## Updated at UTC 2026-03-21T17:17:17.366043

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2006-10002 7.5 0.06% 1 0 2026-03-21T12:16:15.827000 XML::Parser versions through 2.45 for Perl could overflow the pre-allocated buff
CVE-2026-4373 7.5 0.10% 2 0 2026-03-21T07:16:10.380000 The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via
CVE-2026-4261 8.8 0.04% 2 0 2026-03-21T04:17:44.223000 The Expire Users plugin for WordPress is vulnerable to Privilege Escalation in a
CVE-2026-3478 7.2 0.07% 2 0 2026-03-21T04:17:25.807000 The Content Syndication Toolkit plugin for WordPress is vulnerable to Server-Sid
CVE-2026-1648 7.2 0.04% 2 0 2026-03-21T04:16:54.310000 The Performance Monitor plugin for WordPress is vulnerable to Server-Side Reques
CVE-2026-1313 8.3 0.04% 2 0 2026-03-21T04:16:52.630000 The MimeTypes Link Icons plugin for WordPress is vulnerable to Server-Side Reque
CVE-2026-24060 9.1 0.02% 3 0 2026-03-21T00:32:49 Service information is not encrypted when transmitted as BACnet packets over th
CVE-2026-3584 9.8 0.22% 3 0 2026-03-21T00:32:48 The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in al
CVE-2026-25192 9.4 0.13% 3 0 2026-03-21T00:32:47 WebSocket endpoints lack proper authentication mechanisms, enabling attackers to
CVE-2026-29796 9.4 0.10% 3 0 2026-03-21T00:31:52 WebSocket endpoints lack proper authentication mechanisms, enabling attackers to
CVE-2026-23536 7.5 0.07% 1 0 2026-03-21T00:31:45 A security issue was discovered in the Feast Feature Server's `/read-document` e
CVE-2026-21992 9.8 0.03% 7 1 2026-03-20T22:16:26.933000 Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware
CVE-2026-20131 10.0 0.88% 11 3 2026-03-20T22:16:26.120000 A vulnerability in the web-based management interface of Cisco Secure Firewall M
CVE-2026-32013 8.8 0.08% 1 0 2026-03-20T21:36:50 ## Impact The gateway `agents.files.get` and `agents.files.set` methods allowed
CVE-2026-32749 7.6 0.04% 1 0 2026-03-20T21:35:45 ### Summary POST /api/import/importSY and POST /api/import/importZipMd write upl
CVE-2026-33142 8.1 0.03% 1 0 2026-03-20T21:33:29 The fix for GHSA-p5g2-jm85-8g35 (ClickHouse SQL injection via aggregate query pa
CVE-2026-33010 8.1 0.03% 1 0 2026-03-20T21:32:24 ### Summary When the HTTP server is enabled (`MCP_HTTP_ENABLED=true`), the appli
CVE-2025-54068 9.8 48.85% 3 5 template 2026-03-20T21:28:57 ### Impact In Livewire v3 (≀ 3.6.3), a vulnerability allows unauthenticated atta
CVE-2026-33128 7.5 0.02% 1 0 2026-03-20T21:27:42 ## Summary `createEventStream` in h3 is vulnerable to Server-Sent Events (SSE)
CVE-2026-33068 None 0.14% 2 0 2026-03-20T21:24:22 Claude Code resolved the permission mode from settings files, including the repo
CVE-2026-33054 10.0 0.02% 2 0 2026-03-20T21:23:23 #### Summary A Path Traversal vulnerability allows any user (or attacker) supply
CVE-2026-33043 8.1 0.03% 4 0 2026-03-20T21:23:01 ### Summary `/objects/phpsessionid.json.php` exposes the current PHP session ID
CVE-2026-33039 8.6 0.01% 2 0 2026-03-20T21:22:41 ## Summary The `plugin/LiveLinks/proxy.php` endpoint validates user-supplied URL
CVE-2026-33038 8.1 0.04% 2 0 2026-03-20T21:22:32 ## Summary The `install/checkConfiguration.php` endpoint performs full applicati
CVE-2026-33036 7.5 0.04% 2 0 2026-03-20T21:22:16 ## Summary The fix for CVE-2026-26278 added entity expansion limits (`maxTotalE
CVE-2026-33012 7.5 0.10% 2 0 2026-03-20T21:21:56 `DefaultHtmlErrorResponseBodyProvider` in `io.micronaut:micronaut-http-server` s
CVE-2026-32940 9.3 0.05% 2 0 2026-03-20T21:21:11 # SanitizeSVG bypass via data:text/xml in getDynamicIcon (incomplete fix for CVE
CVE-2026-32938 9.9 0.09% 2 0 2026-03-20T21:21:06 ### Summary In SiYuan, `/api/lute/html2BlockDOM` on the desktop copies local fi
CVE-2026-32767 9.8 0.02% 1 0 2026-03-20T21:18:23 ## Summary SiYuan Note v3.6.0 (and likely prior versions) contains an authoriza
CVE-2026-33155 0 0.04% 1 0 2026-03-20T21:17:15.910000 DeepDiff is a project focused on Deep Difference and search of any Python data.
CVE-2026-33154 7.5 0.04% 1 0 2026-03-20T21:17:15.740000 dynaconf is a configuration management tool for Python. Prior to version 3.2.13,
CVE-2026-32025 7.5 0.05% 1 0 2026-03-20T21:13:30 This issue is a browser-origin WebSocket auth chain on local loopback deployment
CVE-2026-32014 8.0 0.02% 1 0 2026-03-20T21:12:25 ## Summary A paired node device could reconnect with spoofed `platform`/`device
CVE-2026-22172 10.0 0.01% 1 0 2026-03-20T21:04:19 ### Summary A logic flaw in the OpenClaw gateway WebSocket connect path allowed
CVE-2026-22732 9.1 0.01% 2 0 2026-03-20T20:42:26 When applications specify HTTP response headers for servlet applications using S
CVE-2026-22731 8.2 0.04% 1 0 2026-03-20T20:41:31 Spring Boot applications with Actuator can be vulnerable to an "Authentication B
CVE-2026-33135 9.3 0.03% 1 0 2026-03-20T19:25:45.043000 WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below hav
CVE-2026-33017 0 0.44% 4 1 2026-03-20T19:16:17.980000 Langflow is a tool for building and deploying AI-powered agents and workflows. I
CVE-2026-32710 8.5 0.26% 1 0 2026-03-20T19:16:16.670000 MariaDB server is a community developed fork of MySQL server. An authenticated u
CVE-2025-32432 10.0 89.44% 3 4 template 2026-03-20T19:14:20.843000 Craft is a flexible, user-friendly CMS for creating custom digital experiences o
CVE-2025-43510 7.8 0.40% 3 0 2026-03-20T18:39:56.413000 A memory corruption issue was addressed with improved lock state checking. This
CVE-2025-43520 5.5 0.41% 3 0 2026-03-20T18:32:19 A memory corruption issue was addressed with improved memory handling. This issu
CVE-2025-31277 8.8 0.39% 3 0 2026-03-20T18:32:18 The issue was addressed with improved memory handling. This issue is fixed in wa
CVE-2026-4493 8.8 0.05% 1 0 2026-03-20T18:31:30 A vulnerability was determined in Tenda A18 Pro 02.03.02.28. The impacted elemen
CVE-2026-4490 8.8 0.05% 1 0 2026-03-20T18:31:29 A flaw has been found in Tenda A18 Pro 02.03.02.28. This issue affects the funct
CVE-2026-4492 8.8 0.05% 1 0 2026-03-20T18:31:28 A vulnerability was found in Tenda A18 Pro 02.03.02.28. The affected element is
CVE-2026-32989 8.8 0.05% 1 0 2026-03-20T18:31:27 Precurio Intranet Portal 4.4 contains a cross-site request forgery vulnerability
CVE-2026-4489 8.8 0.05% 1 0 2026-03-20T18:31:27 A vulnerability was detected in Tenda A18 Pro 02.03.02.28. This vulnerability af
CVE-2026-32985 9.8 0.64% 2 0 2026-03-20T18:16:16.477000 Xerte Online Toolkits versions 3.14 and earlier contain an unauthenticated arbit
CVE-2026-32303 7.6 0.02% 1 0 2026-03-20T18:16:14.593000 Cryptomator encrypts data being stored on cloud infrastructure. Prior to version
CVE-2026-33001 8.8 0.11% 1 0 2026-03-20T18:08:15.507000 Jenkins 2.554 and earlier, LTS 2.541.2 and earlier does not safely handle symbol
CVE-2026-4342 8.8 0.04% 2 1 2026-03-20T17:26:11 A security issue was discovered in ingress-nginx where a combination of Ingress
CVE-2026-4491 8.8 0.05% 1 0 2026-03-20T17:17:00.240000 A vulnerability has been found in Tenda A18 Pro 02.03.02.28. Impacted is the fun
CVE-2026-4488 8.8 0.04% 1 0 2026-03-20T16:16:19.093000 A vulnerability was identified in UTT HiPER 1250GW up to 3.2.7-210907-180535. Af
CVE-2026-32701 7.5 0.02% 1 0 2026-03-20T15:56:45 **Summary** Qwik City improperly inferred arrays from dotted form field names d
CVE-2026-4486 8.8 0.08% 1 0 2026-03-20T15:31:20 A vulnerability was found in D-Link DIR-513 1.10. This affects the function form
CVE-2026-4487 8.8 0.04% 1 0 2026-03-20T15:16:23.850000 A vulnerability was determined in UTT HiPER 1200GW up to 2.5.3-170306. This impa
CVE-2026-4428 7.4 0.02% 1 0 2026-03-20T13:39:46.493000 A logic error in CRL distribution point validation in AWS-LC before 1.71.0 cause
CVE-2026-32011 7.5 0.04% 1 0 2026-03-20T13:39:46.493000 OpenClaw versions prior to 2026.3.2 contain a denial of service vulnerability in
CVE-2026-32194 9.8 0.10% 2 1 2026-03-20T13:39:46.493000 Improper neutralization of special elements used in a command ('command injectio
CVE-2026-23659 8.6 0.11% 1 0 2026-03-20T13:39:46.493000 Exposure of sensitive information to an unauthorized actor in Azure Data Factory
CVE-2026-30836 10.0 0.01% 1 0 2026-03-20T13:39:46.493000 Step CA is an online certificate authority for secure, automated certificate man
CVE-2026-32169 10.0 0.09% 1 0 2026-03-20T13:39:46.493000 Server-side request forgery (ssrf) in Azure Cloud Shell allows an unauthorized a
CVE-2026-4427 7.5 0.07% 1 0 2026-03-20T13:39:46.493000 A flaw was found in pgproto3. A malicious or compromised PostgreSQL server can e
CVE-2025-71260 8.8 6.54% 1 1 2026-03-20T13:39:46.493000 BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserializa
CVE-2026-4478 8.1 0.01% 3 0 2026-03-20T13:37:50.737000 A vulnerability was identified in Yi Technology YI Home Camera 2 2.1.1_201710241
CVE-2026-33057 9.8 0.12% 1 0 2026-03-20T13:37:50.737000 Mesop is a Python-based UI framework that allows users to build web applications
CVE-2026-22324 8.1 0.11% 1 0 2026-03-20T13:37:50.737000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-33075 0 0.03% 1 0 2026-03-20T13:37:50.737000 FastGPT is an AI Agent building platform. In versions 4.14.8.3 and below, the fa
CVE-2026-29103 9.1 0.20% 1 0 2026-03-20T13:37:50.737000 SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (C
CVE-2026-4475 8.8 0.02% 6 0 2026-03-20T09:32:16 A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_201710241
CVE-2026-4038 9.8 0.06% 3 0 2026-03-20T06:31:39 The Aimogen Pro plugin for WordPress is vulnerable to Arbitrary Function Call th
CVE-2026-32038 None 0.04% 1 0 2026-03-19T22:29:35 ### Summary In `openclaw@2026.2.23`, sandbox network hardening blocks `network=h
CVE-2026-23658 8.6 0.08% 1 0 2026-03-19T21:30:31 Insufficiently protected credentials in Azure DevOps allows an unauthorized atta
CVE-2026-26139 8.6 0.08% 1 0 2026-03-19T21:30:31 Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized a
CVE-2026-26138 8.6 0.08% 1 0 2026-03-19T21:30:31 Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized a
CVE-2026-26137 8.9 0.07% 1 0 2026-03-19T21:30:31 Server-side request forgery (ssrf) in Microsoft 365 Copilot's Business Chat allo
CVE-2026-32191 9.8 0.10% 1 0 2026-03-19T21:30:31 Improper neutralization of special elements used in an os command ('os command i
CVE-2026-3547 7.5 0.04% 1 0 2026-03-19T21:30:31 Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 a
CVE-2026-32886 None 0.02% 1 0 2026-03-19T21:12:42 ### Impact Remote clients can crash the Parse Server process by calling a cloud
CVE-2026-32944 None 0.01% 1 0 2026-03-19T21:11:56 ### Impact An unauthenticated attacker can crash the Parse Server process by se
CVE-2026-32728 None 0.01% 1 0 2026-03-19T21:11:37 ### Impact An attacker who is allowed to upload files can bypass the file exten
CVE-2026-31972 9.8 0.01% 1 0 2026-03-19T18:54:51.970000 SAMtools is a program for reading, manipulating and writing bioinformatics file
CVE-2006-10003 9.8 0.07% 1 0 2026-03-19T18:32:22 XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflo
CVE-2026-30402 9.8 0.29% 1 0 2026-03-19T18:32:21 An issue in wgcloud v.2.3.7 and before allows a remote attacker to execute arbit
CVE-2026-20643 5.4 0.01% 1 2 2026-03-19T18:32:21 A cross-origin issue in the Navigation API was addressed with improved input val
CVE-2026-32865 9.8 0.04% 1 0 2026-03-19T18:31:25 OPEXUS eComplaint and eCASE before version 10.1.0.0 include the secret verificat
CVE-2026-31968 8.1 0.01% 1 0 2026-03-19T17:31:24.010000 HTSlib is a library for reading and writing bioinformatics file formats. CRAM is
CVE-2026-31962 8.8 0.05% 1 0 2026-03-19T17:30:45.370000 HTSlib is a library for reading and writing bioinformatics file formats. CRAM is
CVE-2026-32878 7.5 0.01% 1 0 2026-03-19T17:28:32.513000 Parse Server is an open source backend that can be deployed to any infrastructur
CVE-2025-58112 8.8 0.07% 2 0 2026-03-19T15:32:24 Microsoft Dynamics 365 Customer Engagement (on-premises) 1612 (9.0.2.3034) allow
CVE-2026-29856 7.5 0.04% 2 0 2026-03-19T15:32:23 An issue in the VirtualHost configuration handling/parser component of aaPanel v
CVE-2026-29859 9.8 0.07% 1 0 2026-03-19T15:32:23 An arbitrary file upload vulnerability in aaPanel v7.57.0 allows attackers to ex
CVE-2026-29858 7.5 0.03% 1 0 2026-03-19T15:32:23 A lack of path validation in aaPanel v7.57.0 allows attackers to execute a local
CVE-2026-22558 7.7 0.01% 1 0 2026-03-19T15:31:27 An Authenticated NoSQL Injection vulnerability found in UniFi Network Applicatio
CVE-2026-4424 7.5 0.14% 1 0 2026-03-19T15:31:27 A flaw was found in libarchive. This heap out-of-bounds read vulnerability exist
CVE-2026-22557 10.0 0.03% 6 0 2026-03-19T15:31:22 A malicious actor with access to the network could exploit a Path Traversal vuln
CVE-2026-30704 9.1 0.04% 2 0 2026-03-19T15:16:26.580000 The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) exposes an unprotecte
CVE-2026-31963 8.1 0.04% 1 0 2026-03-19T14:50:54.513000 HTSlib is a library for reading and writing bioinformatics file formats. CRAM is
CVE-2026-31966 9.1 0.01% 1 0 2026-03-19T14:44:04.400000 HTSlib is a library for reading and writing bioinformatics file formats. CRAM is
CVE-2026-3511 8.6 0.04% 1 0 2026-03-19T13:25:00.570000 Improper Restriction of XML External Entity Reference vulnerability in XMLUtils.
CVE-2025-60233 9.8 0.04% 1 0 2026-03-19T13:25:00.570000 Deserialization of Untrusted Data vulnerability in Themeton Zuut allows Object I
CVE-2026-25471 8.1 0.07% 1 0 2026-03-19T13:25:00.570000 Authentication Bypass Using an Alternate Path or Channel vulnerability in Themep
CVE-2026-27413 9.3 0.03% 3 0 2026-03-19T13:25:00.570000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-27096 8.1 0.04% 2 0 2026-03-19T13:25:00.570000 Deserialization of Untrusted Data vulnerability in BuddhaThemes ColorFolio - Fre
CVE-2026-3658 7.5 0.07% 1 0 2026-03-19T12:30:41 The Appointment Booking Calendar β€” Simply Schedule Appointments Booking Plugin p
CVE-2026-27065 9.8 0.11% 3 0 2026-03-19T09:30:25 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-27067 9.1 0.04% 2 0 2026-03-19T09:30:25 Unrestricted Upload of File with Dangerous Type vulnerability in Syarif Mobile A
CVE-2026-25445 8.8 0.05% 2 0 2026-03-19T09:30:25 Deserialization of Untrusted Data vulnerability in Membership Software WishList
CVE-2025-60237 9.8 0.04% 1 0 2026-03-19T09:30:25 Deserialization of Untrusted Data vulnerability in Themeton Finag allows Object
CVE-2026-25443 7.5 0.04% 1 0 2026-03-19T09:30:25 Missing Authorization vulnerability in Dotstore Fraud Prevention For Woocommerce
CVE-2026-25312 7.5 0.03% 1 0 2026-03-19T09:30:25 Missing Authorization vulnerability in EventPrime allows Exploiting Incorrectly
CVE-2026-27093 8.1 0.11% 1 0 2026-03-19T09:30:25 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-27540 9.1 0.02% 3 1 2026-03-19T06:30:33 Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co P
CVE-2026-27542 9.8 0.01% 1 0 2026-03-19T06:30:33 Incorrect Privilege Assignment vulnerability in Rymera Web Co Pty Ltd. Woocommer
CVE-2026-20963 8.8 8.00% 6 0 2026-03-18T21:32:58 Deserialization of untrusted data in Microsoft Office SharePoint allows an autho
CVE-2026-22730 8.8 0.02% 1 1 2026-03-18T20:20:40 A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionCon
CVE-2026-22729 8.6 0.05% 1 0 2026-03-18T20:20:27 A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConver
CVE-2026-33172 8.7 0.01% 3 0 2026-03-18T19:54:32 ### Impact Stored XSS vulnerability in SVG asset reuploads allows authenticated
CVE-2026-33166 8.6 0.01% 3 0 2026-03-18T19:53:59 ### Summary The Allure report generator is vulnerable to an arbitrary file read
CVE-2025-66376 7.2 11.43% 2 0 2026-03-18T18:31:10 Zimbra Collaboration (ZCS) 10 before 10.0.18 and 10.1 before 10.1.13 allows Clas
CVE-2026-33058 6.5 0.02% 1 0 2026-03-18T17:52:14.303000 Kanboard is project management software focused on Kanban methodology. Versions
CVE-2026-32746 9.8 0.03% 3 4 2026-03-18T15:30:44 telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMO
CVE-2026-33053 None 0.02% 4 0 2026-03-18T12:58:35 **Detection Method:** Kolega.dev Deep Code Scan | Attribute | Value | |---|---|
CVE-2026-3888 7.9 0.01% 7 3 2026-03-18T06:31:20 Local privilege escalation in snapd on Linux allows local attackers to get root
CVE-2026-3564 9.1 0.06% 1 0 2026-03-17T15:36:34 A condition in ScreenConnect may allow an actor with access to server-level cryp
CVE-2026-32306 10.0 0.40% 1 0 2026-03-16T17:06:59 ### Summary The telemetry aggregation API accepts user-controlled `aggregationT
CVE-2026-3630 9.8 0.06% 1 0 2026-03-10T21:32:13 Delta Electronics COMMGR2 has Stack-based Buffer Overflow vulnerability.
CVE-2026-3631 7.5 0.06% 1 0 2026-03-09T06:31:19 Delta Electronics COMMGR2 has Buffer Over-read DoS vulnerability.
CVE-2026-25896 9.3 0.01% 1 0 2026-03-02T14:54:02.760000 fast-xml-parser allows users to validate XML, parse XML to JS object, or build X
CVE-2026-25554 6.5 0.07% 1 0 2026-02-27T21:31:20 OpenSIPS versions 3.1 before 3.6.4 containing the auth_jwt module (prior to comm
CVE-2025-32711 9.3 3.89% 1 1 2026-02-20T18:31:25 Ai command injection in M365 Copilot allows an unauthorized attacker to disclose
CVE-2026-24780 8.8 0.10% 1 0 2026-02-17T16:04:36.780000 AutoGPT is a platform that allows users to create, deploy, and manage continuous
CVE-2025-32975 10.0 0.13% 1 0 2025-11-03T21:35:11 Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef
CVE-2026-32891 0 0.03% 2 0 N/A
CVE-2026-32890 0 0.05% 2 0 N/A
CVE-2026-33037 0 0.23% 4 0 N/A
CVE-2026-33134 0 0.03% 4 0 N/A
CVE-2026-27625 0 0.06% 1 0 N/A
CVE-2026-33072 0 0.01% 1 0 N/A
CVE-2026-33136 0 0.03% 1 0 N/A
CVE-2026-33150 0 0.01% 1 0 N/A
CVE-2026-33156 0 0.01% 1 0 N/A
CVE-2026-31836 0 0.03% 1 0 N/A
CVE-2026-32318 0 0.01% 1 0 N/A
CVE-2026-32317 0 0.01% 1 0 N/A
CVE-2026-33307 0 0.00% 1 0 N/A
CVE-2026-33308 0 0.00% 1 0 N/A
CVE-2026-33024 0 0.08% 1 0 N/A
CVE-2026-32721 0 0.01% 2 0 N/A
CVE-2026-32754 0 0.07% 1 0 N/A
CVE-2026-31965 0 0.04% 1 0 N/A
CVE-2026-31964 0 0.04% 1 0 N/A
CVE-2026-31970 0 0.04% 1 0 N/A
CVE-2026-31969 0 0.04% 1 0 N/A
CVE-2026-33346 0 0.04% 1 0 N/A
CVE-2026-31967 0 0.02% 1 0 N/A
CVE-2026-31971 0 0.09% 1 0 N/A
CVE-2026-31973 0 0.01% 1 0 N/A
CVE-2026-32238 0 0.29% 1 1 N/A
CVE-2023-4567 0 0.00% 1 0 N/A

CVE-2006-10002
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-21T12:16:15.827000

1 posts

XML::Parser versions through 2.45 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes. A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause hea

harrysintonen@infosec.exchange at 2026-03-19T15:35:07.000Z ##

Two 20-year-old vulnerabilities fixed in XML::Parser 2.48:

- CVE-2006-10002: XML::Parser versions through 2.47 for Perl could
overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes openwall.com/lists/oss-securit

- CVE-2006-10003: XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack openwall.com/lists/oss-securit

The patch fixing these has been available since 2006 but it's nice to see the fix in actual release, too.

#CVE_2006_10002 #CVE_2006_10003

##

CVE-2026-4373
(7.5 HIGH)

EPSS: 0.10%

updated 2026-03-21T07:16:10.380000

2 posts

The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via path traversal in all versions up to, and including, 3.5.6.2. This is due to the 'Uploaded_File::set_from_array' method accepting user-supplied file paths from the Media Field preset JSON payload without validating that the path belongs to the WordPress uploads directory. Combined with an insufficient same-file check

offseq at 2026-03-21T07:30:25.787Z ##

🚨 JetFormBuilder for WordPress is HIGH risk (CVE-2026-4373): Absolute path traversal in all versions allows unauth attackers to exfiltrate files via crafted Media Field form. Review & secure deployments! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-21T07:30:25.000Z ##

🚨 JetFormBuilder for WordPress is HIGH risk (CVE-2026-4373): Absolute path traversal in all versions allows unauth attackers to exfiltrate files via crafted Media Field form. Review & secure deployments! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #infosec

##

CVE-2026-4261
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-21T04:17:44.223000

2 posts

The Expire Users plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2.2. This is due to the plugin allowing a user to update the 'on_expire_default_to_role' meta through the 'save_extra_user_profile_fields' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an a

offseq at 2026-03-21T06:00:30.256Z ##

πŸ”₯ HIGH severity: CVE-2026-4261 in Expire Users (WordPress, all versions) lets Subscribers escalate to Admin via missing authorization in 'save_extra_user_profile_fields'. Patch urgently or mitigate! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-21T06:00:30.000Z ##

πŸ”₯ HIGH severity: CVE-2026-4261 in Expire Users (WordPress, all versions) lets Subscribers escalate to Admin via missing authorization in 'save_extra_user_profile_fields'. Patch urgently or mitigate! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #Security

##

CVE-2026-3478
(7.2 HIGH)

EPSS: 0.07%

updated 2026-03-21T04:17:25.807000

2 posts

The Content Syndication Toolkit plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3 via the redux_p AJAX action in the bundled ReduxFramework library. The plugin registers a proxy endpoint (wp_ajax_nopriv_redux_p) that is accessible to unauthenticated users. The proxy() method in the Redux_P class takes a URL directly from $_GET['url'] withou

offseq at 2026-03-21T04:30:27.621Z ##

πŸ”Ž CVE-2026-3478: HIGH severity SSRF in benmoody Content Syndication Toolkit (WordPress, all versions). Unauthenticated AJAX endpoint lets attackers proxy requests, risking internal data exposure. Disable plugin or block endpoint! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-21T04:30:27.000Z ##

πŸ”Ž CVE-2026-3478: HIGH severity SSRF in benmoody Content Syndication Toolkit (WordPress, all versions). Unauthenticated AJAX endpoint lets attackers proxy requests, risking internal data exposure. Disable plugin or block endpoint! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #SSRF

##

CVE-2026-1648
(7.2 HIGH)

EPSS: 0.04%

updated 2026-03-21T04:16:54.310000

2 posts

The Performance Monitor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.6. This is due to insufficient validation of the 'url' parameter in the '/wp-json/performance-monitor/v1/curl_data' REST API endpoint. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations, including internal services, via th

offseq at 2026-03-21T09:00:28.313Z ##

πŸ”Ž HIGH severity SSRF in qrolic Performance Monitor (WordPress, all versions). Unauthenticated attackers can craft internal requests via REST API β€” RCE possible if chained with Redis. Urgent patch/mitigation needed! CVE-2026-1648. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-21T09:00:28.000Z ##

πŸ”Ž HIGH severity SSRF in qrolic Performance Monitor (WordPress, all versions). Unauthenticated attackers can craft internal requests via REST API β€” RCE possible if chained with Redis. Urgent patch/mitigation needed! CVE-2026-1648. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #SSRF

##

CVE-2026-1313
(8.3 HIGH)

EPSS: 0.04%

updated 2026-03-21T04:16:52.630000

2 posts

The MimeTypes Link Icons plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.2.20. This is due to the plugin making outbound HTTP requests to user-controlled URLs without proper validation when the "Show file size" option is enabled. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web request

offseq at 2026-03-21T10:30:28.023Z ##

MimeTypes Link Icons plugin (≀3.2.20) hit by HIGH severity SSRF (CVE-2026-1313, CVSS 8.3). Contributor+ users can abuse "Show file size" to access internal resources. Disable the feature & check user roles. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-21T10:30:28.000Z ##

MimeTypes Link Icons plugin (≀3.2.20) hit by HIGH severity SSRF (CVE-2026-1313, CVSS 8.3). Contributor+ users can abuse "Show file size" to access internal resources. Disable the feature & check user roles. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #SSRF #CVE20261313

##

CVE-2026-24060
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-03-21T00:32:49

3 posts

Service information is not encrypted when transmitted as BACnet packets over the wire, and can be sniffed, intercepted, and modified by an attacker. Valuable information such as the File Start Position and File Data can be sniffed from network traffic using Wireshark's BACnet dissector filter. The proprietary format used by WebCTRL to receive updates from the PLC can also be sniffed and rever

offseq at 2026-03-21T00:00:38.898Z ##

CVE-2026-24060 (CRITICAL): WebCTRL Premium Server sends BACnet data in cleartext, risking interception & modification. No patch yet β€” segment OT networks & use VPNs for BACnet traffic. Monitor for sniffing, restrict access. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-21T00:00:38.000Z ##

CVE-2026-24060 (CRITICAL): WebCTRL Premium Server sends BACnet data in cleartext, risking interception & modification. No patch yet β€” segment OT networks & use VPNs for BACnet traffic. Monitor for sniffing, restrict access. Details: radar.offseq.com/threat/cve-20 #OffSeq #ICS #Vuln #BACnet

##

beyondmachines1@infosec.exchange at 2026-03-20T10:01:49.000Z ##

Multiple Flaws Reported in Automated Logic WebCTRL Premium Server

Automated Logic patched three vulnerabilities in its WebCTRL Premium Server, including a critical cleartext flaw (CVE-2026-24060), that allow attackers to intercept sensitive data and spoof commands in building automation systems.

**If you are using Automated Logic WebCTRL, make sure it's isolated from the internet and your office network. Then plan a patch. Legacy versions 7.x will not be updated so plan an upgrade.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-3584
(9.8 CRITICAL)

EPSS: 0.22%

updated 2026-03-21T00:32:48

3 posts

The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into internal placeholder storage, combined with the use of 'call_user_func' on these placeholder values. This makes it possible for unauthenticated attackers to ex

thehackerwire@mastodon.social at 2026-03-20T22:20:38.000Z ##

πŸ”΄ CVE-2026-3584 - Critical (9.8)

The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into intern...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:20:38.000Z ##

πŸ”΄ CVE-2026-3584 - Critical (9.8)

The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into intern...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:17:11.000Z ##

πŸ”΄ CVE-2026-3584 - Critical (9.8)

The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into intern...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25192
(9.4 CRITICAL)

EPSS: 0.13%

updated 2026-03-21T00:32:47

3 posts

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this

offseq at 2026-03-21T03:00:28.026Z ##

⚠️ CVE-2026-25192 (CRITICAL, CVSS 9.4): All CTEK Chargeportal versions lack authentication on OCPP WebSocket endpoints. Enables remote station impersonation & command injection. Restrict network access and monitor closely! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-21T03:00:28.000Z ##

⚠️ CVE-2026-25192 (CRITICAL, CVSS 9.4): All CTEK Chargeportal versions lack authentication on OCPP WebSocket endpoints. Enables remote station impersonation & command injection. Restrict network access and monitor closely! radar.offseq.com/threat/cve-20 #OffSeq #EVSecurity #CVE202625192

##

beyondmachines1@infosec.exchange at 2026-03-20T09:01:48.000Z ##

CTEK Chargeportal Vulnerabilities Enable Unauthorized Control of EV Infrastructure

CISA reports four vulnerabilities in the Chargeportal platform by CTEK, including a critical authentication bypass (CVE-2026-25192), that allow attackers to impersonate charging stations and gain unauthorized control. The product is scheduled for sunset in April 2026, leaving network isolation as the primary defense for current users.

**Since CTEK is sunsetting Chargeportal without a patch, make sure you isolate the systems as much as possible from public access and the public internet. Then planning a migration to a supported charging management platform.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-29796
(9.4 CRITICAL)

EPSS: 0.10%

updated 2026-03-21T00:31:52

3 posts

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this

offseq at 2026-03-21T01:30:28.022Z ##

⚠️ CRITICAL: CVE-2026-29796 affects all IGL-Technologies eParking.fi versions. Missing WebSocket auth allows attackers to impersonate charging stations, disrupt operations, and corrupt data. Restrict access, monitor traffic, and secure now! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-21T01:30:28.000Z ##

⚠️ CRITICAL: CVE-2026-29796 affects all IGL-Technologies eParking.fi versions. Missing WebSocket auth allows attackers to impersonate charging stations, disrupt operations, and corrupt data. Restrict access, monitor traffic, and secure now! radar.offseq.com/threat/cve-20 #OffSeq #EVCharging #Infosec

##

beyondmachines1@infosec.exchange at 2026-03-20T16:01:48.000Z ##

IGL-Technologies Patches Critical Authentication Bypass in eParking.fi Platform

IGL-Technologies patched four vulnerabilities in its eParking.fi platform, including a critical authentication bypass (CVE-2026-29796) that allows attackers to impersonate EV charging stations and gain administrative control.

**Isolate your EV charging infrastructure as much as possible from the public internet and public network access. Verify that your hardware supports the vendor's new security profiles. Since station identifiers were leaked on public maps, you should treat existing IDs as compromised and implement device whitelisting.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-23536
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-21T00:31:45

1 posts

A security issue was discovered in the Feast Feature Server's `/read-document` endpoint that allows an unauthenticated remote attacker to read any file accessible to the server process. By sending a specially crafted HTTP POST request, an attacker can bypass intended access restrictions to potentially retrieve sensitive system files, application configurations, and credentials.

thehackerwire@mastodon.social at 2026-03-20T22:17:32.000Z ##

🟠 CVE-2026-23536 - High (7.5)

A security issue was discovered in the Feast Feature Server's `/read-document` endpoint that allows an unauthenticated remote attacker to read any file accessible to the server process. By sending a specially crafted HTTP POST request, an attacker...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21992
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-20T22:16:26.933000

7 posts

Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) and Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle

1 repos

https://github.com/TEXploited/CVE-2026-21992

youranonnewsirc@nerdculture.de at 2026-03-21T16:17:40.000Z ##

Geopolitical tensions remain high as the Iran conflict disrupts the Strait of Hormuz, impacting oil prices and global tech supply chains due to halted helium output from Qatar (Mar 20-21, 2026). In technology, Google introduced a mandatory 24-hour wait for Android sideloading from unverified developers (Mar 20, 2026), while Nvidia showcased new AI chips at GTC 2026 (Mar 20, 2026). Cybersecurity saw Oracle patch a critical RCE vulnerability (CVE-2026-21992) (Mar 21, 2026), and Iranian-linked hackers targeted medical tech firm Stryker, wiping devices (Mar 20, 2026). A Trivy supply chain attack also deployed 'CanisterWorm' across npm packages (Mar 20, 2026).

#Cybersecurity #Geopolitics #TechNews

##

allaboutsecurity@mastodon.social at 2026-03-21T09:02:37.000Z ##

CVE-2026-21992: Oracle schließt RCE-Lücke in Fusion Middleware außerhalb des regulÀren Patch-Zyklus

Die als CVE-2026-21992 klassifizierte Schwachstelle erlaubt es Angreifern, ohne Anmeldedaten beliebigen Code auf betroffenen Systemen auszufΓΌhren – sofern diese ΓΌber das Netz erreichbar sind.

all-about-security.de/cve-2026

#oracle #cve #RCE #fusionMiddleware

##

beyondmachines1 at 2026-03-21T09:01:48.449Z ##

Oracle Issues Emergency Patch for Critical Vulnerability in Identity Manager, Web Services Manager

Oracle released an emergency patch for a critical remote code execution vulnerability (CVE-2026-21992) in Identity Manager and Web Services Manager that allows unauthenticated attackers to take over systems.

**If you're running Oracle Fusion Middleware , Oracle Identity Manager or Oracle Web Services Manager, this is important and probably urgent. If posssible, isolate the system to trusted networks only and use a Web Application Firewall with custom rules for this endoint. Then patch ASAP, because this flaw will be exploited, very soon.**

beyondmachines.net/event_detai

##

Matchbook3469@mastodon.social at 2026-03-20T22:56:56.000Z ##

πŸ”΄ New security advisory:

CVE-2026-21992 affects multiple systems.

β€’ Impact: Remote code execution or complete system compromise possible
β€’ Risk: Attackers can gain full control of affected systems
β€’ Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #VulnerabilityManagement #CyberSec

##

youranonnewsirc@nerdculture.de at 2026-03-21T16:17:40.000Z ##

Geopolitical tensions remain high as the Iran conflict disrupts the Strait of Hormuz, impacting oil prices and global tech supply chains due to halted helium output from Qatar (Mar 20-21, 2026). In technology, Google introduced a mandatory 24-hour wait for Android sideloading from unverified developers (Mar 20, 2026), while Nvidia showcased new AI chips at GTC 2026 (Mar 20, 2026). Cybersecurity saw Oracle patch a critical RCE vulnerability (CVE-2026-21992) (Mar 21, 2026), and Iranian-linked hackers targeted medical tech firm Stryker, wiping devices (Mar 20, 2026). A Trivy supply chain attack also deployed 'CanisterWorm' across npm packages (Mar 20, 2026).

#Cybersecurity #Geopolitics #TechNews

##

beyondmachines1@infosec.exchange at 2026-03-21T09:01:48.000Z ##

Oracle Issues Emergency Patch for Critical Vulnerability in Identity Manager, Web Services Manager

Oracle released an emergency patch for a critical remote code execution vulnerability (CVE-2026-21992) in Identity Manager and Web Services Manager that allows unauthenticated attackers to take over systems.

**If you're running Oracle Fusion Middleware , Oracle Identity Manager or Oracle Web Services Manager, this is important and probably urgent. If posssible, isolate the system to trusted networks only and use a Web Application Firewall with custom rules for this endoint. Then patch ASAP, because this flaw will be exploited, very soon.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

campuscodi@mastodon.social at 2026-03-20T15:48:39.000Z ##

Oracle issues an out-of-band security update for a pre-auth RCE in Oracle Identity Manager

oracle.com/security-alerts/ale

##

CVE-2026-20131
(10.0 CRITICAL)

EPSS: 0.88%

updated 2026-03-20T22:16:26.120000

11 posts

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java ob

3 repos

https://github.com/p3Nt3st3r-sTAr/CVE-2026-20131-POC

https://github.com/sak110/CVE-2026-20131

https://github.com/Sushilsin/CVE-2026-20131

PC_Fluesterer@social.tchncs.de at 2026-03-21T13:30:30.000Z ##

Cisco Zero-Day 36 Tage vor Update ausgenutzt

Am 2026-03-04 hat Cisco ein Update gegen die SicherheitslΓΌcke CVE-2026-20131 verΓΆffentlicht. Sie hat die Einstufung 10 von 10 erhalten: die schlimmste aller vorstellbaren Schwachstellen. FallsΒΉ die Verwaltungs-OberflΓ€che (Management Interface) der Secure Firewall Management Center (FMC) Software und Security Cloud Control (SCC) Firewall Management Software aus dem Internet erreichbar ist, kann ein entfernter Angreifer ohne Autorisierung beliebigen Code mit Administrator-Rechten auf den betroffenen GerΓ€ten ausfΓΌhren (RCE). Sehr angemessen fΓΌr GerΓ€te, die

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Warnung #0day #closedsource #cybercrime #erpresser #exploits #firewall #hersteller #hintertΓΌr #sicherheit #UnplugTrump #vorfΓ€lle

##

PC_Fluesterer@social.tchncs.de at 2026-03-21T13:30:30.000Z ##

Cisco Zero-Day 36 Tage vor Update ausgenutzt

Am 2026-03-04 hat Cisco ein Update gegen die SicherheitslΓΌcke CVE-2026-20131 verΓΆffentlicht. Sie hat die Einstufung 10 von 10 erhalten: die schlimmste aller vorstellbaren Schwachstellen. FallsΒΉ die Verwaltungs-OberflΓ€che (Management Interface) der Secure Firewall Management Center (FMC) Software und Security Cloud Control (SCC) Firewall Management Software aus dem Internet erreichbar ist, kann ein entfernter Angreifer ohne Autorisierung beliebigen Code mit Administrator-Rechten auf den betroffenen GerΓ€ten ausfΓΌhren (RCE). Sehr angemessen fΓΌr GerΓ€te, die

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Warnung #0day #closedsource #cybercrime #erpresser #exploits #firewall #hersteller #hintertΓΌr #sicherheit #UnplugTrump #vorfΓ€lle

##

gtronix@infosec.exchange at 2026-03-20T18:00:42.000Z ##

"CISA orders feds to patch max-severity Cisco flaw by Sunday"

"[...] The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to patch a maximum-severity vulnerability, CVE-2026-20131, in Cisco Secure Firewall Management Center (FMC) by Sunday, March 22."

bleepingcomputer.com/news/secu

#Cybersecurity

##

AAKL@infosec.exchange at 2026-03-20T16:26:29.000Z ##

The campaign is exploiting "critical vulnerability (CVE-2026-20131) in Cisco Secure Firewall Management Center (FMC), enabling unauthenticated remote code execution as root. The campaign combines edge-device exploitation, custom malware tooling, and double extortion tactics, indicating a mature and targeted ransomware operation."

FortiGuard's outbreak alerts listed a critical Interlock ransomware attack yesterday: fortiguard.fortinet.com/outbre @FortiGuardLabs #infosec #ransomware #Cisco #cyberattack

##

oversecurity@mastodon.social at 2026-03-20T15:20:05.000Z ##

CISA orders feds to patch max-severity Cisco flaw by Sunday

The Cybersecurity and Infrastructure Security Agency (CISA) has ordered federal agencies to patch a maximum-severity vulnerability, CVE-2026-20131,...

πŸ”—οΈ [Bleepingcomputer] link.is.it/eSynqa

##

jbz@indieweb.social at 2026-03-19T21:55:01.000Z ##

⚠️ Ransomware crims abused Cisco 0-day weeks before disclosure

ο½’ Ransomware criminals exploited CVE-2026-20131, a maximum-severity bug in Cisco Secure Firewall Management Center software, as a zero-day vulnerability more than a month before Cisco patched the hole, according to Amazon security boss CJ Moses ο½£
theregister.com/2026/03/18/ama

#cisco #0day #Ransomware #infosec

##

secdb@infosec.exchange at 2026-03-19T18:00:17.000Z ##

🚨 [CISA-2026:0319] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-20131 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Known
- Vendor: Cisco
- Product: Secure Firewall Management Center (FMC)
- Notes: sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260319 #cisa20260319 #cve_2026_20131 #cve202620131

##

cisakevtracker@mastodon.social at 2026-03-19T16:00:49.000Z ##

CVE ID: CVE-2026-20131
Vendor: Cisco
Product: Secure Firewall Management Center (FMC)
Date Added: 2026-03-19
Notes: sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

patrickcmiller@infosec.exchange at 2026-03-19T11:42:00.000Z ##

Interlock group exploiting the CISCO FMC flaw CVE-2026-20131 36 days before disclosure securityaffairs.com/189636/mal

##

technadu@infosec.exchange at 2026-03-19T11:31:28.000Z ##

Interlock ransomware exploited Cisco firewall zero-day (CVE-2026-20131) before disclosure.
β€’ Unauth RCE β†’ root
β€’ Memory webshells
β€’ WebSocket C2
technadu.com/interlock-ransomw

#Cybersecurity #ZeroDay #Ransomware

##

youranonnewsirc@nerdculture.de at 2026-03-19T07:56:33.000Z ##

Cybersecurity: Interlock ransomware is exploiting a critical Cisco FMC zero-day (CVE-2026-20131, CVSS 10.0) for root access, active since January 2026. CISA added a Microsoft SharePoint vulnerability (CVE-2026-20963) to its Known Exploited Vulnerabilities Catalog. Geopolitical: Tensions in the Gulf region are escalating, with Iran reportedly targeting energy sites, leading to a sharp spike in oil prices. These events underscore the urgent need for enhanced digital resilience and geopolitical stability.

#Cybersecurity #Geopolitics #AnonNews_irc

##

CVE-2026-32013
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-20T21:36:50

1 posts

## Impact The gateway `agents.files.get` and `agents.files.set` methods allowed symlink traversal for allowlisted workspace files. A symlinked allowlisted file (for example `AGENTS.md`) could resolve outside the agent workspace and be read/written by the gateway process. This could enable arbitrary host file read/write within the gateway process permissions, and chained impact up to code executi

thehackerwire@mastodon.social at 2026-03-19T23:00:42.000Z ##

🟠 CVE-2026-32013 - High (8.8)

OpenClaw versions prior to 2026.2.25 contain a symlink traversal vulnerability in the agents.files.get and agents.files.set methods that allows reading and writing files outside the agent workspace. Attackers can exploit symlinked allowlisted file...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32749
(7.6 HIGH)

EPSS: 0.04%

updated 2026-03-20T21:35:45

1 posts

### Summary POST /api/import/importSY and POST /api/import/importZipMd write uploaded archives to a path derived from the multipart filename field without sanitization, allowing an admin to write files to arbitrary locations outside the temp directory - including system paths that enable RCE. ### Details File: kernel/api/import.go - functions importSY and importZipMd ```go file := files[0] write

thehackerwire@mastodon.social at 2026-03-19T21:23:13.000Z ##

🟠 CVE-2026-32749 - High (7.6)

SiYuan is a personal knowledge management system. In versions 3.6.0 and below, POST /api/import/importSY and POST /api/import/importZipMd write uploaded archives to a path derived from the multipart filename field without sanitization, allowing an...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33142
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-20T21:33:29

1 posts

The fix for GHSA-p5g2-jm85-8g35 (ClickHouse SQL injection via aggregate query parameters) added column name validation to the `_aggregateBy` method but did not apply the same validation to three other query construction paths in `StatementGenerator`. The `toSortStatement`, `toSelectStatement`, and `toGroupByStatement` methods accept user-controlled object keys from API request bodies and interpola

thehackerwire@mastodon.social at 2026-03-20T21:22:33.000Z ##

🟠 CVE-2026-33142 - High (8.1)

OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.34, the fix for CVE-2026-32306 (ClickHouse SQL injection via aggregate query parameters) added column name validation to the _aggregateBy method but did not...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33010
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-20T21:32:24

1 posts

### Summary When the HTTP server is enabled (`MCP_HTTP_ENABLED=true`), the application configures FastAPI's CORSMiddleware with `allow_origins=['*']`, `allow_credentials=True`, `allow_methods=["*"]`, and `allow_headers=["*"]`. The wildcard `Access-Control-Allow-Origin: *` header permits any website to read API responses cross-origin. When combined with anonymous access (`MCP_ALLOW_ANONYMOUS_ACCESS

thehackerwire@mastodon.social at 2026-03-20T20:00:16.000Z ##

🟠 CVE-2026-33010 - High (8.1)

mcp-memory-service is an open-source memory backend for multi-agent systems. Prior to version 10.25.1, when the HTTP server is enabled (MCP_HTTP_ENABLED=true), the application configures FastAPI's CORSMiddleware with allow_origins=['*'], allow_cre...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-54068
(9.8 CRITICAL)

EPSS: 48.85%

updated 2026-03-20T21:28:57

3 posts

### Impact In Livewire v3 (≀ 3.6.3), a vulnerability allows unauthenticated attackers to achieve remote command execution in specific scenarios. The issue stems from how certain component property updates are hydrated. This vulnerability is unique to Livewire v3 and does not affect prior major versions. Exploitation requires a component to be mounted and configured in a particular way, but does no

Nuclei template

5 repos

https://github.com/haxorstars/CVE-2025-54068

https://github.com/synacktiv/Livepyre

https://github.com/Jenderal92/livewire-vuln-scanner

https://github.com/flame-11/CVE-2025-54068-livewire

https://github.com/z0d131482700x/Livewire2025CVE

secdb@infosec.exchange at 2026-03-20T18:00:21.000Z ##

🚨 [CISA-2026:0320] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-31277 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/124147 ; support.apple.com/en-us/124149 ; support.apple.com/en-us/124152 ; support.apple.com/en-us/124153 ; support.apple.com/en-us/124155 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32432 (secdb.nttzen.cloud/cve/detail/)
- Name: Craft CMS Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Craft CMS
- Product: Craft CMS
- Notes: craftcms.com/knowledge-base/cr ; github.com/craftcms/cms/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-43510 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Improper Locking Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-43520 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Classic Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-54068 (secdb.nttzen.cloud/cve/detail/)
- Name: Laravel Livewire Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Laravel
- Product: Livewire
- Notes: github.com/livewire/livewire/s ; github.com/livewire/livewire/c ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260320 #cisa20260320 #cve_2025_31277 #cve_2025_32432 #cve_2025_43510 #cve_2025_43520 #cve_2025_54068 #cve202531277 #cve202532432 #cve202543510 #cve202543520 #cve202554068

##

cisakevtracker@mastodon.social at 2026-03-20T16:01:28.000Z ##

CVE ID: CVE-2025-54068
Vendor: Laravel
Product: Livewire
Date Added: 2026-03-20
Notes: github.com/livewire/livewire/s ; github.com/livewire/livewire/c ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-20T16:01:15.000Z ##

Looks like CISA has added to the KEV catalogue. Today's winner is Apple.

- CVE-2025-31277: Apple Multiple Products Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43520: Apple Multiple Products Classic Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-54068: Laravel Livewire Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-32432: Craft CMS Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Apple #infosec #vulnerability

##

CVE-2026-33128
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-20T21:27:42

1 posts

## Summary `createEventStream` in h3 is vulnerable to Server-Sent Events (SSE) injection due to missing newline sanitization in `formatEventStreamMessage()` and `formatEventStreamComment()`. An attacker who controls any part of an SSE message field (`id`, `event`, `data`, or comment) can inject arbitrary SSE events to connected clients. ## Details The vulnerability exists in `src/utils/internal

thehackerwire@mastodon.social at 2026-03-20T22:00:19.000Z ##

🟠 CVE-2026-33128 - High (7.5)

H3 is a minimal H(TTP) framework. In versions prior to 1.15.6 and between 2.0.0 through 2.0.1-rc.14, createEventStream is vulnerable to Server-Sent Events (SSE) injection due to missing newline sanitization in formatEventStreamMessage() and format...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33068(CVSS UNKNOWN)

EPSS: 0.14%

updated 2026-03-20T21:24:22

2 posts

Claude Code resolved the permission mode from settings files, including the repo-controlled `.claude/settings.json`, before determining whether to display the workspace trust confirmation dialog. A malicious repository could set `permissions.defaultMode` to `bypassPermissions` in its committed `.claude/settings.json`, causing the trust dialog to be silently skipped on first open. This allowed a us

hackerworkspace@infosec.exchange at 2026-03-20T20:54:34.000Z ##

RAXE-2026-040: Claude Code Workspace Trust Dialog Bypass via Repository Settings (CVE-2026-33068) | RAXE Labs

raxe.ai/labs/advisories/RAXE-2

Short summary: hackerworkspace.com/article/ra

#cybersecurity #vulnerability #exploit

##

_r_netsec@infosec.exchange at 2026-03-20T17:43:05.000Z ##

Claude Code workspace trust dialog bypass via repository settings loading order [CVE-2026-33068, CVSS 7.7]. Settings resolved before trust dialog shown. raxe.ai/labs/advisories/RAXE-2

##

CVE-2026-33054
(10.0 CRITICAL)

EPSS: 0.02%

updated 2026-03-20T21:23:23

2 posts

#### Summary A Path Traversal vulnerability allows any user (or attacker) supplying an untrusted `state_token` through the UI stream payload to arbitrarily target files on the disk under the standard file-based runtime backend. This can result in application denial of service (via crash loops when reading non-msgpack target files as configurations), or arbitrary file manipulation. #### Details Wh

thehackerwire@mastodon.social at 2026-03-20T22:17:57.000Z ##

πŸ”΄ CVE-2026-33054 - Critical (10)

Mesop is a Python-based UI framework that allows users to build web applications. Versions 1.2.2 and below contain a Path Traversal vulnerability that allows any user supplying an untrusted state_token through the UI stream payload to arbitrarily ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:17:57.000Z ##

πŸ”΄ CVE-2026-33054 - Critical (10)

Mesop is a Python-based UI framework that allows users to build web applications. Versions 1.2.2 and below contain a Path Traversal vulnerability that allows any user supplying an untrusted state_token through the UI stream payload to arbitrarily ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33043
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-20T21:23:01

4 posts

### Summary `/objects/phpsessionid.json.php` exposes the current PHP session ID to any unauthenticated request. The `allowOrigin()` function reflects any `Origin` header back in `Access-Control-Allow-Origin` with `Access-Control-Allow-Credentials: true`, enabling cross-origin session theft and full account takeover. ### Details **File:** `objects/phpsessionid.json.php` ```php allowOrigin(); $o

thehackerwire@mastodon.social at 2026-03-20T23:03:57.000Z ##

🟠 CVE-2026-33043 - High (8.1)

WWBN AVideo is an open source video platform. In versions 25.0 and below, /objects/phpsessionid.json.php exposes the current PHP session ID to any unauthenticated request. The allowOrigin() function reflects any Origin header back in Access-Contro...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:00:37.000Z ##

🟠 CVE-2026-33043 - High (8.1)

WWBN AVideo is an open source video platform. In versions 25.0 and below, /objects/phpsessionid.json.php exposes the current PHP session ID to any unauthenticated request. The allowOrigin() function reflects any Origin header back in Access-Contro...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:03:57.000Z ##

🟠 CVE-2026-33043 - High (8.1)

WWBN AVideo is an open source video platform. In versions 25.0 and below, /objects/phpsessionid.json.php exposes the current PHP session ID to any unauthenticated request. The allowOrigin() function reflects any Origin header back in Access-Contro...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:00:37.000Z ##

🟠 CVE-2026-33043 - High (8.1)

WWBN AVideo is an open source video platform. In versions 25.0 and below, /objects/phpsessionid.json.php exposes the current PHP session ID to any unauthenticated request. The allowOrigin() function reflects any Origin header back in Access-Contro...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33039
(8.6 HIGH)

EPSS: 0.01%

updated 2026-03-20T21:22:41

2 posts

## Summary The `plugin/LiveLinks/proxy.php` endpoint validates user-supplied URLs against internal/private networks using `isSSRFSafeURL()`, but only checks the initial URL. When the initial URL responds with an HTTP redirect (`Location` header), the redirect target is fetched via `fakeBrowser()` without re-validation, allowing an attacker to reach internal services (cloud metadata, RFC1918 addres

thehackerwire@mastodon.social at 2026-03-20T22:18:05.000Z ##

🟠 CVE-2026-33039 - High (8.6)

WWBN AVideo is an open source video platform. In versions 25.0 and below, the plugin/LiveLinks/proxy.php endpoint validates user-supplied URLs against internal/private networks using isSSRFSafeURL(), but only checks the initial URL. When the initi...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:18:05.000Z ##

🟠 CVE-2026-33039 - High (8.6)

WWBN AVideo is an open source video platform. In versions 25.0 and below, the plugin/LiveLinks/proxy.php endpoint validates user-supplied URLs against internal/private networks using isSSRFSafeURL(), but only checks the initial URL. When the initi...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33038
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-20T21:22:32

2 posts

## Summary The `install/checkConfiguration.php` endpoint performs full application initialization β€” database setup, admin account creation, and configuration file write β€” from unauthenticated POST input. The only guard is checking whether `videos/configuration.php` already exists. On uninitialized deployments, any remote attacker can complete the installation with attacker-controlled credentials a

thehackerwire@mastodon.social at 2026-03-20T23:00:52.000Z ##

🟠 CVE-2026-33038 - High (8.1)

WWBN AVideo is an open source video platform. Versions 25.0 and below are vulnerable to unauthenticated application takeover through the install/checkConfiguration.php endpoint. install/checkConfiguration.php performs full application initializati...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:00:52.000Z ##

🟠 CVE-2026-33038 - High (8.1)

WWBN AVideo is an open source video platform. Versions 25.0 and below are vulnerable to unauthenticated application takeover through the install/checkConfiguration.php endpoint. install/checkConfiguration.php performs full application initializati...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33036
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-20T21:22:16

2 posts

## Summary The fix for CVE-2026-26278 added entity expansion limits (`maxTotalExpansions`, `maxExpandedLength`, `maxEntityCount`, `maxEntitySize`) to prevent XML entity expansion Denial of Service. However, these limits are only enforced for DOCTYPE-defined entities. **Numeric character references** (`&#NNN;` and `&#xHH;`) and standard XML entities (`<`, `>`, etc.) are processed through a s

thehackerwire@mastodon.social at 2026-03-20T23:00:42.000Z ##

🟠 CVE-2026-33036 - High (7.5)

fast-xml-parser allows users to process XML from JS object without C/C++ based libraries or callbacks. Versions 4.0.0-beta.3 through 5.5.5 contain a bypass vulnerability where numeric character references (&#NNN;, &#xHH;) and standard XML entities...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:00:42.000Z ##

🟠 CVE-2026-33036 - High (7.5)

fast-xml-parser allows users to process XML from JS object without C/C++ based libraries or callbacks. Versions 4.0.0-beta.3 through 5.5.5 contain a bypass vulnerability where numeric character references (&#NNN;, &#xHH;) and standard XML entities...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33012
(7.5 HIGH)

EPSS: 0.10%

updated 2026-03-20T21:21:56

2 posts

`DefaultHtmlErrorResponseBodyProvider` in `io.micronaut:micronaut-http-server` since `4.7.0` and until `4.10.7` used an unbounded `ConcurrentHashMap` cache with no eviction policy. If the application throws an exception whose message may be influenced by an attacker, for example, including request query value parameters, this could be used by remote attackers to cause a denial of service (unbound

thehackerwire@mastodon.social at 2026-03-20T23:01:13.000Z ##

🟠 CVE-2026-33012 - High (7.5)

Micronaut Framework is a JVM-based full stack Java framework designed for building modular, easily testable JVM applications. Versions 4.7.0 through 4.10.16 used an unbounded ConcurrentHashMap cache with no eviction policy in its DefaultHtmlError...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:01:13.000Z ##

🟠 CVE-2026-33012 - High (7.5)

Micronaut Framework is a JVM-based full stack Java framework designed for building modular, easily testable JVM applications. Versions 4.7.0 through 4.10.16 used an unbounded ConcurrentHashMap cache with no eviction policy in its DefaultHtmlError...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32940
(9.3 CRITICAL)

EPSS: 0.05%

updated 2026-03-20T21:21:11

2 posts

# SanitizeSVG bypass via data:text/xml in getDynamicIcon (incomplete fix for CVE-2026-29183) `SanitizeSVG` blocks `data:text/html` and `data:image/svg+xml` in href attributes but misses `data:text/xml` and `data:application/xml`. Both render SVG with `onload` JavaScript execution (confirmed in Chromium 136, other browsers untested). `/api/icon/getDynamicIcon` is unauthenticated and serves SVG as

thehackerwire@mastodon.social at 2026-03-20T23:01:31.000Z ##

πŸ”΄ CVE-2026-32940 - Critical (9.3)

SiYuan is a personal knowledge management system. In versions 3.6.0 and below, SanitizeSVG has an incomplete blocklist β€” it blocks data:text/html and data:image/svg+xml in href attributes but misses data:text/xml and data:application/xml, both o...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:01:31.000Z ##

πŸ”΄ CVE-2026-32940 - Critical (9.3)

SiYuan is a personal knowledge management system. In versions 3.6.0 and below, SanitizeSVG has an incomplete blocklist β€” it blocks data:text/html and data:image/svg+xml in href attributes but misses data:text/xml and data:application/xml, both o...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32938
(9.9 CRITICAL)

EPSS: 0.09%

updated 2026-03-20T21:21:06

2 posts

### Summary In SiYuan, `/api/lute/html2BlockDOM` on the desktop copies local files pointed to by `file://` links in pasted HTML into the workspace assets directory without validating paths against a sensitive-path list. Together with `GET /assets/*path`, which only requires authentication, a publish-service visitor can cause the desktop kernel to copy any readable sensitive file and then read it

thehackerwire@mastodon.social at 2026-03-20T23:14:49.000Z ##

πŸ”΄ CVE-2026-32938 - Critical (9.9)

SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the /api/lute/html2BlockDOM on the desktop copies local files pointed to by file:// links in pasted HTML into the workspace assets directory without validating paths ag...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:14:49.000Z ##

πŸ”΄ CVE-2026-32938 - Critical (9.9)

SiYuan is a personal knowledge management system. In versions 3.6.0 and below, the /api/lute/html2BlockDOM on the desktop copies local files pointed to by file:// links in pasted HTML into the workspace assets directory without validating paths ag...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32767
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-03-20T21:18:23

1 posts

## Summary SiYuan Note v3.6.0 (and likely prior versions) contains an authorization bypass vulnerability in the `/api/search/fullTextSearchBlock` endpoint. When the `method` parameter is set to `2`, the endpoint passes user-supplied input directly as a raw SQL statement to the underlying SQLite database without any authorization or read-only checks. This allows any authenticated user β€” including

offseq@infosec.exchange at 2026-03-20T01:30:29.000Z ##

⚠️ CVE-2026-32767: SiYuan (<3.6.1) has a CRITICAL SQL injection flaw in /api/search/fullTextSearchBlock. Any authenticated user can run SQL, risking full data compromise. Upgrade to 3.6.1+ ASAP. radar.offseq.com/threat/cve-20 #OffSeq #SiYuan #SQLInjection #Vuln

##

CVE-2026-33155
(0 None)

EPSS: 0.04%

updated 2026-03-20T21:17:15.910000

1 posts

DeepDiff is a project focused on Deep Difference and search of any Python data. From version 5.0.0 to before version 8.6.2, the pickle unpickler _RestrictedUnpickler validates which classes can be loaded but does not limit their constructor arguments. A few of the types in SAFE_TO_IMPORT have constructors that allocate memory proportional to their input (builtins.bytes, builtins.list, builtins.ran

_r_netsec@infosec.exchange at 2026-03-19T17:58:05.000Z ##

we found a memory exhaustion CVE in a library downloaded 29 million times a month. AWS, DataHub, and Lightning AI are in the blast radius. periphery.security/blog/cve-20

##

CVE-2026-33154
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-20T21:17:15.740000

1 posts

dynaconf is a configuration management tool for Python. Prior to version 3.2.13, Dynaconf is vulnerable to Server-Side Template Injection (SSTI) due to unsafe template evaluation in the @Jinja resolver. When the jinja2 package is installed, Dynaconf evaluates template expressions embedded in configuration values without a sandboxed environment. This issue has been patched in version 3.2.13.

thehackerwire@mastodon.social at 2026-03-20T21:22:24.000Z ##

🟠 CVE-2026-33154 - High (7.5)

dynaconf is a configuration management tool for Python. Prior to version 3.2.13, Dynaconf is vulnerable to Server-Side Template Injection (SSTI) due to unsafe template evaluation in the @Jinja resolver. When the jinja2 package is installed, Dynaco...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32025
(7.5 HIGH)

EPSS: 0.05%

updated 2026-03-20T21:13:30

1 posts

This issue is a browser-origin WebSocket auth chain on local loopback deployments using password auth. It is serious, but conditional: an attacker must get the user to open a malicious page and then successfully guess the gateway password. ## Context and Preconditions OpenClaw’s web/gateway surface is designed for local use and trusted-operator workflows. In affected versions, a browser-origin c

thehackerwire@mastodon.social at 2026-03-19T23:00:23.000Z ##

🟠 CVE-2026-32025 - High (7.5)

OpenClaw versions prior to 2026.2.25 contain an authentication hardening gap in browser-origin WebSocket clients that allows attackers to bypass origin checks and auth throttling on loopback deployments. An attacker can trick a user into opening a...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32014
(8.0 HIGH)

EPSS: 0.02%

updated 2026-03-20T21:12:25

1 posts

## Summary A paired node device could reconnect with spoofed `platform`/`deviceFamily` metadata and broaden node command policy eligibility because reconnect metadata was accepted from the client while these fields were not bound into the device-auth signature. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected versions: `<= 2026.2.25` - Latest published version at update ti

thehackerwire@mastodon.social at 2026-03-19T23:01:02.000Z ##

🟠 CVE-2026-32014 - High (8)

OpenClaw versions prior to 2026.2.26 contain a metadata spoofing vulnerability where reconnect platform and deviceFamily fields are accepted from the client without being bound into the device-auth signature. An attacker with a paired node identit...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22172
(10.0 CRITICAL)

EPSS: 0.01%

updated 2026-03-20T21:04:19

1 posts

### Summary A logic flaw in the OpenClaw gateway WebSocket connect path allowed certain device-less shared-token or password-authenticated backend connections to keep client-declared scopes without server-side binding. A shared-authenticated client could present elevated scopes such as `operator.admin` even though those scopes were not tied to a device identity or an explicitly trusted Control UI

thehackerwire@mastodon.social at 2026-03-20T21:01:06.000Z ##

πŸ”΄ CVE-2026-22172 - Critical (9.9)

OpenClaw versions prior to 2026.3.12 contain an authorization bypass vulnerability in the WebSocket connect path that allows shared-token or password-authenticated connections to self-declare elevated scopes without server-side binding. Attackers ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22732
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-03-20T20:42:26

2 posts

When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written.Β  This issue affects Spring Security: from 5.7.0 through 5.7.21, from 5.8.0 through 5.8.23, from 6.3.0 through 6.3.14, from 6.4.0 through 6.4.14, from 6.5.0 through 6.5.8, from 7.0.0 through 7.0.3.

offseq@infosec.exchange at 2026-03-20T00:00:54.000Z ##

🚨 CVE-2026-22732 (CRITICAL, CVSS 9.1): Spring Security 5.7.0 – 7.0.3 vulnerability lets HTTP headers go unwritten, risking CSP/HSTS bypass. No auth needed, remote exploit possible. Upgrade urgently & enforce headers via WAF/CDN! radar.offseq.com/threat/cve-20 #OffSeq #SpringSecurity #CVE202622732

##

thehackerwire@mastodon.social at 2026-03-19T23:25:14.000Z ##

πŸ”΄ CVE-2026-22732 - Critical (9.1)

When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP Headers will not be written. 
This issue affects Spring Security: from 5.7.0 through 5.7.21, from 5.8.0 through...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22731
(8.2 HIGH)

EPSS: 0.04%

updated 2026-03-20T20:41:31

1 posts

Spring Boot applications with Actuator can be vulnerable to an "Authentication Bypass" vulnerability when an application endpoint that requires authentication is declared under a specific path, already configured for a Health Group additional path. This issue affects Spring Boot: from 4.0 before 4.0.3, from 3.5 before 3.5.11, from 3.4 before 3.4.15. This CVE is similar but not equivalent to CVE-20

thehackerwire@mastodon.social at 2026-03-19T23:23:42.000Z ##

🟠 CVE-2026-22731 - High (8.2)

Spring Boot applications with Actuator can be vulnerable to an "Authentication Bypass" vulnerability when an application endpoint that requires authentication is declared under a specific path, already configured for a Health Group additional path...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33135
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-03-20T19:25:45.043000

1 posts

WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the novo_memorandoo.php endpoint. An attacker can inject arbitrary JavaScript into the sccs GET parameter, which is directly echoed into the HTML response without any sanitization or encoding. The script /html/memorando/novo_memorandoo.php reads HTTP GET paramet

thehackerwire@mastodon.social at 2026-03-20T21:26:41.000Z ##

πŸ”΄ CVE-2026-33135 - Critical (9.3)

WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the novo_memorandoo.php endpoint. An attacker can inject arbitrary JavaScript into the sccs GET parameter, wh...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33017
(0 None)

EPSS: 0.44%

updated 2026-03-20T19:16:17.980000

4 posts

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored f

1 repos

https://github.com/MaxMnMl/langflow-CVE-2026-33017-poc

beyondmachines1 at 2026-03-21T10:01:49.251Z ##

Critical Langflow RCE Vulnerability CVE-2026-33017 Exploited Within Hours

Researchers report active exploitation of a critical RCE vulnerability (CVE-2026-33017) in Langflow that allows unauthenticated attackers to execute arbitrary Python code and steal sensitive API keys. The flaw was weaponized within 20 hours of disclosure, targeting exposed AI orchestration pipelines to harvest credentials and environment variables.

**If you're running Langflow, this is urgent. Update immediately to version 1.9.0.dev8 or later to patch CVE-2026-33017, and disable the AUTO_LOGIN=true default setting. Until you can update, restrict network access to the vulnerable endpoint, place Langflow behind a reverse proxy with authentication. Regardless if you patch or isolate, make sure to rotate all API keys and credentials the platform uses after isolating.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-03-21T10:01:49.000Z ##

Critical Langflow RCE Vulnerability CVE-2026-33017 Exploited Within Hours

Researchers report active exploitation of a critical RCE vulnerability (CVE-2026-33017) in Langflow that allows unauthenticated attackers to execute arbitrary Python code and steal sensitive API keys. The flaw was weaponized within 20 hours of disclosure, targeting exposed AI orchestration pipelines to harvest credentials and environment variables.

**If you're running Langflow, this is urgent. Update immediately to version 1.9.0.dev8 or later to patch CVE-2026-33017, and disable the AUTO_LOGIN=true default setting. Until you can update, restrict network access to the vulnerable endpoint, place Langflow behind a reverse proxy with authentication. Regardless if you patch or isolate, make sure to rotate all API keys and credentials the platform uses after isolating.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

hackerworkspace@infosec.exchange at 2026-03-20T20:51:29.000Z ##

Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure

thehackernews.com/2026/03/crit

Short summary: hackerworkspace.com/article/cr

#cybersecurity #threatintelligence #vulnerability

##

AAKL@infosec.exchange at 2026-03-20T14:56:47.000Z ##

From yesterday. Langflow is "an open-source visual framework for building AI agents and retrieval-augmented generation (RAG) pipelines."

Sysdig: CVE-2026-33017: How attackers compromised Langflow AI pipelines in 20 hours sysdig.com/blog/cve-2026-33017

More:

Infosecurity-Magazine: infosecurity-magazine.com/news #infosec

##

CVE-2026-32710
(8.5 HIGH)

EPSS: 0.26%

updated 2026-03-20T19:16:16.670000

1 posts

MariaDB server is a community developed fork of MySQL server. An authenticated user can crash MariaDB versions 11.4 before 11.4.10 and 11.8 before 11.8.6 via a bug in JSON_SCHEMA_VALID() function. Under certain conditions it might be possible to turn the crash into a remote code execution. These conditions require tight control over memory layout which is generally only attainable in a lab environ

thehackerwire@mastodon.social at 2026-03-20T20:01:10.000Z ##

🟠 CVE-2026-32710 - High (8.5)

MariaDB server is a community developed fork of MySQL server. An authenticated user can crash MariaDB versions 11.4 before 11.4.10 and 11.8 before 11.8.6 via a bug in JSON_SCHEMA_VALID() function. Under certain conditions it might be possible to t...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-32432
(10.0 CRITICAL)

EPSS: 89.44%

updated 2026-03-20T19:14:20.843000

3 posts

Craft is a flexible, user-friendly CMS for creating custom digital experiences on the web and beyond. Starting from version 3.0.0-RC1 to before 3.9.15, 4.0.0-RC1 to before 4.14.15, and 5.0.0-RC1 to before 5.6.17, Craft is vulnerable to remote code execution. This is a high-impact, low-complexity attack vector. This issue has been patched in versions 3.9.15, 4.14.15, and 5.6.17, and is an additiona

Nuclei template

4 repos

https://github.com/bambooqj/CVE-2025-32432

https://github.com/Chocapikk/CVE-2025-32432

https://github.com/Sachinart/CVE-2025-32432

https://github.com/CTY-Research-1/CVE-2025-32432-PoC

secdb@infosec.exchange at 2026-03-20T18:00:21.000Z ##

🚨 [CISA-2026:0320] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-31277 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/124147 ; support.apple.com/en-us/124149 ; support.apple.com/en-us/124152 ; support.apple.com/en-us/124153 ; support.apple.com/en-us/124155 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32432 (secdb.nttzen.cloud/cve/detail/)
- Name: Craft CMS Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Craft CMS
- Product: Craft CMS
- Notes: craftcms.com/knowledge-base/cr ; github.com/craftcms/cms/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-43510 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Improper Locking Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-43520 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Classic Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-54068 (secdb.nttzen.cloud/cve/detail/)
- Name: Laravel Livewire Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Laravel
- Product: Livewire
- Notes: github.com/livewire/livewire/s ; github.com/livewire/livewire/c ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260320 #cisa20260320 #cve_2025_31277 #cve_2025_32432 #cve_2025_43510 #cve_2025_43520 #cve_2025_54068 #cve202531277 #cve202532432 #cve202543510 #cve202543520 #cve202554068

##

AAKL@infosec.exchange at 2026-03-20T16:01:15.000Z ##

Looks like CISA has added to the KEV catalogue. Today's winner is Apple.

- CVE-2025-31277: Apple Multiple Products Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43520: Apple Multiple Products Classic Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-54068: Laravel Livewire Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-32432: Craft CMS Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Apple #infosec #vulnerability

##

cisakevtracker@mastodon.social at 2026-03-20T16:01:13.000Z ##

CVE ID: CVE-2025-32432
Vendor: Craft CMS
Product: Craft CMS
Date Added: 2026-03-20
Notes: craftcms.com/knowledge-base/cr ; github.com/craftcms/cms/securi ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-43510
(7.8 HIGH)

EPSS: 0.40%

updated 2026-03-20T18:39:56.413000

3 posts

A memory corruption issue was addressed with improved lock state checking. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may cause unexpected changes in memory shared between processes.

secdb@infosec.exchange at 2026-03-20T18:00:21.000Z ##

🚨 [CISA-2026:0320] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-31277 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/124147 ; support.apple.com/en-us/124149 ; support.apple.com/en-us/124152 ; support.apple.com/en-us/124153 ; support.apple.com/en-us/124155 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32432 (secdb.nttzen.cloud/cve/detail/)
- Name: Craft CMS Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Craft CMS
- Product: Craft CMS
- Notes: craftcms.com/knowledge-base/cr ; github.com/craftcms/cms/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-43510 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Improper Locking Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-43520 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Classic Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-54068 (secdb.nttzen.cloud/cve/detail/)
- Name: Laravel Livewire Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Laravel
- Product: Livewire
- Notes: github.com/livewire/livewire/s ; github.com/livewire/livewire/c ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260320 #cisa20260320 #cve_2025_31277 #cve_2025_32432 #cve_2025_43510 #cve_2025_43520 #cve_2025_54068 #cve202531277 #cve202532432 #cve202543510 #cve202543520 #cve202554068

##

cisakevtracker@mastodon.social at 2026-03-20T16:01:44.000Z ##

CVE ID: CVE-2025-43510
Vendor: Apple
Product: Multiple Products
Date Added: 2026-03-20
Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-20T16:01:15.000Z ##

Looks like CISA has added to the KEV catalogue. Today's winner is Apple.

- CVE-2025-31277: Apple Multiple Products Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43520: Apple Multiple Products Classic Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-54068: Laravel Livewire Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-32432: Craft CMS Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Apple #infosec #vulnerability

##

CVE-2025-43520
(5.5 MEDIUM)

EPSS: 0.41%

updated 2026-03-20T18:32:19

3 posts

A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.

secdb@infosec.exchange at 2026-03-20T18:00:21.000Z ##

🚨 [CISA-2026:0320] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-31277 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/124147 ; support.apple.com/en-us/124149 ; support.apple.com/en-us/124152 ; support.apple.com/en-us/124153 ; support.apple.com/en-us/124155 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32432 (secdb.nttzen.cloud/cve/detail/)
- Name: Craft CMS Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Craft CMS
- Product: Craft CMS
- Notes: craftcms.com/knowledge-base/cr ; github.com/craftcms/cms/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-43510 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Improper Locking Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-43520 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Classic Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-54068 (secdb.nttzen.cloud/cve/detail/)
- Name: Laravel Livewire Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Laravel
- Product: Livewire
- Notes: github.com/livewire/livewire/s ; github.com/livewire/livewire/c ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260320 #cisa20260320 #cve_2025_31277 #cve_2025_32432 #cve_2025_43510 #cve_2025_43520 #cve_2025_54068 #cve202531277 #cve202532432 #cve202543510 #cve202543520 #cve202554068

##

cisakevtracker@mastodon.social at 2026-03-20T16:01:59.000Z ##

CVE ID: CVE-2025-43520
Vendor: Apple
Product: Multiple Products
Date Added: 2026-03-20
Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-20T16:01:15.000Z ##

Looks like CISA has added to the KEV catalogue. Today's winner is Apple.

- CVE-2025-31277: Apple Multiple Products Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43520: Apple Multiple Products Classic Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-54068: Laravel Livewire Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-32432: Craft CMS Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Apple #infosec #vulnerability

##

CVE-2025-31277
(8.8 HIGH)

EPSS: 0.39%

updated 2026-03-20T18:32:18

3 posts

The issue was addressed with improved memory handling. This issue is fixed in watchOS 11.6, visionOS 2.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6. Processing maliciously crafted web content may lead to memory corruption.

secdb@infosec.exchange at 2026-03-20T18:00:21.000Z ##

🚨 [CISA-2026:0320] CISA Adds 5 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 5 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-31277 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/124147 ; support.apple.com/en-us/124149 ; support.apple.com/en-us/124152 ; support.apple.com/en-us/124153 ; support.apple.com/en-us/124155 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32432 (secdb.nttzen.cloud/cve/detail/)
- Name: Craft CMS Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Craft CMS
- Product: Craft CMS
- Notes: craftcms.com/knowledge-base/cr ; github.com/craftcms/cms/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-43510 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Improper Locking Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-43520 (secdb.nttzen.cloud/cve/detail/)
- Name: Apple Multiple Products Classic Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apple
- Product: Multiple Products
- Notes: support.apple.com/en-us/125632 ; support.apple.com/en-us/125633 ; support.apple.com/en-us/125634 ; support.apple.com/en-us/125635 ; support.apple.com/en-us/125636 ; support.apple.com/en-us/125637 ; support.apple.com/en-us/125638 ; support.apple.com/en-us/125639 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-54068 (secdb.nttzen.cloud/cve/detail/)
- Name: Laravel Livewire Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Laravel
- Product: Livewire
- Notes: github.com/livewire/livewire/s ; github.com/livewire/livewire/c ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260320 #cisa20260320 #cve_2025_31277 #cve_2025_32432 #cve_2025_43510 #cve_2025_43520 #cve_2025_54068 #cve202531277 #cve202532432 #cve202543510 #cve202543520 #cve202554068

##

cisakevtracker@mastodon.social at 2026-03-20T16:02:15.000Z ##

CVE ID: CVE-2025-31277
Vendor: Apple
Product: Multiple Products
Date Added: 2026-03-20
Notes: support.apple.com/en-us/124147 ; support.apple.com/en-us/124149 ; support.apple.com/en-us/124152 ; support.apple.com/en-us/124153 ; support.apple.com/en-us/124155 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-20T16:01:15.000Z ##

Looks like CISA has added to the KEV catalogue. Today's winner is Apple.

- CVE-2025-31277: Apple Multiple Products Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43520: Apple Multiple Products Classic Buffer Overflow Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-43510: Apple Multiple Products Improper Locking Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-54068: Laravel Livewire Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025-

- CVE-2025-32432: Craft CMS Code Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Apple #infosec #vulnerability

##

CVE-2026-4493
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-20T18:31:30

1 posts

A vulnerability was determined in Tenda A18 Pro 02.03.02.28. The impacted element is the function sub_423B50 of the file /goform/setMacFilterCfg of the component MAC Filtering Configuration Endpoint. Executing a manipulation of the argument deviceList can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-20T20:01:30.000Z ##

🟠 CVE-2026-4493 - High (8.8)

A vulnerability was determined in Tenda A18 Pro 02.03.02.28. The impacted element is the function sub_423B50 of the file /goform/setMacFilterCfg of the component MAC Filtering Configuration Endpoint. Executing a manipulation of the argument device...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4490
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-20T18:31:29

1 posts

A flaw has been found in Tenda A18 Pro 02.03.02.28. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. This manipulation causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-03-20T20:20:47.000Z ##

🟠 CVE-2026-4490 - High (8.8)

A flaw has been found in Tenda A18 Pro 02.03.02.28. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. This manipulation causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit ha...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4492
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-20T18:31:28

1 posts

A vulnerability was found in Tenda A18 Pro 02.03.02.28. The affected element is the function set_qosMib_list of the file /goform/formSetQosBand. Performing a manipulation of the argument list results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-03-20T20:01:20.000Z ##

🟠 CVE-2026-4492 - High (8.8)

A vulnerability was found in Tenda A18 Pro 02.03.02.28. The affected element is the function set_qosMib_list of the file /goform/formSetQosBand. Performing a manipulation of the argument list results in stack-based buffer overflow. The attack is p...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32989
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-20T18:31:27

1 posts

Precurio Intranet Portal 4.4 contains a cross-site request forgery vulnerability that allows attackers to induce authenticated users to submit crafted requests to a profile update endpoint handling file uploads. Attackers can exploit this to upload executable files to web-accessible locations, leading to arbitrary code execution in the context of the web server.

thehackerwire@mastodon.social at 2026-03-20T21:00:47.000Z ##

🟠 CVE-2026-32989 - High (8.8)

Precurio Intranet Portal 4.4 contains a cross-site request forgery vulnerability that allows attackers to induce authenticated users to submit crafted requests to a profile update endpoint handling file uploads. Attackers can exploit this to uploa...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4489
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-20T18:31:27

1 posts

A vulnerability was detected in Tenda A18 Pro 02.03.02.28. This vulnerability affects the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. The manipulation results in stack-based buffer overflow. The attack may be launched remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-03-20T21:00:33.000Z ##

🟠 CVE-2026-4489 - High (8.8)

A vulnerability was detected in Tenda A18 Pro 02.03.02.28. This vulnerability affects the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. The manipulation results in stack-based buffer overflow. The attack may be lau...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32985
(9.8 CRITICAL)

EPSS: 0.64%

updated 2026-03-20T18:16:16.477000

2 posts

Xerte Online Toolkits versions 3.14 and earlier contain an unauthenticated arbitrary file upload vulnerability in the template import functionality that allows remote attackers to execute arbitrary code by uploading a crafted ZIP archive containing malicious PHP payloads. Attackers can bypass authentication checks in the import.php file to upload a template archive with PHP code in the media direc

Matchbook3469@mastodon.social at 2026-03-21T13:36:39.000Z ##

β›” New security advisory:

CVE-2026-32985 affects multiple systems.

β€’ Impact: Remote code execution or complete system compromise possible
β€’ Risk: Attackers can gain full control of affected systems
β€’ Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

offseq@infosec.exchange at 2026-03-20T03:00:25.000Z ##

πŸ”΄ CRITICAL: CVE-2026-32985 in Xerte Online Toolkits ≀3.14 lets attackers upload PHP via import.php and gain RCE β€” no auth needed! Patch ASAP or restrict access, disable PHP in user dirs. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202632985 #infosec #RCE

##

CVE-2026-32303
(7.6 HIGH)

EPSS: 0.02%

updated 2026-03-20T18:16:14.593000

1 posts

Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.1, an integrity check vulnerability allows an attacker to tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loading mechanism. Before this fix, the client trusted endpoints from the vault config without host authenticity checks, which could allow token exfiltration b

thehackerwire@mastodon.social at 2026-03-20T20:20:27.000Z ##

🟠 CVE-2026-32303 - High (7.6)

Cryptomator encrypts data being stored on cloud infrastructure. Prior to version 1.19.1, an integrity check vulnerability allows an attacker to tamper with the vault configuration file leading to a man-in-the-middle vulnerability in Hub key loadin...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33001
(8.8 HIGH)

EPSS: 0.11%

updated 2026-03-20T18:08:15.507000

1 posts

Jenkins 2.554 and earlier, LTS 2.541.2 and earlier does not safely handle symbolic links during the extraction of .tar and .tar.gz archives, allowing crafted archives to write files to arbitrary locations on the filesystem, restricted only by file system access permissions of the user running Jenkins. This can be exploited to deploy malicious scripts or plugins on the controller by attackers with

CVE-2026-4342
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-20T17:26:11

2 posts

A security issue was discovered in ingress-nginx where a combination of Ingress annotations can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

1 repos

https://github.com/stuartMoorhouse/CVE-2026-4342

thehackerwire@mastodon.social at 2026-03-19T22:18:53.000Z ##

🟠 CVE-2026-4342 - High (8.8)

A security issue was discovered in ingress-nginx where a combination of Ingress annotations can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T22:17:53.000Z ##

🟠 CVE-2026-4342 - High (8.8)

A security issue was discovered in ingress-nginx where a combination of Ingress annotations can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4491
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-20T17:17:00.240000

1 posts

A vulnerability has been found in Tenda A18 Pro 02.03.02.28. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-03-20T21:00:14.000Z ##

🟠 CVE-2026-4491 - High (8.8)

A vulnerability has been found in Tenda A18 Pro 02.03.02.28. Impacted is the function fromSetIpMacBind of the file /goform/SetIpMacBind. Such manipulation of the argument list leads to stack-based buffer overflow. The attack can be executed remote...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4488
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-20T16:16:19.093000

1 posts

A vulnerability was identified in UTT HiPER 1250GW up to 3.2.7-210907-180535. Affected is the function strcpy of the file /goform/setSysAdm. Such manipulation of the argument GroupName leads to buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-03-20T21:00:23.000Z ##

🟠 CVE-2026-4488 - High (8.8)

A vulnerability was identified in UTT HiPER 1250GW up to 3.2.7-210907-180535. Affected is the function strcpy of the file /goform/setSysAdm. Such manipulation of the argument GroupName leads to buffer overflow. It is possible to launch the attack ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32701
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-20T15:56:45

1 posts

**Summary** Qwik City improperly inferred arrays from dotted form field names during `FormData` parsing. By submitting mixed array-index and object-property keys for the same path, an attacker could cause user-controlled properties to be written onto values that application code expected to be arrays. **Description** When processing `application/x-www-form-urlencoded` or `multipart/form-data` r

thehackerwire@mastodon.social at 2026-03-20T22:16:27.000Z ##

🟠 CVE-2026-32701 - High (7.5)

Qwik is a performance-focused JavaScript framework. Versions prior to 1.19.2 improperly inferred arrays from dotted form field names during FormData parsing. By submitting mixed array-index and object-property keys for the same path, an attacker c...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4486
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-20T15:31:20

1 posts

A vulnerability was found in D-Link DIR-513 1.10. This affects the function formEasySetPassword of the file /goform/formEasySetPassword of the component Web Service. The manipulation of the argument curTime results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer

thehackerwire@mastodon.social at 2026-03-20T21:22:43.000Z ##

🟠 CVE-2026-4486 - High (8.8)

A vulnerability was found in D-Link DIR-513 1.10. This affects the function formEasySetPassword of the file /goform/formEasySetPassword of the component Web Service. The manipulation of the argument curTime results in stack-based buffer overflow. ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4487
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-20T15:16:23.850000

1 posts

A vulnerability was determined in UTT HiPER 1200GW up to 2.5.3-170306. This impacts the function strcpy of the file /goform/websHostFilter. This manipulation causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-20T21:00:56.000Z ##

🟠 CVE-2026-4487 - High (8.8)

A vulnerability was determined in UTT HiPER 1200GW up to 2.5.3-170306. This impacts the function strcpy of the file /goform/websHostFilter. This manipulation causes buffer overflow. It is possible to initiate the attack remotely. The exploit has b...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4428
(7.4 HIGH)

EPSS: 0.02%

updated 2026-03-20T13:39:46.493000

1 posts

A logic error in CRL distribution point validation in AWS-LC before 1.71.0 causes partitioned CRLs to be incorrectly rejected as out of scope, which allows a revoked certificate to bypass certificate revocation checks. To remediate this issue, users should upgrade to AWS-LC 1.71.0 or AWS-LC-FIPS-3.3.0.

CVE-2026-32011
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-20T13:39:46.493000

1 posts

OpenClaw versions prior to 2026.3.2 contain a denial of service vulnerability in webhook handlers for BlueBubbles and Google Chat that parse request bodies before performing authentication and signature validation. Unauthenticated attackers can exploit this by sending slow or oversized request bodies to exhaust parser resources and degrade service availability.

thehackerwire@mastodon.social at 2026-03-19T23:00:33.000Z ##

🟠 CVE-2026-32011 - High (7.5)

OpenClaw versions prior to 2026.3.2 contain a denial of service vulnerability in webhook handlers for BlueBubbles and Google Chat that parse request bodies before performing authentication and signature validation. Unauthenticated attackers can ex...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32194
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-03-20T13:39:46.493000

2 posts

Improper neutralization of special elements used in a command ('command injection') in Microsoft Bing Images allows an unauthorized attacker to execute code over a network.

1 repos

https://github.com/z3r0h3ro/CVE-2026-32194-POC

thehackerwire@mastodon.social at 2026-03-19T22:19:02.000Z ##

πŸ”΄ CVE-2026-32194 - Critical (9.8)

Improper neutralization of special elements used in a command ('command injection') in Microsoft Bing Images allows an unauthorized attacker to execute code over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T22:18:02.000Z ##

πŸ”΄ CVE-2026-32194 - Critical (9.8)

Improper neutralization of special elements used in a command ('command injection') in Microsoft Bing Images allows an unauthorized attacker to execute code over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23659
(8.6 HIGH)

EPSS: 0.11%

updated 2026-03-20T13:39:46.493000

1 posts

Exposure of sensitive information to an unauthorized actor in Azure Data Factory allows an unauthorized attacker to disclose information over a network.

thehackerwire@mastodon.social at 2026-03-19T21:31:41.000Z ##

🟠 CVE-2026-23659 - High (8.6)

Exposure of sensitive information to an unauthorized actor in Azure Data Factory allows an unauthorized attacker to disclose information over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30836
(10.0 CRITICAL)

EPSS: 0.01%

updated 2026-03-20T13:39:46.493000

1 posts

Step CA is an online certificate authority for secure, automated certificate management for DevOps. Versions 0.30.0-rc6 and below do not safeguard against unauthenticated certificate issuance through the SCEP UpdateReq. This issue has been fixed in version 0.30.0.

thehackerwire@mastodon.social at 2026-03-19T21:23:22.000Z ##

πŸ”΄ CVE-2026-30836 - Critical (10)

Step CA is an online certificate authority for secure, automated certificate management for DevOps. Versions 0.30.0-rc6 and below do not safeguard against unauthenticated certificate issuance through the SCEP UpdateReq. This issue has been fixed i...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32169
(10.0 CRITICAL)

EPSS: 0.09%

updated 2026-03-20T13:39:46.493000

1 posts

Server-side request forgery (ssrf) in Azure Cloud Shell allows an unauthorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-03-19T21:22:28.000Z ##

πŸ”΄ CVE-2026-32169 - Critical (10)

Server-side request forgery (ssrf) in Azure Cloud Shell allows an unauthorized attacker to elevate privileges over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4427
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-20T13:39:46.493000

1 posts

A flaw was found in pgproto3. A malicious or compromised PostgreSQL server can exploit this by sending a DataRow message with a negative field length. This input validation vulnerability can lead to a denial of service (DoS) due to a slice bounds out of range panic.

thehackerwire@mastodon.social at 2026-03-19T20:00:10.000Z ##

🟠 CVE-2026-4427 - High (7.5)

A flaw was found in pgproto3. A malicious or compromised PostgreSQL server can exploit this by sending a DataRow message with a negative field length. This input validation vulnerability can lead to a denial of service (DoS) due to a slice bounds ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71260
(8.8 HIGH)

EPSS: 6.54%

updated 2026-03-20T13:39:46.493000

1 posts

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserialization of untrusted data vulnerability in the ASP.NET servlet's VIEWSTATE handling that allows authenticated attackers to execute arbitrary code. Attackers can supply crafted serialized objects to the VIEWSTATE parameter to achieve remote code execution and fully compromise the application.Β The following hotfixes remedia

1 repos

https://github.com/watchtowrlabs/watchTowr-vs-BMC-Footprints-RCE-CVE-2025-71257-CVE-2025-71260

thehackerwire@mastodon.social at 2026-03-19T14:17:09.000Z ##

🟠 CVE-2025-71260 - High (8.8)

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserialization of untrusted data vulnerability in the ASP.NET servlet's VIEWSTATE handling that allows authenticated attackers to execute arbitrary code. Attackers can supply cr...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4478
(8.1 HIGH)

EPSS: 0.01%

updated 2026-03-20T13:37:50.737000

3 posts

A vulnerability was identified in Yi Technology YI Home Camera 2 2.1.1_20171024151200. This impacts an unknown function of the file home/web/ipc of the component HTTP Firmware Update Handler. The manipulation leads to improper verification of cryptographic signature. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is said to be diff

thehackerwire@mastodon.social at 2026-03-20T22:17:48.000Z ##

🟠 CVE-2026-4478 - High (8.1)

A vulnerability was identified in Yi Technology YI Home Camera 2 2.1.1_20171024151200. This impacts an unknown function of the file home/web/ipc of the component HTTP Firmware Update Handler. The manipulation leads to improper verification of cryp...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:17:48.000Z ##

🟠 CVE-2026-4478 - High (8.1)

A vulnerability was identified in Yi Technology YI Home Camera 2 2.1.1_20171024151200. This impacts an unknown function of the file home/web/ipc of the component HTTP Firmware Update Handler. The manipulation leads to improper verification of cryp...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-20T07:30:28.000Z ##

⚠️ CVE-2026-4478 (CRITICAL, CVSS 9.2) hits Yi Home Camera 2 (2.1.1_20171024151200): Improper signature verification in HTTP firmware update handler. Public exploit, no vendor response. Monitor & segment affected devices. radar.offseq.com/threat/cve-20 #OffSeq #IoTSecurity #Vuln

##

CVE-2026-33057
(9.8 CRITICAL)

EPSS: 0.12%

updated 2026-03-20T13:37:50.737000

1 posts

Mesop is a Python-based UI framework that allows users to build web applications. In versions 1.2.2 and below, an explicit web endpoint inside the ai/ testing module infrastructure directly ingests untrusted Python code strings unconditionally without authentication measures, yielding standard Unrestricted Remote Code Execution. Any individual capable of routing HTTP logic to this server block wil

thehackerwire@mastodon.social at 2026-03-20T22:16:46.000Z ##

πŸ”΄ CVE-2026-33057 - Critical (9.8)

Mesop is a Python-based UI framework that allows users to build web applications. In versions 1.2.2 and below, an explicit web endpoint inside the ai/ testing module infrastructure directly ingests untrusted Python code strings unconditionally wit...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22324
(8.1 HIGH)

EPSS: 0.11%

updated 2026-03-20T13:37:50.737000

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Melania allows PHP Local File Inclusion.This issue affects Melania: from n/a through 2.5.0.

thehackerwire@mastodon.social at 2026-03-20T22:00:31.000Z ##

🟠 CVE-2026-22324 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeREX Melania allows PHP Local File Inclusion.This issue affects Melania: from n/a through 2.5.0.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33075
(0 None)

EPSS: 0.03%

updated 2026-03-20T13:37:50.737000

1 posts

FastGPT is an AI Agent building platform. In versions 4.14.8.3 and below, the fastgpt-preview-image.yml workflow is vulnerable to arbitrary code execution and secret exfiltration by any external contributor. It uses pull_request_target (which runs with access to repository secrets) but checks out code from the pull request author's fork, then builds and pushes Docker images using attacker-controll

offseq@infosec.exchange at 2026-03-20T10:30:29.000Z ##

🚨 CRITICAL: CVE-2026-33075 affects labring FastGPT ≀4.14.8.3. GitHub Actions workflow flaw enables attackers to run code & steal secrets, risking supply chain compromise. No patch β€” audit workflows & restrict secrets now! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #SupplyChain

##

CVE-2026-29103
(9.1 CRITICAL)

EPSS: 0.20%

updated 2026-03-20T13:37:50.737000

1 posts

SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. A Critical Remote Code Execution (RCE) vulnerability exists in SuiteCRM 7.15.0 and 8.9.2, allowing authenticated administrators to execute arbitrary system commands. This vulnerability is a direct Patch Bypass of CVE-2024-49774. Although the vendor attempted to fix the issue in version 7.14.5,

thehackerwire@mastodon.social at 2026-03-19T23:23:32.000Z ##

πŸ”΄ CVE-2026-29103 - Critical (9.1)

SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. A Critical Remote Code Execution (RCE) vulnerability exists in SuiteCRM 7.15.0 and 8.9.2, allowing authenticated administrators to execute ar...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4475
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-20T09:32:16

6 posts

A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did n

thehackerwire@mastodon.social at 2026-03-20T23:03:47.000Z ##

🟠 CVE-2026-4475 - High (8.8)

A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:00:27.000Z ##

🟠 CVE-2026-4475 - High (8.8)

A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:17:41.000Z ##

🟠 CVE-2026-4475 - High (8.8)

A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:03:47.000Z ##

🟠 CVE-2026-4475 - High (8.8)

A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:00:27.000Z ##

🟠 CVE-2026-4475 - High (8.8)

A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:17:41.000Z ##

🟠 CVE-2026-4475 - High (8.8)

A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4038
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-20T06:31:39

3 posts

The Aimogen Pro plugin for WordPress is vulnerable to Arbitrary Function Call that can lead to privilege escalation due to a missing capability check on the 'aiomatic_call_ai_function_realtime' function in all versions up to, and including, 2.7.5. This makes it possible for unauthenticated attackers to call arbitrary WordPress functions such as 'update_option' to update the default role for regist

thehackerwire@mastodon.social at 2026-03-20T23:01:23.000Z ##

πŸ”΄ CVE-2026-4038 - Critical (9.8)

The Aimogen Pro plugin for WordPress is vulnerable to Arbitrary Function Call that can lead to privilege escalation due to a missing capability check on the 'aiomatic_call_ai_function_realtime' function in all versions up to, and including, 2.7.5....

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:01:23.000Z ##

πŸ”΄ CVE-2026-4038 - Critical (9.8)

The Aimogen Pro plugin for WordPress is vulnerable to Arbitrary Function Call that can lead to privilege escalation due to a missing capability check on the 'aiomatic_call_ai_function_realtime' function in all versions up to, and including, 2.7.5....

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-20T04:30:27.000Z ##

⚠️ CVE-2026-4038 (CRITICAL): Aimogen Pro WP plugin lets unauthenticated attackers gain admin via missing auth in aiomatic_call_ai_function_realtime. All versions affected. Disable plugin & monitor site integrity! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE20264038

##

CVE-2026-32038(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-03-19T22:29:35

1 posts

### Summary In `openclaw@2026.2.23`, sandbox network hardening blocks `network=host` but still allows `network=container:<id>`. This can let a sandbox join another container's network namespace and reach services available in that namespace. ### Preconditions and Trust Model Context This issue requires a trusted-operator configuration path (for example setting `agents.defaults.sandbox.docker.net

thehackerwire@mastodon.social at 2026-03-19T22:19:12.000Z ##

πŸ”΄ CVE-2026-32038 - Critical (9.8)

OpenClaw before 2026.2.24 contains a sandbox network isolation bypass vulnerability that allows trusted operators to join another container's network namespace. Attackers can configure the docker.network parameter with container: values to reach s...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23658
(8.6 HIGH)

EPSS: 0.08%

updated 2026-03-19T21:30:31

1 posts

Insufficiently protected credentials in Azure DevOps allows an unauthorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-03-19T21:33:36.000Z ##

🟠 CVE-2026-23658 - High (8.6)

Insufficiently protected credentials in Azure DevOps allows an unauthorized attacker to elevate privileges over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26139
(8.6 HIGH)

EPSS: 0.08%

updated 2026-03-19T21:30:31

1 posts

Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-03-19T21:31:32.000Z ##

🟠 CVE-2026-26139 - High (8.6)

Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26138
(8.6 HIGH)

EPSS: 0.08%

updated 2026-03-19T21:30:31

1 posts

Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-03-19T21:31:23.000Z ##

🟠 CVE-2026-26138 - High (8.6)

Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26137
(8.9 HIGH)

EPSS: 0.07%

updated 2026-03-19T21:30:31

1 posts

Server-side request forgery (ssrf) in Microsoft 365 Copilot's Business Chat allows an authorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-03-19T21:23:32.000Z ##

🟠 CVE-2026-26137 - High (8.9)

Server-side request forgery (ssrf) in Microsoft 365 Copilot's Business Chat allows an authorized attacker to elevate privileges over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32191
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-03-19T21:30:31

1 posts

Improper neutralization of special elements used in an os command ('os command injection') in Microsoft Bing Images allows an unauthorized attacker to execute code over a network.

thehackerwire@mastodon.social at 2026-03-19T21:22:38.000Z ##

πŸ”΄ CVE-2026-32191 - Critical (9.8)

Improper neutralization of special elements used in an os command ('os command injection') in Microsoft Bing Images allows an unauthorized attacker to execute code over a network.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3547
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-19T21:30:31

1 posts

Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 and earlier contained an out-of-bounds read in ALPN handling when built with ALPN enabled (HAVE_ALPN / --enable-alpn). A crafted ALPN protocol list could trigger an out-of-bounds read, leading to a potential process crash (denial of service). Note that ALPN is disabled by default, but is enabled for these 3rd party comp

thehackerwire@mastodon.social at 2026-03-19T21:22:19.000Z ##

🟠 CVE-2026-3547 - High (7.5)

Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 and earlier contained an out-of-bounds read in ALPN handling when built with ALPN enabled (HAVE_ALPN / --enable-alpn). A crafted ALPN protocol list could trigger an out...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32886(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-03-19T21:12:42

1 posts

### Impact Remote clients can crash the Parse Server process by calling a cloud function endpoint with a crafted function name that traverses the JavaScript prototype chain of a registered cloud function handler, causing a stack overflow. ### Patches The fix restricts property lookups during cloud function name resolution to own properties only, preventing prototype chain traversal from stored

thehackerwire@mastodon.social at 2026-03-19T20:24:59.000Z ##

🟠 CVE-2026-32886 - High (7.5)

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.24 and 8.6.47, remote clients can crash the Parse Server process by calling a cloud function endpoint with a crafted funct...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32944(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-03-19T21:11:56

1 posts

### Impact An unauthenticated attacker can crash the Parse Server process by sending a single request with deeply nested query condition operators. This terminates the server and denies service to all connected clients. ### Patches A depth limit for query condition operator nesting has been added via the `requestComplexity.queryDepth` server option. The option is disabled by default to avoid a

thehackerwire@mastodon.social at 2026-03-19T20:25:09.000Z ##

🟠 CVE-2026-32944 - High (7.5)

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.21 and 8.6.45, an unauthenticated attacker can crash the Parse Server process by sending a single request with deeply nest...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32728(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-03-19T21:11:37

1 posts

### Impact An attacker who is allowed to upload files can bypass the file extension filter by appending a MIME parameter (e.g. `;charset=utf-8`) to the `Content-Type` header. This causes the extension validation to fail matching against the blocklist, allowing active content to be stored and served under the application's domain. In addition, certain XML-based file extensions that can render scri

thehackerwire@mastodon.social at 2026-03-19T20:25:19.000Z ##

🟠 CVE-2026-32728 - High (7.6)

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.15 and 8.6.41, an attacker who is allowed to upload files can bypass the file extension filter by appending a MIME paramet...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31972
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-03-19T18:54:51.970000

1 posts

SAMtools is a program for reading, manipulating and writing bioinformatics file formats. The `mpileup` command outputs DNA sequences that have been aligned against a known reference. On each output line it writes the reference position, optionally the reference DNA base at that position (obtained from a separate file) and all of the DNA bases that aligned to that position. As the output is ordered

thehackerwire@mastodon.social at 2026-03-19T21:00:38.000Z ##

πŸ”΄ CVE-2026-31972 - Critical (9.8)

SAMtools is a program for reading, manipulating and writing bioinformatics file formats. The `mpileup` command outputs DNA sequences that have been aligned against a known reference. On each output line it writes the reference position, optionally...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2006-10003
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-03-19T18:32:22

1 posts

XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack. In the case (stackptr == stacksize - 1), the stack will NOT be expanded. Then the new value will be written at location (++stackptr), which equals stacksize and therefore falls just outside the allocated buffer. The bug can be observed when parsing an XML file with very deep element nesting

harrysintonen@infosec.exchange at 2026-03-19T15:35:07.000Z ##

Two 20-year-old vulnerabilities fixed in XML::Parser 2.48:

- CVE-2006-10002: XML::Parser versions through 2.47 for Perl could
overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes openwall.com/lists/oss-securit

- CVE-2006-10003: XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack openwall.com/lists/oss-securit

The patch fixing these has been available since 2006 but it's nice to see the fix in actual release, too.

#CVE_2006_10002 #CVE_2006_10003

##

CVE-2026-30402
(9.8 CRITICAL)

EPSS: 0.29%

updated 2026-03-19T18:32:21

1 posts

An issue in wgcloud v.2.3.7 and before allows a remote attacker to execute arbitrary code via the test connection function

thehackerwire@mastodon.social at 2026-03-19T20:00:21.000Z ##

πŸ”΄ CVE-2026-30402 - Critical (9.8)

An issue in wgcloud v.2.3.7 and before allows a remote attacker to execute arbitrary code via the test connection function

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20643
(5.4 MEDIUM)

EPSS: 0.01%

updated 2026-03-19T18:32:21

1 posts

A cross-origin issue in the Navigation API was addressed with improved input validation. This issue is fixed in Background Security Improvements for iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2. Processing maliciously crafted web content may bypass Same Origin Policy.

2 repos

https://github.com/zeroxjf/WebKit-NavigationAPI-SOP-Bypass

https://github.com/Fliv/CVE-2026-20643

oversecurity@mastodon.social at 2026-03-19T11:20:12.000Z ##

Apple Patches WebKit Vulnerability CVE-2026-20643 Across iOS, macOS

Apple has released a new security update to address a critical WebKit vulnerability tracked as CVE-2026-20643. The vulnerability was identified

πŸ”—οΈ [Thecyberexpress] link.is.it/lPLEWn

##

CVE-2026-32865
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-19T18:31:25

1 posts

OPEXUS eComplaint and eCASE before version 10.1.0.0 include the secret verification code in the HTTP response when requesting a password reset via 'ForcePasswordReset.aspx'. An attacker who knows an existing user's email address can reset the user's password and security questions. Existing security questions are not asked during the process.

thehackerwire@mastodon.social at 2026-03-19T19:47:05.000Z ##

πŸ”΄ CVE-2026-32865 - Critical (9.8)

OPEXUS eComplaint and eCASE before version 10.1.0.0 include the secret verification code in the HTTP response when requesting a password reset via 'ForcePasswordReset.aspx'. An attacker who knows an existing user's email address can reset the user...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31968
(8.1 HIGH)

EPSS: 0.01%

updated 2026-03-19T17:31:24.010000

1 posts

HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data using a variety of encodings and compression methods. For the `VARINT` and `CONST` encodings, incomplete validation of the context in which the encodings were used could result in up to eight bytes being written beyond the end of a heap allocation, or up to

thehackerwire@mastodon.social at 2026-03-19T21:12:52.000Z ##

🟠 CVE-2026-31968 - High (8.1)

HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data using a variety of encodings and compression methods. For the `VARINT` and `CONST` encodings, incomplete ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31962
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-19T17:30:45.370000

1 posts

HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. While most alignment records store DNA sequence and quality values, the format also allows them to omit this data in certain cases to save space. Due to some quirks of the CRAM format, it is necessary to handle these records carefully as they will actually

thehackerwire@mastodon.social at 2026-03-19T21:58:22.000Z ##

🟠 CVE-2026-31962 - High (8.8)

HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. While most alignment records store DNA sequence and quality values, the format also allows them to omit ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32878
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-19T17:28:32.513000

1 posts

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.20 and 8.6.44, an attacker can bypass the default request keyword denylist protection and the class-level permission for adding fields by sending a crafted request that exploits prototype pollution in the deep copy mechanism. This allows injecting fields into class schemas t

thehackerwire@mastodon.social at 2026-03-19T20:19:01.000Z ##

🟠 CVE-2026-32878 - High (7.5)

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.20 and 8.6.44, an attacker can bypass the default request keyword denylist protection and the class-level permission for a...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-58112
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-19T15:32:24

2 posts

Microsoft Dynamics 365 Customer Engagement (on-premises) 1612 (9.0.2.3034) allows the generation of customized reports via raw SQL queries in an upload of a .rdl (Report Definition Language) file; this is then processed by the SQL Server Reporting Service. An account with the privilege Add Reporting Services Reports can upload a malicious rdl file. If the malicious rdl file is already loaded and i

thehackerwire@mastodon.social at 2026-03-19T22:00:12.000Z ##

🟠 CVE-2025-58112 - High (8.8)

Microsoft Dynamics 365 Customer Engagement (on-premises) 1612 (9.0.2.3034) allows the generation of customized reports via raw SQL queries in an upload of a .rdl (Report Definition Language) file; this is then processed by the SQL Server Reporting...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T21:58:06.000Z ##

🟠 CVE-2025-58112 - High (8.8)

Microsoft Dynamics 365 Customer Engagement (on-premises) 1612 (9.0.2.3034) allows the generation of customized reports via raw SQL queries in an upload of a .rdl (Report Definition Language) file; this is then processed by the SQL Server Reporting...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29856
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-19T15:32:23

2 posts

An issue in the VirtualHost configuration handling/parser component of aaPanel v7.57.0 allows attackers to cause a Regular Expression Denial of Service (ReDoS) via a crafted input.

thehackerwire@mastodon.social at 2026-03-19T22:00:31.000Z ##

🟠 CVE-2026-29856 - High (7.5)

An issue in the VirtualHost configuration handling/parser component of aaPanel v7.57.0 allows attackers to cause a Regular Expression Denial of Service (ReDoS) via a crafted input.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T21:58:25.000Z ##

🟠 CVE-2026-29856 - High (7.5)

An issue in the VirtualHost configuration handling/parser component of aaPanel v7.57.0 allows attackers to cause a Regular Expression Denial of Service (ReDoS) via a crafted input.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29859
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-03-19T15:32:23

1 posts

An arbitrary file upload vulnerability in aaPanel v7.57.0 allows attackers to execute arbitrary code via uploading a crafted file.

thehackerwire@mastodon.social at 2026-03-19T21:58:42.000Z ##

πŸ”΄ CVE-2026-29859 - Critical (9.8)

An arbitrary file upload vulnerability in aaPanel v7.57.0 allows attackers to execute arbitrary code via uploading a crafted file.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29858
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-19T15:32:23

1 posts

A lack of path validation in aaPanel v7.57.0 allows attackers to execute a local file inclusion (LFI), leadingot sensitive information exposure.

thehackerwire@mastodon.social at 2026-03-19T21:58:32.000Z ##

🟠 CVE-2026-29858 - High (7.5)

A lack of path validation in aaPanel v7.57.0 allows attackers to execute a local file inclusion (LFI), leadingot sensitive information exposure.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22558
(7.7 HIGH)

EPSS: 0.01%

updated 2026-03-19T15:31:27

1 posts

An Authenticated NoSQL Injection vulnerability found in UniFi Network Application could allow a malicious actor with authenticated access to the network to escalate privileges.

thehackerwire@mastodon.social at 2026-03-19T20:18:52.000Z ##

🟠 CVE-2026-22558 - High (7.7)

An Authenticated NoSQL Injection vulnerability found in UniFi Network Application could allow a malicious actor with authenticated access to the network to escalate privileges.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4424
(7.5 HIGH)

EPSS: 0.14%

updated 2026-03-19T15:31:27

1 posts

A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication

thehackerwire@mastodon.social at 2026-03-19T19:47:16.000Z ##

🟠 CVE-2026-4424 - High (7.5)

A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can e...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22557
(10.0 CRITICAL)

EPSS: 0.03%

updated 2026-03-19T15:31:22

6 posts

A malicious actor with access to the network could exploit a Path Traversal vulnerability found in the UniFi Network Application to access files on the underlying system that could be manipulated to access an underlying account.

benzogaga33@mamot.fr at 2026-03-20T16:40:03.000Z ##

Ubiquiti – CVE-2026-22557 : cette faille critique menace votre rΓ©seau UniFi it-connect.fr/ubiquiti-cve-202 #ActuCybersΓ©curitΓ© #CybersΓ©curitΓ© #VulnΓ©rabilitΓ©

##

beyondmachines1@infosec.exchange at 2026-03-20T11:01:48.000Z ##

Ubiquiti Patches Critical Account Takeover Flaw in UniFi Network Application

Ubiquiti patched a critical path traversal vulnerability (CVE-2026-22557) and a high-severity NoSQL injection flaw in its UniFi Network Application. These bugs allow attackers to hijack accounts or escalate privileges, potentially compromising entire networking environments.

**If you are using Ubiquiti products, update your UniFi Network Application and UniFi Express firmware ASAP. As usual, first make sure all management interfaces are not exposed to the public internet and are accessible only from trusted networks.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

youranonnewsirc@nerdculture.de at 2026-03-19T23:56:20.000Z ##

Geopolitical tensions surged as Iran targeted Gulf energy after Israeli strikes, spiking oil prices to $118/barrel (March 18-19). In cybersecurity, CISA warned of actively exploited SharePoint flaws (CVE-2026-20963), critical Ubiquiti UniFi (CVE-2026-22557), and Telnetd root-access vulnerabilities (CVE-2026-32746). NVIDIA forecasts $1T AI demand by 2027.
#AnonNews_irc #Cybersecurity #News

##

thehackerwire@mastodon.social at 2026-03-19T20:00:30.000Z ##

πŸ”΄ CVE-2026-22557 - Critical (10)

A malicious actor with access to the network could exploit a Path Traversal vulnerability found in the UniFi Network Application to access files on the underlying system that could be manipulated to access an underlying account.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

chirpbirb@meow.social at 2026-03-19T18:47:09.000Z ##

just like cve-2026-22557, i think you're a 10/10 :neocat_sillycat_kisser:

##

marzlberger@neander.social at 2026-03-19T15:30:30.000Z ##

@agitatra

CVSS: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE: CVE-2026-22557 (n00r3(@izn0u))

##

CVE-2026-30704
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-19T15:16:26.580000

2 posts

The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) exposes an unprotected UART interface through accessible hardware pads on the PCB

thehackerwire@mastodon.social at 2026-03-19T22:00:22.000Z ##

πŸ”΄ CVE-2026-30704 - Critical (9.1)

The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) exposes an unprotected UART interface through accessible hardware pads on the PCB

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T21:58:16.000Z ##

πŸ”΄ CVE-2026-30704 - Critical (9.1)

The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) exposes an unprotected UART interface through accessible hardware pads on the PCB

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31963
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-19T14:50:54.513000

1 posts

HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. As one method of removing redundant data, CRAM uses reference-based compression so that instead of storing the full sequence for each alignment record it stores a location in an external reference sequence along with a list of differences to the reference a

thehackerwire@mastodon.social at 2026-03-19T21:56:44.000Z ##

🟠 CVE-2026-31963 - High (8.1)

HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. As one method of removing redundant data, CRAM uses reference-based compression so that instead of stori...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31966
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-03-19T14:44:04.400000

1 posts

HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. As one method of removing redundant data, CRAM uses reference-based compression so that instead of storing the full sequence for each alignment record it stores a location in an external reference sequence along with a list of differences to the reference a

thehackerwire@mastodon.social at 2026-03-19T21:12:33.000Z ##

πŸ”΄ CVE-2026-31966 - Critical (9.1)

HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. As one method of removing redundant data, CRAM uses reference-based compression so that instead of stori...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3511
(8.6 HIGH)

EPSS: 0.04%

updated 2026-03-19T13:25:00.570000

1 posts

Improper Restriction of XML External Entity Reference vulnerability in XMLUtils.java in Slovensko.Digital Autogram allows remote unauthenticated attacker to conduct SSRF (Server Side Request Forgery) attacks and obtain unauthorized access to local files on filesystems running the vulnerable application. Successful exploitation requires the victim to visit a specially crafted website that sends req

thehackerwire@mastodon.social at 2026-03-19T12:39:39.000Z ##

🟠 CVE-2026-3511 - High (8.6)

Improper Restriction of XML External Entity Reference vulnerability in XMLUtils.java in Slovensko.Digital Autogram allows remote unauthenticated attacker to conduct SSRF (Server Side Request Forgery) attacks and obtain unauthorized access to local...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60233
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-19T13:25:00.570000

1 posts

Deserialization of Untrusted Data vulnerability in Themeton Zuut allows Object Injection.This issue affects Zuut: from n/a through 1.4.2.

thehackerwire@mastodon.social at 2026-03-19T09:23:35.000Z ##

πŸ”΄ CVE-2025-60233 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in Themeton Zuut allows Object Injection.This issue affects Zuut: from n/a through 1.4.2.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25471
(8.1 HIGH)

EPSS: 0.07%

updated 2026-03-19T13:25:00.570000

1 posts

Authentication Bypass Using an Alternate Path or Channel vulnerability in Themepaste Admin Safety Guard allows Password Recovery Exploitation.This issue affects Admin Safety Guard: from n/a through 1.2.6.

thehackerwire@mastodon.social at 2026-03-19T08:23:07.000Z ##

🟠 CVE-2026-25471 - High (8.1)

Authentication Bypass Using an Alternate Path or Channel vulnerability in Themepaste Admin Safety Guard allows Password Recovery Exploitation.This issue affects Admin Safety Guard: from n/a through 1.2.6.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27413
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-03-19T13:25:00.570000

3 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozmoslabs Profile Builder Pro allows Blind SQL Injection.This issue affects Profile Builder Pro: from n/a through 3.13.9.

thehackerwire@mastodon.social at 2026-03-19T06:53:28.000Z ##

πŸ”΄ CVE-2026-27413 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozmoslabs Profile Builder Pro allows Blind SQL Injection.This issue affects Profile Builder Pro: from n/a through 3.13.9.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T06:36:09.000Z ##

πŸ”΄ CVE-2026-27413 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozmoslabs Profile Builder Pro allows Blind SQL Injection.This issue affects Profile Builder Pro: from n/a through 3.13.9.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-19T06:30:27.000Z ##

πŸ”΄ CVE-2026-27413: CRITICAL Blind SQL Injection in Cozmoslabs Profile Builder Pro (≀3.13.9) allows unauthenticated data exfiltration. No patch yet β€” restrict access, monitor logs. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #SQLi #Infosec

##

CVE-2026-27096
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-19T13:25:00.570000

2 posts

Deserialization of Untrusted Data vulnerability in BuddhaThemes ColorFolio - Freelance Designer WordPress Theme allows Object Injection.This issue affects ColorFolio - Freelance Designer WordPress Theme: from n/a through 1.3.

thehackerwire@mastodon.social at 2026-03-19T06:40:45.000Z ##

🟠 CVE-2026-27096 - High (8.1)

Deserialization of Untrusted Data vulnerability in BuddhaThemes ColorFolio - Freelance Designer WordPress Theme allows Object Injection.This issue affects ColorFolio - Freelance Designer WordPress Theme: from n/a through 1.3.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T06:36:00.000Z ##

🟠 CVE-2026-27096 - High (8.1)

Deserialization of Untrusted Data vulnerability in BuddhaThemes ColorFolio - Freelance Designer WordPress Theme allows Object Injection.This issue affects ColorFolio - Freelance Designer WordPress Theme: from n/a through 1.3.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3658
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-19T12:30:41

1 posts

The Appointment Booking Calendar β€” Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the 'fields' parameter in all versions up to, and including, 1.6.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional

thehackerwire@mastodon.social at 2026-03-19T12:39:48.000Z ##

🟠 CVE-2026-3658 - High (7.5)

The Appointment Booking Calendar β€” Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the 'fields' parameter in all versions up to, and including, 1.6.10.0 due to insufficient escaping on the user...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27065
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-03-19T09:30:25

3 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThimPress BuilderPress allows PHP Local File Inclusion.This issue affects BuilderPress: from n/a through 2.0.1.

offseq@infosec.exchange at 2026-03-19T12:30:30.000Z ##

🚨 CRITICAL: CVE-2026-27065 in ThimPress BuilderPress (≀2.0.1) lets attackers perform unauthenticated RFI, risking full WordPress compromise. Disable plugin & harden PHP configs immediately! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #RFI #CVE202627065

##

thehackerwire@mastodon.social at 2026-03-19T09:24:30.000Z ##

πŸ”΄ CVE-2026-27065 - Critical (9.8)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThimPress BuilderPress allows PHP Local File Inclusion.This issue affects BuilderPress: from n/a through 2.0.1.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T09:23:16.000Z ##

πŸ”΄ CVE-2026-27065 - Critical (9.8)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThimPress BuilderPress allows PHP Local File Inclusion.This issue affects BuilderPress: from n/a through 2.0.1.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27067
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-19T09:30:25

2 posts

Unrestricted Upload of File with Dangerous Type vulnerability in Syarif Mobile App Editor allows Upload a Web Shell to a Web Server.This issue affects Mobile App Editor: from n/a through 1.3.1.

offseq@infosec.exchange at 2026-03-19T09:30:33.000Z ##

🚨 CRITICAL (CVSS 9.1): Syarif Mobile App Editor ≀1.3.1 hit by CWE-434 unrestricted file upload (CVE-2026-27067). Allows web shell deployment & full compromise. Enforce strict validation, monitor uploads, patch ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CVE202627067 #Infosec

##

thehackerwire@mastodon.social at 2026-03-19T09:23:26.000Z ##

πŸ”΄ CVE-2026-27067 - Critical (9.1)

Unrestricted Upload of File with Dangerous Type vulnerability in Syarif Mobile App Editor allows Upload a Web Shell to a Web Server.This issue affects Mobile App Editor: from n/a through 1.3.1.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25445
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-19T09:30:25

2 posts

Deserialization of Untrusted Data vulnerability in Membership Software WishList Member X allows Object Injection.This issue affects WishList Member X: from n/a through 3.29.0.

thehackerwire@mastodon.social at 2026-03-19T09:24:19.000Z ##

🟠 CVE-2026-25445 - High (8.8)

Deserialization of Untrusted Data vulnerability in Membership Software WishList Member X allows Object Injection.This issue affects WishList Member X: from n/a through 3.29.0.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T09:23:07.000Z ##

🟠 CVE-2026-25445 - High (8.8)

Deserialization of Untrusted Data vulnerability in Membership Software WishList Member X allows Object Injection.This issue affects WishList Member X: from n/a through 3.29.0.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60237
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-19T09:30:25

1 posts

Deserialization of Untrusted Data vulnerability in Themeton Finag allows Object Injection.This issue affects Finag: from n/a through 1.5.0.

thehackerwire@mastodon.social at 2026-03-19T09:23:45.000Z ##

πŸ”΄ CVE-2025-60237 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in Themeton Finag allows Object Injection.This issue affects Finag: from n/a through 1.5.0.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25443
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-19T09:30:25

1 posts

Missing Authorization vulnerability in Dotstore Fraud Prevention For Woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fraud Prevention For Woocommerce: from n/a through 2.3.3.

thehackerwire@mastodon.social at 2026-03-19T09:22:58.000Z ##

🟠 CVE-2026-25443 - High (7.5)

Missing Authorization vulnerability in Dotstore Fraud Prevention For Woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fraud Prevention For Woocommerce: from n/a through 2.3.3.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25312
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-19T09:30:25

1 posts

Missing Authorization vulnerability in EventPrime allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EventPrime: from n/a through 4.2.8.3.

thehackerwire@mastodon.social at 2026-03-19T08:23:17.000Z ##

🟠 CVE-2026-25312 - High (7.5)

Missing Authorization vulnerability in EventPrime allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EventPrime: from n/a through 4.2.8.3.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27093
(8.1 HIGH)

EPSS: 0.11%

updated 2026-03-19T09:30:25

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Ovatheme Tripgo allows PHP Local File Inclusion.This issue affects Tripgo: from n/a before 1.5.6.

thehackerwire@mastodon.social at 2026-03-19T07:17:58.000Z ##

🟠 CVE-2026-27093 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Ovatheme Tripgo allows PHP Local File Inclusion.This issue affects Tripgo: from n/a before 1.5.6.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27540
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-03-19T06:30:33

3 posts

Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.

1 repos

https://github.com/DeadExpl0it/CVE-2026-27540-WordPress-Exploit-PoC

offseq@infosec.exchange at 2026-03-19T08:00:27.000Z ##

🚨 CVE-2026-27540 (CVSS 9.0): Woocommerce Wholesale Lead Capture plugin lets unauthenticated attackers upload malicious files β€” remote code execution & full compromise possible. Disable plugin, enforce file type restrictions! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

thehackerwire@mastodon.social at 2026-03-19T06:53:37.000Z ##

πŸ”΄ CVE-2026-27540 - Critical (9)

Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T06:36:18.000Z ##

πŸ”΄ CVE-2026-27540 - Critical (9)

Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27542
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-03-19T06:30:33

1 posts

Incorrect Privilege Assignment vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Privilege Escalation.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.

thehackerwire@mastodon.social at 2026-03-19T06:36:24.000Z ##

πŸ”΄ CVE-2026-27542 - Critical (9.8)

Incorrect Privilege Assignment vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Privilege Escalation.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20963
(8.8 HIGH)

EPSS: 8.00%

updated 2026-03-18T21:32:58

6 posts

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

christopherkunz@chaos.social at 2026-03-20T13:53:15.000Z ##

CVE-2026-20963 Sharepoint Insecure Deserialization 8.8/10

Weekend soon. Where @watchTowr blog? Need lolz. I can has?

##

beyondmachines1@infosec.exchange at 2026-03-20T12:01:48.000Z ##

Critical Microsoft SharePoint RCE Vulnerability CVE-2026-20963 Under Active Exploitation

Microsoft SharePoint is under active exploitation of a critical RCE vulnerability (CVE-2026-20963) that allows unauthenticated attackers to take over servers via a deserialization flaw.

**Your SharePoint servers are under attack. Ideally, isolate them from the internet and make them accessible only from internal networks. Them apply the January 2026 patch ASAP. If you are still using SharePoint 2013 or older, isolate them and upgrade to a newer version. Those old systems are permanently vulnerable.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

youranonnewsirc@nerdculture.de at 2026-03-19T23:56:20.000Z ##

Geopolitical tensions surged as Iran targeted Gulf energy after Israeli strikes, spiking oil prices to $118/barrel (March 18-19). In cybersecurity, CISA warned of actively exploited SharePoint flaws (CVE-2026-20963), critical Ubiquiti UniFi (CVE-2026-22557), and Telnetd root-access vulnerabilities (CVE-2026-32746). NVIDIA forecasts $1T AI demand by 2027.
#AnonNews_irc #Cybersecurity #News

##

AAKL@infosec.exchange at 2026-03-19T14:56:46.000Z ##

If you missed this yesterday, CISA added two vulnerabilities to the KEV catalogue.

- CVE-2026-20963: Microsoft SharePoint Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2025-66376: Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #infosec #Zimbra #Microsoft #vulnerability

##

offseq@infosec.exchange at 2026-03-19T11:00:27.000Z ##

⚠️ CRITICAL: CISA reports active exploits of CVE-2026-20963 in Microsoft SharePoint. Remote code execution allows full server compromise. Patch now, monitor logs, segment networks! radar.offseq.com/threat/cisa-w #OffSeq #SharePoint #Vuln #RCE

##

youranonnewsirc@nerdculture.de at 2026-03-19T07:56:33.000Z ##

Cybersecurity: Interlock ransomware is exploiting a critical Cisco FMC zero-day (CVE-2026-20131, CVSS 10.0) for root access, active since January 2026. CISA added a Microsoft SharePoint vulnerability (CVE-2026-20963) to its Known Exploited Vulnerabilities Catalog. Geopolitical: Tensions in the Gulf region are escalating, with Iran reportedly targeting energy sites, leading to a sharp spike in oil prices. These events underscore the urgent need for enhanced digital resilience and geopolitical stability.

#Cybersecurity #Geopolitics #AnonNews_irc

##

CVE-2026-22730
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-18T20:20:40

1 posts

A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attackers to bypass metadata-based access controls and execute arbitrary SQL commands. The vulnerability exists due to missing input sanitization.

1 repos

https://github.com/NULL200OK/CVE-2026-22730-Scanner

CVE-2026-22729
(8.6 HIGH)

EPSS: 0.05%

updated 2026-03-18T20:20:27

1 posts

A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConverter allows authenticated users to bypass metadata-based access controls through crafted filter expressions. User-controlled input passed to FilterExpressionBuilder is concatenated into JSONPath queries without proper escaping, enabling attackers to inject arbitrary JSONPath logic and access unauthorized documents. Thi

CVE-2026-33172
(8.7 HIGH)

EPSS: 0.01%

updated 2026-03-18T19:54:32

3 posts

### Impact Stored XSS vulnerability in SVG asset reuploads allows authenticated users with asset upload permissions to bypass SVG sanitization and inject malicious JavaScript that executes when the asset is viewed. ### Patches This has been fixed in 5.73.14 and 6.7.0.

thehackerwire@mastodon.social at 2026-03-20T22:23:31.000Z ##

🟠 CVE-2026-33172 - High (8.7)

Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, a stored XSS vulnerability in SVG asset reuploads allows authenticated users with asset upload permissions to bypass SVG sanitization and i...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:23:31.000Z ##

🟠 CVE-2026-33172 - High (8.7)

Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, a stored XSS vulnerability in SVG asset reuploads allows authenticated users with asset upload permissions to bypass SVG sanitization and i...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:17:30.000Z ##

🟠 CVE-2026-33172 - High (8.7)

Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.14 and 6.7.0, a stored XSS vulnerability in SVG asset reuploads allows authenticated users with asset upload permissions to bypass SVG sanitization and i...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33166
(8.6 HIGH)

EPSS: 0.01%

updated 2026-03-18T19:53:59

3 posts

### Summary The Allure report generator is vulnerable to an arbitrary file read via path traversal when processing test results. An attacker can craft a malicious result file (-result.json, -container.json, or .plist) that points an attachment source to a sensitive file on the host system. During report generation, Allure will resolve these paths and include the sensitive files in the final report

thehackerwire@mastodon.social at 2026-03-20T22:23:21.000Z ##

🟠 CVE-2026-33166 - High (8.6)

Allure 2 is the version 2.x branch of Allure Report, a multi-language test reporting tool. The Allure report generator prior to version 2.38.0 is vulnerable to an arbitrary file read via path traversal when processing test results. An attacker can...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:23:21.000Z ##

🟠 CVE-2026-33166 - High (8.6)

Allure 2 is the version 2.x branch of Allure Report, a multi-language test reporting tool. The Allure report generator prior to version 2.38.0 is vulnerable to an arbitrary file read via path traversal when processing test results. An attacker can...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:17:20.000Z ##

🟠 CVE-2026-33166 - High (8.6)

Allure 2 is the version 2.x branch of Allure Report, a multi-language test reporting tool. The Allure report generator prior to version 2.38.0 is vulnerable to an arbitrary file read via path traversal when processing test results. An attacker can...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66376
(7.2 HIGH)

EPSS: 11.43%

updated 2026-03-18T18:31:10

2 posts

Zimbra Collaboration (ZCS) 10 before 10.0.18 and 10.1 before 10.1.13 allows Classic UI stored XSS via Cascading Style Sheets (CSS) @import directives in an HTML e-mail message.

technadu@infosec.exchange at 2026-03-19T15:11:27.000Z ##

CISA adds Zimbra XSS (CVE-2025-66376) to KEV.
Actively exploited.
Patch immediately.

Source: cisa.gov/news-events/alerts/20

Follow TechNadu.

#InfoSec #VulnMgmt

##

AAKL@infosec.exchange at 2026-03-19T14:56:46.000Z ##

If you missed this yesterday, CISA added two vulnerabilities to the KEV catalogue.

- CVE-2026-20963: Microsoft SharePoint Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2025-66376: Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #infosec #Zimbra #Microsoft #vulnerability

##

CVE-2026-33058
(6.5 MEDIUM)

EPSS: 0.02%

updated 2026-03-18T17:52:14.303000

1 posts

Kanboard is project management software focused on Kanban methodology. Versions prior to 1.2.51 have an authenticated SQL injection vulnerability. Attackers with the permission to add users to a project can leverage this vulnerability to dump the entirety of the kanboard database. Version 1.2.51 fixes the issue.

_r_netsec@infosec.exchange at 2026-03-19T09:28:05.000Z ##

Kanboard Authenticated SQL Injection CVE-2026-33058 Writeup 0dave.ch/posts/cve-2026-33058/

##

CVE-2026-32746
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-18T15:30:44

3 posts

telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.

4 repos

https://github.com/danindiana/cve-2026-32746-mitigation

https://github.com/chosenonehacks/CVE-2026-32746

https://github.com/jeffaf/cve-2026-32746

https://github.com/watchtowrlabs/watchtowr-vs-telnetd-CVE-2026-32746

AAKL@infosec.exchange at 2026-03-20T16:46:17.000Z ##

Posted yesterday, if you missed it:

WatchTower: A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746 Pre-Auth RCE) labs.watchtowr.com/a-32-year-o #infosec #threatresearch

##

youranonnewsirc@nerdculture.de at 2026-03-19T23:56:20.000Z ##

Geopolitical tensions surged as Iran targeted Gulf energy after Israeli strikes, spiking oil prices to $118/barrel (March 18-19). In cybersecurity, CISA warned of actively exploited SharePoint flaws (CVE-2026-20963), critical Ubiquiti UniFi (CVE-2026-22557), and Telnetd root-access vulnerabilities (CVE-2026-32746). NVIDIA forecasts $1T AI demand by 2027.
#AnonNews_irc #Cybersecurity #News

##

_r_netsec@infosec.exchange at 2026-03-19T20:28:05.000Z ##

A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746) - watchTowr Labs labs.watchtowr.com/a-32-year-o

##

CVE-2026-33053(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-03-18T12:58:35

4 posts

**Detection Method:** Kolega.dev Deep Code Scan | Attribute | Value | |---|---| | Location | src/backend/base/langflow/api/v1/api_key.py:44-53 | | Practical Exploitability | High | | Developer Approver | faizan@kolega.ai | ### Description The delete_api_key_route() endpoint accepts an api_key_id path parameter and deletes it with only a generic authentication check (get_current_active_user depen

thehackerwire@mastodon.social at 2026-03-20T23:00:31.000Z ##

🟠 CVE-2026-33053 - High (8.8)

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id path parameter and deletes it with only a generic authentication check (get_curren...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:17:50.000Z ##

🟠 CVE-2026-33053 - High (8.8)

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id path parameter and deletes it with only a generic authentication check (get_curren...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:00:31.000Z ##

🟠 CVE-2026-33053 - High (8.8)

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id path parameter and deletes it with only a generic authentication check (get_curren...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T22:17:50.000Z ##

🟠 CVE-2026-33053 - High (8.8)

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the delete_api_key_route() endpoint accepts an api_key_id path parameter and deletes it with only a generic authentication check (get_curren...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3888
(7.9 HIGH)

EPSS: 0.01%

updated 2026-03-18T06:31:20

7 posts

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

3 repos

https://github.com/netw0rk7/CVE-2026-3888-PoC

https://github.com/fevar54/CVE-2026-3888-POC-all-from-the-Qualys-platform.

https://github.com/Many-Hat-Group/Ubuntu-CVE-2026-3888-patcher

linux@activitypub.awakari.com at 2026-03-19T22:32:26.000Z ## Debian DSA-6170-1 snapd Local Escalation CVE-2026-3888 Advisory The Qualys Threat Research Unit (TRU) discovered a local privilege escalation vulnerability in snapd, a daemon and tooling that enabl...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

patrickcmiller@infosec.exchange at 2026-03-19T22:42:00.000Z ##

Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit thehackernews.com/2026/03/ubun

##

magi@mastodon.uno at 2026-03-19T21:37:51.000Z ##

Ubuntu a rischio: bug di Snap permette accesso root (CVE-2026-3888)
#Ubuntu
Scoperta una vulnerabilitΓ  critica in Ubuntu (CVE-2026-3888): il sistema Snap permette escalation a root.

marcosbox.com/2026/03/19/ubunt

@sicurezza

##

jbz@indieweb.social at 2026-03-19T20:55:01.000Z ##

ο½’ Local Privilege Escalation (LPE) vulnerability affecting default installations of Ubuntu Desktop version 24.04 and later. This flaw (CVE-2026-3888) allows an unprivileged local attacker to escalate privileges to full root access through the interaction of two standard system components: snap-confine and systemd-tmpfiles. ο½£
blog.qualys.com/vulnerabilitie

#ubuntu #snap #infosec

##

lobsters@mastodon.social at 2026-03-19T15:35:13.000Z ##

snap-confine + systemd-tmpfiles = root (CVE-2026-3888) lobste.rs/s/deodzu #linux #security
cdn2.qualys.com/advisory/2026/

##

AAKL@infosec.exchange at 2026-03-19T15:02:00.000Z ##

Qualys, posted yesterday: CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root blog.qualys.com/vulnerabilitie

More:

Infosesecurity-Magazine: New Flaw Affecting Ubuntu Enables Local Attackers to Gain Root Access infosecurity-magazine.com/news #Ubuntu #Linux #infosec #vulnerability

##

devuan@toot.community at 2026-03-19T11:31:38.000Z ##

Found yet another high severity #systemd bug in Ubuntu: local root privilege escalation (CVE-2026-3888)

cybersecurity88.com/news/ubunt

Let us wish all #Devuan users a wonderful day out with their family for a merry father's day, instead of shoveling unicorn shit.

##

CVE-2026-3564
(9.1 CRITICAL)

EPSS: 0.06%

updated 2026-03-17T15:36:34

1 posts

A condition in ScreenConnect may allow an actor with access to server-level cryptographic material used for authentication to obtain unauthorized access, including elevated privileges, in certain scenarios.

beyondmachines1@infosec.exchange at 2026-03-20T15:01:48.000Z ##

ConnectWise Patches Critical ScreenConnect Cryptographic Flaw

ConnectWise patched a critical vulnerability (CVE-2026-3564) in ScreenConnect that allows attackers to extract cryptographic machine keys and bypass session authentication. The flaw enables unauthorized access and privilege escalation, which is a significant risk to MSPs and their downstream clients.

**Treat this update as an emergency change because remote access tools are primary targets for lateral movement and supply chain attacks. If you run on-premises ScreenConnect, verify your version immediately, patch ASAP.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-32306
(10.0 CRITICAL)

EPSS: 0.40%

updated 2026-03-16T17:06:59

1 posts

### Summary The telemetry aggregation API accepts user-controlled `aggregationType`, `aggregateColumnName`, and `aggregationTimestampColumnName` parameters and interpolates them directly into ClickHouse SQL queries via the `.append()` method (documented as "trusted SQL"). There is no allowlist, no parameterized query binding, and no input validation. An authenticated user can inject arbitrary SQL

thehackerwire@mastodon.social at 2026-03-20T21:22:33.000Z ##

🟠 CVE-2026-33142 - High (8.1)

OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.34, the fix for CVE-2026-32306 (ClickHouse SQL injection via aggregate query parameters) added column name validation to the _aggregateBy method but did not...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3630
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-10T21:32:13

1 posts

Delta Electronics COMMGR2 has Stack-based Buffer Overflow vulnerability.

beyondmachines1@infosec.exchange at 2026-03-19T16:01:48.000Z ##

Critical RCE Vulnerability Patched in Delta Electronics COMMGR 2

Delta Electronics patched a critical stack-based buffer overflow (CVE-2026-3630) and an out-of-bounds read (CVE-2026-3631) in its COMMGR 2 software that could allow unauthenticated attackers to execute remote code or leak sensitive data.

**Make sure all industrial devices are isolated from the internet and accessible from trusted networks only. Update Delta Electronics COMMGR 2 software to version 2.11.1 as soon as possible. In the meantime make sure they are isolated from the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-3631
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-09T06:31:19

1 posts

Delta Electronics COMMGR2 has Buffer Over-read DoS vulnerability.

beyondmachines1@infosec.exchange at 2026-03-19T16:01:48.000Z ##

Critical RCE Vulnerability Patched in Delta Electronics COMMGR 2

Delta Electronics patched a critical stack-based buffer overflow (CVE-2026-3630) and an out-of-bounds read (CVE-2026-3631) in its COMMGR 2 software that could allow unauthenticated attackers to execute remote code or leak sensitive data.

**Make sure all industrial devices are isolated from the internet and accessible from trusted networks only. Update Delta Electronics COMMGR 2 software to version 2.11.1 as soon as possible. In the meantime make sure they are isolated from the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-25896
(9.3 CRITICAL)

EPSS: 0.01%

updated 2026-03-02T14:54:02.760000

1 posts

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (&lt;, &gt;, &amp;, &quot;, &apos;) with arbitrary values. This bypasses entity en

AAKL@infosec.exchange at 2026-03-20T16:16:56.000Z ##

New advisory. Login is needed for details.

Broadcom: Critical: Software Toolkit Plugin for z/OSMF 1.0 - Vulnerability in fast-xml-parser (CVE-2026-25896) support.broadcom.com/web/ecx/s #infosec #vulnerability #Broadcom

##

CVE-2026-25554
(6.5 MEDIUM)

EPSS: 0.07%

updated 2026-02-27T21:31:20

1 posts

OpenSIPS versions 3.1 before 3.6.4 containing the auth_jwt module (prior to commit 3822d33) contain a SQL injection vulnerability in the jwt_db_authorize() function in modules/auth_jwt/authorize.c when db_mode is enabled and a SQL database backend is used. The function extracts the tag claim from a JWT without prior signature verification and incorporates the unescaped value directly into a SQL qu

CVE-2025-32711
(9.3 CRITICAL)

EPSS: 3.89%

updated 2026-02-20T18:31:25

1 posts

Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.

1 repos

https://github.com/daryllundy/cve-2025-32711

LLMs@activitypub.awakari.com at 2026-03-19T00:00:00.000Z ## The next layer of AI security Identity establishes trust. The next problem is how that trust is used. In June 2025, Microsoft patched EchoLeak (CVE-2025-32711), a zero-click vulnerability in Micros...


Origin | Interest | Match ##

CVE-2026-24780
(8.8 HIGH)

EPSS: 0.10%

updated 2026-02-17T16:04:36.780000

1 posts

AutoGPT is a platform that allows users to create, deploy, and manage continuous artificial intelligence agents that automate complex workflows. Prior to autogpt-platform-beta-v0.6.44, AutoGPT Platform's block execution endpoints (both main web API and external API) allow executing blocks by UUID without checking the `disabled` flag. Any authenticated user can execute the disabled `BlockInstallati

TiamatEnity@mastodon.social at 2026-03-21T08:45:39.000Z ##

AutoGPT CVE-2026-24780 (NVD verified): authenticated users could execute disabled blocks pre-v0.6.44.

Devin: $500/mo, session-based.
Operator: requires human approval.
CrewAI: persistent memory in dev.
the agent (ENERGENAI LLC): 20,280 cycles, $0.019/cycle avg, 9 months logged.

Full comparison: the-service.live?ref=mastodon-agent-cmp

#AIAgents #infosec

##

CVE-2025-32975
(10.0 CRITICAL)

EPSS: 0.13%

updated 2025-11-03T21:35:11

1 posts

Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead

beyondmachines1@infosec.exchange at 2026-03-20T13:01:49.000Z ##

Attackers Exploit Critical Quest KACE SMA Authentication Bypass

Arctic Wolf reports attacks exploiting a critical authentication bypass (CVE-2025-32975) in Quest KACE SMA to gain administrative control and move laterally into domain controllers and backup systems.

**If you are using Quest KACE SMA, this is urgent. Make sure your Quest KACE SMA is off the public internet and behind a VPN immediately. Check your logs for new unknown admin accounts, as these are signs that attackers have already taken over your management system. Then patch ASAP.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2026-32891
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T23:15:06.000Z ##

πŸ”΄ CVE-2026-32891 - Critical (9)

Anchorr is a Discord bot for requesting movies and TV shows and receiving notifications when items are added to a media server. Versions 1.4.1 and below contain a stored XSS vulnerability in the Jellyseerr user selector. Jellyseerr allows any acco...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:15:06.000Z ##

πŸ”΄ CVE-2026-32891 - Critical (9)

Anchorr is a Discord bot for requesting movies and TV shows and receiving notifications when items are added to a media server. Versions 1.4.1 and below contain a stored XSS vulnerability in the Jellyseerr user selector. Jellyseerr allows any acco...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32890
(0 None)

EPSS: 0.05%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T23:14:58.000Z ##

πŸ”΄ CVE-2026-32890 - Critical (9.6)

Anchorr is a Discord bot for requesting movies and TV shows and receiving notifications when items are added to a media server. In versions 1.4.1 and below, a stored Cross-site Scripting (XSS) vulnerability in the web dashboard's User Mapping drop...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:14:58.000Z ##

πŸ”΄ CVE-2026-32890 - Critical (9.6)

Anchorr is a Discord bot for requesting movies and TV shows and receiving notifications when items are added to a media server. In versions 1.4.1 and below, a stored Cross-site Scripting (XSS) vulnerability in the web dashboard's User Mapping drop...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33037
(0 None)

EPSS: 0.23%

4 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T23:04:06.000Z ##

🟠 CVE-2026-33037 - High (8.1)

WWBN AVideo is an open source video platform. In versions 25.0 and below, the official Docker deployment files (docker-compose.yml, env.example) ship with the admin password set to "password", which is automatically used to seed the admin account ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:00:46.000Z ##

🟠 CVE-2026-33037 - High (8.1)

WWBN AVideo is an open source video platform. In versions 25.0 and below, the official Docker deployment files (docker-compose.yml, env.example) ship with the admin password set to "password", which is automatically used to seed the admin account ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:04:06.000Z ##

🟠 CVE-2026-33037 - High (8.1)

WWBN AVideo is an open source video platform. In versions 25.0 and below, the official Docker deployment files (docker-compose.yml, env.example) ship with the admin password set to "password", which is automatically used to seed the admin account ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-20T23:00:46.000Z ##

🟠 CVE-2026-33037 - High (8.1)

WWBN AVideo is an open source video platform. In versions 25.0 and below, the official Docker deployment files (docker-compose.yml, env.example) ship with the admin password set to "password", which is automatically used to seed the admin account ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33134
(0 None)

EPSS: 0.03%

4 posts

N/A

hbrpgm@adalta.social at 2026-03-21T11:46:52.000Z ##

πŸ“Ί peer.adalta.social/w/wg6KobEvv
πŸ”— [πŸ‡©πŸ‡ͺπŸ‡ΊπŸ‡ΈπŸ‡«πŸ‡·](adalta.info/articles/prstn_sec)
πŸ”— [ℹ️](redpacketsecurity.com/cve-aler")

Une injection SQL authentifiΓ©e dans WeGIA compromet l'intΓ©gralitΓ© des bases de donnΓ©es des institutions.

#cybersecurity #security #osint #threatintel #cve

##

hbrpgm@adalta.social at 2026-03-21T11:39:47.000Z ##

πŸ“Ί peer.adalta.social/w/vUPVbxbki
πŸ”— [πŸ‡©πŸ‡ͺπŸ‡ΊπŸ‡ΈπŸ‡«πŸ‡·](adalta.info/articles/prstn_sec)
πŸ”— [ℹ️](redpacketsecurity.com/cve-aler")

An authenticated SQL injection in WeGIA enables full database compromise, demanding immediate remediation for high-risk organizations.

#cybersecurity #security #osint #threatintel #cve

##

hbrpgm@adalta.social at 2026-03-21T11:35:44.000Z ##

πŸ“Ί peer.adalta.social/w/gG6Eiykme
πŸ”— [πŸ‡©πŸ‡ͺπŸ‡ΊπŸ‡ΈπŸ‡«πŸ‡·](adalta.info/articles/prstn_sec)
πŸ”— [ℹ️](redpacketsecurity.com/cve-aler")

Authentifizierte SQL-Injektion in einer WohltΓ€tigkeitssoftware ermΓΆglicht vollstΓ€ndige Datenbankkompromittierung.

#cybersecurity #security #osint #threatintel #cve

##

thehackerwire@mastodon.social at 2026-03-20T21:26:31.000Z ##

πŸ”΄ CVE-2026-33134 - Critical (9.3)

WeGIA is a web manager for charitable institutions. Versions 3.6.5 and below contain an authenticated SQL Injection vulnerability in the html/matPat/restaurar_produto.php endpoint. The vulnerability allows an authenticated attacker to inject arbit...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27625
(0 None)

EPSS: 0.06%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T22:16:37.000Z ##

🟠 CVE-2026-27625 - High (8.1)

Stirling-PDF is a locally hosted web application that performs various operations on PDF files. In versions prior to 2.5.2, the /api/v1/convert/markdown/pdf endpoint extracts user-supplied ZIP entries without path checks. Any authenticated user ca...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33072
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T22:00:41.000Z ##

🟠 CVE-2026-33072 - High (8.2)

FileRise is a self-hosted web file manager / WebDAV server. In versions prior to 3.9.0, a hardcoded default encryption key (default_please_change_this_key) is used for all cryptographic operations β€” HMAC token generation, AES config encryption, ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33136
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T21:26:50.000Z ##

πŸ”΄ CVE-2026-33136 - Critical (9.3)

WeGIA is a web manager for charitable institutions. Versions 3.6.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability in the listar_memorandos_ativos.php endpoint. An attacker can inject arbitrary JavaScript or HTML tags into the ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33150
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T21:17:35.000Z ##

🟠 CVE-2026-33150 - High (7.8)

libfuse is the reference implementation of the Linux FUSE. From version 3.18.0 to before version 3.18.2, a use-after-free vulnerability in the io_uring subsystem of libfuse allows a local attacker to crash FUSE filesystem processes and potentially...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33156
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T21:17:26.000Z ##

🟠 CVE-2026-33156 - High (7.8)

ScreenToGif is a screen recording tool. In versions from 2.42.1 and prior, ScreenToGif is vulnerable to DLL sideloading via version.dll . When the portable executable is run from a user-writable directory, it loads version.dll from the application...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31836
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T20:20:37.000Z ##

🟠 CVE-2026-31836 - High (8.1)

Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations. In versions from 3.5.1 and prior, a mass assignment vulnerability in Che...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32318
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T20:00:35.000Z ##

🟠 CVE-2026-32318 - High (7.6)

Cryptomator for IOS offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 2.8.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-middl...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32317
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-20T20:00:25.000Z ##

🟠 CVE-2026-32317 - High (7.6)

Cryptomator for Android offers multi-platform transparent client-side encryption for files in the cloud. Prior to version 1.12.3, an integrity check vulnerability allows an attacker tamper with the vault configuration file leading to a man-in-the-...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33307
(0 None)

EPSS: 0.00%

1 posts

N/A

AAKL@infosec.exchange at 2026-03-20T16:06:23.000Z ##

New.

Tenable research advisories: High-severity CVE-2026-33307 and CVE-2026-33308: mod_gnutls Multiple Vulnerabilities tenable.com/security/research/ @tenable #infosec #vulnerability

##

CVE-2026-33308
(0 None)

EPSS: 0.00%

1 posts

N/A

AAKL@infosec.exchange at 2026-03-20T16:06:23.000Z ##

New.

Tenable research advisories: High-severity CVE-2026-33307 and CVE-2026-33308: mod_gnutls Multiple Vulnerabilities tenable.com/security/research/ @tenable #infosec #vulnerability

##

CVE-2026-33024
(0 None)

EPSS: 0.08%

1 posts

N/A

offseq@infosec.exchange at 2026-03-20T06:01:27.000Z ##

🚨 CVE-2026-33024: CRITICAL SSRF in WWBN AVideo-Encoder <8.0. Public API allows blind SSRF, risking internal/cloud data exposure. Upgrade to v8.0 or restrict outbound traffic now! radar.offseq.com/threat/cve-20 #OffSeq #SSRF #Vulnerability #InfoSec

##

CVE-2026-32721
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-19T23:23:23.000Z ##

🟠 CVE-2026-32721 - High (8.6)

LuCI is the OpenWrt Configuration Interface. Versions prior to both 24.10.5 and 25.12.0, contain a stored XSS vulnerability in the wireless scan modal, where SSID values from scan results are rendered as raw HTML without any sanitization. The wire...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

lobsters@mastodon.social at 2026-03-19T15:20:15.000Z ##

Root from the parking lot: OpenWRT XSS through SSID scanning (CVE-2026-32721) lobste.rs/s/vteijd #security
mxsasha.eu/posts/openwrt-ssid-

##

CVE-2026-32754
(0 None)

EPSS: 0.07%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-19T22:18:10.000Z ##

πŸ”΄ CVE-2026-32754 - Critical (9.3)

FreeScout is a free help desk and shared inbox built with PHP's Laravel framework. Versions 1.8.208 and below are vulnerable to Stored Cross-Site Scripting (XSS) through FreeScout's email notification templates. Incoming email bodies are stored in...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31965
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-19T21:57:04.000Z ##

🟠 CVE-2026-31965 - High (8.2)

HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. In the `cram_decode_slice()` function called while reading CRAM records, validation of the reference id ...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31964
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-19T21:56:54.000Z ##

🟠 CVE-2026-31964 - High (7.5)

HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data using a variety of encodings and compression methods. While most alignment records store DNA sequence an...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31970
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-19T21:33:55.000Z ##

🟠 CVE-2026-31970 - High (8.1)

HTSlib is a library for reading and writing bioinformatics file formats. GZI files are used to index block-compressed GZIP [BGZF] files. In the GZI loading function, `bgzf_index_load_hfile()`, it was possible to trigger an integer overflow, leadi...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31969
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-19T21:33:46.000Z ##

🟠 CVE-2026-31969 - High (8.1)

HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data using a variety of encodings and compression methods. When reading data encoded using the `BYTE_ARRAY_ST...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33346
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-19T21:21:31.000Z ##

🟠 CVE-2026-33346 - High (8.7)

OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 8.0.0.2, a stored cross-site scripting (XSS) vulnerability in the patient portal payment flow allows a patient portal user to persist...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31967
(0 None)

EPSS: 0.02%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-19T21:12:42.000Z ##

πŸ”΄ CVE-2026-31967 - Critical (9.1)

HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data. In the `cram_decode_slice()` function called while reading CRAM records, the value of the mate reference...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31971
(0 None)

EPSS: 0.09%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-19T21:00:57.000Z ##

🟠 CVE-2026-31971 - High (8.1)

HTSlib is a library for reading and writing bioinformatics file formats. CRAM is a compressed format which stores DNA sequence alignment data using a variety of encodings and compression methods. When reading data encoded using the `BYTE_ARRAY_LEN...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31973
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-19T21:00:47.000Z ##

🟠 CVE-2026-31973 - High (7.5)

SAMtools is a program for reading, manipulating and writing bioinformatics file formats. Starting in version 1.17, in the cram-size command, used to write information about how well CRAM files are compressed, a check to see if the `cram_decode_com...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T20:18:42.000Z ##

πŸ”΄ CVE-2026-32238 - Critical (9.1)

OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 8.0.0.2 contain a Command injection vulnerability in the backup functionality that can be exploited by authenticated attacke...

πŸ”— thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2023-4567
(0 None)

EPSS: 0.00%

1 posts

N/A

linux@activitypub.awakari.com at 2026-03-18T16:33:02.000Z ## Ubuntu 22.04 libxml2 High NULL Pointer Dereference CVE-2023-4567 New expat packages are available for Slackware 15.0 and -current to fix security issues.

#Slackware #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

Visit counter For Websites