##

LangGrinch: A Bug in the Library, A Lesson for the Architecture amlalabs.com/blog/langgrinch-c

##

CVE-2024-28956
(5.6 MEDIUM)

EPSS: 0.09%

updated 2025-11-03T21:34:57

1 posts

Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

AAKL@infosec.exchange at 2026-03-30T17:43:00.000Z ##

Dell has a new advisory relating to three high-severity flaws: CVE-2024-28047, CVE-2024-39279 CVE-2024-28956.

Security Update for Dell Networking Products for Z9664 Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell #infosec #vulnerability

##

CVE-2024-39279
(6.5 MEDIUM)

EPSS: 0.02%

updated 2025-11-03T21:32:43

1 posts

Insufficient granularity of access control in UEFI firmware in some Intel(R) processors may allow a authenticated user to potentially enable denial of service via local access.

AAKL@infosec.exchange at 2026-03-30T17:43:00.000Z ##

Dell has a new advisory relating to three high-severity flaws: CVE-2024-28047, CVE-2024-39279 CVE-2024-28956.

Security Update for Dell Networking Products for Z9664 Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell #infosec #vulnerability

##

CVE-2024-28047
(5.3 MEDIUM)

EPSS: 0.01%

updated 2025-11-03T21:32:41

1 posts

Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.

AAKL@infosec.exchange at 2026-03-30T17:43:00.000Z ##

Dell has a new advisory relating to three high-severity flaws: CVE-2024-28047, CVE-2024-39279 CVE-2024-28956.

Security Update for Dell Networking Products for Z9664 Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell #infosec #vulnerability

##

CVE-2025-32975
(10.0 CRITICAL)

EPSS: 0.17%

updated 2025-11-03T20:18:29.263000

1 posts

Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead

erosalie@infosec.exchange at 2026-03-29T15:49:02.000Z ##

March 24, 2026

Information Operations & Foreign Influence

A former NSA analyst published a detailed investigation exposing a coordinated multi-nation disinformation network on X involving Russia, China, Iran, and Turkey. The network used a central account called "Global Insight Journal" that followed a three-phase amplification strategy β€” Turkish seeding, Iranian boosting, and Russian boosting β€” to spread narratives favorable to those states during the U.S.-Iran conflict. Posting volume dropped between March 3–5, coinciding with the destruction of Iran's state propaganda headquarters (IRIB), suggesting operational dependency on Iranian state infrastructure.

The Foundation for Defense of Democracies published an analysis arguing the 2026 Annual Threat Assessment omits key Russian threats, particularly Moscow's routine probing of NORAD airspace near Alaska, GPS interference in the Arctic, and simulated strikes against NATO targets. NORAD responded nine times to Russian aircraft near Alaska in 2025 and twice already in 2026.

PolitiFact published a detailed overview of Iran's influence operations during the current conflict, documenting the use of AI-generated imagery through state-affiliated channels and inauthentic social media accounts to spread favorable messaging β€” conducted even as Iran's internet connectivity has been reduced to 1–4% since strikes began on February 28.

Cyber Operations

Citrix released security updates addressing two vulnerabilities in NetScaler ADC and NetScaler Gateway, including a critical flaw (CVE-2026-3055, CVSS 9.3) involving insufficient input validation that could allow unauthenticated remote attackers to leak sensitive information from appliance memory.

Threat actors are suspected of actively exploiting a maximum-severity flaw in Quest KACE Systems Management Appliance (CVE-2025-32975, CVSS 10.0). Malicious activity was first observed the week of March 9 in customer environments. The authentication bypass vulnerability allows attackers to impersonate legitimate users and take over administrative accounts.

Iran-linked cyber operations continue in the wake of the February 28 U.S.-Israel strikes. The Iran-linked group Handala previously claimed the cyberattack on Stryker, the medical device company, which was the first destructive cyberattack to hit a U.S.-based company during the war. Palo Alto Networks' Unit 42 continues to track the broader escalation of Iranian cyber risk, noting multiple state-aligned personas coordinating under an "Electronic Operations Room" formed on February 28, with some estimates of 60 individual hacktivist groups now active.

Espionage

Ukraine's Security Service (SBU) announced it had identified Hungarian military intelligence officer Zoltan Andre as the handler of a spy network in the Zakarpattia region. Andre allegedly exploited Hungarian diplomatic institutions to recruit agents from among locals applying for Hungarian citizenship. The network collected intelligence on Ukrainian defense force deployments, including attempts to identify air defense positions in western Ukraine. Two members of the cell were detained. This is the first time Ukraine has publicly exposed an intelligence network run by a NATO ally.

The U.S. Department of Justice unsealed an indictment charging three individuals β€” Yih-Shyan "Wally" Liaw (U.S. citizen), Ruei-Tsang "Steven" Chang, and Ting-Wei "Willy" Sun (both Taiwanese citizens) β€” with conspiring to illegally divert high-performance AI server technology to China. The defendants allegedly used false documents, staged dummy servers to mislead inspectors, and convoluted transshipment schemes to evade U.S. export controls. Liaw and Sun were arrested; Chang remains a fugitive.

In Vienna, the trial of former Austrian intelligence officer Egisto Ott continues β€” Austria's biggest espionage case in years. Ott is accused of passing information to Russian intelligence and fugitive Wirecard executive Jan Marsalek, including allegedly obtaining a laptop containing secret EU electronic security hardware that was handed to Russian intelligence in 2022.

##

CVE-2025-55315
(9.9 CRITICAL)

EPSS: 0.21%

updated 2025-10-21T21:04:55

1 posts

# Microsoft Security Advisory CVE-2025-55315: .NET Security Feature Bypass Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in ASP.NET Core 10.0 , ASP.NET Core 9.0 , ASP.NET Core 8.0, and ASP.NET Core 2.3. This advisory also provides guidance on what developers can do to update their appl

7 repos

https://github.com/RootAid/CVE-2025-55315

https://github.com/7huukdlnkjkjba/CVE-2025-55315-

https://github.com/ZemarKhos/CVE-2025-55315-PoC-Exploit

https://github.com/MartinFabianIonut/CVE-2025-55315

https://github.com/sirredbeard/CVE-2025-55315-repro

https://github.com/nickcopi/CVE-2025-55315-detection-playground

https://github.com/jlinebau/CVE-2025-55315-Scanner-Monitor

certvde@infosec.exchange at 2026-03-30T07:01:32.000Z ##

#OT #Advisory VDE-2026-010
WAGO: Multiple Vulnerabilities in WAGO Solution Builder and WAGO Device Sphere

Multiple vulnerabilities have been identified in WAGO Solution Builder and WAGO Device Sphere that affect components responsible for authentication and system communication.
#CVE CVE-2025-55315, CVE-2026-2328

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2022-47386
(8.8 HIGH)

EPSS: 2.30%

updated 2025-07-17T13:02:11.490000

2 posts

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can leadΒ to a denial-of-service condition, memory overwriting, or remote code execution.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2022-47385
(8.8 HIGH)

EPSS: 2.30%

updated 2025-07-17T13:02:02.717000

2 posts

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpAppForce Component of multiple CODESYS products in multiple versions to write data into the stack which can leadΒ to a denial-of-service condition, memory overwriting, or remote code execution.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2022-47383
(8.8 HIGH)

EPSS: 2.30%

updated 2025-07-17T12:56:32.877000

2 posts

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can leadΒ to a denial-of-service condition, memory overwriting, or remote code execution.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2022-47382
(8.8 HIGH)

EPSS: 2.30%

updated 2025-07-17T12:50:47.377000

2 posts

An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can leadΒ to a denial-of-service condition, memory overwriting, or remote code execution.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2022-47381
(8.8 HIGH)

EPSS: 2.30%

updated 2025-07-17T12:46:26.603000

2 posts

An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into the stack which can leadΒ to a denial-of-service condition, memory overwriting, or remote code execution.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2022-47378
(6.5 MEDIUM)

EPSS: 0.41%

updated 2025-07-17T12:38:13.340000

2 posts

Multiple CODESYS products in multiple versions are prone to a improper input validation vulnerability. An authenticated remote attacker may craft specific requests that use the vulnerability leading to a denial-of-service condition.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2025-6514
(9.7 CRITICAL)

EPSS: 1.29%

updated 2025-07-09T18:08:46

2 posts

mcp-remote is exposed to OS command injection when connecting to untrusted MCP servers due to crafted input from the authorization_endpoint response URL

3 repos

https://github.com/darshjme/mcp-security-audit

https://github.com/Cyberency/CVE-2025-6514

https://github.com/ChaseHCS/CVE-2025-6514

_r_netsec at 2026-03-31T13:43:05.184Z ##

When OAuth Becomes a Weapon: Lessons from CVE-2025-6514 amlalabs.com/blog/oauth-cve-20

##

_r_netsec@infosec.exchange at 2026-03-31T13:43:05.000Z ##

When OAuth Becomes a Weapon: Lessons from CVE-2025-6514 amlalabs.com/blog/oauth-cve-20

##

CVE-2025-29970
(7.8 HIGH)

EPSS: 0.74%

updated 2025-05-19T14:20:49.300000

2 posts

Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.

_r_netsec at 2026-03-31T13:43:05.495Z ##

Microsoft Brokering File System Elevation of Privilege Vulnerability (CVE--2025-29970) pixiepointsecurity.com/blog/nd

##

_r_netsec@infosec.exchange at 2026-03-31T13:43:05.000Z ##

Microsoft Brokering File System Elevation of Privilege Vulnerability (CVE--2025-29970) pixiepointsecurity.com/blog/nd

##

CVE-2025-1551
(6.1 MEDIUM)

EPSS: 0.28%

updated 2025-05-12T21:02:15.870000

1 posts

IBM Operational Decision Manager 8.11.0.1, 8.11.1.0, 8.12.0.1, and 9.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

hackmag@infosec.exchange at 2026-03-30T18:00:03.000Z ##

βšͺ️ TP-Link Routers Patched for Critical Authentication Bypass Vulnerability

πŸ—¨οΈ TP-Link has released firmware updates for its Archer NX series routers, fixing several vulnerabilities at once. The most serious issue allowed attackers to upload arbitrary firmware to the device without any authentication. The critical vulnerability has been assigned the identifier…

πŸ”— hackmag.com/news/cve-2025-1551

#news

##

CVE-2022-47390
(8.8 HIGH)

EPSS: 2.36%

updated 2024-04-11T21:18:06

2 posts

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can leadΒ to a denial-of-service condition, memory overwriting, or remote code execution.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2022-47392
(6.5 MEDIUM)

EPSS: 0.31%

updated 2024-04-04T05:43:07

2 posts

An authenticated, remote attacker may use a improper input validation vulnerability in the CmpApp/CmpAppBP/CmpAppForce Components of multiple CODESYS products in multiple versions to read from an invalid address which can leadΒ to a denial-of-service condition.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2022-47389
(8.8 HIGH)

EPSS: 4.37%

updated 2024-04-04T05:43:04

2 posts

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can leadΒ to a denial-of-service condition, memory overwriting, or remote code execution.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2022-47388
(8.8 HIGH)

EPSS: 2.30%

updated 2024-04-04T05:43:02

2 posts

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can leadΒ to a denial-of-service condition, memory overwriting, or remote code execution.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2022-47387
(8.8 HIGH)

EPSS: 2.30%

updated 2024-04-04T05:43:02

2 posts

An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can leadΒ to a denial-of-service condition, memory overwriting, or remote code execution.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2022-47384
(8.8 HIGH)

EPSS: 2.30%

updated 2024-04-04T05:42:57

2 posts

An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can leadΒ to a denial-of-service condition, memory overwriting, or remote code execution.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2022-47380
(8.8 HIGH)

EPSS: 2.30%

updated 2024-04-04T05:42:52

2 posts

An authenticated remote attacker may use a stack basedΒ  out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into the stack which can leadΒ to a denial-of-service condition, memory overwriting, or remote code execution.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2022-47379
(8.8 HIGH)

EPSS: 2.81%

updated 2024-04-04T05:42:52

2 posts

An authenticated, remote attacker may use a out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into memory which can leadΒ to a denial-of-service condition, memory overwriting, or remote code execution.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2022-47393
(6.5 MEDIUM)

EPSS: 0.52%

updated 2024-04-04T04:05:11

2 posts

An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple versions of multiple CODESYS products to force a denial-of-service situation.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2022-47391
(7.5 HIGH)

EPSS: 0.59%

updated 2024-04-04T04:05:08

2 posts

In multiple CODESYS products in multiple versions an unauthorized, remote attacker may use a improper input validation vulnerability to read from invalid addresses leading to a denial of service.

certvde at 2026-03-31T07:38:13.878Z ##

VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

endress-hauser.csaf-tp.certvde

##

certvde@infosec.exchange at 2026-03-31T07:38:13.000Z ##

#OT #Advisory VDE-2026-003
Endress+Hauser: Multiple products prone to multiple vulnerabilities in e!Runtime and CODESYS V3 Runtime

Multiple Endress+Hauser devices are prone to vulnerabilities found in e!Runtime and the CODESYS V3 framework.
#CVE CVE-2022-47390, CVE-2022-47389, CVE-2022-47388, CVE-2022-47387, CVE-2022-47386, CVE-2022-47385, CVE-2022-47384, CVE-2022-47383, CVE-2022-47382, CVE-2022-47381, CVE-2022-47380, CVE-2022-47379, CVE-2022-47391, CVE-2022-47393, CVE-2022-47392, CVE-2022-47378

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2019-11922
(8.1 HIGH)

EPSS: 0.63%

updated 2024-04-04T01:22:10

2 posts

A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.

EUVD_Bot@mastodon.social at 2026-03-31T13:01:13.000Z ##

🚨 EUVD-2024-55511

πŸ“Š Score: n/a
πŸ“¦ Product: Sereal::Decoder
🏒 Vendor: YVES
πŸ“… Updated: 2026-03-31

πŸ“ Sereal::Decoder versions from 4.000 through 4.009_002 for Perl is vulnerable to a buffer overwrite flaw in the Zstandard library.

Sereal::Decoder embeds a version of the Zstandard (zstd) library that is vulnerable to CVE-2019-11922. This is a race condition in the o...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

EUVD_Bot@mastodon.social at 2026-03-31T13:01:11.000Z ##

🚨 EUVD-2024-55512

πŸ“Š Score: n/a
πŸ“¦ Product: Sereal::Encoder
🏒 Vendor: YVES
πŸ“… Updated: 2026-03-31

πŸ“ Sereal::Encoder versions from 4.000 through 4.009_002 for Perl is vulnerable to a buffer overwrite flaw in the Zstandard library.

Sereal::Encoder embeds a version of the Zstandard (zstd) library that is vulnerable to CVE-2019-11922. This is a race condition in the o...

πŸ”— euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

CVE-2024-3094
(10.0 CRITICAL)

EPSS: 86.06%

updated 2024-03-29T18:30:50

2 posts

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in t

Nuclei template

78 repos

https://github.com/robertdebock/ansible-role-cve_2024_3094

https://github.com/Titus-soc/-CVE-2024-3094-Vulnerability-Checker-Fixer-Public

https://github.com/Mustafa1986/CVE-2024-3094

https://github.com/Horizon-Software-Development/CVE-2024-3094

https://github.com/brinhosa/CVE-2024-3094-One-Liner

https://github.com/galacticquest/cve-2024-3094-detect

https://github.com/hackura/xz-cve-2024-3094

https://github.com/Yuma-Tsushima07/CVE-2024-3094

https://github.com/hariskhalil555000-sketch/What-utility-does-CVE-2024-3094-refer-to-

https://github.com/TheTorjanCaptain/CVE-2024-3094-Checker

https://github.com/teyhouse/CVE-2024-3094

https://github.com/24Owais/threat-intel-cve-2024-3094

https://github.com/neuralinhibitor/xzwhy

https://github.com/DANO-AMP/CVE-2024-3094

https://github.com/hackingetico21/revisaxzutils

https://github.com/amlweems/xzbot

https://github.com/M1lo25/CS50FinalProject

https://github.com/byinarie/CVE-2024-3094-info

https://github.com/wgetnz/CVE-2024-3094-check

https://github.com/weltregie/liblzma-scan

https://github.com/michalAshurov/writeup-CVE-2024-3094

https://github.com/spidygal/CVE-2024-3094-Nmap-NSE-script

https://github.com/Simplifi-ED/CVE-2024-3094-patcher

https://github.com/Ikram124/CVE-2024-3094-analysis

https://github.com/isuruwa/CVE-2024-3094

https://github.com/gensecaihq/CVE-2024-3094-Vulnerability-Checker-Fixer

https://github.com/buluma/ansible-role-cve_2024_3094

https://github.com/0xlane/xz-cve-2024-3094

https://github.com/Bella-Bc/xz-backdoor-CVE-2024-3094-Check

https://github.com/robertdebock/ansible-playbook-cve-2024-3094

https://github.com/dah4k/CVE-2024-3094

https://github.com/Security-Phoenix-demo/CVE-2024-3094-fix-exploits

https://github.com/valeriot30/cve-2024-3094

https://github.com/ScrimForever/CVE-2024-3094

https://github.com/mesutgungor/xz-backdoor-vulnerability

https://github.com/pentestfunctions/CVE-2024-3094

https://github.com/FabioBaroni/CVE-2024-3094-checker

https://github.com/emirkmo/xz-backdoor-github

https://github.com/ackemed/detectar_cve-2024-3094

https://github.com/lockness-Ko/xz-vulnerable-honeypot

https://github.com/lypd0/CVE-2024-3094-Vulnerabity-Checker

https://github.com/MagpieRYL/CVE-2024-3094-backdoor-env-container

https://github.com/ThomRgn/xzutils_backdoor_obfuscation

https://github.com/extracoding-dozen/CVE-2024-3094

https://github.com/OpensourceICTSolutions/xz_utils-CVE-2024-3094

https://github.com/badsectorlabs/ludus_xz_backdoor

https://github.com/bioless/xz_cve-2024-3094_detection

https://github.com/KaminaDuck/ansible-CVE-2024-3094

https://github.com/Juul/xz-backdoor-scan

https://github.com/shefirot/CVE-2024-3094

https://github.com/hazemkya/CVE-2024-3094-checker

https://github.com/ykhurshudyan-blip/CVE-2024-3094

https://github.com/felipecosta09/cve-2024-3094

https://github.com/harekrishnarai/xz-utils-vuln-checker

https://github.com/zpxlz/CVE-2024-3094

https://github.com/laxmikumari615/Linux---Security---Detect-and-Mitigate-CVE-2024-3094

https://github.com/mightysai1997/CVE-2024-3094

https://github.com/robertdfrench/ifuncd-up

https://github.com/BOSE122/CVE-2024-3094

https://github.com/Dermot-lab/TryHack

https://github.com/mrk336/CVE-2024-3094

https://github.com/jfrog/cve-2024-3094-tools

https://github.com/r0binak/xzk8s

https://github.com/mightysai1997/CVE-2024-3094-info

https://github.com/bsekercioglu/cve2024-3094-Checker

https://github.com/greydoubt/xz

https://github.com/iheb2b/CVE-2024-3094-Checker

https://github.com/MrBUGLF/XZ-Utils_CVE-2024-3094

https://github.com/gustavorobertux/CVE-2024-3094

https://github.com/Fractal-Tess/CVE-2024-3094

https://github.com/przemoc/xz-backdoor-links

https://github.com/AndreaCicca/Sicurezza-Informatica-Presentazione

https://github.com/devjanger/CVE-2024-3094-XZ-Backdoor-Detector

https://github.com/ashwani95/CVE-2024-3094

https://github.com/HackerHermanos/CVE-2024-3094_xz_check

https://github.com/fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-

https://github.com/encikayelwhitehat-glitch/CVE-2024-3094

https://github.com/been22426/CVE-2024-3094

thecybermind at 2026-03-30T22:19:45.189Z ##

🚨 CVE-2024-3094 proved that policy isn't protectionβ€”architecture is. Our latest forensic brief breaks down the XZ Utils backdoor and how the Ransier Sentinelβ„’ (SOC-n-a-BOXβ„’) restores trust through hardware-isolated telemetry. Read the full audit at The Cyber Mind Co. πŸ›‘οΈ

thecybermind.co/2026/03/30/%f0

##

thecybermind@infosec.exchange at 2026-03-30T22:19:45.000Z ##

🚨 CVE-2024-3094 proved that policy isn't protectionβ€”architecture is. Our latest forensic brief breaks down the XZ Utils backdoor and how the Ransier Sentinelβ„’ (SOC-n-a-BOXβ„’) restores trust through hardware-isolated telemetry. Read the full audit at The Cyber Mind Co. πŸ›‘οΈ #CyberSecurity #Sentinel

thecybermind.co/2026/03/30/%f0

##

CVE-2026-34558
(0 None)

EPSS: 0.05%

5 posts

N/A

Matchbook3469@mastodon.social at 2026-03-31T16:00:18.000Z ##

🚨 New security advisory:

CVE-2026-34558 affects multiple systems.

β€’ Impact: Remote code execution or complete system compromise possible
β€’ Risk: Attackers can gain full control of affected systems
β€’ Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #VulnerabilityManagement #CyberSec

##

offseq at 2026-03-31T09:00:29.546Z ##

⚠️ CRITICAL: CVE-2026-34558 in ci4ms (<0.31.0.0) β€” Stored DOM XSS in Methods Management lets attackers inject persistent JS into admin panels. Patch to 0.31.0.0+ ASAP! Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-31T09:00:29.000Z ##

⚠️ CRITICAL: CVE-2026-34558 in ci4ms (<0.31.0.0) β€” Stored DOM XSS in Methods Management lets attackers inject persistent JS into admin panels. Patch to 0.31.0.0+ ASAP! Details: radar.offseq.com/threat/cve-20 #OffSeq #XSS #Vuln #AppSec

##

thehackerwire@mastodon.social at 2026-03-30T22:03:01.000Z ##

πŸ”΄ CVE-2026-34558 - Critical (9.1)

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within the Me...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-30T22:01:22.000Z ##

πŸ”΄ CVE-2026-34558 - Critical (9.1)

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within the Me...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33577
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-31T15:42:04.000Z ##

πŸ”΄ CVE-2026-33577 - Critical (9.8)

OpenClaw before 2026.3.28 contains an insufficient scope validation vulnerability in the node pairing approval path that allows low-privilege operators to approve nodes with broader scopes. Attackers can exploit missing callerScopes validation in ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T15:42:04.000Z ##

πŸ”΄ CVE-2026-33577 - Critical (9.8)

OpenClaw before 2026.3.28 contains an insufficient scope validation vulnerability in the node pairing approval path that allows low-privilege operators to approve nodes with broader scopes. Attackers can exploit missing callerScopes validation in ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33576
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-31T15:41:54.000Z ##

πŸ”΄ CVE-2026-33576 - Critical (9.8)

OpenClaw before 2026.3.28 downloads and stores inbound media from Zalo channels before validating sender authorization. Unauthorized senders can force network fetches and disk writes to the media store by sending messages that are subsequently rej...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T15:41:54.000Z ##

πŸ”΄ CVE-2026-33576 - Critical (9.8)

OpenClaw before 2026.3.28 downloads and stores inbound media from Zalo channels before validating sender authorization. Unauthorized senders can force network fetches and disk writes to the media store by sending messages that are subsequently rej...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34162
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-31T15:32:47.000Z ##

πŸ”΄ CVE-2026-34162 - Critical (10)

FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, the FastGPT HTTP tools testing endpoint (/api/core/app/httpTools/runTool) is exposed without any authentication. This endpoint acts as a full HTTP proxy β€” it accepts a user-sup...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T15:32:47.000Z ##

πŸ”΄ CVE-2026-34162 - Critical (10)

FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, the FastGPT HTTP tools testing endpoint (/api/core/app/httpTools/runTool) is exposed without any authentication. This endpoint acts as a full HTTP proxy β€” it accepts a user-sup...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34163
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-31T15:32:37.000Z ##

🟠 CVE-2026-34163 - High (7.7)

FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, FastGPT's MCP (Model Context Protocol) tools endpoints (/api/core/app/mcpTools/getTools and /api/core/app/mcpTools/runTool) accept a user-supplied URL parameter and make server-s...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T15:32:37.000Z ##

🟠 CVE-2026-34163 - High (7.7)

FastGPT is an AI Agent building platform. Prior to version 4.14.9.5, FastGPT's MCP (Model Context Protocol) tools endpoints (/api/core/app/mcpTools/getTools and /api/core/app/mcpTools/runTool) accept a user-supplied URL parameter and make server-s...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21861
(0 None)

EPSS: 0.17%

4 posts

N/A

offseq at 2026-03-31T06:00:29.480Z ##

🚨 CVE-2026-21861: CRITICAL OS command injection in baserCMS < 5.2.3. Admins can execute arbitrary system commands via core update. Patch to 5.2.3+ ASAP to prevent full compromise. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-31T01:17:25.000Z ##

πŸ”΄ CVE-2026-21861 - Critical (9.1)

baserCMS is a website development framework. Prior to version 5.2.3, baserCMS contains an OS command injection vulnerability in the core update functionality. An authenticated administrator can execute arbitrary OS commands on the server due to im...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-31T06:00:29.000Z ##

🚨 CVE-2026-21861: CRITICAL OS command injection in baserCMS < 5.2.3. Admins can execute arbitrary system commands via core update. Patch to 5.2.3+ ASAP to prevent full compromise. radar.offseq.com/threat/cve-20 #OffSeq #baserCMS #CVE2026_21861 #infosec #patching

##

thehackerwire@mastodon.social at 2026-03-31T01:17:25.000Z ##

πŸ”΄ CVE-2026-21861 - Critical (9.1)

baserCMS is a website development framework. Prior to version 5.2.3, baserCMS contains an OS command injection vulnerability in the core update functionality. An authenticated administrator can execute arbitrary OS commands on the server due to im...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32714
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-31T04:06:23.000Z ##

πŸ”΄ CVE-2026-32714 - Critical (9.8)

SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the KeyCache class in scitokens was vulnerable to SQL Injection because it used Python's str.format() to construct SQL queries with user-supplied data (su...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T04:06:23.000Z ##

πŸ”΄ CVE-2026-32714 - Critical (9.8)

SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the KeyCache class in scitokens was vulnerable to SQL Injection because it used Python's str.format() to construct SQL queries with user-supplied data (su...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32716
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-31T04:01:34.000Z ##

🟠 CVE-2026-32716 - High (8.1)

SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the Enforcer incorrectly validates scope paths by using a simple prefix match (startswith). This allows a token with access to a specific path (e.g., /joh...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T04:01:34.000Z ##

🟠 CVE-2026-32716 - High (8.1)

SciTokens is a reference library for generating and using SciTokens. Prior to version 1.9.6, the Enforcer incorrectly validates scope paths by using a simple prefix match (startswith). This allows a token with access to a specific path (e.g., /joh...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34054
(0 None)

EPSS: 0.06%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-31T04:00:32.000Z ##

🟠 CVE-2026-34054 - High (7.8)

vcpkg is a free and open-source C/C++ package manager. Prior to version 3.6.1#3, vcpkg's Windows builds of OpenSSL set openssldir to a path on the build machine, making that path be attackable later on customer machines. This issue has been patche...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T04:00:32.000Z ##

🟠 CVE-2026-34054 - High (7.8)

vcpkg is a free and open-source C/C++ package manager. Prior to version 3.6.1#3, vcpkg's Windows builds of OpenSSL set openssldir to a path on the build machine, making that path be attackable later on customer machines. This issue has been patche...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30877
(0 None)

EPSS: 0.17%

6 posts

N/A

offseq at 2026-03-31T01:30:28.617Z ##

πŸ”₯ CRITICAL: CVE-2026-30877 in baserCMS (<5.2.3) enables admin users to execute arbitrary OS commands via update functionality (CWE-78). Patch to 5.2.3+ immediately! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-31T01:20:57.000Z ##

πŸ”΄ CVE-2026-30877 - Critical (9.1)

baserCMS is a website development framework. Prior to version 5.2.3, there is an OS command injection vulnerability in the update functionality. Due to this issue, an authenticated user with administrator privileges in baserCMS can execute arbitra...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T01:17:36.000Z ##

πŸ”΄ CVE-2026-30877 - Critical (9.1)

baserCMS is a website development framework. Prior to version 5.2.3, there is an OS command injection vulnerability in the update functionality. Due to this issue, an authenticated user with administrator privileges in baserCMS can execute arbitra...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-31T01:30:28.000Z ##

πŸ”₯ CRITICAL: CVE-2026-30877 in baserCMS (<5.2.3) enables admin users to execute arbitrary OS commands via update functionality (CWE-78). Patch to 5.2.3+ immediately! radar.offseq.com/threat/cve-20 #OffSeq #baserCMS #CVE202630877 #infosec

##

thehackerwire@mastodon.social at 2026-03-31T01:20:57.000Z ##

πŸ”΄ CVE-2026-30877 - Critical (9.1)

baserCMS is a website development framework. Prior to version 5.2.3, there is an OS command injection vulnerability in the update functionality. Due to this issue, an authenticated user with administrator privileges in baserCMS can execute arbitra...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-31T01:17:36.000Z ##

πŸ”΄ CVE-2026-30877 - Critical (9.1)

baserCMS is a website development framework. Prior to version 5.2.3, there is an OS command injection vulnerability in the update functionality. Due to this issue, an authenticated user with administrator privileges in baserCMS can execute arbitra...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33986
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-30T22:20:33.000Z ##

🟠 CVE-2026-33986 - High (7.5)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in yuv_ensure_buffer() in libfreerdp/codec/h264.c, h264->width and h264->height are updated before the reallocation loop. If any winpr_aligned_recalloc() cal...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-30T22:20:33.000Z ##

🟠 CVE-2026-33986 - High (7.5)

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, in yuv_ensure_buffer() in libfreerdp/codec/h264.c, h264->width and h264->height are updated before the reallocation loop. If any winpr_aligned_recalloc() cal...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34557
(0 None)

EPSS: 0.05%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-30T22:02:51.000Z ##

πŸ”΄ CVE-2026-34557 - Critical (9.1)

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within group ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-30T22:01:13.000Z ##

πŸ”΄ CVE-2026-34557 - Critical (9.1)

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within group ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31946
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-30T22:01:31.000Z ##

πŸ”΄ CVE-2026-31946 - Critical (9.8)

OpenOlat is an open source web-based e-learning platform for teaching, learning, assessment and communication. From version 10.5.4 to before version 20.2.5, OpenOLAT's OpenID Connect implicit flow implementation does not verify JWT signatures. The...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33691
(0 None)

EPSS: 0.00%

1 posts

N/A

coreruleset@infosec.exchange at 2026-03-30T21:11:35.000Z ##

πŸ”’ Security Advisory: OWASP CRS file upload extension checks could be bypassed using whitespace padding in filenames (e.g. shell. php). CVE-2026-33691, Moderate severity.
Upgrade to CRS v4.25.0 or v3.3.9.
Thanks @HackingRepo for the report!
github.com/coreruleset/corerul

##

CVE-2026-31893
(0 None)

EPSS: 0.00%

1 posts

N/A

raptor@infosec.exchange at 2026-03-30T13:23:41.000Z ##

Anyone knows anything more about this #Tunnelblick #vulnerability?

"CVE-2026-31893 describes a serious Tunnelblick vulnerability.

This vulnerability is present in all versions of all Tunnelblick versions 3.3beta26 through 9.0beta01.

Tunnelblick 8.0.1 and 9.0beta02 contain fixes for the vulnerability.

The CVE is expected to be published and this page updated on or before 2026-03-27."

tunnelblick.net/CVE-2026-31893

##

CVE-2026-33526
(0 None)

EPSS: 1.30%

1 posts

N/A

secdb@infosec.exchange at 2026-03-30T00:01:00.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-23 - 2026-03-30)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1724

Severity:
- Critical: 160
- High: 649
- Medium: 676
- Low: 49
- None: 190

Status:
- : 20
- Analyzed: 407
- Awaiting Analysis: 410
- Modified: 55
- Received: 778
- Rejected: 23
- Undergoing Analysis: 31

Top CNAs:
- GitHub, Inc.: 426
- Patchstack: 248
- VulDB: 159
- VulnCheck: 124
- kernel.org: 122
- Apple Inc.: 87
- MITRE: 74
- Mozilla Corporation: 47
- Wordfence: 46
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 33

Top Affected Products:
- UNKNOWN: 1239
- Apple Macos: 76
- Mozilla Firefox: 45
- Apple Ipados: 41
- Apple Iphone Os: 41
- Wwbn Avideo: 34
- Apple Visionos: 28
- Apple Watchos: 21
- Open-emr Openemr: 20
- Hcltech Aftermarket Cloud: 17

Top EPSS Score:
- CVE-2026-33634 - 26.61 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33526 - 1.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33478 - 1.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32854 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32748 - 0.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33515 - 0.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33396 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4611 - 0.72 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26829 - 0.69 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25630 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-32748
(0 None)

EPSS: 0.98%

1 posts

N/A

secdb@infosec.exchange at 2026-03-30T00:01:00.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-23 - 2026-03-30)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1724

Severity:
- Critical: 160
- High: 649
- Medium: 676
- Low: 49
- None: 190

Status:
- : 20
- Analyzed: 407
- Awaiting Analysis: 410
- Modified: 55
- Received: 778
- Rejected: 23
- Undergoing Analysis: 31

Top CNAs:
- GitHub, Inc.: 426
- Patchstack: 248
- VulDB: 159
- VulnCheck: 124
- kernel.org: 122
- Apple Inc.: 87
- MITRE: 74
- Mozilla Corporation: 47
- Wordfence: 46
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 33

Top Affected Products:
- UNKNOWN: 1239
- Apple Macos: 76
- Mozilla Firefox: 45
- Apple Ipados: 41
- Apple Iphone Os: 41
- Wwbn Avideo: 34
- Apple Visionos: 28
- Apple Watchos: 21
- Open-emr Openemr: 20
- Hcltech Aftermarket Cloud: 17

Top EPSS Score:
- CVE-2026-33634 - 26.61 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33526 - 1.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33478 - 1.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32854 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32748 - 0.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33515 - 0.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33396 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4611 - 0.72 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26829 - 0.69 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25630 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-33515
(0 None)

EPSS: 0.12%

1 posts

N/A

secdb@infosec.exchange at 2026-03-30T00:01:00.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-23 - 2026-03-30)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1724

Severity:
- Critical: 160
- High: 649
- Medium: 676
- Low: 49
- None: 190

Status:
- : 20
- Analyzed: 407
- Awaiting Analysis: 410
- Modified: 55
- Received: 778
- Rejected: 23
- Undergoing Analysis: 31

Top CNAs:
- GitHub, Inc.: 426
- Patchstack: 248
- VulDB: 159
- VulnCheck: 124
- kernel.org: 122
- Apple Inc.: 87
- MITRE: 74
- Mozilla Corporation: 47
- Wordfence: 46
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 33

Top Affected Products:
- UNKNOWN: 1239
- Apple Macos: 76
- Mozilla Firefox: 45
- Apple Ipados: 41
- Apple Iphone Os: 41
- Wwbn Avideo: 34
- Apple Visionos: 28
- Apple Watchos: 21
- Open-emr Openemr: 20
- Hcltech Aftermarket Cloud: 17

Top EPSS Score:
- CVE-2026-33634 - 26.61 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33526 - 1.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33478 - 1.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32854 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32748 - 0.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33515 - 0.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33396 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4611 - 0.72 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26829 - 0.69 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25630 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-32854
(0 None)

EPSS: 1.37%

1 posts

N/A

secdb@infosec.exchange at 2026-03-30T00:01:00.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-23 - 2026-03-30)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1724

Severity:
- Critical: 160
- High: 649
- Medium: 676
- Low: 49
- None: 190

Status:
- : 20
- Analyzed: 407
- Awaiting Analysis: 410
- Modified: 55
- Received: 778
- Rejected: 23
- Undergoing Analysis: 31

Top CNAs:
- GitHub, Inc.: 426
- Patchstack: 248
- VulDB: 159
- VulnCheck: 124
- kernel.org: 122
- Apple Inc.: 87
- MITRE: 74
- Mozilla Corporation: 47
- Wordfence: 46
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 33

Top Affected Products:
- UNKNOWN: 1239
- Apple Macos: 76
- Mozilla Firefox: 45
- Apple Ipados: 41
- Apple Iphone Os: 41
- Wwbn Avideo: 34
- Apple Visionos: 28
- Apple Watchos: 21
- Open-emr Openemr: 20
- Hcltech Aftermarket Cloud: 17

Top EPSS Score:
- CVE-2026-33634 - 26.61 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33526 - 1.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33478 - 1.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32854 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32748 - 0.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33515 - 0.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33396 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4611 - 0.72 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26829 - 0.69 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25630 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-33396
(0 None)

EPSS: 0.76%

1 posts

N/A

secdb@infosec.exchange at 2026-03-30T00:01:00.000Z ##

πŸ“ˆ CVE Published in last 7 days (2026-03-23 - 2026-03-30)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1724

Severity:
- Critical: 160
- High: 649
- Medium: 676
- Low: 49
- None: 190

Status:
- : 20
- Analyzed: 407
- Awaiting Analysis: 410
- Modified: 55
- Received: 778
- Rejected: 23
- Undergoing Analysis: 31

Top CNAs:
- GitHub, Inc.: 426
- Patchstack: 248
- VulDB: 159
- VulnCheck: 124
- kernel.org: 122
- Apple Inc.: 87
- MITRE: 74
- Mozilla Corporation: 47
- Wordfence: 46
- Government Technology Agency of Singapore Cyber Security Group (GovTech CSG): 33

Top Affected Products:
- UNKNOWN: 1239
- Apple Macos: 76
- Mozilla Firefox: 45
- Apple Ipados: 41
- Apple Iphone Os: 41
- Wwbn Avideo: 34
- Apple Visionos: 28
- Apple Watchos: 21
- Open-emr Openemr: 20
- Hcltech Aftermarket Cloud: 17

Top EPSS Score:
- CVE-2026-33634 - 26.61 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33526 - 1.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33478 - 1.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32854 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32748 - 0.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33515 - 0.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-33396 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4611 - 0.72 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26829 - 0.69 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25630 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-33697
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-29T01:01:50.000Z ##

🟠 CVE-2026-33697 - High (7.5)

Cocos AI is a confidential computing system for AI. The current implementation of attested TLS (aTLS) in CoCoS is vulnerable to a relay attack affecting all versions from v0.4.0 through v0.8.2. This vulnerability is present in both the AMD SEV-SNP...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites