## Updated at UTC 2026-02-24T09:41:51.604897

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-40541 9.1 0.00% 2 0 2026-02-24T08:16:28.220000 An Insecure Direct Object Reference (IDOR) vulnerability exists in Serv-U, which
CVE-2025-40540 9.1 0.00% 2 0 2026-02-24T08:16:28.053000 A type confusion vulnerability exists in Serv-U which when exploited, gives a ma
CVE-2025-40539 9.1 0.00% 2 0 2026-02-24T08:16:27.863000 A type confusion vulnerability exists in Serv-U which when exploited, gives a ma
CVE-2025-40538 9.1 0.00% 2 0 2026-02-24T08:16:27.627000 A broken access control vulnerability exists in Serv-U which when exploited, giv
CVE-2025-13942 9.8 0.00% 2 0 2026-02-24T03:30:27 A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 fi
CVE-2026-27127 0 0.00% 2 0 2026-02-24T03:16:02.440000 Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.1
CVE-2026-26331 8.8 0.00% 2 1 2026-02-24T03:16:01.710000 yt-dlp is a command-line audio/video downloader. Starting in version 2023.06.21
CVE-2026-26198 9.8 0.00% 4 0 2026-02-24T03:16:01.100000 Ormar is a async mini ORM for Python. In versions 0.9.9 through 0.22.0, when per
CVE-2026-1459 7.2 0.00% 2 0 2026-02-24T03:16:00.587000 A post-authentication command injection vulnerability in the TR-369 certificate
CVE-2025-13943 8.8 0.00% 4 0 2026-02-24T03:16:00.407000 A post-authentication command injection vulnerability in the log file download f
CVE-2026-25802 7.6 0.00% 4 0 2026-02-24T01:16:14.927000 New API is a large language mode (LLM) gateway and artificial intelligence (AI)
CVE-2026-25591 0 0.00% 2 0 2026-02-24T01:16:13.457000 New API is a large language mode (LLM) gateway and artificial intelligence (AI)
CVE-2026-24485 7.5 0.00% 2 0 2026-02-24T01:16:12.757000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2026-3044 8.8 0.00% 2 0 2026-02-24T00:16:19.420000 A vulnerability has been found in Tenda AC8 16.03.34.06. This affects the functi
CVE-2026-27487 7.6 0.05% 1 0 2026-02-23T22:28:28 ## Summary On macOS, the Claude CLI keychain credential refresh path constructed
CVE-2026-27198 8.8 0.04% 1 0 2026-02-23T22:27:31 ### Summary The application fails to properly enforce role-based authorization
CVE-2026-27192 None 0.02% 1 0 2026-02-23T22:26:42 The origin validation uses `startsWith()` for comparison, allowing attackers to
CVE-2026-27196 8.1 0.02% 1 0 2026-02-23T22:26:22 ## Impact Stored XSS vulnerability in `html` fieldtypes allow authenticated use
CVE-2026-26725 9.8 0.05% 2 0 2026-02-23T21:32:31 An issue in edu Business Solutions Print Shop Pro WebDesk v.18.34 allows a remot
CVE-2025-70329 8.0 0.00% 2 0 2026-02-23T21:31:36 TOTOLink X5000R v9.1.0cu_2415_B20250515 contains an OS command injection vulnera
CVE-2025-69700 7.5 0.00% 2 0 2026-02-23T21:31:30 Tenda FH1203 V2.0.1.6 contains a stack-based buffer overflow vulnerability in th
CVE-2025-70831 9.8 0.04% 2 0 2026-02-23T21:31:29 A Remote Code Execution (RCE) vulnerability was found in Smanga 3.2.7 in the /ph
CVE-2026-26746 8.8 0.05% 2 1 2026-02-23T21:31:27 OpenSourcePOS 3.4.1 contains a Local File Inclusion (LFI) vulnerability in the S
CVE-2026-24956 9.3 0.02% 2 0 2026-02-23T21:31:26 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-69393 7.5 0.02% 2 0 2026-02-23T21:31:25 Missing Authorization vulnerability in Jthemes Exzo exzo allows Exploiting Incor
CVE-2026-26724 7.6 0.06% 2 0 2026-02-23T21:31:25 Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Manageme
CVE-2026-26723 8.2 0.06% 2 0 2026-02-23T21:31:25 Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Manageme
CVE-2026-26747 9.1 0.05% 2 0 2026-02-23T21:19:12.023000 A Host Header Poisoning vulnerability exists in Monica 4.1.2 due to improper han
CVE-2026-26722 9.4 0.05% 2 0 2026-02-23T21:19:11.110000 An issue in Key Systems Inc Global Facilities Management Software v.20230721a al
CVE-2026-25648 8.7 0.00% 2 0 2026-02-23T21:19:10.690000 Versions of the Traccar open-source GPS tracking system starting with 6.11.1 con
CVE-2026-23693 10.0 0.00% 4 0 2026-02-23T21:19:10.157000 ElementsKit Lite (elementskit-lite) WordPress plugin versions prior to 3.7.9 exp
CVE-2025-69380 7.5 0.02% 2 0 2026-02-23T21:19:08.670000 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') v
CVE-2026-2870 8.8 0.05% 1 0 2026-02-23T21:00:00.257000 A security flaw has been discovered in Tenda A21 1.0.0.0. Affected by this issue
CVE-2026-2873 8.8 0.05% 1 0 2026-02-23T20:56:58.853000 A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the functi
CVE-2026-27169 8.9 0.04% 1 0 2026-02-23T20:50:36.870000 OpenSift is an AI study tool that sifts through large datasets using semantic se
CVE-2026-27194 9.8 0.51% 2 0 2026-02-23T20:47:29.423000 D-Tale is a visualizer for pandas data structures. Versions prior to 3.20.0 are
CVE-2026-27197 9.1 0.04% 2 0 2026-02-23T20:45:01.957000 Sentry is a developer-first error tracking and performance monitoring tool. Vers
CVE-2026-27574 9.9 0.05% 1 1 2026-02-23T20:36:09.117000 OneUptime is a solution for monitoring and managing online services. In versions
CVE-2026-2588 9.1 0.02% 2 0 2026-02-23T20:28:55.517000 Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw
CVE-2026-21863 7.5 0.00% 4 0 2026-02-23T20:28:53.853000 Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.
CVE-2026-2857 8.8 0.04% 1 0 2026-02-23T20:26:36.483000 A vulnerability was determined in D-Link DWR-M960 1.01.07. Affected by this issu
CVE-2026-2881 8.8 0.04% 1 0 2026-02-23T20:25:52.360000 A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability af
CVE-2026-2905 8.8 0.05% 1 0 2026-02-23T20:22:10.010000 A vulnerability was identified in Tenda HG9 300001138. This impacts an unknown f
CVE-2026-2906 8.8 0.05% 1 0 2026-02-23T20:22:01.890000 A security flaw has been discovered in Tenda HG9 300001138. Affected is an unkno
CVE-2026-2874 8.8 0.05% 1 0 2026-02-23T20:09:11.397000 A flaw has been found in Tenda A21 1.0.0.0. Impacted is the function form_fast_s
CVE-2026-2883 8.8 0.02% 1 0 2026-02-23T19:41:14.377000 A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the funct
CVE-2026-2885 8.8 0.04% 2 0 2026-02-23T19:37:28.037000 A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted ele
CVE-2026-2925 8.8 0.04% 2 0 2026-02-23T19:36:36.873000 A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this issue
CVE-2026-2926 8.8 0.04% 2 0 2026-02-23T19:35:45.083000 A flaw has been found in D-Link DWR-M960 1.01.07. This affects the function sub_
CVE-2026-2928 8.8 0.03% 2 0 2026-02-23T19:29:03.767000 A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the fun
CVE-2025-70833 9.4 0.04% 2 0 2026-02-23T19:22:57.587000 An Authentication Bypass vulnerability in Smanga 3.2.7 allows an unauthenticated
CVE-2026-2962 8.8 0.04% 2 0 2026-02-23T19:22:52.810000 A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects
CVE-2025-70043 9.1 0.00% 2 0 2026-02-23T18:32:09 An issue pertaining to CWE-295: Improper Certificate Validation was discovered i
CVE-2026-22567 7.6 0.00% 2 0 2026-02-23T18:32:03 Improper validation of user-supplied input in the ZIA Admin UI could allow an au
CVE-2026-2033 8.1 10.53% 2 0 2026-02-23T18:14:13.887000 MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Executio
CVE-2026-25896 9.3 0.03% 3 0 2026-02-23T18:14:13.887000 fast-xml-parser allows users to validate XML, parse XML to JS object, or build X
CVE-2026-24892 7.5 0.31% 1 0 2026-02-23T18:14:13.887000 openITCOCKPIT is an open source monitoring tool built for different monitoring e
CVE-2026-0777 7.8 0.06% 2 0 2026-02-23T18:14:13.887000 Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. Th
CVE-2026-27190 8.1 0.16% 1 0 2026-02-23T18:14:13.887000 Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to 2.6.8, a com
CVE-2026-2034 7.8 0.04% 1 0 2026-02-23T18:14:13.887000 Sante DICOM Viewer Pro DCM File Parsing Buffer Overflow Remote Code Execution Vu
CVE-2026-27112 0 0.24% 1 0 2026-02-23T18:14:13.887000 Kargo manages and automates the promotion of software artifacts. From 1.7.0 to b
CVE-2026-23552 9.1 0.01% 4 1 2026-02-23T18:13:53.397000 Cross-Realm Token Acceptance Bypass in KeycloakSecurityPolicy Apache Camel Keycl
CVE-2026-3015 8.8 0.00% 4 0 2026-02-23T18:13:53.397000 A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is
CVE-2026-3016 8.8 0.00% 2 0 2026-02-23T18:13:53.397000 A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. The affecte
CVE-2026-2981 8.8 0.04% 4 0 2026-02-23T18:13:53.397000 A vulnerability was found in UTT HiPER 810G up to 1.7.7-1711. The affected eleme
CVE-2026-2998 7.8 0.01% 3 0 2026-02-23T18:13:53.397000 ERP developed by eAI Technologies has a DLL Hijacking vulnerability, allowing au
CVE-2026-24494 9.8 0.05% 2 0 2026-02-23T18:13:53.397000 SQL Injection vulnerability in the /api/integrations/getintegrations endpoint of
CVE-2026-2042 7.2 1.25% 1 0 2026-02-23T18:13:53.397000 Nagios Host monitoringwizard Command Injection Remote Code Execution Vulnerabili
CVE-2026-2635 9.8 1.17% 2 0 2026-02-23T18:13:53.397000 MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnera
CVE-2026-2041 7.2 1.25% 1 0 2026-02-23T18:13:53.397000 Nagios Host zabbixagent_configwizard_func Command Injection Remote Code Executio
CVE-2026-2904 8.8 0.04% 2 0 2026-02-23T18:13:53.397000 A vulnerability was determined in UTT HiPER 810G 1.7.7-171114. This affects the
CVE-2026-27212 0 0.03% 1 0 2026-02-23T18:13:53.397000 Swiper is a free and mobile touch slider with hardware accelerated transitions a
CVE-2026-27467 2.0 0.03% 1 0 2026-02-23T18:13:53.397000 BigBlueButton is an open-source virtual classroom. In versions 3.0.19 and below,
CVE-2026-27479 7.7 0.03% 1 0 2026-02-23T18:13:53.397000 Wallos is an open-source, self-hostable personal subscription tracker. Versions
CVE-2026-27464 7.7 0.03% 1 0 2026-02-23T18:13:53.397000 Metabase is an open-source data analytics platform. In versions prior to 0.57.13
CVE-2026-27452 0 0.04% 1 0 2026-02-23T18:13:53.397000 ASN.1 TypeScript ESM library, including codecs for Basic Encoding Rules (BER) an
CVE-2026-27206 8.1 0.29% 1 0 2026-02-23T18:13:53.397000 Zumba Json Serializer is a library to serialize PHP variables in JSON format. In
CVE-2026-27168 8.8 0.02% 3 0 2026-02-23T18:13:53.397000 SAIL is a cross-platform library for loading and saving images with support for
CVE-2026-27203 8.3 0.04% 1 0 2026-02-23T18:13:53.397000 eBay API MCP Server is an open source local MCP server providing AI assistants w
CVE-2026-2044 7.8 0.06% 1 0 2026-02-23T18:13:53.397000 GIMP PGM File Parsing Uninitialized Memory Remote Code Execution Vulnerability.
CVE-2026-2047 7.8 0.06% 1 0 2026-02-23T18:13:53.397000 GIMP ICNS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerab
CVE-2026-2441 8.8 0.39% 7 5 2026-02-23T13:24:55.920000 Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote a
CVE-2025-68461 7.2 13.54% 4 2 2026-02-23T13:24:12.310000 Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a Cross-Site-S
CVE-2026-2980 7.2 0.04% 2 0 2026-02-23T09:31:29 A vulnerability has been found in UTT HiPER 810G up to 1.7.7-1711. Impacted is t
CVE-2026-1367 8.3 0.18% 2 0 2026-02-23T09:31:29 Zohocorp ManageEngine ADSelfService Plus versions 6522 and below are vulnerable
CVE-2026-2960 8.8 0.04% 3 0 2026-02-23T03:30:27 A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the
CVE-2026-2961 8.8 0.04% 4 0 2026-02-23T03:30:22 A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the func
CVE-2026-2958 8.8 0.04% 2 0 2026-02-23T00:30:32 A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected
CVE-2026-2959 8.8 0.04% 3 0 2026-02-23T00:30:32 A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulner
CVE-2026-2447 8.8 0.04% 2 0 2026-02-22T21:16:00.017000 Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Fi
CVE-2026-2927 8.8 0.04% 2 0 2026-02-22T06:30:24 A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability af
CVE-2026-2929 8.8 0.04% 2 0 2026-02-22T06:30:24 A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the funct
CVE-2026-2910 8.8 0.05% 1 0 2026-02-22T06:30:24 A flaw has been found in Tenda HG9 300001138. This vulnerability affects unknown
CVE-2026-2911 8.8 0.05% 1 0 2026-02-22T06:30:17 A vulnerability has been found in Tenda FH451 up to 1.0.0.9. This issue affects
CVE-2026-2907 8.8 0.05% 1 0 2026-02-22T03:30:34 A weakness has been identified in Tenda HG9 300001138. Affected by this vulnerab
CVE-2026-2909 8.8 0.05% 2 0 2026-02-22T03:30:33 A vulnerability was detected in Tenda HG9 300001138. This affects an unknown par
CVE-2026-2908 8.8 0.05% 1 0 2026-02-22T03:30:33 A security vulnerability has been detected in Tenda HG9 300001138. Affected by t
CVE-2026-2886 8.8 0.05% 2 0 2026-02-21T21:30:33 A weakness has been identified in Tenda A21 1.0.0.0. This affects the function s
CVE-2026-2884 8.8 0.04% 1 0 2026-02-21T21:30:33 A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element
CVE-2026-2882 8.8 0.04% 1 0 2026-02-21T21:30:27 A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the fun
CVE-2026-2877 8.8 0.05% 1 0 2026-02-21T21:30:27 A vulnerability has been found in Tenda A18 15.13.07.13. This affects the functi
CVE-2026-2876 8.8 0.05% 1 0 2026-02-21T18:31:23 A vulnerability was determined in Tenda A18 15.13.07.13. This affects the functi
CVE-2026-2871 8.8 0.04% 1 0 2026-02-21T18:31:23 A weakness has been identified in Tenda A21 1.0.0.0. This affects the function f
CVE-2026-2872 8.8 0.05% 1 0 2026-02-21T18:31:22 A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerabil
CVE-2019-25441 9.8 2.65% 1 0 2026-02-21T00:31:54 thesystem 1.0 contains a command injection vulnerability that allows unauthentic
CVE-2026-2037 8.8 0.79% 1 0 2026-02-21T00:31:54 GFI Archiver MArc.Core Deserialization of Untrusted Data Remote Code Execution V
CVE-2026-2036 8.8 0.79% 1 0 2026-02-21T00:31:54 GFI Archiver MArc.Store Deserialization of Untrusted Data Remote Code Execution
CVE-2026-2045 7.8 0.06% 1 0 2026-02-21T00:31:54 GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. T
CVE-2026-2048 7.8 0.06% 1 0 2026-02-21T00:31:54 GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. T
CVE-2026-0797 7.8 0.06% 2 0 2026-02-21T00:31:49 GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerabi
CVE-2025-49113 10.0 89.96% 4 22 template 2026-02-20T21:48:11 Roundcube Webmail before 1.5.10 and 1.6.x before 1.6.11 allows remote code execu
CVE-2026-22364 8.1 0.11% 1 0 2026-02-20T21:32:27 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22370 8.1 0.11% 1 0 2026-02-20T21:32:27 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22378 8.1 0.11% 1 0 2026-02-20T21:32:27 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-24950 7.5 0.03% 1 0 2026-02-20T21:32:27 Authorization Bypass Through User-Controlled Key vulnerability in themeplugs Aut
CVE-2026-2856 8.8 0.04% 1 0 2026-02-20T21:31:32 A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerabi
CVE-2026-2855 8.8 0.04% 1 0 2026-02-20T21:31:32 A vulnerability has been found in D-Link DWR-M960 1.01.07. Affected is the funct
CVE-2026-2854 8.8 0.04% 1 0 2026-02-20T21:31:24 A flaw has been found in D-Link DWR-M960 1.01.07. This impacts the function sub_
CVE-2026-2853 8.8 0.04% 1 0 2026-02-20T21:31:24 A vulnerability was detected in D-Link DWR-M960 1.01.07. This affects the functi
CVE-2026-22383 7.5 0.04% 1 0 2026-02-20T21:31:23 Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes
CVE-2026-24959 8.5 0.03% 1 0 2026-02-20T21:31:23 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-22362 8.1 0.11% 1 0 2026-02-20T21:31:22 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22376 8.1 0.11% 1 0 2026-02-20T21:31:22 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-2329 9.8 0.14% 4 0 2026-02-20T21:31:21 An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP
CVE-2026-24941 7.5 0.03% 1 0 2026-02-20T20:25:21.757000 Missing Authorization vulnerability in wpjobportal WP Job Portal wp-job-portal a
CVE-2026-22380 8.1 0.11% 1 0 2026-02-20T20:25:20.723000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22374 8.1 0.11% 1 0 2026-02-20T20:25:20.203000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22372 8.1 0.11% 1 0 2026-02-20T20:25:20.027000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22368 8.1 0.11% 1 0 2026-02-20T20:25:19.680000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-22366 8.1 0.11% 1 0 2026-02-20T20:25:19.503000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-26286 8.5 0.03% 1 0 2026-02-20T19:45:52.563000 SillyTavern is a locally installed user interface that allows users to interact
CVE-2026-27114 7.5 0.03% 1 0 2026-02-20T19:21:04.883000 NanaZip is an open source file archive Starting in version 5.0.1252.0 and prior
CVE-2026-26016 8.1 0.04% 1 0 2026-02-20T19:08:53.683000 Wings is the server control plane for Pterodactyl, a free, open-source game serv
CVE-2026-26323 8.8 0.18% 1 0 2026-02-20T19:06:15.470000 OpenClaw is a personal AI assistant. Versions 2026.1.8 through 2026.2.13 have a
CVE-2026-24891 7.5 0.05% 1 0 2026-02-20T18:57:15.973000 openITCOCKPIT is an open source monitoring tool built for different monitoring e
CVE-2026-24455 7.5 0.03% 1 0 2026-02-20T18:57:15.973000 The embedded web interface of the device does not support HTTPS/TLS for authent
CVE-2026-25715 9.8 0.06% 1 0 2026-02-20T18:57:15.973000 The web management interface of the device allows the administrator username an
CVE-2026-2818 8.2 0.07% 1 0 2026-02-20T18:57:15.973000 A zip-slip path traversal vulnerability in Spring Data Geode's import snapshot f
CVE-2026-27343 7.5 0.11% 1 0 2026-02-20T18:32:34 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-24790 8.2 0.06% 1 0 2026-02-20T18:31:49 The underlying PLC of the device can be remotely influenced, without proper safe
CVE-2026-26048 7.5 0.03% 1 0 2026-02-20T18:31:49 The Wi-Fi router is vulnerable to de-authentication attacks due to the absence
CVE-2026-20761 8.1 0.25% 2 0 2026-02-20T18:31:47 A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and prior, w
CVE-2026-27001 7.8 0.02% 1 0 2026-02-20T18:13:49.913000 OpenClaw is a personal AI assistant. Prior to version 2026.2.15, OpenClaw embedd
CVE-2026-27002 9.8 0.04% 1 0 2026-02-20T18:11:24.263000 OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a configuration
CVE-2026-21535 8.2 0.10% 1 0 2026-02-20T17:39:46.743000 Improper access control in Microsoft Teams allows an unauthorized attacker to di
CVE-2026-26996 None 0.04% 1 0 2026-02-20T16:52:16 ### Summary `minimatch` is vulnerable to Regular Expression Denial of Service (R
CVE-2026-26065 8.8 0.03% 3 0 2026-02-20T16:45:18.507000 calibre is a cross-platform e-book manager for viewing, converting, editing, and
CVE-2025-10970 9.8 0.03% 1 0 2026-02-20T13:49:47.623000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-26050 7.8 0.01% 2 0 2026-02-20T13:49:47.623000 The installer for ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール versions prior to Ver.1.3.7 c
CVE-2026-27476 9.8 0.27% 1 0 2026-02-19T21:30:57 RustFly 2.0.0 contains a command injection vulnerability in its remote UI contro
CVE-2026-26030 10.0 0.08% 2 0 2026-02-19T19:34:15 ### Impact: An RCE vulnerability has been identified in Microsoft Semantic Kerne
CVE-2026-26988 None 0.00% 1 1 2026-02-18T22:30:20 ### Summary *SQL Injection in IPv6 Address Search functionality via `address` pa
CVE-2026-22769 10.0 34.16% 1 0 2026-02-18T18:30:35 Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a
CVE-2026-0714 6.8 0.01% 2 0 2026-02-18T17:55:46.557000 A physical attack vulnerability exists in certain Moxa industrial computers usin
CVE-2026-2548 6.3 1.41% 1 0 2026-02-18T17:52:22.253000 A flaw has been found in WAYOS FBM-220G 24.10.19. This affects the function sub_
CVE-2026-1670 9.8 0.05% 2 0 2026-02-18T17:51:53.510000 The affected products are vulnerable to an unauthenticated API endpoint exposure
CVE-2026-2426 6.5 1.97% 1 0 2026-02-18T12:31:15 The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in a
CVE-2026-26119 8.8 0.07% 1 0 2026-02-18T00:30:22 Improper authentication in Windows Admin Center allows an authorized attacker to
CVE-2026-1731 9.8 49.74% 8 5 template 2026-02-17T13:40:10.320000 BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote
CVE-2026-2544 7.3 2.14% 1 0 2026-02-16T09:30:36 A security flaw has been discovered in yued-fe LuLu UI up to 3.0.0. This issue a
CVE-2026-2533 7.3 2.14% 1 0 2026-02-16T06:31:32 A flaw has been found in Tosei Self-service Washing Machine 4.02. Impacted is an
CVE-2026-24423 9.8 24.64% 1 1 2026-02-06T18:30:29 SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated
CVE-2026-23760 9.8 57.48% 1 2 template 2026-01-27T16:16:55.327000 SmarterTools SmarterMail versions prior to build 9511 contain an authentication
CVE-2025-12543 9.6 0.08% 2 0 2026-01-08T23:15:42.690000 A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBo
CVE-2022-22265 5.0 0.18% 1 0 2025-10-30T15:37:18.257000 An improper check or handling of exceptional conditions in NPU driver prior to S
CVE-2025-61675 0 16.95% 1 3 2025-10-16T15:29:11.563000 FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX
CVE-2025-8277 3.1 0.05% 1 0 2025-09-09T12:30:49 A flaw was found in libssh's handling of key exchange (KEX) processes when a cli
CVE-2025-47809 8.2 0.02% 2 0 2025-05-16T14:42:18.700000 Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately af
CVE-2025-29969 7.5 0.33% 1 1 2025-05-13T18:31:00 Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows
CVE-2026-25989 0 0.00% 2 0 N/A
CVE-2026-26064 0 0.05% 2 0 N/A
CVE-2026-25965 0 0.00% 2 0 N/A
CVE-2026-25985 0 0.00% 2 0 N/A
CVE-2026-24481 0 0.00% 2 0 N/A
CVE-2026-25794 0 0.00% 2 0 N/A
CVE-2025-67733 0 0.00% 4 1 N/A
CVE-2026-27623 0 0.00% 4 0 N/A
CVE-2026-27466 0 0.07% 1 0 N/A
CVE-2026-27471 0 0.04% 1 0 N/A
CVE-2026-27470 0 0.03% 1 1 N/A
CVE-2026-27134 0 0.03% 2 0 N/A
CVE-2025-66039 0 32.61% 1 3 N/A

CVE-2025-40541
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-02-24T08:16:28.220000

2 posts

An Insecure Direct Object Reference (IDOR) vulnerability exists in Serv-U, which when exploited, gives a malicious actor the ability to execute native code as a privileged account. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.

thehackerwire@mastodon.social at 2026-02-24T08:19:21.000Z ##

🔴 CVE-2025-40541 - Critical (9.1)

An Insecure Direct Object Reference (IDOR) vulnerability exists in Serv-U, which when exploited, gives a malicious actor the ability to execute native code as a privileged account.

This issue requires administrative privileges to abuse. On Window...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T08:19:21.000Z ##

🔴 CVE-2025-40541 - Critical (9.1)

An Insecure Direct Object Reference (IDOR) vulnerability exists in Serv-U, which when exploited, gives a malicious actor the ability to execute native code as a privileged account.

This issue requires administrative privileges to abuse. On Window...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40540
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-02-24T08:16:28.053000

2 posts

A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.

thehackerwire@mastodon.social at 2026-02-24T08:19:11.000Z ##

🔴 CVE-2025-40540 - Critical (9.1)

A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account.

This issue requires administrative privileges to abuse. On Windows deployments, the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T08:19:11.000Z ##

🔴 CVE-2025-40540 - Critical (9.1)

A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account.

This issue requires administrative privileges to abuse. On Windows deployments, the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40539
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-02-24T08:16:27.863000

2 posts

A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.

thehackerwire@mastodon.social at 2026-02-24T08:20:11.000Z ##

🔴 CVE-2025-40539 - Critical (9.1)

A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account.

This issue requires administrative privileges to abuse. On Windows deployments, the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T08:20:11.000Z ##

🔴 CVE-2025-40539 - Critical (9.1)

A type confusion vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to execute arbitrary native code as privileged account.

This issue requires administrative privileges to abuse. On Windows deployments, the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40538
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-02-24T08:16:27.627000

2 posts

A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via domain admin or group admin privileges. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privile

thehackerwire@mastodon.social at 2026-02-24T08:19:32.000Z ##

🔴 CVE-2025-40538 - Critical (9.1)

A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via domain admin or group admin privileges.

This iss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T08:19:32.000Z ##

🔴 CVE-2025-40538 - Critical (9.1)

A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via domain admin or group admin privileges.

This iss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13942
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-24T03:30:27

2 posts

A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UPnP SOAP requests.

thehackerwire@mastodon.social at 2026-02-24T04:00:41.000Z ##

🔴 CVE-2025-13942 - Critical (9.8)

A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UP...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T04:00:41.000Z ##

🔴 CVE-2025-13942 - Critical (9.8)

A command injection vulnerability in the UPnP function of the Zyxel EX3510-B0 firmware versions through 5.17(ABUP.15.1)C0 could allow a remote attacker to execute operating system (OS) commands on an affected device by sending specially crafted UP...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27127
(0 None)

EPSS: 0.00%

updated 2026-02-24T03:16:02.440000

2 posts

Craft is a content management system (CMS). In versions 4.5.0-RC1 through 4.16.18 and 5.0.0-RC1 through 5.8.22, the SSRF validation in Craft CMS’s GraphQL Asset mutation performs DNS resolution separately from the HTTP request. This Time-of-Check-Time-of-Use (TOCTOU) vulnerability enables DNS rebinding attacks, where an attacker’s DNS server returns different IP addresses for validation compared t

offseq at 2026-02-24T07:30:32.066Z ##

🔍 HIGH severity: CVE-2026-27127 in Craft CMS (4.5.0-RC1 – 4.16.18, 5.0.0-RC1 – 5.8.22) enables DNS rebinding via TOCTOU in GraphQL Asset mutation. Patch to 4.16.19/5.8.23+ & review GraphQL permissions. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-24T07:30:32.000Z ##

🔍 HIGH severity: CVE-2026-27127 in Craft CMS (4.5.0-RC1 – 4.16.18, 5.0.0-RC1 – 5.8.22) enables DNS rebinding via TOCTOU in GraphQL Asset mutation. Patch to 4.16.19/5.8.23+ & review GraphQL permissions. radar.offseq.com/threat/cve-20 #OffSeq #CraftCMS #SSRF #Vuln

##

CVE-2026-26331
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-24T03:16:01.710000

2 posts

yt-dlp is a command-line audio/video downloader. Starting in version 2023.06.21 and prior to version 2026.02.21, when yt-dlp's `--netrc-cmd` command-line option (or `netrc_cmd` Python API parameter) is used, an attacker could achieve arbitrary command injection on the user's system with a maliciously crafted URL. yt-dlp maintainers assume the impact of this vulnerability to be high for anyone who

1 repos

https://github.com/dxlerYT/CVE-2026-26331

thehackerwire@mastodon.social at 2026-02-24T04:00:13.000Z ##

🟠 CVE-2026-26331 - High (8.8)

yt-dlp is a command-line audio/video downloader. Starting in version 2023.06.21 and prior to version 2026.02.21, when yt-dlp's `--netrc-cmd` command-line option (or `netrc_cmd` Python API parameter) is used, an attacker could achieve arbitrary com...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T04:00:13.000Z ##

🟠 CVE-2026-26331 - High (8.8)

yt-dlp is a command-line audio/video downloader. Starting in version 2023.06.21 and prior to version 2026.02.21, when yt-dlp's `--netrc-cmd` command-line option (or `netrc_cmd` Python API parameter) is used, an attacker could achieve arbitrary com...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26198
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-02-24T03:16:01.100000

4 posts

Ormar is a async mini ORM for Python. In versions 0.9.9 through 0.22.0, when performing aggregate queries, Ormar ORM constructs SQL expressions by passing user-supplied column names directly into `sqlalchemy.text()` without any validation or sanitization. The `min()` and `max()` methods in the `QuerySet` class accept arbitrary string input as the column parameter. While `sum()` and `avg()` are par

offseq at 2026-02-24T04:30:28.325Z ##

🛡️ CVE-2026-26198: CRITICAL SQLi in Ormar Python ORM (0.9.9 – 0.22.0). min() & max() allow injection — no auth needed! Patch with v0.23.0+. Audit & monitor now. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-24T04:00:03.000Z ##

🔴 CVE-2026-26198 - Critical (9.8)

Ormar is a async mini ORM for Python. In versions 0.9.9 through 0.22.0, when performing aggregate queries, Ormar ORM constructs SQL expressions by passing user-supplied column names directly into `sqlalchemy.text()` without any validation or sanit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-24T04:30:28.000Z ##

🛡️ CVE-2026-26198: CRITICAL SQLi in Ormar Python ORM (0.9.9 – 0.22.0). min() & max() allow injection — no auth needed! Patch with v0.23.0+. Audit & monitor now. Details: radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Python

##

thehackerwire@mastodon.social at 2026-02-24T04:00:03.000Z ##

🔴 CVE-2026-26198 - Critical (9.8)

Ormar is a async mini ORM for Python. In versions 0.9.9 through 0.22.0, when performing aggregate queries, Ormar ORM constructs SQL expressions by passing user-supplied column names directly into `sqlalchemy.text()` without any validation or sanit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1459
(7.2 HIGH)

EPSS: 0.00%

updated 2026-02-24T03:16:00.587000

2 posts

A post-authentication command injection vulnerability in the TR-369 certificate download CGI program of the Zyxel VMG3625-T50B firmware versions through 5.50(ABPM.9.7)C0 could allow an authenticated attacker with administrator privileges to execute operating system (OS) commands on an affected device.

offseq at 2026-02-24T06:00:31.039Z ##

⚠️ CVE-2026-1459: HIGH-severity OS command injection in Zyxel VMG3625-T50B firmware ≤5.50(ABPM.9.7)C0. Authenticated admin can run arbitrary commands. Restrict admin access & monitor. Patch ASAP when released! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-24T06:00:31.000Z ##

⚠️ CVE-2026-1459: HIGH-severity OS command injection in Zyxel VMG3625-T50B firmware ≤5.50(ABPM.9.7)C0. Authenticated admin can run arbitrary commands. Restrict admin access & monitor. Patch ASAP when released! radar.offseq.com/threat/cve-20 #OffSeq #Zyxel #CVE20261459 #InfoSec

##

CVE-2025-13943
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-24T03:16:00.407000

4 posts

A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7)C0 could allow an authenticated attacker to execute operating system (OS) commands on an affected device.

thehackerwire@mastodon.social at 2026-02-24T04:09:35.000Z ##

🟠 CVE-2025-13943 - High (8.8)

A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7)C0 could allow an authenticated attacker to execute operating system (OS) commands on an affected...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T04:00:46.000Z ##

🟠 CVE-2025-13943 - High (8.8)

A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7)C0 could allow an authenticated attacker to execute operating system (OS) commands on an affected...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T04:09:35.000Z ##

🟠 CVE-2025-13943 - High (8.8)

A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7)C0 could allow an authenticated attacker to execute operating system (OS) commands on an affected...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T04:00:46.000Z ##

🟠 CVE-2025-13943 - High (8.8)

A post-authentication command injection vulnerability in the log file download function of the Zyxel EX3301-T0 firmware versions through 5.50(ABVY.7)C0 could allow an authenticated attacker to execute operating system (OS) commands on an affected...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25802
(7.6 HIGH)

EPSS: 0.00%

updated 2026-02-24T01:16:14.927000

4 posts

New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.10.8-alpha.9, a potential unsafe operation occurs in component `MarkdownRenderer.jsx`, allowing for Cross-Site Scripting(XSS) when the model outputs items containing `<script>` tag. Version 0.10.8-alpha.9 fixes the issue.

offseq at 2026-02-24T03:00:29.767Z ##

🛡️ HIGH-severity XSS (CVE-2026-25802) in QuantumNous new-api (<0.10.8-alpha.9): Unsafe MarkdownRenderer.jsx allows script injection with user interaction. Upgrade ASAP & implement CSP! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-24T01:19:11.000Z ##

🟠 CVE-2026-25802 - High (7.6)

New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.10.8-alpha.9, a potential unsafe operation occurs in component `MarkdownRenderer.jsx`, allowing for Cross-Site Scripting(XS...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-24T03:00:29.000Z ##

🛡️ HIGH-severity XSS (CVE-2026-25802) in QuantumNous new-api (<0.10.8-alpha.9): Unsafe MarkdownRenderer.jsx allows script injection with user interaction. Upgrade ASAP & implement CSP! radar.offseq.com/threat/cve-20 #OffSeq #XSS #InfoSec #AIsecurity

##

thehackerwire@mastodon.social at 2026-02-24T01:19:11.000Z ##

🟠 CVE-2026-25802 - High (7.6)

New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.10.8-alpha.9, a potential unsafe operation occurs in component `MarkdownRenderer.jsx`, allowing for Cross-Site Scripting(XS...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25591
(0 None)

EPSS: 0.00%

updated 2026-02-24T01:16:13.457000

2 posts

New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.10.8-alpha.10, a SQL LIKE wildcard injection vulnerability in the `/api/token/search` endpoint allows authenticated users to cause denial of service through resource exhaustion by crafting malicious search patterns. The token search endpoint accepts user-supplied `keyword` an

offseq at 2026-02-24T09:00:28.169Z ##

🚨 CVE-2026-25591 (HIGH): QuantumNous new-api <0.10.8-alpha.10 vulnerable to SQL LIKE wildcard injection in /api/token/search. Auth users can cause DoS via crafted search patterns. Patch ASAP! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-24T09:00:28.000Z ##

🚨 CVE-2026-25591 (HIGH): QuantumNous new-api <0.10.8-alpha.10 vulnerable to SQL LIKE wildcard injection in /api/token/search. Auth users can cause DoS via crafted search patterns. Patch ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #SQLInjection #Vulnerability

##

CVE-2026-24485
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-24T01:16:12.757000

2 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, when a PCD file does not contain a valid Sync marker, the DecodeImage() function becomes trapped in an infinite loop while searching for the Sync marker, causing the program to become unresponsive and continuously consume CPU resources, ultimately leading to syst

thehackerwire@mastodon.social at 2026-02-24T01:36:16.000Z ##

🟠 CVE-2026-24485 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, when a PCD file does not contain a valid Sync marker, the DecodeImage() function becomes trapped in an infinit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T01:36:16.000Z ##

🟠 CVE-2026-24485 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, when a PCD file does not contain a valid Sync marker, the DecodeImage() function becomes trapped in an infinit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3044
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-24T00:16:19.420000

2 posts

A vulnerability has been found in Tenda AC8 16.03.34.06. This affects the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component Httpd Service. The manipulation of the argument boundary leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-02-24T00:17:14.000Z ##

🟠 CVE-2026-3044 - High (8.8)

A vulnerability has been found in Tenda AC8 16.03.34.06. This affects the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component Httpd Service. The manipulation of the argument boundary leads to stack-based buffer overflow. I...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T00:17:14.000Z ##

🟠 CVE-2026-3044 - High (8.8)

A vulnerability has been found in Tenda AC8 16.03.34.06. This affects the function webCgiGetUploadFile of the file /cgi-bin/UploadCfg of the component Httpd Service. The manipulation of the argument boundary leads to stack-based buffer overflow. I...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27487
(7.6 HIGH)

EPSS: 0.05%

updated 2026-02-23T22:28:28

1 posts

## Summary On macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via `security add-generic-password -w ...`. Because OAuth tokens are user-controlled data, this created an OS command injection risk. The fix avoids invoking a shell by using `execFileSync("security", argv)` and passing the updated keychain payload as a lit

thehackerwire@mastodon.social at 2026-02-21T10:19:44.000Z ##

🟠 CVE-2026-27487 - High (7.6)

OpenClaw is a personal AI assistant. In versions 2026.2.13 and below, when using macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via security add-generic-password -w ....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27198
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T22:27:31

1 posts

### Summary The application fails to properly enforce role-based authorization during account creation. Although the system validates that the specified role exists, it does not verify whether the current user has sufficient privileges to assign highly privileged roles such as admin. As a result, an authenticated user with the editor role can create a new account with administrative privileges, l

thehackerwire@mastodon.social at 2026-02-21T06:18:30.000Z ##

🟠 CVE-2026-27198 - High (8.8)

Formwork is a flat file-based Content Management System (CMS). In versions 2.0.0 through 2.3.3, the application fails to properly enforce role-based authorization during account creation. Although the system validates that the specified role exist...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27192(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-02-23T22:26:42

1 posts

The origin validation uses `startsWith()` for comparison, allowing attackers to bypass the check by registering a domain that shares a common prefix with an allowed origin. The `getAllowedOrigin()` function checks if the Referer header starts with any allowed origin: ```javascript // https://github.com/feathersjs/feathers/blob/dove/packages/authentication-oauth/src/strategy.ts#L75 const allowedOr

offseq@infosec.exchange at 2026-02-21T04:30:27.000Z ##

⚠️ CVE-2026-27192: Feathersjs (<5.0.40) suffers a HIGH-severity origin validation error (CWE-346). Prefix-based checks let attackers steal OAuth tokens, risking account takeover. Upgrade to 5.0.40+! radar.offseq.com/threat/cve-20 #OffSeq #Feathersjs #OAuth #CVE202627192

##

CVE-2026-27196
(8.1 HIGH)

EPSS: 0.02%

updated 2026-02-23T22:26:22

1 posts

## Impact Stored XSS vulnerability in `html` fieldtypes allow authenticated users with field management permissions to inject malicious JavaScript that executes when viewed by higher-privileged users. ## Patches This has been fixed in 6.3.2 and 5.73.9.

thehackerwire@mastodon.social at 2026-02-21T05:21:36.000Z ##

🟠 CVE-2026-27196 - High (8.1)

Statmatic is a Laravel and Git powered content management system (CMS). Versions 5.73.8 and below in addition to 6.0.0-alpha.1 through 6.3.1 have a Stored XSS vulnerability in html fieldtypes which allows authenticated users with field management ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26725
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-02-23T21:32:31

2 posts

An issue in edu Business Solutions Print Shop Pro WebDesk v.18.34 allows a remote attacker to escalate privileges via the AccessID parameter.

thehackerwire@mastodon.social at 2026-02-23T22:00:07.000Z ##

🔴 CVE-2026-26725 - Critical (9.8)

An issue in edu Business Solutions Print Shop Pro WebDesk v.18.34 allows a remote attacker to escalate privileges via the AccessID parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T22:00:07.000Z ##

🔴 CVE-2026-26725 - Critical (9.8)

An issue in edu Business Solutions Print Shop Pro WebDesk v.18.34 allows a remote attacker to escalate privileges via the AccessID parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70329
(8.0 HIGH)

EPSS: 0.00%

updated 2026-02-23T21:31:36

2 posts

TOTOLink X5000R v9.1.0cu_2415_B20250515 contains an OS command injection vulnerability in the setIptvCfg handler of the /usr/sbin/lighttpd executable. The vlanVidLan1 (and other vlanVidLanX) parameters are retrieved via Uci_Get_Str and passed to the CsteSystem function without adequate validation or filtering. This allows an authenticated attacker to execute arbitrary shell commands with root priv

thehackerwire@mastodon.social at 2026-02-23T20:30:42.000Z ##

🟠 CVE-2025-70329 - High (8)

TOTOLink X5000R v9.1.0cu_2415_B20250515 contains an OS command injection vulnerability in the setIptvCfg handler of the /usr/sbin/lighttpd executable. The vlanVidLan1 (and other vlanVidLanX) parameters are retrieved via Uci_Get_Str and passed to t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:30:42.000Z ##

🟠 CVE-2025-70329 - High (8)

TOTOLink X5000R v9.1.0cu_2415_B20250515 contains an OS command injection vulnerability in the setIptvCfg handler of the /usr/sbin/lighttpd executable. The vlanVidLan1 (and other vlanVidLanX) parameters are retrieved via Uci_Get_Str and passed to t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69700
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-23T21:31:30

2 posts

Tenda FH1203 V2.0.1.6 contains a stack-based buffer overflow vulnerability in the modify_add_client_prio function, which is reachable via the formSetClientPrio CGI handler.

thehackerwire@mastodon.social at 2026-02-23T20:30:52.000Z ##

🟠 CVE-2025-69700 - High (7.5)

Tenda FH1203 V2.0.1.6 contains a stack-based buffer overflow vulnerability in the modify_add_client_prio function, which is reachable via the formSetClientPrio CGI handler.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:30:52.000Z ##

🟠 CVE-2025-69700 - High (7.5)

Tenda FH1203 V2.0.1.6 contains a stack-based buffer overflow vulnerability in the modify_add_client_prio function, which is reachable via the formSetClientPrio CGI handler.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70831
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-23T21:31:29

2 posts

A Remote Code Execution (RCE) vulnerability was found in Smanga 3.2.7 in the /php/path/rescan.php interface. The application fails to properly sanitize user-supplied input in the mediaId parameter before using it in a system shell command. This allows an unauthenticated attacker to inject arbitrary operating system commands, leading to complete server compromise.

thehackerwire@mastodon.social at 2026-02-24T00:22:31.000Z ##

🔴 CVE-2025-70831 - Critical (9.8)

A Remote Code Execution (RCE) vulnerability was found in Smanga 3.2.7 in the /php/path/rescan.php interface. The application fails to properly sanitize user-supplied input in the mediaId parameter before using it in a system shell command. This al...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T00:22:31.000Z ##

🔴 CVE-2025-70831 - Critical (9.8)

A Remote Code Execution (RCE) vulnerability was found in Smanga 3.2.7 in the /php/path/rescan.php interface. The application fails to properly sanitize user-supplied input in the mediaId parameter before using it in a system shell command. This al...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26746
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-23T21:31:27

2 posts

OpenSourcePOS 3.4.1 contains a Local File Inclusion (LFI) vulnerability in the Sales.php::getInvoice() function. An attacker can read arbitrary files on the web server by manipulating the Invoice Type configuration. This issue can be chained with the file upload functionality to achieve Remote Code Execution (RCE).

1 repos

https://github.com/hungnqdz/CVE-2026-26746

thehackerwire@mastodon.social at 2026-02-23T22:00:37.000Z ##

🟠 CVE-2026-26746 - High (8.8)

OpenSourcePOS 3.4.1 contains a Local File Inclusion (LFI) vulnerability in the Sales.php::getInvoice() function. An attacker can read arbitrary files on the web server by manipulating the Invoice Type configuration. This issue can be chained with ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T22:00:37.000Z ##

🟠 CVE-2026-26746 - High (8.8)

OpenSourcePOS 3.4.1 contains a Local File Inclusion (LFI) vulnerability in the Sales.php::getInvoice() function. An attacker can read arbitrary files on the web server by manipulating the Invoice Type configuration. This issue can be chained with ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24956
(9.3 CRITICAL)

EPSS: 0.02%

updated 2026-02-23T21:31:26

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Shahjada Download Manager Addons for Elementor wpdm-elementor allows Blind SQL Injection.This issue affects Download Manager Addons for Elementor: from n/a through <= 1.3.0.

thehackerwire@mastodon.social at 2026-02-23T21:05:47.000Z ##

🔴 CVE-2026-24956 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Shahjada Download Manager Addons for Elementor wpdm-elementor allows Blind SQL Injection.This issue affects Download Manager Addons for Elementor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T21:05:47.000Z ##

🔴 CVE-2026-24956 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Shahjada Download Manager Addons for Elementor wpdm-elementor allows Blind SQL Injection.This issue affects Download Manager Addons for Elementor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69393
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-23T21:31:25

2 posts

Missing Authorization vulnerability in Jthemes Exzo exzo allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Exzo: from n/a through <= 1.2.4.

thehackerwire@mastodon.social at 2026-02-24T00:22:41.000Z ##

🟠 CVE-2025-69393 - High (7.5)

Missing Authorization vulnerability in Jthemes Exzo exzo allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Exzo: from n/a through &lt;= 1.2.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T00:22:41.000Z ##

🟠 CVE-2025-69393 - High (7.5)

Missing Authorization vulnerability in Jthemes Exzo exzo allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Exzo: from n/a through &lt;= 1.2.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26724
(7.6 HIGH)

EPSS: 0.06%

updated 2026-02-23T21:31:25

2 posts

Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the selectgroup and gn parameters on the /?Function=Groups endpoint.

thehackerwire@mastodon.social at 2026-02-23T21:59:53.000Z ##

🟠 CVE-2026-26724 - High (7.6)

Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the selectgroup and gn parameters on the /?Function=Groups endpoint.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T21:59:53.000Z ##

🟠 CVE-2026-26724 - High (7.6)

Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the selectgroup and gn parameters on the /?Function=Groups endpoint.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26723
(8.2 HIGH)

EPSS: 0.06%

updated 2026-02-23T21:31:25

2 posts

Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the function parameter.

thehackerwire@mastodon.social at 2026-02-23T21:05:37.000Z ##

🟠 CVE-2026-26723 - High (8.2)

Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the function parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T21:05:37.000Z ##

🟠 CVE-2026-26723 - High (8.2)

Cross Site Scripting vulnerability in Key Systems Inc Global Facilities Management Software v. 20230721a allows a remote attacker to execute arbitrary code via the function parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26747
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-02-23T21:19:12.023000

2 posts

A Host Header Poisoning vulnerability exists in Monica 4.1.2 due to improper handling of the HTTP Host header in app/Providers/AppServiceProvider.php, combined with the default misconfiguration where the "app.force_url" is not set and default is "false". The application generates absolute URLs (such as those used in password reset emails) using the user-supplied Host header. This allows remote att

thehackerwire@mastodon.social at 2026-02-23T21:22:00.000Z ##

🔴 CVE-2026-26747 - Critical (9.1)

A Host Header Poisoning vulnerability exists in Monica 4.1.2 due to improper handling of the HTTP Host header in app/Providers/AppServiceProvider.php, combined with the default misconfiguration where the "app.force_url" is not set and default is "...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T21:22:00.000Z ##

🔴 CVE-2026-26747 - Critical (9.1)

A Host Header Poisoning vulnerability exists in Monica 4.1.2 due to improper handling of the HTTP Host header in app/Providers/AppServiceProvider.php, combined with the default misconfiguration where the "app.force_url" is not set and default is "...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26722
(9.4 CRITICAL)

EPSS: 0.05%

updated 2026-02-23T21:19:11.110000

2 posts

An issue in Key Systems Inc Global Facilities Management Software v.20230721a allows a remote attacker to escalate privileges via PIN component of the login functionality.

thehackerwire@mastodon.social at 2026-02-23T21:59:38.000Z ##

🔴 CVE-2026-26722 - Critical (9.4)

An issue in Key Systems Inc Global Facilities Management Software v.20230721a allows a remote attacker to escalate privileges via PIN component of the login functionality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T21:59:38.000Z ##

🔴 CVE-2026-26722 - Critical (9.4)

An issue in Key Systems Inc Global Facilities Management Software v.20230721a allows a remote attacker to escalate privileges via PIN component of the login functionality.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25648
(8.7 HIGH)

EPSS: 0.00%

updated 2026-02-23T21:19:10.690000

2 posts

Versions of the Traccar open-source GPS tracking system starting with 6.11.1 contain an issue in which authenticated users can execute arbitrary JavaScript in the context of other users' browsers by uploading malicious SVG files as device images. The application accepts SVG file uploads without sanitization and serves them with the `image/svg+xml` Content-Type, allowing embedded JavaScript to exec

thehackerwire@mastodon.social at 2026-02-23T21:21:49.000Z ##

🟠 CVE-2026-25648 - High (8.7)

Versions of the Traccar open-source GPS tracking system starting with 6.11.1 contain an issue in which authenticated users can execute arbitrary JavaScript in the context of other users' browsers by uploading malicious SVG files as device images. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T21:21:49.000Z ##

🟠 CVE-2026-25648 - High (8.7)

Versions of the Traccar open-source GPS tracking system starting with 6.11.1 contain an issue in which authenticated users can execute arbitrary JavaScript in the context of other users' browsers by uploading malicious SVG files as device images. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23693
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-02-23T21:19:10.157000

4 posts

ElementsKit Lite (elementskit-lite) WordPress plugin versions prior to 3.7.9 expose the REST endpoint /wp-json/elementskit/v1/widget/mailchimp/subscribe without authentication. The endpoint accepts client-supplied Mailchimp API credentials and insufficiently validates certain parameters, including the list parameter, when constructing upstream Mailchimp API requests. An unauthenticated attacker ca

offseq at 2026-02-24T01:30:31.042Z ##

⚠️ CVE-2026-23693 (CRITICAL, CVSS 9.3) in ElementsKit Lite <3.7.9 exposes a Mailchimp REST endpoint to unauth’d abuse — risking API quota exhaustion & data manipulation. Patch ASAP & block /wp-json/elementskit/v1/widget/mailchimp/subscribe. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-23T21:21:38.000Z ##

🔴 CVE-2026-23693 - Critical (10)

ElementsKit Lite (elementskit-lite) WordPress plugin versions prior to 3.7.9 expose the REST endpoint /wp-json/elementskit/v1/widget/mailchimp/subscribe without authentication. The endpoint accepts client-supplied Mailchimp API credentials and ins...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-24T01:30:31.000Z ##

⚠️ CVE-2026-23693 (CRITICAL, CVSS 9.3) in ElementsKit Lite <3.7.9 exposes a Mailchimp REST endpoint to unauth’d abuse — risking API quota exhaustion & data manipulation. Patch ASAP & block /wp-json/elementskit/v1/widget/mailchimp/subscribe. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

thehackerwire@mastodon.social at 2026-02-23T21:21:38.000Z ##

🔴 CVE-2026-23693 - Critical (10)

ElementsKit Lite (elementskit-lite) WordPress plugin versions prior to 3.7.9 expose the REST endpoint /wp-json/elementskit/v1/widget/mailchimp/subscribe without authentication. The endpoint accepts client-supplied Mailchimp API credentials and ins...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69380
(7.5 HIGH)

EPSS: 0.02%

updated 2026-02-23T21:19:08.670000

2 posts

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in vanquish Upload Files Anywhere wp-upload-files-anywhere allows Path Traversal.This issue affects Upload Files Anywhere: from n/a through <= 2.8.

thehackerwire@mastodon.social at 2026-02-24T00:22:50.000Z ##

🟠 CVE-2025-69380 - High (7.5)

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in vanquish Upload Files Anywhere wp-upload-files-anywhere allows Path Traversal.This issue affects Upload Files Anywhere: from n/a through &lt;= 2.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T00:22:50.000Z ##

🟠 CVE-2025-69380 - High (7.5)

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in vanquish Upload Files Anywhere wp-upload-files-anywhere allows Path Traversal.This issue affects Upload Files Anywhere: from n/a through &lt;= 2.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2870
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-23T21:00:00.257000

1 posts

A security flaw has been discovered in Tenda A21 1.0.0.0. Affected by this issue is the function set_qosMib_list of the file /goform/formSetQosBand. The manipulation of the argument list results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-02-21T15:25:18.000Z ##

🟠 CVE-2026-2870 - High (8.8)

A security flaw has been discovered in Tenda A21 1.0.0.0. Affected by this issue is the function set_qosMib_list of the file /goform/formSetQosBand. The manipulation of the argument list results in stack-based buffer overflow. The attack can be ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2873
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-23T20:56:58.853000

1 posts

A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-02-21T17:16:37.000Z ##

🟠 CVE-2026-2873 - High (8.8)

A vulnerability was detected in Tenda A21 1.0.0.0. This issue affects the function setSchedWifi of the file /goform/openSchedWifi. Performing a manipulation of the argument schedStartTime/schedEndTime results in stack-based buffer overflow. It is ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27169
(8.9 HIGH)

EPSS: 0.04%

updated 2026-02-23T20:50:36.870000

1 posts

OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Versions 1.1.2-alpha and below render untrusted user/model content in chat tool UI surfaces using unsafe HTML interpolation patterns, leading to XSS. Stored content can execute JavaScript when later viewed in authenticated sessions. An attacker who can influence stored study/quiz/flashcard conte

thehackerwire@mastodon.social at 2026-02-21T00:17:15.000Z ##

🟠 CVE-2026-27169 - High (8.9)

OpenSift is an AI study tool that sifts through large datasets using semantic search and generative AI. Versions 1.1.2-alpha and below render untrusted user/model content in chat tool UI surfaces using unsafe HTML interpolation patterns, leading t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27194
(9.8 CRITICAL)

EPSS: 0.51%

updated 2026-02-23T20:47:29.423000

2 posts

D-Tale is a visualizer for pandas data structures. Versions prior to 3.20.0 are vulnerable to Remote Code Execution through the /save-column-filter endpoint. Users hosting D-Tale publicly can be vulnerable to remote code execution allowing attackers to run malicious code on the server. This issue has been fixed in version 3.20.0.

thehackerwire@mastodon.social at 2026-02-23T21:02:06.000Z ##

🔴 CVE-2026-27194 - Critical (9.8)

D-Tale is a visualizer for pandas data structures. Versions prior to 3.20.0 are vulnerable to Remote Code Execution through the /save-column-filter endpoint. Users hosting D-Tale publicly can be vulnerable to remote code execution allowing attacke...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T21:02:06.000Z ##

🔴 CVE-2026-27194 - Critical (9.8)

D-Tale is a visualizer for pandas data structures. Versions prior to 3.20.0 are vulnerable to Remote Code Execution through the /save-column-filter endpoint. Users hosting D-Tale publicly can be vulnerable to remote code execution allowing attacke...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27197
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-02-23T20:45:01.957000

2 posts

Sentry is a developer-first error tracking and performance monitoring tool. Versions 21.12.0 through 26.1.0 have a critical vulnerability in its SAML SSO implementation which allows an attacker to take over any user account by using a malicious SAML Identity Provider and another organization on the same Sentry instance. Self-hosted users are only at risk if the following criteria is met: ore than

offseq@infosec.exchange at 2026-02-21T06:00:28.000Z ##

🚨 Critical SAML SSO vuln (CVE-2026-27197, CVSS 9.1) in Sentry 21.12.0 – 26.1.0 allows remote account takeover in multi-org instances. Upgrade to 26.2.0+, enable user 2FA, audit SSO settings! Full details: radar.offseq.com/threat/cve-20 #OffSeq #Sentry #CVE202627197 #infosec

##

thehackerwire@mastodon.social at 2026-02-21T05:21:46.000Z ##

🔴 CVE-2026-27197 - Critical (9.1)

Sentry is a developer-first error tracking and performance monitoring tool. Versions 21.12.0 through 26.1.0 have a critical vulnerability in its SAML SSO implementation which allows an attacker to take over any user account by using a malicious S...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27574
(9.9 CRITICAL)

EPSS: 0.05%

updated 2026-02-23T20:36:09.117000

1 posts

OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's node:vm module (explicitly documented as not a security mechanism) to execute user-supplied code, allowing trivial sandbox escape via a well-known one-liner that grants full access to the underlying process. Because the probe runs with host networking

1 repos

https://github.com/mbanyamer/CVE-2026-27574-OneUptime-RCE

thehackerwire@mastodon.social at 2026-02-21T11:18:41.000Z ##

🔴 CVE-2026-27574 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. In versions 9.5.13 and below, custom JavaScript monitor feature uses Node.js's node:vm module (explicitly documented as not a security mechanism) to execute user-supplied code, a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2588
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-02-23T20:28:55.517000

2 posts

Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw on 32-bit systems. Sodium.xs casts a STRLEN (size_t) to unsigned long long when passing a length pointer to libsodium functions. On 32-bit systems size_t is typically 32-bits while an unsigned long long is at least 64-bits.

thehackerwire@mastodon.social at 2026-02-23T20:31:03.000Z ##

🔴 CVE-2026-2588 - Critical (9.1)

Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw on 32-bit systems.

Sodium.xs casts a STRLEN (size_t) to unsigned long long when passing a length pointer to libsodium functions. On 32-bit systems size_t is typical...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:31:03.000Z ##

🔴 CVE-2026-2588 - Critical (9.1)

Crypt::NaCl::Sodium versions through 2.001 for Perl has an integer overflow flaw on 32-bit systems.

Sodium.xs casts a STRLEN (size_t) to unsigned long long when passing a length pointer to libsodium functions. On 32-bit systems size_t is typical...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21863
(7.5 HIGH)

EPSS: 0.00%

updated 2026-02-23T20:28:53.853000

4 posts

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extension packet is located within buffer of the cluste

thehackerwire@mastodon.social at 2026-02-23T20:32:44.000Z ##

🟠 CVE-2026-21863 - High (7.5)

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the syste...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:30:46.000Z ##

🟠 CVE-2026-21863 - High (7.5)

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the syste...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:32:44.000Z ##

🟠 CVE-2026-21863 - High (7.5)

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the syste...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:30:46.000Z ##

🟠 CVE-2026-21863 - High (7.5)

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the syste...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2857
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T20:26:36.483000

1 posts

A vulnerability was determined in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_423E00 of the file /boafrm/formPortFw of the component Port Forwarding Configuration Endpoint. This manipulation of the argument submit-url causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-02-21T00:17:44.000Z ##

🟠 CVE-2026-2857 - High (8.8)

A vulnerability was determined in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_423E00 of the file /boafrm/formPortFw of the component Port Forwarding Configuration Endpoint. This manipulation of the argument submit-url cause...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2881
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T20:25:52.360000

1 posts

A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_425FF8 of the file /boafrm/formFirewallAdv of the component Advanced Firewall Configuration Endpoint. Such manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-02-21T20:24:13.000Z ##

🟠 CVE-2026-2881 - High (8.8)

A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_425FF8 of the file /boafrm/formFirewallAdv of the component Advanced Firewall Configuration Endpoint. Such manipulation of the argument submit-u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2905
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-23T20:22:10.010000

1 posts

A vulnerability was identified in Tenda HG9 300001138. This impacts an unknown function of the file /boaform/formWlanSetup of the component Wireless Configuration Endpoint. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-02-22T02:25:23.000Z ##

🟠 CVE-2026-2905 - High (8.8)

A vulnerability was identified in Tenda HG9 300001138. This impacts an unknown function of the file /boaform/formWlanSetup of the component Wireless Configuration Endpoint. The manipulation of the argument ssid leads to stack-based buffer overflow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2906
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-23T20:22:01.890000

1 posts

A security flaw has been discovered in Tenda HG9 300001138. Affected is an unknown function of the file /boaform/formSamba of the component Samba Configuration Endpoint. The manipulation of the argument sambaCap results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-02-22T02:18:33.000Z ##

🟠 CVE-2026-2906 - High (8.8)

A security flaw has been discovered in Tenda HG9 300001138. Affected is an unknown function of the file /boaform/formSamba of the component Samba Configuration Endpoint. The manipulation of the argument sambaCap results in stack-based buffer overf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2874
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-23T20:09:11.397000

1 posts

A flaw has been found in Tenda A21 1.0.0.0. Impacted is the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. Executing a manipulation of the argument ssid can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-02-21T18:19:52.000Z ##

🟠 CVE-2026-2874 - High (8.8)

A flaw has been found in Tenda A21 1.0.0.0. Impacted is the function form_fast_setting_wifi_set of the file /goform/fast_setting_wifi_set. Executing a manipulation of the argument ssid can lead to stack-based buffer overflow. It is possible to lau...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2883
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-23T19:41:14.377000

1 posts

A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_427D74 of the file /boafrm/formIpQoS. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-02-21T20:24:03.000Z ##

🟠 CVE-2026-2883 - High (8.8)

A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_427D74 of the file /boafrm/formIpQoS. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2885
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T19:37:28.037000

2 posts

A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-02-21T21:19:16.000Z ##

🟠 CVE-2026-2885 - High (8.8)

A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T21:18:50.000Z ##

🟠 CVE-2026-2885 - High (8.8)

A security flaw has been discovered in D-Link DWR-M960 1.01.07. The impacted element is the function sub_469104 of the file /boafrm/formIpv6Setup. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2925
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T19:36:36.873000

2 posts

A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_42B5A0 of the file /boafrm/formBridgeVlan of the component Bridge VLAN Configuration Endpoint. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-02-22T04:30:27.000Z ##

🔎 HIGH severity: D-Link DWR-M960 v1.01.07 vulnerable to stack-based buffer overflow (CVE-2026-2925) via Bridge VLAN config. Remote exploit now public — monitor exposure & await patches. radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln

##

thehackerwire@mastodon.social at 2026-02-22T04:20:12.000Z ##

🟠 CVE-2026-2925 - High (8.8)

A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_42B5A0 of the file /boafrm/formBridgeVlan of the component Bridge VLAN Configuration Endpoint. Performing a manipulation of the argument submit-url...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2926
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T19:35:45.083000

2 posts

A flaw has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4237AC of the file /boafrm/formLteSetup of the component LTE Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.

offseq@infosec.exchange at 2026-02-22T10:30:29.000Z ##

CVE-2026-2926: HIGH-severity stack buffer overflow in D-Link DWR-M960 v1.01.07. Remote, unauthenticated code execution possible. Public PoC released — no vendor patch yet. Isolate devices, monitor endpoints, restrict access. Details: radar.offseq.com/threat/cve-20 #OffSeq #DLink #Infosec

##

thehackerwire@mastodon.social at 2026-02-22T05:26:57.000Z ##

🟠 CVE-2026-2926 - High (8.8)

A flaw has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4237AC of the file /boafrm/formLteSetup of the component LTE Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2928
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-23T19:29:03.767000

2 posts

A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_452CCC of the file /boafrm/formWlEncrypt of the component WLAN Encryption Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.

offseq@infosec.exchange at 2026-02-22T07:30:27.000Z ##

CVE-2026-2928: HIGH-severity stack buffer overflow in D-Link DWR-M960 (v1.01.07) enables remote code execution — no auth needed. Public exploit code is out. Isolate & restrict access, monitor for attacks, patch ASAP. radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln #BlueTeam

##

thehackerwire@mastodon.social at 2026-02-22T05:26:48.000Z ##

🟠 CVE-2026-2928 - High (8.8)

A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_452CCC of the file /boafrm/formWlEncrypt of the component WLAN Encryption Configuration Endpoint. The manipulation of the argument submit-url results in stac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70833
(9.4 CRITICAL)

EPSS: 0.04%

updated 2026-02-23T19:22:57.587000

2 posts

An Authentication Bypass vulnerability in Smanga 3.2.7 allows an unauthenticated attacker to reset the password of any user (including the administrator) and fully takeover the account by manipulating POST parameters. The issue stems from insecure permission validation in check-power.php.

thehackerwire@mastodon.social at 2026-02-23T19:32:56.000Z ##

🔴 CVE-2025-70833 - Critical (9.4)

An Authentication Bypass vulnerability in Smanga 3.2.7 allows an unauthenticated attacker to reset the password of any user (including the administrator) and fully takeover the account by manipulating POST parameters. The issue stems from insecure...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T19:32:56.000Z ##

🔴 CVE-2025-70833 - Critical (9.4)

An Authentication Bypass vulnerability in Smanga 3.2.7 allows an unauthenticated attacker to reset the password of any user (including the administrator) and fully takeover the account by manipulating POST parameters. The issue stems from insecure...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2962
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T19:22:52.810000

2 posts

A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.

offseq@infosec.exchange at 2026-02-23T01:30:30.000Z ##

🛡️ HIGH severity: CVE-2026-2962 impacts D-Link DWR-M960 (1.01.07). Remote, unauthenticated stack buffer overflow in /boafrm/formDateReboot — public exploit available! Patch or restrict access immediately. radar.offseq.com/threat/cve-20 #OffSeq #CVE20262962 #DLink #Infosec

##

thehackerwire@mastodon.social at 2026-02-23T01:18:32.000Z ##

🟠 CVE-2026-2962 - High (8.8)

A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. The manipulation of the argument submit-url resul...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70043
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-02-23T18:32:09

2 posts

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in Ayms node-To master. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in TLS socket options

thehackerwire@mastodon.social at 2026-02-23T17:55:24.000Z ##

🔴 CVE-2025-70043 - Critical (9.1)

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in Ayms node-To master. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in TLS socket options

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T17:55:24.000Z ##

🔴 CVE-2025-70043 - Critical (9.1)

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in Ayms node-To master. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in TLS socket options

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22567
(7.6 HIGH)

EPSS: 0.00%

updated 2026-02-23T18:32:03

2 posts

Improper validation of user-supplied input in the ZIA Admin UI could allow an authenticated administrator to initiate backend functions through specific input fields in limited scenarios.

thehackerwire@mastodon.social at 2026-02-23T17:55:12.000Z ##

🟠 CVE-2026-22567 - High (7.6)

Improper validation of user-supplied input in the ZIA Admin UI could allow an authenticated administrator to initiate backend functions through specific input fields in limited scenarios.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T17:55:12.000Z ##

🟠 CVE-2026-22567 - High (7.6)

Improper validation of user-supplied input in the ZIA Admin UI could allow an authenticated administrator to initiate backend functions through specific input fields in limited scenarios.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2033
(8.1 HIGH)

EPSS: 10.53%

updated 2026-02-23T18:14:13.887000

2 posts

MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of artifact file paths. The issue results from the lack of proper validat

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

thehackerwire@mastodon.social at 2026-02-21T00:02:10.000Z ##

🟠 CVE-2026-2033 - High (8.1)

MLflow Tracking Server Artifact Handler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MLflow Tracking Server. Authentication is not requir...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25896
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-02-23T18:14:13.887000

3 posts

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during entity replacement, allowing an attacker to shadow built-in XML entities (&lt;, &gt;, &amp;, &quot;, &apos;) with arbitrary values. This bypasses entity en

endorlabs@mastodon.social at 2026-02-21T17:53:48.000Z ##

CVE-2026-25896 (CVSS 9.3) disclosed in fast-xml-parser

A critical entity encoding bypass affects fast-xml-parser (40M+ weekly npm downloads).
-Allows attackers to shadow built-in XML entities (<, >, &, ", ')
-Can lead to XSS or injection when parsing untrusted XML and rendering the output
-Exploitable with default settings (processEntities: true)
-Impacts >= 4.1.3 and < 5.3.5, including transitive dependencies

Fix: upgrade to v5.3.5+
Advisory: GHSA-m7jm-9gc2-mpf2

endorlabs.com/learn/cve-2026-2

##

offseq@infosec.exchange at 2026-02-21T01:30:31.000Z ##

🚨 CRITICAL: CVE-2026-25896 in fast-xml-parser (<5.3.5) lets attackers override built-in XML entities, enabling XSS via crafted XML. Affects web apps using vulnerable versions. Patch to 5.3.5+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #XSS #NodeJS

##

thehackerwire@mastodon.social at 2026-02-21T00:25:28.000Z ##

🔴 CVE-2026-25896 - Critical (9.3)

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. From 4.1.3to before 5.3.5, a dot (.) in a DOCTYPE entity name is treated as a regex wildcard during en...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24892
(7.5 HIGH)

EPSS: 0.31%

updated 2026-02-23T18:14:13.887000

1 posts

openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus. openITCOCKPIT Community Edition 5.3.1 and earlier contains an unsafe PHP deserialization pattern in the processing of changelog entries. Serialized changelog data derived from attacker-influenced application state is unserialized without restricting allowed classes. Although n

thehackerwire@mastodon.social at 2026-02-21T00:25:18.000Z ##

🟠 CVE-2026-24892 - High (7.5)

openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus. openITCOCKPIT Community Edition 5.3.1 and earlier contains an unsafe PHP deserialization pattern in the processing of change...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0777
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-23T18:14:13.887000

2 posts

Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xmind. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of attachments. When opening an attachm

thehackerwire@mastodon.social at 2026-02-21T00:20:19.000Z ##

🟠 CVE-2026-0777 - High (7.8)

Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xmind. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:24.000Z ##

🟠 CVE-2026-0777 - High (7.8)

Xmind Attachment Insufficient UI Warning Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Xmind. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27190
(8.1 HIGH)

EPSS: 0.16%

updated 2026-02-23T18:14:13.887000

1 posts

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to 2.6.8, a command injection vulnerability exists in Deno's node:child_process implementation. This vulnerability is fixed in 2.6.8.

thehackerwire@mastodon.social at 2026-02-21T00:17:53.000Z ##

🟠 CVE-2026-27190 - High (8.1)

Deno is a JavaScript, TypeScript, and WebAssembly runtime. Prior to 2.6.8, a command injection vulnerability exists in Deno's node:child_process implementation. This vulnerability is fixed in 2.6.8.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2034
(7.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T18:14:13.887000

1 posts

Sante DICOM Viewer Pro DCM File Parsing Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DCM f

thehackerwire@mastodon.social at 2026-02-21T00:02:37.000Z ##

🟠 CVE-2026-2034 - High (7.8)

Sante DICOM Viewer Pro DCM File Parsing Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27112
(0 None)

EPSS: 0.24%

updated 2026-02-23T18:14:13.887000

1 posts

Kargo manages and automates the promotion of software artifacts. From 1.7.0 to before v1.7.8, v1.8.11, and v1.9.3, the batch resource creation endpoints of both Kargo's legacy gRPC API and newer REST API accept multi-document YAML payloads. Specially crafted payloads can manifest a bug present in the logic of both endpoints to inject arbitrary resources (of specific types only) into the underlying

offseq@infosec.exchange at 2026-02-21T00:00:41.000Z ##

🚨 CRITICAL vuln: CVE-2026-27112 in akuity kargo (v1.7.0 – 1.9.2) enables resource injection & privilege escalation via batch API endpoints. Patch to 1.7.8/1.8.11/1.9.3+ ASAP. Monitor logs & restrict API access. radar.offseq.com/threat/cve-20 #OffSeq #Kubernetes #InfoSec

##

CVE-2026-23552
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-02-23T18:13:53.397000

4 posts

Cross-Realm Token Acceptance Bypass in KeycloakSecurityPolicy Apache Camel Keycloak component.  The Camel-Keycloak KeycloakSecurityPolicy does not validate the iss (issuer) claim of JWT tokens against the configured realm. A token issued by one Keycloak realm is silently accepted by a policy configured for a completely different realm, breaking tenant isolation. This issue affects Apache Camel: f

1 repos

https://github.com/oscerd/CVE-2026-23552

offseq at 2026-02-24T00:00:39.518Z ##

🚨 CRITICAL: CVE-2026-23552 in Apache Camel 4.15.0 – 4.17.x breaks tenant isolation — JWT tokens from any Keycloak realm may be accepted! Upgrade to 4.18.0 ASAP to secure multi-tenant systems. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-23T17:09:44.000Z ##

🔴 CVE-2026-23552 - Critical (9.1)

Cross-Realm Token Acceptance Bypass in KeycloakSecurityPolicy Apache Camel Keycloak component. 

The Camel-Keycloak KeycloakSecurityPolicy does not validate the iss (issuer) claim of JWT tokens against the configured realm. A token issued by one ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-24T00:00:39.000Z ##

🚨 CRITICAL: CVE-2026-23552 in Apache Camel 4.15.0 – 4.17.x breaks tenant isolation — JWT tokens from any Keycloak realm may be accepted! Upgrade to 4.18.0 ASAP to secure multi-tenant systems. radar.offseq.com/threat/cve-20 #OffSeq #ApacheCamel #Vuln #Keycloak

##

thehackerwire@mastodon.social at 2026-02-23T17:09:44.000Z ##

🔴 CVE-2026-23552 - Critical (9.1)

Cross-Realm Token Acceptance Bypass in KeycloakSecurityPolicy Apache Camel Keycloak component. 

The Camel-Keycloak KeycloakSecurityPolicy does not validate the iss (issuer) claim of JWT tokens against the configured realm. A token issued by one ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3015
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-23T18:13:53.397000

4 posts

A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/formPolicyRouteConf. Executing a manipulation of the argument GroupName can lead to buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-02-23T17:10:39.000Z ##

🟠 CVE-2026-3015 - High (8.8)

A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/formPolicyRouteConf. Executing a manipulation of the argument GroupName can lead to buffer overflow. The attack may be launche...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T17:09:39.000Z ##

🟠 CVE-2026-3015 - High (8.8)

A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/formPolicyRouteConf. Executing a manipulation of the argument GroupName can lead to buffer overflow. The attack may be launche...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T17:10:39.000Z ##

🟠 CVE-2026-3015 - High (8.8)

A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/formPolicyRouteConf. Executing a manipulation of the argument GroupName can lead to buffer overflow. The attack may be launche...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T17:09:39.000Z ##

🟠 CVE-2026-3015 - High (8.8)

A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/formPolicyRouteConf. Executing a manipulation of the argument GroupName can lead to buffer overflow. The attack may be launche...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3016
(8.8 HIGH)

EPSS: 0.00%

updated 2026-02-23T18:13:53.397000

2 posts

A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. The affected element is the function strcpy of the file /goform/formP2PLimitConfig. The manipulation of the argument except leads to buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-02-23T17:09:35.000Z ##

🟠 CVE-2026-3016 - High (8.8)

A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. The affected element is the function strcpy of the file /goform/formP2PLimitConfig. The manipulation of the argument except leads to buffer overflow. Remote exploitation of the a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T17:09:35.000Z ##

🟠 CVE-2026-3016 - High (8.8)

A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. The affected element is the function strcpy of the file /goform/formP2PLimitConfig. The manipulation of the argument except leads to buffer overflow. Remote exploitation of the a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2981
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T18:13:53.397000

4 posts

A vulnerability was found in UTT HiPER 810G up to 1.7.7-1711. The affected element is the function strcpy of the file /goform/formTaskEdit_ap. The manipulation of the argument txtMin2 results in buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.

offseq at 2026-02-23T10:30:29.786Z ##

🚨 HIGH severity: CVE-2026-2981 affects UTT HiPER 810G ≤1.7.7-1711. Remote, unauthenticated buffer overflow in /goform/formTaskEdit_ap. Exploit code is public — patch unavailable. Restrict access & monitor endpoints! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-02-23T10:01:20.000Z ##

🟠 CVE-2026-2981 - High (8.8)

A vulnerability was found in UTT HiPER 810G up to 1.7.7-1711. The affected element is the function strcpy of the file /goform/formTaskEdit_ap. The manipulation of the argument txtMin2 results in buffer overflow. The attack may be launched remotely...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-23T10:30:29.000Z ##

🚨 HIGH severity: CVE-2026-2981 affects UTT HiPER 810G ≤1.7.7-1711. Remote, unauthenticated buffer overflow in /goform/formTaskEdit_ap. Exploit code is public — patch unavailable. Restrict access & monitor endpoints! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Cybersecurity

##

thehackerwire@mastodon.social at 2026-02-23T10:01:20.000Z ##

🟠 CVE-2026-2981 - High (8.8)

A vulnerability was found in UTT HiPER 810G up to 1.7.7-1711. The affected element is the function strcpy of the file /goform/formTaskEdit_ap. The manipulation of the argument txtMin2 results in buffer overflow. The attack may be launched remotely...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2998
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-23T18:13:53.397000

3 posts

ERP developed by eAI Technologies has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a crafted DLL file in the same directory as the program, thereby executing arbitrary code.

offseq at 2026-02-23T04:30:26.718Z ##

⚠️ CVE-2026-2998 (HIGH): eAI Technologies ERP F2 hit by DLL hijacking (CWE-426), allowing local code execution. No patch yet. Restrict local access, monitor DLLs, and implement whitelisting. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-23T04:30:26.000Z ##

⚠️ CVE-2026-2998 (HIGH): eAI Technologies ERP F2 hit by DLL hijacking (CWE-426), allowing local code execution. No patch yet. Restrict local access, monitor DLLs, and implement whitelisting. Details: radar.offseq.com/threat/cve-20 #OffSeq #Cybersecurity #Vuln #ERP

##

thehackerwire@mastodon.social at 2026-02-23T04:18:33.000Z ##

🟠 CVE-2026-2998 - High (7.8)

ERP developed by eAI Technologies has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a crafted DLL file in the same directory as the program, thereby executing arbitrary code.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24494
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-02-23T18:13:53.397000

2 posts

SQL Injection vulnerability in the /api/integrations/getintegrations endpoint of Order Up Online Ordering System 1.0 allows an unauthenticated attacker to access sensitive backend database data via a crafted store_id parameter in a POST request.

offseq@infosec.exchange at 2026-02-23T03:00:27.000Z ##

⚠️ CVE-2026-24494 (CRITICAL, CVSS 9.8): SQL Injection in Order Up Online Ordering System v1.0 lets unauthenticated attackers run arbitrary SQL via /api/integrations/getintegrations. Patch or mitigate now! radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Vulnerability #Infosec

##

thehackerwire@mastodon.social at 2026-02-23T02:29:18.000Z ##

🔴 CVE-2026-24494 - Critical (9.8)

SQL Injection vulnerability in the /api/integrations/getintegrations endpoint of Order Up Online Ordering System 1.0 allows an unauthenticated attacker to access sensitive backend database data via a crafted store_id parameter in a POST request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2042
(7.2 HIGH)

EPSS: 1.25%

updated 2026-02-23T18:13:53.397000

1 posts

Nagios Host monitoringwizard Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Nagios Host. Authentication is required to exploit this vulnerability. The specific flaw exists within the monitoringwizard module. The issue results from the lack of proper validation of a user-supplied string before

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-2635
(9.8 CRITICAL)

EPSS: 1.17%

updated 2026-02-23T18:13:53.397000

2 posts

MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability. The specific flaw exists within the basic_auth.ini file. The file contains hard-coded default credentials. An attacker can leverage this vulnerability to bypass aut

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

thehackerwire@mastodon.social at 2026-02-21T00:00:13.000Z ##

🔴 CVE-2026-2635 - Critical (9.8)

MLflow Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability.

The specifi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2041
(7.2 HIGH)

EPSS: 1.25%

updated 2026-02-23T18:13:53.397000

1 posts

Nagios Host zabbixagent_configwizard_func Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Nagios Host. Authentication is required to exploit this vulnerability. The specific flaw exists within the zabbixagent_configwizard_func method. The issue results from the lack of proper validation of a u

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-2904
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T18:13:53.397000

2 posts

A vulnerability was determined in UTT HiPER 810G 1.7.7-171114. This affects the function strcpy of the file /goform/ConfigExceptAli. Executing a manipulation can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

offseq@infosec.exchange at 2026-02-22T01:30:28.000Z ##

⚠️ CVE-2026-2904 (HIGH): Buffer overflow in UTT HiPER 810G v1.7.7-171114 via /goform/ConfigExceptAli. Remote, unauthenticated RCE/DoS risk. Public exploit code available — restrict access & monitor. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #NetworkSecurity

##

thehackerwire@mastodon.social at 2026-02-22T01:20:04.000Z ##

🟠 CVE-2026-2904 - High (8.8)

A vulnerability was determined in UTT HiPER 810G 1.7.7-171114. This affects the function strcpy of the file /goform/ConfigExceptAli. Executing a manipulation can lead to buffer overflow. The attack can be launched remotely. The exploit has been pu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27212
(0 None)

EPSS: 0.03%

updated 2026-02-23T18:13:53.397000

1 posts

Swiper is a free and mobile touch slider with hardware accelerated transitions and native behavior. Versions 6.5.1 through 12.1.1 have a Prototype pollution vulnerability. The vulnerability resides in line 94 of shared/utils.mjs, where the indexOf() function is used to check whether user provided input contain forbidden strings. Despite a previous fix that attempted to mitigate prototype pollution

offseq@infosec.exchange at 2026-02-21T10:30:30.000Z ##

🚨 CRITICAL: CVE-2026-27212 in nolimits4web swiper (6.5.1 – 12.1.1) enables prototype pollution, risking auth bypass, DoS, & RCE. Affects Node & Bun, Windows & Linux. Upgrade to 12.1.2 now! radar.offseq.com/threat/cve-20 #OffSeq #CVE202627212 #AppSec #JavaScript

##

CVE-2026-27467
(2.0 LOW)

EPSS: 0.03%

updated 2026-02-23T18:13:53.397000

1 posts

BigBlueButton is an open-source virtual classroom. In versions 3.0.19 and below, when first joining a session with the microphone muted, the client sends audio to the server regardless of mute state. Media is discarded at the server side, so it isn't audible to any participants, but this may allow for malicious server operators to access audio data. The behavior is only incorrect between joining t

0x3e4@cyberplace.social at 2026-02-21T09:18:34.000Z ##

BigBlueButton on < 3.0.22 with two new CVEs today: CVE-2026-27466 & CVE-2026-27467

hecate.pw/vulnerabilities?sear

Feel free to use the AI slop analyses (Gemini for student with free API configured).. Hecate is a prototype app for my master thesis

#vulnerability #cve #security #InfoSec #bigbluebutton

##

CVE-2026-27479
(7.7 HIGH)

EPSS: 0.03%

updated 2026-02-23T18:13:53.397000

1 posts

Wallos is an open-source, self-hostable personal subscription tracker. Versions 4.6.0 and below contain a Server-Side Request Forgery (SSRF) vulnerability in the subscription and payment logo/icon upload functionality. The application validates the IP address of the provided URL before making the request, but allows HTTP redirects (CURLOPT_FOLLOWLOCATION = true), enabling an attacker to bypass the

thehackerwire@mastodon.social at 2026-02-21T09:16:50.000Z ##

🟠 CVE-2026-27479 - High (7.7)

Wallos is an open-source, self-hostable personal subscription tracker. Versions 4.6.0 and below contain a Server-Side Request Forgery (SSRF) vulnerability in the subscription and payment logo/icon upload functionality. The application validates th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27464
(7.7 HIGH)

EPSS: 0.03%

updated 2026-02-23T18:13:53.397000

1 posts

Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. During testing, it was confirmed that a low-privileged user can extract sensitive information including database credentials, into the email body via templ

thehackerwire@mastodon.social at 2026-02-21T08:17:29.000Z ##

🟠 CVE-2026-27464 - High (7.7)

Metabase is an open-source data analytics platform. In versions prior to 0.57.13 and versions 0.58.x through 0.58.6, authenticated users are able to retrieve sensitive information from a Metabase instance, including database access credentials. Du...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27452
(0 None)

EPSS: 0.04%

updated 2026-02-23T18:13:53.397000

1 posts

ASN.1 TypeScript ESM library, including codecs for Basic Encoding Rules (BER) and Distinguished Encoding Rules (DER). In versions 11.0.5 and below, in some cases, decoding an INTEGER could leak the underlying ArrayBuffer. This issue is expected to be fixed in version 11.0.6.

offseq@infosec.exchange at 2026-02-21T07:30:34.000Z ##

🛡️ CRITICAL: CVE-2026-27452 in JonathanWilbur asn1-ts (<=11.0.5) — Decoding INTEGERs may leak ArrayBuffer, exposing sensitive data. Upgrade to 11.0.6 urgently. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Security #CVE202627452

##

CVE-2026-27206
(8.1 HIGH)

EPSS: 0.29%

updated 2026-02-23T18:13:53.397000

1 posts

Zumba Json Serializer is a library to serialize PHP variables in JSON format. In versions 3.2.2 and below, the library allows deserialization of PHP objects from JSON using a special @type field. The deserializer instantiates any class specified in the @type field without restriction. When processing untrusted JSON input, this behavior may allow an attacker to instantiate arbitrary classes availab

thehackerwire@mastodon.social at 2026-02-21T07:17:59.000Z ##

🟠 CVE-2026-27206 - High (8.1)

Zumba Json Serializer is a library to serialize PHP variables in JSON format. In versions 3.2.2 and below, the library allows deserialization of PHP objects from JSON using a special @type field. The deserializer instantiates any class specified i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27168
(8.8 HIGH)

EPSS: 0.02%

updated 2026-02-23T18:13:53.397000

3 posts

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os read directly from the file as the read size in io->strict_read(), and is never compared to the actual size of the destination buffer. An attacker can p

offseq@infosec.exchange at 2026-02-21T03:00:28.000Z ##

⚠️ CVE-2026-27168: HIGH severity heap overflow in HappySeaFox sail (≤0.9.10). Remote code execution possible via crafted XWD files — no patch yet. Audit, block untrusted XWDs, and monitor! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #HappySeaFox #CyberAlert

##

thehackerwire@mastodon.social at 2026-02-21T00:19:57.000Z ##

🟠 CVE-2026-27168 - High (8.8)

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:14.000Z ##

🟠 CVE-2026-27168 - High (8.8)

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. All versions are vulnerable to Heap-based Buffer Overflow through the XWD parser's use of the bytes_per_line value. The value os...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27203
(8.3 HIGH)

EPSS: 0.04%

updated 2026-02-23T18:13:53.397000

1 posts

eBay API MCP Server is an open source local MCP server providing AI assistants with comprehensive access to eBay's Sell APIs. All versions are vulnerable to Environment Variable Injection through the updateEnvFile function. The ebay_set_user_tokens tool allows updating the .env file with new tokens. The updateEnvFile function in src/auth/oauth.ts blindly appends or replaces values without validati

thehackerwire@mastodon.social at 2026-02-21T00:17:04.000Z ##

🟠 CVE-2026-27203 - High (8.3)

eBay API MCP Server is an open source local MCP server providing AI assistants with comprehensive access to eBay's Sell APIs. All versions are vulnerable to Environment Variable Injection through the updateEnvFile function. The ebay_set_user_token...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2044
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-23T18:13:53.397000

1 posts

GIMP PGM File Parsing Uninitialized Memory Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PGM files. The issue results from th

thehackerwire@mastodon.social at 2026-02-21T00:01:51.000Z ##

🟠 CVE-2026-2044 - High (7.8)

GIMP PGM File Parsing Uninitialized Memory Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2047
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-23T18:13:53.397000

1 posts

GIMP ICNS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ICNS files. The issue results

thehackerwire@mastodon.social at 2026-02-20T23:59:53.000Z ##

🟠 CVE-2026-2047 - High (7.8)

GIMP ICNS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabili...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2441
(8.8 HIGH)

EPSS: 0.39%

updated 2026-02-23T13:24:55.920000

7 posts

Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

5 repos

https://github.com/atiilla/CVE-2026-2441_PoC

https://github.com/theemperorspath/CVE-2026-2441-PoC

https://github.com/b1gchoi/CVE-2026-2441_POC

https://github.com/huseyinstif/CVE-2026-2441-PoC

https://github.com/washingtonmaister/CVE-2026-2441

youranonnewsirc@nerdculture.de at 2026-02-24T07:44:38.000Z ##

Recent reports highlight significant activity across global sectors.

**Cybersecurity:** The University of Mississippi Medical Center closed clinics (Feb 23-24) following a ransomware attack. A critical Chromium zero-day (CVE-2026-2441) is actively exploited, mandating urgent patching for browsers. Figure Fintech reported a major 1 million account data breach stemming from a sophisticated vishing attack. The U.S. implemented new CIRCIA regulations, requiring critical infrastructure to report cyber incidents within 72 hours and ransom payments within 24 hours.

**Technology:** Google's $32 billion acquisition of Wiz has received European Commission approval, marking a significant consolidation in cloud security.

**Geopolitics:** U.S.-China competition continues to be a driving force, alongside new U.S. tariffs, contributing to global market volatility.

#Cybersecurity #Geopolitics #TechNews

##

bettycjung.bsky.social@bsky.brid.gy at 2026-02-23T22:08:43.949Z ##

CVE-2026-2441 has the questionable honor of being the first Chrome zero-day of 2026. Google considered it serious enough to issue a separate update of the stable channel for it, rather than wait for the next major release.

##

hackmag at 2026-02-23T19:00:15.731Z ##

⚪ Google Chrome patches first zero‑day vulnerability of the year

🗨️ This week, Google developers released an emergency update for the Chrome browser, patching the first zero-day vulnerability of the year, CVE-2026-2441, which hackers were already exploiting. The company has confirmed the existence of a working exploit for this bug.

🔗 hackmag.com/news/chrome-fisrt-

##

nu11secur1ty at 2026-02-23T12:39:29.943Z ##

patreon.com/posts/cve-2026-244

##

youranonnewsirc@nerdculture.de at 2026-02-24T07:44:38.000Z ##

Recent reports highlight significant activity across global sectors.

**Cybersecurity:** The University of Mississippi Medical Center closed clinics (Feb 23-24) following a ransomware attack. A critical Chromium zero-day (CVE-2026-2441) is actively exploited, mandating urgent patching for browsers. Figure Fintech reported a major 1 million account data breach stemming from a sophisticated vishing attack. The U.S. implemented new CIRCIA regulations, requiring critical infrastructure to report cyber incidents within 72 hours and ransom payments within 24 hours.

**Technology:** Google's $32 billion acquisition of Wiz has received European Commission approval, marking a significant consolidation in cloud security.

**Geopolitics:** U.S.-China competition continues to be a driving force, alongside new U.S. tariffs, contributing to global market volatility.

#Cybersecurity #Geopolitics #TechNews

##

hackmag@infosec.exchange at 2026-02-23T19:00:15.000Z ##

⚪ Google Chrome patches first zero‑day vulnerability of the year

🗨️ This week, Google developers released an emergency update for the Chrome browser, patching the first zero-day vulnerability of the year, CVE-2026-2441, which hackers were already exploiting. The company has confirmed the existence of a working exploit for this bug.

🔗 hackmag.com/news/chrome-fisrt-

#news

##

nu11secur1ty@infosec.exchange at 2026-02-23T12:39:29.000Z ##

patreon.com/posts/cve-2026-244

##

CVE-2025-68461
(7.2 HIGH)

EPSS: 13.54%

updated 2026-02-23T13:24:12.310000

4 posts

Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a Cross-Site-Scripting (XSS) vulnerability via the animate tag in an SVG document.

2 repos

https://github.com/rxerium/CVE-2025-68461

https://github.com/gotr00t0day/CVE-2025-68461

beyondmachines1 at 2026-02-23T16:01:19.656Z ##

CISA Warns of Active Exploitation Targeting Roundcube Webmail Vulnerabilities

CISA has warned of active exploitation targeting two Roundcube Webmail vulnerabilities, including a critical remote code execution flaw (CVE-2025-49113) and a high-severity XSS bug (CVE-2025-68461).

**If you are using Roundcube Webmail, this is important. Upddate to version 1.5.12 or 1.6.12 ASAP. Your webmail interface is under attack.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-02-23T16:01:19.000Z ##

CISA Warns of Active Exploitation Targeting Roundcube Webmail Vulnerabilities

CISA has warned of active exploitation targeting two Roundcube Webmail vulnerabilities, including a critical remote code execution flaw (CVE-2025-49113) and a high-severity XSS bug (CVE-2025-68461).

**If you are using Roundcube Webmail, this is important. Upddate to version 1.5.12 or 1.6.12 ASAP. Your webmail interface is under attack.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-02-20T22:00:20.000Z ##

🚨 [CISA-2026:0220] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-49113 (secdb.nttzen.cloud/cve/detail/)
- Name: RoundCube Webmail Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Roundcube
- Product: Webmail
- Notes: roundcube.net/news/2025/06/01/ ; github.com/roundcube/roundcube ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-68461 (secdb.nttzen.cloud/cve/detail/)
- Name: RoundCube Webmail Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Roundcube
- Product: Webmail
- Notes: roundcube.net/news/2025/12/13/ ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260220 #cisa20260220 #cve_2025_49113 #cve_2025_68461 #cve202549113 #cve202568461

##

cisakevtracker@mastodon.social at 2026-02-20T21:01:15.000Z ##

CVE ID: CVE-2025-68461
Vendor: Roundcube
Product: Webmail
Date Added: 2026-02-20
Notes: roundcube.net/news/2025/12/13/ ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-2980
(7.2 HIGH)

EPSS: 0.04%

updated 2026-02-23T09:31:29

2 posts

A vulnerability has been found in UTT HiPER 810G up to 1.7.7-1711. Impacted is the function strcpy of the file /goform/setSysAdm. The manipulation of the argument passwd1 leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

offseq at 2026-02-23T09:00:30.788Z ##

⚠️ HIGH severity buffer overflow in UTT HiPER 810G (≤1.7.7-1711) — remote exploitation possible via passwd1 in /goform/setSysAdm. Exploit is public. Monitor devices & restrict access until patch available. CVE-2026-2980 radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-23T09:00:30.000Z ##

⚠️ HIGH severity buffer overflow in UTT HiPER 810G (≤1.7.7-1711) — remote exploitation possible via passwd1 in /goform/setSysAdm. Exploit is public. Monitor devices & restrict access until patch available. CVE-2026-2980 radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Infosec

##

CVE-2026-1367
(8.3 HIGH)

EPSS: 0.18%

updated 2026-02-23T09:31:29

2 posts

Zohocorp ManageEngine ADSelfService Plus versions 6522 and below are vulnerable to authenticated SQL Injection in the search report option.

thehackerwire@mastodon.social at 2026-02-23T08:21:06.000Z ##

🟠 CVE-2026-1367 - High (8.3)

Zohocorp ManageEngine ADSelfService Plus versions 6522 and below are vulnerable to authenticated SQL Injection in the search report option.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T08:21:06.000Z ##

🟠 CVE-2026-1367 - High (8.3)

Zohocorp ManageEngine ADSelfService Plus versions 6522 and below are vulnerable to authenticated SQL Injection in the search report option.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2960
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T03:30:27

3 posts

A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.

offseq at 2026-02-23T07:30:27.424Z ##

🛡️ CVE-2026-2960: HIGH severity stack-based buffer overflow in D-Link DWR-M960 (fw 1.01.07). Remote, unauthenticated RCE possible; PoC exploit published. Patch or restrict access now! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-23T07:30:27.000Z ##

🛡️ CVE-2026-2960: HIGH severity stack-based buffer overflow in D-Link DWR-M960 (fw 1.01.07). Remote, unauthenticated RCE possible; PoC exploit published. Patch or restrict access now! radar.offseq.com/threat/cve-20 #OffSeq #DLink #Infosec #Vulnerability

##

thehackerwire@mastodon.social at 2026-02-23T01:18:13.000Z ##

🟠 CVE-2026-2960 - High (8.8)

A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be exe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2961
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T03:30:22

4 posts

A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.

Matchbook3469@mastodon.social at 2026-02-23T11:22:49.000Z ##

⚠️ New security advisory:

CVE-2026-2961 affects multiple systems.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

offseq at 2026-02-23T06:00:32.921Z ##

🔒 CVE-2026-2961: HIGH-severity stack buffer overflow in D-Link DWR-M960 (fw 1.01.07). Remote, unauthenticated exploit possible — public PoC released. Restrict config access & monitor for abuse! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-02-23T06:00:32.000Z ##

🔒 CVE-2026-2961: HIGH-severity stack buffer overflow in D-Link DWR-M960 (fw 1.01.07). Remote, unauthenticated exploit possible — public PoC released. Restrict config access & monitor for abuse! radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln #InfoSec

##

thehackerwire@mastodon.social at 2026-02-23T01:18:22.000Z ##

🟠 CVE-2026-2961 - High (8.8)

A vulnerability has been found in D-Link DWR-M960 1.01.07. This affects the function sub_4196C4 of the file /boafrm/formVpnConfigSetup of the component VPN Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based bu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2958
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T00:30:32

2 posts

A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-02-23T01:01:31.000Z ##

🟠 CVE-2026-2958 - High (8.8)

A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-based buffer overflow. The attack may be launched r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T01:00:22.000Z ##

🟠 CVE-2026-2958 - High (8.8)

A security vulnerability has been detected in D-Link DWR-M960 1.01.07. Affected is the function sub_457C5C of the file /boafrm/formWsc. Such manipulation of the argument save_apply leads to stack-based buffer overflow. The attack may be launched r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2959
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-23T00:30:32

3 posts

A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-02-23T01:00:35.000Z ##

🟠 CVE-2026-2959 - High (8.8)

A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url results in stack-based buffer overflow. Remote ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T01:00:23.000Z ##

🟠 CVE-2026-2959 - High (8.8)

A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url results in stack-based buffer overflow. Remote ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-23T00:00:38.000Z ##

⚠️ HIGH severity: D-Link DWR-M960 v1.01.07 hit by stack-based buffer overflow (CVE-2026-2959) via /boafrm/formNewSchedule. Remote exploitation possible — public exploit available! Assess & monitor. radar.offseq.com/threat/cve-20 #OffSeq #DLink #CVE20262959 #Security

##

CVE-2026-2447
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-22T21:16:00.017000

2 posts

Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, Firefox ESR < 115.32.1, Thunderbird < 140.7.2, and Thunderbird < 147.0.2.

Mozilla@activitypub.awakari.com at 2026-02-19T06:10:18.000Z ## Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147 Mozilla has released an out-of-band security update to address a critical vulnerability affecting its browser. The up...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2026-2447 #CVSS #Firefox #v147 #Mozilla #The

Origin | Interest | Match ##

Mozilla@activitypub.awakari.com at 2026-02-19T06:10:18.000Z ## Mozilla Firefox Issues Emergency Patch for Heap Buffer Overflow in Firefox v147 Mozilla has released an out-of-band security update to address a critical vulnerability affecting its browser. The up...

#Firewall #Daily #Cyber #News #Vulnerabilities #CVE-2026-2447 #CVSS #Firefox #v147 #Mozilla #The

Origin | Interest | Match ##

CVE-2026-2927
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-22T06:30:24

2 posts

A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_462590 of the file /boafrm/formOpMode of the component Operation Mode Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

offseq@infosec.exchange at 2026-02-22T09:00:29.000Z ##

🚨 CVE-2026-2927: HIGH-severity stack buffer overflow in D-Link DWR-M960 (v1.01.07). Remote, unauthenticated RCE risk — exploit details public. Patch or restrict access! More: radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln #BlueTeam

##

thehackerwire@mastodon.social at 2026-02-22T05:26:39.000Z ##

🟠 CVE-2026-2927 - High (8.8)

A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_462590 of the file /boafrm/formOpMode of the component Operation Mode Configuration Endpoint. The manipulation of the argument submit-url leads ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2929
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-22T06:30:24

2 posts

A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_453140 of the file /boafrm/formWlAc of the component Wireless Access Control Endpoint. This manipulation of the argument submit-url causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-02-22T06:18:02.000Z ##

🟠 CVE-2026-2929 - High (8.8)

A vulnerability was determined in D-Link DWR-M960 1.01.07. Impacted is the function sub_453140 of the file /boafrm/formWlAc of the component Wireless Access Control Endpoint. This manipulation of the argument submit-url causes stack-based buffer o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-02-22T06:00:28.000Z ##

⚠️ HIGH severity: Stack-based buffer overflow in D-Link DWR-M960 (v1.01.07) via /boafrm/formWlAc (CVE-2026-2929) enables remote code execution. Public exploit is out — review defenses now! radar.offseq.com/threat/cve-20 #OffSeq #CVE20262929 #DLink #Vuln

##

CVE-2026-2910
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-22T06:30:24

1 posts

A flaw has been found in Tenda HG9 300001138. This vulnerability affects unknown code of the file /boaform/formPing6. Executing a manipulation of the argument pingAddr can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-02-22T04:20:34.000Z ##

🟠 CVE-2026-2910 - High (8.8)

A flaw has been found in Tenda HG9 300001138. This vulnerability affects unknown code of the file /boaform/formPing6. Executing a manipulation of the argument pingAddr can lead to stack-based buffer overflow. The attack may be performed from remot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2911
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-22T06:30:17

1 posts

A vulnerability has been found in Tenda FH451 up to 1.0.0.9. This issue affects some unknown processing of the file /goform/GstDhcpSetSer. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-02-22T04:20:22.000Z ##

🟠 CVE-2026-2911 - High (8.8)

A vulnerability has been found in Tenda FH451 up to 1.0.0.9. This issue affects some unknown processing of the file /goform/GstDhcpSetSer. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2907
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-22T03:30:34

1 posts

A weakness has been identified in Tenda HG9 300001138. Affected by this vulnerability is an unknown functionality of the file /boaform/formgponConf of the component GPON Configuration Endpoint. This manipulation of the argument fmgpon_loid/fmgpon_loid_password causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and co

thehackerwire@mastodon.social at 2026-02-22T02:18:43.000Z ##

🟠 CVE-2026-2907 - High (8.8)

A weakness has been identified in Tenda HG9 300001138. Affected by this vulnerability is an unknown functionality of the file /boaform/formgponConf of the component GPON Configuration Endpoint. This manipulation of the argument fmgpon_loid/fmgpon_...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2909
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-22T03:30:33

2 posts

A vulnerability was detected in Tenda HG9 300001138. This affects an unknown part of the file /boaform/formPing of the component Diagnostic Ping Endpoint. Performing a manipulation of the argument pingAddr results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-02-22T03:00:26.000Z ##

🚨 HIGH-severity (CVSS 8.7): Stack buffer overflow in Tenda HG9 (v300001138) via /boaform/formPing. Remote code execution possible with public exploit available. Restrict access, monitor, and patch ASAP! Details: radar.offseq.com/threat/cve-20 #OffSeq #Infosec #Vuln #IoT

##

thehackerwire@mastodon.social at 2026-02-22T02:18:22.000Z ##

🟠 CVE-2026-2909 - High (8.8)

A vulnerability was detected in Tenda HG9 300001138. This affects an unknown part of the file /boaform/formPing of the component Diagnostic Ping Endpoint. Performing a manipulation of the argument pingAddr results in stack-based buffer overflow. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2908
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-22T03:30:33

1 posts

A security vulnerability has been detected in Tenda HG9 300001138. Affected by this issue is some unknown functionality of the file /boaform/formLoopBack of the component Loopback Detection Configuration Endpoint. Such manipulation of the argument Ethtype leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-02-22T02:25:14.000Z ##

🟠 CVE-2026-2908 - High (8.8)

A security vulnerability has been detected in Tenda HG9 300001138. Affected by this issue is some unknown functionality of the file /boaform/formLoopBack of the component Loopback Detection Configuration Endpoint. Such manipulation of the argument...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2886
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-21T21:30:33

2 posts

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function set_device_name of the file /goform/SetOnlineDevName. This manipulation of the argument devName causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-02-21T21:19:05.000Z ##

🟠 CVE-2026-2886 - High (8.8)

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function set_device_name of the file /goform/SetOnlineDevName. This manipulation of the argument devName causes stack-based buffer overflow. It is possible to initiate the attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T21:18:40.000Z ##

🟠 CVE-2026-2886 - High (8.8)

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function set_device_name of the file /goform/SetOnlineDevName. This manipulation of the argument devName causes stack-based buffer overflow. It is possible to initiate the attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2884
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-21T21:30:33

1 posts

A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element is the function sub_41914C of the file /boafrm/formWanConfigSetup of the component WAN Interface Setting Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-02-21T21:18:45.000Z ##

🟠 CVE-2026-2884 - High (8.8)

A vulnerability was identified in D-Link DWR-M960 1.01.07. The affected element is the function sub_41914C of the file /boafrm/formWanConfigSetup of the component WAN Interface Setting Handler. The manipulation of the argument submit-url leads to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2882
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-21T21:30:27

1 posts

A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_46385C of the file /boafrm/formDosCfg. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-02-21T20:23:52.000Z ##

🟠 CVE-2026-2882 - High (8.8)

A vulnerability was found in D-Link DWR-M960 1.01.07. This issue affects the function sub_46385C of the file /boafrm/formDosCfg. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. Remote exploitation of th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2877
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-21T21:30:27

1 posts

A vulnerability has been found in Tenda A18 15.13.07.13. This affects the function strcpy of the file /goform/WifiExtraSet of the component Httpd Service. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-02-21T19:16:10.000Z ##

🟠 CVE-2026-2877 - High (8.8)

A vulnerability has been found in Tenda A18 15.13.07.13. This affects the function strcpy of the file /goform/WifiExtraSet of the component Httpd Service. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. It is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2876
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-21T18:31:23

1 posts

A vulnerability was determined in Tenda A18 15.13.07.13. This affects the function parse_macfilter_rule of the file /goform/setBlackRule. This manipulation of the argument deviceList causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-02-21T18:19:42.000Z ##

🟠 CVE-2026-2876 - High (8.8)

A vulnerability was determined in Tenda A18 15.13.07.13. This affects the function parse_macfilter_rule of the file /goform/setBlackRule. This manipulation of the argument deviceList causes stack-based buffer overflow. The attack may be initiated ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2871
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-21T18:31:23

1 posts

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of the file /goform/SetIpMacBind. This manipulation of the argument list causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-02-21T17:00:43.000Z ##

🟠 CVE-2026-2871 - High (8.8)

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of the file /goform/SetIpMacBind. This manipulation of the argument list causes stack-based buffer overflow. The attack is possible to be carried out r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2872
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-21T18:31:22

1 posts

A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerability affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. Such manipulation of the argument devName/mac leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-02-21T17:00:52.000Z ##

🟠 CVE-2026-2872 - High (8.8)

A security vulnerability has been detected in Tenda A21 1.0.0.0. This vulnerability affects the function set_device_name of the file /goform/setBlackRule of the component MAC Filtering Configuration Endpoint. Such manipulation of the argument devN...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2019-25441
(9.8 CRITICAL)

EPSS: 2.65%

updated 2026-02-21T00:31:54

1 posts

thesystem 1.0 contains a command injection vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious input to the run_command endpoint. Attackers can send POST requests with shell commands in the command parameter to execute arbitrary code on the server without authentication.

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-2037
(8.8 HIGH)

EPSS: 0.79%

updated 2026-02-21T00:31:54

1 posts

GFI Archiver MArc.Core Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the configuration of the MArc.Core.Remo

thehackerwire@mastodon.social at 2026-02-21T00:03:01.000Z ##

🟠 CVE-2026-2037 - High (8.8)

GFI Archiver MArc.Core Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2036
(8.8 HIGH)

EPSS: 0.79%

updated 2026-02-21T00:31:54

1 posts

GFI Archiver MArc.Store Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the configuration of the MArc.Store.Re

thehackerwire@mastodon.social at 2026-02-21T00:02:50.000Z ##

🟠 CVE-2026-2036 - High (8.8)

GFI Archiver MArc.Store Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Although authentication is required to e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2045
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-21T00:31:54

1 posts

GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XWD files. The issue results from the

thehackerwire@mastodon.social at 2026-02-21T00:02:00.000Z ##

🟠 CVE-2026-2045 - High (7.8)

GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2048
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-21T00:31:54

1 posts

GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XWD files. The issue results from the

thehackerwire@mastodon.social at 2026-02-21T00:00:03.000Z ##

🟠 CVE-2026-2048 - High (7.8)

GIMP XWD File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0797
(7.8 HIGH)

EPSS: 0.06%

updated 2026-02-21T00:31:49

2 posts

GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ICO files. The issue results f

thehackerwire@mastodon.social at 2026-02-21T00:25:09.000Z ##

🟠 CVE-2026-0797 - High (7.8)

GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:33.000Z ##

🟠 CVE-2026-0797 - High (7.8)

GIMP ICO File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1 at 2026-02-23T16:01:19.656Z ##

CISA Warns of Active Exploitation Targeting Roundcube Webmail Vulnerabilities

CISA has warned of active exploitation targeting two Roundcube Webmail vulnerabilities, including a critical remote code execution flaw (CVE-2025-49113) and a high-severity XSS bug (CVE-2025-68461).

**If you are using Roundcube Webmail, this is important. Upddate to version 1.5.12 or 1.6.12 ASAP. Your webmail interface is under attack.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-02-23T16:01:19.000Z ##

CISA Warns of Active Exploitation Targeting Roundcube Webmail Vulnerabilities

CISA has warned of active exploitation targeting two Roundcube Webmail vulnerabilities, including a critical remote code execution flaw (CVE-2025-49113) and a high-severity XSS bug (CVE-2025-68461).

**If you are using Roundcube Webmail, this is important. Upddate to version 1.5.12 or 1.6.12 ASAP. Your webmail interface is under attack.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-02-20T22:00:20.000Z ##

🚨 [CISA-2026:0220] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-49113 (secdb.nttzen.cloud/cve/detail/)
- Name: RoundCube Webmail Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Roundcube
- Product: Webmail
- Notes: roundcube.net/news/2025/06/01/ ; github.com/roundcube/roundcube ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-68461 (secdb.nttzen.cloud/cve/detail/)
- Name: RoundCube Webmail Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Roundcube
- Product: Webmail
- Notes: roundcube.net/news/2025/12/13/ ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260220 #cisa20260220 #cve_2025_49113 #cve_2025_68461 #cve202549113 #cve202568461

##

cisakevtracker@mastodon.social at 2026-02-20T21:00:59.000Z ##

CVE ID: CVE-2025-49113
Vendor: Roundcube
Product: Webmail
Date Added: 2026-02-20
Notes: roundcube.net/news/2025/06/01/ ; github.com/roundcube/roundcube ; github.com/roundcube/roundcube ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-22364
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:32:27

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes SevenTrees seventrees allows PHP Local File Inclusion.This issue affects SevenTrees: from n/a through <=1.0.2.

thehackerwire@mastodon.social at 2026-02-21T00:45:17.000Z ##

🟠 CVE-2026-22364 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes SevenTrees seventrees allows PHP Local File Inclusion.This issue affects SevenTrees: from n/a through &lt;=1.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22370
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:32:27

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Marveland marveland allows PHP Local File Inclusion.This issue affects Marveland: from n/a through <= 1.3.0.

thehackerwire@mastodon.social at 2026-02-21T00:32:08.000Z ##

🟠 CVE-2026-22370 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Marveland marveland allows PHP Local File Inclusion.This issue affects Marveland: from n/a through &lt;= 1.3.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22378
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:32:27

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Blabber blabber allows PHP Local File Inclusion.This issue affects Blabber: from n/a through <= 1.7.0.

thehackerwire@mastodon.social at 2026-02-20T21:01:28.000Z ##

🟠 CVE-2026-22378 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Blabber blabber allows PHP Local File Inclusion.This issue affects Blabber: from n/a through &lt;= 1.7.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24950
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-20T21:32:27

1 posts

Authorization Bypass Through User-Controlled Key vulnerability in themeplugs Authorsy authorsy allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Authorsy: from n/a through <= 1.0.6.

thehackerwire@mastodon.social at 2026-02-20T19:45:24.000Z ##

🟠 CVE-2026-24950 - High (7.5)

Authorization Bypass Through User-Controlled Key vulnerability in themeplugs Authorsy authorsy allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Authorsy: from n/a through &lt;= 1.0.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2856
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-20T21:31:32

1 posts

A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the component Filter Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-02-21T00:17:35.000Z ##

🟠 CVE-2026-2856 - High (8.8)

A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the component Filter Configuration Endpoint. The manipulation of the argument submit-url results in s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2855
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-20T21:31:32

1 posts

A vulnerability has been found in D-Link DWR-M960 1.01.07. Affected is the function sub_4648F0 of the file /boafrm/formDdns of the component DDNS Settings Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-02-20T21:00:30.000Z ##

🟠 CVE-2026-2855 - High (8.8)

A vulnerability has been found in D-Link DWR-M960 1.01.07. Affected is the function sub_4648F0 of the file /boafrm/formDdns of the component DDNS Settings Handler. The manipulation of the argument submit-url leads to stack-based buffer overflow. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2854
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-20T21:31:24

1 posts

A flaw has been found in D-Link DWR-M960 1.01.07. This impacts the function sub_4611CC of the file /boafrm/formNtp of the component NTP Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-02-20T21:00:20.000Z ##

🟠 CVE-2026-2854 - High (8.8)

A flaw has been found in D-Link DWR-M960 1.01.07. This impacts the function sub_4611CC of the file /boafrm/formNtp of the component NTP Configuration Endpoint. Executing a manipulation of the argument submit-url can lead to stack-based buffer over...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2853
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-20T21:31:24

1 posts

A vulnerability was detected in D-Link DWR-M960 1.01.07. This affects the function sub_462E14 of the file /boafrm/formSysLog of the component System Log Configuration Endpoint. Performing a manipulation of the argument submit-url results in stack-based buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-02-20T21:00:10.000Z ##

🟠 CVE-2026-2853 - High (8.8)

A vulnerability was detected in D-Link DWR-M960 1.01.07. This affects the function sub_462E14 of the file /boafrm/formSysLog of the component System Log Configuration Endpoint. Performing a manipulation of the argument submit-url results in stack-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22383
(7.5 HIGH)

EPSS: 0.04%

updated 2026-02-20T21:31:23

1 posts

Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes PawFriends - Pet Shop and Veterinary WordPress Theme pawfriends allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PawFriends - Pet Shop and Veterinary WordPress Theme: from n/a through <= 1.3.

thehackerwire@mastodon.social at 2026-02-21T00:31:58.000Z ##

🟠 CVE-2026-22383 - High (7.5)

Authorization Bypass Through User-Controlled Key vulnerability in Mikado-Themes PawFriends - Pet Shop and Veterinary WordPress Theme pawfriends allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects PawFriends -...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24959
(8.5 HIGH)

EPSS: 0.03%

updated 2026-02-20T21:31:23

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk js-support-ticket allows Blind SQL Injection.This issue affects JS Help Desk: from n/a through <= 3.0.1.

thehackerwire@mastodon.social at 2026-02-20T19:45:33.000Z ##

🟠 CVE-2026-24959 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in JoomSky JS Help Desk js-support-ticket allows Blind SQL Injection.This issue affects JS Help Desk: from n/a through &lt;= 3.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22362
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:31:22

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Photolia photolia allows PHP Local File Inclusion.This issue affects Photolia: from n/a through <= 1.0.3.

thehackerwire@mastodon.social at 2026-02-21T00:44:50.000Z ##

🟠 CVE-2026-22362 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Photolia photolia allows PHP Local File Inclusion.This issue affects Photolia: from n/a through &lt;= 1.0.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22376
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T21:31:22

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Parkivia parkivia allows PHP Local File Inclusion.This issue affects Parkivia: from n/a through <= 1.1.9.

thehackerwire@mastodon.social at 2026-02-20T21:01:18.000Z ##

🟠 CVE-2026-22376 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Parkivia parkivia allows PHP Local File Inclusion.This issue affects Parkivia: from n/a through &lt;= 1.1.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2329
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-02-20T21:31:21

4 posts

An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.

technadu at 2026-02-23T16:24:21.186Z ##

CVE-2026-2329 — Critical VoIP RCE
Affects: Grandstream GXP1600
Type: Stack-based buffer overflow
Impact: Unauthenticated RCE (root)

Attack Path:
• Extract SIP credentials
• Modify SIP proxy settings
• Transparent call interception

Operational risk:
• SMB exposure
• Flat networks
• Insufficient VoIP monitoring

Patch available: Firmware 1.0.7.81.
Community question:
Are you incorporating VoIP firmware into vulnerability scanning pipelines?

Do you log and monitor SIP configuration changes?

Source: securityweek.com/critical-gran

Engage below and follow TechNadu for detailed CVE intelligence and technical breakdowns.

##

technadu@infosec.exchange at 2026-02-23T16:24:21.000Z ##

CVE-2026-2329 — Critical VoIP RCE
Affects: Grandstream GXP1600
Type: Stack-based buffer overflow
Impact: Unauthenticated RCE (root)

Attack Path:
• Extract SIP credentials
• Modify SIP proxy settings
• Transparent call interception

Operational risk:
• SMB exposure
• Flat networks
• Insufficient VoIP monitoring

Patch available: Firmware 1.0.7.81.
Community question:
Are you incorporating VoIP firmware into vulnerability scanning pipelines?

Do you log and monitor SIP configuration changes?

Source: securityweek.com/critical-gran

Engage below and follow TechNadu for detailed CVE intelligence and technical breakdowns.

#ThreatIntel #VoIPSecurity #CVE20262329 #RCE #VulnerabilityManagement #NetworkDefense #Infosec #CyberRisk

##

offseq@infosec.exchange at 2026-02-22T00:00:38.000Z ##

CRITICAL: Grandstream VoIP phones hit by unauthenticated RCE (CVE-2026-2329) — allows call interception & device compromise. No patch yet. Restrict access, disable remote mgmt, and monitor for threats. radar.offseq.com/threat/critic #OffSeq #VoIP #Security #RCE

##

beyondmachines1@infosec.exchange at 2026-02-20T08:01:23.000Z ##

Critical Unauthenticated Root Vulnerability in Grandstream GXP1600 VoIP Phones

Grandstream GXP1600 series VoIP phones contain a critical unauthenticated buffer overflow vulnerability (CVE-2026-2329) that allows attackers to gain root access and intercept calls.

**If you are using Grandstream GXP1600 phones, plan a quick update to firmware 1.0.7.81. As a first step, make sure to isolate VoIP hardware on a dedicated, firewalled VLAN and confirm that management interfaces are not reachable from untrusted networks.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24941
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-20T20:25:21.757000

1 posts

Missing Authorization vulnerability in wpjobportal WP Job Portal wp-job-portal allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Job Portal: from n/a through <= 2.4.4.

thehackerwire@mastodon.social at 2026-02-20T21:01:08.000Z ##

🟠 CVE-2026-24941 - High (7.5)

Missing Authorization vulnerability in wpjobportal WP Job Portal wp-job-portal allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Job Portal: from n/a through &lt;= 2.4.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22380
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T20:25:20.723000

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes UnlimHost unlimhost allows PHP Local File Inclusion.This issue affects UnlimHost: from n/a through <= 1.2.3.

thehackerwire@mastodon.social at 2026-02-21T00:31:48.000Z ##

🟠 CVE-2026-22380 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes UnlimHost unlimhost allows PHP Local File Inclusion.This issue affects UnlimHost: from n/a through &lt;= 1.2.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22374
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T20:25:20.203000

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Zio Alberto zioalberto allows PHP Local File Inclusion.This issue affects Zio Alberto: from n/a through <= 1.2.2.

thehackerwire@mastodon.social at 2026-02-21T00:44:41.000Z ##

🟠 CVE-2026-22374 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Zio Alberto zioalberto allows PHP Local File Inclusion.This issue affects Zio Alberto: from n/a through &lt;= 1.2.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22372
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T20:25:20.027000

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Isida isida allows PHP Local File Inclusion.This issue affects Isida: from n/a through <= 1.4.2.

thehackerwire@mastodon.social at 2026-02-21T00:44:32.000Z ##

🟠 CVE-2026-22372 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AncoraThemes Isida isida allows PHP Local File Inclusion.This issue affects Isida: from n/a through &lt;= 1.4.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22368
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T20:25:19.680000

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Redy redy allows PHP Local File Inclusion.This issue affects Redy: from n/a through <= 1.0.2.

thehackerwire@mastodon.social at 2026-02-21T00:45:37.000Z ##

🟠 CVE-2026-22368 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Redy redy allows PHP Local File Inclusion.This issue affects Redy: from n/a through &lt;= 1.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22366
(8.1 HIGH)

EPSS: 0.11%

updated 2026-02-20T20:25:19.503000

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Jude jude allows PHP Local File Inclusion.This issue affects Jude: from n/a through <= 1.3.0.

thehackerwire@mastodon.social at 2026-02-21T00:45:27.000Z ##

🟠 CVE-2026-22366 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in axiomthemes Jude jude allows PHP Local File Inclusion.This issue affects Jude: from n/a through &lt;= 1.3.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26286
(8.5 HIGH)

EPSS: 0.03%

updated 2026-02-20T19:45:52.563000

1 posts

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. In versions prior to 1.16.0, a Server-Side Request Forgery (SSRF) vulnerability in the asset download endpoint allows authenticated users to make arbitrary HTTP requests from the server and read the full response body

thehackerwire@mastodon.social at 2026-02-20T20:19:18.000Z ##

🟠 CVE-2026-26286 - High (8.5)

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. In versions prior to 1.16.0, a Server-Side Request Forgery (SSRF...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27114
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-20T19:21:04.883000

1 posts

NanaZip is an open source file archive Starting in version 5.0.1252.0 and prior to version 6.0.1630.0, circular `NextOffset` chains cause an infinite loop in the ROMFS archive parser. Version 6.0.1630.0 patches the issue.

thehackerwire@mastodon.social at 2026-02-20T19:45:43.000Z ##

🟠 CVE-2026-27114 - High (7.5)

NanaZip is an open source file archive Starting in version 5.0.1252.0 and prior to version 6.0.1630.0, circular `NextOffset` chains cause an infinite loop in the ROMFS archive parser. Version 6.0.1630.0 patches the issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26016
(8.1 HIGH)

EPSS: 0.04%

updated 2026-02-20T19:08:53.683000

1 posts

Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.1, a missing authorization check in multiple controllers allows any user with access to a node secret token to fetch information about any server on a Pterodactyl instance, even if that server is associated with a different node. This issue stems from missing logic to verify t

thehackerwire@mastodon.social at 2026-02-20T19:14:25.000Z ##

🟠 CVE-2026-26016 - High (8.1)

Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.1, a missing authorization check in multiple controllers allows any user with access to a node secret token to fetch informa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26323
(8.8 HIGH)

EPSS: 0.18%

updated 2026-02-20T19:06:15.470000

1 posts

OpenClaw is a personal AI assistant. Versions 2026.1.8 through 2026.2.13 have a command injection in the maintainer/dev script `scripts/update-clawtributors.ts`. The issue affects contributors/maintainers (or CI) who run `bun scripts/update-clawtributors.ts` in a source checkout that contains a malicious commit author email (e.g. crafted `@users[.]noreply[.]github[.]com` values). Normal CLI usage

thehackerwire@mastodon.social at 2026-02-20T19:14:14.000Z ##

🟠 CVE-2026-26323 - High (8.8)

OpenClaw is a personal AI assistant. Versions 2026.1.8 through 2026.2.13 have a command injection in the maintainer/dev script `scripts/update-clawtributors.ts`. The issue affects contributors/maintainers (or CI) who run `bun scripts/update-clawtr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24891
(7.5 HIGH)

EPSS: 0.05%

updated 2026-02-20T18:57:15.973000

1 posts

openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus. Versions 5.3.1 and below contain an unsafe deserialization sink in the Gearman worker implementation. The worker function registered as oitc_gearman calls PHP's unserialize() on job payloads without enforcing class restrictions or validating data origin. While the intended dep

thehackerwire@mastodon.social at 2026-02-20T18:32:03.000Z ##

🟠 CVE-2026-24891 - High (7.5)

openITCOCKPIT is an open source monitoring tool built for different monitoring engines like Nagios, Naemon and Prometheus. Versions 5.3.1 and below contain an unsafe deserialization sink in the Gearman worker implementation. The worker function re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24455
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-20T18:57:15.973000

1 posts

The embedded web interface of the device does not support HTTPS/TLS for authentication and uses HTTP Basic Authentication. Traffic is encoded but not encrypted, exposing user credentials to passive interception by attackers on the same network.

thehackerwire@mastodon.social at 2026-02-20T17:51:29.000Z ##

🟠 CVE-2026-24455 - High (7.5)

The embedded web interface of the device does not support HTTPS/TLS for
authentication and uses HTTP Basic Authentication. Traffic is encoded
but not encrypted, exposing user credentials to passive interception by
attackers on the same network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25715
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-02-20T18:57:15.973000

1 posts

The web management interface of the device allows the administrator username and password to be set to blank values. Once applied, the device permits authentication with empty credentials over the web management interface and Telnet service. This effectively disables authentication across all critical management channels, allowing any network-adjacent attacker to gain full administrative cont

thehackerwire@mastodon.social at 2026-02-20T17:51:09.000Z ##

🔴 CVE-2026-25715 - Critical (9.8)

The web management interface of the device allows the administrator
username and password to be set to blank values. Once applied, the
device permits authentication with empty credentials over the web
management interface and Telnet service. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2818
(8.2 HIGH)

EPSS: 0.07%

updated 2026-02-20T18:57:15.973000

1 posts

A zip-slip path traversal vulnerability in Spring Data Geode's import snapshot functionality allows attackers to write files outside the intended extraction directory. This vulnerability appears to be susceptible on Windows OS only.

thehackerwire@mastodon.social at 2026-02-20T17:38:28.000Z ##

🟠 CVE-2026-2818 - High (8.2)

A zip-slip path traversal vulnerability in Spring Data Geode's import snapshot functionality allows attackers to write files outside the intended extraction directory. This vulnerability appears to be susceptible on Windows OS only.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27343
(7.5 HIGH)

EPSS: 0.11%

updated 2026-02-20T18:32:34

1 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in VanKarWai Airtifact airtifact allows PHP Local File Inclusion.This issue affects Airtifact: from n/a through <= 1.2.91.

thehackerwire@mastodon.social at 2026-02-20T18:37:14.000Z ##

🟠 CVE-2026-27343 - High (7.5)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in VanKarWai Airtifact airtifact allows PHP Local File Inclusion.This issue affects Airtifact: from n/a through &lt;= 1.2.91.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24790
(8.2 HIGH)

EPSS: 0.06%

updated 2026-02-20T18:31:49

1 posts

The underlying PLC of the device can be remotely influenced, without proper safeguards or authentication.

thehackerwire@mastodon.social at 2026-02-20T17:53:46.000Z ##

🟠 CVE-2026-24790 - High (8.2)

The underlying PLC of the device can be remotely influenced, without proper safeguards or authentication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26048
(7.5 HIGH)

EPSS: 0.03%

updated 2026-02-20T18:31:49

1 posts

The Wi-Fi router is vulnerable to de-authentication attacks due to the absence of management frame protection, allowing forged deauthentication and disassociation frames to be broadcast without authentication or encryption. An attacker can use this to cause unauthorized disruptions and create a denial-of-service condition.

thehackerwire@mastodon.social at 2026-02-20T17:51:19.000Z ##

🟠 CVE-2026-26048 - High (7.5)

The Wi-Fi router is vulnerable to de-authentication attacks due to the
absence of management frame protection, allowing forged deauthentication
and disassociation frames to be broadcast without authentication or
encryption. An attacker can use ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20761
(8.1 HIGH)

EPSS: 0.25%

updated 2026-02-20T18:31:47

2 posts

A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and prior, which would allow remote attackers, in the LON IP-852 management messages, to send specially crafted IP-852 messages resulting in arbitrary OS command execution on the device.

thehackerwire@mastodon.social at 2026-02-20T17:09:13.000Z ##

🟠 CVE-2026-20761 - High (8.1)

A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and
prior, which would allow remote attackers, in the LON IP-852 management
messages, to send specially crafted IP-852 messages resulting in
arbitrary OS command execution on th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T17:08:19.000Z ##

🟠 CVE-2026-20761 - High (8.1)

A vulnerability exists in EnOcean SmartServer IoT version 4.60.009 and
prior, which would allow remote attackers, in the LON IP-852 management
messages, to send specially crafted IP-852 messages resulting in
arbitrary OS command execution on th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27001
(7.8 HIGH)

EPSS: 0.02%

updated 2026-02-20T18:13:49.913000

1 posts

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, OpenClaw embedded the current working directory (workspace path) into the agent system prompt without sanitization. If an attacker can cause OpenClaw to run inside a directory whose name contains control/format characters (for example newlines or Unicode bidi/zero-width markers), those characters could break the prompt structure and

thehackerwire@mastodon.social at 2026-02-20T18:21:24.000Z ##

🟠 CVE-2026-27001 - High (7.8)

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, OpenClaw embedded the current working directory (workspace path) into the agent system prompt without sanitization. If an attacker can cause OpenClaw to run inside a directory whose ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27002
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-02-20T18:11:24.263000

1 posts

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a configuration injection issue in the Docker tool sandbox could allow dangerous Docker options (bind mounts, host networking, unconfined profiles) to be applied, enabling container escape or host data access. OpenClaw 2026.2.15 blocks dangerous sandbox Docker settings and includes runtime enforcement when building `docker create` ar

thehackerwire@mastodon.social at 2026-02-20T18:21:34.000Z ##

🔴 CVE-2026-27002 - Critical (9.8)

OpenClaw is a personal AI assistant. Prior to version 2026.2.15, a configuration injection issue in the Docker tool sandbox could allow dangerous Docker options (bind mounts, host networking, unconfined profiles) to be applied, enabling container ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21535
(8.2 HIGH)

EPSS: 0.10%

updated 2026-02-20T17:39:46.743000

1 posts

Improper access control in Microsoft Teams allows an unauthorized attacker to disclose information over a network.

AAKL@infosec.exchange at 2026-02-20T18:47:40.000Z ##

If you missed this, Microsoft posted this advisory yesterday:

Critical: CVE-2026-21535: Microsoft Teams Information Disclosure Vulnerability msrc.microsoft.com/update-guid #infosec #Microsoft #Teams

##

CVE-2026-26996(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-02-20T16:52:16

1 posts

### Summary `minimatch` is vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive `*` wildcards followed by a literal character that doesn't appear in the test string. Each `*` compiles to a separate `[^/]*?` regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N)

thehackerwire@mastodon.social at 2026-02-20T19:14:05.000Z ##

🟠 CVE-2026-26996 - High (7.5)

minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildca...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26065
(8.8 HIGH)

EPSS: 0.03%

updated 2026-02-20T16:45:18.507000

3 posts

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary file writes with arbitrary extension and arbitrary content anywhere the user has write permissions. Files are written in 'wb' mode, silently overwriting ex

571906@ap.podcastindex.org at 2026-02-24T02:00:02.000Z ##

New Episode: SANS Stormcast Tuesday, February 24th, 2026: Malicious JPEG Analysis; Calibre Vuln; jsPDF object injection; Roundcube Exploited

Shownotes:

Another day, another malicious JPEG
https://isc.sans.edu/diary/Another%20day%2C%20another%20malicious%20JPEG/32738
Calibre Path Traversal Leading to Arbitrary File Write and Potentially Code Execution CVE-2026-26064 CVE-2026-26065
htt

Transcript

AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans

Or Listen right here.

##

thehackerwire@mastodon.social at 2026-02-20T18:21:14.000Z ##

🟠 CVE-2026-26065 - High (8.8)

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-20T17:08:28.000Z ##

🟠 CVE-2026-26065 - High (8.8)

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below are vulnerable to Path Traversal through PDB readers (both 132-byte and 202-byte header variants) that allow arbitrary fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-10970
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-02-20T13:49:47.623000

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kolay Software Inc. Talentics allows Blind SQL Injection.This issue affects Talentics: through 20022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-02-20T13:01:09.000Z ##

🔴 CVE-2025-10970 - Critical (9.8)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Kolay Software Inc. Talentics allows Blind SQL Injection.This issue affects Talentics: through 20022026.

NOTE: The vendor was contacted early ab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26050
(7.8 HIGH)

EPSS: 0.01%

updated 2026-02-20T13:49:47.623000

2 posts

The installer for ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール versions prior to Ver.1.3.7 contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with administrative privileges.

offseq@infosec.exchange at 2026-02-20T10:30:33.000Z ##

🚨 Ricoh ジョブログ集計ツール (<1.3.7) has a HIGH severity DLL search path issue (CVE-2026-26050). Exploiting this enables admin-level code execution during install. Update to v1.3.7+ and restrict local access. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Ricoh

##

thehackerwire@mastodon.social at 2026-02-20T09:19:41.000Z ##

🟠 CVE-2026-26050 - High (7.8)

The installer for ジョブログ集計/分析ソフトウェア RICOHジョブログ集計ツール versions prior to Ver.1.3.7 contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27476
(9.8 CRITICAL)

EPSS: 0.27%

updated 2026-02-19T21:30:57

1 posts

RustFly 2.0.0 contains a command injection vulnerability in its remote UI control mechanism that accepts hex-encoded instructions over UDP port 5005 without proper sanitization. Attackers can send crafted hex-encoded payloads containing system commands to execute arbitrary operations on the target system, including reverse shell establishment and command execution.

offseq@infosec.exchange at 2026-02-20T09:00:32.000Z ##

⚠️ CRITICAL: CVE-2026-27476 in Bixat RustFly 2.0.0 lets remote attackers run arbitrary system commands over UDP port 5005 — no auth needed. Block 5005, monitor for hex payloads, & audit systems now. Patch ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Infosec

##

CVE-2026-26030
(10.0 CRITICAL)

EPSS: 0.08%

updated 2026-02-19T19:34:15

2 posts

### Impact: An RCE vulnerability has been identified in Microsoft Semantic Kernel Python SDK, specifically within the `InMemoryVectorStore` filter functionality. ### Patches: The problem has been fixed in [python-1.39.4](https://github.com/microsoft/semantic-kernel/releases/tag/python-1.39.4). Users should upgrade this version or higher. ### Workarounds: Avoid using `InMemoryVectorStore` for pro

dendrite_soup@defcon.social at 2026-02-23T19:39:40.000Z ##

been thinking about CVE-2026-26030 and why the patch feels hollow. they added a confirmation flag. opt-in. the default is still trust. that's not a security fix, that's a liability fix. wrote it up: dev.to/dendrite_soup/opt-in-sa #infosec #aisecurity

##

dendrite_soup@defcon.social at 2026-02-23T19:39:40.000Z ##

been thinking about CVE-2026-26030 and why the patch feels hollow. they added a confirmation flag. opt-in. the default is still trust. that's not a security fix, that's a liability fix. wrote it up: dev.to/dendrite_soup/opt-in-sa #infosec #aisecurity

##

CVE-2026-26988(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-02-18T22:30:20

1 posts

### Summary *SQL Injection in IPv6 Address Search functionality via `address` parameter** A SQL injection vulnerability exists in the `ajax_table.php` endpoint. The application fails to properly sanitize or parameterize user input when processing IPv6 address searches. Specifically, the `address` parameter is split into an address and a prefix, and the prefix portion is directly concatenated into

1 repos

https://github.com/mbanyamer/CVE-2026-26988-LibreNMS-SQLi

thehackerwire@mastodon.social at 2026-02-20T17:08:20.000Z ##

🔴 CVE-2026-26988 - Critical (9.1)

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below contain an SQL Injection vulnerability in the ajax_table.php endpoint. The application fails to properly sanitize or parameterize user input w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22769
(10.0 CRITICAL)

EPSS: 34.16%

updated 2026-02-18T18:30:35

1 posts

Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgr

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-0714
(6.8 MEDIUM)

EPSS: 0.01%

updated 2026-02-18T17:55:46.557000

2 posts

A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data m

CVE-2026-2548
(6.3 MEDIUM)

EPSS: 1.41%

updated 2026-02-18T17:52:22.253000

1 posts

A flaw has been found in WAYOS FBM-220G 24.10.19. This affects the function sub_40F820 of the file rc. Executing a manipulation of the argument upnp_waniface/upnp_ssdp_interval/upnp_max_age can lead to command injection. The attack can be executed remotely. The vendor was contacted early about this disclosure but did not respond in any way.

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-1670
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-02-18T17:51:53.510000

2 posts

The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the "forgot password" recovery email address.

TomSellers@infosec.exchange at 2026-02-20T15:24:10.000Z ##

Why TF does the NVD not include the CVE title, vendor, or other useful information. If you look at the following you have no what's impacted and have to hunt details in the links.

nvd.nist.gov/vuln/detail/CVE-2

The backing CVE data contains all of this:

cveawg.mitre.org/api/cve/CVE-2

#security #cve #nvd

##

thecybermind@infosec.exchange at 2026-02-20T13:18:58.000Z ##

CRITICAL INTEL: Honeywell CVSS 9.8 (CVE-2026-1670) is here. 🚨 Unauthenticated API exploitation means total compromise. I’m breaking down the Sovereign Sentry strategy using Raspberry Pi & Suricata to harden your network. thecybermind.co/2026/02/20/cve
#exploit

thecybermind.co/2026/02/20/cve

##

CVE-2026-2426
(6.5 MEDIUM)

EPSS: 1.97%

updated 2026-02-18T12:31:15

1 posts

The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.69 via the 'file' parameter in the file deletion functionality. This is due to insufficient validation of user-supplied file paths, allowing directory traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitra

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-26119
(8.8 HIGH)

EPSS: 0.07%

updated 2026-02-18T00:30:22

1 posts

Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.

CVE-2026-1731
(9.8 CRITICAL)

EPSS: 49.74%

updated 2026-02-17T13:40:10.320000

8 posts

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Nuclei template

5 repos

https://github.com/richardpaimu34/CVE-2026-1731

https://github.com/cybrdude/cve-2026-1731-scanner

https://github.com/hexissam/CVE-2026-1731

https://github.com/win3zz/CVE-2026-1731

https://github.com/jakubie07/CVE-2026-1731

youranonnewsirc@nerdculture.de at 2026-02-23T13:44:39.000Z ##

Geopolitical tensions heighten as US-Iran nuclear talks near. Technology advances with Tesla's Cybercab launch and Uber's significant investment in autonomous EV charging. Cybersecurity faces active exploitation of CVE-2026-1731 in BeyondTrust products, AI-powered FortiGate breaches, and AI-assisted malware from MuddyWater.

#Cybersecurity #TechNews #Geopolitics

##

undercodenews@mastodon.social at 2026-02-23T13:00:15.000Z ##

Critical RCE in BeyondTrust Remote Support and Privileged Remote Access Under Active Exploitation Worldwide

Introduction: A Silent Door Left Open in Enterprise Remote Access A critical vulnerability inside one of the most widely deployed remote access platforms has rapidly evolved from a technical advisory into a global security emergency. Tracked as CVE-2026-1731 and assigned a near-maximum CVSS score of 9.9, the flaw affects BeyondTrust Remote Support and older…

undercodenews.com/critical-rce

##

youranonnewsirc@nerdculture.de at 2026-02-23T13:44:39.000Z ##

Geopolitical tensions heighten as US-Iran nuclear talks near. Technology advances with Tesla's Cybercab launch and Uber's significant investment in autonomous EV charging. Cybersecurity faces active exploitation of CVE-2026-1731 in BeyondTrust products, AI-powered FortiGate breaches, and AI-assisted malware from MuddyWater.

#Cybersecurity #TechNews #Geopolitics

##

technadu@infosec.exchange at 2026-02-21T10:48:45.000Z ##

Critical CVE-2026-1731 in BeyondTrust RS/PRA is under active exploitation.

Web shells. RATs. PostgreSQL dumps.
Now listed in CISA KEV & tied to ransomware.

Remote support appliances are high-value targets.

Are we giving PAM systems enough monitoring visibility?

Source: thehackernews.com/2026/02/beyo

Follow @technadu for independent cybersecurity reporting.

Like and join the discussion below.

#CyberSecurity #Infosec #ZeroDay #Ransomware #PAM #ThreatIntel #SecurityCommunity #CVE20261731

##

gtronix@infosec.exchange at 2026-02-20T18:00:48.000Z ##

"CISA: BeyondTrust RCE flaw now exploited in ransomware attacks"

"[...] Cybersecurity and Infrastructure Security Agency (CISA) warns. Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S."

bleepingcomputer.com/news/secu

#Cybersecurity

##

oversecurity@mastodon.social at 2026-02-20T17:20:07.000Z ##

CISA: BeyondTrust RCE flaw now exploited in ransomware attacks

Hackers are actively exploiting the CVE-2026-1731 vulnerability in the BeyondTrust Remote Support product, the U.S. Cybersecurity and...

🔗️ [Bleepingcomputer] link.is.it/nNcFd0

##

defendopsdiaries@infosec.exchange at 2026-02-20T17:15:44.000Z ##

Ransomware gangs found a new shortcut into company networks with CVE-2026-1731—no passwords needed, attacks automated, and defenders caught off guard. How did this flaw become their go-to weapon almost overnight?

thedefendopsdiaries.com/how-cv

##

hackerworkspace@infosec.exchange at 2026-02-20T08:06:26.000Z ##

VShell and SparkRAT Observed in Exploitation of BeyondTrust Critical Vulnerability (CVE-2026-1731)

unit42.paloaltonetworks.com/be

#threatintelligence #vulnerability #exploit

##

CVE-2026-2544
(7.3 HIGH)

EPSS: 2.14%

updated 2026-02-16T09:30:36

1 posts

A security flaw has been discovered in yued-fe LuLu UI up to 3.0.0. This issue affects the function child_process.exec of the file run.js. The manipulation results in os command injection. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-2533
(7.3 HIGH)

EPSS: 2.14%

updated 2026-02-16T06:31:32

1 posts

A flaw has been found in Tosei Self-service Washing Machine 4.02. Impacted is an unknown function of the file /cgi-bin/tosei_datasend.php. Executing a manipulation of the argument adr_txt_1 can lead to command injection. It is possible to launch the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

secdb@infosec.exchange at 2026-02-23T00:00:58.000Z ##

📈 CVE Published in last 7 days (2026-02-16 - 2026-02-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1338

Severity:
- Critical: 74
- High: 301
- Medium: 602
- Low: 33
- None: 328

Status:
- : 9
- Analyzed: 277
- Awaiting Analysis: 747
- Modified: 3
- Received: 170
- Rejected: 40
- Undergoing Analysis: 92

Top CNAs:
- Patchstack: 334
- GitHub, Inc.: 170
- VulDB: 164
- Wordfence: 148
- VulnCheck: 145
- MITRE: 53
- kernel.org: 33
- IBM Corporation: 33
- Fortinet, Inc.: 25
- Zero Day Initiative: 20

Top Affected Products:
- UNKNOWN: 1037
- Comodo Dome Firewall: 29
- Gfi Mailessentials: 18
- Smoothwall Express: 17
- Openclaw: 16
- Invoiceplane: 11
- Spip: 10
- Nvidia Nemo: 10
- Mjdm Majordomo: 8
- Ibm Concert: 7

Top EPSS Score:
- CVE-2026-22769 - 28.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2033 - 10.53 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25441 - 2.65 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2426 - 1.97 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2533 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2544 - 1.28 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2041 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2042 - 1.25 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2635 - 1.17 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2548 - 1.06 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-24423
(9.8 CRITICAL)

EPSS: 24.64%

updated 2026-02-06T18:30:29

1 posts

SmarterTools SmarterMail versions prior to build 9511 contain an unauthenticated remote code execution vulnerability in the ConnectToHub API method. The attacker could point the SmarterMail to the malicious HTTP server, which serves the malicious OS command. This command will be executed by the vulnerable application.

1 repos

https://github.com/aavamin/CVE-2026-24423

steelefortress@infosec.exchange at 2026-02-20T12:00:21.000Z ##

Rapid weaponization of SmarterMail flaws exposed through underground Telegram channels. Just days after CVE-2026-24423 and CVE-2026-23760 were disclosed, exploit PoCs and stolen admin credentials were shared among these communities, highlighting the urgent need for...

Read more: steelefortress.com/dlk923

#Security #ThreatIntel #CyberDefense

##

CVE-2026-23760
(9.8 CRITICAL)

EPSS: 57.48%

updated 2026-01-27T16:16:55.327000

1 posts

SmarterTools SmarterMail versions prior to build 9511 contain an authentication bypass vulnerability in the password reset API. The force-reset-password endpoint permits anonymous requests and fails to verify the existing password or a reset token when resetting system administrator accounts. An unauthenticated attacker can supply a target administrator username and a new password to reset the acc

Nuclei template

2 repos

https://github.com/MaxMnMl/smartermail-CVE-2026-23760-poc

https://github.com/hilwa24/CVE-2026-23760_SmarterMail-Auth-Bypass-and-RCE

steelefortress@infosec.exchange at 2026-02-20T12:00:21.000Z ##

Rapid weaponization of SmarterMail flaws exposed through underground Telegram channels. Just days after CVE-2026-24423 and CVE-2026-23760 were disclosed, exploit PoCs and stolen admin credentials were shared among these communities, highlighting the urgent need for...

Read more: steelefortress.com/dlk923

#Security #ThreatIntel #CyberDefense

##

CVE-2025-12543
(9.6 CRITICAL)

EPSS: 0.08%

updated 2026-01-08T23:15:42.690000

2 posts

A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user session

beyondmachines1 at 2026-02-24T08:01:19.145Z ##

HPE Patches Critical Access Bypass in Telco Service Activator

HPE patched a critical access bypass vulnerability (CVE-2025-12543) in its Telco Service Activator that allows unauthenticated attackers to hijack sessions or disrupt telecom services by exploiting improper Host header validation.

**If you are using Telco Service Activator, make sure it's isolated from the internet and accessible from trusted networks only. Then plan an update to version 10.5.0 ASAP. Coordinate the patch window with your support teams to manage any potential service disruptions that could impact your customers' experience.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-02-24T08:01:19.000Z ##

HPE Patches Critical Access Bypass in Telco Service Activator

HPE patched a critical access bypass vulnerability (CVE-2025-12543) in its Telco Service Activator that allows unauthenticated attackers to hijack sessions or disrupt telecom services by exploiting improper Host header validation.

**If you are using Telco Service Activator, make sure it's isolated from the internet and accessible from trusted networks only. Then plan an update to version 10.5.0 ASAP. Coordinate the patch window with your support teams to manage any potential service disruptions that could impact your customers' experience.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2022-22265
(5.0 MEDIUM)

EPSS: 0.18%

updated 2025-10-30T15:37:18.257000

1 posts

An improper check or handling of exceptional conditions in NPU driver prior to SMR Jan-2022 Release 1 allows arbitrary memory write and code execution.

pancake@infosec.exchange at 2026-02-20T12:56:31.000Z ##

Here's the good read of the day, more interesting part is the exploitation tricks at the end of the post soez.github.io/posts/CVE-2022- by @javierprtd

##

CVE-2025-61675
(0 None)

EPSS: 16.95%

updated 2025-10-16T15:29:11.563000

1 posts

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. In versions prior to 16.0.92 for FreePBX 16 and versions prior to 17.0.6 for FreePBX 17, the Endpoint Manager module contains authenticated SQL injection vulnerabilities affecting multiple parameters in the basestation, model, firmware, and custom extension configuration functionality areas. Authentication wi

3 repos

https://github.com/cyberleelawat/FreePBX-Multiple-CVEs-2025

https://github.com/rxerium/FreePBX-Vulns-December-25

https://github.com/BimBoxH4/CVE-2025-66039_CVE-2025-61675_CVE-2025-61678_reePBX

benrothke@infosec.exchange at 2026-02-20T17:30:42.000Z ##

#FreePBX is a popular open-source IP PBX management tool. @FreePBX manages #VoIP communications & requires high availability & relatively open access, making it a very attractive target for threat actors. It now has serious CVE vulns. HT @PicusSecurity cybersec.picussecurity.com/s/c

##

CVE-2025-8277
(3.1 LOW)

EPSS: 0.05%

updated 2025-09-09T12:30:49

1 posts

A flaw was found in libssh's handling of key exchange (KEX) processes when a client repeatedly sends incorrect KEX guesses. The library fails to free memory during these rekey operations, which can gradually exhaust system memory. This issue can lead to crashes on the client side, particularly when using libgcrypt, which impacts application stability and availability.

linux@activitypub.awakari.com at 2026-02-23T20:21:54.000Z ## Ubuntu 20.04 LTS libssh Important DDoS Risks USN-8051-2 CVE-2025-8277 Several security issues were fixed in libssh.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-47809
(8.2 HIGH)

EPSS: 0.02%

updated 2025-05-16T14:42:18.700000

2 posts

Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import Lic

certvde at 2026-02-23T07:36:39.849Z ##

VDE-2026-007
TRUMPF: Multiple products affected by Wibu CodeMeter vulnerability

The TRUMPF product versions listed below include a Wibu CodeMeter component that is vulnerable to a privilege escalation vulnerability through the CodeMeter installer on Windows.
CVE-2025-47809

certvde.com/en/advisories/vde-

trumpf.csaf-tp.certvde.com/.we

##

certvde@infosec.exchange at 2026-02-23T07:36:39.000Z ##

#OT #Advisory VDE-2026-007
TRUMPF: Multiple products affected by Wibu CodeMeter vulnerability

The TRUMPF product versions listed below include a Wibu CodeMeter component that is vulnerable to a privilege escalation vulnerability through the CodeMeter installer on Windows.
#CVE CVE-2025-47809

certvde.com/en/advisories/vde-

#CSAF trumpf.csaf-tp.certvde.com/.we

##

CVE-2025-29969
(7.5 HIGH)

EPSS: 0.33%

updated 2025-05-13T18:31:00

1 posts

Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network.

1 repos

https://github.com/SafeBreach-Labs/EventLogin-CVE-2025-29969

CVE-2026-25989
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-24T04:00:50.000Z ##

🟠 CVE-2026-25989 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file can cause a denial of service. An off-by-one boundary check (`>` instead of `>=`) that allo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T04:00:50.000Z ##

🟠 CVE-2026-25989 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file can cause a denial of service. An off-by-one boundary check (`>` instead of `>=`) that allo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26064
(0 None)

EPSS: 0.05%

2 posts

N/A

571906@ap.podcastindex.org at 2026-02-24T02:00:02.000Z ##

New Episode: SANS Stormcast Tuesday, February 24th, 2026: Malicious JPEG Analysis; Calibre Vuln; jsPDF object injection; Roundcube Exploited

Shownotes:

Another day, another malicious JPEG
https://isc.sans.edu/diary/Another%20day%2C%20another%20malicious%20JPEG/32738
Calibre Path Traversal Leading to Arbitrary File Write and Potentially Code Execution CVE-2026-26064 CVE-2026-26065
htt

Transcript

AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans

Or Listen right here.

##

thehackerwire@mastodon.social at 2026-02-20T17:08:30.000Z ##

🟠 CVE-2026-26064 - High (8.8)

calibre is a cross-platform e-book manager for viewing, converting, editing, and cataloging e-books. Versions 9.2.1 and below contain a Path Traversal vulnerability that allows arbitrary file writes anywhere the user has write permissions. On Wind...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25965
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-24T02:17:59.000Z ##

🟠 CVE-2026-25965 - High (8.6)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick’s path security policy is enforced on the raw filename string before the filesystem resolves it....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T02:17:59.000Z ##

🟠 CVE-2026-25965 - High (8.6)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick’s path security policy is enforced on the raw filename string before the filesystem resolves it....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25985
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-24T02:17:50.000Z ##

🟠 CVE-2026-25985 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file containing an malicious element causes ImageMagick to attempt to allocate ~674 GB of memory...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T02:17:50.000Z ##

🟠 CVE-2026-25985 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file containing an malicious element causes ImageMagick to attempt to allocate ~674 GB of memory...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24481
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-24T01:36:07.000Z ##

🟠 CVE-2026-24481 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap information disclosure vulnerability exists in ImageMagick's PSD (Adobe Photoshop) format handler. When...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T01:36:07.000Z ##

🟠 CVE-2026-24481 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap information disclosure vulnerability exists in ImageMagick's PSD (Adobe Photoshop) format handler. When...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25794
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-24T01:35:57.000Z ##

🟠 CVE-2026-25794 - High (8.2)

ImageMagick is free and open-source software used for editing and manipulating digital images. `WriteUHDRImage` in `coders/uhdr.c` uses `int` arithmetic to compute the pixel buffer size. Prior to version 7.1.2-15, when image dimensions are large, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-24T01:35:57.000Z ##

🟠 CVE-2026-25794 - High (8.2)

ImageMagick is free and open-source software used for editing and manipulating digital images. `WriteUHDRImage` in `coders/uhdr.c` uses `int` arithmetic to compute the pixel buffer size. Prior to version 7.1.2-15, when image dimensions are large, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67733
(0 None)

EPSS: 0.00%

4 posts

N/A

1 repos

https://github.com/JYlab/CVE-2025-67733

thehackerwire@mastodon.social at 2026-02-23T20:32:34.000Z ##

🟠 CVE-2025-67733 - High (8.5)

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or ret...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:30:36.000Z ##

🟠 CVE-2025-67733 - High (8.5)

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or ret...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:32:34.000Z ##

🟠 CVE-2025-67733 - High (8.5)

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or ret...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:30:36.000Z ##

🟠 CVE-2025-67733 - High (8.5)

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or ret...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27623
(0 None)

EPSS: 0.00%

4 posts

N/A

thehackerwire@mastodon.social at 2026-02-23T20:32:24.000Z ##

🟠 CVE-2026-27623 - High (7.5)

Valkey is a distributed key-value database. Starting in version 9.0.0 and prior to version 9.0.3, a malicious actor with network access to Valkey can cause the system to abort by triggering an assertion. When processing incoming requests, the Valk...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:30:26.000Z ##

🟠 CVE-2026-27623 - High (7.5)

Valkey is a distributed key-value database. Starting in version 9.0.0 and prior to version 9.0.3, a malicious actor with network access to Valkey can cause the system to abort by triggering an assertion. When processing incoming requests, the Valk...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:32:24.000Z ##

🟠 CVE-2026-27623 - High (7.5)

Valkey is a distributed key-value database. Starting in version 9.0.0 and prior to version 9.0.3, a malicious actor with network access to Valkey can cause the system to abort by triggering an assertion. When processing incoming requests, the Valk...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-23T20:30:26.000Z ##

🟠 CVE-2026-27623 - High (7.5)

Valkey is a distributed key-value database. Starting in version 9.0.0 and prior to version 9.0.3, a malicious actor with network access to Valkey can cause the system to abort by triggering an assertion. When processing incoming requests, the Valk...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27466
(0 None)

EPSS: 0.07%

1 posts

N/A

0x3e4@cyberplace.social at 2026-02-21T09:18:34.000Z ##

BigBlueButton on < 3.0.22 with two new CVEs today: CVE-2026-27466 & CVE-2026-27467

hecate.pw/vulnerabilities?sear

Feel free to use the AI slop analyses (Gemini for student with free API configured).. Hecate is a prototype app for my master thesis

#vulnerability #cve #security #InfoSec #bigbluebutton

##

CVE-2026-27471
(0 None)

EPSS: 0.04%

1 posts

N/A

offseq@infosec.exchange at 2026-02-21T09:00:27.000Z ##

🚨 CRITICAL: CVE-2026-27471 in ERPNext (≤15.98.0, 16.0.0-rc.1 – 16.6.0) lets unauth attackers access sensitive docs via missing API auth. Upgrade to 15.98.1/16.6.1+ & restrict access now. radar.offseq.com/threat/cve-20 #OffSeq #ERPNext #CVE202627471 #Infosec

##

CVE-2026-27470
(0 None)

EPSS: 0.03%

1 posts

N/A

1 repos

https://github.com/kocaemre/CVE-2026-27470

thehackerwire@mastodon.social at 2026-02-21T08:17:17.000Z ##

🟠 CVE-2026-27470 - High (8.8)

ZoneMinder is a free, open source closed-circuit television software application. In versions 1.36.37 and below and 1.37.61 through 1.38.0, there is a second-order SQL Injection vulnerability in the web/ajax/status.php file within the getNearEvent...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27134
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-02-21T00:20:07.000Z ##

🟠 CVE-2026-27134 - High (8.1)

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. In versions 0.49.0 through 0.50.0, when using a custom Cluster or Clients CA with a multistage CA chain consisting of multiple ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-02-21T00:17:24.000Z ##

🟠 CVE-2026-27134 - High (8.1)

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. In versions 0.49.0 through 0.50.0, when using a custom Cluster or Clients CA with a multistage CA chain consisting of multiple ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

benrothke@infosec.exchange at 2026-02-20T17:30:42.000Z ##

#FreePBX is a popular open-source IP PBX management tool. @FreePBX manages #VoIP communications & requires high availability & relatively open access, making it a very attractive target for threat actors. It now has serious CVE vulns. HT @PicusSecurity cybersec.picussecurity.com/s/c

##

Visit counter For Websites