##
Updated at UTC 2026-03-09T17:44:37.386785
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-3678 | 8.8 | 0.05% | 1 | 0 | 2026-03-09T16:16:21.987000 | A vulnerability was determined in Tenda FH451 1.0.0.9. Affected is the function | |
| CVE-2026-3588 | 7.5 | 0.00% | 2 | 0 | 2026-03-09T16:16:21.343000 | A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 all | |
| CVE-2026-25866 | 7.8 | 0.00% | 2 | 0 | 2026-03-09T16:16:18.970000 | MobaXterm versions prior to 26.1 contain an uncontrolled search path element vul | |
| CVE-2025-69219 | 8.8 | 0.01% | 2 | 0 | 2026-03-09T16:16:15.143000 | A user with access to the DB could craft a database entry that would result in e | |
| CVE-2026-30834 | 7.5 | 0.03% | 1 | 0 | 2026-03-09T15:50:20 | # SSRF with Full Response Exfiltration via Download Handler ### Summary A Serve | |
| CVE-2026-29186 | 7.7 | 0.07% | 1 | 0 | 2026-03-09T15:46:45 | ### Impact This is a configuration bypass vulnerability that enables arbitrary c | |
| CVE-2026-29192 | 7.7 | 0.03% | 1 | 0 | 2026-03-09T15:46:35 | ### Summary A vulnerability in Zitadel's login V2 interface was discovered, all | |
| CVE-2026-29193 | 8.2 | 0.03% | 1 | 0 | 2026-03-09T15:46:20 | ### Summary A vulnerability in Zitadel's login V2 UI allowed users to bypass lo | |
| CVE-2026-3809 | 8.8 | 0.05% | 2 | 0 | 2026-03-09T15:30:24.130000 | A flaw has been found in Tenda FH1202 1.2.0.14(408). The impacted element is the | |
| CVE-2026-28466 | 9.9 | 0.09% | 1 | 0 | 2026-03-09T15:30:16.490000 | OpenClaw versions prior to 2026.2.14 contain a vulnerability in the gateway in w | |
| CVE-2026-3727 | 8.8 | 0.02% | 1 | 0 | 2026-03-09T15:24:42.697000 | A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the | |
| CVE-2026-3729 | 8.8 | 0.05% | 1 | 0 | 2026-03-09T15:24:21.043000 | A vulnerability was identified in Tenda F453 1.0.0.3/3.As. Impacted is the funct | |
| CVE-2026-3768 | 8.8 | 0.05% | 4 | 0 | 2026-03-09T15:17:08.960000 | A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by th | |
| CVE-2026-2219 | 7.5 | 0.01% | 2 | 0 | 2026-03-09T15:15:57.870000 | It was discovered that dpkg-deb (a component of dpkg, the Debian package managem | |
| CVE-2025-14769 | 7.5 | 0.01% | 2 | 0 | 2026-03-09T14:16:05.250000 | In some cases, the `tcp-setmss` handler may free the packet data and throw an er | |
| CVE-2025-29165 | 9.8 | 0.04% | 1 | 0 | 2026-03-09T13:36:08.413000 | An issue in D-Link DIR-1253 MESH V1.6.1684 allows an attacker to escalate privil | |
| CVE-2026-28342 | 7.5 | 0.06% | 1 | 0 | 2026-03-09T13:36:08.413000 | OliveTin gives access to predefined shell commands from a web interface. Prior t | |
| CVE-2025-70995 | 8.8 | 0.36% | 1 | 1 | 2026-03-09T13:36:08.413000 | An issue in Aranda Service Desk Web Edition (ASDK API 8.6) allows authenticated | |
| CVE-2025-70949 | 7.5 | 0.03% | 1 | 0 | 2026-03-09T13:36:08.413000 | An observable timing discrepancy in @perfood/couch-auth v0.26.0 allows attackers | |
| CVE-2025-55208 | 9.0 | 0.05% | 1 | 0 | 2026-03-09T13:36:08.413000 | Chamilo is a learning management system. Versions prior to 1.11.34 have a Stored | |
| CVE-2026-28451 | 8.3 | 0.04% | 1 | 0 | 2026-03-09T13:36:08.413000 | OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnera | |
| CVE-2026-28392 | 7.5 | 0.03% | 1 | 0 | 2026-03-09T13:36:08.413000 | OpenClaw versions prior to 2026.2.14 contain a privilege escalation vulnerabilit | |
| CVE-2026-28447 | 8.1 | 0.03% | 1 | 0 | 2026-03-09T13:36:08.413000 | OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.1 contain a path traversal vu | |
| CVE-2026-28453 | 7.5 | 0.04% | 1 | 0 | 2026-03-09T13:36:08.413000 | OpenClaw versions prior to 2026.2.14 fail to validate TAR archive entry paths du | |
| CVE-2026-28456 | 7.2 | 0.06% | 1 | 0 | 2026-03-09T13:36:08.413000 | OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gat | |
| CVE-2026-28469 | 7.5 | 0.03% | 1 | 0 | 2026-03-09T13:36:08.413000 | OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in | |
| CVE-2026-28472 | 8.1 | 0.04% | 1 | 0 | 2026-03-09T13:36:08.413000 | OpenClaw versions prior to 2026.2.2 contain a vulnerability in the gateway WebSo | |
| CVE-2026-28478 | 7.5 | 0.08% | 1 | 0 | 2026-03-09T13:36:08.413000 | OpenClaw versions prior to 2026.2.13 contain a denial of service vulnerability i | |
| CVE-2026-29613 | 5.9 | 0.02% | 1 | 0 | 2026-03-09T13:36:08.413000 | OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles | |
| CVE-2026-29609 | 7.5 | 0.10% | 1 | 0 | 2026-03-09T13:36:08.413000 | OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability i | |
| CVE-2025-59541 | 8.1 | 0.01% | 2 | 0 | 2026-03-09T13:36:08.413000 | Chamilo is a learning management system. Prior to version 1.11.34, a Cross-Site | |
| CVE-2026-28727 | 7.8 | 0.01% | 1 | 0 | 2026-03-09T13:36:08.413000 | Local privilege escalation due to insecure Unix socket permissions. The followin | |
| CVE-2026-28514 | 0 | 0.11% | 3 | 0 | 2026-03-09T13:35:34.633000 | Rocket.Chat is an open-source, secure, fully customizable communications platfor | |
| CVE-2026-30227 | 0 | 1.01% | 2 | 0 | 2026-03-09T13:35:34.633000 | MimeKit is a C# library which may be used for the creation and parsing of messag | |
| CVE-2026-29067 | 8.1 | 0.01% | 1 | 0 | 2026-03-09T13:35:34.633000 | ZITADEL is an open source identity management platform. From version 4.0.0-rc.1 | |
| CVE-2026-29191 | 9.3 | 0.03% | 1 | 0 | 2026-03-09T13:35:34.633000 | ZITADEL is an open source identity management platform. From version 4.0.0 to 4. | |
| CVE-2026-2446 | 9.8 | 0.07% | 1 | 0 | 2026-03-09T13:35:34.633000 | The PowerPack for LearnDash WordPress plugin before 1.3.0 does not have authoriz | |
| CVE-2026-3589 | 7.5 | 0.03% | 2 | 0 | 2026-03-09T13:35:34.633000 | The WooCommerce WordPress plugin from versions 5.4.0 to 10.5.2 does not properly | |
| CVE-2026-24308 | 0 | 0.01% | 1 | 0 | 2026-03-09T13:35:34.633000 | Improper handling of configuration values in ZKConfig in Apache ZooKeeper 3.8.5 | |
| CVE-2026-26018 | 7.5 | 0.04% | 1 | 0 | 2026-03-09T13:35:34.633000 | CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a denial o | |
| CVE-2026-29075 | 8.3 | 0.07% | 1 | 0 | 2026-03-09T13:35:34.633000 | Mesa is an open-source Python library for agent-based modeling, simulating compl | |
| CVE-2025-14353 | 7.5 | 0.07% | 2 | 0 | 2026-03-09T13:35:34.633000 | The ZIP Code Based Content Protection plugin for WordPress is vulnerable to SQL | |
| CVE-2026-29091 | 8.1 | 0.25% | 1 | 0 | 2026-03-09T13:35:34.633000 | Locutus brings stdlibs of other programming languages to JavaScript for educatio | |
| CVE-2026-29789 | 9.9 | 0.05% | 2 | 0 | 2026-03-09T13:35:34.633000 | Vito is a self-hosted web application that helps manage servers and deploy PHP a | |
| CVE-2026-30242 | 8.5 | 0.03% | 1 | 0 | 2026-03-09T13:35:34.633000 | Plane is an an open-source project management tool. Prior to version 1.2.3, the | |
| CVE-2026-30823 | 8.8 | 0.02% | 1 | 0 | 2026-03-09T13:35:34.633000 | Flowise is a drag & drop user interface to build a customized large language mod | |
| CVE-2026-3823 | 8.8 | 0.14% | 6 | 0 | 2026-03-09T13:35:07.393000 | EHG2408 series switch developed by Atop Technologies has a Stack-based Buffer Ov | |
| CVE-2026-29784 | 7.5 | 0.02% | 2 | 0 | 2026-03-09T13:35:07.393000 | Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, in | |
| CVE-2025-41758 | 8.8 | 0.18% | 2 | 0 | 2026-03-09T13:35:07.393000 | A low-privileged remote attacker can exploit an arbitrary file write vulnerabili | |
| CVE-2025-41764 | 9.1 | 0.10% | 4 | 0 | 2026-03-09T13:35:07.393000 | Due to insufficient authorization enforcement, an unauthorized remote attacker c | |
| CVE-2025-41761 | 7.8 | 0.02% | 4 | 0 | 2026-03-09T13:35:07.393000 | A low‑privileged local attacker who gains access to the UBR service account (e.g | |
| CVE-2025-41756 | 8.1 | 0.10% | 2 | 0 | 2026-03-09T13:35:07.393000 | A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.c | |
| CVE-2025-61612 | 7.5 | 0.21% | 2 | 0 | 2026-03-09T13:35:07.393000 | In nr modem, there is a possible system crash due to improper input validation. | |
| CVE-2025-61611 | 7.5 | 0.21% | 2 | 0 | 2026-03-09T13:35:07.393000 | In modem, there is a possible improper input validation. This could lead to remo | |
| CVE-2025-69279 | 7.5 | 0.21% | 2 | 0 | 2026-03-09T13:35:07.393000 | In nr modem, there is a possible system crash due to improper input validation. | |
| CVE-2025-61615 | 7.5 | 0.21% | 2 | 0 | 2026-03-09T13:35:07.393000 | In nr modem, there is a possible system crash due to improper input validation. | |
| CVE-2025-61614 | 7.5 | 0.21% | 2 | 0 | 2026-03-09T13:35:07.393000 | In nr modem, there is a possible system crash due to improper input validation. | |
| CVE-2026-30896 | 7.8 | 0.01% | 2 | 0 | 2026-03-09T13:35:07.393000 | The installer for Qsee Client versions 1.0.1 and prior insecurely load Dynamic L | |
| CVE-2026-3630 | 9.8 | 0.04% | 4 | 0 | 2026-03-09T13:35:07.393000 | Delta Electronics COMMGR2 has Stack-based Buffer Overflow vulnerability. | |
| CVE-2026-3787 | 7.0 | 0.01% | 2 | 0 | 2026-03-09T13:35:07.393000 | A weakness has been identified in UltraVNC 1.6.4.0 on Windows. This affects an u | |
| CVE-2026-30832 | 9.1 | 0.04% | 2 | 0 | 2026-03-09T13:35:07.393000 | Soft Serve is a self-hostable Git server for the command line. From version 0.6. | |
| CVE-2026-30851 | 8.1 | 0.01% | 1 | 0 | 2026-03-09T13:35:07.393000 | Caddy is an extensible server platform that uses TLS by default. From version 2. | |
| CVE-2026-30860 | 9.9 | 0.08% | 2 | 0 | 2026-03-09T13:35:07.393000 | WeKnora is an LLM-powered framework designed for deep document understanding and | |
| CVE-2026-3699 | 8.8 | 0.04% | 1 | 0 | 2026-03-09T13:35:07.393000 | A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-171114. This i | |
| CVE-2026-30863 | 0 | 0.07% | 1 | 1 | 2026-03-09T13:35:07.393000 | Parse Server is an open source backend that can be deployed to any infrastructur | |
| CVE-2026-30855 | 9.8 | 0.08% | 1 | 0 | 2026-03-09T13:21:39 | ### Summary An authorization bypass in tenant management endpoints of WeKnora ap | |
| CVE-2026-30827 | 7.5 | 0.01% | 1 | 0 | 2026-03-09T13:15:36 | ## Summary The default `keyGenerator` in express-rate-limit applies IPv6 subnet | |
| CVE-2026-30822 | 7.7 | 0.04% | 2 | 0 | 2026-03-09T13:15:31 | ## Summary **A Mass Assignment vulnerability in the `/api/v1/leads` endpoint al | |
| CVE-2026-30861 | 10.0 | 0.21% | 3 | 0 | 2026-03-09T13:14:29 | ### Summary A critical unauthenticated remote code execution (RCE) vulnerabilit | |
| CVE-2026-30244 | 7.5 | 0.02% | 1 | 0 | 2026-03-09T13:12:18 | ## Executive Summary A security vulnerability exists in the Plane project manag | |
| CVE-2026-3814 | 8.8 | 0.04% | 4 | 0 | 2026-03-09T12:31:50 | A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected | |
| CVE-2026-3815 | 8.8 | 0.04% | 4 | 0 | 2026-03-09T12:31:49 | A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects | |
| CVE-2025-41765 | 9.1 | 0.06% | 2 | 0 | 2026-03-09T09:30:37 | Due to insufficient authorization enforcement, an unauthorized remote attacker c | |
| CVE-2025-41772 | 7.5 | 0.03% | 2 | 0 | 2026-03-09T09:30:37 | An unauthenticated remote attacker can obtain valid session tokens because they | |
| CVE-2025-41766 | 8.8 | 0.39% | 2 | 0 | 2026-03-09T09:30:37 | A low-privileged remote attacker can trigger a stack-based buffer overflow via a | |
| CVE-2025-69278 | 7.5 | 0.21% | 2 | 0 | 2026-03-09T09:30:37 | In nr modem, there is a possible system crash due to improper input validation. | |
| CVE-2026-3811 | 8.8 | 0.05% | 4 | 0 | 2026-03-09T09:30:37 | A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the functi | |
| CVE-2025-41757 | 8.8 | 0.22% | 2 | 0 | 2026-03-09T09:30:36 | A low-privileged remote attacker can abuse the backup restore functionality of U | |
| CVE-2025-61616 | 7.5 | 0.21% | 2 | 0 | 2026-03-09T09:30:36 | In nr modem, there is a possible system crash due to improper input validation. | |
| CVE-2025-61613 | 7.5 | 0.21% | 2 | 0 | 2026-03-09T09:30:36 | In nr modem, there is a possible system crash due to improper input validation. | |
| CVE-2026-3810 | 8.8 | 0.05% | 2 | 0 | 2026-03-09T09:30:36 | A vulnerability has been found in Tenda FH1202 1.2.0.14(408). This affects the f | |
| CVE-2026-3808 | 8.8 | 0.05% | 2 | 0 | 2026-03-09T09:30:30 | A vulnerability was detected in Tenda FH1202 1.2.0.14(408). The affected element | |
| CVE-2026-3807 | 8.8 | 0.09% | 2 | 0 | 2026-03-09T09:30:30 | A security vulnerability has been detected in Tenda FH1202 1.2.0.14(408). Impact | |
| CVE-2026-3803 | 8.8 | 0.05% | 2 | 0 | 2026-03-09T06:31:20 | A vulnerability was identified in Tenda i3 1.0.0.6(2204). This affects the funct | |
| CVE-2026-3802 | 8.8 | 0.05% | 2 | 0 | 2026-03-09T06:31:20 | A vulnerability was determined in Tenda i3 1.0.0.6(2204). Affected by this issue | |
| CVE-2026-3804 | 8.8 | 0.05% | 4 | 0 | 2026-03-09T06:31:19 | A security flaw has been discovered in Tenda i3 1.0.0.6(2204). This vulnerabilit | |
| CVE-2026-3631 | 7.5 | 0.04% | 2 | 0 | 2026-03-09T06:31:19 | Delta Electronics COMMGR2 has Buffer Over-read DoS vulnerability. | |
| CVE-2026-3799 | 8.8 | 0.05% | 2 | 0 | 2026-03-09T06:31:19 | A flaw has been found in Tenda i3 1.0.0.6(2204). This impacts the function formS | |
| CVE-2026-3801 | 8.8 | 0.09% | 2 | 0 | 2026-03-09T06:31:19 | A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerabil | |
| CVE-2026-3769 | 8.8 | 0.05% | 4 | 0 | 2026-03-08T21:30:22 | A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is th | |
| CVE-2026-3732 | 8.8 | 0.05% | 2 | 0 | 2026-03-08T12:30:35 | A security vulnerability has been detected in Tenda F453 1.0.0.3. This affects t | |
| CVE-2026-3728 | 8.8 | 0.05% | 1 | 0 | 2026-03-08T12:30:34 | A vulnerability was determined in Tenda F453 1.0.0.3/1.If. This issue affects th | |
| CVE-2026-3726 | 8.8 | 0.05% | 2 | 0 | 2026-03-08T09:30:27 | A vulnerability has been found in Tenda F453 1.0.0.3. This affects the function | |
| CVE-2026-3715 | 8.8 | 0.04% | 2 | 0 | 2026-03-08T09:30:21 | A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the funct | |
| CVE-2026-3701 | 8.8 | 0.04% | 1 | 0 | 2026-03-08T06:31:15 | A security vulnerability has been detected in H3C Magic B1 up to 100R004. Affect | |
| CVE-2026-3703 | 9.8 | 0.07% | 2 | 0 | 2026-03-08T06:31:15 | A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_4 | |
| CVE-2026-3698 | 8.8 | 0.04% | 1 | 0 | 2026-03-08T03:30:34 | A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. This affect | |
| CVE-2026-3700 | 8.8 | 0.04% | 1 | 0 | 2026-03-08T03:30:34 | A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. Affected is | |
| CVE-2026-3677 | 8.8 | 0.05% | 1 | 0 | 2026-03-08T00:31:58 | A vulnerability was found in Tenda FH451 1.0.0.9. This impacts the function from | |
| CVE-2026-3679 | 8.8 | 0.05% | 1 | 0 | 2026-03-08T00:31:58 | A vulnerability was identified in Tenda FH451 1.0.0.9. Affected by this vulnerab | |
| CVE-2025-14675 | 7.2 | 0.68% | 2 | 0 | 2026-03-07T09:30:21 | The Meta Box plugin for WordPress is vulnerable to arbitrary file deletion due t | |
| CVE-2026-1074 | 7.2 | 0.06% | 1 | 0 | 2026-03-07T09:30:20 | The WP App Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting | |
| CVE-2025-8899 | 8.8 | 0.04% | 1 | 0 | 2026-03-07T06:31:23 | The Paid Videochat Turnkey Site – HTML5 PPV Live Webcams plugin for WordPress is | |
| CVE-2026-25070 | None | 1.03% | 3 | 0 | 2026-03-07T03:30:29 | XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain | |
| CVE-2026-2020 | 7.5 | 0.09% | 1 | 0 | 2026-03-07T03:30:27 | The JS Archive List plugin for WordPress is vulnerable to PHP Object Injection i | |
| CVE-2025-15602 | 8.8 | 0.02% | 1 | 0 | 2026-03-07T02:33:41 | Snipe-IT versions prior to 8.3.7 contain sensitive user attributes related to ac | |
| CVE-2025-70948 | 9.3 | 0.03% | 1 | 0 | 2026-03-06T23:00:44 | A host header injection vulnerability in the mailer component of @perfood/couch- | |
| CVE-2026-30223 | 8.8 | 0.02% | 1 | 0 | 2026-03-06T22:52:11 | ### Summary When JWT authentication is configured using either: - `authJwtPubK | |
| CVE-2026-29087 | 7.5 | 0.03% | 1 | 0 | 2026-03-06T22:43:59 | ## Summary When using @hono/node-server's static file serving together with rou | |
| CVE-2026-26017 | 7.7 | 0.04% | 1 | 0 | 2026-03-06T22:43:40 | A logical vulnerability in CoreDNS allows DNS access controls to be bypassed due | |
| CVE-2026-29064 | 8.2 | 0.01% | 1 | 0 | 2026-03-06T22:10:52 | ### Summary A path traversal vulnerability in archive extraction allows a speci | |
| CVE-2026-29058 | 9.8 | 0.10% | 2 | 0 | 2026-03-06T21:56:51 | ## Impact An unauthenticated attacker can execute arbitrary OS commands on the | |
| CVE-2026-24105 | 9.8 | 1.69% | 2 | 0 | 2026-03-06T21:05:36.243000 | An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.1 | |
| CVE-2026-20882 | 7.5 | 0.06% | 1 | 0 | 2026-03-06T18:31:19 | The WebSocket Application Programming Interface lacks restrictions on the number | |
| CVE-2026-26288 | 9.4 | 0.07% | 2 | 0 | 2026-03-06T18:31:19 | WebSocket endpoints lack proper authentication mechanisms, enabling attackers to | |
| CVE-2026-24696 | 7.5 | 0.05% | 1 | 0 | 2026-03-06T18:31:19 | The WebSocket Application Programming Interface lacks restrictions on the number | |
| CVE-2025-70230 | 9.8 | 0.06% | 1 | 0 | 2026-03-06T17:37:58.670000 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para | |
| CVE-2026-29000 | 10.0 | 0.24% | 1 | 1 | 2026-03-06T15:41:57 | pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication by | |
| CVE-2018-25181 | 7.5 | 0.57% | 2 | 0 | 2026-03-06T15:31:36 | Musicco 2.0.0 contains a path traversal vulnerability that allows unauthenticate | |
| CVE-2026-26051 | 9.4 | 0.10% | 2 | 0 | 2026-03-06T15:31:36 | WebSocket endpoints lack proper authentication mechanisms, enabling attackers to | |
| CVE-2026-2754 | 7.5 | 0.04% | 1 | 0 | 2026-03-06T15:31:36 | Navtor NavBox exposes sensitive configuration and operational data due to missin | |
| CVE-2026-2753 | 7.5 | 0.07% | 1 | 0 | 2026-03-06T15:31:36 | An Absolute Path Traversal vulnerability exists in Navtor NavBox. The applicatio | |
| CVE-2018-25166 | 8.2 | 0.06% | 1 | 0 | 2026-03-06T15:31:35 | Meneame English Pligg 5.8 contains an SQL injection vulnerability that allows un | |
| CVE-2025-70614 | 8.1 | 0.03% | 1 | 0 | 2026-03-06T12:31:37 | OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2 contains a broken | |
| CVE-2025-13476 | 9.8 | 0.05% | 1 | 0 | 2026-03-06T12:31:36 | Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 u | |
| CVE-2025-70231 | 9.8 | 0.08% | 1 | 0 | 2026-03-06T12:31:36 | D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When proces | |
| CVE-2025-70229 | 9.8 | 0.06% | 1 | 0 | 2026-03-06T12:31:36 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para | |
| CVE-2025-70616 | 7.8 | 0.01% | 1 | 0 | 2026-03-06T12:31:36 | A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys | |
| CVE-2026-26418 | 7.5 | 0.06% | 1 | 1 | 2026-03-06T12:31:36 | Missing authentication and authorization in the web API of Tata Consultancy Serv | |
| CVE-2025-70233 | 9.8 | 0.06% | 1 | 0 | 2026-03-06T12:30:31 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para | |
| CVE-2025-70232 | 9.8 | 0.06% | 1 | 0 | 2026-03-06T12:30:31 | Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para | |
| CVE-2026-26417 | 8.1 | 0.03% | 1 | 1 | 2026-03-06T10:16:22.163000 | A broken access control vulnerability in the password reset functionality of Tat | |
| CVE-2026-26416 | 8.8 | 0.03% | 1 | 1 | 2026-03-06T10:16:21.983000 | An authorization bypass vulnerability in Tata Consultancy Services Cognix Recon | |
| CVE-2025-45691 | 7.5 | 0.05% | 1 | 0 | 2026-03-06T10:16:20.417000 | An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in | |
| CVE-2026-2330 | 9.4 | 0.21% | 1 | 0 | 2026-03-06T09:31:41 | An attacker may access restricted filesystem areas on the device via the CROWN R | |
| CVE-2026-2331 | 9.8 | 0.17% | 2 | 0 | 2026-03-06T09:31:41 | An attacker may perform unauthenticated read and write operations on sensitive f | |
| CVE-2026-28464 | 5.9 | 0.09% | 1 | 0 | 2026-03-06T01:05:25 | ## Summary OpenClaw hooks previously compared the provided hook token using a r | |
| CVE-2026-28479 | 5.4 | 0.02% | 1 | 0 | 2026-03-06T01:05:00 | ## Affected Packages / Versions - npm package: `openclaw` - Affected versions: ` | |
| CVE-2026-28462 | 7.5 | 0.04% | 1 | 0 | 2026-03-06T01:04:45 | ## Summary OpenClaw’s browser control API accepted user-supplied output paths | |
| CVE-2026-29610 | 8.8 | 0.07% | 1 | 0 | 2026-03-06T01:04:20 | # Command hijacking via PATH handling **Discovered:** 2026-02-04 **Reporter:** | |
| CVE-2026-28476 | 6.5 | 0.06% | 1 | 0 | 2026-03-06T01:04:05 | ## Summary The optional Tlon (Urbit) extension previously accepted a user-provid | |
| CVE-2026-28463 | 5.7 | 0.02% | 1 | 0 | 2026-03-06T01:02:55 | ## Summary OpenClaw's exec-approvals allowlist supports a small set of "safe bi | |
| CVE-2026-28470 | 9.8 | 0.07% | 1 | 0 | 2026-03-06T01:02:34 | ### Summary Exec approvals allowlist bypass via command substitution/backticks | |
| CVE-2026-28458 | 7.5 | 0.05% | 1 | 0 | 2026-03-06T01:02:29 | ### Summary In affected versions, the Browser Relay `/cdp` WebSocket endpoint di | |
| CVE-2026-28473 | 7.2 | 0.03% | 1 | 0 | 2026-03-06T01:02:20 | ## Summary ### What this means (plain language) If you give a client “chat/wri | |
| CVE-2026-28465 | 5.9 | 0.02% | 1 | 0 | 2026-03-06T01:01:24 | ## Affected Packages / Versions This issue affects the optional voice-call plug | |
| CVE-2026-28393 | 6.0 | 0.01% | 1 | 0 | 2026-03-06T01:00:09 | ## Summary OpenClaw hook mapping transforms could be loaded via absolute paths | |
| CVE-2026-28454 | 9.8 | 0.02% | 2 | 0 | 2026-03-06T00:58:49 | ## Summary When Telegram webhook mode is enabled without a configured webhook s | |
| CVE-2026-21536 | 9.8 | 0.40% | 1 | 0 | 2026-03-06T00:31:41 | Microsoft Devices Pricing Program Remote Code Execution Vulnerability | |
| CVE-2026-26125 | 8.6 | 0.08% | 1 | 0 | 2026-03-06T00:31:41 | Payment Orchestrator Service Elevation of Privilege Vulnerability | |
| CVE-2026-27778 | 7.5 | 0.06% | 1 | 0 | 2026-03-06T00:31:41 | The WebSocket Application Programming Interface lacks restrictions on the number | |
| CVE-2026-22552 | 9.4 | 0.10% | 1 | 0 | 2026-03-06T00:31:41 | WebSocket endpoints lack proper authentication mechanisms, enabling attackers to | |
| CVE-2026-29188 | 9.1 | 0.06% | 1 | 0 | 2026-03-05T22:50:22 | ### Summary A broken access control vulnerability in the TUS protocol DELETE en | |
| CVE-2026-28790 | 7.5 | 0.06% | 1 | 0 | 2026-03-05T22:49:38 | ### Summary OliveTin allows an unauthenticated guest to terminate running actio | |
| CVE-2026-28789 | 7.5 | 0.09% | 1 | 0 | 2026-03-05T22:49:36 | ### Summary An unauthenticated denial-of-service vulnerability exists in OliveTi | |
| CVE-2026-25921 | 9.3 | 0.02% | 1 | 0 | 2026-03-05T22:28:33 | ### Summary Overwritable LFS object across different repos leads to supply-chain | |
| CVE-2026-29611 | 7.5 | 0.03% | 1 | 0 | 2026-03-05T22:00:37 | ### Summary The BlueBubbles extension accepted attacker-controlled local filesys | |
| CVE-2026-28474 | None | 0.04% | 1 | 0 | 2026-03-05T21:52:02 | ## Summary In affected versions of the optional Nextcloud Talk plugin (installe | |
| CVE-2026-28468 | 7.1 | 0.02% | 2 | 0 | 2026-03-05T21:50:00 | ## Summary openclaw could start the sandbox browser bridge server without authe | |
| CVE-2026-28446 | 9.4 | 0.26% | 1 | 0 | 2026-03-05T21:43:07 | ### Summary An authentication bypass in the optional `voice-call` extension/plu | |
| CVE-2026-28391 | None | 0.05% | 1 | 0 | 2026-03-05T21:40:43 | ### Summary On Windows nodes, exec requests were executed via `cmd.exe /d /s /c | |
| CVE-2026-0848 | 10.0 | 0.41% | 1 | 0 | 2026-03-05T21:31:00 | NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper | |
| CVE-2026-27944 | 9.8 | 0.05% | 7 | 0 | 2026-03-05T19:38:33.877000 | Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3. | |
| CVE-2026-24457 | 9.1 | 0.19% | 1 | 0 | 2026-03-05T19:38:33.877000 | An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read ar | |
| CVE-2026-26478 | 9.8 | 0.86% | 2 | 0 | 2026-03-05T18:13:33.993000 | A shell command injection vulnerability in Mobvoi Tichome Mini smart speaker 012 | |
| CVE-2026-2256 | 6.5 | 2.31% | 2 | 1 | 2026-03-04T21:14:09 | A Command Injection vulnerability in ModelScope's MS-Agent versions v1.6.0rc1 an | |
| CVE-2026-1492 | 9.8 | 0.10% | 1 | 1 | 2026-03-03T21:52:29.877000 | The User Registration & Membership – Custom Registration Form Builder, Custom Lo | |
| CVE-2026-24107 | 9.8 | 1.13% | 2 | 0 | 2026-03-03T15:55:11.547000 | An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the | |
| CVE-2026-24101 | 9.8 | 1.13% | 2 | 0 | 2026-03-02T18:31:44 | An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_mul | |
| CVE-2026-20127 | 10.0 | 2.60% | 2 | 6 | 2026-02-25T18:31:45 | A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controlle | |
| CVE-2026-0651 | 7.8 | 0.08% | 1 | 1 | 2026-02-13T20:45:32.090000 | On TP-Link Tapo C260 v1, path traversal is possible due to improper handling of | |
| CVE-2026-25253 | 8.8 | 0.05% | 2 | 7 | 2026-02-13T17:41:02.987000 | OpenClaw (aka clawdbot or Moltbot) before 2026.1.29 obtains a gatewayUrl value f | |
| CVE-2025-38617 | 4.7 | 0.00% | 1 | 0 | 2026-01-07T16:57:56.077000 | In the Linux kernel, the following vulnerability has been resolved: net/packet: | |
| CVE-2023-38545 | 9.8 | 26.25% | 1 | 9 | 2025-02-13T18:33:03 | This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. | |
| CVE-2021-22901 | 8.1 | 0.34% | 2 | 0 | 2024-03-27T15:30:34 | curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting | |
| CVE-2024-47886 | 0 | 0.89% | 2 | 0 | N/A | ||
| CVE-2026-28289 | 0 | 0.03% | 1 | 1 | N/A | ||
| CVE-2026-29779 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-28678 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-28284 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-28210 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2026-28287 | 0 | 0.11% | 1 | 0 | N/A | ||
| CVE-2026-28405 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-28442 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-29089 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2026-30840 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2025-14297 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-28485 | 0 | 0.06% | 1 | 0 | N/A | ||
| CVE-2026-28484 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-59543 | 0 | 0.04% | 2 | 0 | N/A |
updated 2026-03-09T16:16:21.987000
1 posts
🟠 CVE-2026-3678 - High (8.8)
A vulnerability was determined in Tenda FH451 1.0.0.9. Affected is the function sub_3C434 of the file /goform/AdvSetWan. This manipulation of the argument wanmode/PPPOEPassword causes stack-based buffer overflow. It is possible to initiate the att...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3678/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T16:16:21.343000
2 posts
🟠 CVE-2026-3588 - High (7.5)
A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 allows an attacker to exfiltrate private keys by sending a crafted request.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3588/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3588 - High (7.5)
A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 allows an attacker to exfiltrate private keys by sending a crafted request.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3588/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T16:16:18.970000
2 posts
🟠 CVE-2026-25866 - High (7.8)
MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25866/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25866 - High (7.8)
MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25866/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T16:16:15.143000
2 posts
🟠 CVE-2025-69219 - High (8.8)
A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airfl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69219/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-69219 - High (8.8)
A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airfl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69219/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T15:50:20
1 posts
🟠 CVE-2026-30834 - High (7.5)
PinchTab is a standalone HTTP server that gives AI agents direct control over a Chrome browser. Prior to version 0.7.7, a Server-Side Request Forgery (SSRF) vulnerability in the /download endpoint allows any user with API access to induce the Pinc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30834/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T15:46:45
1 posts
🟠 CVE-2026-29186 - High (7.7)
Backstage is an open framework for building developer portals. Prior to version 1.14.3, this is a configuration bypass vulnerability that enables arbitrary code execution. The @backstage/plugin-techdocs-node package uses an allowlist to filter dan...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29186/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T15:46:35
1 posts
🟠 CVE-2026-29192 - High (7.7)
ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via Default URI Redirect. This issue has been patched in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29192/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T15:46:20
1 posts
🟠 CVE-2026-29193 - High (8.2)
ZITADEL is an open source identity management platform. From version 4.0.0 to 4.12.0, a vulnerability in Zitadel's login V2 UI allowed users to bypass login behavior and security policies and self-register new accounts or sign in using password ev...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29193/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T15:30:24.130000
2 posts
🟠 CVE-2026-3809 - High (8.8)
A flaw has been found in Tenda FH1202 1.2.0.14(408). The impacted element is the function fromNatStaticSetting of the file /goform/NatSaticSetting. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3809/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3809 - High (8.8)
A flaw has been found in Tenda FH1202 1.2.0.14(408). The impacted element is the function fromNatStaticSetting of the file /goform/NatSaticSetting. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3809/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T15:30:16.490000
1 posts
🟠 CVE-2026-28466 - High (8.8)
OpenClaw versions prior to 2026.2.14 contain a vulnerability in the gateway in which it fails to sanitize internal approval fields in node.invoke parameters, allowing authenticated clients to bypass exec approval gating for system.run commands. At...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28466/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T15:24:42.697000
1 posts
🟠 CVE-2026-3727 - High (8.8)
A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function sub_3C6C0 of the file /goform/QuickIndex. The manipulation of the argument mit_linktype/PPPOEPassword results in stack-based buffer overflow. The attack may b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3727/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T15:24:21.043000
1 posts
🟠 CVE-2026-3729 - High (8.8)
A vulnerability was identified in Tenda F453 1.0.0.3/3.As. Impacted is the function fromPptpUserAdd of the file /goform/PPTPDClient. Such manipulation of the argument username/opttype leads to stack-based buffer overflow. The attack can be execute...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3729/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T15:17:08.960000
4 posts
🚩 CVE-2026-3768 (HIGH, CVSS 8.7): Stack buffer overflow in Tenda F453 v1.0.0.3 — remote, unauthenticated exploit possible. Public exploit code released. Patch ASAP or restrict remote access! https://radar.offseq.com/threat/cve-2026-3768-stack-based-buffer-overflow-in-tenda-9b634f69 #OffSeq #CVE20263768 #RouterSecurity #Infosec
##🟠 CVE-2026-3768 - High (8.8)
A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet. The manipulation of the argument GO leads to stack-based buffer overflow. Remote expl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3768/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚩 CVE-2026-3768 (HIGH, CVSS 8.7): Stack buffer overflow in Tenda F453 v1.0.0.3 — remote, unauthenticated exploit possible. Public exploit code released. Patch ASAP or restrict remote access! https://radar.offseq.com/threat/cve-2026-3768-stack-based-buffer-overflow-in-tenda-9b634f69 #OffSeq #CVE20263768 #RouterSecurity #Infosec
##🟠 CVE-2026-3768 - High (8.8)
A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet. The manipulation of the argument GO leads to stack-based buffer overflow. Remote expl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3768/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T15:15:57.870000
2 posts
🟠 CVE-2026-2219 - High (7.5)
It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite lo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2219/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2219 - High (7.5)
It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite lo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2219/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T14:16:05.250000
2 posts
🟠 CVE-2025-14769 - High (7.5)
In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference.
...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14769/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-14769 - High (7.5)
In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference.
...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14769/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🔴 CVE-2025-29165 - Critical (9.8)
An issue in D-Link DIR-1253 MESH V1.6.1684 allows an attacker to escalate privileges via the etc/shadow.sample component
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-29165/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🟠 CVE-2026-28342 - High (7.5)
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.10.2, the PasswordHash API endpoint allows unauthenticated users to trigger excessive memory allocation by sending concurrent password hashing requests....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28342/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
1 repos
🟠 CVE-2025-70995 - High (8.8)
An issue in Aranda Service Desk Web Edition (ASDK API 8.6) allows authenticated attackers to achieve remote code execution due to improper validation of uploaded files. An authenticated user can upload a crafted web.config file by sending a crafte...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🟠 CVE-2025-70949 - High (7.5)
An observable timing discrepancy in @perfood/couch-auth v0.26.0 allows attackers to access sensitive information via a timing side-channel.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70949/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🔴 CVE-2025-55208 - Critical (9)
Chamilo is a learning management system. Versions prior to 1.11.34 have a Stored XSS through insecure file uploads in `Social Networks`. Through it, a low-privilege user can execute arbitrary code in the admin user inbox, allowing takeover of the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-55208/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🟠 CVE-2026-28451 - High (8.3)
OpenClaw versions prior to 2026.2.14 contain server-side request forgery vulnerabilities in the Feishu extension that allow attackers to fetch attacker-controlled remote URLs without SSRF protections via sendMediaFeishu function and markdown image...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28451/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🔴 CVE-2026-28392 - Critical (9.8)
OpenClaw versions prior to 2026.2.14 contain a privilege escalation vulnerability in the Slack slash-command handler that incorrectly authorizes any direct message sender when dmPolicy is set to open (must be configured). Attackers can execute pri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28392/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🟠 CVE-2026-28447 - High (7.5)
OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.1 contain a path traversal vulnerability in plugin installation that allows malicious plugin package names to escape the extensions directory. Attackers can craft scoped package names containing p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28447/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🟠 CVE-2026-28453 - High (7.5)
OpenClaw versions prior to 2026.2.14 fail to validate TAR archive entry paths during extraction, allowing path traversal sequences to write files outside the intended directory. Attackers can craft malicious archives with traversal sequences like ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28453/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🟠 CVE-2026-28456 - High (8.4)
OpenClaw versions 2026.1.5 prior to 2026.2.14 contain a vulnerability in the Gateway in which it does not sufficiently constrain configured hook module paths before passing them to dynamic import(), allowing code execution. An attacker with gatewa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28456/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🔴 CVE-2026-28469 - Critical (9.8)
OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets share the same HTTP path. Attackers can exploit fir...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28469/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🔴 CVE-2026-28472 - Critical (9.8)
OpenClaw versions prior to 2026.2.2 contain a vulnerability in the gateway WebSocket connect handshake in which it allows skipping device identity checks when auth.token is present but not validated. Attackers can connect to the gateway without pr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28472/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🟠 CVE-2026-28478 - High (7.5)
OpenClaw versions prior to 2026.2.13 contain a denial of service vulnerability in webhook handlers that buffer request bodies without strict byte or time limits. Remote unauthenticated attackers can send oversized JSON payloads or slow uploads to ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28478/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🟠 CVE-2026-29613 - High (7.5)
OpenClaw versions prior to 2026.2.12 contain a vulnerability in the BlueBubbles (optional plugin) webhook handler in which it authenticates requests based solely on loopback remoteAddress without validating forwarding headers, allowing bypass of c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29613/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🟠 CVE-2026-29609 - High (7.5)
OpenClaw versions prior to 2026.2.14 contain a denial of service vulnerability in the fetchWithGuard function that allocates entire response payloads in memory before enforcing maxBytes limits. Remote attackers can trigger memory exhaustion by ser...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29609/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
2 posts
🟠 CVE-2025-59541 - High (8.1)
Chamilo is a learning management system. Prior to version 1.11.34, a Cross-Site Request Forgery (CSRF) vulnerability allows an attacker to delete projects inside a course without the victim’s consent. The issue arises because sensitive actions s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59541/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-59541 - High (8.1)
Chamilo is a learning management system. Prior to version 1.11.34, a Cross-Site Request Forgery (CSRF) vulnerability allows an attacker to delete projects inside a course without the victim’s consent. The issue arises because sensitive actions s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59541/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:36:08.413000
1 posts
🟠 CVE-2026-28727 - High (7.8)
Local privilege escalation due to insecure Unix socket permissions. The following products are affected: Acronis Cyber Protect 17 (macOS) before build 41186, Acronis Cyber Protect Cloud Agent (macOS) before build 41124.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28727/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:34.633000
3 posts
Sign in with ANY password into Rocket.Chat EE (CVE-2026-28514) and other vulnerabilities we’ve found with our open source AI framework https://github.blog/security/how-to-scan-for-vulnerabilities-with-github-security-labs-open-source-ai-powered-framework/
##Sign in with ANY password into Rocket.Chat EE (CVE-2026-28514) and other vulnerabilities we’ve found with our open source AI framework https://github.blog/security/how-to-scan-for-vulnerabilities-with-github-security-labs-open-source-ai-powered-framework/
##🚩 CRITICAL: CVE-2026-28514 in Rocket.Chat (<8.0.0) allows auth bypass via username-only login. Full account takeover possible! Patch now or restrict access + enable MFA. Details: https://radar.offseq.com/threat/cve-2026-28514-cwe-287-improper-authentication-in--bf7998c6 #OffSeq #RocketChat #Security #CVE202628514
##updated 2026-03-09T13:35:34.633000
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-09T13:35:34.633000
1 posts
🟠 CVE-2026-29067 - High (8.1)
ZITADEL is an open source identity management platform. From version 4.0.0-rc.1 to 4.7.0, a potential vulnerability exists in ZITADEL's password reset mechanism in login V2. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29067/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:34.633000
1 posts
🔴 CVE-2026-29191 - Critical (9.3)
ZITADEL is an open source identity management platform. From version 4.0.0 to 4.11.1, a vulnerability in Zitadel's login V2 interface was discovered that allowed a possible account takeover via XSS in /saml-post Endpoint. This issue has been patch...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29191/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:34.633000
1 posts
🔴 CVE-2026-2446 - Critical (9.8)
The PowerPack for LearnDash WordPress plugin before 1.3.0 does not have authorization and CRSF checks in an AJAX action, allowing unauthenticated users to update arbitrary WordPress options (such as default_role etc) and create arbitrary admin users
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2446/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:34.633000
2 posts
🟠 CVE-2026-3589 - High (7.5)
The WooCommerce WordPress plugin from versions 5.4.0 to 10.5.2 does not properly handle batch requests, which could allow unauthenticated users to make a logged in admin call non store/WC REST endpoints, and create arbitrary admin users via a CSRF...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3589/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-3589: CRITICAL CSRF in WooCommerce (5.4.0 – 10.5.2) lets unauth users create admin accounts via REST API batch requests. Patch ASAP! Restrict API access & monitor for abuse. More: https://radar.offseq.com/threat/cve-2026-3589-cwe-352-cross-site-request-forgery-c-929d5a57 #OffSeq #WooCommerce #WordPress #CSRF
##updated 2026-03-09T13:35:34.633000
1 posts
💡 HIGH severity: CVE-2026-24308 in Apache ZooKeeper 3.8.0 – 3.9.4 logs sensitive config at INFO level. Risk of secret exposure via logs. Patch to 3.8.6/3.9.5 & restrict log access! https://radar.offseq.com/threat/cve-2026-24308-cwe-532-insertion-of-sensitive-info-090ca1fd #OffSeq #ZooKeeper #CVE202624308 #Security
##updated 2026-03-09T13:35:34.633000
1 posts
🟠 CVE-2026-26018 - High (7.5)
CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a denial of service vulnerability exists in CoreDNS's loop detection plugin that allows an attacker to crash the DNS server by sending specially crafted DNS queries. The vulnera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26018/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:34.633000
1 posts
🟠 CVE-2026-29075 - High (8.3)
Mesa is an open-source Python library for agent-based modeling, simulating complex systems and exploring emergent behaviors. In version 3.5.0 and prior, checking out of untrusted code in benchmarks.yml workflow may lead to code execution in privil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29075/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:34.633000
2 posts
🟠 CVE-2025-14353 - High (7.5)
The ZIP Code Based Content Protection plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 1.0.2 via the 'zipcode' parameter. This is due to insufficient escaping on the user supplied parameter and lack of suff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14353/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-14353 - High (7.5)
The ZIP Code Based Content Protection plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 1.0.2 via the 'zipcode' parameter. This is due to insufficient escaping on the user supplied parameter and lack of suff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14353/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:34.633000
1 posts
🟠 CVE-2026-29091 - High (8.1)
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to version 3.0.0, a remote code execution (RCE) flaw was discovered in the locutus project, specifically within the call_user_func_array function i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29091/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:34.633000
2 posts
🔴 CVE-2026-29789 - Critical (9.9)
Vito is a self-hosted web application that helps manage servers and deploy PHP applications into production servers. Prior to version 3.20.3, a missing authorization check in workflow site-creation actions allows an authenticated attacker with wor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29789/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-29789 (CRITICAL, CVSS 10): vitodeploy vito <3.20.3 has missing auth checks in workflow site-creation. Attackers with workflow write can act across projects. Patch to 3.20.3+ now! https://radar.offseq.com/threat/cve-2026-29789-cwe-862-missing-authorization-in-vi-a7e2f21c #OffSeq #Vulnerability #PatchTuesday
##updated 2026-03-09T13:35:34.633000
1 posts
🟠 CVE-2026-30242 - High (8.5)
Plane is an an open-source project management tool. Prior to version 1.2.3, the webhook URL validation in plane/app/serializers/webhook.py only checks ip.is_loopback, allowing attackers with workspace ADMIN role to create webhooks pointing to priv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30242/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:34.633000
1 posts
🟠 CVE-2026-30823 - High (8.8)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, there is an IDOR vulnerability, leading to account takeover and enterprise feature bypass via SSO configuration. This issue has been ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30823/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
6 posts
🚨 CRITICAL: CVE-2026-3823 exposes Atop EHG2408 switches to unauthenticated RCE via stack-based buffer overflow. No patch yet — segment, restrict access, and monitor traffic. Full device compromise risk. https://radar.offseq.com/threat/cve-2026-3823-cwe-121-stack-based-buffer-overflow--68d582bc #OffSeq #ICS #Vuln #OTSecurity
##🟠 CVE-2026-3823 - High (8.8)
EHG2408 series switch developed by Atop Technologies has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and execute arbitrary code.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3823/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##CRITICAL: CVE-2026-3823 in Atop EHG2408 switches — stack-based buffer overflow allows unauth'd remote code exec. No patch yet. Segment, monitor & restrict access ASAP! 🛡️ https://radar.offseq.com/threat/cve-2026-3823-cwe-121-stack-based-buffer-overflow--68d582bc #OffSeq #CVE20263823 #ICS #Vulnerability
##🚨 CRITICAL: CVE-2026-3823 exposes Atop EHG2408 switches to unauthenticated RCE via stack-based buffer overflow. No patch yet — segment, restrict access, and monitor traffic. Full device compromise risk. https://radar.offseq.com/threat/cve-2026-3823-cwe-121-stack-based-buffer-overflow--68d582bc #OffSeq #ICS #Vuln #OTSecurity
##🟠 CVE-2026-3823 - High (8.8)
EHG2408 series switch developed by Atop Technologies has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and execute arbitrary code.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3823/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##CRITICAL: CVE-2026-3823 in Atop EHG2408 switches — stack-based buffer overflow allows unauth'd remote code exec. No patch yet. Segment, monitor & restrict access ASAP! 🛡️ https://radar.offseq.com/threat/cve-2026-3823-cwe-121-stack-based-buffer-overflow--68d582bc #OffSeq #CVE20263823 #ICS #Vulnerability
##updated 2026-03-09T13:35:07.393000
2 posts
🔶 New security advisory:
CVE-2026-29784 affects multiple systems.
• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-29784
🟠 CVE-2026-29784 - High (7.5)
Ghost is a Node.js content management system. From version 5.101.6 to 6.19.2, incomplete CSRF protections around /session/verify made it possible to use OTCs in login sessions different from the requesting session. In some scenarios this might hav...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29784/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
2 posts
🟠 CVE-2025-41758 - High (8.8)
A low-privileged remote attacker can exploit an arbitrary file write vulnerability in the wwupload.cgi endpoint. Due to path traversal this can lead to overwriting arbitrary files on the device and achieving a full system compromise.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41758/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-41758 - High (8.8)
A low-privileged remote attacker can exploit an arbitrary file write vulnerability in the wwupload.cgi endpoint. Due to path traversal this can lead to overwriting arbitrary files on the device and achieving a full system compromise.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41758/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
4 posts
🔴 CVE-2025-41764 - Critical (9.1)
Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41764/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-41764 - Critical (9.1)
Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41764/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-41764 - Critical (9.1)
Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41764/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-41764 - Critical (9.1)
Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41764/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
4 posts
🟠 CVE-2025-41761 - High (7.8)
A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41761/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-41761 - High (7.8)
A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41761/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-41761 - High (7.8)
A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41761/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-41761 - High (7.8)
A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41761/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
2 posts
🟠 CVE-2025-41756 - High (8.1)
A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to write arbitrary files on the system.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41756/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-41756 - High (8.1)
A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to write arbitrary files on the system.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41756/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
2 posts
🟠 CVE-2025-61612 - High (7.5)
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61612/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-61612 - High (7.5)
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61612/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
2 posts
🟠 CVE-2025-61611 - High (7.5)
In modem, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed..
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61611/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-61611 - High (7.5)
In modem, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed..
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61611/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
2 posts
🟠 CVE-2025-69279 - High (7.5)
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69279/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-69279 - High (7.5)
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69279/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
2 posts
🟠 CVE-2025-61615 - High (7.5)
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61615/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-61615 - High (7.5)
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61615/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
2 posts
🟠 CVE-2025-61614 - High (7.5)
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61614/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-61614 - High (7.5)
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61614/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
2 posts
🟠 CVE-2026-30896 - High (7.8)
The installer for Qsee Client versions 1.0.1 and prior insecurely load Dynamic Link Libraries (DLLs). When a user is directed to place some malicious DLL to the same directory and execute the affected installer, then arbitrary code may be executed...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30896/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-30896 - High (7.8)
The installer for Qsee Client versions 1.0.1 and prior insecurely load Dynamic Link Libraries (DLLs). When a user is directed to place some malicious DLL to the same directory and execute the affected installer, then arbitrary code may be executed...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30896/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
4 posts
🔴 CVE-2026-3630: CRITICAL stack-based buffer overflow in DeltaWW COMMGR2 (ver 0) enables unauthenticated RCE. No patch available. Segment networks, enable IDS/IPS, & monitor for exploitation. Details: https://radar.offseq.com/threat/cve-2026-3630-cwe-121-stack-based-buffer-overflow--c00e7f15 #OffSeq #ICS #Vuln #CyberSecurity
##🔴 CVE-2026-3630 - Critical (9.8)
Delta Electronics COMMGR2 has
Stack-based Buffer Overflow vulnerability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3630/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-3630: CRITICAL stack-based buffer overflow in DeltaWW COMMGR2 (ver 0) enables unauthenticated RCE. No patch available. Segment networks, enable IDS/IPS, & monitor for exploitation. Details: https://radar.offseq.com/threat/cve-2026-3630-cwe-121-stack-based-buffer-overflow--c00e7f15 #OffSeq #ICS #Vuln #CyberSecurity
##🔴 CVE-2026-3630 - Critical (9.8)
Delta Electronics COMMGR2 has
Stack-based Buffer Overflow vulnerability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3630/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
2 posts
UltraVNC 1.6.4.0 on Windows hit by HIGH-severity vuln (CVE-2026-3787): uncontrolled DLL search path in cryptbase.dll. Local attackers could escalate privileges. No patch yet — restrict access & monitor for DLL hijacking. https://radar.offseq.com/threat/cve-2026-3787-uncontrolled-search-path-in-ultravnc-8f16fda8 #OffSeq #Vuln #UltraVNC
##UltraVNC 1.6.4.0 on Windows hit by HIGH-severity vuln (CVE-2026-3787): uncontrolled DLL search path in cryptbase.dll. Local attackers could escalate privileges. No patch yet — restrict access & monitor for DLL hijacking. https://radar.offseq.com/threat/cve-2026-3787-uncontrolled-search-path-in-ultravnc-8f16fda8 #OffSeq #Vuln #UltraVNC
##updated 2026-03-09T13:35:07.393000
2 posts
🔴 CVE-2026-30832 - Critical (9.1)
Soft Serve is a self-hostable Git server for the command line. From version 0.6.0 to before version 0.11.4, an authenticated SSH user can force the server to make HTTP requests to internal/private IP addresses by running repo import with a crafted...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30832/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔔 CRITICAL CVE-2026-30832: charmbracelet soft-serve (0.6.0 – 0.11.4) allows authenticated SSH users to exploit SSRF via repo import, exposing internal resources. Update to 0.11.4+ now. More: https://radar.offseq.com/threat/cve-2026-30832-cwe-918-server-side-request-forgery-01aea4d4 #OffSeq #SSRF #Vulnerability
##updated 2026-03-09T13:35:07.393000
1 posts
🟠 CVE-2026-30851 - High (8.1)
Caddy is an extensible server platform that uses TLS by default. From version 2.10.0 to before version 2.11.2, forward_auth copy_headers does not strip client-supplied headers, allowing identity injection and privilege escalation. This issue has b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30851/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
2 posts
🔴 CVE-2026-30860 - Critical (9.9)
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.12, a remote code execution (RCE) vulnerability exists in the application's database query functionality. The validation syst...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30860/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: Tencent WeKnora (<0.2.12) hit by CVE-2026-30860 — SQLi in PostgreSQL array/row parsing enables unauthenticated RCE. Patch to 0.2.12 ASAP. Restrict DB rights and monitor logs. https://radar.offseq.com/threat/cve-2026-30860-cwe-89-improper-neutralization-of-s-90c4d0a6 #OffSeq #SQLInjection #InfoSec
##updated 2026-03-09T13:35:07.393000
1 posts
🟠 CVE-2026-3699 - High (8.8)
A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-171114. This impacts the function strcpy of the file /goform/formRemoteControl. The manipulation results in buffer overflow. The attack may be launched remotely. The exploit has bee...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3699/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:35:07.393000
1 posts
1 repos
🚨 CRITICAL: parse-server (<8.6.10, <9.5.0-alpha.11) has CWE-287 improper authentication (CVE-2026-30863). JWT audience check skipped by default; attackers can impersonate users. Patch or set audience now. https://radar.offseq.com/threat/cve-2026-30863-cwe-287-improper-authentication-in--0b463399 #OffSeq #CVE202630863 #ParseServer #infosec
##updated 2026-03-09T13:21:39
1 posts
🟠 CVE-2026-30855 - High (8.8)
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.2, an authorization bypass in tenant management endpoints of WeKnora application allows any authenticated user to read, modif...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30855/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:15:36
1 posts
🟠 CVE-2026-30827 - High (7.5)
express-rate-limit is a basic rate-limiting middleware for Express. In versions starting from 8.0.0 and prior to versions 8.0.2, 8.1.1, 8.2.2, and 8.3.0, the default keyGenerator in express-rate-limit applies IPv6 subnet masking (/56 by default) t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30827/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:15:31
2 posts
🟠 CVE-2026-30822 - High (7.7)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, unauthenticated users can inject arbitrary values into internal database fields when creating leads. This issue has been patched in v...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30822/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-30822 - High (7.7)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to version 3.0.13, unauthenticated users can inject arbitrary values into internal database fields when creating leads. This issue has been patched in v...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30822/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T13:14:29
3 posts
🔴 CVE-2026-30861 - Critical (9.9)
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. From version 0.2.5 to before version 0.2.10, an unauthenticated remote code execution (RCE) vulnerability exists in the MCP stdio configuration va...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30861/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: Tencent WeKnora (0.2.5 – 0.2.9) hit by unauthenticated RCE (CVE-2026-30861) — attackers bypass command validation using npx - p node. Patch to 0.2.10 ASAP! https://radar.offseq.com/threat/cve-2026-30861-cwe-78-improper-neutralization-of-s-94bf2228 #OffSeq #Vulnerability #RCE #Tencent
##🚨 CRITICAL CVE-2026-30861: Tencent WeKnora (0.2.5 – 0.2.9) OS command injection enables unauth RCE — full system compromise possible. Patch to 0.2.10 now! More info: https://radar.offseq.com/threat/cve-2026-30861-cwe-78-improper-neutralization-of-s-94bf2228 #OffSeq #RCE #Vulnerability #InfoSec
##updated 2026-03-09T13:12:18
1 posts
🟠 CVE-2026-30244 - High (7.5)
Plane is an an open-source project management tool. Prior to version 1.2.2, unauthenticated attackers can enumerate workspace members and extract sensitive information including email addresses, user roles, and internal identifiers. The vulnerabil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30244/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T12:31:50
4 posts
🟠 CVE-2026-3814 - High (8.8)
A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected by this issue is the function strcpy of the file /goform/getOneApConfTempEntry. Performing a manipulation results in buffer overflow. It is possible to initiate the a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3814/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 HIGH severity (CVSS 8.7) buffer overflow in UTT HiPER 810G (≤1.7.7-1711), via strcpy in /goform/getOneApConfTempEntry. Public exploit released — urgent monitoring advised. CVE-2026-3814 https://radar.offseq.com/threat/cve-2026-3814-buffer-overflow-in-utt-hiper-810g-7866271a #OffSeq #Vulnerability #UTT #InfoSec
##🟠 CVE-2026-3814 - High (8.8)
A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected by this issue is the function strcpy of the file /goform/getOneApConfTempEntry. Performing a manipulation results in buffer overflow. It is possible to initiate the a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3814/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 HIGH severity (CVSS 8.7) buffer overflow in UTT HiPER 810G (≤1.7.7-1711), via strcpy in /goform/getOneApConfTempEntry. Public exploit released — urgent monitoring advised. CVE-2026-3814 https://radar.offseq.com/threat/cve-2026-3814-buffer-overflow-in-utt-hiper-810g-7866271a #OffSeq #Vulnerability #UTT #InfoSec
##updated 2026-03-09T12:31:49
4 posts
🟠 CVE-2026-3815 - High (8.8)
A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects the function strcpy of the file /goform/formApMail. Executing a manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3815/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3815 - High (8.8)
A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects the function strcpy of the file /goform/formApMail. Executing a manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3815/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3815 - High (8.8)
A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects the function strcpy of the file /goform/formApMail. Executing a manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3815/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3815 - High (8.8)
A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects the function strcpy of the file /goform/formApMail. Executing a manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3815/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T09:30:37
2 posts
🔴 CVE-2025-41765 - Critical (9.1)
Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupload.cgi endpoint to upload and apply arbitrary data. This includes, but is not limited to, contact images, HTTPS certificates, system backups for ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41765/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-41765 - Critical (9.1)
Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupload.cgi endpoint to upload and apply arbitrary data. This includes, but is not limited to, contact images, HTTPS certificates, system backups for ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41765/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T09:30:37
2 posts
🟠 CVE-2025-41772 - High (7.5)
An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41772/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-41772 - High (7.5)
An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41772/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T09:30:37
2 posts
🟠 CVE-2025-41766 - High (8.8)
A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41766/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-41766 - High (8.8)
A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41766/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T09:30:37
2 posts
🟠 CVE-2025-69278 - High (7.5)
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69278/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-69278 - High (7.5)
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-69278/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T09:30:37
4 posts
🟠 CVE-2026-3811 - High (8.8)
A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remote...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3811/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ HIGH severity: Tenda FH1202 (1.2.0.14) vulnerable to stack-based buffer overflow (CVE-2026-3811). Remote exploit is public. No fix yet — monitor, isolate, and watch for updates. https://radar.offseq.com/threat/cve-2026-3811-stack-based-buffer-overflow-in-tenda-076e8a7e #OffSeq #Vulnerability #IoTSecurity #CVE20263811
##🟠 CVE-2026-3811 - High (8.8)
A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remote...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3811/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ HIGH severity: Tenda FH1202 (1.2.0.14) vulnerable to stack-based buffer overflow (CVE-2026-3811). Remote exploit is public. No fix yet — monitor, isolate, and watch for updates. https://radar.offseq.com/threat/cve-2026-3811-stack-based-buffer-overflow-in-tenda-076e8a7e #OffSeq #Vulnerability #IoTSecurity #CVE20263811
##updated 2026-03-09T09:30:36
2 posts
🟠 CVE-2025-41757 - High (8.8)
A low-privileged remote attacker can abuse the backup restore functionality of UBR (ubr-restore) which runs with elevated privileges and does not validate the contents of the backup archive to create or overwrite arbitrary files anywhere on the sy...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41757/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-41757 - High (8.8)
A low-privileged remote attacker can abuse the backup restore functionality of UBR (ubr-restore) which runs with elevated privileges and does not validate the contents of the backup archive to create or overwrite arbitrary files anywhere on the sy...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41757/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T09:30:36
2 posts
🟠 CVE-2025-61616 - High (7.5)
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61616/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-61616 - High (7.5)
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61616/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T09:30:36
2 posts
🟠 CVE-2025-61613 - High (7.5)
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61613/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-61613 - High (7.5)
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61613/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T09:30:36
2 posts
🟠 CVE-2026-3810 - High (8.8)
A vulnerability has been found in Tenda FH1202 1.2.0.14(408). This affects the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer overflow. Remote exploitation of the a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3810/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3810 - High (8.8)
A vulnerability has been found in Tenda FH1202 1.2.0.14(408). This affects the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer overflow. Remote exploitation of the a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3810/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T09:30:30
2 posts
🟠 CVE-2026-3808 - High (8.8)
A vulnerability was detected in Tenda FH1202 1.2.0.14(408). The affected element is the function formWebTypeLibrary of the file /goform/webtypelibrary. Performing a manipulation of the argument webSiteId results in stack-based buffer overflow. The...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3808/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3808 - High (8.8)
A vulnerability was detected in Tenda FH1202 1.2.0.14(408). The affected element is the function formWebTypeLibrary of the file /goform/webtypelibrary. Performing a manipulation of the argument webSiteId results in stack-based buffer overflow. The...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3808/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T09:30:30
2 posts
🟠 CVE-2026-3807 - High (8.8)
A security vulnerability has been detected in Tenda FH1202 1.2.0.14(408). Impacted is the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Such manipulation of the argument mit_ssid/mit_ssid_index leads to stack-based buffer overflow....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3807/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3807 - High (8.8)
A security vulnerability has been detected in Tenda FH1202 1.2.0.14(408). Impacted is the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Such manipulation of the argument mit_ssid/mit_ssid_index leads to stack-based buffer overflow....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3807/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T06:31:20
2 posts
🟠 CVE-2026-3803 - High (8.8)
A vulnerability was identified in Tenda i3 1.0.0.6(2204). This affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to initiate ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3803/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3803 - High (8.8)
A vulnerability was identified in Tenda i3 1.0.0.6(2204). This affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to initiate ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3803/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T06:31:20
2 posts
🟠 CVE-2026-3802 - High (8.8)
A vulnerability was determined in Tenda i3 1.0.0.6(2204). Affected by this issue is the function formexeCommand of the file /goform/exeCommand. Executing a manipulation of the argument cmdinput can lead to stack-based buffer overflow. The attack m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3802/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3802 - High (8.8)
A vulnerability was determined in Tenda i3 1.0.0.6(2204). Affected by this issue is the function formexeCommand of the file /goform/exeCommand. Executing a manipulation of the argument cmdinput can lead to stack-based buffer overflow. The attack m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3802/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T06:31:19
4 posts
🟠 CVE-2026-3804 - High (8.8)
A security flaw has been discovered in Tenda i3 1.0.0.6(2204). This vulnerability affects the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet. The manipulation of the argument index results in stack-based buffer overflow. It is ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3804/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ HIGH severity: CVE-2026-3804 in Tenda i3 v1.0.0.6(2204) enables remote stack-based buffer overflow via /goform/WifiMacFilterSet. Exploit is public — prioritize mitigation or isolation. https://radar.offseq.com/threat/cve-2026-3804-stack-based-buffer-overflow-in-tenda-c824133f #OffSeq #Vulnerability #Tenda #InfoSec
##🟠 CVE-2026-3804 - High (8.8)
A security flaw has been discovered in Tenda i3 1.0.0.6(2204). This vulnerability affects the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet. The manipulation of the argument index results in stack-based buffer overflow. It is ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3804/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ HIGH severity: CVE-2026-3804 in Tenda i3 v1.0.0.6(2204) enables remote stack-based buffer overflow via /goform/WifiMacFilterSet. Exploit is public — prioritize mitigation or isolation. https://radar.offseq.com/threat/cve-2026-3804-stack-based-buffer-overflow-in-tenda-c824133f #OffSeq #Vulnerability #Tenda #InfoSec
##updated 2026-03-09T06:31:19
2 posts
🟠 CVE-2026-3631 - High (7.5)
Delta Electronics COMMGR2 has
Buffer Over-read DoS vulnerability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3631/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3631 - High (7.5)
Delta Electronics COMMGR2 has
Buffer Over-read DoS vulnerability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3631/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T06:31:19
2 posts
🟠 CVE-2026-3799 - High (8.8)
A flaw has been found in Tenda i3 1.0.0.6(2204). This impacts the function formSetCfm of the file /goform/setcfm. This manipulation of the argument funcpara1 causes stack-based buffer overflow. Remote exploitation of the attack is possible. The ex...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3799/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3799 - High (8.8)
A flaw has been found in Tenda i3 1.0.0.6(2204). This impacts the function formSetCfm of the file /goform/setcfm. This manipulation of the argument funcpara1 causes stack-based buffer overflow. Remote exploitation of the attack is possible. The ex...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3799/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-09T06:31:19
2 posts
🟠 CVE-2026-3801 - High (8.8)
A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formSetAutoPing of the file /goform/setAutoPing. Performing a manipulation of the argument ping1/ping2 results in stack-based buffer overflow. The ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3801/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3801 - High (8.8)
A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formSetAutoPing of the file /goform/setAutoPing. Performing a manipulation of the argument ping1/ping2 results in stack-based buffer overflow. The ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3801/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T21:30:22
4 posts
🚩 CVE-2026-3769: HIGH severity vuln in Tenda F453 (v1.0.0.3) — stack-based buffer overflow in /goform/WrlclientSet. Public exploit released! Limit remote access, monitor traffic, apply mitigations. Details: https://radar.offseq.com/threat/cve-2026-3769-stack-based-buffer-overflow-in-tenda-7dc11ff5 #OffSeq #NetworkSecurity #Vuln
##🟠 CVE-2026-3769 - High (8.8)
A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function WrlclientSet of the file /goform/WrlclientSet. The manipulation of the argument GO results in stack-based buffer overflow. The attack can be executed remote...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3769/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚩 CVE-2026-3769: HIGH severity vuln in Tenda F453 (v1.0.0.3) — stack-based buffer overflow in /goform/WrlclientSet. Public exploit released! Limit remote access, monitor traffic, apply mitigations. Details: https://radar.offseq.com/threat/cve-2026-3769-stack-based-buffer-overflow-in-tenda-7dc11ff5 #OffSeq #NetworkSecurity #Vuln
##🟠 CVE-2026-3769 - High (8.8)
A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function WrlclientSet of the file /goform/WrlclientSet. The manipulation of the argument GO results in stack-based buffer overflow. The attack can be executed remote...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3769/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T12:30:35
2 posts
🛑 CVE-2026-3732: HIGH severity stack buffer overflow in Tenda F453 (v1.0.0.3). Remote, unauthenticated code execution risk — no patch yet. Block remote mgmt & monitor endpoints. Details: https://radar.offseq.com/threat/cve-2026-3732-stack-based-buffer-overflow-in-tenda-41443da2 #OffSeq #Vuln #RouterSecurity #CVE20263732
##🟠 CVE-2026-3732 - High (8.8)
A security vulnerability has been detected in Tenda F453 1.0.0.3. This affects the function strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. It is possible to initiate the attac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3732/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T12:30:34
1 posts
🟠 CVE-2026-3728 - High (8.8)
A vulnerability was determined in Tenda F453 1.0.0.3/1.If. This issue affects the function fromSetCfm of the file /goform/setcfm. This manipulation of the argument funcname/funcpara1 causes stack-based buffer overflow. Remote exploitation of the a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3728/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T09:30:27
2 posts
🚨 CVE-2026-3726 (HIGH, CVSS 8.7) in Tenda F453 (v1.0.0.3): Stack buffer overflow in /goform/webExcptypemanFilter enables remote, unauthenticated code execution. Public exploit code raises risk — restrict access & monitor now! https://radar.offseq.com/threat/cve-2026-3726-stack-based-buffer-overflow-in-tenda-6f0be4bc #OffSeq #Vuln #Infosec
##🟠 CVE-2026-3726 - High (8.8)
A vulnerability has been found in Tenda F453 1.0.0.3. This affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be initia...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3726/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T09:30:21
2 posts
🛡️ CVE-2026-3715: HIGH-severity stack overflow in Wavlink WL-WN579X3-C routers (v231124). Remote attackers can execute code w/o auth. Exploit code is public — patch to 20260226 now! https://radar.offseq.com/threat/cve-2026-3715-stack-based-buffer-overflow-in-wavli-504a0f36 #OffSeq #Vulnerability #RouterSecurity #Infosec
##🟠 CVE-2026-3715 - High (8.8)
A vulnerability was found in Wavlink WL-WN579X3-C 231124. This affects the function sub_40139C of the file /cgi-bin/firewall.cgi. Performing a manipulation of the argument del_flag results in stack-based buffer overflow. It is possible to initiate...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3715/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T06:31:15
1 posts
🟠 CVE-2026-3701 - High (8.8)
A security vulnerability has been detected in H3C Magic B1 up to 100R004. Affected by this vulnerability is the function Edit_BasicSSID_5G of the file /goform/aspForm. Such manipulation of the argument param leads to buffer overflow. The attack ca...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3701/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T06:31:15
2 posts
🔴 CVE-2026-3703 - Critical (9.8)
A flaw has been found in Wavlink NU516U1 251208. This affects the function sub_401A10 of the file /cgi-bin/login.cgi. Executing a manipulation of the argument ipaddr can lead to out-of-bounds write. The attack may be performed from remote. The exp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3703/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-3703 in Wavlink NU516U1 (firmware 251208) allows remote, unauthenticated out-of-bounds write via /cgi-bin/login.cgi. Public exploit available — patch immediately! Monitor for abnormal ipaddr activity. https://radar.offseq.com/threat/cve-2026-3703-out-of-bounds-write-in-wavlink-nu516-a93ca55c #OffSeq #Vuln #RouterSecurity #Wavlink
##updated 2026-03-08T03:30:34
1 posts
🟠 CVE-2026-3698 - High (8.8)
A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. This affects the function strcpy of the file /goform/NTP. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and m...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3698/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T03:30:34
1 posts
🟠 CVE-2026-3700 - High (8.8)
A weakness has been identified in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formConfigDnsFilterGlobal. This manipulation causes buffer overflow. Remote exploitation of the attack is possible. The exploi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3700/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T00:31:58
1 posts
🟠 CVE-2026-3677 - High (8.8)
A vulnerability was found in Tenda FH451 1.0.0.9. This impacts the function fromSetCfm of the file /goform/setcfm. The manipulation of the argument funcname/funcpara1 results in stack-based buffer overflow. The attack may be performed from remote....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3677/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-08T00:31:58
1 posts
🟠 CVE-2026-3679 - High (8.8)
A vulnerability was identified in Tenda FH451 1.0.0.9. Affected by this vulnerability is the function formQuickIndex of the file /goform/QuickIndex. Such manipulation of the argument mit_linktype/PPPOEPassword leads to stack-based buffer overflow....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3679/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-07T09:30:21
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-07T09:30:20
1 posts
🚨 CVE-2026-1074: High-severity stored XSS in WP App Bar plugin (all versions). No auth needed — attackers inject scripts via 'app-bar-features' & compromise admin sessions. Patch or disable urgently! https://radar.offseq.com/threat/cve-2026-1074-cwe-79-improper-neutralization-of-in-ed135d09 #OffSeq #WordPress #XSS #Vuln
##updated 2026-03-07T06:31:23
1 posts
🟠 CVE-2025-8899 - High (8.8)
The Paid Videochat Turnkey Site – HTML5 PPV Live Webcams plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.3.20. This is due to videowhisper_register_form() function not restricting user roles tha...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-8899/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-07T03:30:29
3 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
⚠️ CRITICAL: CVE-2026-25070 in XikeStor SKS8310-8X allows unauthenticated remote OS command injection (CVSS 9.3). No patch yet. Restrict access, segment networks, and monitor endpoints. Full root risk! https://radar.offseq.com/threat/cve-2026-25070-cwe-78-improper-neutralization-of-s-f0039eef #OffSeq #Vulnerability #NetworkSecurity
##updated 2026-03-07T03:30:27
1 posts
🟠 CVE-2026-2020 - High (7.5)
The JS Archive List plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 6.1.7 via the 'included' shortcode attribute. This is due to the deserialization of untrusted input supplied via the 'included' pa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2020/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-07T02:33:41
1 posts
🟠 CVE-2025-15602 - High (8.8)
Snipe-IT versions prior to 8.3.7 contain sensitive user attributes related to account privileges that are insufficiently protected against mass assignment. An authenticated, low-privileged user can craft a malicious API request to modify restricte...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15602/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T23:00:44
1 posts
🔴 CVE-2025-70948 - Critical (9.3)
A host header injection vulnerability in the mailer component of @perfood/couch-auth v0.26.0 allows attackers to obtain reset tokens and execute an account takeover via spoofing the HTTP Host header.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70948/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T22:52:11
1 posts
🟠 CVE-2026-30223 - High (8.8)
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.1, when JWT authentication is configured using either "authJwtPubKeyPath" (local RSA public key) or "authJwtHmacSecret" (HMAC secret), the configured...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30223/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T22:43:59
1 posts
🟠 CVE-2026-29087 - High (7.5)
@Hono/node-server allows running the Hono application on Node.js. Prior to version 1.19.10, when using @Hono/node-server's static file serving together with route-based middleware protections (e.g. protecting /admin/*), inconsistent URL decoding c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29087/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T22:43:40
1 posts
🟠 CVE-2026-26017 - High (7.7)
CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26017/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T22:10:52
1 posts
🟠 CVE-2026-29064 - High (8.2)
Zarf is an Airgap Native Packager Manager for Kubernetes. From version 0.54.0 to before version 0.73.1, a path traversal vulnerability in archive extraction allows a specifically crafted Zarf package to create symlinks pointing outside the destina...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29064/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T21:56:51
2 posts
Critical Zero-Click Command Injection in AVideo Platform Allows Stream Hijacking
AVideo version 6.0 contains a critical zero-click command injection vulnerability (CVE-2026-29058) that allows unauthenticated attackers to execute arbitrary OS commands and hijack video streams.
**If you are using AVideo platform this is urgent and important. Patch ASAP to version 7.0, because your server will be attacked. Until you update today, use a web application firewall or reverse proxy to block access to the getImage.php component.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-zero-click-command-injection-in-avideo-platform-allows-stream-hijacking-w-3-3-3-s/gD2P6Ple2L
Critical Zero-Click Command Injection in AVideo Platform Allows Stream Hijacking
AVideo version 6.0 contains a critical zero-click command injection vulnerability (CVE-2026-29058) that allows unauthenticated attackers to execute arbitrary OS commands and hijack video streams.
**If you are using AVideo platform this is urgent and important. Patch ASAP to version 7.0, because your server will be attacked. Until you update today, use a web application firewall or reverse proxy to block access to the getImage.php component.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-zero-click-command-injection-in-avideo-platform-allows-stream-hijacking-w-3-3-3-s/gD2P6Ple2L
updated 2026-03-06T21:05:36.243000
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-06T18:31:19
1 posts
🟠 CVE-2026-20882 - High (7.5)
The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20882/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T18:31:19
2 posts
🔴 CVE-2026-26288 - Critical (9.4)
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a kno...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26288/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-26288 in Everon api.everon.io (all versions) allows unauthenticated WebSocket access — attackers can impersonate charging stations & control backend data. Restrict access & implement auth now! https://radar.offseq.com/threat/cve-2026-26288-cwe-306-in-everon-apieveronio-4db274ef #OffSeq #Cybersecurity #EVCharging #CVE
##updated 2026-03-06T18:31:19
1 posts
🟠 CVE-2026-24696 - High (7.5)
The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24696/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T17:37:58.670000
1 posts
🔴 CVE-2025-70230 - Critical (9.8)
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDDNS.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70230/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T15:41:57
1 posts
1 repos
Critical Authentication Bypass in pac4j-jwt Library Allows Full User Impersonation
A critical authentication bypass vulnerability (CVE-2026-29000) in the pac4j-jwt Java library allows attackers to impersonate any user by forging encrypted but unsigned tokens. The flaw is caused by a logic error in JwtAuthenticator that skips signature verification when a token is wrapped in an RSA-encrypted envelope.
**If your Java applications use pac4j-jwt, this is urgent! Update to the latest patched versions immediately because there is no practical way to hide your app from the internet, and the exploit is trivial - it will be exploited in a matter of days.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-in-pac4j-jwt-library-allows-full-user-impersonation-f-h-1-h-f/gD2P6Ple2L
updated 2026-03-06T15:31:36
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-06T15:31:36
2 posts
🔴 CVE-2026-26051 - Critical (9.4)
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a kno...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26051/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-26051 (CRITICAL, CVSS 9.4) in Mobiliti e-mobi.hu: Unauthenticated OCPP WebSocket endpoints allow charging station impersonation + backend manipulation. Enforce strong auth & monitor now. https://radar.offseq.com/threat/cve-2026-26051-cwe-306-in-mobiliti-e-mobihu-70ec4ea6 #OffSeq #CVE202626051 #EVsecurity
##updated 2026-03-06T15:31:36
1 posts
🟠 CVE-2026-2754 - High (7.5)
Navtor NavBox exposes sensitive configuration and operational data due to missing authentication on HTTP API endpoints. An unauthenticated remote attacker with network access to the device can execute HTTP GET requests to TCP port 8080 to retrieve...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2754/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T15:31:36
1 posts
🟠 CVE-2026-2753 - High (7.5)
An Absolute Path Traversal vulnerability exists in Navtor NavBox. The application exposes an HTTP service that fails to properly sanitize user-supplied path input. Unauthenticated remote attackers can exploit this issue by submitting requests cont...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2753/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T15:31:35
1 posts
🟠 New security advisory:
CVE-2018-25166 affects multiple systems.
• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2018-25166
updated 2026-03-06T12:31:37
1 posts
🟠 CVE-2025-70614 - High (8.1)
OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2 contains a broken access control vulnerability in the web-based control panel allowing authenticated low-privileged attackers to gain to access to arbitrary SMS messages via a crafted ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70614/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T12:31:36
1 posts
🔴 CVE-2025-13476 - Critical (9.8)
Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13476/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T12:31:36
1 posts
🔴 CVE-2025-70231 - Critical (9.8)
D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When processing POST requests related to verification codes in /goform/formLogin, it enters /goform/getAuthCode but fails to filter the value of the FILECODE parameter, resulting...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70231/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T12:31:36
1 posts
🔴 CVE-2025-70229 - Critical (9.8)
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSchedule.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70229/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T12:31:36
1 posts
🟠 CVE-2025-70616 - High (7.8)
A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys kernel driver (version 1.2.0.0) in the IOCTL handler for code 0x80102058. The vulnerability is caused by missing bounds checking on the user-controlled Options paramet...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70616/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T12:31:36
1 posts
1 repos
🟠 CVE-2026-26418 - High (7.5)
Missing authentication and authorization in the web API of Tata Consultancy Services Cognix Recon Client v3.0 allows remote attackers to access application functionality without restriction via the network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26418/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T12:30:31
1 posts
🔴 CVE-2025-70233 - Critical (9.8)
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetEnableWizard.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70233/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T12:30:31
1 posts
🔴 CVE-2025-70232 - Critical (9.8)
Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetMACFilter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-70232/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T10:16:22.163000
1 posts
1 repos
🟠 CVE-2026-26417 - High (8.1)
A broken access control vulnerability in the password reset functionality of Tata Consultancy Services Cognix Recon Client v3.0 allows authenticated users to reset passwords of arbitrary user accounts via crafted requests.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26417/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T10:16:21.983000
1 posts
1 repos
🟠 CVE-2026-26416 - High (8.8)
An authorization bypass vulnerability in Tata Consultancy Services Cognix Recon Client v3.0 allows authenticated users to escalate privileges across role boundaries via crafted requests.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26416/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T10:16:20.417000
1 posts
🟠 CVE-2025-45691 - High (7.5)
An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter wh...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-45691/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T09:31:41
1 posts
🚨 CRITICAL: CVE-2026-2330 in SICK Lector85x lets remote, unauthenticated attackers modify device configs via the CROWN REST interface. Patch or restrict access now to prevent OT compromise. https://radar.offseq.com/threat/cve-2026-2330-cwe-552-files-or-directories-accessi-493bd9c6 #OffSeq #ICS #Vulnerability #Infosec
##updated 2026-03-06T09:31:41
2 posts
🔴 CRITICAL: CVE-2026-2331 in SICK Lector85x v2.6.0 allows unauthenticated HTTP access to sensitive files & Lua code execution. No patch yet — segment networks & restrict HTTP access. Monitor for abuse! https://radar.offseq.com/threat/cve-2026-2331-cwe-552-files-or-directories-accessi-5e67b9ed #OffSeq #ICS #Vuln #OTSecurity
##🔴 CVE-2026-2331 - Critical (9.8)
An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTT...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2331/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:05:25
1 posts
🔴 CVE-2026-28464 - Critical (9.8)
OpenClaw versions prior to 2026.2.12 use non-constant-time string comparison for hook token validation, allowing attackers to infer tokens through timing measurements. Remote attackers with network access to the hooks endpoint can exploit timing s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28464/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:05:00
1 posts
🟠 CVE-2026-28479 - High (7.5)
OpenClaw versions prior to 2026.2.15 use SHA-1 to hash sandbox identifier cache keys for Docker and browser sandbox configurations, which is deprecated and vulnerable to collision attacks. An attacker can exploit SHA-1 collisions to cause cache po...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28479/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:04:45
1 posts
🟠 CVE-2026-28462 - High (7.5)
OpenClaw versions prior to 2026.2.13 contain a vulnerability in the browser control API in which it accepts user-supplied output paths for trace and download files without consistently constraining writes to temporary directories. Attackers with A...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28462/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:04:20
1 posts
🟠 CVE-2026-29610 - High (7.8)
OpenClaw versions prior to 2026.2.14 contain a command hijacking vulnerability that allows attackers to execute unintended binaries by manipulating PATH environment variables through node-host execution or project-local bootstrapping. Attackers wi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29610/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:04:05
1 posts
🟠 CVE-2026-28476 - High (8.3)
OpenClaw versions prior to 2026.2.14 contain a server-side request forgery vulnerability in the optional Tlon Urbit extension that accepts user-provided base URLs for authentication without proper validation. Attackers who can influence the config...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28476/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:02:55
1 posts
🟠 CVE-2026-28463 - High (8.4)
OpenClaw exec-approvals allowlist validation checks pre-expansion argv tokens but execution uses real shell expansion, allowing safe bins like head, tail, or grep to read arbitrary local files via glob patterns or environment variables. Authorized...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28463/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:02:34
1 posts
🔴 CVE-2026-28470 - Critical (9.8)
OpenClaw versions prior to 2026.2.2 contain an exec approvals (must be enabled) allowlist bypass vulnerability that allows attackers to execute arbitrary commands by injecting command substitution syntax. Attackers can bypass the allowlist protect...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28470/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:02:29
1 posts
🟠 CVE-2026-28458 - High (7.5)
OpenClaw version 2026.1.20 prior to 2026.2.1 contains a vulnerability in the Browser Relay (extension must be installed and enabled) /cdp WebSocket endpoint in which it does not require authentication tokens, allowing websites to connect via loopb...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28458/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:02:20
1 posts
🔴 CVE-2026-28473 - Critical (9.8)
OpenClaw versions prior to 2026.2.2 contain an authorization bypass vulnerability where clients with operator.write scope can approve or deny exec approval requests by sending the /approve chat command. The /approve command path invokes exec.appro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28473/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:01:24
1 posts
🟠 CVE-2026-28465 - High (7.5)
OpenClaw's voice-call plugin versions before 2026.2.3 contain an improper authentication vulnerability in webhook verification that allows remote attackers to bypass verification by supplying untrusted forwarded headers. Attackers can spoof webhoo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T01:00:09
1 posts
🟠 CVE-2026-28393 - High (7.5)
OpenClaw versions 2.0.0-beta3 prior to 2026.2.14 contain a path traversal vulnerability in hook transform module loading that allows arbitrary JavaScript execution. The hooks.mappings[].transform.module parameter accepts absolute paths and travers...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28393/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T00:58:49
2 posts
🔴 CVE-2026-28454 - Critical (9.8)
OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets in Telegram webhook mode (must be enabled), allowing unauthenticated HTTP POST requests to the webhook endpoint that trust attacker-controlled JSON payloads. Remote attackers can...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28454/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-28454 - Critical (9.8)
OpenClaw versions prior to 2026.2.2 fail to validate webhook secrets in Telegram webhook mode (must be enabled), allowing unauthenticated HTTP POST requests to the webhook endpoint that trust attacker-controlled JSON payloads. Remote attackers can...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28454/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T00:31:41
1 posts
🔴 CVE-2026-21536 - Critical (9.8)
Microsoft Devices Pricing Program Remote Code Execution Vulnerability
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-21536/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T00:31:41
1 posts
🟠 CVE-2026-26125 - High (8.6)
Payment Orchestrator Service Elevation of Privilege Vulnerability
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26125/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T00:31:41
1 posts
🟠 CVE-2026-27778 - High (7.5)
The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27778/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-06T00:31:41
1 posts
🔴 CVE-2026-22552 - Critical (9.4)
WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a kno...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22552/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T22:50:22
1 posts
🔴 CVE-2026-29188 - Critical (9.1)
File Browser provides a file managing interface within a specified directory and it can be used to upload, delete, preview, rename and edit files. Prior to version 2.61.1, a broken access control vulnerability in the TUS protocol DELETE endpoint a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29188/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T22:49:38
1 posts
🟠 CVE-2026-28790 - High (7.5)
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.11.0, OliveTin allows an unauthenticated guest to terminate running actions through KillAction even when authRequireGuestsToLogin: true is enabled. Gues...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28790/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T22:49:36
1 posts
🟠 CVE-2026-28789 - High (7.5)
OliveTin gives access to predefined shell commands from a web interface. Prior to version 3000.10.3, an unauthenticated denial-of-service vulnerability exists in OliveTin’s OAuth2 login flow. Concurrent requests to /oauth/login can trigger unsyn...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28789/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T22:28:33
1 posts
🔴 CVE-2026-25921 - Critical (9.3)
Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwritable LFS object across different repos leads to supply-chain attack, all LFS objects are vulnerable to be maliciously overwritten by malicious attackers. This issue h...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25921/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T22:00:37
1 posts
🟠 CVE-2026-29611 - High (7.5)
OpenClaw versions prior to 2026.2.14 contain a local file inclusion vulnerability in BlueBubbles extension (must be installed and enabled) media path handling that allows attackers to read arbitrary files from the local filesystem. The sendBlueBub...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29611/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:52:02
1 posts
🔴 CVE-2026-28474 - Critical (9.8)
OpenClaw's Nextcloud Talk plugin versions prior to 2026.2.6 accept equality matching on the mutable actor.name display name field for allowlist validation, allowing attackers to bypass DM and room allowlists. An attacker can change their Nextcloud...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28474/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:50:00
2 posts
🟠 CVE-2026-28468 - High (7.8)
OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28468/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28468 - High (7.8)
OpenClaw versions 2026.1.29-beta.1 prior to 2026.2.14 contain a vulnerability in the sandbox browser bridge server in which it accepts requests without requiring gateway authentication, allowing local attackers to access browser control endpoints....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28468/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:43:07
1 posts
🔴 CVE-2026-28446 - Critical (9.8)
OpenClaw versions prior to 2026.2.1 with the voice-call extension installed and enabled contain an authentication bypass vulnerability in inbound allowlist policy validation that accepts empty caller IDs and uses suffix-based matching instead of s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28446/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:40:43
1 posts
🔴 CVE-2026-28391 - Critical (9.8)
OpenClaw versions prior to 2026.2.2 fail to properly validate Windows cmd.exe metacharacters in allowlist-gated exec requests, allowing attackers to bypass command approval restrictions. Remote attackers can craft command strings with shell metach...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28391/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T21:31:00
1 posts
🔴 CVE-2026-0848 - Critical (10)
NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper input validation in the StanfordSegmenter module. The module dynamically loads external Java .jar files without verification or sandboxing. An attacker can supply ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-0848/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T19:38:33.877000
7 posts
Critical Nginx UI Vulnerability Exposes Server Backups and Sensitive Data
https://thecyberexpress.com/cve-2026-27944-nginx-ui-backup-vulnerability/?utm_source=flipboard&utm_medium=activitypub
Posted into Cybersecurity Today @cybersecurity-today-rhudaur
##Critical Nginx UI Vulnerability Exposes Server Backups and Sensitive Data
A newly disclosed vulnerability in Nginx UI, tracked as CVE-2026-27944, has raised major security concerns after researchers confirmed that...
🔗️ [Thecyberexpress] https://link.is.it/HfceZC
##Critical Nginx UI Flaw Allows Unauthenticated Backup Theft and Decryption
Nginx UI version 2.3.3 patches a critical vulnerability (CVE-2026-27944) that allows unauthenticated attackers to download and decrypt full server backups. The flaw exposes sensitive data including SSL private keys, admin credentials, and server configurations via an unprotected API endpoint.
**If you are using Nginx UI, first make sure they are isolated from the internet. Then patch to version 2.3.3 immediately because the exploit is trivial - especially if your Nginix UI is exposed to the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-nginx-ui-flaw-allows-unauthenticated-backup-theft-and-decryption-l-t-k-6-p/gD2P6Ple2L
Critical Security Alert: CVE-2026-27944 Exposes Nginx UI Backups and Encryption Keys
Introduction: A Severe Flaw in a Widely Used Web Server Management Tool A newly disclosed security vulnerability has raised serious concerns across the cybersecurity community. The flaw, identified as CVE-2026-27944, affects Nginx UI, a popular web-based dashboard used to manage and configure Nginx servers. With a CVSS severity score of 9.8, the issue is classified as critical and…
##Critical Nginx UI Vulnerability Exposes Server Backups and Sensitive Data
https://thecyberexpress.com/cve-2026-27944-nginx-ui-backup-vulnerability/?utm_source=flipboard&utm_medium=activitypub
Posted into Cybersecurity Today @cybersecurity-today-rhudaur
##Critical Nginx UI Vulnerability Exposes Server Backups and Sensitive Data
A newly disclosed vulnerability in Nginx UI, tracked as CVE-2026-27944, has raised major security concerns after researchers confirmed that...
🔗️ [Thecyberexpress] https://link.is.it/HfceZC
##Critical Nginx UI Flaw Allows Unauthenticated Backup Theft and Decryption
Nginx UI version 2.3.3 patches a critical vulnerability (CVE-2026-27944) that allows unauthenticated attackers to download and decrypt full server backups. The flaw exposes sensitive data including SSL private keys, admin credentials, and server configurations via an unprotected API endpoint.
**If you are using Nginx UI, first make sure they are isolated from the internet. Then patch to version 2.3.3 immediately because the exploit is trivial - especially if your Nginix UI is exposed to the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-nginx-ui-flaw-allows-unauthenticated-backup-theft-and-decryption-l-t-k-6-p/gD2P6Ple2L
updated 2026-03-05T19:38:33.877000
1 posts
🔴 CVE-2026-24457 - Critical (9.1)
An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read arbitrary files from a MQ Broker's server. A full exploitation could read unauthorized files of the OpenMQ’s host OS. In some scenarios RCE could be achieved.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24457/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-05T18:13:33.993000
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-04T21:14:09
2 posts
1 repos
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-03T21:52:29.877000
1 posts
1 repos
WordPress – CVE-2026-1492 : une faille dans un plugin permet de devenir admin très facilement https://www.it-connect.fr/wordpress-cve-2026-1492-une-faille-dans-un-plugin-permet-de-devenir-admin-tres-facilement/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Wordpress
##updated 2026-03-03T15:55:11.547000
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-03-02T18:31:44
2 posts
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
updated 2026-02-25T18:31:45
2 posts
6 repos
https://github.com/abrahamsurf/sdwan-scanner-CVE-2026-20127
https://github.com/zerozenxlabs/CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE
https://github.com/bluefalconink/cisa-ed-26-03-tracker
https://github.com/yonathanpy/CVE-2026-20127-Cisco-SD-WAN-Preauth-RCE
Critical Cisco Catalyst SD-WAN vulnerability (CVE-2026-20127, CVSS 10.0) is now under widespread exploitation.
Attackers are deploying webshells after the flaw moved from targeted zero-day use to global opportunistic campaigns.
https://www.technadu.com/cisco-catalyst-sd-wan-flaw-is-now-fcing-widespread-exploitation/622887/
Have your systems been patched?
##Critical Cisco Catalyst SD-WAN vulnerability (CVE-2026-20127, CVSS 10.0) is now under widespread exploitation.
Attackers are deploying webshells after the flaw moved from targeted zero-day use to global opportunistic campaigns.
https://www.technadu.com/cisco-catalyst-sd-wan-flaw-is-now-fcing-widespread-exploitation/622887/
Have your systems been patched?
##updated 2026-02-13T20:45:32.090000
1 posts
1 repos
📢 TP-Link Tapo C260 : divulgation de fichiers, RCE invité et élévation de privilèges (CVE-2026-0651 à -0653)
📝 Sur un billet de blog technique daté du 6 mars 2026, l’auteur décrit le processus ayant mené à l’...
📖 cyberveille : https://cyberveille.ch/posts/2026-03-08-tp-link-tapo-c260-divulgation-de-fichiers-rce-invite-et-elevation-de-privileges-cve-2026-0651-a-0653/
🌐 source : https://spaceraccoon.dev/getting-shell-tapo-c260-webcam/
#CVE_2026_0651_0652_0653 #IOC #Cyberveille
updated 2026-02-13T17:41:02.987000
2 posts
7 repos
https://github.com/ethiack/moltbot-1click-rce
https://github.com/Ckokoski/moatbot-security
https://github.com/EQSTLab/CVE-2026-25253
https://github.com/Joseph19820124/openclaw-vuln-report
https://github.com/FrigateCaptain/openclaw_vulnerabilities_and_solutions
🚨 SECURITY ALERT: 42,089 OpenClaw AI instances exposed with critical RCE vulnerability (CVE-2026-25253, CVSS 8.8).
93% lack authentication. 1.5M API tokens compromised. One-click shell access via malicious websites.
Full analysis + protection strategies:
https://dev.to/tiamatenity/your-ai-assistant-is-leaking-everything-42k-exposed-instances-critical-cves-and-how-to-protect-yourself
The OpenClaw AI security crisis:
42,000+ exposed instances, 93% auth bypass
CVE-2026-25253 (CVSS 8.8): one malicious link = shell RCE via WebSocket hijack
1.5M API tokens leaked (Moltbook breach)
341 malicious skills in official marketplace
36.82% flaw rate across all ClawHub skills
New coined terms:
→ One-Click Compromise
→ The Skill Poisoning Problem
→ The Sovereign AI Paradox
Sovereignty ≠ security.
##updated 2026-01-07T16:57:56.077000
1 posts
A Race Within A Race: Exploiting CVE-2025-38617 in Linux Packet Sockets https://blog.calif.io/p/a-race-within-a-race-exploiting-cve
##updated 2025-02-13T18:33:03
1 posts
9 repos
https://github.com/dbrugman/CVE-2023-38545-POC
https://github.com/nphuang/NS-Project-2024-Spring
https://github.com/vanigori/CVE-2023-38545-sample
https://github.com/d0rb/CVE-2023-38545
https://github.com/bcdannyboy/CVE-2023-38545
https://github.com/UTsweetyfish/CVE-2023-38545
https://github.com/Yang-Shun-Yu/CVE-2023-38545
https://github.com/imfht/CVE-2023-38545
https://github.com/fatmo666/CVE-2023-38545-libcurl-SOCKS5-heap-buffer-overflow
@spinnyspinlock we've only had two severity HIGH CVEs in #curl within the last five years, both of them were C mistakes: https://curl.se/docs/CVE-2023-38545.html and https://curl.se/docs/CVE-2021-22901.html
##updated 2024-03-27T15:30:34
2 posts
@bagder CVE-2021-22901 was exactly the kind of interesting vulnerability I wanted to see, thank you! well done on the good security track record too :)
##@spinnyspinlock we've only had two severity HIGH CVEs in #curl within the last five years, both of them were C mistakes: https://curl.se/docs/CVE-2023-38545.html and https://curl.se/docs/CVE-2021-22901.html
##📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1428
Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193
Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23
Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14
Top EPSS Score:
- CVE-2026-2256 - 1.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2256)
- CVE-2026-24105 - 1.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24105)
- CVE-2026-25070 - 1.03 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-25070)
- CVE-2026-26478 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-26478)
- CVE-2026-24101 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24101)
- CVE-2026-24107 - 0.86 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24107)
- CVE-2026-30227 - 0.80 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-30227)
- CVE-2024-47886 - 0.75 % (https://secdb.nttzen.cloud/cve/detail/CVE-2024-47886)
- CVE-2025-14675 - 0.68 % (https://secdb.nttzen.cloud/cve/detail/CVE-2025-14675)
- CVE-2018-25181 - 0.57 % (https://secdb.nttzen.cloud/cve/detail/CVE-2018-25181)
📢 FreeScout: Zero‑click RCE non authentifié (CVE‑2026‑28289) corrigé en v1.8.207
📝 Source: OX Security (OX Research).
📖 cyberveille : https://cyberveille.ch/posts/2026-03-08-freescout-zero-click-rce-non-authentifie-cve-2026-28289-corrige-en-v1-8-207/
🌐 source : https://www.ox.security/blog/freescout-rce-cve-2026-28289/
#CVE_2026_28289 #FreeScout #Cyberveille
🟠 CVE-2026-29779 - High (7.5)
UptimeFlare is a serverless uptime monitoring & status page solution, powered by Cloudflare Workers. Prior to commit 377a596, configuration file uptime.config.ts exports both pageConfig (safe for client use) and workerConfig (server-only, contains...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29779/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28678 - High (8.1)
DSA Study Hub is an interactive educational web application. Prior to commit d527fba, the user authentication system in server/routes/auth.js was found to be vulnerable to Insufficiently Protected Credentials. Authentication tokens (JWTs) were sto...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28678/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28284 - High (8.8)
FreePBX is an open source IP PBX. Prior to versions 16.0.10 and 17.0.5, the FreePBX logfiles module contains several authenticated SQL injection vulnerabilities. This issue has been patched in versions 16.0.10 and 17.0.5.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28284/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28210 - High (8.8)
FreePBX is an open source IP PBX. Prior to versions 16.0.49 and 17.0.7, FreePBX module cdr (Call Data Record) is vulnerable to SQL query injection. This issue has been patched in versions 16.0.49 and 17.0.7.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28210/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28287 - High (8.8)
FreePBX is an open source IP PBX. From versions 16.0.17.2 to before 16.0.20 and from version 17.0.2.4 to before 17.0.5, multiple command injection vulnerabilities exist in the recordings module. This issue has been patched in versions 16.0.20 and ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28287/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28405 - High (8)
MarkUs is a web application for the submission and grading of student assignments. Prior to version 2.9.1, the courses//assignments//submissions/html_content route reads the contents of a student-submitted file and renders them without sanitizatio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28405/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28442 - High (8.5)
ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.2-beta3, users are restricted from deleting internal system files or folders through the application interface. However, when interacting...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28442/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-29089 - High (8.8)
TimescaleDB is a time-series database for high-performance real-time analytics packaged as a Postgres extension. From version 2.23.0 to 2.25.1, PostgreSQL uses the search_path setting to locate unqualified database objects (tables, functions, oper...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29089/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-30840 - High (8.8)
Wallos is an open-source, self-hostable personal subscription tracker. Prior to version 4.6.2, there is a server-side request forgery vulnerability in notification testers. This issue has been patched in version 4.6.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30840/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##We (at Tachyon) found an auth bypass in MLflow https://tachyon.so/blog/cve-2025-14297-mlflow-authorization-bypass
##🟠 CVE-2026-28485 - High (8.4)
OpenClaw versions 2026.1.5 prior to 2026.2.12 fail to enforce mandatory authentication on the /agent/act browser-control HTTP route, allowing unauthorized local callers to invoke privileged operations. Remote attackers on the local network or loca...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28485/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-28484 - Critical (9.8)
OpenClaw versions prior to 2026.2.15 contain an option injection vulnerability in the git-hooks/pre-commit hook that allows attackers to stage ignored files by creating maliciously-named files beginning with dashes. The hook fails to use a -- sepa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28484/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-59543 - Critical (9)
Chamilo is a learning management system. Prior to version 1.11.34, there is a stored cross-site scripting (XSS) vulnerability. By injecting malicious JavaScript into the course description field, an attacker with a low-privileged account (e.g., tr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59543/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-59543 - Critical (9)
Chamilo is a learning management system. Prior to version 1.11.34, there is a stored cross-site scripting (XSS) vulnerability. By injecting malicious JavaScript into the course description field, an attacker with a low-privileged account (e.g., tr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59543/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##