## Updated at UTC 2026-03-26T17:52:07.604134

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-33636 7.6 0.00% 2 0 2026-03-26T17:16:41.477000 LIBPNG is a reference library for use in applications that read, create, and man
CVE-2026-33416 7.5 0.00% 2 0 2026-03-26T17:16:38.443000 LIBPNG is a reference library for use in applications that read, create, and man
CVE-2026-29785 7.5 0.07% 2 0 2026-03-26T17:13:31.983000 NATS-Server is a High-Performance server for NATS.io, a cloud and edge native me
CVE-2026-22739 8.6 0.02% 1 0 2026-03-26T17:08:56 Vulnerability in Spring Cloud when substituting the profile parameter from a req
CVE-2026-33696 10.0 0.46% 2 0 2026-03-26T16:41:02 ## Impact An authenticated user with permission to create or modify workflows co
CVE-2026-33017 9.8 6.14% 2 4 2026-03-26T15:41:23 ## Summary The `POST /api/v1/build_public_tmp/{flow_id}/flow` endpoint allows b
CVE-2026-33348 8.7 0.03% 2 0 2026-03-26T15:16:38.267000 OpenEMR is a free and open source electronic health records and medical practice
CVE-2026-20086 8.6 0.10% 2 0 2026-03-26T15:13:33.940000 A vulnerability in the processing of Control and Provisioning of Wireless Access
CVE-2026-20084 8.6 0.11% 1 0 2026-03-26T15:13:33.940000 A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allo
CVE-2026-24750 7.6 0.04% 1 0 2026-03-26T15:13:15.790000 Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior
CVE-2026-30975 8.1 0.06% 1 0 2026-03-26T15:13:15.790000 Sonarr is a PVR for Usenet and BitTorrent users. Versions prior to 4.0.16.2942 h
CVE-2026-2995 7.7 0.02% 2 0 2026-03-26T15:13:15.790000 GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 bef
CVE-2026-3988 7.5 0.04% 3 0 2026-03-26T15:13:15.790000 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5
CVE-2026-4701 9.8 0.02% 1 0 2026-03-26T14:16:13.893000 Use-after-free in the JavaScript Engine component. This vulnerability affects Fi
CVE-2026-4700 9.8 0.02% 1 0 2026-03-26T13:16:30.367000 Mitigation bypass in the Networking: HTTP component. This vulnerability affects
CVE-2026-4698 9.8 0.02% 1 0 2026-03-26T13:16:29.967000 JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability a
CVE-2026-33344 8.1 0.02% 1 0 2026-03-26T13:03:13.500000 Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0
CVE-2026-28760 7.8 0.01% 4 0 2026-03-26T09:30:33 The installer of RATOC RAID Monitoring Manager for Windows searches the current
CVE-2026-32680 7.8 0.01% 4 0 2026-03-26T09:30:33 The installer of RATOC RAID Monitoring Manager for Windows allows to customize t
CVE-2026-4840 8.8 0.15% 4 0 2026-03-26T06:30:27 A security flaw has been discovered in Netcore Power 15AX up to 3.0.0.6938. Affe
CVE-2026-2931 8.8 0.04% 2 0 2026-03-26T06:30:27 The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object
CVE-2026-4484 9.8 0.04% 2 0 2026-03-26T03:30:34 The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in
CVE-2026-4758 8.8 0.25% 2 0 2026-03-26T00:31:03 The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion
CVE-2026-24151 7.8 0.05% 1 0 2026-03-25T21:57:49.383000 NVIDIA Megatron-LM contains a vulnerability in inferencing where an Attacker may
CVE-2026-24152 7.8 0.05% 1 0 2026-03-25T21:56:52.887000 NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attac
CVE-2026-32537 7.5 0.11% 1 0 2026-03-25T21:31:39 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-25447 9.1 0.04% 2 0 2026-03-25T21:31:39 Improper Control of Generation of Code ('Code Injection') vulnerability in Jonat
CVE-2026-32546 7.5 0.03% 2 0 2026-03-25T21:31:39 Missing Authorization vulnerability in StellarWP Restrict Content restrict-conte
CVE-2026-25001 8.6 0.05% 1 0 2026-03-25T21:31:38 Improper Control of Generation of Code ('Code Injection') vulnerability in Saad
CVE-2026-32573 9.1 0.04% 3 0 2026-03-25T21:30:36 Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio
CVE-2026-32531 8.1 0.11% 1 0 2026-03-25T21:30:36 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-32534 8.5 0.03% 1 0 2026-03-25T21:30:36 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-32539 9.3 0.03% 1 0 2026-03-25T21:30:36 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-25366 10.0 0.05% 2 0 2026-03-25T21:30:35 Improper Control of Generation of Code ('Code Injection') vulnerability in Theme
CVE-2026-32513 8.8 0.05% 1 0 2026-03-25T21:30:35 Deserialization of Untrusted Data vulnerability in Miguel Useche JS Archive List
CVE-2026-27044 10.0 0.05% 2 0 2026-03-25T21:30:35 Improper Control of Generation of Code ('Code Injection') vulnerability in Total
CVE-2026-4719 7.5 0.01% 1 0 2026-03-25T21:30:28 Incorrect boundary conditions in the Graphics: Text component. This vulnerabilit
CVE-2026-4705 9.8 0.02% 1 0 2026-03-25T21:30:27 Undefined behavior in the WebRTC: Signaling component. This vulnerability affect
CVE-2026-4704 7.5 0.01% 1 0 2026-03-25T21:30:27 Denial-of-service in the WebRTC: Signaling component. This vulnerability affects
CVE-2026-33680 7.5 0.03% 1 0 2026-03-25T21:18:09 ## Summary The `LinkSharing.ReadAll()` method allows link share authenticated u
CVE-2026-33678 8.1 0.03% 2 0 2026-03-25T21:17:43 ## Summary `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id
CVE-2026-32538 7.5 0.03% 1 0 2026-03-25T21:16:46.347000 Insertion of Sensitive Information Into Sent Data vulnerability in Noor Alam SMT
CVE-2026-32536 9.9 0.04% 1 0 2026-03-25T21:16:45.867000 Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green
CVE-2026-33660 10.0 0.11% 2 0 2026-03-25T21:07:45 ## Impact An authenticated user with permission to create or modify workflows co
CVE-2026-33310 8.8 0.05% 1 0 2026-03-25T20:54:34.937000 Intake is a package for finding, investigating, loading and disseminating data.
CVE-2026-33316 8.1 0.03% 2 0 2026-03-25T20:53:33 ### Summary A flaw in Vikunja’s password reset logic allows disabled users to r
CVE-2026-29839 8.8 0.01% 1 0 2026-03-25T20:53:05.983000 DedeCMS v5.7.118 was discovered to contain a Cross-Site Request Forgery (CSRF) v
CVE-2026-33211 9.6 0.02% 2 0 2026-03-25T20:48:05 ### Summary The Tekton Pipelines git resolver is vulnerable to path traversal v
CVE-2026-4716 9.1 0.02% 1 0 2026-03-25T20:16:37.020000 Incorrect boundary conditions, uninitialized memory in the JavaScript Engine com
CVE-2026-4715 9.1 0.02% 1 0 2026-03-25T20:16:36.837000 Uninitialized memory in the Graphics: Canvas2D component. This vulnerability aff
CVE-2026-32525 9.9 0.05% 1 0 2026-03-25T20:16:30.967000 Improper Control of Generation of Code ('Code Injection') vulnerability in jetmo
CVE-2026-20687 7.1 0.01% 1 1 2026-03-25T20:07:15.087000 A use after free issue was addressed with improved memory management. This issue
CVE-2026-4712 7.5 0.01% 1 0 2026-03-25T19:16:52.517000 Information disclosure in the Widget: Cocoa component. This vulnerability affect
CVE-2026-3857 8.1 0.01% 3 0 2026-03-25T18:32:07 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10
CVE-2026-20012 8.6 0.10% 2 0 2026-03-25T18:31:51 A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco
CVE-2026-20125 7.7 0.14% 1 0 2026-03-25T18:31:51 A vulnerability in the HTTP Server feature of Cisco IOS Software and Cisco IOS X
CVE-2026-26832 9.8 0.19% 1 1 2026-03-25T18:31:51 node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tessera
CVE-2026-3608 7.5 0.02% 1 0 2026-03-25T18:16:32.853000 Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea-
CVE-2026-33287 7.5 0.04% 2 0 2026-03-25T17:44:24 ### Summary The `replace_first` filter in LiquidJS uses JavaScript's `String.pro
CVE-2026-33285 7.5 0.04% 2 0 2026-03-25T17:40:53 ### Summary LiquidJS's `memoryLimit` security mechanism can be completely bypas
CVE-2026-20131 10.0 0.65% 5 3 2026-03-25T17:39:46.247000 A vulnerability in the web-based management interface of Cisco Secure Firewall M
CVE-2026-33286 9.1 0.04% 1 0 2026-03-25T17:18:23.687000 Graphiti is a framework that sits on top of models and exposes them via a JSON:A
CVE-2026-4711 9.8 0.02% 1 0 2026-03-25T17:17:10.257000 Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefo
CVE-2026-27889 7.5 0.07% 1 0 2026-03-25T17:07:53 ### Background NATS.io is a high performance open source pub-sub distributed co
CVE-2025-71275 0 0.00% 1 0 2026-03-25T16:16:08.033000 Rejected reason: This CVE was rejected due to being a duplicate of CVE-2024-4551
CVE-2025-32991 9.0 0.21% 2 0 2026-03-25T16:16:07.650000 In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful AP
CVE-2026-2417 0 0.10% 1 0 2026-03-25T15:41:58.280000 A Missing Authentication for Critical Function vulnerability in Pharos Controls
CVE-2025-33244 9.0 0.03% 2 0 2026-03-25T15:41:58.280000 NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker co
CVE-2026-24157 7.8 0.12% 1 0 2026-03-25T15:41:58.280000 NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an at
CVE-2026-24159 7.8 0.12% 1 0 2026-03-25T15:41:58.280000 NVIDIA NeMo Framework contains a vulnerability where an attacker may cause remot
CVE-2026-33509 7.5 0.06% 1 0 2026-03-25T15:41:58.280000 pyLoad is a free and open-source download manager written in Python. From versio
CVE-2026-33399 7.7 0.03% 1 0 2026-03-25T15:41:58.280000 Wallos is an open-source, self-hostable personal subscription tracker. Prior to
CVE-2026-2072 8.2 0.04% 1 0 2026-03-25T15:41:33.977000 Cross-Site Scripting vulnerability in Hitachi Infrastructure Analytics Advisor (
CVE-2026-28877 0 0.02% 1 0 2026-03-25T15:41:33.977000 An authorization issue was addressed with improved state management. This issue
CVE-2026-28864 3.3 0.01% 1 0 2026-03-25T15:32:30 This issue was addressed with improved permissions checking. This issue is fixed
CVE-2026-3104 7.5 0.03% 2 0 2026-03-25T15:31:37 A specially crafted domain can be used to cause a memory leak in a BIND resolver
CVE-2026-26830 9.8 0.25% 2 2 2026-03-25T15:31:37 pdf-image (npm package) through version 2.0.0 allows OS command injection via th
CVE-2026-1519 7.5 0.04% 2 0 2026-03-25T15:31:36 If a BIND resolver is performing DNSSEC validation and encounters a maliciously
CVE-2026-2343 5.3 0.03% 1 0 2026-03-25T15:31:30 The PeproDev Ultimate Invoice WordPress plugin through 2.2.5 has a bulk download
CVE-2026-33634 0 0.07% 2 1 2026-03-25T15:16:49.230000 Trivy is a security scanner. On March 19, 2026, a threat actor used compromised
CVE-2026-3909 8.8 4.44% 1 0 2026-03-25T14:05:38.743000 Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a re
CVE-2026-26306 7.8 0.02% 1 0 2026-03-25T06:30:35 The installer for OM Workspace (Windows Edition) Ver 2.4 and earlier insecurely
CVE-2026-33218 7.5 0.12% 2 0 2026-03-24T21:45:30 ### Background NATS.io is a high performance open source pub-sub distributed co
CVE-2026-33216 8.6 0.03% 2 0 2026-03-24T21:42:11 ### Background NATS.io is a high performance open source pub-sub distributed co
CVE-2026-4725 10.0 0.01% 1 0 2026-03-24T21:32:29 Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This v
CVE-2026-4723 9.8 0.01% 1 0 2026-03-24T21:32:29 Use-after-free in the JavaScript Engine component. This vulnerability affects Fi
CVE-2026-4717 9.8 0.02% 1 0 2026-03-24T21:32:28 Privilege escalation in the Netmonitor component. This vulnerability affects Fir
CVE-2026-4714 7.5 0.01% 1 0 2026-03-24T21:32:28 Incorrect boundary conditions in the Audio/Video component. This vulnerability a
CVE-2026-4713 7.5 0.01% 1 0 2026-03-24T21:32:28 Incorrect boundary conditions in the Graphics component. This vulnerability affe
CVE-2026-30653 7.5 0.18% 1 0 2026-03-24T21:32:28 An issue in Free5GC v.4.2.0 and before allows a remote attacker to cause a denia
CVE-2025-33254 7.5 0.03% 1 0 2026-03-24T21:31:36 NVIDIA Triton Inference Server contains a vulnerability where an attacker may ca
CVE-2025-33248 7.8 0.05% 1 0 2026-03-24T21:31:35 NVIDIA Megatron-LM contains a vulnerability in the hybrid conversion script wher
CVE-2025-33247 7.8 0.24% 1 0 2026-03-24T21:31:35 NVIDIA Megatron LM contains a vulnerability in quantization configuration loadin
CVE-2025-33238 7.5 0.03% 1 0 2026-03-24T21:31:35 NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability wh
CVE-2026-24158 7.5 0.04% 1 0 2026-03-24T21:31:35 NVIDIA Triton Inference Server contains a vulnerability in the HTTP endpoint whe
CVE-2026-24150 7.8 0.05% 1 0 2026-03-24T21:31:35 NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attac
CVE-2026-24141 7.8 0.06% 1 0 2026-03-24T21:31:35 NVIDIA Model Optimizer for Windows and Linux contains a vulnerability in the ONN
CVE-2026-22559 8.8 0.07% 1 0 2026-03-24T21:31:35 An Improper Input Validation vulnerability in UniFi Network Server may allow una
CVE-2026-4702 9.8 0.02% 1 0 2026-03-24T21:31:22 JIT miscompilation in the JavaScript Engine component. This vulnerability affect
CVE-2026-4722 8.8 0.02% 1 0 2026-03-24T21:16:34.063000 Privilege escalation in the IPC component. This vulnerability affects Firefox <
CVE-2026-33554 7.5 0.04% 1 0 2026-03-24T20:16:30.357000 ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response
CVE-2026-33242 7.5 0.01% 1 0 2026-03-24T19:37:42.130000 Salvo is a Rust web framework. Versions 0.39.0 through 0.89.2 have a Path Traver
CVE-2026-33497 7.5 0.01% 1 0 2026-03-24T19:20:25.140000 Langflow is a tool for building and deploying AI-powered agents and workflows. P
CVE-2026-33484 7.5 0.02% 1 0 2026-03-24T19:20:13.567000 Langflow is a tool for building and deploying AI-powered agents and workflows. I
CVE-2026-33418 7.5 0.04% 1 0 2026-03-24T19:19:48.480000 DiceBear is an avatar library for designers and developers. Prior to version 9.4
CVE-2026-4679 8.8 0.08% 1 0 2026-03-24T18:31:34 Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a rem
CVE-2026-4675 8.8 0.07% 1 0 2026-03-24T18:31:34 Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a
CVE-2026-4678 8.8 0.11% 1 0 2026-03-24T17:50:27.517000 Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remo
CVE-2026-4680 8.8 0.13% 1 0 2026-03-24T17:50:13.317000 Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remot
CVE-2026-4673 8.8 0.07% 2 0 2026-03-24T16:54:37.343000 Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowe
CVE-2026-4674 8.8 0.08% 2 0 2026-03-24T16:53:14.987000 Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a rem
CVE-2026-4676 8.8 0.11% 1 0 2026-03-24T16:50:03.117000 Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote
CVE-2026-33056 6.5 0.01% 2 0 2026-03-24T16:17:11.623000 tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and
CVE-2026-3055 0 0.02% 5 0 2026-03-24T15:54:09.400000 Insufficient input validation in NetScaler ADC and NetScaler Gateway when config
CVE-2025-15605 0 0.01% 2 0 2026-03-24T15:54:09.400000 A hardcoded cryptographic key within the configuration mechanism on TP-Link Arch
CVE-2026-4368 0 0.02% 2 0 2026-03-24T15:54:09.400000 Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configur
CVE-2026-4681 0 0.38% 1 0 2026-03-24T15:53:48.067000 A critical remote code execution (RCE) vulnerability has been reported in PTC Wi
CVE-2026-27651 7.5 0.03% 2 0 2026-03-24T15:53:48.067000 When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open
CVE-2026-27654 8.2 0.02% 1 0 2026-03-24T15:53:48.067000 NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module
CVE-2026-4739 0 0.04% 2 0 2026-03-24T15:53:48.067000 Integer Overflow or Wraparound vulnerability in InsightSoftwareConsortium ITK (‎
CVE-2025-41660 8.8 0.21% 1 0 2026-03-24T15:53:48.067000 A low-privileged remote attacker may be able to replace the boot application of
CVE-2026-4755 9.8 0.06% 1 0 2026-03-24T15:53:48.067000 CWE-20 vulnerability in MolotovCherry Android-ImageMagick7.This issue affects An
CVE-2026-4746 0 0.04% 1 0 2026-03-24T15:53:48.067000 Out-of-bounds Write vulnerability in timeplus-io proton (base/poco/Foundation/sr
CVE-2026-4662 7.5 0.08% 1 0 2026-03-24T15:53:48.067000 The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listi
CVE-2026-33298 7.8 0.04% 2 0 2026-03-24T15:53:48.067000 llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an int
CVE-2026-27784 7.8 0.01% 2 0 2026-03-24T15:30:36 The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_ht
CVE-2026-32647 7.8 0.01% 2 0 2026-03-24T15:30:36 NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module
CVE-2026-4775 7.8 0.06% 1 0 2026-03-24T15:30:36 A flaw was found in the libtiff library. A remote attacker could exploit a signe
CVE-2026-3509 7.5 0.08% 1 0 2026-03-24T09:30:41 An unauthenticated remote attacker may be able to control the format string of m
CVE-2026-4745 None 0.05% 1 0 2026-03-24T06:31:25 Improper Control of Generation of Code ('Code Injection') vulnerability in dendi
CVE-2026-4753 9.1 0.04% 1 0 2026-03-24T06:31:25 Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects Re
CVE-2026-4750 9.1 0.04% 1 0 2026-03-24T06:31:25 Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof
CVE-2026-4640 7.5 0.07% 1 0 2026-03-24T06:31:25 Vitals ESP developed by Galaxy Software Services has a Missing Authentication vu
CVE-2026-4283 9.1 0.10% 2 0 2026-03-24T06:31:20 The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized acc
CVE-2026-4639 8.8 0.10% 2 0 2026-03-24T06:31:14 Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization v
CVE-2026-4744 None 0.01% 1 0 2026-03-24T06:31:14 Out-of-bounds Read vulnerability in rizonesoft Notepad3 (‎scintilla/oniguruma/sr
CVE-2026-4677 8.8 0.07% 1 0 2026-03-24T03:31:25 Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.16
CVE-2025-15517 None 0.04% 2 0 2026-03-23T18:30:39 A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210
CVE-2026-32746 9.8 0.03% 3 5 2026-03-23T15:31:40 telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMO
CVE-2025-31277 8.8 0.27% 1 0 2026-03-20T18:53:35.083000 The issue was addressed with improved memory handling. This issue is fixed in Sa
CVE-2025-43520 5.5 0.47% 8 0 2026-03-20T18:32:19 A memory corruption issue was addressed with improved memory handling. This issu
CVE-2026-33331 8.2 0.01% 1 0 2026-03-20T17:25:56 A Stored Cross-Site Scripting (XSS) vulnerability exists in the OpenAPI document
CVE-2026-21992 9.8 0.06% 1 0 2026-03-20T15:32:14 Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware
CVE-2026-3888 7.8 0.01% 1 5 2026-03-18T04:17:30.720000 Local privilege escalation in snapd on Linux allows local attackers to get root
CVE-2026-32116 8.1 0.08% 1 0 2026-03-16T18:02:21.613000 Magic Wormhole makes it possible to get arbitrary-sized files and directories fr
CVE-2026-26123 5.5 0.05% 2 0 2026-03-10T21:32:18 Cwe is not in rca categories in Microsoft Authenticator allows an unauthorized a
CVE-2026-27598 6.5 0.11% 1 0 2026-02-25T20:23:36.483000 Dagu is a workflow engine with a built-in Web user interface. In versions up to
CVE-2026-27210 None 0.03% 1 0 2026-02-23T22:27:55 ### Impact The hot spot `attributes` configuration property allowed any attribut
CVE-2025-43529 8.8 0.17% 1 8 2025-12-17T21:31:01 A use-after-free issue was addressed with improved memory management. This issue
CVE-2025-24201 7.1 0.10% 1 3 2025-11-13T21:31:15 An out-of-bounds write issue was addressed with improved checks to prevent unaut
CVE-2023-38606 5.5 0.12% 2 0 2025-10-31T14:43:10.643000 This issue was addressed with improved state management. This issue is fixed in
CVE-2023-32434 7.8 61.25% 4 2 2025-10-23T18:48:05.013000 An integer overflow was addressed with improved input validation. This issue is
CVE-2026-3650 0 0.00% 2 0 N/A
CVE-2026-15518 0 0.00% 4 0 N/A
CVE-2026-15519 0 0.00% 4 0 N/A
CVE-2026-33526 0 1.98% 2 0 N/A
CVE-2026-33918 0 0.03% 4 0 N/A
CVE-2026-33917 0 0.03% 4 1 N/A
CVE-2026-33932 0 0.03% 2 0 N/A
CVE-2026-34056 0 0.03% 2 0 N/A
CVE-2026-34055 0 0.03% 2 0 N/A
CVE-2026-23514 0 0.04% 2 0 N/A
CVE-2026-29187 0 0.02% 4 1 N/A
CVE-2026-33913 0 0.03% 2 0 N/A
CVE-2026-32628 0 0.03% 1 0 N/A
CVE-2026-30976 0 0.06% 1 0 N/A
CVE-2026-33656 0 0.00% 1 1 N/A
CVE-2026-28373 0 0.00% 1 0 N/A
CVE-2026-33870 0 0.00% 1 0 N/A
CVE-2026-33871 0 0.00% 1 0 N/A
CVE-2026-33329 0 0.07% 1 0 N/A
CVE-2026-33340 0 0.04% 1 0 N/A
CVE-2026-30840 0 0.05% 1 0 N/A
CVE-2026-30839 0 0.03% 1 0 N/A
CVE-2026-33307 0 0.03% 1 0 N/A
CVE-2026-33250 0 0.21% 1 0 N/A

CVE-2026-33636
(7.6 HIGH)

EPSS: 0.00%

updated 2026-03-26T17:16:41.477000

2 posts

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write exists in libpng's ARM/AArch64 Neon-optimized palette expansion path. When expanding 8-bit paletted rows to RGB or RGBA, the Neon loop processes a final partial chunk without verifying that eno

harrysintonen at 2026-03-26T16:00:58.090Z ##

1.6.56 fixes two high-severity vulnerabilities: CVE-2026-33416 and CVE-2026-33636.

Out of these CVE-2026-33416: Use-after-free via pointer aliasing in png_set_tRNS and png_set_PLTE is particularly serious as arbitrary code execution has been demonstrated. Applications that call png_free_data() to release memory between png_read_info() and png_read_update_info() are affected.

github.com/pnggroup/libpng/sec

The second vulnerability CVE-2026-33636: Out-of-bounds read/write in the palette expansion on ARM Neon is of more limited concern as only crashes has been demonstrated. More serious impacts have not been ruled out, however.

github.com/pnggroup/libpng/sec

##

harrysintonen@infosec.exchange at 2026-03-26T16:00:58.000Z ##

#libpng 1.6.56 fixes two high-severity vulnerabilities: CVE-2026-33416 and CVE-2026-33636.

Out of these CVE-2026-33416: Use-after-free via pointer aliasing in png_set_tRNS and png_set_PLTE is particularly serious as arbitrary code execution has been demonstrated. Applications that call png_free_data() to release memory between png_read_info() and png_read_update_info() are affected.

github.com/pnggroup/libpng/sec

The second vulnerability CVE-2026-33636: Out-of-bounds read/write in the palette expansion on ARM Neon is of more limited concern as only crashes has been demonstrated. More serious impacts have not been ruled out, however.

github.com/pnggroup/libpng/sec

#infosec #cybersecurity #CVE_2026_33416 #CVE_2026_33636

##

CVE-2026-33416
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-26T17:16:38.443000

2 posts

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE` each alias a heap-allocated buffer between `png_struct` and `png_info`, sharing a single allocation across two structs with independent lifetimes. The `trans_alpha` aliasing has been present s

harrysintonen at 2026-03-26T16:00:58.090Z ##

1.6.56 fixes two high-severity vulnerabilities: CVE-2026-33416 and CVE-2026-33636.

Out of these CVE-2026-33416: Use-after-free via pointer aliasing in png_set_tRNS and png_set_PLTE is particularly serious as arbitrary code execution has been demonstrated. Applications that call png_free_data() to release memory between png_read_info() and png_read_update_info() are affected.

github.com/pnggroup/libpng/sec

The second vulnerability CVE-2026-33636: Out-of-bounds read/write in the palette expansion on ARM Neon is of more limited concern as only crashes has been demonstrated. More serious impacts have not been ruled out, however.

github.com/pnggroup/libpng/sec

##

harrysintonen@infosec.exchange at 2026-03-26T16:00:58.000Z ##

#libpng 1.6.56 fixes two high-severity vulnerabilities: CVE-2026-33416 and CVE-2026-33636.

Out of these CVE-2026-33416: Use-after-free via pointer aliasing in png_set_tRNS and png_set_PLTE is particularly serious as arbitrary code execution has been demonstrated. Applications that call png_free_data() to release memory between png_read_info() and png_read_update_info() are affected.

github.com/pnggroup/libpng/sec

The second vulnerability CVE-2026-33636: Out-of-bounds read/write in the palette expansion on ARM Neon is of more limited concern as only crashes has been demonstrated. More serious impacts have not been ruled out, however.

github.com/pnggroup/libpng/sec

#infosec #cybersecurity #CVE_2026_33416 #CVE_2026_33636

##

CVE-2026-29785
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-26T17:13:31.983000

2 posts

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash the nats-server by triggering a panic. This happens pre-authentication and requires that compression be enabled (which it is, by default, when leafnodes

thehackerwire@mastodon.social at 2026-03-25T20:21:39.000Z ##

🟠 CVE-2026-29785 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:20:55.000Z ##

🟠 CVE-2026-29785 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.14 and 2.12.5, if the nats-server has the "leafnode" configuration enabled (not default), then anyone who can connect can crash ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22739
(8.6 HIGH)

EPSS: 0.02%

updated 2026-03-26T17:08:56

1 posts

Vulnerability in Spring Cloud when substituting the profile parameter from a request made to the Spring Cloud Config Server configured to the native file system as a backend, because it was possible to access files outside of the configured search directories.This issue affects Spring Cloud: from 3.1.X before 3.1.13, from 4.1.X before 4.1.9, from 4.2.X before 4.2.3, from 4.3.X before 4.3.2, from 5

thehackerwire@mastodon.social at 2026-03-24T01:30:39.000Z ##

🟠 CVE-2026-22739 - High (8.6)

Vulnerability in Spring Cloud when substituting the profile parameter from a request made to the Spring Cloud Config Server configured to the native file system as a backend, because it was possible to access files outside of the configured search...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33696
(10.0 CRITICAL)

EPSS: 0.46%

updated 2026-03-26T16:41:02

2 posts

## Impact An authenticated user with permission to create or modify workflows could exploit a prototype pollution vulnerability in the GSuiteAdmin node. By supplying a crafted parameter as part of node configuration, an attacker could write attacker-controlled values onto `Object.prototype`. An attacker could use this prototype pollution to achieve remote code execution on the n8n instance. ## Pa

offseq at 2026-03-26T00:00:42.821Z ##

🚩 CRITICAL: CVE-2026-33696 in n8n-io n8n (CVSS 9.4) - Prototype pollution enables remote code execution via XML/GSuiteAdmin nodes. Patch to 2.14.1, 2.13.3, or 1.123.27+. Restrict permissions & disable XML node as temp fix. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-26T00:00:42.000Z ##

🚩 CRITICAL: CVE-2026-33696 in n8n-io n8n (CVSS 9.4) - Prototype pollution enables remote code execution via XML/GSuiteAdmin nodes. Patch to 2.14.1, 2.13.3, or 1.123.27+. Restrict permissions & disable XML node as temp fix. radar.offseq.com/threat/cve-20 #OffSeq #n8n #CVE2026_33696

##

CVE-2026-33017
(9.8 CRITICAL)

EPSS: 6.14%

updated 2026-03-26T15:41:23

2 posts

## Summary The `POST /api/v1/build_public_tmp/{flow_id}/flow` endpoint allows building public flows without requiring authentication. When the optional `data` parameter is supplied, the endpoint uses **attacker-controlled flow data** (containing arbitrary Python code in node definitions) instead of the stored flow data from the database. This code is passed to `exec()` with zero sandboxing, resul

4 repos

https://github.com/rootdirective-sec/CVE-2026-33017-Lab

https://github.com/omer-efe-curkus/CVE-2026-33017-Langflow-RCE-PoC

https://github.com/MaxMnMl/langflow-CVE-2026-33017-poc

https://github.com/SimoesCTT/Sovereign-Echo-33017

CVE-2026-33348
(8.7 HIGH)

EPSS: 0.03%

updated 2026-03-26T15:16:38.267000

2 posts

OpenEMR is a free and open source electronic health records and medical practice management application. Users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form are displayed on the encounter page and in the visit history for the users with the same role. Versions prior to 8.0.0.3 have a stored cross-site scripting (XSS) vulnerability in t

thehackerwire@mastodon.social at 2026-03-25T23:20:35.000Z ##

🟠 CVE-2026-33348 - High (8.7)

OpenEMR is a free and open source electronic health records and medical practice management application. Users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form are displayed on the en...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:20:35.000Z ##

🟠 CVE-2026-33348 - High (8.7)

OpenEMR is a free and open source electronic health records and medical practice management application. Users with the `Notes - my encounters` role can fill Eye Exam forms in patient encounters. The answers to the form are displayed on the en...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20086
(8.6 HIGH)

EPSS: 0.10%

updated 2026-03-26T15:13:33.940000

2 posts

A vulnerability in the processing of Control and Provisioning of Wireless Access Points (CAPWAP) packets of Cisco IOS XE Wireless Controller Software for the Catalyst CW9800 Family could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of a malformed CAPWAP packet. An attacker could explo

thehackerwire@mastodon.social at 2026-03-25T23:00:24.000Z ##

🟠 CVE-2026-20086 - High (8.6)

A vulnerability in the processing of Control and Provisioning of Wireless Access Points (CAPWAP) packets of Cisco IOS XE Wireless Controller Software for the Catalyst CW9800 Family could allow an unauthenticated, remote attacker to cause a denial ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:00:24.000Z ##

🟠 CVE-2026-20086 - High (8.6)

A vulnerability in the processing of Control and Provisioning of Wireless Access Points (CAPWAP) packets of Cisco IOS XE Wireless Controller Software for the Catalyst CW9800 Family could allow an unauthenticated, remote attacker to cause a denial ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20084
(8.6 HIGH)

EPSS: 0.11%

updated 2026-03-26T15:13:33.940000

1 posts

A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause BOOTP packets to be forwarded between VLANs, resulting in a denial of service (DoS) condition. This vulnerability is due to improper handling of BOOTP packets on Cisco Catalyst 9000 Series Switches. An attacker could exploit this vulnerability by sending BOOTP request

thehackerwire@mastodon.social at 2026-03-25T22:00:41.000Z ##

🟠 CVE-2026-20084 - High (8.6)

A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause BOOTP packets to be forwarded between VLANs, resulting in a denial of service (DoS) condition.

This vulnerability is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24750
(7.6 HIGH)

EPSS: 0.04%

updated 2026-03-26T15:13:15.790000

1 posts

Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior to version 9.2.1, an authenticated attacker could exploit an Improper Neutralization of Input During Web Page Generation as Stored XSS when modifying forms. Upgrade Kiteworks to version 9.2.1 or later to receive a patch.

thehackerwire@mastodon.social at 2026-03-25T22:00:21.000Z ##

🟠 CVE-2026-24750 - High (7.6)

Kiteworks is a private data network (PDN). In Kiteworks Secure Data Forms prior to version 9.2.1, an authenticated attacker could exploit an Improper Neutralization of Input During Web Page Generation as Stored XSS when modifying forms. Upgrade Ki...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30975
(8.1 HIGH)

EPSS: 0.06%

updated 2026-03-26T15:13:15.790000

1 posts

Sonarr is a PVR for Usenet and BitTorrent users. Versions prior to 4.0.16.2942 have an authentication bypass that affected users that had disabled authentication for local addresses (Authentication Required set to: `Disabled for Local Addresses`) without a reverse proxy running in front of Sonarr that didn't not pass through the invalid header. Patches are available in version 4.0.16.2942 in the n

thehackerwire@mastodon.social at 2026-03-25T21:40:35.000Z ##

🟠 CVE-2026-30975 - High (8.1)

Sonarr is a PVR for Usenet and BitTorrent users. Versions prior to 4.0.16.2942 have an authentication bypass that affected users that had disabled authentication for local addresses (Authentication Required set to: `Disabled for Local Addresses`) ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2995
(7.7 HIGH)

EPSS: 0.02%

updated 2026-03-26T15:13:15.790000

2 posts

GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper sanitization of HTML content.

thehackerwire@mastodon.social at 2026-03-25T21:02:24.000Z ##

🟠 CVE-2026-2995 - High (7.7)

GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:59:57.000Z ##

🟠 CVE-2026-2995 - High (7.7)

GitLab has remediated an issue in GitLab EE affecting all versions from 15.4 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an authenticated user to add email addresses to targeted user accounts due to improper...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3988
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-26T15:13:15.790000

3 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance unresponsive due to improper input validation in GraphQL request processing.

thehackerwire@mastodon.social at 2026-03-25T20:43:51.000Z ##

🟠 CVE-2026-3988 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:42:22.000Z ##

🟠 CVE-2026-3988 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:21:17.000Z ##

🟠 CVE-2026-3988 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.5 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to cause a denial of service by making the GitLab instance ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4701
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-26T14:16:13.893000

1 posts

Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

thehackerwire@mastodon.social at 2026-03-24T23:02:23.000Z ##

🔴 CVE-2026-4701 - Critical (9.8)

Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4700
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-26T13:16:30.367000

1 posts

Mitigation bypass in the Networking: HTTP component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

thehackerwire@mastodon.social at 2026-03-24T23:00:21.000Z ##

🔴 CVE-2026-4700 - Critical (9.8)

Mitigation bypass in the Networking: HTTP component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4698
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-26T13:16:29.967000

1 posts

JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

Matchbook3469@mastodon.social at 2026-03-26T15:51:58.000Z ##

🔴 New security advisory:

CVE-2026-4698 affects Mozilla Firefox.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

CVE-2026-33344
(8.1 HIGH)

EPSS: 0.02%

updated 2026-03-26T13:03:13.500000

1 posts

Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0 to before version 2.3.1, the fix for CVE-2026-27598 added ValidateDAGName to CreateNewDAG and rewrote generateFilePath to use filepath.Base. This patched the CREATE path. The remaining API endpoints - GET, DELETE, RENAME, EXECUTE - all pass the {fileName} URL path parameter to locateDAG without calling ValidateDAGName

thehackerwire@mastodon.social at 2026-03-24T20:29:21.000Z ##

🟠 CVE-2026-33344 - High (8.1)

Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0 to before version 2.3.1, the fix for CVE-2026-27598 added ValidateDAGName to CreateNewDAG and rewrote generateFilePath to use filepath.Base. This patched the CREATE p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28760
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-26T09:30:33

4 posts

The installer of RATOC RAID Monitoring Manager for Windows searches the current directory to load certain DLLs. If a user is directed to place a crafted DLL with the installer, an arbitrary code may be executed with the administrator privilege.

offseq at 2026-03-26T09:00:28.307Z ##

🛡️ HIGH-severity: CVE-2026-28760 in RATOC RAID Monitoring Manager for Windows (<2.00.009.260220) allows DLL hijacking — local attackers may run code as admin. Patch ASAP, restrict installer access, and audit installs. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-26T07:19:31.000Z ##

🟠 CVE-2026-28760 - High (7.8)

The installer of RATOC RAID Monitoring Manager for Windows searches the current directory to load certain DLLs. If a user is directed to place a crafted DLL with the installer, an arbitrary code may be executed with the administrator privilege.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-26T09:00:28.000Z ##

🛡️ HIGH-severity: CVE-2026-28760 in RATOC RAID Monitoring Manager for Windows (<2.00.009.260220) allows DLL hijacking — local attackers may run code as admin. Patch ASAP, restrict installer access, and audit installs. radar.offseq.com/threat/cve-20 #OffSeq #infosec #vuln #windows

##

thehackerwire@mastodon.social at 2026-03-26T07:19:31.000Z ##

🟠 CVE-2026-28760 - High (7.8)

The installer of RATOC RAID Monitoring Manager for Windows searches the current directory to load certain DLLs. If a user is directed to place a crafted DLL with the installer, an arbitrary code may be executed with the administrator privilege.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32680
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-26T09:30:33

4 posts

The installer of RATOC RAID Monitoring Manager for Windows allows to customize the installation folder. If the installation folder is customized to some non-default one, the folder may be left with un-secure ACLs and non-administrative users can alter contents of that folder. It may allow a non-administrative user to execute an arbitrary code with SYSTEM privilege.

offseq at 2026-03-26T07:30:29.173Z ##

HIGH severity alert: RATOC RAID Monitoring Manager for Windows (<2.00.009.260220) can leave custom install folders with insecure ACLs, letting non-admins run code as SYSTEM. Check permissions & update! CVE-2026-32680 radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-26T07:19:40.000Z ##

🟠 CVE-2026-32680 - High (7.8)

The installer of RATOC RAID Monitoring Manager for Windows allows to customize the installation folder. If the installation folder is customized to some non-default one, the folder may be left with un-secure ACLs and non-administrative users can a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-26T07:30:29.000Z ##

HIGH severity alert: RATOC RAID Monitoring Manager for Windows (<2.00.009.260220) can leave custom install folders with insecure ACLs, letting non-admins run code as SYSTEM. Check permissions & update! CVE-2026-32680 radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Windows #SysAdmin

##

thehackerwire@mastodon.social at 2026-03-26T07:19:40.000Z ##

🟠 CVE-2026-32680 - High (7.8)

The installer of RATOC RAID Monitoring Manager for Windows allows to customize the installation folder. If the installation folder is customized to some non-default one, the folder may be left with un-secure ACLs and non-administrative users can a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4840
(8.8 HIGH)

EPSS: 0.15%

updated 2026-03-26T06:30:27

4 posts

A security flaw has been discovered in Netcore Power 15AX up to 3.0.0.6938. Affected by this issue is the function setTools of the file /bin/netis.cgi of the component Diagnostic Tool Interface. Performing a manipulation of the argument IpAddr results in os command injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The

offseq at 2026-03-26T06:00:30.715Z ##

🔥 CVE-2026-4840: HIGH-severity OS command injection in Netcore Power 15AX (≤3.0.0.6938). No patch, public exploit out. Remote code execution possible — immediate mitigation needed! Full compromise risk. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-26T05:17:52.000Z ##

🟠 CVE-2026-4840 - High (8.8)

A security flaw has been discovered in Netcore Power 15AX up to 3.0.0.6938. Affected by this issue is the function setTools of the file /bin/netis.cgi of the component Diagnostic Tool Interface. Performing a manipulation of the argument IpAddr res...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-26T06:00:30.000Z ##

🔥 CVE-2026-4840: HIGH-severity OS command injection in Netcore Power 15AX (≤3.0.0.6938). No patch, public exploit out. Remote code execution possible — immediate mitigation needed! Full compromise risk. Details: radar.offseq.com/threat/cve-20 #OffSeq #Netcore #Security #CVE20264840

##

thehackerwire@mastodon.social at 2026-03-26T05:17:52.000Z ##

🟠 CVE-2026-4840 - High (8.8)

A security flaw has been discovered in Netcore Power 15AX up to 3.0.0.6938. Affected by this issue is the function setTools of the file /bin/netis.cgi of the component Diagnostic Tool Interface. Performing a manipulation of the argument IpAddr res...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2931
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-26T06:30:27

2 posts

The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 9.1.2. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for authenticated attackers with customer-level permissions or above to change user passwords and potentially

thehackerwire@mastodon.social at 2026-03-26T05:18:02.000Z ##

🟠 CVE-2026-2931 - High (8.8)

The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 9.1.2. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and acce...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T05:18:02.000Z ##

🟠 CVE-2026-2931 - High (8.8)

The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 9.1.2. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and acce...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4484
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-26T03:30:34

2 posts

The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.6. This is due to the plugin allowing a user to update the user role through the 'InstructorsController::prepare_object_for_database' function. This makes it possible for authenticated attackers, with Student-level access and above, to elevate their privileges to that of an admini

thehackerwire@mastodon.social at 2026-03-26T03:00:03.000Z ##

🔴 CVE-2026-4484 - Critical (9.8)

The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.6. This is due to the plugin allowing a user to update the user role through the 'InstructorsController::prepare_object_for_data...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T03:00:03.000Z ##

🔴 CVE-2026-4484 - Critical (9.8)

The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.6. This is due to the plugin allowing a user to update the user role through the 'InstructorsController::prepare_object_for_data...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4758
(8.8 HIGH)

EPSS: 0.25%

updated 2026-03-26T00:31:03

2 posts

The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code exec

thehackerwire@mastodon.social at 2026-03-26T01:00:42.000Z ##

🟠 CVE-2026-4758 - High (8.8)

The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possibl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:00:42.000Z ##

🟠 CVE-2026-4758 - High (8.8)

The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possibl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24151
(7.8 HIGH)

EPSS: 0.05%

updated 2026-03-25T21:57:49.383000

1 posts

NVIDIA Megatron-LM contains a vulnerability in inferencing where an Attacker may cause an RCE by convincing a user to load a maliciously crafted input. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-03-24T22:01:27.000Z ##

🟠 CVE-2026-24151 - High (7.8)

NVIDIA Megatron-LM contains a vulnerability in inferencing where an Attacker may cause an RCE by convincing a user to load a maliciously crafted input. A successful exploit of this vulnerability may lead to code execution, escalation of privileges...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24152
(7.8 HIGH)

EPSS: 0.05%

updated 2026-03-25T21:56:52.887000

1 posts

NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-03-24T22:01:37.000Z ##

🟠 CVE-2026-24152 - High (7.8)

NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of priv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32537
(7.5 HIGH)

EPSS: 0.11%

updated 2026-03-25T21:31:39

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nK Visual Portfolio, Photo Gallery & Post Grid visual-portfolio allows PHP Local File Inclusion.This issue affects Visual Portfolio, Photo Gallery & Post Grid: from n/a through <= 3.5.1.

thehackerwire@mastodon.social at 2026-03-25T21:43:49.000Z ##

🟠 CVE-2026-32537 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nK Visual Portfolio, Photo Gallery & Post Grid visual-portfolio allows PHP Local File Inclusion.This issue affects Visual Port...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25447
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-25T21:31:39

2 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in Jonathan Daggerhart Widget Wrangler widget-wrangler allows Code Injection.This issue affects Widget Wrangler: from n/a through <= 2.3.9.

thehackerwire@mastodon.social at 2026-03-25T21:02:44.000Z ##

🔴 CVE-2026-25447 - Critical (9.1)

Improper Control of Generation of Code ('Code Injection') vulnerability in Jonathan Daggerhart Widget Wrangler widget-wrangler allows Code Injection.This issue affects Widget Wrangler: from n/a through &lt;= 2.3.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:00:16.000Z ##

🔴 CVE-2026-25447 - Critical (9.1)

Improper Control of Generation of Code ('Code Injection') vulnerability in Jonathan Daggerhart Widget Wrangler widget-wrangler allows Code Injection.This issue affects Widget Wrangler: from n/a through &lt;= 2.3.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32546
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-25T21:31:39

2 posts

Missing Authorization vulnerability in StellarWP Restrict Content restrict-content allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Content: from n/a through <= 3.2.22.

thehackerwire@mastodon.social at 2026-03-25T20:44:00.000Z ##

🟠 CVE-2026-32546 - High (7.5)

Missing Authorization vulnerability in StellarWP Restrict Content restrict-content allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Content: from n/a through &lt;= 3.2.22.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:42:31.000Z ##

🟠 CVE-2026-32546 - High (7.5)

Missing Authorization vulnerability in StellarWP Restrict Content restrict-content allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Content: from n/a through &lt;= 3.2.22.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25001
(8.6 HIGH)

EPSS: 0.05%

updated 2026-03-25T21:31:38

1 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in Saad Iqbal Post Snippets post-snippets allows Remote Code Inclusion.This issue affects Post Snippets: from n/a through <= 4.0.12.

thehackerwire@mastodon.social at 2026-03-25T21:00:28.000Z ##

🟠 CVE-2026-25001 - High (8.5)

Improper Control of Generation of Code ('Code Injection') vulnerability in Saad Iqbal Post Snippets post-snippets allows Remote Code Inclusion.This issue affects Post Snippets: from n/a through &lt;= 4.0.12.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32573
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-25T21:30:36

3 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Code Injection.This issue affects Nelio AB Testing: from n/a through <= 8.2.7.

offseq at 2026-03-26T04:30:28.147Z ##

🚨 CRITICAL: CVE-2026-32573 in Nelio AB Testing plugin (≤8.2.7) enables code injection on WordPress sites. No active exploits, but risk of remote code execution. Monitor for patches & harden configs. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-26T04:30:28.000Z ##

🚨 CRITICAL: CVE-2026-32573 in Nelio AB Testing plugin (≤8.2.7) enables code injection on WordPress sites. No active exploits, but risk of remote code execution. Monitor for patches & harden configs. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

thehackerwire@mastodon.social at 2026-03-25T20:42:40.000Z ##

🔴 CVE-2026-32573 - Critical (9.1)

Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Code Injection.This issue affects Nelio AB Testing: from n/a through &lt;= 8.2.7.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32531
(8.1 HIGH)

EPSS: 0.11%

updated 2026-03-25T21:30:36

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in gavias Kunco kunco allows PHP Local File Inclusion.This issue affects Kunco: from n/a through < 1.4.5.

thehackerwire@mastodon.social at 2026-03-25T21:44:32.000Z ##

🟠 CVE-2026-32531 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in gavias Kunco kunco allows PHP Local File Inclusion.This issue affects Kunco: from n/a through &lt; 1.4.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32534
(8.5 HIGH)

EPSS: 0.03%

updated 2026-03-25T21:30:36

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk js-support-ticket allows Blind SQL Injection.This issue affects JS Help Desk: from n/a through <= 3.0.3.

thehackerwire@mastodon.social at 2026-03-25T21:43:30.000Z ##

🟠 CVE-2026-32534 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk js-support-ticket allows Blind SQL Injection.This issue affects JS Help Desk: from n/a through &lt;= 3.0.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32539
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-03-25T21:30:36

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PublishPress PublishPress Revisions revisionary allows Blind SQL Injection.This issue affects PublishPress Revisions: from n/a through <= 3.7.23.

thehackerwire@mastodon.social at 2026-03-25T20:42:49.000Z ##

🔴 CVE-2026-32539 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in PublishPress PublishPress Revisions revisionary allows Blind SQL Injection.This issue affects PublishPress Revisions: from n/a through &lt;= 3.7.23.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25366
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-03-25T21:30:35

2 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in Themeisle Woody ad snippets insert-php allows Code Injection.This issue affects Woody ad snippets: from n/a through <= 2.7.1.

Matchbook3469@mastodon.social at 2026-03-26T07:42:57.000Z ##

🔴 New security advisory:

CVE-2026-25366 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

thehackerwire@mastodon.social at 2026-03-25T21:00:18.000Z ##

🔴 CVE-2026-25366 - Critical (9.9)

Improper Control of Generation of Code ('Code Injection') vulnerability in Themeisle Woody ad snippets insert-php allows Code Injection.This issue affects Woody ad snippets: from n/a through &lt;= 2.7.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32513
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-25T21:30:35

1 posts

Deserialization of Untrusted Data vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows Object Injection.This issue affects JS Archive List: from n/a through <= 6.1.7.

thehackerwire@mastodon.social at 2026-03-25T21:44:41.000Z ##

🟠 CVE-2026-32513 - High (8.8)

Deserialization of Untrusted Data vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows Object Injection.This issue affects JS Archive List: from n/a through &lt;= 6.1.7.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27044
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-03-25T21:30:35

2 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in TotalSuite Total Poll Lite totalpoll-lite allows Remote Code Inclusion.This issue affects Total Poll Lite: from n/a through <= 4.12.0.

thehackerwire@mastodon.social at 2026-03-25T21:02:33.000Z ##

🔴 CVE-2026-27044 - Critical (9.9)

Improper Control of Generation of Code ('Code Injection') vulnerability in TotalSuite Total Poll Lite totalpoll-lite allows Remote Code Inclusion.This issue affects Total Poll Lite: from n/a through &lt;= 4.12.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T21:00:06.000Z ##

🔴 CVE-2026-27044 - Critical (9.9)

Improper Control of Generation of Code ('Code Injection') vulnerability in TotalSuite Total Poll Lite totalpoll-lite allows Remote Code Inclusion.This issue affects Total Poll Lite: from n/a through &lt;= 4.12.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4719
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-25T21:30:28

1 posts

Incorrect boundary conditions in the Graphics: Text component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T23:00:10.000Z ##

🟠 CVE-2026-4719 - High (7.5)

Incorrect boundary conditions in the Graphics: Text component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4705
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-25T21:30:27

1 posts

Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T23:15:09.000Z ##

🔴 CVE-2026-4705 - Critical (9.8)

Undefined behavior in the WebRTC: Signaling component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4704
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-25T21:30:27

1 posts

Denial-of-service in the WebRTC: Signaling component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T23:02:43.000Z ##

🟠 CVE-2026-4704 - High (7.5)

Denial-of-service in the WebRTC: Signaling component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33680
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-25T21:18:09

1 posts

## Summary The `LinkSharing.ReadAll()` method allows link share authenticated users to list all link shares for a project, including their secret hashes. While `LinkSharing.CanRead()` correctly blocks link share users from reading individual shares via `ReadOne`, the `ReadAllWeb` handler bypasses this check by never calling `CanRead()`. An attacker with a read-only link share can retrieve hashes

thehackerwire@mastodon.social at 2026-03-24T20:13:32.000Z ##

🟠 CVE-2026-33680 - High (7.5)

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.2, the `LinkSharing.ReadAll()` method allows link share authenticated users to list all link shares for a project, including their secret hashes. While `LinkShari...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33678
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-25T21:17:43

2 posts

## Summary `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id = ?`), ignoring the task ID from the URL path. The permission check in `CanRead()` validates access to the task specified in the URL, but `ReadOne()` loads a different attachment that may belong to a task in another project. This allows any authenticated user to download or delete any attachment in the system by provi

ivycyber@privacysafe.social at 2026-03-24T20:45:55.000Z ##

🛡️ #Cybersecurity news & tips across the #fediverse

“🟠 CVE-2026-33678 - High (8.1) Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id = ?`), ignoring the task ID fro...”

mastodon.social/@thehackerwire

🤖 via RSS feed. Not an endorsement.

##

thehackerwire@mastodon.social at 2026-03-24T20:12:57.000Z ##

🟠 CVE-2026-33678 - High (8.1)

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.1, `TaskAttachment.ReadOne()` queries attachments by ID only (`WHERE id = ?`), ignoring the task ID from the URL path. The permission check in `CanRead()` validat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32538
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-25T21:16:46.347000

1 posts

Insertion of Sensitive Information Into Sent Data vulnerability in Noor Alam SMTP Mailer smtp-mailer allows Retrieve Embedded Sensitive Data.This issue affects SMTP Mailer: from n/a through <= 1.1.24.

thehackerwire@mastodon.social at 2026-03-25T21:44:23.000Z ##

🟠 CVE-2026-32538 - High (7.5)

Insertion of Sensitive Information Into Sent Data vulnerability in Noor Alam SMTP Mailer smtp-mailer allows Retrieve Embedded Sensitive Data.This issue affects SMTP Mailer: from n/a through &lt;= 1.1.24.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32536
(9.9 CRITICAL)

EPSS: 0.04%

updated 2026-03-25T21:16:45.867000

1 posts

Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green Downloads halfdata-paypal-green-downloads allows Using Malicious Files.This issue affects Green Downloads: from n/a through <= 2.08.

thehackerwire@mastodon.social at 2026-03-25T21:43:40.000Z ##

🔴 CVE-2026-32536 - Critical (9.9)

Unrestricted Upload of File with Dangerous Type vulnerability in halfdata Green Downloads halfdata-paypal-green-downloads allows Using Malicious Files.This issue affects Green Downloads: from n/a through &lt;= 2.08.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33660
(10.0 CRITICAL)

EPSS: 0.11%

updated 2026-03-25T21:07:45

2 posts

## Impact An authenticated user with permission to create or modify workflows could use the Merge node's "Combine by SQL" mode to read local files on the n8n host and achieve remote code execution. The AlaSQL sandbox did not sufficiently restrict certain SQL statements, allowing an attacker to access sensitive files on the server or even compromise the intance. ## Patches The issue has been fixed

offseq at 2026-03-26T03:00:33.476Z ##

⚠️ CRITICAL RCE in n8n (CVE-2026-33660): Auth'd users can exploit Merge node SQL to read files & execute code on n8n host. Patch to 2.14.1/2.13.3/1.123.26 ASAP. Limit permissions if you can't patch yet. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-26T03:00:33.000Z ##

⚠️ CRITICAL RCE in n8n (CVE-2026-33660): Auth'd users can exploit Merge node SQL to read files & execute code on n8n host. Patch to 2.14.1/2.13.3/1.123.26 ASAP. Limit permissions if you can't patch yet. radar.offseq.com/threat/cve-20 #OffSeq #n8n #infosec #CVE202633660

##

CVE-2026-33310
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-25T20:54:34.937000

1 posts

Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contains a parameter default such as shell(<command>), the command may be executed when the catalog source is accessed. This means that if a user loads a malic

thehackerwire@mastodon.social at 2026-03-24T20:15:43.000Z ##

🟠 CVE-2026-33310 - High (8.8)

Intake is a package for finding, investigating, loading and disseminating data. Prior to version 2.0.9, the shell() syntax within parameter default values appears to be automatically expanded during the catalog parsing process. If a catalog contai...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33316
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-25T20:53:33

2 posts

### Summary A flaw in Vikunja’s password reset logic allows disabled users to regain access to their accounts. The `ResetPassword()` function sets the user’s status to `StatusActive` after a successful password reset without verifying whether the account was previously disabled. By requesting a reset token through `/api/v1/user/password/token` and completing the reset via `/api/v1/user/password/r

thehackerwire@mastodon.social at 2026-03-24T20:29:39.000Z ##

🟠 CVE-2026-33316 - High (8.1)

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, a flaw in Vikunja’s password reset logic allows disabled users to regain access to their accounts. The `ResetPassword()` function sets the user’s status to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T20:15:23.000Z ##

🟠 CVE-2026-33316 - High (8.1)

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, a flaw in Vikunja’s password reset logic allows disabled users to regain access to their accounts. The `ResetPassword()` function sets the user’s status to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29839
(8.8 HIGH)

EPSS: 0.01%

updated 2026-03-25T20:53:05.983000

1 posts

DedeCMS v5.7.118 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability in /sys_task_add.php.

thehackerwire@mastodon.social at 2026-03-24T20:13:42.000Z ##

🟠 CVE-2026-29839 - High (8.8)

DedeCMS v5.7.118 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability in /sys_task_add.php.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33211
(9.6 CRITICAL)

EPSS: 0.02%

updated 2026-03-25T20:48:05

2 posts

### Summary The Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter. A tenant with permission to create `ResolutionRequests` (e.g. by creating `TaskRuns` or `PipelineRuns` that use the git resolver) can read arbitrary files from the resolver pod's filesystem, including ServiceAccount tokens. The file contents are returned base64-encoded in `resolutionreque

offseq@infosec.exchange at 2026-03-24T01:30:27.000Z ##

🚨 CRITICAL: CVE-2026-33211 in Tekton Pipelines (git resolver) enables path traversal attacks via pathInRepo, exposing sensitive files (like ServiceAccount tokens). Upgrade to fixed versions immediately. Details: radar.offseq.com/threat/cve-20 #OffSeq #Tekton #Kubernetes #Infosec

##

thehackerwire@mastodon.social at 2026-03-24T00:23:30.000Z ##

🔴 CVE-2026-33211 - Critical (9.6)

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 1.0.0 and prior to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, the Tekton Pipelines git resolver is vulnerable to path traversal vi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4716
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-03-25T20:16:37.020000

1 posts

Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

thehackerwire@mastodon.social at 2026-03-24T22:53:07.000Z ##

🔴 CVE-2026-4716 - Critical (9.1)

Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4715
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-03-25T20:16:36.837000

1 posts

Uninitialized memory in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

thehackerwire@mastodon.social at 2026-03-24T22:52:58.000Z ##

🔴 CVE-2026-4715 - Critical (9.1)

Uninitialized memory in the Graphics: Canvas2D component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32525
(9.9 CRITICAL)

EPSS: 0.05%

updated 2026-03-25T20:16:30.967000

1 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in jetmonsters JetFormBuilder jetformbuilder allows Code Injection.This issue affects JetFormBuilder: from n/a through <= 3.5.6.1.

thehackerwire@mastodon.social at 2026-03-25T20:42:58.000Z ##

🔴 CVE-2026-32525 - Critical (9.9)

Improper Control of Generation of Code ('Code Injection') vulnerability in jetmonsters JetFormBuilder jetformbuilder allows Code Injection.This issue affects JetFormBuilder: from n/a through &lt;= 3.5.6.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20687
(7.1 HIGH)

EPSS: 0.01%

updated 2026-03-25T20:07:15.087000

1 posts

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, tvOS 26.4, watchOS 26.4. An app may be able to cause unexpected system termination or write kernel memory.

1 repos

https://github.com/zeroxjf/CVE-2026-20687-AppleSEPKeyStore-UAF

offseq@infosec.exchange at 2026-03-25T03:00:30.000Z ##

CVE-2026-20687 (CRITICAL): Use-after-free in Apple iOS/iPadOS/macOS/tvOS/watchOS lets malicious apps crash devices or write kernel memory. Patch to iOS/iPadOS 18.7.7/26.4, macOS Sequoia 15.7.5, Tahoe 26.4+ ASAP. radar.offseq.com/threat/cve-20 #OffSeq #AppleSecurity #InfoSec

##

CVE-2026-4712
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-25T19:16:52.517000

1 posts

Information disclosure in the Widget: Cocoa component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

thehackerwire@mastodon.social at 2026-03-24T22:19:54.000Z ##

🟠 CVE-2026-4712 - High (7.5)

Information disclosure in the Widget: Cocoa component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3857
(8.1 HIGH)

EPSS: 0.01%

updated 2026-03-25T18:32:07

3 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authenticated users due to insufficient CSRF protection.

thehackerwire@mastodon.social at 2026-03-25T20:43:42.000Z ##

🟠 CVE-2026-3857 - High (8.1)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:42:13.000Z ##

🟠 CVE-2026-3857 - High (8.1)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:21:07.000Z ##

🟠 CVE-2026-3857 - High (8.1)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.10 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 that could have allowed an unauthenticated user to execute arbitrary GraphQL mutations on behalf of authen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20012
(8.6 HIGH)

EPSS: 0.10%

updated 2026-03-25T18:31:51

2 posts

A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco IOS Software, Cisco IOS XE Software, Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition on an affected device. This vulnerab

thehackerwire@mastodon.social at 2026-03-25T23:00:33.000Z ##

🟠 CVE-2026-20012 - High (8.6)

A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco IOS Software, Cisco IOS XE Software, Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, and Cisco Secure Firewall Threat Defense (FTD) Software could al...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:00:33.000Z ##

🟠 CVE-2026-20012 - High (8.6)

A vulnerability in the Internet Key Exchange version 2 (IKEv2) feature of Cisco IOS Software, Cisco IOS XE Software, Cisco Secure Firewall Adaptive Security Appliance (ASA) Software, and Cisco Secure Firewall Threat Defense (FTD) Software could al...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20125
(7.7 HIGH)

EPSS: 0.14%

updated 2026-03-25T18:31:51

1 posts

A vulnerability in the HTTP Server feature of Cisco IOS Software and Cisco IOS XE Software Release 3E could allow an authenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malformed HTTP requ

thehackerwire@mastodon.social at 2026-03-25T22:00:32.000Z ##

🟠 CVE-2026-20125 - High (7.7)

A vulnerability in the HTTP Server feature of Cisco IOS Software and Cisco IOS XE Software Release 3E could allow an authenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) conditio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26832
(9.8 CRITICAL)

EPSS: 0.19%

updated 2026-03-25T18:31:51

1 posts

node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tesseract OCR. In all versions through 2.2.1, the recognize() function in src/index.js is vulnerable to OS Command Injection. The file path parameter is concatenated into a shell command string and passed to child_process.exec() without proper sanitization

1 repos

https://github.com/zebbernCVE/CVE-2026-26832

thehackerwire@mastodon.social at 2026-03-25T21:00:38.000Z ##

🔴 CVE-2026-26832 - Critical (9.8)

node-tesseract-ocr is an npm package that provides a Node.js wrapper for Tesseract OCR. In all versions through 2.2.1, the recognize() function in src/index.js is vulnerable to OS Command Injection. The file path parameter is concatenated into a s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3608
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-25T18:16:32.853000

1 posts

Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, or kea-dhcp6 daemons over any configured API socket or HA listener can cause the receiving daemon to exit with a stack overflow error. This issue affects Kea versions 2.6.0 through 2.6.4 and 3.0.0 through 3.0.2.

offseq@infosec.exchange at 2026-03-25T10:30:31.000Z ##

🚨 CVE-2026-3608: HIGH-severity vuln in ISC Kea DHCP (2.6.0 – 2.6.4, 3.0.0 – 3.0.2). Remote attackers can crash daemons, causing DoS. Restrict API/HA access, monitor traffic, and prep failover. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE #DHCP #Infosec

##

CVE-2026-33287
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-25T17:44:24

2 posts

### Summary The `replace_first` filter in LiquidJS uses JavaScript's `String.prototype.replace()` which interprets `$&` as a backreference to the matched substring. The filter only charges `memoryLimit` for the input string length, not the amplified output. An attacker can achieve exponential memory amplification (up to 625,000:1) while staying within the `memoryLimit` budget, leading to denial of

thehackerwire@mastodon.social at 2026-03-26T01:36:13.000Z ##

🟠 CVE-2026-33287 - High (7.5)

LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, the `replace_first` filter in LiquidJS uses JavaScript's `String.prototype.replace()` which interprets `$&` as a back reference to the ma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:36:13.000Z ##

🟠 CVE-2026-33287 - High (7.5)

LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, the `replace_first` filter in LiquidJS uses JavaScript's `String.prototype.replace()` which interprets `$&` as a back reference to the ma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33285
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-25T17:40:53

2 posts

### Summary LiquidJS's `memoryLimit` security mechanism can be completely bypassed by using reverse range expressions (e.g., `(100000000..1)`), allowing an attacker to allocate unlimited memory. Combined with a string flattening operation (e.g., `replace` filter), this causes a **V8 Fatal error that crashes the Node.js process**, resulting in complete denial of service from a single HTTP request.

thehackerwire@mastodon.social at 2026-03-26T01:18:13.000Z ##

🟠 CVE-2026-33285 - High (7.5)

LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, LiquidJS's `memoryLimit` security mechanism can be completely bypassed by using reverse range expressions (e.g., `(100000000..1)`), allow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:18:13.000Z ##

🟠 CVE-2026-33285 - High (7.5)

LiquidJS is a Shopify / GitHub Pages compatible template engine in pure JavaScript. Prior to version 10.25.1, LiquidJS's `memoryLimit` security mechanism can be completely bypassed by using reverse range expressions (e.g., `(100000000..1)`), allow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20131
(10.0 CRITICAL)

EPSS: 0.65%

updated 2026-03-25T17:39:46.247000

5 posts

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root&nbsp;on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Ja

3 repos

https://github.com/p3Nt3st3r-sTAr/CVE-2026-20131-POC

https://github.com/sak110/CVE-2026-20131

https://github.com/Sushilsin/CVE-2026-20131

netsecio@mastodon.social at 2026-03-26T15:43:19.000Z ##

📰 Cisco Firewall Zero-Day Exploited by Interlock Ransomware for Over a Month Before Patch

🚨 ZERO-DAY: A critical Cisco Firewall flaw (CVE-2026-20131) was exploited by Interlock ransomware for 36 days before a patch. CISA has added it to the KEV catalog. Patch now and restrict management interface access! #0day #Ransomware #Cisco

🔗 cyber.netsecops.io/articles/ci

##

allaboutsecurity@mastodon.social at 2026-03-26T06:59:12.000Z ##

Cisco Secure FMC: Schwachstelle CVE-2026-20131 erlaubt Remote-Codeausführung – Updates verfügbar

Eine Sicherheitslücke mit dem höchstmöglichen CVSS-Wert von 10,0 betrifft Ciscos Secure Firewall Management Center (FMC). Angreifer können ohne Authentifizierung aus der Ferne beliebigen Code ausführen.

all-about-security.de/cisco-se

#cisco #firewall #remotecode #cve

##

AAKL@infosec.exchange at 2026-03-25T17:50:52.000Z ##

Grab a coffee. Cisco has a long list of advisories today, one is critical, several are high-severity.

This was first published on March 4:

Critical: CVE-2026-20131: Cisco Secure Firewall Management Center Software Remote Code Execution Vulnerability sec.cloudapps.cisco.com/securi

More: sec.cloudapps.cisco.com/securi @TalosSecurity

Also, Cisco has tagged GeoVision and MediaArea for zero-day reports talosintelligence.com/vulnerab #Zeroday #Cisco #infosec #vulnerability

@cR0w

##

LLMs@activitypub.awakari.com at 2026-03-25T12:04:33.000Z ## Ransomware Interlock explota Zero-Day crítico en Cisco FMC (CVE-2026-20131) El equipo de respuesta a incidentes de Cisco (PSIRT) ha emitido un parche de emergencia extraordinario para abordar una ...

#Seguridad

Origin | Interest | Match ##

steelefortress@infosec.exchange at 2026-03-24T11:00:30.000Z ##

Critical patch alert: The US government has ordered a maximum severity patch for a Cisco vulnerability (CVE-2026-20131) that's being exploited in ransomware campaigns.

Read more: steelefortress.com/86cy1e

#Encryption #ThreatIntel #Security #DataPrivacy #CyberDefense

##

CVE-2026-33286
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-25T17:18:23.687000

1 posts

Graphiti is a framework that sits on top of models and exposes them via a JSON:API-compliant interface. Versions prior to 1.10.2 have an arbitrary method execution vulnerability that affects Graphiti's JSONAPI write functionality. An attacker can craft a malicious JSONAPI payload with arbitrary relationship names to invoke any public method on the underlying model instance, class or its associatio

offseq@infosec.exchange at 2026-03-24T03:00:31.000Z ##

🚨 CRITICAL: CVE-2026-33286 in Graphiti (<1.10.2) lets unauthenticated attackers invoke arbitrary public methods via JSONAPI write requests. Patch to v1.10.2, restrict access, and validate inputs! radar.offseq.com/threat/cve-20 #OffSeq #CVE202633286 #Ruby #APIsecurity

##

CVE-2026-4711
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-25T17:17:10.257000

1 posts

Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.

thehackerwire@mastodon.social at 2026-03-24T22:19:44.000Z ##

🔴 CVE-2026-4711 - Critical (9.8)

Use-after-free in the Widget: Cocoa component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27889
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-25T17:07:53

1 posts

### Background NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. When using WebSockets, a malicious client can trigger a server crash with crafted frames, before authentication. ### Problem Description A missing sanity check on a WebSockets frame could trigger a server panic in the nats-server. Th

thehackerwire@mastodon.social at 2026-03-25T20:20:56.000Z ##

🟠 CVE-2026-27889 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Starting in version 2.2.0 and prior to versions 2.11.14 and 2.12.5, a missing sanity check on a WebSockets frame could trigger a server panic in the na...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71275
(0 None)

EPSS: 0.00%

updated 2026-03-25T16:16:08.033000

1 posts

Rejected reason: This CVE was rejected due to being a duplicate of CVE-2024-45519.

thehackerwire@mastodon.social at 2026-03-24T20:13:51.000Z ##

🔴 CVE-2025-71275 - Critical (9.8)

Zimbra Collaboration Suite (ZCS) PostJournal service version 8.8.15 contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary system commands by exploiting improper sanitization of the RCPT TO parameter ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-32991
(9.0 CRITICAL)

EPSS: 0.21%

updated 2026-03-25T16:16:07.650000

2 posts

In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful API results in remote code execution.

thehackerwire@mastodon.social at 2026-03-26T00:00:25.000Z ##

🔴 CVE-2025-32991 - Critical (9)

In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful API results in remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T00:00:25.000Z ##

🔴 CVE-2025-32991 - Critical (9)

In N2WS Backup & Recovery before 4.4.0, a two-step attack against the RESTful API results in remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2417
(0 None)

EPSS: 0.10%

updated 2026-03-25T15:41:58.280000

1 posts

A Missing Authentication for Critical Function vulnerability in Pharos Controls Mosaic Show Controller firmware version 2.15.3 could allow an unauthenticated attacker to bypass authentication and execute arbitrary commands with root privileges.

beyondmachines1@infosec.exchange at 2026-03-25T09:01:25.000Z ##

Pharos Controls Patches Critical Root Access Flaw in Mosaic Show Controllers

Pharos Controls patched a critical vulnerability (CVE-2026-2417) in its Mosaic Show Controller that allows unauthenticated attackers to execute arbitrary commands with root privileges.

**Make sure all Pharos Mosaic Show Controllers are isolated from the internet and accessible from trusted networks only. Check your version, if you are running 2.15.3, you are at risk. Plan an update the firmware to version 2.16 or later.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-33244
(9.0 CRITICAL)

EPSS: 0.03%

updated 2026-03-25T15:41:58.280000

2 posts

NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker could cause a deserialization of untrusted data. This vulnerability affects environments that use PyTorch versions earlier than 2.6. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, data tampering, and information disclosure.

thehackerwire@mastodon.social at 2026-03-24T22:05:06.000Z ##

🔴 CVE-2025-33244 - Critical (9)

NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker could cause a deserialization of untrusted data. This vulnerability affects environments that use PyTorch versions earlier than 2.6. A successful exploit of this vulnera...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-03-24T16:07:04.000Z ##

New Nvidia advisories. This is a long list of vulnerabilities with varying severity.

Of note is the critical CVE-2025-33244: Security Bulletin: NVIDIA Apex - March 2026 nvidia.custhelp.com/app/answer

The rest: nvidia.com/en-us/product-secur #infosec #Nvidia #vulnerability

##

CVE-2026-24157
(7.8 HIGH)

EPSS: 0.12%

updated 2026-03-25T15:41:58.280000

1 posts

NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and data tampering.

thehackerwire@mastodon.social at 2026-03-24T22:01:47.000Z ##

🟠 CVE-2026-24157 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24159
(7.8 HIGH)

EPSS: 0.12%

updated 2026-03-25T15:41:58.280000

1 posts

NVIDIA NeMo Framework contains a vulnerability where an attacker may cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and data tampering.

thehackerwire@mastodon.social at 2026-03-24T21:59:51.000Z ##

🟠 CVE-2026-24159 - High (7.8)

NVIDIA NeMo Framework contains a vulnerability where an attacker may cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33509
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-25T15:41:58.280000

1 posts

pyLoad is a free and open-source download manager written in Python. From version 0.4.0 to before version 0.5.0b3.dev97, the set_config_value() API endpoint allows users with the non-admin SETTINGS permission to modify any configuration option without restriction. The reconnect.script config option controls a file path that is passed directly to subprocess.run() in the thread manager's reconnect l

thehackerwire@mastodon.social at 2026-03-24T20:26:20.000Z ##

🟠 CVE-2026-33509 - High (7.5)

pyLoad is a free and open-source download manager written in Python. From version 0.4.0 to before version 0.5.0b3.dev97, the set_config_value() API endpoint allows users with the non-admin SETTINGS permission to modify any configuration option wit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33399
(7.7 HIGH)

EPSS: 0.03%

updated 2026-03-25T15:41:58.280000

1 posts

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, the SSRF fix applied in version 4.6.2 for CVE-2026-30839 and CVE-2026-30840 is incomplete. The validate_webhook_url_for_ssrf() protection was added to the test* notification endpoints but not to the corresponding save* endpoints. An authenticated user can save an internal/private IP address as a notifica

thehackerwire@mastodon.social at 2026-03-24T20:12:37.000Z ##

🟠 CVE-2026-33399 - High (7.7)

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, the SSRF fix applied in version 4.6.2 for CVE-2026-30839 and CVE-2026-30840 is incomplete. The validate_webhook_url_for_ssrf() protection was added to t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2072
(8.2 HIGH)

EPSS: 0.04%

updated 2026-03-25T15:41:33.977000

1 posts

Cross-Site Scripting vulnerability in Hitachi Infrastructure Analytics Advisor (Analytics probe component), Hitachi Ops Center Analyzer.This issue affects Hitachi Infrastructure Analytics Advisor:; Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.5-00.

offseq@infosec.exchange at 2026-03-25T04:30:30.000Z ##

⚠️ HIGH-severity XSS (CVE-2026-2072, CVSS 8.2) in Hitachi Infrastructure Analytics Advisor & Ops Center Analyzer <11.0.5-00. Exploitable by low-privilege users. Patch when available, restrict access, enable WAF. radar.offseq.com/threat/cve-20 #OffSeq #XSS #Vuln #Hitachi

##

CVE-2026-28877
(0 None)

EPSS: 0.02%

updated 2026-03-25T15:41:33.977000

1 posts

An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, visionOS 26.4, watchOS 26.4. An app may be able to access sensitive user data.

rosyna@mastodon.social at 2026-03-25T02:11:10.000Z ##

I updated the “Device Name” section of my “How to Fingerprint iOS Users” article to note that iOS 26.4 fixes CVE-2026-28877, which leaked the device name without needing a proper entitlement.

paradisefacade.com/blog/2026/3

##

CVE-2026-28864
(3.3 LOW)

EPSS: 0.01%

updated 2026-03-25T15:32:30

1 posts

This issue was addressed with improved permissions checking. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS 26.4, watchOS 26.4. A local attacker may gain access to user's Keychain items.

offseq@infosec.exchange at 2026-03-25T06:00:31.000Z ##

🔒 CVE-2026-28864 (HIGH): Local attackers can access Apple Keychain items on iOS, iPadOS, macOS, visionOS, watchOS. Patch to latest OS releases now to protect credentials. No known exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #Apple #Security #Keychain

##

CVE-2026-3104
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-25T15:31:37

2 posts

A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain. This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1. BIND 9 versions 9.18.0 through 9.18.46 and 9.18.11-S1 through 9.18.46-S1 are NOT affected.

thehackerwire@mastodon.social at 2026-03-26T00:00:35.000Z ##

🟠 CVE-2026-3104 - High (7.5)

A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain.
This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1.
BIND 9 versions 9...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T00:00:35.000Z ##

🟠 CVE-2026-3104 - High (7.5)

A specially crafted domain can be used to cause a memory leak in a BIND resolver simply by querying this domain.
This issue affects BIND 9 versions 9.20.0 through 9.20.20, 9.21.0 through 9.21.19, and 9.20.9-S1 through 9.20.20-S1.
BIND 9 versions 9...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26830
(9.8 CRITICAL)

EPSS: 0.25%

updated 2026-03-25T15:31:37

2 posts

pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shell command strings that are executed via child_process.exec()

2 repos

https://github.com/zebbernCVE/CVE-2026-26830

https://github.com/zebbernCVE/npm-cve-2026-26830-26833

thehackerwire@mastodon.social at 2026-03-25T23:00:41.000Z ##

🔴 CVE-2026-26830 - Critical (9.8)

pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shel...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:00:41.000Z ##

🔴 CVE-2026-26830 - Critical (9.8)

pdf-image (npm package) through version 2.0.0 allows OS command injection via the pdfFilePath parameter. The constructGetInfoCommand and constructConvertCommandForPage functions use util.format() to interpolate user-controlled file paths into shel...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1519
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-25T15:31:36

2 posts

If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers may make recursive queries (see: https://kb.isc.org/docs/why-does-my-authoritative-server-make-recursive-queries). This issue affects BIND 9 versions 9.

thehackerwire@mastodon.social at 2026-03-26T00:01:34.000Z ##

🟠 CVE-2026-1519 - High (7.5)

If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T00:01:34.000Z ##

🟠 CVE-2026-1519 - High (7.5)

If a BIND resolver is performing DNSSEC validation and encounters a maliciously crafted zone, the resolver may consume excessive CPU. Authoritative-only servers are generally unaffected, although there are circumstances where authoritative servers...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2343
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-03-25T15:31:30

1 posts

The PeproDev Ultimate Invoice WordPress plugin through 2.2.5 has a bulk download invoices action that generates ZIP archives containing exported invoice PDFs. The ZIP files are named predictably making it possible to brute force and retreive PII.

offseq@infosec.exchange at 2026-03-25T07:30:29.000Z ##

⚠️ HIGH: CVE-2026-2343 in PeproDev Ultimate Invoice ≤2.2.5 exposes PII via predictable ZIP archive names in bulk downloads. No auth needed — risk of mass data leaks! Disable feature, restrict access, monitor logs. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

CVE-2026-33634
(0 None)

EPSS: 0.07%

updated 2026-03-25T15:16:49.230000

2 posts

Trivy is a security scanner. On March 19, 2026, a threat actor used compromised credentials to publish a malicious Trivy v0.69.4 release, force-push 76 of 77 version tags in `aquasecurity/trivy-action` to credential-stealing malware, and replace all 7 tags in `aquasecurity/setup-trivy` with malicious commits. This incident is a continuation of the supply chain attack that began in late February 20

1 repos

https://github.com/ugurrates/teampcp-supply-chain-attack

cisakevtracker@mastodon.social at 2026-03-26T17:00:50.000Z ##

CVE ID: CVE-2026-33634
Vendor: Aquasecurity
Product: Trivy
Date Added: 2026-03-26
Notes: This vulnerability involves a supply‑chain compromise in a product that may be used across multiple products and environments. Additional vendor‑provided guidance must be followed to ensure full remediation. For more information, please see: github.com/advisories/GHSA-69f ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-03-26T17:00:50.000Z ##

CVE ID: CVE-2026-33634
Vendor: Aquasecurity
Product: Trivy
Date Added: 2026-03-26
Notes: This vulnerability involves a supply‑chain compromise in a product that may be used across multiple products and environments. Additional vendor‑provided guidance must be followed to ensure full remediation. For more information, please see: github.com/advisories/GHSA-69f ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-3909
(8.8 HIGH)

EPSS: 4.44%

updated 2026-03-25T14:05:38.743000

1 posts

Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

youranonnewsirc@nerdculture.de at 2026-03-24T00:27:11.000Z ##

Global cybersecurity alerts include active exploitation of Chrome Zero-Days (CVE-2026-3909/3910) and a Quest KACE SMA flaw for credential harvesting. Advanced threats like Android haptic keyloggers and deepfake identity fraud are emerging. Geopolitically, Persian Gulf tensions remain high, while the US announced a new cyber strategy to defend companies from foreign adversaries. In tech, NVIDIA Nemotron 3 Super is now on Amazon Bedrock.

#Cybersecurity #GeopoliticalNews #TechBrief

##

CVE-2026-26306
(7.8 HIGH)

EPSS: 0.02%

updated 2026-03-25T06:30:35

1 posts

The installer for OM Workspace (Windows Edition) Ver 2.4 and earlier insecurely loads Dynamic Link Libraries (DLLs), which could allow an attacker to execute arbitrary code with the privileges of the user invoking the installer.

offseq@infosec.exchange at 2026-03-25T09:00:28.000Z ##

⚠️ CVE-2026-26306 (HIGH): OM Workspace (Windows ≤2.4) vulnerable to DLL hijacking. Local attackers can execute code via unsafe installer DLL loading. Patch urgently or restrict installs & use Safe DLL Search Mode. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Windows

##

CVE-2026-33218
(7.5 HIGH)

EPSS: 0.12%

updated 2026-03-24T21:45:30

2 posts

### Background NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The nats-server allows hub/spoke topologies using "leafnode" connections by other nats-servers. ### Problem Description A client which can connect to the leafnode port can crash the nats-server with a certain malformed message pre-auth

thehackerwire@mastodon.social at 2026-03-25T20:21:31.000Z ##

🟠 CVE-2026-33218 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, a client which can connect to the leafnode port can crash the nats-server with a certain malformed message pre-au...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:20:45.000Z ##

🟠 CVE-2026-33218 - High (7.5)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, a client which can connect to the leafnode port can crash the nats-server with a certain malformed message pre-au...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33216
(8.6 HIGH)

EPSS: 0.03%

updated 2026-03-24T21:42:11

2 posts

### Background NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The nats-server provides an MQTT client interface. ### Problem Description For MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating identity statement (JWT) and exposed via monit

thehackerwire@mastodon.social at 2026-03-25T20:21:22.000Z ##

🟠 CVE-2026-33216 - High (8.6)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, for MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T20:20:35.000Z ##

🟠 CVE-2026-33216 - High (8.6)

NATS-Server is a High-Performance server for NATS.io, a cloud and edge native messaging system. Prior to versions 2.11.15 and 2.12.6, for MQTT deployments using usercodes/passwords: MQTT passwords are incorrectly classified as a non-authenticating...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4725
(10.0 CRITICAL)

EPSS: 0.01%

updated 2026-03-24T21:32:29

1 posts

Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149.

thehackerwire@mastodon.social at 2026-03-24T21:11:03.000Z ##

🔴 CVE-2026-4725 - Critical (10)

Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This vulnerability affects Firefox &lt; 149.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4723
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-03-24T21:32:29

1 posts

Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 149.

thehackerwire@mastodon.social at 2026-03-24T21:10:54.000Z ##

🔴 CVE-2026-4723 - Critical (9.8)

Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox &lt; 149.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4717
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-24T21:32:28

1 posts

Privilege escalation in the Netmonitor component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T23:00:00.000Z ##

🔴 CVE-2026-4717 - Critical (9.8)

Privilege escalation in the Netmonitor component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4714
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-24T21:32:28

1 posts

Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T22:52:47.000Z ##

🟠 CVE-2026-4714 - High (7.5)

Incorrect boundary conditions in the Audio/Video component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4713
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-24T21:32:28

1 posts

Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T22:20:03.000Z ##

🟠 CVE-2026-4713 - High (7.5)

Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30653
(7.5 HIGH)

EPSS: 0.18%

updated 2026-03-24T21:32:28

1 posts

An issue in Free5GC v.4.2.0 and before allows a remote attacker to cause a denial of service via the function HandleAuthenticationFailure of the component AMF

thehackerwire@mastodon.social at 2026-03-24T20:15:29.000Z ##

🟠 CVE-2026-30653 - High (7.5)

An issue in Free5GC v.4.2.0 and before allows a remote attacker to cause a denial of service via the function HandleAuthenticationFailure of the component AMF

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33254
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-24T21:31:36

1 posts

NVIDIA Triton Inference Server contains a vulnerability where an attacker may cause internal state corruption. A successful exploit of this vulnerability may lead to a denial of service.

thehackerwire@mastodon.social at 2026-03-24T22:06:41.000Z ##

🟠 CVE-2025-33254 - High (7.5)

NVIDIA Triton Inference Server contains a vulnerability where an attacker may cause internal state corruption. A successful exploit of this vulnerability may lead to a denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33248
(7.8 HIGH)

EPSS: 0.05%

updated 2026-03-24T21:31:35

1 posts

NVIDIA Megatron-LM contains a vulnerability in the hybrid conversion script where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-03-24T22:06:32.000Z ##

🟠 CVE-2025-33248 - High (7.8)

NVIDIA Megatron-LM contains a vulnerability in the hybrid conversion script where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33247
(7.8 HIGH)

EPSS: 0.24%

updated 2026-03-24T21:31:35

1 posts

NVIDIA Megatron LM contains a vulnerability in quantization configuration loading, which could allow remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-03-24T22:06:23.000Z ##

🟠 CVE-2025-33247 - High (7.8)

NVIDIA Megatron LM contains a vulnerability in quantization configuration loading, which could allow remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-33238
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-24T21:31:35

1 posts

NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability where an attacker may cause an exception. A successful exploit of this vulnerability may lead to denial of service.

thehackerwire@mastodon.social at 2026-03-24T22:04:56.000Z ##

🟠 CVE-2025-33238 - High (7.5)

NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability where an attacker may cause an exception. A successful exploit of this vulnerability may lead to denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24158
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-24T21:31:35

1 posts

NVIDIA Triton Inference Server contains a vulnerability in the HTTP endpoint where an attacker may cause a denial of service by providing a large compressed payload. A successful exploit of this vulnerability may lead to denial of service.

thehackerwire@mastodon.social at 2026-03-24T22:04:46.000Z ##

🟠 CVE-2026-24158 - High (7.5)

NVIDIA Triton Inference Server contains a vulnerability in the HTTP endpoint where an attacker may cause a denial of service by providing a large compressed payload. A successful exploit of this vulnerability may lead to denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24150
(7.8 HIGH)

EPSS: 0.05%

updated 2026-03-24T21:31:35

1 posts

NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-03-24T22:00:15.000Z ##

🟠 CVE-2026-24150 - High (7.8)

NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of priv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24141
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-24T21:31:35

1 posts

NVIDIA Model Optimizer for Windows and Linux contains a vulnerability in the ONNX quantization feature, where a user could cause unsafe deserialization by providing a specially crafted input file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, and information disclosure.

thehackerwire@mastodon.social at 2026-03-24T22:00:02.000Z ##

🟠 CVE-2026-24141 - High (7.8)

NVIDIA Model Optimizer for Windows and Linux contains a vulnerability in the ONNX quantization feature, where a user could cause unsafe deserialization by providing a specially crafted input file. A successful exploit of this vulnerability might l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22559
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-24T21:31:35

1 posts

An Improper Input Validation vulnerability in UniFi Network Server may allow unauthorized access to an account if the account owner is socially engineered into clicking a malicious link. Affected Products: UniFi Network Server (Version 10.1.85 and earlier) Mitigation: Update UniFi Network Server to Version 10.1.89 or later.

thehackerwire@mastodon.social at 2026-03-24T20:29:30.000Z ##

🟠 CVE-2026-22559 - High (8.8)

An Improper Input Validation vulnerability in UniFi Network Server may allow unauthorized access to an account if the account owner is socially engineered into clicking a malicious link.

Affected Products:
UniFi Network Server (Version 10.1....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4702
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-24T21:31:22

1 posts

JIT miscompilation in the JavaScript Engine component. This vulnerability affects Firefox < 149 and Firefox ESR < 140.9.

thehackerwire@mastodon.social at 2026-03-24T23:02:33.000Z ##

🔴 CVE-2026-4702 - Critical (9.8)

JIT miscompilation in the JavaScript Engine component. This vulnerability affects Firefox &lt; 149, Firefox ESR &lt; 140.9, Thunderbird &lt; 149, and Thunderbird &lt; 140.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4722
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-24T21:16:34.063000

1 posts

Privilege escalation in the IPC component. This vulnerability affects Firefox < 149 and Thunderbird < 149.

thehackerwire@mastodon.social at 2026-03-24T21:10:46.000Z ##

🟠 CVE-2026-4722 - High (8.8)

Privilege escalation in the IPC component. This vulnerability affects Firefox &lt; 149.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33554
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-24T20:16:30.357000

1 posts

ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors comm

thehackerwire@mastodon.social at 2026-03-24T20:58:32.000Z ##

🟠 CVE-2026-33554 - High (7.5)

ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33242
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-24T19:37:42.130000

1 posts

Salvo is a Rust web framework. Versions 0.39.0 through 0.89.2 have a Path Traversal and Access Control Bypass vulnerability in the salvo-proxy component. The vulnerability allows an unauthenticated external attacker to bypass proxy routing constraints and access unintended backend paths (e.g., protected endpoints or administrative dashboards). This issue stems from the encode_url_path function, wh

thehackerwire@mastodon.social at 2026-03-24T00:39:10.000Z ##

🟠 CVE-2026-33242 - High (7.5)

Salvo is a Rust web framework. Versions 0.39.0 through 0.89.2 have a Path Traversal and Access Control Bypass vulnerability in the salvo-proxy component. The vulnerability allows an unauthenticated external attacker to bypass proxy routing constra...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33497
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-24T19:20:25.140000

1 posts

Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.1, in the download_profile_picture function of the /profile_pictures/{folder_name}/{file_name} endpoint, the folder_name and file_name parameters are not strictly filtered, which allows the secret_key to be read across directories. Version 1.7.1 contains a patch.

thehackerwire@mastodon.social at 2026-03-24T21:00:15.000Z ##

🟠 CVE-2026-33497 - High (7.5)

Langflow is a tool for building and deploying AI-powered agents and workflows. Prior to version 1.7.1, in the download_profile_picture function of the /profile_pictures/{folder_name}/{file_name} endpoint, the folder_name and file_name parameters a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33484
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-24T19:20:13.567000

1 posts

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions 1.0.0 through 1.8.1, the `/api/v1/files/images/{flow_id}/{file_name}` endpoint serves image files without any authentication or ownership check. Any unauthenticated request with a known flow_id and file_name returns the image with HTTP 200. In a multi-tenant deployment, any attacker who can discover or guess

thehackerwire@mastodon.social at 2026-03-24T21:00:04.000Z ##

🟠 CVE-2026-33484 - High (7.5)

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions 1.0.0 through 1.8.1, the `/api/v1/files/images/{flow_id}/{file_name}` endpoint serves image files without any authentication or ownership check. Any unauthe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33418
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-24T19:19:48.480000

1 posts

DiceBear is an avatar library for designers and developers. Prior to version 9.4.2, the `ensureSize()` function in `@dicebear/converter` used a regex-based approach to rewrite SVG `width`/`height` attributes, capping them at 2048px to prevent denial of service. This size capping could be bypassed by crafting SVG input that causes the regex to match a non-functional occurrence of `<svg` before the

thehackerwire@mastodon.social at 2026-03-24T20:15:52.000Z ##

🟠 CVE-2026-33418 - High (7.5)

DiceBear is an avatar library for designers and developers. Prior to version 9.4.2, the `ensureSize()` function in `@dicebear/converter` used a regex-based approach to rewrite SVG `width`/`height` attributes, capping them at 2048px to prevent deni...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4679
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-24T18:31:34

1 posts

Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:24:05.000Z ##

🟠 CVE-2026-4679 - High (8.8)

Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4675
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-24T18:31:34

1 posts

Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:17:14.000Z ##

🟠 CVE-2026-4675 - High (8.8)

Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4678
(8.8 HIGH)

EPSS: 0.11%

updated 2026-03-24T17:50:27.517000

1 posts

Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:23:56.000Z ##

🟠 CVE-2026-4678 - High (8.8)

Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4680
(8.8 HIGH)

EPSS: 0.13%

updated 2026-03-24T17:50:13.317000

1 posts

Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T01:30:30.000Z ##

🟠 CVE-2026-4680 - High (8.8)

Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4673
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-24T16:54:37.343000

2 posts

Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:43:42.000Z ##

🟠 CVE-2026-4673 - High (8.8)

Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:43:12.000Z ##

🟠 CVE-2026-4673 - High (8.8)

Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4674
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-24T16:53:14.987000

2 posts

Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:43:52.000Z ##

🟠 CVE-2026-4674 - High (8.8)

Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:43:21.000Z ##

🟠 CVE-2026-4674 - High (8.8)

Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4676
(8.8 HIGH)

EPSS: 0.11%

updated 2026-03-24T16:50:03.117000

1 posts

Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:17:24.000Z ##

🟠 CVE-2026-4676 - High (8.8)

Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33056
(6.5 MEDIUM)

EPSS: 0.01%

updated 2026-03-24T16:17:11.623000

2 posts

tar-rs is a tar archive reading/writing library for Rust. In versions 0.4.44 and below, when unpacking a tar archive, the tar crate's unpack_dir function uses fs::metadata() to check whether a path that already exists is a directory. Because fs::metadata() follows symbolic links, a crafted tarball containing a symlink entry followed by a directory entry with the same name causes the crate to treat

CVE-2026-3055
(0 None)

EPSS: 0.02%

updated 2026-03-24T15:54:09.400000

5 posts

Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread

benzogaga33@mamot.fr at 2026-03-26T10:40:04.000Z ##

CVE-2026-3055 : appliquez ce patch Citrix avant qu’il ne soit trop tard it-connect.fr/cve-2026-3055-ap #ActuCybersécurité #Vulnérabilités #Cybersécurité

##

benzogaga33@mamot.fr at 2026-03-26T10:40:04.000Z ##

CVE-2026-3055 : appliquez ce patch Citrix avant qu’il ne soit trop tard it-connect.fr/cve-2026-3055-ap #ActuCybersécurité #Vulnérabilités #Cybersécurité

##

mttaggart@infosec.exchange at 2026-03-25T16:44:59.000Z ##

Aww yiss another critical Citrix vuln.

bleepingcomputer.com/news/secu

Detection/remediation details here: docs.netscaler.com/en-us/netsc

##

AAKL@infosec.exchange at 2026-03-24T16:22:25.000Z ##

Citrix patched this yesterday.

Arctic Wolf: CVE‑2026‑3055: Critical Unauthenticated Memory-Read Vulnerability in Citrix NetScaler ADC and Gateway arcticwolf.com/resources/blog/

Citrix: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368 support.citrix.com/support-hom #infosec #vulnerability

##

beyondmachines1@infosec.exchange at 2026-03-24T15:01:25.000Z ##

Critical Memory Leak and Session Hijacking Vulnerabilities Patched in Citrix NetScaler

Citrix patched a critical memory overread (CVE-2026-3055) and a high-severity session-swapping race condition (CVE-2026-4368) in NetScaler ADC and Gateway. These vulnerabilities allow unauthenticated attackers to leak sensitive memory data or hijack user sessions in environments configured for SAML or VPN services.

**If possible, make sure your NetScaler ADC and Gateway appliances are isolated from the internet and accessible from trusted networks only. Them plan a quick update. If you can't isolate from the internet, this is urgent. Update the firmware to the fixed versions (14.1-66.59, 13.1-62.23, or 13.1-37.262 for FIPS/NDcPP). Attackers have previously exploited similar flaws via the CitrixBleed exploit.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-15605
(0 None)

EPSS: 0.01%

updated 2026-03-24T15:54:09.400000

2 posts

A hardcoded cryptographic key within the configuration mechanism on TP-Link Archer NX200, NX210, NX500 and NX600 enables decryption and re-encryption of device configuration data. An authenticated attacker may decrypt configuration files, modify them, and re-encrypt them, affecting the confidentiality and integrity of device configuration data.

agowa338@chaos.social at 2026-03-26T09:05:52.000Z ##

@heisec

Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.

feedly.com/cve/CVE-2026-15518 and feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations

feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access

##

agowa338@chaos.social at 2026-03-26T09:05:52.000Z ##

@heisec

Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.

feedly.com/cve/CVE-2026-15518 and feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations

feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access

##

CVE-2026-4368
(0 None)

EPSS: 0.02%

updated 2026-03-24T15:54:09.400000

2 posts

Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configured as Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server leading to User Session Mixup

AAKL@infosec.exchange at 2026-03-24T16:22:25.000Z ##

Citrix patched this yesterday.

Arctic Wolf: CVE‑2026‑3055: Critical Unauthenticated Memory-Read Vulnerability in Citrix NetScaler ADC and Gateway arcticwolf.com/resources/blog/

Citrix: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368 support.citrix.com/support-hom #infosec #vulnerability

##

beyondmachines1@infosec.exchange at 2026-03-24T15:01:25.000Z ##

Critical Memory Leak and Session Hijacking Vulnerabilities Patched in Citrix NetScaler

Citrix patched a critical memory overread (CVE-2026-3055) and a high-severity session-swapping race condition (CVE-2026-4368) in NetScaler ADC and Gateway. These vulnerabilities allow unauthenticated attackers to leak sensitive memory data or hijack user sessions in environments configured for SAML or VPN services.

**If possible, make sure your NetScaler ADC and Gateway appliances are isolated from the internet and accessible from trusted networks only. Them plan a quick update. If you can't isolate from the internet, this is urgent. Update the firmware to the fixed versions (14.1-66.59, 13.1-62.23, or 13.1-37.262 for FIPS/NDcPP). Attackers have previously exploited similar flaws via the CitrixBleed exploit.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-4681
(0 None)

EPSS: 0.38%

updated 2026-03-24T15:53:48.067000

1 posts

A critical remote code execution (RCE) vulnerability has been reported in PTC Windchill and PTC FlexPLM. The vulnerability may be exploited through the deserialization of untrusted data. This issue affects Windchill PDMLink: 11.0 M030, 11.1 M020, 11.2.1.0, 12.0.2.0, 12.1.2.0, 13.0.2.0, 13.1.0.0, 13.1.1.0, 13.1.2.0, 13.1.3.0; FlexPLM: 11.0 M030, 11.1 M020, 11.2.1.0, 12.0.0.0, 12.0.2.0, 12.0.3.0, 1

beyondmachines1@infosec.exchange at 2026-03-25T12:01:46.000Z ##

PTC Warns of Imminent RCE Threat in Windchill and FlexPLM Systems

PTC reports a critical RCE vulnerability (CVE-2026-4681) in Windchill and FlexPLM software, leading to emergency warnings from German police due to an imminent threat of exploitation.

**If you're running PTC Windchill or FlexPLM, make sure these systems are isolated from the internet and accessible from trusted networks only. This one is a perfect 10.0 severity with no patch yet, so apply the recommended rewrite rules to block the WindchillGW and WindchillAuthGW servlet paths immediately. Also check your servers for signs of compromise like GW.class, payload.bin, or dpr_*.jsp files, and if you can't apply the workarounds, shut down the affected services until PTC releases an official patch.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2026-27651
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-24T15:53:48.067000

2 posts

When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not

thehackerwire@mastodon.social at 2026-03-24T20:59:53.000Z ##

🟠 CVE-2026-27651 - High (7.5)

When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T20:15:41.000Z ##

🟠 CVE-2026-27651 - High (7.5)

When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27654
(8.2 HIGH)

EPSS: 0.02%

updated 2026-03-24T15:53:48.067000

1 posts

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process or modification of source or destination file names outside the document root. This issue affects NGINX Open Source and NGINX Plus when the configuratio

thehackerwire@mastodon.social at 2026-03-24T20:15:34.000Z ##

🟠 CVE-2026-27654 - High (8.2)

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4739
(0 None)

EPSS: 0.04%

updated 2026-03-24T15:53:48.067000

2 posts

Integer Overflow or Wraparound vulnerability in InsightSoftwareConsortium ITK (‎Modules/ThirdParty/Expat/src/expat modules).This issue affects ITK: before 2.7.1.

ivycyber@privacysafe.social at 2026-03-24T12:02:16.000Z ##

🛡️ #Cybersecurity news & tips across the #fediverse 👇

“🚨 CVE-2026-4739 (CRITICAL, CVSS 9.4) in ITK: Integer overflow in Expat XML parser enables remote code execution or DoS in medical/scientific apps. Update to v2.7.1 now. User interaction required. Details: https:// ra...”

infosec.exchange/@offseq/11628

🤖 via RSS feed. Not an endorsement.

##

offseq@infosec.exchange at 2026-03-24T10:30:32.000Z ##

🚨 CVE-2026-4739 (CRITICAL, CVSS 9.4) in ITK: Integer overflow in Expat XML parser enables remote code execution or DoS in medical/scientific apps. Update to v2.7.1 now. User interaction required. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #ITK #Infosec

##

CVE-2025-41660
(8.8 HIGH)

EPSS: 0.21%

updated 2026-03-24T15:53:48.067000

1 posts

A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution.

certvde@infosec.exchange at 2026-03-24T07:47:49.000Z ##

#OT #Advisory VDE-2026-011
CODESYS Control V3 - Untrusted boot application

The CODESYS Control runtime system provides a user management mechanism with multiple privilege groups. While only the privileged Administrators and Developer groups are intended to load or debug applications on the controller, users in the restricted Service group are allowed to perform maintenance operations, including explicitly replacing the boot application.
#CVE CVE-2025-41660

certvde.com/en/advisories/vde-

#CSAF codesys.csaf-tp.certvde.com/.w

##

CVE-2026-4755
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-24T15:53:48.067000

1 posts

CWE-20 vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-11.

offseq@infosec.exchange at 2026-03-24T07:30:27.000Z ##

⚠️ CVE-2026-4755: Critical vuln in MolotovCherry Android-ImageMagick7 (<7.1.2-11). Remote, unauthenticated RCE possible due to improper input validation. Patch ASAP & enforce input checks. Details: radar.offseq.com/threat/cve-20 #OffSeq #Android #Vuln #ImageMagick #CVE2026_4755

##

CVE-2026-4746
(0 None)

EPSS: 0.04%

updated 2026-03-24T15:53:48.067000

1 posts

Out-of-bounds Write vulnerability in timeplus-io proton (base/poco/Foundation/src‎ modules). This vulnerability is associated with program files inflate.C. This issue affects proton: before 1.6.16.

offseq@infosec.exchange at 2026-03-24T06:00:30.000Z ##

🚨 CRITICAL: CVE-2026-4746 in timeplus-io proton (<1.6.16) allows remote out-of-bounds writes — risk of code execution, system takeover. No auth or user action needed. Patch when available, restrict access now. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE20264746 #Vuln

##

CVE-2026-4662
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-24T15:53:48.067000

1 posts

The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listing_load_more` AJAX action in all versions up to, and including, 3.8.6.1. This is due to the `filtered_query` parameter being excluded from the HMAC signature validation (allowing attacker-controlled input to bypass security checks) combined with the `prepare_where_clause()` method in the SQL Query Builder not sanitizin

thehackerwire@mastodon.social at 2026-03-24T05:25:20.000Z ##

🟠 CVE-2026-4662 - High (7.5)

The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listing_load_more` AJAX action in all versions up to, and including, 3.8.6.1. This is due to the `filtered_query` parameter being excluded from the HMAC signature validatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33298
(7.8 HIGH)

EPSS: 0.04%

updated 2026-03-24T15:53:48.067000

2 posts

llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an integer overflow vulnerability in the `ggml_nbytes` function allows an attacker to bypass memory validation by crafting a GGUF file with specific tensor dimensions. This causes `ggml_nbytes` to return a significantly smaller size than required (e.g., 4MB instead of Exabytes), leading to a heap-based buffer overflow when t

thehackerwire@mastodon.social at 2026-03-24T01:48:19.000Z ##

🟠 CVE-2026-33298 - High (7.8)

llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an integer overflow vulnerability in the `ggml_nbytes` function allows an attacker to bypass memory validation by crafting a GGUF file with specific tensor dimensions. This ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T01:30:32.000Z ##

🟠 CVE-2026-33298 - High (7.8)

llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an integer overflow vulnerability in the `ggml_nbytes` function allows an attacker to bypass memory validation by crafting a GGUF file with specific tensor dimensions. This ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27784
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-24T15:30:36

2 posts

The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file.

thehackerwire@mastodon.social at 2026-03-24T20:58:49.000Z ##

🟠 CVE-2026-27784 - High (7.8)

The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T20:15:39.000Z ##

🟠 CVE-2026-27784 - High (7.8)

The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32647
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-24T15:30:36

2 posts

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 di

thehackerwire@mastodon.social at 2026-03-24T20:58:40.000Z ##

🟠 CVE-2026-32647 - High (7.8)

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T20:15:32.000Z ##

🟠 CVE-2026-32647 - High (7.8)

NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4775
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-24T15:30:36

1 posts

A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write due to incorrect memory pointer calculations, potentially causing a denial of service (application crash) or arbitrary code execution.

thehackerwire@mastodon.social at 2026-03-24T20:15:20.000Z ##

🟠 CVE-2026-4775 - High (7.8)

A flaw was found in the libtiff library. A remote attacker could exploit a signed integer overflow vulnerability in the putcontig8bitYCbCr44tile function by providing a specially crafted TIFF file. This flaw can lead to an out-of-bounds heap write...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3509
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-24T09:30:41

1 posts

An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denial‑of‑service (DoS) condition.

certvde@infosec.exchange at 2026-03-24T07:48:12.000Z ##

#OT #Advisory VDE-2026-018
CODESYS Control V3 - Externally-controlled format string in Auditlog

The CODESYS Control runtime system's CmpAuditLog component allows potentially unauthenticated remote attackers to control the format string of processed log messages. Due to the internal processing logic, the impact is limited to a crash of the CODESYS Control runtime.
#CVE CVE-2026-3509

certvde.com/en/advisories/vde-

#CSAF codesys.csaf-tp.certvde.com/.w

##

CVE-2026-4745(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-03-24T06:31:25

1 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in dendibakh perf-ninja (labs/misc/pgo/lua modules). This vulnerability is associated with program files ldo.C. This issue affects perf-ninja.

offseq@infosec.exchange at 2026-03-24T09:00:29.000Z ##

🚨 CRITICAL: CVE-2026-4745 in dendibakh perf-ninja (CVSS 10) — remote code injection flaw in labs/misc/pgo/lua & ldo.C. No exploits yet, but restrict access, monitor logs, and prep for urgent patches. Full system compromise risk. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #AppSec

##

CVE-2026-4753
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-24T06:31:25

1 posts

Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects RetroDebugger: before v0.64.72.

thehackerwire@mastodon.social at 2026-03-24T06:23:29.000Z ##

🔴 CVE-2026-4753 - Critical (9.1)

Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects RetroDebugger: before v0.64.72.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4750
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-24T06:31:25

1 posts

Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof: before woof_15.3.0.

thehackerwire@mastodon.social at 2026-03-24T06:23:20.000Z ##

🔴 CVE-2026-4750 - Critical (9.1)

Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof: before woof_15.3.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4640
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-24T06:31:25

1 posts

Vitals ESP developed by Galaxy Software Services has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to execute certain functions to obtain sensitive information.

thehackerwire@mastodon.social at 2026-03-24T05:25:11.000Z ##

🟠 CVE-2026-4640 - High (7.5)

Vitals ESP developed by Galaxy Software Services has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to execute certain functions to obtain sensitive information.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4283
(9.1 CRITICAL)

EPSS: 0.10%

updated 2026-03-24T06:31:20

2 posts

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthenticated users, which bypasses the intended email-confirmation flow and immediately triggers irreversible account anonymization. This makes it possible for un

offseq@infosec.exchange at 2026-03-25T01:30:30.000Z ##

🚨 CRITICAL: CVE-2026-4283 in WP DSGVO Tools (GDPR) plugin allows unauthenticated attackers to irreversibly destroy non-admin accounts via 'super-unsubscribe' AJAX. All versions ≤3.1.38 affected. Remove '[unsubscribe_form]' & monitor for abuse. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec

##

thehackerwire@mastodon.social at 2026-03-24T05:26:09.000Z ##

🔴 CVE-2026-4283 - Critical (9.1)

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthentica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4639
(8.8 HIGH)

EPSS: 0.10%

updated 2026-03-24T06:31:14

2 posts

Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby escalating privileges.

ivycyber@privacysafe.social at 2026-03-24T06:02:18.000Z ##

🛡️ #Cybersecurity news & tips across the #fediverse 👇

“🟠 CVE-2026-4639 - High (8.8) Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby es...”

mastodon.social/@thehackerwire

🤖 via RSS feed. Not an endorsement.

##

thehackerwire@mastodon.social at 2026-03-24T05:25:01.000Z ##

🟠 CVE-2026-4639 - High (8.8)

Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby escalating privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4744(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-03-24T06:31:14

1 posts

Out-of-bounds Read vulnerability in rizonesoft Notepad3 (‎scintilla/oniguruma/src modules). This vulnerability is associated with program files regcomp.C‎. This issue affects Notepad3: before 6.25.714.1.

offseq@infosec.exchange at 2026-03-24T04:30:30.000Z ##

🛡️ CRITICAL: CVE-2026-4744 in rizonesoft Notepad3 (<6.25.714.1) enables out-of-bounds reads — possible data disclosure & crashes. Patch ASAP, restrict access, and avoid untrusted files. More info: radar.offseq.com/threat/cve-20 #OffSeq #CVE20264744 #infosec #vuln

##

CVE-2026-4677
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-24T03:31:25

1 posts

Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:23:47.000Z ##

🟠 CVE-2026-4677 - High (8.8)

Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15517(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-03-23T18:30:39

2 posts

A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600 to certain cgi endpoints allows unauthenticated access intended for authenticated users. An attacker may perform privileged HTTP actions without authentication, including firmware upload and configuration operations.

beyondmachines1 at 2026-03-26T08:01:47.345Z ##

TP-Link Patches Multiple Flaws Including Authentication Bypass in Archer NX Routers

TP-Link patched four high-severity vulnerabilities in its Archer NX router series, including a authentication bypass (CVE-2025-15517) that allows unauthenticated attackers to upload malicious firmware and take full control of the device.

**If you own a TP-Link Archer NX router (NX600, NX500, NX210, or NX200), make sure it is isolated from the internet and accessible from trusted networks only. Then plan a quick patch to the latest firmware from the official TP-Link Support portal for your specific hardware version. Disable remote management and ensure the admin interface is only reachable from your internal network.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-03-26T08:01:47.000Z ##

TP-Link Patches Multiple Flaws Including Authentication Bypass in Archer NX Routers

TP-Link patched four high-severity vulnerabilities in its Archer NX router series, including a authentication bypass (CVE-2025-15517) that allows unauthenticated attackers to upload malicious firmware and take full control of the device.

**If you own a TP-Link Archer NX router (NX600, NX500, NX210, or NX200), make sure it is isolated from the internet and accessible from trusted networks only. Then plan a quick patch to the latest firmware from the official TP-Link Support portal for your specific hardware version. Disable remote management and ensure the admin interface is only reachable from your internal network.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-32746
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-23T15:31:40

3 posts

telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.

5 repos

https://github.com/chosenonehacks/CVE-2026-32746

https://github.com/danindiana/cve-2026-32746-mitigation

https://github.com/watchtowrlabs/watchtowr-vs-telnetd-CVE-2026-32746

https://github.com/ekomsSavior/telnet_scan

https://github.com/jeffaf/cve-2026-32746

lobsters@mastodon.social at 2026-03-25T10:30:12.000Z ##

A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils CVE-2026-32746) lobste.rs/s/udbivp #c #security
labs.watchtowr.com/a-32-year-o

##

whitequark@treehouse.systems at 2026-03-25T05:58:33.000Z ##

Yes, the vulnerability is so old, it dates from a time when networks charged on a ‘per-packet basis’.

labs.watchtowr.com/a-32-year-o

##

0xabad1dea@infosec.exchange at 2026-03-25T05:56:26.000Z ##

enjoyed this telnetd analysis. (if you can’t believe anyone has a legitimate operational reason to run telnet, you live in a cozy world indeed) labs.watchtowr.com/a-32-year-o

##

CVE-2025-31277
(8.8 HIGH)

EPSS: 0.27%

updated 2026-03-20T18:53:35.083000

1 posts

The issue was addressed with improved memory handling. This issue is fixed in Safari 18.6, watchOS 11.6, visionOS 2.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6. Processing maliciously crafted web content may lead to memory corruption.

mttaggart@infosec.exchange at 2026-03-24T21:48:09.000Z ##

@gknauss I think the thing is to move to 18.7.3, which is patched.

For devices running versions of iOS prior to 18.6, DarkSword uses CVE-2025-31277, a JIT optimization/type confusion bug which was patched by Apple in iOS 18.6. For devices running iOS 18.6-18.7, DarkSword uses CVE-2025-43529, a garbage collection bug in the Data Flow Graph (DFG) JIT layer of JavaScriptCore which was patched by Apple in iOS 18.7.3 and 26.2 after it was reported by GTIG. Both exploits develop their own fakeobj/addrof primitives, and then build arbitrary read/write primitives the same way on top of them.

I'm unaware of a compelling reason or hardware limitation to not upgrade from 18.6 to 18.7

cloud.google.com/blog/topics/t

##

CVE-2025-43520
(5.5 MEDIUM)

EPSS: 0.47%

updated 2026-03-20T18:32:19

8 posts

A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.

jjtech@infosec.exchange at 2026-03-24T13:45:52.000Z ##

Unfortunately it looks like CVE-2025-43520 was patched in iOS 26.1b4, the exact build I happened to leave my test device on...

I might play around with it on my Mac or in one of the new iOS pccvre VMs though.

##

fmarini@mastodon.social at 2026-03-24T09:09:10.000Z ##

There has been a lot of sloppy reporting regarding DarkSword, with basically every news outlet saying that iOS 18 is vulnerable. It’s not, if you have the latest 18.7.3.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

#iOS #DarkSword

##

fmarini@mastodon.social at 2026-03-24T09:06:55.000Z ##

@peternlewis sloppy reporting, as usual.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:54:03.000Z ##

@mackuba

Google has a more in-depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:52:15.000Z ##

@helge the reporting on DarkSword is incredibly sloppy.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:50:52.000Z ##

@slightlyoff @owa
Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:41:46.000Z ##

@9to5Mac sloppy reporting, as usual.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:35:44.000Z ##

@evacide

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

CVE-2026-33331
(8.2 HIGH)

EPSS: 0.01%

updated 2026-03-20T17:25:56

1 posts

A Stored Cross-Site Scripting (XSS) vulnerability exists in the OpenAPI documentation generation of orpc. If an attacker can control any field within the OpenAPI specification (such as info.description), they can break out of the JSON context and execute arbitrary JavaScript when a user views the generated API documentation. In the packages/openapi/src/plugins/openapi-reference.ts file, the render

thehackerwire@mastodon.social at 2026-03-24T20:26:39.000Z ##

🟠 CVE-2026-33331 - High (8.2)

oRPC is an tool that helps build APIs that are end-to-end type-safe and adhere to OpenAPI standards. Prior to version 1.13.9, a stored cross-site scripting (XSS) vulnerability exists in the OpenAPI documentation generation of orpc. If an attacker ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21992
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-20T15:32:14

1 posts

Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) and Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle

jbhall56@infosec.exchange at 2026-03-24T12:28:46.000Z ##

CVE-2026-21992 can be used without authentication for remote code execution and it may have been exploited in the wild. securityweek.com/oracle-releas

##

CVE-2026-3888
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-18T04:17:30.720000

1 posts

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

5 repos

https://github.com/Many-Hat-Group/Ubuntu-CVE-2026-3888-patcher

https://github.com/netw0rk7/CVE-2026-3888-PoC

https://github.com/fevar54/CVE-2026-3888-POC-all-from-the-Qualys-platform.

https://github.com/TheCyberGeek/CVE-2026-3888-snap-confine-systemd-tmpfiles-LPE

https://github.com/nomaisthere/CVE-2026-3888

knoppix95@mastodon.social at 2026-03-24T19:37:47.000Z ##

A new Ubuntu vulnerability (CVE-2026-3888) allows local users to escalate privileges to root via a timing-based exploit in Ubuntu Desktop 24.04 and newer. ⏱️
The flaw affects systems using older versions of snapd and requires immediate patching. 🔐

🔗 infosecurity-magazine.com/news

#TechNews #Ubuntu #Linux #SecurityFlaw #CVE #PrivilegeEscalation #RootAccess #Cybersecurity #LinuxSecurity #PatchNow #Snap #SystemVulnerabilities #DataProtection #TechUpdates #Privacy #OpenSource #Canonical

##

CVE-2026-32116
(8.1 HIGH)

EPSS: 0.08%

updated 2026-03-16T18:02:21.613000

1 posts

Magic Wormhole makes it possible to get arbitrary-sized files and directories from one computer to another. From 0.21.0 to before 0.23.0, receiving a file (wormhole receive) from a malicious party could result in overwriting critical local files, including ~/.ssh/authorized_keys and .bashrc. This could be used to compromise the receiver's computer. Only the sender of the file (the party who runs w

magicwormhole@fosstodon.org at 2026-03-25T19:58:28.000Z ##

This month's exciting release fixes our first official[1] CVE for magic wormhole!

To improve your local machine's safety, please upgrade to magic wormhole 0.23.0

pypi.org/project/magic-wormhol

[1] nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-26123
(5.5 MEDIUM)

EPSS: 0.05%

updated 2026-03-10T21:32:18

2 posts

Cwe is not in rca categories in Microsoft Authenticator allows an unauthorized attacker to disclose information locally.

BugBountyShorts at 2026-03-25T23:40:25.636Z ##

Microsoft Authenticator’s Unclaimed Deep Link: A Full Account Takeover Story (CVE-2026–26123)
This vulnerability is an Authentication Bypass, specifically a session hijacking issue affecting the Microsoft Authenticator app. The root cause was improper handling of deep links within the application, which allowed malicious actors to craft unclaimed deep links containing account tokens. When users clicked these links, their active sessions were hijacked, resulting in full account takeover without requiring any user interaction other than clicking a link. To exploit this, an attacker could generate a malicious deep link with an embedded account token and share it via SMS or email. The session hijack occurred due to the application's failure to verify the authenticity of deep links before processing them. This vulnerability has been assigned CVE-2026–26123. Microsoft rewarded $50,000 for this find and immediately patched the issue. To prevent similar vulnerabilities, it is crucial to thoroughly validate and sanitize all user-controlled inputs, including deep links. Key lesson: Always verify the authenticity of user-supplied data before processing it.

infosecwriteups.com/microsoft-

##

BugBountyShorts@infosec.exchange at 2026-03-25T23:40:25.000Z ##

Microsoft Authenticator’s Unclaimed Deep Link: A Full Account Takeover Story (CVE-2026–26123)
This vulnerability is an Authentication Bypass, specifically a session hijacking issue affecting the Microsoft Authenticator app. The root cause was improper handling of deep links within the application, which allowed malicious actors to craft unclaimed deep links containing account tokens. When users clicked these links, their active sessions were hijacked, resulting in full account takeover without requiring any user interaction other than clicking a link. To exploit this, an attacker could generate a malicious deep link with an embedded account token and share it via SMS or email. The session hijack occurred due to the application's failure to verify the authenticity of deep links before processing them. This vulnerability has been assigned CVE-2026–26123. Microsoft rewarded $50,000 for this find and immediately patched the issue. To prevent similar vulnerabilities, it is crucial to thoroughly validate and sanitize all user-controlled inputs, including deep links. Key lesson: Always verify the authenticity of user-supplied data before processing it. #BugBounty #Cybersecurity #AuthenticationBypass #SessionHijacking #Infosec

infosecwriteups.com/microsoft-

##

CVE-2026-27598
(6.5 MEDIUM)

EPSS: 0.11%

updated 2026-02-25T20:23:36.483000

1 posts

Dagu is a workflow engine with a built-in Web user interface. In versions up to and including 1.16.7, the `CreateNewDAG` API endpoint (`POST /api/v1/dags`) does not validate the DAG name before passing it to the file store. An authenticated user with DAG write permissions can write arbitrary YAML files anywhere on the filesystem (limited by the process permissions). Since dagu executes DAG files a

thehackerwire@mastodon.social at 2026-03-24T20:29:21.000Z ##

🟠 CVE-2026-33344 - High (8.1)

Dagu is a workflow engine with a built-in Web user interface. From version 2.0.0 to before version 2.3.1, the fix for CVE-2026-27598 added ValidateDAGName to CreateNewDAG and rewrote generateFilePath to use filepath.Base. This patched the CREATE p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27210(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-02-23T22:27:55

1 posts

### Impact The hot spot `attributes` configuration property allowed any attribute to be set, including HTML event handler attributes, allowing for potential XSS attacks. This affects websites hosting the standalone viewer HTML file and any other use of untrusted JSON config files (bypassing the protections of the `escapeHTML` parameter). As certain events fire without any additional user interacti

InfobloxThreatIntel@infosec.exchange at 2026-03-24T15:00:51.000Z ##

Dios mio! While researching a particular type of Colombian folk music, we stumbled across a .edu domain selling... accordions? Our first thought was potentially domain hijacking, but it appears to be more likely an exploitation of CVE-2026-27210 (TLDR; cross-site scripting). While the vulnerability has been patched in the plugin itself, not all pages have updated their plugins, and search engines have already indexed the poisoned pages! Pivoting led to 50+ additional domains found spread across three risky TLDs: .sbs, .pics, and .shop. The domains on .sbs and .pics appear to be config servers to exploit the vulnerability; the domains on .shop are the landing pages where victims can be scammed.

IOCs:
000o[.]sbs,0pen[.]sbs,123buys[.]shop,123me[.]shop,1bg[.]pics,1ki[.]pics,1mage[.]sbs,1ql[.]pics,1ty[.]pics,1vi[.]pics,1wr[.]pics,2ty[.]pics,569oagri[.]shop,66buys[.]shop,6ip[.]pics,6ym[.]pics,7rt[.]pics,8pi[.]pics,99buys[.]shop,99i[.]pics,9gwe[.]shop,a25n[.]shop,bk2[.]pics,bk59t[.]shop,buysok[.]shop,c68k[.]shop,cc1[.]pics,doo[.]pics,ep7[.]pics,estore-1[.]com,g9gvv[.]sbs,gaer896[.]shop,gm5[.]pics,gosok[.]shop,gt3[.]pics,h66p[.]shop,hh6[.]pics,iilvw[.]sbs,im9[.]pics,img1[.]sbs,in6[.]pics,jj3[.]pics,kk9[.]pics,lilil[.]sbs,llvvw[.]sbs,m66p6[.]shop,mebuys[.]shop,mg6[.]pics,mh8f6k[.]shop,mkk[.]pics,ms1[.]pics,nn6[.]pics,onsgs[.]com,p6[.]pics,p888p[.]shop,pan1[.]top,pic1[.]sbs,pic2[.]sbs,pt11[.]sbs,py3y[.]com,qq1[.]pics,rey89p[.]shop,shop56[.]shop,t88t8[.]shop,tp1[.]pics,tp9[.]pics,trues[.]sbs,up9[.]pics,upimg[.]sbs,uu2[.]pics,vt5[.]pics,vteyu[.]shop,vvf1[.]sbs,vvp1[.]sbs,w2w[.]pics,w88p[.]shop,wp59q[.]shop,wvlll[.]sbs,wvv1[.]sbs,wvvvv[.]sbs,x2p[.]pics,xyaer548[.]shop,yi1[.]pics

#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #seo_poisoning #seopoisoning

##

CVE-2025-43529
(8.8 HIGH)

EPSS: 0.17%

updated 2025-12-17T21:31:01

1 posts

A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, tvOS 26.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated at

8 repos

https://github.com/kmeps4/bugtest

https://github.com/SimoesCTT/CTT-Apple-Silicon-Refraction

https://github.com/zeroxjf/WebKit-UAF-ANGLE-OOB-Analysis

https://github.com/SgtBattenHA/Analysis

https://github.com/sakyu7/sakyu7.github.io

https://github.com/jir4vv1t/CVE-2025-43529

https://github.com/bjrjk/CVE-2025-43529

https://github.com/SimoesCTT/Convergent-Time-Theory-Enhanced-iOS-Safari-RCE-CVE-2025-43529-

mttaggart@infosec.exchange at 2026-03-24T21:48:09.000Z ##

@gknauss I think the thing is to move to 18.7.3, which is patched.

For devices running versions of iOS prior to 18.6, DarkSword uses CVE-2025-31277, a JIT optimization/type confusion bug which was patched by Apple in iOS 18.6. For devices running iOS 18.6-18.7, DarkSword uses CVE-2025-43529, a garbage collection bug in the Data Flow Graph (DFG) JIT layer of JavaScriptCore which was patched by Apple in iOS 18.7.3 and 26.2 after it was reported by GTIG. Both exploits develop their own fakeobj/addrof primitives, and then build arbitrary read/write primitives the same way on top of them.

I'm unaware of a compelling reason or hardware limitation to not upgrade from 18.6 to 18.7

cloud.google.com/blog/topics/t

##

CVE-2025-24201
(7.1 HIGH)

EPSS: 0.10%

updated 2025-11-13T21:31:15

1 posts

An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been e

3 repos

https://github.com/5ky9uy/glass-cage-i18-2025-24085-and-cve-2025-24201

https://github.com/The-Maxu/CVE-2025-24201-WebKit-Vulnerability-Detector-PoC-

https://github.com/JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201

Mozilla@activitypub.awakari.com at 2026-03-24T17:59:15.000Z ## Your iPhone Has a Security Hole That Hackers Already Found — And Apple Needs You to Act Now Apple issued emergency patches for a WebKit zero-day vulnerability already exploited in sophisticated t...

#CybersecurityUpdate #MobileDevPro #Apple #security #update #CVE-2025-24201 #iOS #18.3.2 #iPhone #zero-day #exploit

Origin | Interest | Match ##

CVE-2023-38606
(5.5 MEDIUM)

EPSS: 0.12%

updated 2025-10-31T14:43:10.643000

2 posts

This issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, iOS 16.6 and iPadOS 16.6, tvOS 16.6, macOS Big Sur 11.7.9, macOS Ventura 13.5, watchOS 9.6. An app may be able to modify sensitive kernel state. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15

decio at 2026-03-26T14:50:23.444Z ##

👆
🖼️
"Analysis of the kit showed that it relies on the exploitation of many previously patched vulnerabilities and also includes exploits for CVE-2023-32434 and CVE-2023-38606. These two vulnerabilities particularly caught our attention because they had been first first discovered as zero-days used in Operation Triangulation. "
👇
securelist.com/coruna-framewor

ah oueee... ça c'est une jolie "coïncidence" & plot twist

intéressant maintenant de voir quelles etaient les cibles...

##

decio@infosec.exchange at 2026-03-26T14:50:23.000Z ##

👆
🖼️
"Analysis of the kit showed that it relies on the exploitation of many previously patched vulnerabilities and also includes exploits for CVE-2023-32434 and CVE-2023-38606. These two vulnerabilities particularly caught our attention because they had been first first discovered as zero-days used in Operation Triangulation. "
👇
securelist.com/coruna-framewor

ah oueee... ça c'est une jolie "coïncidence" & plot twist

intéressant maintenant de voir quelles etaient les cibles...

#CyberVeille #Triangulation

##

CVE-2023-32434
(7.8 HIGH)

EPSS: 61.25%

updated 2025-10-23T18:48:05.013000

4 posts

An integer overflow was addressed with improved input validation. This issue is fixed in watchOS 9.5.2, macOS Big Sur 11.7.8, iOS 15.7.7 and iPadOS 15.7.7, macOS Monterey 12.6.7, watchOS 8.8.1, iOS 16.5.1 and iPadOS 16.5.1, macOS Ventura 13.4.1. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited against v

2 repos

https://github.com/alfiecg24/Trigon

https://github.com/rkrakesh524/oob_entry

decio at 2026-03-26T14:50:23.444Z ##

👆
🖼️
"Analysis of the kit showed that it relies on the exploitation of many previously patched vulnerabilities and also includes exploits for CVE-2023-32434 and CVE-2023-38606. These two vulnerabilities particularly caught our attention because they had been first first discovered as zero-days used in Operation Triangulation. "
👇
securelist.com/coruna-framewor

ah oueee... ça c'est une jolie "coïncidence" & plot twist

intéressant maintenant de voir quelles etaient les cibles...

##

oversecurity@mastodon.social at 2026-03-26T08:20:04.000Z ##

Coruna: the framework used in Operation Triangulation

Kaspersky GReAT experts look into the Coruna exploit kit targeting iPhones. We discovered that the kernel exploit for CVE-2023-32434 and...

🔗️ [Securelist] link.is.it/XwhkQ8

##

decio@infosec.exchange at 2026-03-26T14:50:23.000Z ##

👆
🖼️
"Analysis of the kit showed that it relies on the exploitation of many previously patched vulnerabilities and also includes exploits for CVE-2023-32434 and CVE-2023-38606. These two vulnerabilities particularly caught our attention because they had been first first discovered as zero-days used in Operation Triangulation. "
👇
securelist.com/coruna-framewor

ah oueee... ça c'est une jolie "coïncidence" & plot twist

intéressant maintenant de voir quelles etaient les cibles...

#CyberVeille #Triangulation

##

oversecurity@mastodon.social at 2026-03-26T08:20:04.000Z ##

Coruna: the framework used in Operation Triangulation

Kaspersky GReAT experts look into the Coruna exploit kit targeting iPhones. We discovered that the kernel exploit for CVE-2023-32434 and...

🔗️ [Securelist] link.is.it/XwhkQ8

##

CVE-2026-3650
(0 None)

EPSS: 0.00%

2 posts

N/A

technadu at 2026-03-26T11:32:07.763Z ##

CVE-2026-3650 in Grassroots DICOM (GDCM):

• Memory leak via malformed DICOM parsing
• CVSS 7.5 → DoS risk
• No patch, no maintainer response
• Impacts healthcare imaging pipelines
Mitigate via isolation + strict input controls.

Source: hipaajournal.com/grassroots-di

Follow @technadu for more.

##

technadu@infosec.exchange at 2026-03-26T11:32:07.000Z ##

CVE-2026-3650 in Grassroots DICOM (GDCM):

• Memory leak via malformed DICOM parsing
• CVSS 7.5 → DoS risk
• No patch, no maintainer response
• Impacts healthcare imaging pipelines
Mitigate via isolation + strict input controls.

Source: hipaajournal.com/grassroots-di

Follow @technadu for more.

#InfoSec #HealthcareSecurity #Vulnerability

##

CVE-2026-15518
(0 None)

EPSS: 0.00%

4 posts

N/A

agowa338@chaos.social at 2026-03-26T09:05:52.000Z ##

@heisec

Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.

feedly.com/cve/CVE-2026-15518 and feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations

feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access

##

agowa338@chaos.social at 2026-03-26T09:00:45.000Z ##

@heisec

Ehm:

> Für die Ausnutzung zwei weiterer Schwachstellen (CVE-2026-15518, CVE-2026-15519) benötigen Angreifer Adminrechte. Ist das gegeben, können sie eigene Befehle auf Ebene des Betriebssystems ausführen.

Wenn jemand Adminrechte dafür braucht, ist das KEINE Schwachstelle...

##

agowa338@chaos.social at 2026-03-26T09:05:52.000Z ##

@heisec

Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.

feedly.com/cve/CVE-2026-15518 and feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations

feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access

##

agowa338@chaos.social at 2026-03-26T09:00:45.000Z ##

@heisec

Ehm:

> Für die Ausnutzung zwei weiterer Schwachstellen (CVE-2026-15518, CVE-2026-15519) benötigen Angreifer Adminrechte. Ist das gegeben, können sie eigene Befehle auf Ebene des Betriebssystems ausführen.

Wenn jemand Adminrechte dafür braucht, ist das KEINE Schwachstelle...

##

CVE-2026-15519
(0 None)

EPSS: 0.00%

4 posts

N/A

agowa338@chaos.social at 2026-03-26T09:05:52.000Z ##

@heisec

Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.

feedly.com/cve/CVE-2026-15518 and feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations

feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access

##

agowa338@chaos.social at 2026-03-26T09:00:45.000Z ##

@heisec

Ehm:

> Für die Ausnutzung zwei weiterer Schwachstellen (CVE-2026-15518, CVE-2026-15519) benötigen Angreifer Adminrechte. Ist das gegeben, können sie eigene Befehle auf Ebene des Betriebssystems ausführen.

Wenn jemand Adminrechte dafür braucht, ist das KEINE Schwachstelle...

##

agowa338@chaos.social at 2026-03-26T09:05:52.000Z ##

@heisec

Außerdem, wenn man in die CVEs kuckt, habt ihr das komplett Falsch dargestellt.

feedly.com/cve/CVE-2026-15518 and feedly.com/cve/CVE-2026-15519: that allows unauthenticated attackers to decrypt sensitive device configurations

feedly.com/cve/CVE-2025-15605: An authenticated attacker with low privileges and adjacent network access

##

agowa338@chaos.social at 2026-03-26T09:00:45.000Z ##

@heisec

Ehm:

> Für die Ausnutzung zwei weiterer Schwachstellen (CVE-2026-15518, CVE-2026-15519) benötigen Angreifer Adminrechte. Ist das gegeben, können sie eigene Befehle auf Ebene des Betriebssystems ausführen.

Wenn jemand Adminrechte dafür braucht, ist das KEINE Schwachstelle...

##

CVE-2026-33526
(0 None)

EPSS: 1.98%

2 posts

N/A

offseq at 2026-03-26T01:30:27.610Z ##

🚨 CVE-2026-33526: Critical Use-After-Free in Squid (<7.5) allows remote attackers to crash Squid via ICP traffic. icp_access rules are ineffective. Upgrade to 7.5+ or disable ICP (icp_port=0) ASAP! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-26T01:30:27.000Z ##

🚨 CVE-2026-33526: Critical Use-After-Free in Squid (<7.5) allows remote attackers to crash Squid via ICP traffic. icp_access rules are ineffective. Upgrade to 7.5+ or disable ICP (icp_port=0) ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Squid #Vuln #DoS

##

CVE-2026-33918
(0 None)

EPSS: 0.03%

4 posts

N/A

thehackerwire@mastodon.social at 2026-03-26T01:03:46.000Z ##

🟠 CVE-2026-33918 - High (7.6)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:01:14.000Z ##

🟠 CVE-2026-33918 - High (7.6)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:03:46.000Z ##

🟠 CVE-2026-33918 - High (7.6)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:01:14.000Z ##

🟠 CVE-2026-33918 - High (7.6)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the billing file-download endpoint `interface/billing/get_claim_file.php` only verifies that the caller has a valid ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:03:36.000Z ##

🟠 CVE-2026-33917 - High (8.8)

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:01:04.000Z ##

🟠 CVE-2026-33917 - High (8.8)

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:03:36.000Z ##

🟠 CVE-2026-33917 - High (8.8)

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:01:04.000Z ##

🟠 CVE-2026-33917 - High (8.8)

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.3 contais a SQL injection vulnerability in the ajax_save CAMOS form that can be exploited by authenticated attackers. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33932
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-26T01:01:16.000Z ##

🟠 CVE-2026-33932 - High (7.6)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a stored cross-site scripting vulnerability in the CCDA document preview allows an attacker who can upload or send a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:01:16.000Z ##

🟠 CVE-2026-33932 - High (7.6)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a stored cross-site scripting vulnerability in the CCDA document preview allows an attacker who can upload or send a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34056
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-26T01:00:33.000Z ##

🟠 CVE-2026-34056 - High (7.7)

OpenEMR is a free and open source electronic health records and medical practice management application. A Broken Access Control vulnerability in OpenEMR up to and including version 8.0.0.3 allows low-privilege users to view and download Ensora eR...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:00:33.000Z ##

🟠 CVE-2026-34056 - High (7.7)

OpenEMR is a free and open source electronic health records and medical practice management application. A Broken Access Control vulnerability in OpenEMR up to and including version 8.0.0.3 allows low-privilege users to view and download Ensora eR...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34055
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-26T01:00:23.000Z ##

🟠 CVE-2026-34055 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the legacy patient notes functions in `library/pnotes.inc.php` perform updates and deletes using `WHERE id = ?` with...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T01:00:23.000Z ##

🟠 CVE-2026-34055 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, the legacy patient notes functions in `library/pnotes.inc.php` perform updates and deletes using `WHERE id = ?` with...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23514
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-26T00:00:17.000Z ##

🟠 CVE-2026-23514 - High (8.8)

Kiteworks is a private data network (PDN). Versions 9.2.0 and 9.2.1 of Kiteworks Core have an access control vulnerability that allows authenticated users to access unauthorized content. Upgrade Kiteworks Core to version 9.2.2 or later to receive ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-26T00:00:17.000Z ##

🟠 CVE-2026-23514 - High (8.8)

Kiteworks is a private data network (PDN). Versions 9.2.0 and 9.2.1 of Kiteworks Core have an access control vulnerability that allows authenticated users to access unauthorized content. Upgrade Kiteworks Core to version 9.2.2 or later to receive ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:35:39.000Z ##

🟠 CVE-2026-29187 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:20:27.000Z ##

🟠 CVE-2026-29187 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:35:39.000Z ##

🟠 CVE-2026-29187 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:20:27.000Z ##

🟠 CVE-2026-29187 - High (8.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, a Blind SQL Injection vulnerability exists in the Patient Search functionality (/interface/new/new_search_popup.php)...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33913
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-25T23:20:25.000Z ##

🟠 CVE-2026-33913 - High (7.7)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated user with access to the Carecoordination module can upload a crafted CCDA document containing `` to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-25T23:20:25.000Z ##

🟠 CVE-2026-33913 - High (7.7)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0.3, an authenticated user with access to the Carecoordination module can upload a crafted CCDA document containing `` to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32628
(0 None)

EPSS: 0.03%

1 posts

N/A

LLMs@activitypub.awakari.com at 2026-03-26T09:43:00.000Z ## A 56,000-Star AI App Shipped With a Textbook SQL Injection Flaw A 56,000-star LLM app ships with raw string concatenation in its database connector. I found it, reported it, got the CVE. Here is th...

#cybersecurity #ai-security #offensive-security #vulnerability-research #anythingllm-cve #cve-2026-32628 #ai-agent-security #sql-injection-flaw

Origin | Interest | Match ##

CVE-2026-30976
(0 None)

EPSS: 0.06%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-25T21:40:45.000Z ##

🟠 CVE-2026-30976 - High (8.6)

Sonarr is a PVR for Usenet and BitTorrent users. In versions on the 4.x branch prior to 4.0.17.2950, an unauthenticated remote attacker can potentially read any file readable by the Sonarr process. These include application configuration files (co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

_r_netsec@infosec.exchange at 2026-03-25T12:58:05.000Z ##

CVE-2026-33656: EspoCRM ≤ 9.3.3 — Formula engine ACL gap + path traversal → authenticated RCE (full write-up + PoC) jivasecurity.com/writeups/espo

##

CVE-2026-28373
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2026-33870
(0 None)

EPSS: 0.00%

1 posts

N/A

chrisvest@mastodon.social at 2026-03-25T00:33:41.000Z ##

We're released Netty 4.2.11 and 4.1.132. These contain many bug fixes, and fixes for two CVEs both rated *high*:

- CVE-2026-33871: HTTP/2 CONTINUATION frame flood Denial of Service.
- CVE-2026-33870: HTTP/1.1 Request Smuggling vulnerability in chunked encoding parsing.

Release notes for 4.2.11: netty.io/news/2026/03/24/4-2-1
Release notes for 4.1.132: netty.io/news/2026/03/24/4-1-1

Also of note: We had 17 people contribute to Netty 4.2.11, of which 5 are new first time contributors 😲

#netty #java

##

CVE-2026-33871
(0 None)

EPSS: 0.00%

1 posts

N/A

chrisvest@mastodon.social at 2026-03-25T00:33:41.000Z ##

We're released Netty 4.2.11 and 4.1.132. These contain many bug fixes, and fixes for two CVEs both rated *high*:

- CVE-2026-33871: HTTP/2 CONTINUATION frame flood Denial of Service.
- CVE-2026-33870: HTTP/1.1 Request Smuggling vulnerability in chunked encoding parsing.

Release notes for 4.2.11: netty.io/news/2026/03/24/4-2-1
Release notes for 4.1.132: netty.io/news/2026/03/24/4-1-1

Also of note: We had 17 people contribute to Netty 4.2.11, of which 5 are new first time contributors 😲

#netty #java

##

CVE-2026-33329
(0 None)

EPSS: 0.07%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-24T20:26:29.000Z ##

🟠 CVE-2026-33329 - High (8.1)

FileRise is a self-hosted web file manager / WebDAV server. From version 1.0.1 to before version 3.10.0, the resumableIdentifier parameter in the Resumable.js chunked upload handler (UploadModel::handleUpload()) is concatenated directly into files...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33340
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-24T20:12:47.000Z ##

🔴 CVE-2026-33340 - Critical (9.1)

LoLLMs WEBUI provides the Web user interface for Lord of Large Language and Multi modal Systems. A critical Server-Side Request Forgery (SSRF) vulnerability has been identified in all known existing versions of `lollms-webui`. The `@router.post("/...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30840
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-24T20:12:37.000Z ##

🟠 CVE-2026-33399 - High (7.7)

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, the SSRF fix applied in version 4.6.2 for CVE-2026-30839 and CVE-2026-30840 is incomplete. The validate_webhook_url_for_ssrf() protection was added to t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30839
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-24T20:12:37.000Z ##

🟠 CVE-2026-33399 - High (7.7)

Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.7.0, the SSRF fix applied in version 4.6.2 for CVE-2026-30839 and CVE-2026-30840 is incomplete. The validate_webhook_url_for_ssrf() protection was added to t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33307
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-24T02:17:05.000Z ##

🟠 CVE-2026-33307 - High (7.5)

Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. In versions prior to 0.12.3 and 0.13.0, code for client certificate verification imported the certificate chain sent by the client into a fixed size `gnutls_x509_crt_t x509[]` array with...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33250
(0 None)

EPSS: 0.21%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-24T00:39:20.000Z ##

🟠 CVE-2026-33250 - High (7.5)

Freeciv21 is a free open source, turn-based, empire-building strategy game. Versions prior to 3.1.1 crash with a stack overflow when receiving specially-crafted packets. A remote attacker can use this to take down any public server. A malicious se...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites