## Updated at UTC 2026-03-13T17:31:00.482402

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-32242 7.4 0.08% 2 0 2026-03-13T16:57:55.797000 Parse Server is an open source backend that can be deployed to any infrastructur
CVE-2026-32304 9.8 0.08% 2 0 2026-03-13T16:10:32 ## Summary The `create_function(args, code)` function passes both parameters di
CVE-2026-32140 8.8 0.49% 2 0 2026-03-13T16:07:30.057000 Dataease is an open source data visualization analysis tool. Prior to 2.10.20, B
CVE-2026-32137 8.8 0.05% 2 0 2026-03-13T16:03:02.080000 Dataease is an open source data visualization analysis tool. Prior to 2.10.20, T
CVE-2026-26793 9.8 0.23% 1 0 2026-03-13T16:02:22.993000 GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulner
CVE-2026-3920 8.8 0.06% 1 0 2026-03-13T15:43:27.333000 Out of bounds memory access in WebML in Google Chrome prior to 146.0.7680.71 all
CVE-2026-3914 8.8 0.06% 2 0 2026-03-13T15:42:54.950000 Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remo
CVE-2026-3913 8.8 0.06% 4 0 2026-03-13T15:42:49.310000 Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a
CVE-2026-32141 7.5 0.04% 1 0 2026-03-13T15:40:44 ## Summary flatted's `parse()` function uses a recursive `revive()` phase to re
CVE-2026-32248 None 0.07% 2 0 2026-03-13T13:36:16 ### Impact An unauthenticated attacker can take over any user account that was
CVE-2026-32247 8.1 0.03% 1 0 2026-03-13T13:36:06 ### Summary Graphiti versions before `0.28.2` contained a Cypher injection vuln
CVE-2026-32231 8.2 0.02% 1 0 2026-03-13T13:35:56 ### Summary The generic webhook channel trusts caller-supplied identity fields (
CVE-2025-14513 7.5 0.02% 1 0 2026-03-13T12:34:46.100000 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11
CVE-2025-13929 7.5 0.03% 1 0 2026-03-13T12:33:51.213000 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.0
CVE-2026-3611 10.0 0.13% 4 0 2026-03-12T21:35:01 The Honeywell IQ4x building management controller, exposes its full web-based HM
CVE-2026-3918 8.8 0.06% 1 0 2026-03-12T21:34:46 Use after free in WebMCP in Google Chrome prior to 146.0.7680.71 allowed a remot
CVE-2026-3926 8.8 0.07% 1 0 2026-03-12T21:34:46 Out of bounds read in V8 in Google Chrome prior to 146.0.7680.71 allowed a remot
CVE-2025-54820 8.1 0.04% 1 0 2026-03-12T21:17:31.313000 A Stack-based Buffer Overflow vulnerability [CWE-121] vulnerability in Fortinet
CVE-2026-2229 7.5 0.07% 1 0 2026-03-12T21:16:25.573000 ImpactThe undici WebSocket client is vulnerable to a denial-of-service attack du
CVE-2026-32062 7.5 0.09% 1 0 2026-03-12T21:08:35.500000 OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call version
CVE-2026-32136 9.8 0.17% 3 0 2026-03-12T21:08:22.643000 AdGuard Home is a network-wide software for blocking ads and tracking. Prior to
CVE-2026-30903 9.6 0.05% 2 0 2026-03-12T21:08:22.643000 External Control of File Name or Path in the Mail feature of Zoom Workplace for
CVE-2026-20163 7.2 0.05% 2 0 2026-03-12T21:08:22.643000 In Splunk Enterprise versions below 10.2.0, 10.0.4, 9.4.9, and 9.3.10, and Splun
CVE-2026-20040 8.8 0.03% 3 0 2026-03-12T21:08:22.643000 A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated
CVE-2026-31896 9.8 0.03% 1 0 2026-03-12T21:08:22.643000 WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, a cr
CVE-2026-32096 9.3 0.04% 1 0 2026-03-12T21:08:22.643000 Plunk is an open-source email platform built on top of AWS SES. Prior to 0.7.0,
CVE-2026-31881 7.7 0.09% 1 0 2026-03-12T21:08:22.643000 Runtipi is a personal homeserver orchestrator. Prior to 4.8.0, an unauthenticate
CVE-2026-31866 7.5 0.06% 1 0 2026-03-12T21:08:22.643000 flagd is a feature flag daemon with a Unix philosophy. Prior to 0.14.2, flagd ex
CVE-2026-31839 8.2 0.01% 1 0 2026-03-12T21:08:22.643000 Striae is a firearms examiner's comparison companion. A high-severity integrity
CVE-2026-20116 6.1 0.04% 1 0 2026-03-12T21:08:22.643000 A vulnerability in the web-based management interface of  Cisco Finesse, Ci
CVE-2026-27897 10.0 0.29% 2 0 2026-03-12T21:08:22.643000 Vociferous provides cross-platform, offline speech-to-text with local AI refinem
CVE-2026-30900 7.8 0.01% 1 0 2026-03-12T21:08:22.643000 Improper Check of minimum version in update functionality of certain Zoom Client
CVE-2026-1717 5.5 0.02% 1 0 2026-03-12T21:08:22.643000 An input validation vulnerability was reported in the LenovoProductivitySystemAd
CVE-2019-25482 8.2 0.07% 1 0 2026-03-12T21:07:53.427000 Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnera
CVE-2026-32251 0 0.04% 2 0 2026-03-12T21:07:53.427000 Tolgee is an open-source localization platform. Prior to 3.166.3, the XML parser
CVE-2026-3970 8.8 0.05% 1 0 2026-03-12T21:07:53.427000 A flaw has been found in Tenda i3 1.0.0.6(2204). Affected is the function formwr
CVE-2026-3978 8.8 0.04% 2 0 2026-03-12T21:07:53.427000 A vulnerability was detected in D-Link DIR-513 1.10. The impacted element is an
CVE-2026-21668 8.8 0.04% 4 0 2026-03-12T21:07:53.427000 A vulnerability allowing an authenticated domain user to bypass restrictions and
CVE-2026-4008 8.8 0.09% 2 0 2026-03-12T21:07:53.427000 A flaw has been found in Tenda W3 1.0.0.3(2204). This issue affects some unknown
CVE-2026-32138 8.2 0.06% 1 0 2026-03-12T21:07:53.427000 NEXULEAN is a cybersecurity portfolio & service platform for an Ethical Hacker,
CVE-2026-32246 8.5 0.05% 1 0 2026-03-12T21:07:53.427000 Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC
CVE-2026-28793 8.4 0.02% 1 0 2026-03-12T21:07:53.427000 Tina is a headless content management system. Prior to 2.1.8, the TinaCMS CLI de
CVE-2026-28792 9.6 0.27% 1 0 2026-03-12T21:07:53.427000 Tina is a headless content management system. Prior to 2.1.8 , the TinaCMS CLI d
CVE-2026-21708 9.9 0.54% 1 0 2026-03-12T21:07:53.427000 A vulnerability allowing a Backup Viewer to perform remote code execution (RCE)
CVE-2026-3060 9.8 0.55% 1 0 2026-03-12T21:07:53.427000 SGLang' encoder parallel disaggregation system is vulnerable to unauthenticated
CVE-2026-21667 9.9 0.37% 1 0 2026-03-12T21:07:53.427000 A vulnerability allowing an authenticated domain user to perform remote code exe
CVE-2026-4041 8.8 0.05% 1 0 2026-03-12T21:07:53.427000 A security flaw has been discovered in Tenda i12 1.0.0.6(2204). Impacted is the
CVE-2026-26127 7.5 0.04% 2 0 2026-03-12T20:32:34 # Microsoft Security Advisory CVE-2026-26127 – .NET Denial of Service Vulnerabil
CVE-2026-28356 7.5 0.54% 2 0 2026-03-12T18:32:23 ## Summary The `parse_options_header()` function in `multipart.py` uses a regul
CVE-2026-3931 8.8 0.06% 1 0 2026-03-12T18:31:34 Heap buffer overflow in Skia in Google Chrome prior to 146.0.7680.71 allowed a r
CVE-2026-3936 8.8 0.06% 1 0 2026-03-12T18:31:33 Use after free in WebView in Google Chrome on Android prior to 146.0.7680.71 all
CVE-2026-21672 8.8 0.05% 1 0 2026-03-12T18:30:38 A vulnerability allowing local privilege escalation on Windows-based Veeam Backu
CVE-2026-4043 8.8 0.05% 1 0 2026-03-12T18:30:38 A security vulnerability has been detected in Tenda i12 1.0.0.6(2204). The impac
CVE-2026-21666 10.0 0.37% 1 0 2026-03-12T18:30:30 A vulnerability allowing an authenticated domain user to perform remote code exe
CVE-2026-3059 9.8 0.54% 1 0 2026-03-12T17:38:59 SGLang's multimodal generation module is vulnerable to unauthenticated remote co
CVE-2026-3923 8.8 0.06% 2 0 2026-03-12T15:31:28 Use after free in WebMIDI in Google Chrome prior to 146.0.7680.71 allowed a remo
CVE-2026-3922 8.8 0.07% 1 0 2026-03-12T15:31:28 Use after free in MediaStream in Google Chrome prior to 146.0.7680.71 allowed a
CVE-2026-3921 8.8 0.07% 1 0 2026-03-12T15:31:28 Use after free in TextEncoding in Google Chrome prior to 146.0.7680.71 allowed a
CVE-2026-3919 8.8 0.02% 1 0 2026-03-12T15:31:27 Use after free in Extensions in Google Chrome prior to 146.0.7680.71 allowed an
CVE-2026-4042 8.8 0.05% 1 0 2026-03-12T15:30:32 A weakness has been identified in Tenda i12 1.0.0.6(2204). The affected element
CVE-2026-21670 7.7 0.03% 3 0 2026-03-12T15:30:31 A vulnerability allowing a low-privileged user to extract saved SSH credentials.
CVE-2026-21671 9.1 0.21% 4 0 2026-03-12T15:30:26 A vulnerability allowing an authenticated user with the Backup Administrator rol
CVE-2026-21669 10.0 0.21% 1 0 2026-03-12T15:30:26 A vulnerability allowing an authenticated domain user to perform remote code exe
CVE-2026-3924 7.5 0.07% 2 0 2026-03-12T15:30:25 use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a
CVE-2026-3917 8.8 0.07% 1 0 2026-03-12T15:30:25 Use after free in Agents in Google Chrome prior to 146.0.7680.71 allowed a remot
CVE-2026-30226 None 0.04% 1 0 2026-03-12T14:13:04 In devalue v5.6.3, `devalue.parse` and `devalue.unflatten` were susceptible to p
CVE-2026-1965 6.5 0.05% 1 0 2026-03-12T14:11:19.070000 libcurl can in some circumstances reuse the wrong connection when asked to do an
CVE-2026-3805 7.5 0.04% 2 0 2026-03-12T14:08:56.790000 When doing a second SMB request to the same host again, curl would wrongly use a
CVE-2026-27591 10.0 0.06% 1 0 2026-03-12T14:07:39 ## Impact Affected versions of Winter CMS allowed authenticated backend users to
CVE-2026-27269 7.8 0.03% 1 0 2026-03-12T13:27:01.557000 Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vul
CVE-2026-4007 8.8 0.05% 1 0 2026-03-12T09:31:38 A vulnerability was detected in Tenda W3 1.0.0.3(2204). This vulnerability affec
CVE-2026-3973 8.8 0.09% 1 0 2026-03-12T03:31:16 A vulnerability was determined in Tenda W3 1.0.0.3(2204). This affects the funct
CVE-2026-3657 7.5 0.08% 1 0 2026-03-12T03:31:16 The My Sticky Bar plugin for WordPress is vulnerable to SQL injection via the `s
CVE-2026-3975 8.8 0.05% 1 0 2026-03-12T03:31:16 A security flaw has been discovered in Tenda W3 1.0.0.3(2204). This issue affect
CVE-2026-3974 8.8 0.05% 1 0 2026-03-12T03:31:16 A vulnerability was identified in Tenda W3 1.0.0.3(2204). This vulnerability aff
CVE-2026-3971 8.8 0.09% 1 0 2026-03-12T03:31:15 A vulnerability has been found in Tenda i3 1.0.0.6(2204). Affected by this vulne
CVE-2026-3972 8.8 0.03% 1 0 2026-03-12T03:31:15 A vulnerability was found in Tenda W3 1.0.0.3(2204). Affected by this issue is t
CVE-2026-3976 8.8 0.09% 1 0 2026-03-12T03:31:15 A weakness has been identified in Tenda W3 1.0.0.3(2204). Impacted is the functi
CVE-2026-31976 None 0.06% 1 0 2026-03-11T22:18:45 ### Description On March 3, 2026, an attacker with access to compromised creden
CVE-2025-68623 8.8 0.01% 1 0 2026-03-11T21:32:05 In Microsoft DirectX End-User Runtime Web Installer 9.29.1974.0, a low-privilege
CVE-2025-70082 9.8 0.07% 1 0 2026-03-11T21:32:05 An issue in Lantronix EDS3000PS v.3.1.0.0R2 allows an attacker to execute arbitr
CVE-2026-1716 7.1 0.02% 1 0 2026-03-11T21:31:10 An input validation vulnerability was reported in the DeviceSettingsSystemAddin
CVE-2026-1715 7.1 0.02% 1 0 2026-03-11T21:31:10 An input validation vulnerability was reported in the DeviceSettingsSystemAddin
CVE-2026-26801 7.5 0.04% 1 0 2026-03-11T21:12:10 Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.
CVE-2026-31862 9.1 0.04% 1 0 2026-03-11T20:45:27 ### Summary Multiple Git-related API endpoints use execAsync() with string inter
CVE-2026-28229 7.5 0.04% 2 0 2026-03-11T20:43:32 ### Summary Workflow templates endpoints allow any client to retrieve WorkflowTe
CVE-2025-68613 10.0 76.93% 4 31 template 2026-03-11T20:39:32 ### Impact n8n contains a critical Remote Code Execution (RCE) vulnerability in
CVE-2026-32059 8.8 0.06% 1 0 2026-03-11T20:38:42 ### Summary In OpenClaw, `tools.exec.safeBins` validation for `sort` could be by
CVE-2026-32060 8.8 0.28% 1 0 2026-03-11T20:38:26 ## Summary In affected versions, when `apply_patch` was enabled and the agent r
CVE-2026-27273 7.8 0.03% 1 0 2026-03-11T20:27:05.240000 Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds
CVE-2026-30966 10.0 0.04% 1 0 2026-03-11T19:50:29.950000 Parse Server is an open source backend that can be deployed to any infrastructur
CVE-2026-3784 6.5 0.03% 2 0 2026-03-11T18:31:35 curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a se
CVE-2025-67298 8.1 0.05% 1 0 2026-03-11T18:31:35 An issue in ClasroomIO before v.0.2.6 allows a remote attacker to escalate privi
CVE-2026-20046 8.8 0.02% 3 0 2026-03-11T18:30:40 A vulnerability in task group assignment for a specific CLI command in Cisco IOS
CVE-2026-0230 None 0.01% 1 0 2026-03-11T18:30:40 A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent
CVE-2026-20118 6.8 0.07% 1 0 2026-03-11T18:30:40 A vulnerability in the handling of an Egress Packet Network Interface (EPNI) Ali
CVE-2026-20074 7.4 0.02% 1 0 2026-03-11T18:30:40 A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) multi-
CVE-2026-20117 6.1 0.04% 1 0 2026-03-11T18:30:40 A vulnerability in the web-based management interface of Cisco Unified Contact C
CVE-2026-1069 7.5 0.02% 1 0 2026-03-11T18:30:40 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9
CVE-2026-1090 8.7 0.02% 1 0 2026-03-11T18:30:39 GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6
CVE-2026-0124 7.8 0.02% 1 0 2026-03-11T18:30:29 There is a possible out of bounds write due to a missing bounds check. This coul
CVE-2026-21289 7.5 0.10% 1 0 2026-03-11T18:21:50.817000 Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15,
CVE-2026-2631 9.8 0.18% 2 0 2026-03-11T15:32:59 The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an una
CVE-2026-3783 5.3 0.03% 1 0 2026-03-11T15:32:59 When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer p
CVE-2025-70027 7.5 0.03% 1 0 2026-03-11T15:31:58 An issue pertaining to CWE-918: Server-Side Request Forgery was discovered in Su
CVE-2026-30902 7.8 0.01% 1 0 2026-03-11T15:31:58 Improper Privilege Management in certain Zoom Clients for Windows may allow an a
CVE-2026-3496 7.5 0.06% 1 0 2026-03-11T15:31:58 The JetBooking plugin for WordPress is vulnerable to SQL Injection via the 'chec
CVE-2026-2626 8.1 0.03% 1 0 2026-03-11T15:31:52 The divi-booster WordPress plugin before 5.0.2 does not have authorization and C
CVE-2026-23814 8.8 0.12% 1 0 2026-03-11T15:31:51 A vulnerability in the command parameters of a certain AOS-CX CLI command could
CVE-2026-23813 9.8 0.05% 2 0 2026-03-11T14:16:19.637000 A vulnerability has been identified in the web-based management interface of AOS
CVE-2025-40943 9.6 0.04% 2 0 2026-03-11T13:53:47.157000 Affected devices do not properly sanitize contents of trace files. This could al
CVE-2026-21262 8.8 0.08% 2 0 2026-03-11T13:53:47.157000 Improper access control in SQL Server allows an authorized attacker to elevate p
CVE-2026-26117 7.8 0.04% 4 0 2026-03-11T13:53:20.707000 Authentication bypass using an alternate path or channel in Azure Windows Virtua
CVE-2026-24291 7.8 0.06% 1 0 2026-03-11T13:53:20.707000 Incorrect permission assignment for critical resource in Windows Accessibility I
CVE-2026-26118 8.8 0.06% 1 0 2026-03-11T13:53:20.707000 Server-side request forgery (ssrf) in Azure MCP Server allows an authorized atta
CVE-2026-2413 7.5 11.89% 4 2 template 2026-03-11T13:52:47.683000 The Ally – Web Accessibility & Usability plugin for WordPress is vulnerable to S
CVE-2026-3453 8.1 0.04% 1 0 2026-03-11T13:52:47.683000 The ProfilePress plugin for WordPress is vulnerable to Insecure Direct Object Re
CVE-2026-3222 7.5 0.16% 1 0 2026-03-11T13:52:47.683000 The WP Maps plugin for WordPress is vulnerable to time-based blind SQL Injection
CVE-2026-31844 8.8 0.04% 1 1 2026-03-11T13:52:47.683000 An authenticated SQL Injection vulnerability (CWE-89) exists in the Koha staff i
CVE-2026-1992 8.8 0.07% 1 0 2026-03-11T13:52:47.683000 The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable
CVE-2026-1993 8.8 0.04% 1 0 2026-03-11T12:31:30 The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable
CVE-2026-3826 9.8 0.20% 2 0 2026-03-11T09:32:00 IFTOP developed by WellChoose has a Local File Inclusion vulnerability, allowing
CVE-2026-1708 7.5 0.12% 1 0 2026-03-11T09:32:00 The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin p
CVE-2025-13067 8.8 0.10% 1 0 2026-03-11T06:31:47 The Royal Addons for Elementor plugin for WordPress is vulnerable to arbitrary f
CVE-2026-24448 9.8 0.04% 2 0 2026-03-11T06:31:47 Use of hard-coded credentials issue exists in MR-GM5L-S1 and MR-GM5A-L1, which m
CVE-2026-29515 None 0.07% 1 0 2026-03-11T06:31:47 MiCode FileExplorer contains an authentication bypass vulnerability in the embed
CVE-2026-27842 9.8 0.10% 2 0 2026-03-11T06:31:41 Authentication bypass issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow
CVE-2026-21290 8.7 0.04% 1 0 2026-03-11T03:31:39 Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15,
CVE-2026-21311 8.0 0.10% 1 0 2026-03-11T03:31:39 Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15,
CVE-2026-21309 7.5 0.10% 1 0 2026-03-11T03:31:39 Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15,
CVE-2026-21361 8.1 0.09% 1 0 2026-03-11T03:31:39 Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15,
CVE-2026-21284 8.1 0.09% 1 0 2026-03-11T03:31:38 Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15,
CVE-2026-27271 7.8 0.03% 1 0 2026-03-11T00:31:38 Illustrator versions 29.8.4, 30.1 and earlier are affected by a Heap-based Buffe
CVE-2026-26738 7.8 0.05% 1 0 2026-03-10T21:33:20 Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows
CVE-2026-27276 7.8 0.03% 1 0 2026-03-10T21:32:24 Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free
CVE-2026-27275 7.8 0.03% 1 0 2026-03-10T21:32:24 Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds
CVE-2026-27277 7.8 0.03% 1 0 2026-03-10T21:32:17 Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free
CVE-2026-27826 8.2 0.04% 1 1 2026-03-10T18:48:50 ### Summary An unauthenticated attacker who can reach the mcp-atlassian HTTP end
CVE-2026-28292 9.8 0.07% 2 0 2026-03-10T18:38:58 ### Summary The `blockUnsafeOperationsPlugin` in `simple-git` fails to block gi
CVE-2026-26128 7.8 0.04% 1 0 2026-03-10T18:31:31 Improper authentication in Windows SMB Server allows an authorized attacker to e
CVE-2026-25185 5.3 0.10% 1 0 2026-03-10T18:31:30 Exposure of sensitive information to an unauthorized actor in Windows Shell Link
CVE-2026-26144 7.5 0.10% 3 0 2026-03-10T18:31:30 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2026-26113 8.4 0.04% 1 0 2026-03-10T18:31:30 Untrusted pointer dereference in Microsoft Office allows an unauthorized attacke
CVE-2026-26121 7.5 0.10% 1 0 2026-03-10T18:31:30 Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized
CVE-2026-24289 7.8 0.06% 1 0 2026-03-10T18:31:26 Use after free in Windows Kernel allows an authorized attacker to elevate privil
CVE-2026-1603 8.6 43.88% 2 0 template 2026-03-10T15:31:30 An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allo
CVE-2025-26399 9.8 28.76% 1 1 2026-03-09T21:31:33 SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxP
CVE-2026-28514 0 0.13% 1 0 2026-03-09T13:35:34.633000 Rocket.Chat is an open-source, secure, fully customizable communications platfor
CVE-2025-11251 9.8 0.01% 1 0 2026-02-27T12:31:31 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-20127 10.0 2.60% 4 7 2026-02-26T16:20:02.187000 A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controlle
CVE-2026-27190 8.1 0.78% 1 0 2026-02-20T22:20:05 ## Summary A command injection vulnerability exists in Deno's `node:child_proces
CVE-2026-21509 7.8 9.26% 1 11 2026-02-11T15:40:33.473000 Reliance on untrusted inputs in a security decision in Microsoft Office allows a
CVE-2026-24858 9.8 2.78% 2 5 2026-01-29T13:16:51.047000 An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-2
CVE-2026-24307 9.3 0.15% 1 0 2026-01-23T00:31:24 Improper validation of specified type of input in M365 Copilot allows an unautho
CVE-2025-13154 5.5 0.02% 1 0 2026-01-15T00:31:44 An improper link following vulnerability was reported in the SmartPerformanceAdd
CVE-2026-0628 8.8 0.04% 1 2 2026-01-07T15:31:20 Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7
CVE-2025-11126 9.8 0.18% 1 0 2025-09-29T19:34:10.030000 A security flaw has been discovered in Apeman ID71 218.53.203.117. This vulnerab
CVE-2026-3910 0 0.08% 4 0 N/A
CVE-2026-3909 0 0.07% 4 0 N/A
CVE-2026-3891 0 0.13% 2 0 N/A
CVE-2026-12345 0 0.00% 1 0 N/A
CVE-2026-22193 0 0.03% 2 0 N/A
CVE-2026-32301 0 0.04% 2 0 N/A
CVE-2026-1526 0 0.04% 1 0 N/A
CVE-2026-1528 0 0.06% 1 0 N/A
CVE-2026-32260 0 0.18% 1 0 N/A
CVE-2026-25529 0 0.03% 1 0 N/A
CVE-2026-27940 0 0.01% 1 0 N/A
CVE-2026-21887 0 0.03% 1 0 N/A
CVE-2026-22248 0 0.08% 2 0 N/A
CVE-2026-31957 0 0.21% 1 0 N/A
CVE-2026-0866 0 0.00% 3 0 N/A
CVE-2026-31874 0 0.09% 2 0 N/A
CVE-2026-31870 0 0.06% 1 0 N/A
CVE-2026-31852 0 0.08% 1 0 N/A
CVE-2026-21888 0 0.05% 2 0 N/A
CVE-2026-28806 0 0.04% 1 0 N/A

CVE-2026-32242
(7.4 HIGH)

EPSS: 0.08%

updated 2026-03-13T16:57:55.797000

2 posts

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.6.0-alpha.11 and 8.6.37, Parse Server's built-in OAuth2 auth adapter exports a singleton instance that is reused directly across all OAuth2 provider configurations. Under concurrent authentication requests for different OAuth2 providers, one provider's token validation may execute usi

offseq at 2026-03-13T10:30:29.908Z ##

🚨 CVE-2026-32242: CRITICAL race condition in parse-server (>=9.0.0 <9.6.0-alpha.11, <8.6.37) lets OAuth2 tokens be validated against wrong provider configs. Patch to 9.6.0-alpha.11/8.6.37! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-13T10:30:29.000Z ##

🚨 CVE-2026-32242: CRITICAL race condition in parse-server (>=9.0.0 <9.6.0-alpha.11, <8.6.37) lets OAuth2 tokens be validated against wrong provider configs. Patch to 9.6.0-alpha.11/8.6.37! radar.offseq.com/threat/cve-20 #OffSeq #parseServer #OAuth2 #RaceCondition

##

CVE-2026-32304
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-03-13T16:10:32

2 posts

## Summary The `create_function(args, code)` function passes both parameters directly to the `Function` constructor without any sanitization, allowing arbitrary code execution. This is distinct from CVE-2026-29091 (GHSA-fp25-p6mj-qqg6) which was `call_user_func_array` using `eval()` in v2.x. This finding affects `create_function` using `new Function()` in v3.x. ## Root Cause `src/php/funchand/

offseq at 2026-03-13T00:00:42.061Z ##

🔴 CRITICAL: CVE-2026-32304 in locutusjs (<3.0.14) enables unauthenticated remote code execution via create_function() and unsanitized inputs. Patch to 3.0.14+ now! Full details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-13T00:00:42.000Z ##

🔴 CRITICAL: CVE-2026-32304 in locutusjs (<3.0.14) enables unauthenticated remote code execution via create_function() and unsanitized inputs. Patch to 3.0.14+ now! Full details: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #JavaScript #Infosec

##

CVE-2026-32140
(8.8 HIGH)

EPSS: 0.49%

updated 2026-03-13T16:07:30.057000

2 posts

Dataease is an open source data visualization analysis tool. Prior to 2.10.20, By controlling the IniFile parameter, an attacker can force the JDBC driver to load an attacker-controlled configuration file. This configuration file can inject dangerous JDBC properties, leading to remote code execution. The Redshift JDBC driver execution flow reaches a method named getJdbcIniFile. The getJdbcIniFile

thehackerwire@mastodon.social at 2026-03-13T16:17:00.000Z ##

🟠 CVE-2026-32140 - High (8.8)

Dataease is an open source data visualization analysis tool. Prior to 2.10.20, By controlling the IniFile parameter, an attacker can force the JDBC driver to load an attacker-controlled configuration file. This configuration file can inject danger...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-13T16:17:00.000Z ##

🟠 CVE-2026-32140 - High (8.8)

Dataease is an open source data visualization analysis tool. Prior to 2.10.20, By controlling the IniFile parameter, an attacker can force the JDBC driver to load an attacker-controlled configuration file. This configuration file can inject danger...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32137
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-13T16:03:02.080000

2 posts

Dataease is an open source data visualization analysis tool. Prior to 2.10.20, The table parameter for /de2api/datasource/previewData is directly concatenated into the SQL statement without any filtering or parameterization. Since tableName is a user-controllable string, attackers can inject malicious SQL statements by constructing malicious table names. This vulnerability is fixed in 2.10.20.

thehackerwire@mastodon.social at 2026-03-13T16:16:50.000Z ##

🟠 CVE-2026-32137 - High (8.8)

Dataease is an open source data visualization analysis tool. Prior to 2.10.20, The table parameter for /de2api/datasource/previewData is directly concatenated into the SQL statement without any filtering or parameterization. Since tableName is a u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-13T16:16:50.000Z ##

🟠 CVE-2026-32137 - High (8.8)

Dataease is an open source data visualization analysis tool. Prior to 2.10.20, The table parameter for /de2api/datasource/previewData is directly concatenated into the SQL statement without any filtering or parameterization. Since tableName is a u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26793
(9.8 CRITICAL)

EPSS: 0.23%

updated 2026-03-13T16:02:22.993000

1 posts

GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the set_config function. This vulnerability allows attackers to execute arbitrary commands via a crafted input.

thehackerwire@mastodon.social at 2026-03-12T21:00:35.000Z ##

🔴 CVE-2026-26793 - Critical (9.8)

GL-iNet GL-AR300M16 v4.3.11 was discovered to contain a command injection vulnerability via the set_config function. This vulnerability allows attackers to execute arbitrary commands via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3920
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-13T15:43:27.333000

1 posts

Out of bounds memory access in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-12T23:00:34.000Z ##

🟠 CVE-2026-3920 - High (8.8)

Out of bounds memory access in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3914
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-13T15:42:54.950000

2 posts

Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-13T16:25:08.000Z ##

🟠 CVE-2026-3914 - High (8.8)

Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-13T16:25:08.000Z ##

🟠 CVE-2026-3914 - High (8.8)

Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3913
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-13T15:42:49.310000

4 posts

Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-03-13T16:24:58.000Z ##

🟠 CVE-2026-3913 - High (8.8)

Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1 at 2026-03-13T08:01:50.323Z ##

Google Patches Critical WebML Vulnerability and 28 Other Flaws in Chrome 146

Google released Chrome 146 to patch 29 vulnerabilities, including a critical heap memory flaw in the WebML component (CVE-2026-3913) that allows remote code execution via malicious web pages.

**If you are using Google Chrome or other Chromium-based browsers (Edge, Brave, Vivaldi, Opera...) patch your browser ASAP. Google wouldn't push a new update so soon unless it's serious. Even if you want to debate the severity scoring, it's better to just update. Because while you debate, hackers will find a way to exploit them.**

beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-03-13T16:24:58.000Z ##

🟠 CVE-2026-3913 - High (8.8)

Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-03-13T08:01:50.000Z ##

Google Patches Critical WebML Vulnerability and 28 Other Flaws in Chrome 146

Google released Chrome 146 to patch 29 vulnerabilities, including a critical heap memory flaw in the WebML component (CVE-2026-3913) that allows remote code execution via malicious web pages.

**If you are using Google Chrome or other Chromium-based browsers (Edge, Brave, Vivaldi, Opera...) patch your browser ASAP. Google wouldn't push a new update so soon unless it's serious. Even if you want to debate the severity scoring, it's better to just update. Because while you debate, hackers will find a way to exploit them.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-32141
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-13T15:40:44

1 posts

## Summary flatted's `parse()` function uses a recursive `revive()` phase to resolve circular references in deserialized JSON. When given a crafted payload with deeply nested or self-referential `$` indices, the recursion depth is unbounded, causing a stack overflow that crashes the Node.js process. ## Impact Denial of Service (DoS). Any application that passes untrusted input to `flatted.parse

thehackerwire@mastodon.social at 2026-03-12T18:26:15.000Z ##

🟠 CVE-2026-32141 - High (7.5)

flatted is a circular JSON parser. Prior to 3.4.0, flatted's parse() function uses a recursive revive() phase to resolve circular references in deserialized JSON. When given a crafted payload with deeply nested or self-referential $ indices, the r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32248(CVSS UNKNOWN)

EPSS: 0.07%

updated 2026-03-13T13:36:16

2 posts

### Impact An unauthenticated attacker can take over any user account that was created with an authentication provider that does not validate the format of the user identifier (e.g. anonymous authentication). By sending a crafted login request, the attacker can cause the server to perform a pattern-matching query instead of an exact-match lookup, allowing the attacker to match an existing user an

offseq at 2026-03-13T07:32:28.744Z ##

🚨 CRITICAL: CVE-2026-32248 in parse-server (>=9.0.0, <9.6.0-alpha.12, <8.6.38) allows unauth attackers to hijack accounts if anonymous auth is enabled. MongoDB & PostgreSQL affected. Upgrade ASAP or disable anonymous auth! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-13T07:32:28.000Z ##

🚨 CRITICAL: CVE-2026-32248 in parse-server (>=9.0.0, <9.6.0-alpha.12, <8.6.38) allows unauth attackers to hijack accounts if anonymous auth is enabled. MongoDB & PostgreSQL affected. Upgrade ASAP or disable anonymous auth! radar.offseq.com/threat/cve-20 #OffSeq #CVE202632248 #infosec

##

CVE-2026-32247
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-13T13:36:06

1 posts

### Summary Graphiti versions before `0.28.2` contained a Cypher injection vulnerability in shared search-filter construction for non-Kuzu backends. Attacker-controlled label values supplied through `SearchFilters.node_labels` were concatenated directly into Cypher label expressions without validation. In MCP deployments, this was exploitable not only through direct untrusted access to the Graph

thehackerwire@mastodon.social at 2026-03-12T19:20:48.000Z ##

🟠 CVE-2026-32247 - High (8.1)

Graphiti is a framework for building and querying temporal context graphs for AI agents. Graphiti versions before 0.28.2 contained a Cypher injection vulnerability in shared search-filter construction for non-Kuzu backends. Attacker-controlled lab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32231
(8.2 HIGH)

EPSS: 0.02%

updated 2026-03-13T13:35:56

1 posts

### Summary The generic webhook channel trusts caller-supplied identity fields (`sender`, `chat_id`) from the request body and applies authorization checks to those untrusted values. Because authentication is optional and defaults to disabled (`auth_token: None`), an attacker who can reach `POST /webhook` can spoof an allowlisted sender and choose arbitrary `chat_id` values, enabling high-risk mes

thehackerwire@mastodon.social at 2026-03-12T19:20:59.000Z ##

🟠 CVE-2026-32231 - High (8.2)

ZeptoClaw is a personal AI assistant. Prior to 0.7.6, the generic webhook channel trusts caller-supplied identity fields (sender, chat_id) from the request body and applies authorization checks to those untrusted values. Because authentication is ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14513
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-13T12:34:46.100000

1 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service condition due to improper input validation when processing specially crafted JSON payloads in the protected branches API.

thehackerwire@mastodon.social at 2026-03-11T16:40:25.000Z ##

🟠 CVE-2025-14513 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.11 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service condition due to improper input...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13929
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-13T12:33:51.213000

1 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.0 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service by issuing specially crafted requests to repository archive endpoints under certain conditions.

thehackerwire@mastodon.social at 2026-03-11T16:30:39.000Z ##

🟠 CVE-2025-13929 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.0 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service by issuing specially crafted req...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3611
(10.0 CRITICAL)

EPSS: 0.13%

updated 2026-03-12T21:35:01

4 posts

The Honeywell IQ4x building management controller, exposes its full web-based HMI without authentication in its factory-default configuration. With no user module configured, security is disabled by design and the system operates under a System Guest (level 100) context, granting read/write privileges to any party able to reach the HTTP interface. Authentication controls are only enforced after a

offseq at 2026-03-13T04:30:29.537Z ##

🚨 CRITICAL: CVE-2026-3611 impacts Honeywell IQ4E (v3.50_3.44) — missing web HMI authentication lets remote attackers create admin accounts, lock out operators, and control building systems. Restrict access & create user accounts ASAP. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-13T04:30:29.000Z ##

🚨 CRITICAL: CVE-2026-3611 impacts Honeywell IQ4E (v3.50_3.44) — missing web HMI authentication lets remote attackers create admin accounts, lock out operators, and control building systems. Restrict access & create user accounts ASAP. radar.offseq.com/threat/cve-20 #OffSeq #ICS #Honeywell

##

thehackerwire@mastodon.social at 2026-03-12T21:35:51.000Z ##

🔴 CVE-2026-3611 - Critical (10)

The Honeywell IQ4x building management controller, exposes its full web-based HMI without authentication in its factory-default configuration. With no user module configured, security is disabled by design and the system operates under a System Gu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-03-11T12:01:26.000Z ##

Critical Authentication Bypass in Honeywell IQ4x BMS Controllers Allows Remote Takeover

Honeywell IQ4x BMS controllers contain a maximum severity critical vulnerability (CVE-2026-3611) that allows unauthenticated attackers to create administrative accounts and take full control of building management systems.

**If you are using Honeywell IQ4x Building Management System (or any BMS), make sure it's isolated from the internet and accessible only from trusted networks. Then reach out to Honeywell for updates. Don't wait to isolate your systems. This is maximum severity flaw, and it will be exploited very soon.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-3918
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-12T21:34:46

1 posts

Use after free in WebMCP in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-12T22:15:38.000Z ##

🟠 CVE-2026-3918 - High (8.8)

Use after free in WebMCP in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3926
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-12T21:34:46

1 posts

Out of bounds read in V8 in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-03-12T22:00:26.000Z ##

🟠 CVE-2026-3926 - High (8.8)

Out of bounds read in V8 in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-54820
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-12T21:17:31.313000

1 posts

A Stack-based Buffer Overflow vulnerability [CWE-121] vulnerability in Fortinet FortiManager 7.4.0 through 7.4.2, FortiManager 7.2.0 through 7.2.10, FortiManager 6.4 all versions may allow a remote unauthenticated attacker to execute unauthorized commands via crafted requests, if the service is enabled. The success of the attack depends on the ability to bypass the stack protection mechanisms.

beyondmachines1@infosec.exchange at 2026-03-11T18:01:11.000Z ##

Fortinet FortiManager vulnerability allows remote command execution

Fortinet has patched a high-severity stack-based buffer overflow in FortiManager (CVE-2025-54820) that allows remote unauthenticated attackers to execute unauthorized commands by sending crafted requests to the fgtupdates service.

**If you are using Fortinet FortiManager, plan a quick patch. In the interim, make sure the HTTP/HTTPS interface is isolated from the internet or disable fgtupdates in the system interface settings to close the attack vector.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-2229
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-12T21:16:25.573000

1 posts

ImpactThe undici WebSocket client is vulnerable to a denial-of-service attack due to improper validation of the server_max_window_bits parameter in the permessage-deflate extension. When a WebSocket client connects to a server, it automatically advertises support for permessage-deflate compression. A malicious server can respond with an out-of-range server_max_window_bits value (outside zlib's val

thehackerwire@mastodon.social at 2026-03-12T21:36:13.000Z ##

🟠 CVE-2026-2229 - High (7.5)

ImpactThe undici WebSocket client is vulnerable to a denial-of-service attack due to improper validation of the server_max_window_bits parameter in the permessage-deflate extension. When a WebSocket client connects to a server, it automatically ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32062
(7.5 HIGH)

EPSS: 0.09%

updated 2026-03-12T21:08:35.500000

1 posts

OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call versions 2026.2.21 prior to 2026.2.22 accept media-stream WebSocket upgrades before stream validation, allowing unauthenticated clients to establish connections. Remote attackers can hold idle pre-authenticated sockets open to consume connection resources and degrade service availability for legitimate streams.

thehackerwire@mastodon.social at 2026-03-11T15:06:19.000Z ##

🟠 CVE-2026-32062 - High (7.5)

OpenClaw versions2026.2.21-2 prior to 2026.2.22 and @openclaw/voice-call versions 2026.2.21 prior to 2026.2.22 accept media-stream WebSocket upgrades before stream validation, allowing unauthenticated clients to establish connections. Remote attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32136
(9.8 CRITICAL)

EPSS: 0.17%

updated 2026-03-12T21:08:22.643000

3 posts

AdGuard Home is a network-wide software for blocking ads and tracking. Prior to 0.107.73, an unauthenticated remote attacker can bypass all authentication in AdGuardHome by sending an HTTP/1.1 request that requests an upgrade to HTTP/2 cleartext (h2c). Once the upgrade is accepted, the resulting HTTP/2 connection is handled by the inner mux, which has no authentication middleware attached. All sub

thehackerwire@mastodon.social at 2026-03-13T16:24:48.000Z ##

🔴 CVE-2026-32136 - Critical (9.8)

AdGuard Home is a network-wide software for blocking ads and tracking. Prior to 0.107.73, an unauthenticated remote attacker can bypass all authentication in AdGuardHome by sending an HTTP/1.1 request that requests an upgrade to HTTP/2 cleartext (...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-13T16:24:48.000Z ##

🔴 CVE-2026-32136 - Critical (9.8)

AdGuard Home is a network-wide software for blocking ads and tracking. Prior to 0.107.73, an unauthenticated remote attacker can bypass all authentication in AdGuardHome by sending an HTTP/1.1 request that requests an upgrade to HTTP/2 cleartext (...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-12T00:00:39.000Z ##

CVE-2026-32136 (CRITICAL): AdGuard Home <0.107.73 allows remote auth bypass via HTTP/2 cleartext upgrade. Full admin access at risk. Upgrade now! 🔐 radar.offseq.com/threat/cve-20 #OffSeq #AdGuardHome #Vulnerability #Infosec

##

CVE-2026-30903
(9.6 CRITICAL)

EPSS: 0.05%

updated 2026-03-12T21:08:22.643000

2 posts

External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access.

Matchbook3469@mastodon.social at 2026-03-13T11:24:57.000Z ##

🚨 New security advisory:

CVE-2026-30903 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

thehackerwire@mastodon.social at 2026-03-11T15:22:42.000Z ##

🔴 CVE-2026-30903 - Critical (9.6)

External Control of File Name or Path in the Mail feature of Zoom Workplace for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation of privilege via network access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20163
(7.2 HIGH)

EPSS: 0.05%

updated 2026-03-12T21:08:22.643000

2 posts

In Splunk Enterprise versions below 10.2.0, 10.0.4, 9.4.9, and 9.3.10, and Splunk Cloud Platform versions below 10.2.2510.5, 10.0.2503.12, 10.1.2507.16, and 9.3.2411.124, a user who holds a role that contains the high-privilege capability `edit_cmd` could execute arbitrary shell commands using the `unarchive_cmd` parameter for the `/splunkd/__upload/indexing/preview` REST endpoint.

BugBountyShorts at 2026-03-13T10:23:49.666Z ##

Critical Splunk RCE Vulnerability (CVE-2026–20163) Lets Attackers Run Shell Commands on Your Server
The discovered vulnerability is a Remote Code Execution (RCE) in Splunk, a popular data processing software. The flaw stems from insufficient input validation in the application's search interface. By constructing a crafted search query, an attacker can exploit the vulnerability and execute arbitrary shell commands on the target server. Specifically, an attacker can utilize the 'enableJavaScript' and 'enableCookies' search commands to trigger the RCE. When the search interface receives a request, it inadvertently executes JavaScript provided by the attacker, enabling further exploitation. The impact of this vulnerability is severe, as it allows unauthorized execution of commands with the privileges of the Splunk user, potentially leading to data breaches or unauthorized access. The researcher received a $15,000 bounty from Splunk for reporting this critical issue. To remediate, Splunk suggests implementing input validation and sanitization for user-supplied search queries. Key lesson: Always validate user inputs to prevent RCE attacks.

medium.com/@EternalSec/critica

##

BugBountyShorts@infosec.exchange at 2026-03-13T10:23:49.000Z ##

Critical Splunk RCE Vulnerability (CVE-2026–20163) Lets Attackers Run Shell Commands on Your Server
The discovered vulnerability is a Remote Code Execution (RCE) in Splunk, a popular data processing software. The flaw stems from insufficient input validation in the application's search interface. By constructing a crafted search query, an attacker can exploit the vulnerability and execute arbitrary shell commands on the target server. Specifically, an attacker can utilize the 'enableJavaScript' and 'enableCookies' search commands to trigger the RCE. When the search interface receives a request, it inadvertently executes JavaScript provided by the attacker, enabling further exploitation. The impact of this vulnerability is severe, as it allows unauthorized execution of commands with the privileges of the Splunk user, potentially leading to data breaches or unauthorized access. The researcher received a $15,000 bounty from Splunk for reporting this critical issue. To remediate, Splunk suggests implementing input validation and sanitization for user-supplied search queries. Key lesson: Always validate user inputs to prevent RCE attacks. #BugBounty #Cybersecurity #RCE #Splunk #InputValidation

medium.com/@EternalSec/critica

##

CVE-2026-20040
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-12T21:08:22.643000

3 posts

A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker with a low-privileged account could exploit this vulnerability by using crafted

jbhall56@infosec.exchange at 2026-03-12T12:44:12.000Z ##

The most severe of these issues are CVE-2026-20040 and CVE-2026-20046 (CVSS score of 8.8), two bugs that could be exploited to execute arbitrary commands as root or gain administrative control of a device. securityweek.com/cisco-patches

##

thehackerwire@mastodon.social at 2026-03-11T17:26:16.000Z ##

🟠 CVE-2026-20040 - High (8.8)

A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device.

This vulnerability is due to insufficient validatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-03-11T16:37:38.000Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

@cR0w

##

CVE-2026-31896
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-12T21:08:22.643000

1 posts

WeGIA is a web manager for charitable institutions. Prior to version 3.6.6, a critical SQL injection vulnerability exists in the WeGIA application. The remover_produto_ocultar.php script uses extract($_REQUEST) to populate local variables and then directly concatenates these variables into a SQL query executed via PDO::query. This allows an authenticated (or auth-bypassed) attacker to execute arbi

offseq@infosec.exchange at 2026-03-12T07:30:29.000Z ##

⚠️ CRITICAL: CVE-2026-31896 in WeGIA <3.6.6 enables unauthenticated SQL injection via remover_produto_ocultar.php. Attackers can read or modify DB data. Patch to 3.6.6+ ASAP or apply WAF rules. Details: radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #InfoSec

##

CVE-2026-32096
(9.3 CRITICAL)

EPSS: 0.04%

updated 2026-03-12T21:08:22.643000

1 posts

Plunk is an open-source email platform built on top of AWS SES. Prior to 0.7.0, a Server-Side Request Forgery (SSRF) vulnerability existed in the SNS webhook handler. An unauthenticated attacker could send a crafted request that caused the server to make an arbitrary outbound HTTP GET request to any host accessible from the server. This vulnerability is fixed in 0.7.0.

offseq@infosec.exchange at 2026-03-12T03:00:32.000Z ##

🚨 CVE-2026-32096: CRITICAL SSRF in Plunk < 0.7.0 lets unauthenticated attackers trigger arbitrary outbound HTTP requests via SNS webhook. Upgrade to 0.7.0+ ASAP. Monitor egress and review webhook configs. radar.offseq.com/threat/cve-20 #OffSeq #SSRF #CloudSecurity

##

CVE-2026-31881
(7.7 HIGH)

EPSS: 0.09%

updated 2026-03-12T21:08:22.643000

1 posts

Runtipi is a personal homeserver orchestrator. Prior to 4.8.0, an unauthenticated attacker can reset the operator (admin) password when a password-reset request is active, resulting in full account takeover. The endpoint POST /api/auth/reset-password is exposed without authentication/authorization checks. During the 15-minute reset window, any remote user can set a new operator password and log in

thehackerwire@mastodon.social at 2026-03-11T19:19:37.000Z ##

🟠 CVE-2026-31881 - High (7.7)

Runtipi is a personal homeserver orchestrator. Prior to 4.8.0, an unauthenticated attacker can reset the operator (admin) password when a password-reset request is active, resulting in full account takeover. The endpoint POST /api/auth/reset-passw...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31866
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-12T21:08:22.643000

1 posts

flagd is a feature flag daemon with a Unix philosophy. Prior to 0.14.2, flagd exposes OFREP (/ofrep/v1/evaluate/...) and gRPC (evaluation.v1, evaluation.v2) endpoints for feature flag evaluation. These endpoints are designed to be publicly accessible by client applications. The evaluation context included in request payloads is read into memory without any size restriction. An attacker can send a

thehackerwire@mastodon.social at 2026-03-11T18:33:57.000Z ##

🟠 CVE-2026-31866 - High (7.5)

flagd is a feature flag daemon with a Unix philosophy. Prior to 0.14.2, flagd exposes OFREP (/ofrep/v1/evaluate/...) and gRPC (evaluation.v1, evaluation.v2) endpoints for feature flag evaluation. These endpoints are designed to be publicly accessi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31839
(8.2 HIGH)

EPSS: 0.01%

updated 2026-03-12T21:08:22.643000

1 posts

Striae is a firearms examiner's comparison companion. A high-severity integrity bypass vulnerability existed in Striae's digital confirmation workflow prior to v3.0.0. Hash-only validation trusted manifest hash fields that could be modified together with package content, allowing tampered confirmation packages to pass integrity checks. This vulnerability is fixed in 3.0.0.

thehackerwire@mastodon.social at 2026-03-11T17:18:21.000Z ##

🟠 CVE-2026-31839 - High (8.2)

Striae is a firearms examiner's comparison companion. A high-severity integrity bypass vulnerability existed in Striae's digital confirmation workflow prior to v3.0.0. Hash-only validation trusted manifest hash fields that could be modified togeth...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20116
(6.1 MEDIUM)

EPSS: 0.04%

updated 2026-03-12T21:08:22.643000

1 posts

A vulnerability in the web-based management interface of&nbsp; Cisco Finesse, Cisco Packaged Contact Center Enterprise (Packaged CCE), Cisco Unified Contact Center Enterprise (Unified CCE), Cisco Unified Contact Center Express (Unified CCX), and Cisco Unified Intelligence Center could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the inte

AAKL@infosec.exchange at 2026-03-11T16:37:38.000Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

@cR0w

##

CVE-2026-27897
(10.0 CRITICAL)

EPSS: 0.29%

updated 2026-03-12T21:08:22.643000

2 posts

Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and content. While the developer intended for a native UI dialog to handle the file path, the API does not validate the filename string before it is processed by

thehackerwire@mastodon.social at 2026-03-11T16:27:57.000Z ##

🔴 CVE-2026-27897 - Critical (10)

Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and conte...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:18:30.000Z ##

🔴 CVE-2026-27897 - Critical (10)

Vociferous provides cross-platform, offline speech-to-text with local AI refinement. Prior to 4.4.2, the vulnerability exists in src/api/system.py within the export_file route. The application accepts a JSON payload containing a filename and conte...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30900
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-12T21:08:22.643000

1 posts

Improper Check of minimum version in update functionality of certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

thehackerwire@mastodon.social at 2026-03-11T15:22:51.000Z ##

🟠 CVE-2026-30900 - High (7.8)

Improper Check of minimum version in update functionality of certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1717
(5.5 MEDIUM)

EPSS: 0.02%

updated 2026-03-12T21:08:22.643000

1 posts

An input validation vulnerability was reported in the LenovoProductivitySystemAddin used in Lenovo Vantage and Lenovo Baiying that could allow a local authenticated user to terminate arbitrary processes with elevated privileges.

rtfmkiesel@infosec.exchange at 2026-03-11T10:54:29.000Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

CVE-2019-25482
(8.2 HIGH)

EPSS: 0.07%

updated 2026-03-12T21:07:53.427000

1 posts

Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kategori_id parameter. Attackers can send POST requests to the endpoint with malicious SQL payloads to extract sensitive database information.

Matchbook3469@mastodon.social at 2026-03-13T15:35:12.000Z ##

⚠️ New security advisory:

CVE-2019-25482 affects multiple systems.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

CVE-2026-32251
(0 None)

EPSS: 0.04%

updated 2026-03-12T21:07:53.427000

2 posts

Tolgee is an open-source localization platform. Prior to 3.166.3, the XML parsers used for importing Android XML resources (.xml) and .resx files don't disable external entity processing. An authenticated user who can import translation files into a project can exploit this to read arbitrary files from the server and make server-side requests to internal services. This vulnerability is fixed in 3.

offseq at 2026-03-13T06:00:30.644Z ##

⚠️ CRITICAL: CVE-2026-32251 in tolgee-platform (<3.166.3) allows authenticated users to exploit XXE for file read & SSRF. Patch to 3.166.3+ ASAP! Limit XML imports & monitor for abuse. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-13T06:00:30.000Z ##

⚠️ CRITICAL: CVE-2026-32251 in tolgee-platform (<3.166.3) allows authenticated users to exploit XXE for file read & SSRF. Patch to 3.166.3+ ASAP! Limit XML imports & monitor for abuse. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202632251 #infosec #XXE

##

CVE-2026-3970
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-12T21:07:53.427000

1 posts

A flaw has been found in Tenda i3 1.0.0.6(2204). Affected is the function formwrlSSIDget of the file /goform/wifiSSIDget. Executing a manipulation of the argument index can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-03-12T21:49:35.000Z ##

🟠 CVE-2026-3970 - High (8.8)

A flaw has been found in Tenda i3 1.0.0.6(2204). Affected is the function formwrlSSIDget of the file /goform/wifiSSIDget. Executing a manipulation of the argument index can lead to stack-based buffer overflow. The attack may be launched remotely. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3978
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-12T21:07:53.427000

2 posts

A vulnerability was detected in D-Link DIR-513 1.10. The impacted element is an unknown function of the file /goform/formEasySetupWizard3. The manipulation of the argument wan_connected results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-03-12T20:15:44.000Z ##

🟠 CVE-2026-3978 - High (8.8)

A vulnerability was detected in D-Link DIR-513 1.10. The impacted element is an unknown function of the file /goform/formEasySetupWizard3. The manipulation of the argument wan_connected results in stack-based buffer overflow. The attack can be lau...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-12T20:01:50.000Z ##

🟠 CVE-2026-3978 - High (8.8)

A vulnerability was detected in D-Link DIR-513 1.10. The impacted element is an unknown function of the file /goform/formEasySetupWizard3. The manipulation of the argument wan_connected results in stack-based buffer overflow. The attack can be lau...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21668
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-12T21:07:53.427000

4 posts

A vulnerability allowing an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository.

thehackerwire@mastodon.social at 2026-03-12T20:15:24.000Z ##

🟠 CVE-2026-21668 - High (8.8)

A vulnerability allowing an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-12T20:01:27.000Z ##

🟠 CVE-2026-21668 - High (8.8)

A vulnerability allowing an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-12T17:16:42.000Z ##

🟠 CVE-2026-21668 - High (8.8)

A vulnerability allowing an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-12T16:16:56.000Z ##

🟠 CVE-2026-21668 - High (8.8)

A vulnerability allowing an authenticated domain user to bypass restrictions and manipulate arbitrary files on a Backup Repository.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4008
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-12T21:07:53.427000

2 posts

A flaw has been found in Tenda W3 1.0.0.3(2204). This issue affects some unknown processing of the file /goform/wifiSSIDset of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-03-12T20:01:40.000Z ##

🟠 CVE-2026-4008 - High (8.8)

A flaw has been found in Tenda W3 1.0.0.3(2204). This issue affects some unknown processing of the file /goform/wifiSSIDset of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-12T09:00:37.000Z ##

🛡️ CVE-2026-4008: HIGH severity stack buffer overflow in Tenda W3 (v1.0.0.3(2204)) lets remote attackers execute code or cause DoS — no auth needed. Public exploit available, patch or restrict access now! radar.offseq.com/threat/cve-20 #OffSeq #Tenda #Infosec #Vuln

##

CVE-2026-32138
(8.2 HIGH)

EPSS: 0.06%

updated 2026-03-12T21:07:53.427000

1 posts

NEXULEAN is a cybersecurity portfolio & service platform for an Ethical Hacker, AI Enthusiast, and Penetration Tester. Prior to 2.0.0, a security vulnerability was identified where Firebase and Web3Forms API keys were exposed. An attacker could use these keys to interact with backend services without authentication, potentially leading to unauthorized access to application resources and user data.

thehackerwire@mastodon.social at 2026-03-12T19:24:00.000Z ##

🟠 CVE-2026-32138 - High (8.2)

NEXULEAN is a cybersecurity portfolio & service platform for an Ethical Hacker, AI Enthusiast, and Penetration Tester. Prior to 2.0.0, a security vulnerability was identified where Firebase and Web3Forms API keys were exposed. An attacker could us...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32246
(8.5 HIGH)

EPSS: 0.05%

updated 2026-03-12T21:07:53.427000

1 posts

Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC authorization endpoint allows users with a TOTP-pending session (password verified, TOTP not yet completed) to obtain authorization codes. An attacker who knows a user's password but not their TOTP secret can obtain valid OIDC tokens, completely bypassing the second factor. This vulnerability is fixed in 5.0.3.

thehackerwire@mastodon.social at 2026-03-12T19:20:39.000Z ##

🟠 CVE-2026-32246 - High (8.5)

Tinyauth is an authentication and authorization server. Prior to 5.0.3, the OIDC authorization endpoint allows users with a TOTP-pending session (password verified, TOTP not yet completed) to obtain authorization codes. An attacker who knows a use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28793
(8.4 HIGH)

EPSS: 0.02%

updated 2026-03-12T21:07:53.427000

1 posts

Tina is a headless content management system. Prior to 2.1.8, the TinaCMS CLI development server exposes media endpoints that are vulnerable to path traversal, allowing attackers to read and write arbitrary files on the filesystem outside the intended media directory. When running tinacms dev, the CLI starts a local HTTP server (default port 4001) exposing endpoints such as /media/list/*, /media/u

thehackerwire@mastodon.social at 2026-03-12T17:32:43.000Z ##

🟠 CVE-2026-28793 - High (8.4)

Tina is a headless content management system. Prior to 2.1.8, the TinaCMS CLI development server exposes media endpoints that are vulnerable to path traversal, allowing attackers to read and write arbitrary files on the filesystem outside the inte...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28792
(9.6 CRITICAL)

EPSS: 0.27%

updated 2026-03-12T21:07:53.427000

1 posts

Tina is a headless content management system. Prior to 2.1.8 , the TinaCMS CLI dev server combines a permissive CORS configuration (Access-Control-Allow-Origin: *) with the path traversal vulnerability (previously reported) to enable a browser-based drive-by attack. A remote attacker can enumerate the filesystem, write arbitrary files, and delete arbitrary files on developer's machines by simply t

thehackerwire@mastodon.social at 2026-03-12T17:31:03.000Z ##

🔴 CVE-2026-28792 - Critical (9.6)

Tina is a headless content management system. Prior to 2.1.8 , the TinaCMS CLI dev server combines a permissive CORS configuration (Access-Control-Allow-Origin: *) with the path traversal vulnerability (previously reported) to enable a browser-bas...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21708
(9.9 CRITICAL)

EPSS: 0.54%

updated 2026-03-12T21:07:53.427000

1 posts

A vulnerability allowing a Backup Viewer to perform remote code execution (RCE) as the postgres user.

thehackerwire@mastodon.social at 2026-03-12T17:17:18.000Z ##

🔴 CVE-2026-21708 - Critical (9.9)

A vulnerability allowing a Backup Viewer to perform remote code execution (RCE) as the postgres user.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3060
(9.8 CRITICAL)

EPSS: 0.55%

updated 2026-03-12T21:07:53.427000

1 posts

SGLang' encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module, which deserializes untrusted data using pickle.loads() without authentication.

thehackerwire@mastodon.social at 2026-03-12T16:17:48.000Z ##

🔴 CVE-2026-3060 - Critical (9.8)

SGLang' encoder parallel disaggregation system is vulnerable to unauthenticated remote code execution through the disaggregation module, which deserializes untrusted data using pickle.loads() without authentication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21667
(9.9 CRITICAL)

EPSS: 0.37%

updated 2026-03-12T21:07:53.427000

1 posts

A vulnerability allowing an authenticated domain user to perform remote code execution (RCE) on the Backup Server.

thehackerwire@mastodon.social at 2026-03-12T16:16:51.000Z ##

🔴 CVE-2026-21667 - Critical (9.9)

A vulnerability allowing an authenticated domain user to perform remote code execution (RCE) on the Backup Server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4041
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-12T21:07:53.427000

1 posts

A security flaw has been discovered in Tenda i12 1.0.0.6(2204). Impacted is the function vos_strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-03-12T15:56:45.000Z ##

🟠 CVE-2026-4041 - High (8.8)

A security flaw has been discovered in Tenda i12 1.0.0.6(2204). Impacted is the function vos_strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput results in stack-based buffer overflow. The attack can be launched remote...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26127
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-12T20:32:34

2 posts

# Microsoft Security Advisory CVE-2026-26127 – .NET Denial of Service Vulnerability ## Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 9.0 and .NET 10.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A denial of service vulnerability exists in .NET and

CVE-2026-28356
(7.5 HIGH)

EPSS: 0.54%

updated 2026-03-12T18:32:23

2 posts

## Summary The `parse_options_header()` function in `multipart.py` uses a regular expression with an *ambiguous alternation*, which can cause *exponential backtracking (ReDoS)* when parsing maliciously crafted HTTP or multipart segment headers. This can be abused for **denial of service (DoS)** attacks against web applications using this library to parse request headers or `multipart/form-data` s

linux@activitypub.awakari.com at 2026-03-12T19:47:10.000Z ## Debian Trixie multipart Important DoS Flaw Fix DSA-6161-1 CVE-2026-28356 It was discovered that the parse_options_header() function of multipart, a Python multipart/form-data parser was susceptible...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

thehackerwire@mastodon.social at 2026-03-12T17:30:53.000Z ##

🟠 CVE-2026-28356 - High (7.5)

multipart is a fast multipart/form-data parser for python. Prior to 1.2.2, 1.3.1 and 1.4.0-dev, the parse_options_header() function in multipart.py uses a regular expression with an ambiguous alternation, which can cause exponential backtracking (...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3931
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-12T18:31:34

1 posts

Heap buffer overflow in Skia in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-03-12T22:00:38.000Z ##

🟠 CVE-2026-3931 - High (8.8)

Heap buffer overflow in Skia in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3936
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-12T18:31:33

1 posts

Use after free in WebView in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-03-12T22:00:16.000Z ##

🟠 CVE-2026-3936 - High (8.8)

Use after free in WebView in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21672
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-12T18:30:38

1 posts

A vulnerability allowing local privilege escalation on Windows-based Veeam Backup & Replication servers.

thehackerwire@mastodon.social at 2026-03-12T17:17:37.000Z ##

🟠 CVE-2026-21672 - High (8.8)

A vulnerability allowing local privilege escalation on Windows-based Veeam Backup & Replication servers.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4043
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-12T18:30:38

1 posts

A security vulnerability has been detected in Tenda i12 1.0.0.6(2204). The impacted element is the function formwrlSSIDget of the file /goform/wifiSSIDget. Such manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-03-12T16:16:40.000Z ##

🟠 CVE-2026-4043 - High (8.8)

A security vulnerability has been detected in Tenda i12 1.0.0.6(2204). The impacted element is the function formwrlSSIDget of the file /goform/wifiSSIDget. Such manipulation of the argument index leads to stack-based buffer overflow. The attack ma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21666
(10.0 CRITICAL)

EPSS: 0.37%

updated 2026-03-12T18:30:30

1 posts

A vulnerability allowing an authenticated domain user to perform remote code execution (RCE) on the Backup Server.

thehackerwire@mastodon.social at 2026-03-12T15:56:55.000Z ##

🔴 CVE-2026-21666 - Critical (9.9)

A vulnerability allowing an authenticated domain user to perform remote code execution (RCE) on the Backup Server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3059
(9.8 CRITICAL)

EPSS: 0.54%

updated 2026-03-12T17:38:59

1 posts

SGLang's multimodal generation module is vulnerable to unauthenticated remote code execution through the ZMQ broker, which deserializes untrusted data using pickle.loads() without authentication.

thehackerwire@mastodon.social at 2026-03-12T16:17:38.000Z ##

🔴 CVE-2026-3059 - Critical (9.8)

SGLang's multimodal generation module is vulnerable to unauthenticated remote code execution through the ZMQ broker, which deserializes untrusted data using pickle.loads() without authentication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3923
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-12T15:31:28

2 posts

Use after free in WebMIDI in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-12T23:34:14.000Z ##

🟠 CVE-2026-3923 - High (8.8)

Use after free in WebMIDI in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-12T23:34:14.000Z ##

🟠 CVE-2026-3923 - High (8.8)

Use after free in WebMIDI in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3922
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-12T15:31:28

1 posts

Use after free in MediaStream in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-12T23:00:53.000Z ##

🟠 CVE-2026-3922 - High (8.8)

Use after free in MediaStream in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3921
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-12T15:31:28

1 posts

Use after free in TextEncoding in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-12T23:00:44.000Z ##

🟠 CVE-2026-3921 - High (8.8)

Use after free in TextEncoding in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3919
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-12T15:31:27

1 posts

Use after free in Extensions in Google Chrome prior to 146.0.7680.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-12T22:15:50.000Z ##

🟠 CVE-2026-3919 - High (8.8)

Use after free in Extensions in Google Chrome prior to 146.0.7680.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4042
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-12T15:30:32

1 posts

A weakness has been identified in Tenda i12 1.0.0.6(2204). The affected element is the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. This manipulation of the argument index causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-03-12T15:56:34.000Z ##

🟠 CVE-2026-4042 - High (8.8)

A weakness has been identified in Tenda i12 1.0.0.6(2204). The affected element is the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. This manipulation of the argument index causes stack-based buffer overflow. The attack may b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21670
(7.7 HIGH)

EPSS: 0.03%

updated 2026-03-12T15:30:31

3 posts

A vulnerability allowing a low-privileged user to extract saved SSH credentials.

thehackerwire@mastodon.social at 2026-03-12T20:01:30.000Z ##

🟠 CVE-2026-21670 - High (7.7)

A vulnerability allowing a low-privileged user to extract saved SSH credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-12T17:16:52.000Z ##

🟠 CVE-2026-21670 - High (7.7)

A vulnerability allowing a low-privileged user to extract saved SSH credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-12T16:17:05.000Z ##

🟠 CVE-2026-21670 - High (7.7)

A vulnerability allowing a low-privileged user to extract saved SSH credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21671
(9.1 CRITICAL)

EPSS: 0.21%

updated 2026-03-12T15:30:26

4 posts

A vulnerability allowing an authenticated user with the Backup Administrator role to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup & Replication.

thehackerwire@mastodon.social at 2026-03-12T20:15:34.000Z ##

🔴 CVE-2026-21671 - Critical (9.1)

A vulnerability allowing an authenticated user with the Backup Administrator role to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup & Replication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-12T20:01:39.000Z ##

🔴 CVE-2026-21671 - Critical (9.1)

A vulnerability allowing an authenticated user with the Backup Administrator role to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup & Replication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-12T17:17:02.000Z ##

🔴 CVE-2026-21671 - Critical (9.1)

A vulnerability allowing an authenticated user with the Backup Administrator role to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup & Replication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-12T16:17:31.000Z ##

🔴 CVE-2026-21671 - Critical (9.1)

A vulnerability allowing an authenticated user with the Backup Administrator role to perform remote code execution (RCE) in high availability (HA) deployments of Veeam Backup & Replication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21669
(10.0 CRITICAL)

EPSS: 0.21%

updated 2026-03-12T15:30:26

1 posts

A vulnerability allowing an authenticated domain user to perform remote code execution (RCE) on the Backup Server.

thehackerwire@mastodon.social at 2026-03-12T16:17:00.000Z ##

🔴 CVE-2026-21669 - Critical (9.9)

A vulnerability allowing an authenticated domain user to perform remote code execution (RCE) on the Backup Server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3924
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-12T15:30:25

2 posts

use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-12T23:34:23.000Z ##

🟠 CVE-2026-3924 - High (7.5)

use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-12T23:34:23.000Z ##

🟠 CVE-2026-3924 - High (7.5)

use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3917
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-12T15:30:25

1 posts

Use after free in Agents in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-12T22:15:28.000Z ##

🟠 CVE-2026-3917 - High (8.8)

Use after free in Agents in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30226(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-03-12T14:13:04

1 posts

In devalue v5.6.3, `devalue.parse` and `devalue.unflatten` were susceptible to prototype pollution via maliciously crafted payloads. Successful exploitation could lead to Denial of Service (DoS) or type confusion.

jviide@infosec.exchange at 2026-03-11T20:30:04.000Z ##

Okay, so it turns out that this is really, really slow.

Which led to CVE-2026-30226: github.com/sveltejs/devalue/se

##

CVE-2026-1965
(6.5 MEDIUM)

EPSS: 0.05%

updated 2026-03-12T14:11:19.070000

1 posts

libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request. libcurl features a pool of recent connections so that subsequent requests can reuse an existing connection to avoid overhead. When reusing a connection a range of criterion must first be met. Due to a logical error in the code, a request that was issued by an applicatio

bagder@mastodon.social at 2026-03-11T06:56:11.000Z ##

CVE-2026-1965: bad reuse of HTTP Negotiate connection

libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request.

curl.se/docs/CVE-2026-1965.html

##

CVE-2026-3805
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-12T14:08:56.790000

2 posts

When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

thehackerwire@mastodon.social at 2026-03-11T16:40:44.000Z ##

🟠 CVE-2026-3805 - High (7.5)

When doing a second SMB request to the same host again, curl would wrongly use
a data pointer pointing into already freed memory.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

bagder@mastodon.social at 2026-03-11T06:56:43.000Z ##

CVE-2026-3805: use after free in SMB connection reuse

When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

curl.se/docs/CVE-2026-3805.html

##

CVE-2026-27591
(10.0 CRITICAL)

EPSS: 0.06%

updated 2026-03-12T14:07:39

1 posts

## Impact Affected versions of Winter CMS allowed authenticated backend users to escalate their accounts level of access to the system by modifying the roles / permissions assigned to their account through specially crafted requests to the backend while logged in. To actively exploit this security issue, an attacker would need access to the Backend with a user account with any level of access. T

offseq@infosec.exchange at 2026-03-12T01:30:29.000Z ##

🚨 CRITICAL: CVE-2026-27591 in Winter CMS (<1.0.477, <1.1.12, <1.2.12) lets any authenticated backend user escalate to admin via crafted requests. Patch ASAP! Impact: full compromise. radar.offseq.com/threat/cve-20 #OffSeq #WinterCMS #CVE202627591 #infosec

##

CVE-2026-27269
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-12T13:27:01.557000

1 posts

Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:32:50.000Z ##

🟠 CVE-2026-27269 - High (7.8)

Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4007
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-12T09:31:38

1 posts

A vulnerability was detected in Tenda W3 1.0.0.3(2204). This vulnerability affects unknown code of the file /goform/wifiSSIDget of the component POST Parameter Handler. Performing a manipulation of the argument index results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-03-12T16:17:57.000Z ##

🟠 CVE-2026-4007 - High (8.8)

A vulnerability was detected in Tenda W3 1.0.0.3(2204). This vulnerability affects unknown code of the file /goform/wifiSSIDget of the component POST Parameter Handler. Performing a manipulation of the argument index results in stack-based buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3973
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-12T03:31:16

1 posts

A vulnerability was determined in Tenda W3 1.0.0.3(2204). This affects the function formSetAutoPing of the file /goform/setAutoPing of the component POST Parameter Handler. This manipulation of the argument ping1/ping2 causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-12T21:49:24.000Z ##

🟠 CVE-2026-3973 - High (8.8)

A vulnerability was determined in Tenda W3 1.0.0.3(2204). This affects the function formSetAutoPing of the file /goform/setAutoPing of the component POST Parameter Handler. This manipulation of the argument ping1/ping2 causes stack-based buffer ov...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3657
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-12T03:31:16

1 posts

The My Sticky Bar plugin for WordPress is vulnerable to SQL injection via the `stickymenu_contact_lead_form` AJAX action in all versions up to, and including, 2.8.6. This is due to the handler using attacker-controlled POST parameter names directly as SQL column identifiers in `$wpdb->insert()`. While parameter values are sanitized with `esc_sql()` and `sanitize_text_field()`, the parameter keys a

thehackerwire@mastodon.social at 2026-03-12T21:38:15.000Z ##

🟠 CVE-2026-3657 - High (7.5)

The My Sticky Bar plugin for WordPress is vulnerable to SQL injection via the `stickymenu_contact_lead_form` AJAX action in all versions up to, and including, 2.8.6. This is due to the handler using attacker-controlled POST parameter names directl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3975
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-12T03:31:16

1 posts

A security flaw has been discovered in Tenda W3 1.0.0.3(2204). This issue affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet of the component POST Parameter Handler. Performing a manipulation of the argument wl_radio results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for att

thehackerwire@mastodon.social at 2026-03-12T21:00:45.000Z ##

🟠 CVE-2026-3975 - High (8.8)

A security flaw has been discovered in Tenda W3 1.0.0.3(2204). This issue affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet of the component POST Parameter Handler. Performing a manipulation of the argument wl_radio re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3974
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-12T03:31:16

1 posts

A vulnerability was identified in Tenda W3 1.0.0.3(2204). This vulnerability affects the function formexeCommand of the file /goform/exeCommand of the component HTTP Handler. Such manipulation of the argument cmdinput leads to stack-based buffer overflow. The attack may be performed from remote. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-03-12T20:01:50.000Z ##

🟠 CVE-2026-3974 - High (8.8)

A vulnerability was identified in Tenda W3 1.0.0.3(2204). This vulnerability affects the function formexeCommand of the file /goform/exeCommand of the component HTTP Handler. Such manipulation of the argument cmdinput leads to stack-based buffer o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3971
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-12T03:31:15

1 posts

A vulnerability has been found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset. The manipulation of the argument index/GO leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-03-12T21:49:45.000Z ##

🟠 CVE-2026-3971 - High (8.8)

A vulnerability has been found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset. The manipulation of the argument index/GO leads to stack-based buffer overflow. Remote exploit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3972
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-12T03:31:15

1 posts

A vulnerability was found in Tenda W3 1.0.0.3(2204). Affected by this issue is the function formSetCfm of the file /goform/setcfm of the component HTTP Handler. The manipulation of the argument funcpara1 results in stack-based buffer overflow. The attack can only be performed from the local network. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-03-12T21:38:25.000Z ##

🟠 CVE-2026-3972 - High (8.8)

A vulnerability was found in Tenda W3 1.0.0.3(2204). Affected by this issue is the function formSetCfm of the file /goform/setcfm of the component HTTP Handler. The manipulation of the argument funcpara1 results in stack-based buffer overflow. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3976
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-12T03:31:15

1 posts

A weakness has been identified in Tenda W3 1.0.0.3(2204). Impacted is the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-03-12T21:00:56.000Z ##

🟠 CVE-2026-3976 - High (8.8)

A weakness has been identified in Tenda W3 1.0.0.3(2204). Impacted is the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet of the component POST Parameter Handler. Executing a manipulation of the argument index/GO can lead to sta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31976(CVSS UNKNOWN)

EPSS: 0.06%

updated 2026-03-11T22:18:45

1 posts

### Description On March 3, 2026, an attacker with access to compromised credentials created a series of pull requests (#46, #47, #48) injecting obfuscated shell code into `action.yml`. The PRs were blocked by branch protection rules and never merged into the main branch. However, the attacker used the compromised GitHub App credentials to move the mutable `v5` tag to point at the malicious comm

offseq@infosec.exchange at 2026-03-12T04:30:37.000Z ##

🚨 CVE-2026-31976: CRITICAL supply chain risk in xygeni/xygeni-action. Workflows using @v5 (Mar 3 – 10, 2026) ran C2 code via tag poisoning. Pin to safe SHA, rotate creds, review logs. Details: radar.offseq.com/threat/cve-20 #OffSeq #SupplyChain #CI_CD #GitHub

##

CVE-2025-68623
(8.8 HIGH)

EPSS: 0.01%

updated 2026-03-11T21:32:05

1 posts

In Microsoft DirectX End-User Runtime Web Installer 9.29.1974.0, a low-privilege user can replace an executable file during the installation process, which may result in unintended elevation of privileges. During installation, the installer runs with HIGH integrity and downloads executables and DLLs to the %TEMP% folder - writable by standard users. Subsequently, the installer executes the downloa

thehackerwire@mastodon.social at 2026-03-11T19:20:17.000Z ##

🟠 CVE-2025-68623 - High (8.8)

In Microsoft DirectX End-User Runtime Web Installer 9.29.1974.0, a low-privilege user can replace an executable file during the installation process, which may result in unintended elevation of privileges. During installation, the installer runs w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70082
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-03-11T21:32:05

1 posts

An issue in Lantronix EDS3000PS v.3.1.0.0R2 allows an attacker to execute arbitrary code and obtain sensitive information via the ltrx_evo component

thehackerwire@mastodon.social at 2026-03-11T19:19:56.000Z ##

🔴 CVE-2025-70082 - Critical (9.8)

An issue in Lantronix EDS3000PS v.3.1.0.0R2 allows an attacker to execute arbitrary code and obtain sensitive information via the ltrx_evo component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1716
(7.1 HIGH)

EPSS: 0.02%

updated 2026-03-11T21:31:10

1 posts

An input validation vulnerability was reported in the DeviceSettingsSystemAddin used in Lenovo Vantage and Lenovo Baiying that could allow a local authenticated user to delete arbitrary registry keys with elevated privileges.

rtfmkiesel@infosec.exchange at 2026-03-11T10:54:29.000Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

CVE-2026-1715
(7.1 HIGH)

EPSS: 0.02%

updated 2026-03-11T21:31:10

1 posts

An input validation vulnerability was reported in the DeviceSettingsSystemAddin used in Lenovo Vantage and Lenovo Baiying that could allow a local authenticated user to modify arbitrary registry keys with elevated privileges.

rtfmkiesel@infosec.exchange at 2026-03-11T10:54:29.000Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

CVE-2026-26801
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-11T21:12:10

1 posts

Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.2 through 0.3.5 allows a remote attacker to obtain sensitive information via the src/URLResolver.js component. The fix was released in version 0.3.6 which introduces the setUrlAccessPolicy() method allowing server operators to define URL access rules. A warning is now logged when pdfmake is used server-side without a p

thehackerwire@mastodon.social at 2026-03-10T20:01:18.000Z ##

🟠 CVE-2026-26801 - High (7.5)

Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.2 through 0.3.5 allows a remote attacker to obtain sensitive information via the src/URLResolver.js component. The fix was released in version 0.3.6 which introduces t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31862
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-11T20:45:27

1 posts

### Summary Multiple Git-related API endpoints use execAsync() with string interpolation of user-controlled parameters (file, branch, message, commit), allowing authenticated attackers to execute arbitrary OS commands. ### Details The claudecodeui application provides Git integration through various API endpoints. These endpoints accept user-controlled parameters such as file paths, branch names,

thehackerwire@mastodon.social at 2026-03-11T18:33:48.000Z ##

🔴 CVE-2026-31862 - Critical (9.1)

Cloud CLI (aka Claude Code UI) is a desktop and mobile UI for Claude Code, Cursor CLI, Codex, and Gemini-CLI. Prior to 1.24.0, multiple Git-related API endpoints use execAsync() with string interpolation of user-controlled parameters (file, branch...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28229
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-11T20:43:32

2 posts

### Summary Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates). Any request with a `Authorization: Bearer nothing` token can leak sensitive template content, including embedded Secret manifests. ### Details https://github.com/argoproj/argo-workflows/blob/b519c9054e66b2f0a25eec06709717bd1362f72e/server/workflowtemplate/workflow_template_serv

thehackerwire@mastodon.social at 2026-03-11T16:30:18.000Z ##

🔴 CVE-2026-28229 - Critical (9.8)

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to 4.0.2 and 3.7.11, Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates)....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:18:39.000Z ##

🔴 CVE-2026-28229 - Critical (9.8)

Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Prior to 4.0.2 and 3.7.11, Workflow templates endpoints allow any client to retrieve WorkflowTemplates (and ClusterWorkflowTemplates)....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-68613
(10.0 CRITICAL)

EPSS: 76.93%

updated 2026-03-11T20:39:32

4 posts

### Impact n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary

Nuclei template

31 repos

https://github.com/AbdulRKB/n8n-RCE

https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit

https://github.com/TheStingR/CVE-2025-68613-POC

https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613

https://github.com/Dlanang/homelab-CVE-2025-68613

https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate

https://github.com/Victorhugofariasvieir66/relatorio-n8n.md

https://github.com/gagaltotal/n8n-cve-2025-68613

https://github.com/TheInterception/n8n_CVE-2025-68613_exploit_payloads

https://github.com/h3raklez/CVE-2025-68613

https://github.com/shibaaa204/CVE-2025-68613

https://github.com/intbjw/CVE-2025-68613-poc-via-copilot

https://github.com/sahilccras/Blackash-CVE-2025-68613

https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613

https://github.com/Khin-96/n8n-cve-2025-68613-thm

https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe

https://github.com/secjoker/CVE-2025-68613

https://github.com/Rishi-kaul/n8n-CVE-2025-68613

https://github.com/rxerium/CVE-2025-68613

https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis

https://github.com/wioui/n8n-CVE-2025-68613-exploit

https://github.com/GnuTLam/POC-CVE-2025-68613

https://github.com/LingerANR/n8n-CVE-2025-68613

https://github.com/reem-012/poc_CVE-2025-68613

https://github.com/manyaigdtuw/CVE-2025-68613_Scanner

https://github.com/intelligent-ears/CVE-2025-68613

https://github.com/nehkark/CVE-2025-68613

https://github.com/ali-py3/Exploit-CVE-2025-68613

https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab

https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613

https://github.com/cv-sai-kamesh/n8n-CVE-2025-68613

jbz@indieweb.social at 2026-03-13T05:55:00.000Z ##

⚠️ CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

「 The vulnerability, tracked as CVE-2025-68613 (CVSS score: 9.9), concerns a case of expression injection that leads to remote code execution. The security shortcoming was patched by n8n in December 2025 in versions 1.120.4, 1.121.1, and 1.122.0. CVE-2025-68613 is the first n8n vulnerability to be placed in the KEV catalog 」
thehackernews.com/2026/03/cisa

#n8n #cisa #rce #cybersecurity

##

jbz@indieweb.social at 2026-03-13T05:55:00.000Z ##

⚠️ CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

「 The vulnerability, tracked as CVE-2025-68613 (CVSS score: 9.9), concerns a case of expression injection that leads to remote code execution. The security shortcoming was patched by n8n in December 2025 in versions 1.120.4, 1.121.1, and 1.122.0. CVE-2025-68613 is the first n8n vulnerability to be placed in the KEV catalog 」
thehackernews.com/2026/03/cisa

#n8n #cisa #rce #cybersecurity

##

secdb@infosec.exchange at 2026-03-11T20:00:14.000Z ##

🚨 [CISA-2026:0311] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-68613 (secdb.nttzen.cloud/cve/detail/)
- Name: n8n Improper Control of Dynamically-Managed Code Resources Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: n8n
- Product: n8n
- Notes: github.com/n8n-io/n8n/security ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260311 #cisa20260311 #cve_2025_68613 #cve202568613

##

cisakevtracker@mastodon.social at 2026-03-11T18:00:48.000Z ##

CVE ID: CVE-2025-68613
Vendor: n8n
Product: n8n
Date Added: 2026-03-11
Notes: github.com/n8n-io/n8n/security ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-32059
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-11T20:38:42

1 posts

### Summary In OpenClaw, `tools.exec.safeBins` validation for `sort` could be bypassed via GNU long-option abbreviations in allowlist mode, allowing approval-free execution paths that should require approval. ### Affected Packages / Versions - Ecosystem: npm - Package: `openclaw` - Latest published version checked: `2026.2.22-2` - Affected range: `<= 2026.2.22-2` - Fixed version: `2026.2.23` ###

thehackerwire@mastodon.social at 2026-03-11T15:06:39.000Z ##

🟠 CVE-2026-32059 - High (8.8)

OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag checks via abbreviated options. Remote attackers can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32060
(8.8 HIGH)

EPSS: 0.28%

updated 2026-03-11T20:38:26

1 posts

## Summary In affected versions, when `apply_patch` was enabled and the agent ran without filesystem sandbox containment, crafted paths could cause file writes/deletes outside the configured workspace directory. ## Affected Packages / Versions - Package: `openclaw` (npm) - Affected: `<= 2026.2.13` - Fixed: `>= 2026.2.14` ## Details The non-sandbox path resolution in `apply_patch` did not enfo

thehackerwire@mastodon.social at 2026-03-11T15:08:04.000Z ##

🟠 CVE-2026-32060 - High (8.8)

OpenClaw versions prior to 2026.2.14 contain a path traversal vulnerability in apply_patch that allows attackers to write or delete files outside the configured workspace directory. When apply_patch is enabled without filesystem sandbox containmen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27273
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-11T20:27:05.240000

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:23.000Z ##

🟠 CVE-2026-27273 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30966
(10.0 CRITICAL)

EPSS: 0.04%

updated 2026-03-11T19:50:29.950000

1 posts

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to 9.5.2-alpha.7 and 8.6.20, Parse Server's internal tables, which store Relation field mappings such as role memberships, can be directly accessed via the REST API or GraphQL API by any client using only the application key. No master key is required. An attacker can create, read, update,

offseq@infosec.exchange at 2026-03-11T03:00:29.000Z ##

🚨 CRITICAL: CVE-2026-30966 in parse-server (<9.5.2-alpha.7, <8.6.20) lets attackers gain any role via REST/GraphQL with just the app key. Upgrade now and restrict API access! Full details: radar.offseq.com/threat/cve-20 #OffSeq #parseServer #CVE202630966 #infosec

##

CVE-2026-3784
(6.5 MEDIUM)

EPSS: 0.03%

updated 2026-03-11T18:31:35

2 posts

curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.

bagder@mastodon.social at 2026-03-12T08:08:59.000Z ##

CVE-2026-3784 beat a new #curl record. This flaw existed in curl source code for 24.97 years before it was discovered.

Illustrated in the slightly hard-to-read graph below. The average age of a curl vulnerability when reported is eight years.

curl.se/docs/CVE-2026-3784.html

##

bagder@mastodon.social at 2026-03-11T06:56:32.000Z ##

CVE-2026-3784: wrong proxy connection reuse with credentials

curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.

curl.se/docs/CVE-2026-3784.html

##

CVE-2025-67298
(8.1 HIGH)

EPSS: 0.05%

updated 2026-03-11T18:31:35

1 posts

An issue in ClasroomIO before v.0.2.6 allows a remote attacker to escalate privileges via the endpoints /api/verify and /rest/v1/profile

thehackerwire@mastodon.social at 2026-03-11T16:40:35.000Z ##

🟠 CVE-2025-67298 - High (8.1)

An issue in ClasroomIO before v.0.2.6 allows a remote attacker to escalate privileges via the endpoints /api/verify and /rest/v1/profile

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20046
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-11T18:30:40

3 posts

A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local attacker to elevate privileges and gain full administrative control of an affected device. This vulnerability is due to incorrect mapping of a command to task groups within the source code. An attacker with a low-privileged account could exploit this vulnerability by us

jbhall56@infosec.exchange at 2026-03-12T12:44:12.000Z ##

The most severe of these issues are CVE-2026-20040 and CVE-2026-20046 (CVSS score of 8.8), two bugs that could be exploited to execute arbitrary commands as root or gain administrative control of a device. securityweek.com/cisco-patches

##

thehackerwire@mastodon.social at 2026-03-11T17:25:58.000Z ##

🟠 CVE-2026-20046 - High (8.8)

A vulnerability in task group assignment for a specific CLI command in Cisco IOS XR Software could allow an authenticated, local attacker to elevate privileges and gain full administrative control of an affected device.

This vulnerability is du...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-03-11T16:37:38.000Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

@cR0w

##

CVE-2026-0230(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-03-11T18:30:40

1 posts

A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on macOS allows a local administrator to disable the agent. This issue could be leveraged by malware to perform malicious activity without detection.

CVE-2026-20118
(6.8 MEDIUM)

EPSS: 0.07%

updated 2026-03-11T18:30:40

1 posts

A vulnerability in the handling of an Egress Packet Network Interface (EPNI) Aligner interrupt in Cisco IOS XR Software for Cisco Network Convergence System (NCS) 5500 Series with NC57 line cards and Cisco NCS 5700 Routers and Cisco IOS XR Software for Third Party Software could allow an unauthenticated, remote attacker to cause the network processing unit (NPU) and ASIC to stop processing, preven

AAKL@infosec.exchange at 2026-03-11T16:37:38.000Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

@cR0w

##

CVE-2026-20074
(7.4 HIGH)

EPSS: 0.02%

updated 2026-03-11T18:30:40

1 posts

A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) multi-instance routing feature of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the IS-IS process to restart unexpectedly. This vulnerability is due to insufficient input validation of ingress IS-IS packets. An attacker could exploit this vulnerability by sending crafted IS-IS packets to a

AAKL@infosec.exchange at 2026-03-11T16:37:38.000Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

@cR0w

##

CVE-2026-20117
(6.1 MEDIUM)

EPSS: 0.04%

updated 2026-03-11T18:30:40

1 posts

A vulnerability in the web-based management interface of Cisco Unified Contact Center Express (Unified CCX) could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability exists because the web-based management interface of an affected system does not sufficiently validate user-supplied input. An attacker could exp

AAKL@infosec.exchange at 2026-03-11T16:37:38.000Z ##

Four new high-risk vulnerabilities from Cisco:

- CVE-2026-20118: Cisco IOS XR Egress Packet Network Interface Aligner Interrupt Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20074: Cisco IOS XR Software Multi-Instance Intermediate System-to-Intermediate System Denial of Service Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20040 and CVE-2026-20046L Cisco IOS XR Software CLI Privilege Escalation Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20116 and CVE-2026-20117: Multiple Cisco Contact Center Products Cross-Site Scripting Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #Cisco #vulnerability

@cR0w

##

CVE-2026-1069
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-11T18:30:40

1 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service by sending specially crafted GraphQL requests due to uncontrolled recursion under certain circumstances.

thehackerwire@mastodon.social at 2026-03-11T16:18:54.000Z ##

🟠 CVE-2026-1069 - High (7.5)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.9 before 18.9.2 that could have allowed an unauthenticated user to cause a denial of service by sending specially crafted GraphQL requests due to uncontrolled recursion ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1090
(8.7 HIGH)

EPSS: 0.02%

updated 2026-03-11T18:30:39

1 posts

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user, when the `markdown_placeholders` feature flag was enabled, to inject JavaScript in a browser due to improper sanitization of placeholder content in markdown processing.

thehackerwire@mastodon.social at 2026-03-11T16:19:03.000Z ##

🟠 CVE-2026-1090 - High (8.7)

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.6 before 18.7.6, 18.8 before 18.8.6, and 18.9 before 18.9.2 that could have allowed an authenticated user, when the `markdown_placeholders` feature flag was enabled, to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0124
(7.8 HIGH)

EPSS: 0.02%

updated 2026-03-11T18:30:29

1 posts

There is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

offseq@infosec.exchange at 2026-03-11T01:30:26.000Z ##

⚠️ CVE-2026-0124 (CRITICAL, CVSS 10) hits Google Pixel devices: local out-of-bounds write means privilege escalation — no user interaction needed. Restrict access, monitor now, patch ASAP when available. radar.offseq.com/threat/cve-20 #OffSeq #Android #Vuln #MobileSecurity

##

CVE-2026-21289
(7.5 HIGH)

EPSS: 0.10%

updated 2026-03-11T18:21:50.817000

1 posts

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized view access of data. Exploitation of this issue does not require user interaction.

thehackerwire@mastodon.social at 2026-03-11T19:02:05.000Z ##

🟠 CVE-2026-21289 - High (7.5)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2631
(9.8 CRITICAL)

EPSS: 0.18%

updated 2026-03-11T15:32:59

2 posts

The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an unauthenticated REST endpoint that allows any remote user to modify the option `datalogics_token` without verification. This token is subsequently used for authentication in a protected endpoint that allows users to perform arbitrary WordPress `update_option()` operations. Attackers can use this to enable registartion and

thehackerwire@mastodon.social at 2026-03-11T17:11:56.000Z ##

🔴 CVE-2026-2631 - Critical (9.8)

The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an unauthenticated REST endpoint that allows any remote user to modify the option `datalogics_token` without verification. This token is subsequently used for authentication...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-11T09:00:32.000Z ##

🛑 CVE-2026-2631 (CRITICAL): Datalogics Ecommerce Delivery WP plugin (<2.6.60) lets unauthenticated attackers gain admin via REST endpoint. Patch or restrict access now! Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #Infosec

##

CVE-2026-3783
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-03-11T15:32:59

1 posts

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances. If the hostname that the first request is redirected to has information in the used .netrc file, with either of the `machine` or `default` keywords, curl would pass on the bearer token set for the first host

bagder@mastodon.social at 2026-03-11T06:56:22.000Z ##

CVE-2026-3783: token leak with redirect and netrc

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances.

##

CVE-2025-70027
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-11T15:31:58

1 posts

An issue pertaining to CWE-918: Server-Side Request Forgery was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4. This allows attackers to obtain sensitive information

thehackerwire@mastodon.social at 2026-03-11T15:48:51.000Z ##

🟠 CVE-2025-70027 - High (7.5)

An issue pertaining to CWE-918: Server-Side Request Forgery was discovered in Sunbird-Ed SunbirdEd-portal v1.13.4. This allows attackers to obtain sensitive information

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30902
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-11T15:31:58

1 posts

Improper Privilege Management in certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

thehackerwire@mastodon.social at 2026-03-11T15:22:32.000Z ##

🟠 CVE-2026-30902 - High (7.8)

Improper Privilege Management in certain Zoom Clients for Windows may allow an authenticated user to conduct an escalation of privilege via local access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3496
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-11T15:31:58

1 posts

The JetBooking plugin for WordPress is vulnerable to SQL Injection via the 'check_in_date' parameter in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can

thehackerwire@mastodon.social at 2026-03-11T15:06:29.000Z ##

🟠 CVE-2026-3496 - High (7.5)

The JetBooking plugin for WordPress is vulnerable to SQL Injection via the 'check_in_date' parameter in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2626
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-11T15:31:52

1 posts

The divi-booster WordPress plugin before 5.0.2 does not have authorization and CSRF checks in one of its fixing function, allowing unauthenticated users to modify stored divi-booster WordPress plugin before 5.0.2 options. Furthermore, due to the use of unserialize() on the data, this could be further exploited when combined with a PHP gadget chain to achieve PHP Object Injection

thehackerwire@mastodon.social at 2026-03-11T17:11:47.000Z ##

🟠 CVE-2026-2626 - High (8.1)

The divi-booster WordPress plugin before 5.0.2 does not have authorization and CSRF checks in one of its fixing function, allowing unauthenticated users to modify stored divi-booster WordPress plugin before 5.0.2 options. Furthermore, due to the u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23814
(8.8 HIGH)

EPSS: 0.12%

updated 2026-03-11T15:31:51

1 posts

A vulnerability in the command parameters of a certain AOS-CX CLI command could allow a low-privilege authenticated remote attacker to inject malicious commands resulting in unwanted behavior.

thehackerwire@mastodon.social at 2026-03-11T18:34:20.000Z ##

🟠 CVE-2026-23814 - High (8.8)

A vulnerability in the command parameters of a certain AOS-CX CLI command could allow a low-privilege authenticated remote attacker to inject malicious commands resulting in unwanted behavior.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23813
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-11T14:16:19.637000

2 posts

A vulnerability has been identified in the web-based management interface of AOS-CX switches that could potentially allow an unauthenticated remote actor to circumvent existing authentication controls. In some cases this could enable resetting the admin password.

thehackerwire@mastodon.social at 2026-03-11T18:12:59.000Z ##

🔴 CVE-2026-23813 - Critical (9.8)

A vulnerability has been identified in the web-based management interface of AOS-CX switches that could potentially allow an unauthenticated remote actor to circumvent existing authentication controls. In some cases this could enable resetting the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-03-11T11:01:11.000Z ##

HPE Patches Multiple Flaws Aruba AOS-CX Including Critical Allowing Admin Password Resets

HPE patched five vulnerabilities in Aruba AOS-CX, including a critical authentication bypass (CVE-2026-23813) that allows unauthenticated remote attackers to reset administrator passwords and take full control of switches.

**Isolate your switch management interfaces on a separate VLAN that's only accessible from trusted networks. Then plan a patch cycle for your AOS-CX devices. For good measure, disable the web interface on all ports where it is not strictly necessary.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-40943
(9.6 CRITICAL)

EPSS: 0.04%

updated 2026-03-11T13:53:47.157000

2 posts

Affected devices do not properly sanitize contents of trace files. This could allow an attacker to inject code through social engineering a legitimate user to import a specially crafted trace file

beyondmachines1 at 2026-03-13T11:01:50.940Z ##

Siemens Patches Critical Code Injection Flaw in SIMATIC S7-1500 Controllers

Siemens reports a critical code injection vulnerability (CVE-2025-40943) in SIMATIC S7-1500 controllers that allows attackers to take full control of devices via malicious trace files. The flaw affects numerous industrial CPUs and requires users to update to version 4.1.2 or restrict web server access.

**If you are using Siemens SIMATIC S7-1500 controllers, make sure they are isolated from the internet, especially the web management interface. If the interface is not actively used, just disable it. Then plan a patch of the controllers. It's going to be a long process, many different models are affected.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-03-13T11:01:50.000Z ##

Siemens Patches Critical Code Injection Flaw in SIMATIC S7-1500 Controllers

Siemens reports a critical code injection vulnerability (CVE-2025-40943) in SIMATIC S7-1500 controllers that allows attackers to take full control of devices via malicious trace files. The flaw affects numerous industrial CPUs and requires users to update to version 4.1.2 or restrict web server access.

**If you are using Siemens SIMATIC S7-1500 controllers, make sure they are isolated from the internet, especially the web management interface. If the interface is not actively used, just disable it. Then plan a patch of the controllers. It's going to be a long process, many different models are affected.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-21262
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-11T13:53:47.157000

2 posts

Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.

ChrisShort@hachyderm.io at 2026-03-12T13:33:38.000Z ##

March 2026 Microsoft Patch Tuesday | Tenable® #devopsish tenable.com/blog/microsofts-ma

##

Mozilla@activitypub.awakari.com at 2026-03-11T00:32:51.000Z ## Microsoft Patch Tuesday, March 2026 Edition Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressi...

#Security #Bloggers #Network #Adam #Barnett #adobe #Ben #McCarthy #CVE-2026-21262 #CVE-2026-24289 #CVE-2026-24291

Origin | Interest | Match ##

CVE-2026-26117
(7.8 HIGH)

EPSS: 0.04%

updated 2026-03-11T13:53:20.707000

4 posts

Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.

hackerworkspace@infosec.exchange at 2026-03-11T18:29:41.000Z ##

CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation & Cloud Identity Takeover 

cymulate.com/blog/cve-2026-261

Short summary: hackerworkspace.com/article/cv

#cybersecurity #vulnerability #securitypatch

##

obivan@infosec.exchange at 2026-03-11T07:02:21.000Z ##

CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation & Cloud Identity Takeover cymulate.com/blog/cve-2026-261

##

_r_netsec@infosec.exchange at 2026-03-11T06:28:06.000Z ##

CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation & Cloud Identity Takeover cymulate.com/blog/cve-2026-261

##

thehackerwire@mastodon.social at 2026-03-10T20:01:40.000Z ##

🟠 CVE-2026-26117 - High (7.8)

Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24291
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-11T13:53:20.707000

1 posts

Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to elevate privileges locally.

Mozilla@activitypub.awakari.com at 2026-03-11T00:32:51.000Z ## Microsoft Patch Tuesday, March 2026 Edition Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressi...

#Security #Bloggers #Network #Adam #Barnett #adobe #Ben #McCarthy #CVE-2026-21262 #CVE-2026-24289 #CVE-2026-24291

Origin | Interest | Match ##

CVE-2026-26118
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-11T13:53:20.707000

1 posts

Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-03-10T20:02:00.000Z ##

🟠 CVE-2026-26118 - High (8.8)

Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2413
(7.5 HIGH)

EPSS: 11.89%

updated 2026-03-11T13:52:47.683000

4 posts

The Ally – Web Accessibility & Usability plugin for WordPress is vulnerable to SQL Injection via the URL path in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user-supplied URL parameter in the `get_global_remediations()` method, where it is directly concatenated into an SQL JOIN clause without proper sanitization for SQL context. While `esc_url_raw()` is ap

Nuclei template

2 repos

https://github.com/reschjonas/CVE-2026-24135

https://github.com/FilipeGaudard/CVE-2026-24134-PoC

Hackread@mstdn.social at 2026-03-13T12:57:59.000Z ##

Over 200,000 #WordPress sites are exposed due to an SQL injection flaw in the Ally plugin (CVE-2026-2413), allowing attackers to extract database data. Patch released, but many sites remain vulnerable.

Read: hackread.com/sql-injection-vul

#CyberSecurity #SQLInjection #Vulnerability

##

Hackread@mstdn.social at 2026-03-13T12:57:59.000Z ##

Over 200,000 #WordPress sites are exposed due to an SQL injection flaw in the Ally plugin (CVE-2026-2413), allowing attackers to extract database data. Patch released, but many sites remain vulnerable.

Read: hackread.com/sql-injection-vul

#CyberSecurity #SQLInjection #Vulnerability

##

technadu@infosec.exchange at 2026-03-12T14:11:10.000Z ##

Vulnerability alert.
A high-severity SQL injection flaw (CVE-2026-2413) in the Ally WordPress Plugin from Elementor could expose data from 250K+ sites.
Patch available in v4.1.0.

Source: bleepingcomputer.com/news/secu

Follow @technadu for security updates.
#Infosec #CyberSecurity

##

thehackerwire@mastodon.social at 2026-03-11T18:12:40.000Z ##

🟠 CVE-2026-2413 - High (7.5)

The Ally – Web Accessibility & Usability plugin for WordPress is vulnerable to SQL Injection via the URL path in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user-supplied URL parameter in the `get_global...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3453
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-11T13:52:47.683000

1 posts

The ProfilePress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.16.11. This is due to missing ownership validation on the change_plan_sub_id parameter in the process_checkout() function. The ppress_process_checkout AJAX handler accepts a user-controlled subscription ID intended for plan upgrades, loads the subscription record, and can

thehackerwire@mastodon.social at 2026-03-11T18:34:40.000Z ##

🟠 CVE-2026-3453 - High (8.1)

The ProfilePress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.16.11. This is due to missing ownership validation on the change_plan_sub_id parameter in the process_checkout() functi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3222
(7.5 HIGH)

EPSS: 0.16%

updated 2026-03-11T13:52:47.683000

1 posts

The WP Maps plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'location_id' parameter in all versions up to, and including, 4.9.1. This is due to the plugin's database abstraction layer (`FlipperCode_Model_Base::is_column()`) treating user input wrapped in backticks as column names, bypassing the `esc_sql()` escaping function. Additionally, the `wpgmp_ajax_call` AJAX han

thehackerwire@mastodon.social at 2026-03-11T17:12:05.000Z ##

🟠 CVE-2026-3222 - High (7.5)

The WP Maps plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'location_id' parameter in all versions up to, and including, 4.9.1. This is due to the plugin's database abstraction layer (`FlipperCode_Model_Base::is_colum...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31844
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-11T13:52:47.683000

1 posts

An authenticated SQL Injection vulnerability (CWE-89) exists in the Koha staff interface in the /cgi-bin/koha/suggestion/suggestion.pl endpoint due to improper validation of the displayby parameter used by the GetDistinctValues functionality. A low-privileged staff user can inject arbitrary SQL queries via crafted requests to this parameter, allowing execution of unintended SQL statements and expo

1 repos

https://github.com/Mothra-1/CVE-2026-31844

thehackerwire@mastodon.social at 2026-03-11T17:00:39.000Z ##

🟠 CVE-2026-31844 - High (8.8)

An authenticated SQL Injection vulnerability (CWE-89) exists in the Koha staff interface in the /cgi-bin/koha/suggestion/suggestion.pl endpoint due to improper validation of the displayby parameter used by the GetDistinctValues functionality. A lo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1992
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-11T13:52:47.683000

1 posts

The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Insecure Direct Object Reference in versions 8.6.0 through 9.0.2. This is due to the `store_settings()` method in the `ExactMetrics_Onboarding` class accepting a user-supplied `triggered_by` parameter that is used instead of the current user's ID to check permissions. This makes it possible for authenticated attack

thehackerwire@mastodon.social at 2026-03-11T15:08:14.000Z ##

🟠 CVE-2026-1992 - High (8.8)

The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Insecure Direct Object Reference in versions 8.6.0 through 9.0.2. This is due to the `store_settings()` method in the `ExactMetrics_Onboarding` class accepting a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1993
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-11T12:31:30

1 posts

The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Improper Privilege Management in versions 7.1.0 through 9.0.2. This is due to the `update_settings()` function accepting arbitrary plugin setting names without a whitelist of allowed settings. This makes it possible for authenticated attackers with the `exactmetrics_save_settings` capability to modify any plugin se

thehackerwire@mastodon.social at 2026-03-11T15:08:25.000Z ##

🟠 CVE-2026-1993 - High (8.8)

The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Improper Privilege Management in versions 7.1.0 through 9.0.2. This is due to the `update_settings()` function accepting arbitrary plugin setting names without a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3826
(9.8 CRITICAL)

EPSS: 0.20%

updated 2026-03-11T09:32:00

2 posts

IFTOP developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server.

thehackerwire@mastodon.social at 2026-03-11T17:00:28.000Z ##

🔴 CVE-2026-3826 - Critical (9.8)

IFTOP developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-11T07:32:34.000Z ##

🚨 CVE-2026-3826 (CRITICAL): WellChoose IFTOP PHP LFI lets unauthenticated attackers execute remote code. No patch yet. Isolate affected systems & monitor for LFI attempts. Act now to avoid full compromise! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #PHP #Vulnerability

##

CVE-2026-1708
(7.5 HIGH)

EPSS: 0.12%

updated 2026-03-11T09:32:00

1 posts

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection in all versions up to, and including, 1.6.9.27. This is due to the `db_where_conditions` method in the `TD_DB_Model` class failing to prevent the `append_where_sql` parameter from being passed through JSON request bodies, while only checking for its presence in t

thehackerwire@mastodon.social at 2026-03-11T17:00:17.000Z ##

🟠 CVE-2026-1708 - High (7.5)

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection in all versions up to, and including, 1.6.9.27. This is due to the `db_where_conditions` method in the `TD_D...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13067
(8.8 HIGH)

EPSS: 0.10%

updated 2026-03-11T06:31:47

1 posts

The Royal Addons for Elementor plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 1.7.1049. This is due to insufficient file type validation detecting files named main.php, allowing a file with such a name to bypass sanitization. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the af

thehackerwire@mastodon.social at 2026-03-11T18:12:50.000Z ##

🟠 CVE-2025-13067 - High (8.8)

The Royal Addons for Elementor plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 1.7.1049. This is due to insufficient file type validation detecting files named main.php, allowing a file with such a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24448
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-11T06:31:47

2 posts

Use of hard-coded credentials issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker to obtain administrative access.

thehackerwire@mastodon.social at 2026-03-11T17:26:26.000Z ##

🔴 CVE-2026-24448 - Critical (9.8)

Use of hard-coded credentials issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker to obtain administrative access.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-11T10:30:28.000Z ##

🔴 CVE-2026-24448 (CRITICAL, CVSS 9.8): Micro Research MR-GM5L-S1/MR-GM5A-L1 devices contain hard-coded credentials, allowing admin access w/o authentication. Update firmware to v2.01.04N1_02 ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CVE #IoTSecurity #Vuln

##

CVE-2026-29515(CVSS UNKNOWN)

EPSS: 0.07%

updated 2026-03-11T06:31:47

1 posts

MiCode FileExplorer contains an authentication bypass vulnerability in the embedded SwiFTP FTP server component that allows network attackers to log in without valid credentials. Attackers can send arbitrary username and password combinations to the PASS command handler, which unconditionally grants access and allows listing, reading, writing, and deleting files exposed by the FTP server. The MiCo

offseq@infosec.exchange at 2026-03-11T04:32:41.000Z ##

🚨 CRITICAL vuln: CVE-2026-29515 in MiCode FileExplorer (all versions). FTP auth bypass via SwiFTP — any credentials grant access to read, write, or delete files. No patch; restrict FTP access ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #MiCode #CVE202629515

##

CVE-2026-27842
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-03-11T06:31:41

2 posts

Authentication bypass issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker to bypass authentication and change the device configuration.

thehackerwire@mastodon.social at 2026-03-11T17:26:34.000Z ##

🔴 CVE-2026-27842 - Critical (9.8)

Authentication bypass issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker to bypass authentication and change the device configuration.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-11T06:00:30.000Z ##

🚩 CVE-2026-27842 (CRITICAL, CVSS 9.8): Auth bypass in Micro Research MR-GM5L-S1 & MR-GM5A-L1 (pre-v2.01.04N1_02). Remote attackers can reconfigure devices. Patch ASAP & segment networks! Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #IoTSecurity

##

CVE-2026-21290
(8.7 HIGH)

EPSS: 0.04%

updated 2026-03-11T03:31:39

1 posts

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A su

thehackerwire@mastodon.social at 2026-03-11T19:02:15.000Z ##

🟠 CVE-2026-21290 - High (8.7)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21311
(8.0 HIGH)

EPSS: 0.10%

updated 2026-03-11T03:31:39

1 posts

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A s

thehackerwire@mastodon.social at 2026-03-11T19:01:26.000Z ##

🟠 CVE-2026-21311 - High (8)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21309
(7.5 HIGH)

EPSS: 0.10%

updated 2026-03-11T03:31:39

1 posts

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized view access of data. Exploitation of this issue does not require user interaction.

thehackerwire@mastodon.social at 2026-03-11T19:01:15.000Z ##

🟠 CVE-2026-21309 - High (7.5)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21361
(8.1 HIGH)

EPSS: 0.09%

updated 2026-03-11T03:31:39

1 posts

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vvulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A

thehackerwire@mastodon.social at 2026-03-11T18:34:31.000Z ##

🟠 CVE-2026-21361 - High (8.1)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vvulnerability that could be abused by a high-privileged attacker to inject malicious scripts...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21284
(8.1 HIGH)

EPSS: 0.09%

updated 2026-03-11T03:31:38

1 posts

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. A s

thehackerwire@mastodon.social at 2026-03-11T19:01:36.000Z ##

🟠 CVE-2026-21284 - High (8.1)

Adobe Commerce versions 2.4.9-alpha3, 2.4.8-p3, 2.4.7-p8, 2.4.6-p13, 2.4.5-p15, 2.4.4-p16 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27271
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-11T00:31:38

1 posts

Illustrator versions 29.8.4, 30.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-11T19:02:24.000Z ##

🟠 CVE-2026-27271 - High (7.8)

Illustrator versions 29.8.4, 30.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26738
(7.8 HIGH)

EPSS: 0.05%

updated 2026-03-10T21:33:20

1 posts

Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows a remote attacker to execute arbitrary code via a crafted .sns snapshot file.

thehackerwire@mastodon.social at 2026-03-10T20:01:29.000Z ##

🟠 CVE-2026-26738 - High (7.8)

Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows a remote attacker to execute arbitrary code via a crafted .sns snapshot file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27276
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-10T21:32:24

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:44.000Z ##

🟠 CVE-2026-27276 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27275
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-10T21:32:24

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:34.000Z ##

🟠 CVE-2026-27275 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27277
(7.8 HIGH)

EPSS: 0.03%

updated 2026-03-10T21:32:17

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:54.000Z ##

🟠 CVE-2026-27277 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27826
(8.2 HIGH)

EPSS: 0.04%

updated 2026-03-10T18:48:50

1 posts

### Summary An unauthenticated attacker who can reach the mcp-atlassian HTTP endpoint can force the server process to make outbound HTTP requests to an arbitrary attacker-controlled URL by supplying two custom HTTP headers without an `Authorization` header. No authentication is required. The vulnerability exists in the HTTP middleware and dependency injection layer — not in any MCP tool handler -

1 repos

https://github.com/plutosecurity/MCPwnfluence

thehackerwire@mastodon.social at 2026-03-10T19:31:14.000Z ##

🟠 CVE-2026-27826 - High (8.2)

MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (Confluence and Jira). Prior to version 0.17.0, an unauthenticated attacker who can reach the mcp-atlassian HTTP endpoint can force the server process to make outbound H...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28292
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-03-10T18:38:58

2 posts

### Summary The `blockUnsafeOperationsPlugin` in `simple-git` fails to block git protocol override arguments when the config key is passed in uppercase or mixed case. An attacker who controls arguments passed to git operations can enable the `ext::` protocol by passing `-c PROTOCOL.ALLOW=always`, which executes an arbitrary OS command on the host machine. --- ### Details The `preventProtocolOv

CVE-2026-26128
(7.8 HIGH)

EPSS: 0.04%

updated 2026-03-10T18:31:31

1 posts

Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T20:04:09.000Z ##

🟠 CVE-2026-26128 - High (7.8)

Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25185
(5.3 MEDIUM)

EPSS: 0.10%

updated 2026-03-10T18:31:30

1 posts

Exposure of sensitive information to an unauthorized actor in Windows Shell Link Processing allows an unauthorized attacker to perform spoofing over a network.

CVE-2026-26144
(7.5 HIGH)

EPSS: 0.10%

updated 2026-03-10T18:31:30

3 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office Excel allows an unauthorized attacker to disclose information over a network.

_r_netsec@infosec.exchange at 2026-03-11T14:13:05.000Z ##

Common architectural pattern across four Q1 2026 AI assistant vulnerabilities (CVE-2026-26144, CVE-2026-0628, CVE-2026-24307, PleaseFix) blog.barrack.ai/ai-copilot-att

##

PC_Fluesterer@social.tchncs.de at 2026-03-11T10:23:47.000Z ##

Microsoft Flickentag 2026-03

Nach dem fetten Flickentag im Februar ist der für März wieder auf "normales" Maß geschrumpft. Mit den aktuellen Updates adressiert Microsoft (MS) 83 Sicherheitslücken. Von denen sind 8 als kritisch eingestuft. Von denen wiederum sticht eine (CVE-2026-26144) heraus. Ein führender Sicherheitsfachmann findet sie faszinierend. Es handelt sich um einen Fehler in Excel, nämlich "unzureichende Bereinigung von Eingaben". Der Leckerbissen besteht darin, dass ein Angreifer den Fehler nutzen kann, um mit Hilfe der KI Copilot von Ferne Informationen abzusaugen. Dafür sind keine Anmeldung oder Benutzerrechte

pc-fluesterer.info/wordpress/2

#Empfehlung #Hintergrund #Warnung #0day #datenschutz #Microsoft #office #privacy #sicherheit #UnplugTrump #vorbeugen #unplugmicrosoft

##

thezdi@infosec.exchange at 2026-03-10T22:18:05.000Z ##

And don't miss our bug of the month! Each patch Tuesday we'll be selecting our very favorite patch to highlight. This month, it CVE-2026-26144 - a Critical-rated info disclosure in Excel that uses the Copilot Agent to exfiltrate data. Neat! youtube.com/shorts/r4EjP3JxYRk

##

CVE-2026-26113
(8.4 HIGH)

EPSS: 0.04%

updated 2026-03-10T18:31:30

1 posts

Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.

thehackerwire@mastodon.social at 2026-03-10T20:04:19.000Z ##

🟠 CVE-2026-26113 - High (8.4)

Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26121
(7.5 HIGH)

EPSS: 0.10%

updated 2026-03-10T18:31:30

1 posts

Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network.

thehackerwire@mastodon.social at 2026-03-10T20:02:09.000Z ##

🟠 CVE-2026-26121 - High (7.5)

Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24289
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-10T18:31:26

1 posts

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.

Mozilla@activitypub.awakari.com at 2026-03-11T00:32:51.000Z ## Microsoft Patch Tuesday, March 2026 Edition Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressi...

#Security #Bloggers #Network #Adam #Barnett #adobe #Ben #McCarthy #CVE-2026-21262 #CVE-2026-24289 #CVE-2026-24291

Origin | Interest | Match ##

CVE-2026-1603
(8.6 HIGH)

EPSS: 43.88%

updated 2026-03-10T15:31:30

2 posts

An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data.

Nuclei template

thecybermind@infosec.exchange at 2026-03-11T11:39:10.000Z ##

CISA flips the switch: Ivanti EPM (CVE-2026-1603) is under active exploit. A low-complexity XSS allows total authentication bypass with zero user interaction. If your EPM is internet-facing, the "Master Key" is compromised. Get the Strategic Arsenal now. #CyberSecurity #Ivanti #KEV

thecybermind.co/2026/03/11/dec

##

beyondmachines1@infosec.exchange at 2026-03-11T10:01:11.000Z ##

CISA Warns of Active Exploitation in Ivanti Endpoint Manager Authentication Bypass

CISA added an Ivanti Endpoint Manager authentication bypass vulnerability (CVE-2026-1603) to its catalog of known exploited flaws after reports of active use by threat actors.

**If you use Ivanti Endpoint Manager, now patching is urgent. Update to 2024 SU5 immediately because attackers are already using this flaw to take over management servers.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2025-26399
(9.8 CRITICAL)

EPSS: 28.76%

updated 2026-03-09T21:31:33

1 posts

SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.

1 repos

https://github.com/rxerium/CVE-2025-26399

beyondmachines1@infosec.exchange at 2026-03-11T09:01:11.000Z ##

CISA Mandates Emergency Patching for SolarWinds Web Help Desk Vulnerabilities

CISA has shortened the patch deadline for an actively exploited critical SolarWinds Web Help Desk vulnerabilities, including CVE-2025-26399.

**When a federal agency shortens a patch deadline to just a few days, it means the product is actively and successfuly hacked. Treat your SolarWinds as an immediate priority, patch and ideally if possible isolate your help desk software from the public internet.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2026-28514
(0 None)

EPSS: 0.13%

updated 2026-03-09T13:35:34.633000

1 posts

Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0, a critical authentication bypass vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows an attacker to log in to the service as any user with a password set, using any arbitrary password. The

harrysintonen@infosec.exchange at 2026-03-10T23:10:53.000Z ##

#RocketChat has a critical authentication bypass vulnerability due to forgetting await keyword ("Users can login with any password via the EE ddp-streamer-servic" CVE-2026-28514):

github.com/RocketChat/Rocket.C

The vulnerability has been patched in RocketChat 8.0.0, 7.13.3, 7.12.4, 7.11.4, 7.10.7, 7.9.8 and 7.8.6.

These issues were discovered by an AI agent developed by the GitHub Security Lab and reviewed by GHSL team members Peter Stöckli and Man Yue Mo.

I often voice my dislike of misguided AI use. This right here is actually good use of AI.

#CVE_2026_28514 #infosec #cybersecurity

##

CVE-2025-11251
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-02-27T12:31:31

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Dayneks Software Industry and Trade Inc. E-Commerce Platform allows SQL Injection.This issue affects E-Commerce Platform: through 27022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

securityland@mastodon.social at 2026-03-11T23:04:07.000Z ##

The OpenClaw autonomous AI agent has achieved explosive growth, but its rapid rise has triggered a major security crisis. China's MIIT and CNCERT have issued urgent warnings following the discovery of over 40,000 exposed instances of the software online. The highest density of these exposed instances was located in China, followed by the US and Singapore.

Read More: security.land/china-openclaw-a

#SecurityLand #GeoSphere #China #OpenClaw #AI #SecurityVulnerability #CVE

##

CVE-2026-20127
(10.0 CRITICAL)

EPSS: 2.60%

updated 2026-02-26T16:20:02.187000

4 posts

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is n

7 repos

https://github.com/abrahamsurf/sdwan-scanner-CVE-2026-20127

https://github.com/zerozenxlabs/CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE

https://github.com/sfewer-r7/CVE-2026-20127

https://github.com/randeepajayasekara/CVE-2026-20127

https://github.com/yonathanpy/CVE-2026-20127-Cisco-SD-WAN-Preauth-RCE

https://github.com/leemuun/CVE-2026-20127

https://github.com/BugFor-Pings/CVE-2026-20127_EXP

Hackread@mstdn.social at 2026-03-13T11:55:29.000Z ##

US agencies face a CISA deadline to secure networks after a critical Cisco SD-WAN flaw (CVE-2026-20127) exposed federal systems to long-term intrusion and admin access.

Read: hackread.com/us-agencies-cisa-

#CyberSecurity #Cisco #SDWAN #CISA #Vulnerability

##

daniel1820815 at 2026-03-13T08:16:20.081Z ##

Check your deployments about Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability: cisa.gov/known-exploited-vulne

How to mitigate in Cisco SD-WAN Systems can be found here: cisa.gov/news-events/directive

##

Hackread@mstdn.social at 2026-03-13T11:55:29.000Z ##

US agencies face a CISA deadline to secure networks after a critical Cisco SD-WAN flaw (CVE-2026-20127) exposed federal systems to long-term intrusion and admin access.

Read: hackread.com/us-agencies-cisa-

#CyberSecurity #Cisco #SDWAN #CISA #Vulnerability

##

daniel1820815@infosec.exchange at 2026-03-13T08:16:20.000Z ##

Check your #Cisco #SDWAN deployments about Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability: cisa.gov/known-exploited-vulne

How to mitigate #vulnerabilities in Cisco SD-WAN Systems can be found here: cisa.gov/news-events/directive

##

CVE-2026-27190
(8.1 HIGH)

EPSS: 0.78%

updated 2026-02-20T22:20:05

1 posts

## Summary A command injection vulnerability exists in Deno's `node:child_process` implementation. ## Reproduction ```javascript import { spawnSync } from "node:child_process"; import * as fs from "node:fs"; // Cleanup try { fs.unlinkSync('/tmp/rce_proof'); } catch {} // Create legitimate script fs.writeFileSync('/tmp/legitimate.ts', 'console.log("normal");'); // Malicious input with newline

thehackerwire@mastodon.social at 2026-03-12T20:48:18.000Z ##

🟠 CVE-2026-32260 - High (8.1)

Deno is a JavaScript, TypeScript, and WebAssembly runtime. From 2.7.0 to 2.7.1, A command injection vulnerability exists in Deno's node:child_process polyfill (shell: true mode) that bypasses the fix for CVE-2026-27190. The two-stage argument san...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

_r_netsec@infosec.exchange at 2026-03-12T11:43:05.000Z ##

CVE-2026-21509: Actively Exploited Microsoft Office Security Feature Bypass — PoC Public, CISA KEV Listed fidelissecurity.com/vulnerabil

##

CVE-2026-24858
(9.8 CRITICAL)

EPSS: 2.78%

updated 2026-01-29T13:16:51.047000

2 posts

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.5, FortiAnalyzer 7.4.0 through 7.4.9, FortiAnalyzer 7.2.0 through 7.2.11, FortiAnalyzer 7.0.0 through 7.0.15, FortiManager 7.6.0 through 7.6.5, FortiManager 7.4.0 through 7.4.9, FortiManager 7.2.0 through 7.2.11, FortiManager 7.0.0 through 7.0.15, FortiOS 7.

5 repos

https://github.com/SimoesCTT/SCTT-2026-33-0004-FortiCloud-SSO-Identity-Singularity

https://github.com/SimoesCTT/-CTT-NSP-Convergent-Time-Theory---Network-Stack-Projection-CVE-2026-24858-

https://github.com/absholi7ly/CVE-2026-24858-FortiCloud-SSO-Authentication-Bypass

https://github.com/gagaltotal/cve-2026-24858

https://github.com/m0d0ri205/CVE-2026-24858

beyondmachines1 at 2026-03-13T12:01:50.538Z ##

Critical Authentication Bypass and Smuggling Flaws Impact Siemens RUGGEDCOM APE1808

Siemens disclosed four vulnerabilities in RUGGEDCOM APE1808 devices, including a critical authentication bypass (CVE-2026-24858) that allows attackers to hijack devices via FortiCloud SSO. The flaws also include HTTP request smuggling and format string vulnerabilities that could lead to unauthorized code execution or policy bypass.

**If you use RUGGEDCOM APE1808 devices with FortiOS, this is now urgent and important. The most critical item is a Fortinet flaw, and Fortinet is very much targeted by hackers. Update to version 7.4.11 ASAP. Isolation is not really a solution for a firewall that's designed operate between an insecure and secure networks.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-03-13T12:01:50.000Z ##

Critical Authentication Bypass and Smuggling Flaws Impact Siemens RUGGEDCOM APE1808

Siemens disclosed four vulnerabilities in RUGGEDCOM APE1808 devices, including a critical authentication bypass (CVE-2026-24858) that allows attackers to hijack devices via FortiCloud SSO. The flaws also include HTTP request smuggling and format string vulnerabilities that could lead to unauthorized code execution or policy bypass.

**If you use RUGGEDCOM APE1808 devices with FortiOS, this is now urgent and important. The most critical item is a Fortinet flaw, and Fortinet is very much targeted by hackers. Update to version 7.4.11 ASAP. Isolation is not really a solution for a firewall that's designed operate between an insecure and secure networks.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24307
(9.3 CRITICAL)

EPSS: 0.15%

updated 2026-01-23T00:31:24

1 posts

Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.

_r_netsec@infosec.exchange at 2026-03-11T14:13:05.000Z ##

Common architectural pattern across four Q1 2026 AI assistant vulnerabilities (CVE-2026-26144, CVE-2026-0628, CVE-2026-24307, PleaseFix) blog.barrack.ai/ai-copilot-att

##

CVE-2025-13154
(5.5 MEDIUM)

EPSS: 0.02%

updated 2026-01-15T00:31:44

1 posts

An improper link following vulnerability was reported in the SmartPerformanceAddin for Lenovo Vantage that could allow an authenticated local user to perform an arbitrary file deletion with elevated privileges.

rtfmkiesel@infosec.exchange at 2026-03-11T10:54:29.000Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

CVE-2026-0628
(8.8 HIGH)

EPSS: 0.04%

updated 2026-01-07T15:31:20

1 posts

Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High)

2 repos

https://github.com/fevar54/CVE-2026-0628-POC

https://github.com/sastraadiwiguna-purpleeliteteaming/Dissecting-CVE-2026-0628-Chromium-Extension-Privilege-Escalation

_r_netsec@infosec.exchange at 2026-03-11T14:13:05.000Z ##

Common architectural pattern across four Q1 2026 AI assistant vulnerabilities (CVE-2026-26144, CVE-2026-0628, CVE-2026-24307, PleaseFix) blog.barrack.ai/ai-copilot-att

##

CVE-2025-11126
(9.8 CRITICAL)

EPSS: 0.18%

updated 2025-09-29T19:34:10.030000

1 posts

A security flaw has been discovered in Apeman ID71 218.53.203.117. This vulnerability affects unknown code of the file /system/www/system.ini. The manipulation results in hard-coded credentials. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

beyondmachines1@infosec.exchange at 2026-03-11T14:01:12.000Z ##

Critical Vulnerabilities in Apeman ID71 Cameras Allow Remote Takeover

CISA warned of three vulnerabilities in Apeman ID71 cameras, including a critical credential exposure (CVE-2025-11126), that allow remote attackers to take full control of devices and view private feeds.

**If you are using Apeman ID71, this is urgent - there's a PoC exploit already available so hackers are probably already looking for these devices. Isolate these cameras from the internet immediately and use a VPN for any necessary remote access. Because the vendor is not providing patches, you should consider replacing these devices with a more secure, supported brand.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-3910
(0 None)

EPSS: 0.08%

4 posts

N/A

AAKL at 2026-03-13T16:47:16.353Z ##

CISA has updated the KEV catalogue.

- CVE-2026-3909: Google Skia Out-of-Bounds Write Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-3910: Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability cve.org/CVERecord?id=CVE-2026-

##

secureblue.dev@bsky.brid.gy at 2026-03-13T06:50:50.081Z ##

Trivalent 145.0.7632.75-442755 released: github.com/secureblue/T... Google is aware that exploits for both CVE-2026-3909 & CVE-2026-3910 exist in the wild.

Release 146.0.7680.75-443342 ·...

##

AAKL@infosec.exchange at 2026-03-13T16:47:16.000Z ##

CISA has updated the KEV catalogue.

- CVE-2026-3909: Google Skia Out-of-Bounds Write Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-3910: Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #Google #infosec #vulnerability

##

secureblue.dev@bsky.brid.gy at 2026-03-13T06:50:50.081Z ##

Trivalent 145.0.7632.75-442755 released: github.com/secureblue/T... Google is aware that exploits for both CVE-2026-3909 & CVE-2026-3910 exist in the wild.

Release 146.0.7680.75-443342 ·...

##

CVE-2026-3909
(0 None)

EPSS: 0.07%

4 posts

N/A

AAKL at 2026-03-13T16:47:16.353Z ##

CISA has updated the KEV catalogue.

- CVE-2026-3909: Google Skia Out-of-Bounds Write Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-3910: Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability cve.org/CVERecord?id=CVE-2026-

##

secureblue.dev@bsky.brid.gy at 2026-03-13T06:50:50.081Z ##

Trivalent 145.0.7632.75-442755 released: github.com/secureblue/T... Google is aware that exploits for both CVE-2026-3909 & CVE-2026-3910 exist in the wild.

Release 146.0.7680.75-443342 ·...

##

AAKL@infosec.exchange at 2026-03-13T16:47:16.000Z ##

CISA has updated the KEV catalogue.

- CVE-2026-3909: Google Skia Out-of-Bounds Write Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2026-3910: Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #Google #infosec #vulnerability

##

secureblue.dev@bsky.brid.gy at 2026-03-13T06:50:50.081Z ##

Trivalent 145.0.7632.75-442755 released: github.com/secureblue/T... Google is aware that exploits for both CVE-2026-3909 & CVE-2026-3910 exist in the wild.

Release 146.0.7680.75-443342 ·...

##

CVE-2026-3891
(0 None)

EPSS: 0.13%

2 posts

N/A

offseq at 2026-03-13T09:00:28.117Z ##

🚨 CVE-2026-3891 (CRITICAL, CVSS 9.8): Pix for WooCommerce plugin allows unauthenticated file uploads via missing checks, risking RCE. Disable/uninstall or apply mitigations now. Affects all versions. Full details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-13T09:00:28.000Z ##

🚨 CVE-2026-3891 (CRITICAL, CVSS 9.8): Pix for WooCommerce plugin allows unauthenticated file uploads via missing checks, risking RCE. Disable/uninstall or apply mitigations now. Affects all versions. Full details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #WooCommerce #Vuln

##

CVE-2026-12345
(0 None)

EPSS: 0.00%

1 posts

N/A

CVE-2026-22193
(0 None)

EPSS: 0.03%

2 posts

N/A

offseq at 2026-03-13T03:00:36.517Z ##

🚨 CRITICAL: CVE-2026-22193 in wpDiscuz <7.6.47 enables unauthenticated remote SQL injection. Attackers can access sensitive DB data. Patch ASAP or apply mitigations (WAF, access controls, log monitoring)! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-13T03:00:36.000Z ##

🚨 CRITICAL: CVE-2026-22193 in wpDiscuz <7.6.47 enables unauthenticated remote SQL injection. Attackers can access sensitive DB data. Patch ASAP or apply mitigations (WAF, access controls, log monitoring)! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #SQLInjection

##

CVE-2026-32301
(0 None)

EPSS: 0.04%

2 posts

N/A

offseq at 2026-03-13T01:30:30.468Z ##

🚨 CVE-2026-32301: Centrifugo < 6.7.0 has a CRITICAL SSRF flaw — unauthenticated attackers can force outbound requests via dynamic JWKS URLs (e.g., using {{tenant}}). Upgrade ASAP & lock down configs! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-13T01:30:30.000Z ##

🚨 CVE-2026-32301: Centrifugo < 6.7.0 has a CRITICAL SSRF flaw — unauthenticated attackers can force outbound requests via dynamic JWKS URLs (e.g., using {{tenant}}). Upgrade ASAP & lock down configs! radar.offseq.com/threat/cve-20 #OffSeq #SSRF #Centrifugo #Vuln

##

CVE-2026-1526
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-12T21:38:05.000Z ##

🟠 CVE-2026-1526 - High (7.5)

The undici WebSocket client is vulnerable to a denial-of-service attack via unbounded memory consumption during permessage-deflate decompression. When a WebSocket connection negotiates the permessage-deflate extension, the client decompresses inco...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1528
(0 None)

EPSS: 0.06%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-12T21:36:02.000Z ##

🟠 CVE-2026-1528 - High (7.5)

ImpactA server can reply with a WebSocket frame using the 64-bit length form and an extremely large length. undici's ByteParser overflows internal math, ends up in an invalid state, and throws a fatal TypeError that terminates the process.

Patche...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32260
(0 None)

EPSS: 0.18%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-12T20:48:18.000Z ##

🟠 CVE-2026-32260 - High (8.1)

Deno is a JavaScript, TypeScript, and WebAssembly runtime. From 2.7.0 to 2.7.1, A command injection vulnerability exists in Deno's node:child_process polyfill (shell: true mode) that bypasses the fix for CVE-2026-27190. The two-stage argument san...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25529
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-12T17:33:02.000Z ##

🟠 CVE-2026-25529 - High (8.1)

Postal is an open source SMTP server. Postal versions less than 3.3.5 had a HTML injection vulnerability that allowed unescaped data to be included in the admin interface. The primary way for unescaped data to be added is via the API's "send/raw" ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27940
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-12T17:32:52.000Z ##

🟠 CVE-2026-27940 - High (7.8)

llama.cpp is an inference of several LLM models in C/C++. Prior to b8146, the gguf_init_from_file_impl() in gguf.cpp is vulnerable to an Integer overflow, leading to an undersized heap allocation. Using the subsequent fread() writes 528+ bytes of ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21887
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-12T17:17:28.000Z ##

🟠 CVE-2026-21887 - High (7.7)

OpenCTI is an open source platform for managing cyber threat intelligence knowledge and observables. Prior to 6.8.16, the OpenCTI platform’s data ingestion feature accepts user-supplied URLs without validation and uses the Axios HTTP client with...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22248
(0 None)

EPSS: 0.08%

2 posts

N/A

obivan@infosec.exchange at 2026-03-12T08:44:51.000Z ##

CVE-2026-22248 - From File Upload to RCE via Unsafe Deserialization ribeir.in/posts/cve-2026-22248

##

thehackerwire@mastodon.social at 2026-03-11T16:18:44.000Z ##

🟠 CVE-2026-22248 - High (8)

GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. From 11.0.0 to before 11.0.5, an authenticated technician user can upload a malicious file and trigg...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31957
(0 None)

EPSS: 0.21%

1 posts

N/A

offseq@infosec.exchange at 2026-03-12T06:00:27.000Z ##

⚠️ CRITICAL: CVE-2026-31957 in himmelblau-idm (3.0.0-<3.1.0) lets attackers bypass Azure Entra ID tenant isolation if tenant domain isn't set. Upgrade to 3.1.0+ & enforce config! Details: radar.offseq.com/threat/cve-20 #OffSeq #Azure #CVE202631957 #InfoSec

##

CVE-2026-0866
(0 None)

EPSS: 0.00%

3 posts

N/A

threatcodex@infosec.exchange at 2026-03-11T19:22:09.000Z ##

Analyzing "Zombie Zip" Files (CVE-2026-0866)
#CVE_2026_0866
isc.sans.edu/diary/rss/32786

##

sans_isc@infosec.exchange at 2026-03-11T10:01:45.000Z ##

Analyzing "Zombie Zip" (CVE-2026-0866) isc.sans.edu/diary/32786

##

decio@infosec.exchange at 2026-03-11T09:36:00.000Z ##

[ #VULN ] "Zombie ZIP : cette technique d'évasion rend aveugles les antivirus"
CVE-2026-0866
⬇️
"Découverte par Chris Aziz, chercheur en sécurité chez Bombadil Systems, la technique Zombie ZIP abuse de la confiance accordée aux moteurs d'analyse à l'en-tête des fichiers ZIP. En effet, cette attaque consiste à manipuler l'en-tête du fichier ZIP de façon à altérer le champ déterminant la méthode de compression au sein de l'archive.

La technique Zombie ZIP consiste à indiquer que les données sont stockées sans aucune compression (méthode STORED ou Method=0), alors que c'est faux ! Le fichier malveillant est bel et bien compressé via l'algorithme standard DEFLATE."
👇
it-connect.fr/zombie-zip-cette

(NDR yet another) " #ZIP format confusion technique that evades 98% of #antivirus engines."
⬇️
CVE-2026-0866 | VU#976247 | Published March 10, 2026
👇
github.com/bombadil-systems/zo

💬
⬇️
infosec.pub/post/43258263

#CyberVeille #CVE_2026_0866

##

CVE-2026-31874
(0 None)

EPSS: 0.09%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-11T19:20:33.000Z ##

🔴 CVE-2026-31874 - Critical (9.8)

Taskosaur is an open source project management platform with conversational AI for task execution in-app. In 1.0.0, the application does not properly validate or restrict the role parameter during the user registration process. An attacker can man...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T19:19:47.000Z ##

🔴 CVE-2026-31874 - Critical (9.8)

Taskosaur is an open source project management platform with conversational AI for task execution in-app. In 1.0.0, the application does not properly validate or restrict the role parameter during the user registration process. An attacker can man...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31870
(0 None)

EPSS: 0.06%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-11T18:33:39.000Z ##

🟠 CVE-2026-31870 - High (7.5)

cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.37.1, when a cpp-httplib client uses the streaming API (httplib::stream::Get, httplib::stream::Post, etc.), the library calls std::stoull() directly on th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31852
(0 None)

EPSS: 0.08%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-11T17:18:30.000Z ##

🔴 CVE-2026-31852 - Critical (10)

Jellyfin is an open-source media system. The code-quality.yml GitHub Actions workflow in jellyfin/jellyfin-ios is vulnerable to arbitrary code execution via pull requests from forked repositories. Due to the workflow's elevated permissions (nearly...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21888
(0 None)

EPSS: 0.05%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-11T16:30:28.000Z ##

🟠 CVE-2026-21888 - High (7.5)

NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. MQTT v5 Variable Byte Integer parsing out-of-bounds: get_var_integer() accepts 5-byte varints without bounds checks; reliably triggers OOB read / crash when built with ASan. Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-11T16:18:49.000Z ##

🟠 CVE-2026-21888 - High (7.5)

NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. MQTT v5 Variable Byte Integer parsing out-of-bounds: get_var_integer() accepts 5-byte varints without bounds checks; reliably triggers OOB read / crash when built with ASan. Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28806
(0 None)

EPSS: 0.04%

1 posts

N/A

offseq@infosec.exchange at 2026-03-11T00:00:41.000Z ##

🚨 CRITICAL: CVE-2026-28806 in nerves_hub_web ≤2.3.x allows authenticated users to take over devices/orgs via improper authorization. Upgrade to 2.4.0+ ASAP! Remote console: high risk of full compromise. radar.offseq.com/threat/cve-20 #OffSeq #nerveshub #infosec #CVE202628806

##

Visit counter For Websites