## Updated at UTC 2026-03-11T11:34:58.652863

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-3826 9.8 0.00% 2 0 2026-03-11T09:32:00 IFTOP developed by WellChoose has a Local File Inclusion vulnerability, allowing
CVE-2026-29515 None 0.00% 2 0 2026-03-11T06:31:47 MiCode FileExplorer contains an authentication bypass vulnerability in the embed
CVE-2026-27842 9.8 0.00% 2 0 2026-03-11T06:31:41 Authentication bypass issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow
CVE-2026-2631 0 0.00% 2 0 2026-03-11T06:17:14.467000 The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an una
CVE-2026-24448 9.8 0.00% 2 0 2026-03-11T06:17:13.697000 Use of hard-coded credentials issue exists in MR-GM5L-S1 and MR-GM5A-L1, which m
CVE-2026-0124 None 0.00% 2 0 2026-03-11T00:31:32 There is a possible out of bounds write due to a missing bounds check. This coul
CVE-2026-30966 10.0 0.00% 2 0 2026-03-11T00:21:09 ### Impact Parse Server's internal tables, which store Relation field mappings
CVE-2026-26738 7.8 0.00% 1 0 2026-03-10T21:33:20 Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows
CVE-2026-26801 7.5 0.00% 1 0 2026-03-10T21:32:24 Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.
CVE-2026-27276 7.8 0.00% 1 0 2026-03-10T21:32:24 Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free
CVE-2026-27273 7.8 0.00% 2 0 2026-03-10T21:32:24 Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds
CVE-2026-27274 7.8 0.00% 1 0 2026-03-10T21:32:24 Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds
CVE-2026-27280 7.8 0.00% 1 0 2026-03-10T21:32:24 DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write v
CVE-2026-27277 7.8 0.00% 1 0 2026-03-10T21:32:17 Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free
CVE-2026-27279 7.8 0.00% 2 0 2026-03-10T21:32:17 Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds
CVE-2025-11158 9.1 0.04% 1 0 2026-03-10T21:32:14 Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.6, i
CVE-2026-24457 9.1 0.19% 1 0 2026-03-10T19:52:11.887000 An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read ar
CVE-2025-13476 9.8 0.05% 1 0 2026-03-10T19:49:55.930000 Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 u
CVE-2025-14675 7.2 0.68% 1 0 2026-03-10T19:34:20 The Meta Box plugin for WordPress is vulnerable to arbitrary file deletion due t
CVE-2026-27826 8.2 0.00% 2 1 2026-03-10T19:17:20.670000 MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (C
CVE-2026-27275 7.8 0.00% 1 0 2026-03-10T19:17:19.560000 Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds
CVE-2026-27269 7.8 0.00% 1 0 2026-03-10T19:17:18.980000 Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vul
CVE-2025-69219 8.8 0.03% 1 2 2026-03-10T18:58:35.607000 A user with access to the DB could craft a database entry that would result in e
CVE-2026-3630 9.8 0.04% 3 0 2026-03-10T18:48:52.193000 Delta Electronics COMMGR2 has Stack-based Buffer Overflow vulnerability.
CVE-2026-3631 7.5 0.04% 1 0 2026-03-10T18:48:42.673000 Delta Electronics COMMGR2 has Buffer Over-read DoS vulnerability.
CVE-2026-3823 8.8 0.14% 3 0 2026-03-10T18:46:53.270000 EHG2408 series switch developed by Atop Technologies has a Stack-based Buffer Ov
CVE-2026-30944 8.8 0.00% 2 1 2026-03-10T18:45:50 ## Summary The /studiocms_api/dashboard/api-tokens endpoint allows any authentic
CVE-2026-30957 10.0 0.00% 3 0 2026-03-10T18:45:14 ### Summary OneUptime Synthetic Monitors allow a low-privileged authenticated p
CVE-2026-30956 10.0 0.00% 1 0 2026-03-10T18:45:04 ### Summary A low‑privileged user can bypass authorization and tenant isolation
CVE-2026-30921 10.0 0.01% 2 0 2026-03-10T18:44:25 Summary OneUptime Synthetic Monitors allow low-privileged project users to subm
CVE-2026-30869 9.3 0.43% 1 0 2026-03-10T18:43:20 ### Summary A path traversal vulnerability in the `/export` endpoint allows an a
CVE-2026-28292 9.8 0.00% 3 0 2026-03-10T18:38:58 ### Summary The `blockUnsafeOperationsPlugin` in `simple-git` fails to block gi
CVE-2026-26128 7.8 0.00% 1 0 2026-03-10T18:31:31 Improper authentication in Windows SMB Server allows an authorized attacker to e
CVE-2026-26130 7.5 0.00% 3 0 2026-03-10T18:31:31 Allocation of resources without limits or throttling in ASP.NET Core allows an u
CVE-2026-26117 7.8 0.00% 5 0 2026-03-10T18:31:30 Authentication bypass using an alternate path or channel in Azure Windows Virtua
CVE-2026-26113 8.4 0.00% 1 0 2026-03-10T18:31:30 Untrusted pointer dereference in Microsoft Office allows an unauthorized attacke
CVE-2026-26127 7.5 0.00% 1 0 2026-03-10T18:31:30 Out-of-bounds read in .NET allows an unauthorized attacker to deny service over
CVE-2026-26132 7.8 0.00% 1 0 2026-03-10T18:31:30 Use after free in Windows Kernel allows an authorized attacker to elevate privil
CVE-2026-26131 7.8 0.00% 1 0 2026-03-10T18:31:30 Incorrect default permissions in .NET allows an authorized attacker to elevate p
CVE-2026-2339 7.5 0.00% 1 0 2026-03-10T18:31:30 Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Sof
CVE-2026-3843 9.8 0.46% 2 0 2026-03-10T18:31:30 Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux conta
CVE-2026-24289 7.8 0.00% 1 0 2026-03-10T18:31:26 Use after free in Windows Kernel allows an authorized attacker to elevate privil
CVE-2026-1261 7.2 0.07% 1 0 2026-03-10T18:31:26 The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scriptin
CVE-2026-21262 8.8 0.00% 1 0 2026-03-10T18:31:25 Improper access control in SQL Server allows an authorized attacker to elevate p
CVE-2026-24291 7.8 0.00% 1 0 2026-03-10T18:31:25 Incorrect permission assignment for critical resource in Windows Accessibility I
CVE-2026-3585 7.5 0.06% 2 0 2026-03-10T18:31:24 The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in
CVE-2026-2364 7.3 0.01% 2 0 2026-03-10T18:31:24 If a legitimate user confirms a self-update prompt or initiate an installation o
CVE-2026-1508 4.3 0.00% 1 0 2026-03-10T18:31:24 The Court Reservation WordPress plugin before 1.10.9 does not have CSRF check i
CVE-2025-41711 5.3 0.02% 2 0 2026-03-10T18:31:24 An unauthenticated remote attacker can use firmware images to extract password h
CVE-2025-41710 6.5 0.03% 2 0 2026-03-10T18:31:24 An unauthenticated remote attacker may use hardcodes credentials to get access t
CVE-2026-0953 9.8 0.04% 1 0 2026-03-10T18:31:24 The Tutor LMS Pro plugin for WordPress is vulnerable to authentication bypass in
CVE-2026-3847 8.8 0.00% 2 0 2026-03-10T18:19:05.837000 Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidenc
CVE-2026-3845 8.8 0.00% 2 0 2026-03-10T18:19:05.507000 Heap buffer overflow in the Audio/Video: Playback component in Firefox for Andro
CVE-2026-3483 7.8 0.00% 1 0 2026-03-10T18:19:01.720000 An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local
CVE-2026-30985 7.8 0.00% 1 0 2026-03-10T18:18:57.663000 iccDEV provides a set of libraries and tools for working with ICC color manageme
CVE-2026-30978 7.8 0.00% 1 0 2026-03-10T18:18:56.537000 iccDEV provides a set of libraries and tools for working with ICC color manageme
CVE-2026-30934 8.9 0.00% 1 0 2026-03-10T18:18:53.257000 FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3
CVE-2026-30910 7.5 0.01% 1 0 2026-03-10T18:18:51.633000 Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overf
CVE-2026-26148 8.1 0.00% 1 0 2026-03-10T18:18:43.270000 External initialization of trusted variables or data stores in Azure Entra ID al
CVE-2026-26144 7.5 0.00% 4 0 2026-03-10T18:18:43.110000 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2026-26141 7.8 0.00% 1 0 2026-03-10T18:18:42.957000 Improper authentication in Azure Arc allows an authorized attacker to elevate pr
CVE-2026-26134 7.8 0.00% 1 0 2026-03-10T18:18:42.803000 Integer overflow or wraparound in Microsoft Office allows an authorized attacker
CVE-2026-26121 7.5 0.00% 1 0 2026-03-10T18:18:41.347000 Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized
CVE-2026-26118 8.8 0.00% 1 0 2026-03-10T18:18:41.180000 Server-side request forgery (ssrf) in Azure MCP Server allows an authorized atta
CVE-2025-41712 6.5 0.03% 2 0 2026-03-10T18:17:56.543000 An unauthenticated remote attacker who tricks a user to upload a manipulated HTM
CVE-2025-41709 9.8 0.05% 2 0 2026-03-10T18:17:55.980000 [PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allo
CVE-2026-27944 9.8 0.05% 4 3 template 2026-03-10T18:11:27.450000 Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.
CVE-2026-30920 8.6 0.01% 2 0 2026-03-10T17:40:16 OneUptime is a solution for monitoring and managing online services. Prior to 10
CVE-2026-27685 9.1 0.04% 1 0 2026-03-10T17:38:10.980000 SAP NetWeaver Enterprise Portal Administration is vulnerable if a privileged use
CVE-2026-30863 9.8 0.07% 1 1 2026-03-10T16:50:58.427000 Parse Server is an open source backend that can be deployed to any infrastructur
CVE-2026-3814 8.8 0.04% 2 0 2026-03-10T14:28:37.057000 A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected
CVE-2026-1603 8.6 67.72% 5 0 template 2026-03-10T13:11:30.467000 An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allo
CVE-2025-26399 9.8 34.23% 6 1 2026-03-10T13:11:15.553000 SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxP
CVE-2026-3288 8.8 0.04% 2 1 2026-03-10T09:32:52 A security issue was discovered in ingress-nginx where the `nginx.ingress.kubern
CVE-2026-30929 7.7 0.01% 1 0 2026-03-10T07:44:57.127000 ImageMagick is free and open-source software used for editing and manipulating d
CVE-2025-70238 7.5 0.04% 1 0 2026-03-09T21:32:45 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2025-70363 7.5 0.05% 1 0 2026-03-09T21:32:40 Incorrect access control in the REST API of Ibexa & Ciril GROUP eZ Platform / Ci
CVE-2026-3638 5.9 0.03% 1 0 2026-03-09T21:31:49 Improper access control in user and role restore API endpoints in Devolutions Se
CVE-2025-61612 7.5 0.15% 1 0 2026-03-09T21:31:37 In nr modem, there is a possible system crash due to improper input validation.
CVE-2025-61611 7.5 0.28% 1 0 2026-03-09T21:31:37 In modem, there is a possible improper input validation. This could lead to remo
CVE-2025-69279 7.5 0.15% 1 0 2026-03-09T21:31:37 In nr modem, there is a possible system crash due to improper input validation.
CVE-2025-61616 7.5 0.15% 1 0 2026-03-09T21:31:37 In nr modem, there is a possible system crash due to improper input validation.
CVE-2025-61615 7.5 0.15% 1 0 2026-03-09T21:31:37 In nr modem, there is a possible system crash due to improper input validation.
CVE-2025-61613 7.5 0.15% 1 0 2026-03-09T21:31:37 In nr modem, there is a possible system crash due to improper input validation.
CVE-2021-22054 7.5 93.74% 3 1 template 2026-03-09T21:31:33 VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.
CVE-2026-28802 9.8 0.04% 1 0 2026-03-09T21:20:56.980000 Authlib is a Python library which builds OAuth and OpenID Connect servers. From
CVE-2025-61614 7.5 0.15% 1 0 2026-03-09T21:16:12.060000 In nr modem, there is a possible system crash due to improper input validation.
CVE-2026-0846 8.6 0.08% 2 0 2026-03-09T20:16:05.703000 A vulnerability in the `filestring()` function of the `nltk.util` module in nltk
CVE-2025-69278 7.5 0.15% 1 0 2026-03-09T20:16:02.127000 In nr modem, there is a possible system crash due to improper input validation.
CVE-2026-30933 7.5 0.00% 4 0 2026-03-09T19:48:12 ### Summary The remediation for CVE-2026-27611 appears incomplete. Password pro
CVE-2026-3038 7.5 0.04% 1 0 2026-03-09T18:32:49 The rtsock_msg_buffer() function serializes routing information into a buffer.
CVE-2026-3588 7.5 0.02% 1 0 2026-03-09T18:31:50 A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 all
CVE-2025-70047 7.5 0.04% 1 0 2026-03-09T18:31:49 An issue pertaining to CWE-400: Uncontrolled Resource Consumption was discovered
CVE-2026-25866 7.8 0.01% 1 0 2026-03-09T18:31:49 MobaXterm versions prior to 26.1 contain an uncontrolled search path element vul
CVE-2026-29191 9.3 0.03% 1 0 2026-03-09T15:48:28 ### Summary A vulnerability was discovered in Zitadel's login V2 interface that
CVE-2026-2919 4.3 0.01% 1 0 2026-03-09T15:30:48 Malicious scripts could display attacker-controlled web content under spoofed do
CVE-2025-14769 7.5 0.01% 1 0 2026-03-09T15:30:47 In some cases, the `tcp-setmss` handler may free the packet data and throw an er
CVE-2026-2219 7.5 0.01% 1 0 2026-03-09T15:30:43 It was discovered that dpkg-deb (a component of dpkg, the Debian package managem
CVE-2026-3809 8.8 0.08% 1 0 2026-03-09T15:30:24.130000 A flaw has been found in Tenda FH1202 1.2.0.14(408). The impacted element is the
CVE-2026-3768 8.8 0.08% 2 0 2026-03-09T15:17:08.960000 A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by th
CVE-2026-3803 8.8 0.08% 1 0 2026-03-09T15:09:33.580000 A vulnerability was identified in Tenda i3 1.0.0.6(2204). This affects the funct
CVE-2025-41761 7.8 0.02% 2 0 2026-03-09T13:35:07.393000 A low‑privileged local attacker who gains access to the UBR service account (e.g
CVE-2025-41756 8.1 0.10% 1 0 2026-03-09T13:35:07.393000 A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.c
CVE-2026-3815 8.8 0.04% 2 0 2026-03-09T12:31:49 A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects
CVE-2025-41758 8.8 0.18% 1 0 2026-03-09T09:30:37 A low-privileged remote attacker can exploit an arbitrary file write vulnerabili
CVE-2025-41764 9.1 0.10% 2 0 2026-03-09T09:30:37 Due to insufficient authorization enforcement, an unauthorized remote attacker c
CVE-2025-41765 9.1 0.06% 1 0 2026-03-09T09:30:37 Due to insufficient authorization enforcement, an unauthorized remote attacker c
CVE-2025-41772 7.5 0.03% 1 0 2026-03-09T09:30:37 An unauthenticated remote attacker can obtain valid session tokens because they
CVE-2025-41766 8.8 0.39% 1 0 2026-03-09T09:30:37 A low-privileged remote attacker can trigger a stack-based buffer overflow via a
CVE-2026-3811 8.8 0.08% 2 0 2026-03-09T09:30:37 A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the functi
CVE-2025-41757 8.8 0.22% 1 0 2026-03-09T09:30:36 A low-privileged remote attacker can abuse the backup restore functionality of U
CVE-2026-3810 8.8 0.08% 1 0 2026-03-09T09:30:36 A vulnerability has been found in Tenda FH1202 1.2.0.14(408). This affects the f
CVE-2026-3808 8.8 0.09% 1 0 2026-03-09T09:30:30 A vulnerability was detected in Tenda FH1202 1.2.0.14(408). The affected element
CVE-2026-3807 8.8 0.08% 1 0 2026-03-09T09:30:30 A security vulnerability has been detected in Tenda FH1202 1.2.0.14(408). Impact
CVE-2026-3802 8.8 0.08% 1 0 2026-03-09T06:31:20 A vulnerability was determined in Tenda i3 1.0.0.6(2204). Affected by this issue
CVE-2026-30896 7.8 0.01% 1 0 2026-03-09T06:31:19 The installer for Qsee Client versions 1.0.1 and prior insecurely load Dynamic L
CVE-2026-3804 8.8 0.08% 2 0 2026-03-09T06:31:19 A security flaw has been discovered in Tenda i3 1.0.0.6(2204). This vulnerabilit
CVE-2026-3799 8.8 0.08% 1 0 2026-03-09T06:31:19 A flaw has been found in Tenda i3 1.0.0.6(2204). This impacts the function formS
CVE-2026-3801 8.8 0.09% 1 0 2026-03-09T06:31:19 A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerabil
CVE-2026-3787 7.0 0.01% 1 0 2026-03-09T00:30:19 A weakness has been identified in UltraVNC 1.6.4.0 on Windows. This affects an u
CVE-2026-3769 8.8 0.08% 2 0 2026-03-08T21:30:22 A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is th
CVE-2026-3732 8.8 0.08% 1 0 2026-03-08T12:30:35 A security vulnerability has been detected in Tenda F453 1.0.0.3. This affects t
CVE-2026-3729 8.8 0.08% 1 0 2026-03-08T12:30:34 A vulnerability was identified in Tenda F453 1.0.0.3/3.As. Impacted is the funct
CVE-2026-25070 None 1.03% 1 0 2026-03-07T03:30:29 XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain
CVE-2026-30227 None 1.01% 1 0 2026-03-06T22:52:51 ### Summary A CRLF Injection vulnerability in MimeKit 4.15.0 allows an attacker
CVE-2025-45691 7.5 0.05% 1 0 2026-03-06T22:23:33 An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in
CVE-2026-29058 9.8 0.10% 1 0 2026-03-06T21:56:51 ## Impact An unauthenticated attacker can execute arbitrary OS commands on the
CVE-2026-24105 9.8 1.69% 1 0 2026-03-06T21:05:36.243000 An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.1
CVE-2025-70229 9.8 0.06% 1 0 2026-03-06T17:38:28.367000 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2018-25181 7.5 0.57% 1 0 2026-03-06T15:31:36 Musicco 2.0.0 contains a path traversal vulnerability that allows unauthenticate
CVE-2026-25921 9.3 0.02% 1 0 2026-03-06T14:02:02.117000 Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwri
CVE-2025-70231 9.8 0.08% 1 0 2026-03-06T12:31:36 D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When proces
CVE-2025-70230 9.8 0.06% 1 0 2026-03-06T12:31:36 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2025-70616 7.8 0.01% 1 0 2026-03-06T12:31:36 A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys
CVE-2025-70233 9.8 0.06% 1 0 2026-03-06T12:30:31 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2025-70232 9.8 0.06% 1 0 2026-03-06T12:30:31 Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime para
CVE-2026-26478 9.8 1.22% 1 0 2026-03-04T18:32:01 A shell command injection vulnerability in Mobvoi Tichome Mini smart speaker 012
CVE-2026-2256 6.5 2.31% 1 1 2026-03-03T21:52:29.877000 A command injection vulnerability in ModelScope's ms-agent versions v1.6.0rc1 an
CVE-2026-21385 7.8 0.38% 3 1 2026-03-03T21:31:13 Memory corruption while using alignments for memory allocation.
CVE-2024-47886 7.2 0.89% 1 0 2026-03-03T19:11:21.227000 Chamilo is a learning management system. Chamillo is affected by a post-authenti
CVE-2026-24107 9.8 1.13% 1 0 2026-03-03T03:33:44 An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the
CVE-2026-24101 9.8 1.13% 1 0 2026-03-02T18:31:44 An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_mul
CVE-2026-27611 6.5 0.03% 4 0 2026-02-27T21:42:55 ### Summary When users share password-protected files, the recipient can complet
CVE-2026-27739 0 0.05% 1 1 2026-02-27T14:06:59.787000 The Angular SSR is a server-rise rendering tool for Angular applications. Versio
CVE-2026-20127 10.0 2.60% 3 5 2026-02-25T18:31:45 A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controlle
CVE-2026-20841 7.8 0.11% 1 12 2026-02-25T14:32:14.467000 Improper neutralization of special elements used in a command ('command injectio
CVE-2026-2138 8.8 0.08% 1 0 2026-02-10T19:28:57.427000 A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the
CVE-2026-25253 8.8 0.05% 1 7 2026-02-02T23:41:06 ## Summary The Control UI trusts `gatewayUrl` from the query string without val
CVE-2025-13154 5.5 0.03% 2 0 2026-01-16T15:55:33.063000 An improper link following vulnerability was reported in the SmartPerformanceAdd
CVE-2025-66005 0 0.02% 1 0 2026-01-14T16:25:12.057000 Lack of authorization of the InputManager D-Bus interface in InputPlumber versio
CVE-2025-14338 None 0.01% 1 0 2026-01-14T12:31:48 Polkit authentication dis isabled by default and a race condition in the Polkit
CVE-2025-0037 6.6 0.03% 1 0 2025-06-10T00:30:36 In AMD Versal Adaptive SoC devices, the lack of address validation when executin
CVE-2022-25912 8.1 43.30% 1 0 2025-04-22T21:15:42.690000 The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RC
CVE-2022-25860 9.8 41.35% 1 0 2025-04-01T23:03:12 Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code E
CVE-2026-1717 0 0.00% 2 0 N/A
CVE-2026-1716 0 0.00% 2 0 N/A
CVE-2026-1715 0 0.00% 2 0 N/A
CVE-2026-0866 0 0.00% 5 0 N/A
CVE-2026-3805 0 0.00% 3 0 N/A
CVE-2026-3784 0 0.00% 2 0 N/A
CVE-2026-3783 0 0.00% 2 0 N/A
CVE-2026-1965 0 0.00% 2 0 N/A
CVE-2026-28806 0 0.00% 2 0 N/A
CVE-2026-28514 0 0.11% 2 0 N/A
CVE-2026-30983 0 0.00% 2 0 N/A
CVE-2026-30979 0 0.00% 1 0 N/A
CVE-2026-30987 0 0.00% 1 0 N/A
CVE-2026-31795 0 0.00% 1 0 N/A
CVE-2026-31792 0 0.00% 1 0 N/A
CVE-2026-31796 0 0.00% 1 0 N/A
CVE-2026-30918 0 0.04% 1 0 N/A
CVE-2026-27603 0 0.07% 1 0 N/A
CVE-2026-27005 0 0.12% 1 0 N/A
CVE-2026-28693 0 0.04% 1 0 N/A
CVE-2026-28691 0 0.04% 1 0 N/A
CVE-2026-30862 0 0.04% 1 1 N/A
CVE-2026-28431 0 0.04% 1 0 N/A
CVE-2026-30240 0 0.03% 2 0 N/A
CVE-2026-31816 0 0.10% 2 0 N/A
CVE-2026-25737 0 0.05% 1 0 N/A
CVE-2025-62166 0 0.08% 1 0 N/A

CVE-2026-3826
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-11T09:32:00

2 posts

IFTOP developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server.

offseq at 2026-03-11T07:32:34.741Z ##

🚨 CVE-2026-3826 (CRITICAL): WellChoose IFTOP PHP LFI lets unauthenticated attackers execute remote code. No patch yet. Isolate affected systems & monitor for LFI attempts. Act now to avoid full compromise! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-11T07:32:34.000Z ##

🚨 CVE-2026-3826 (CRITICAL): WellChoose IFTOP PHP LFI lets unauthenticated attackers execute remote code. No patch yet. Isolate affected systems & monitor for LFI attempts. Act now to avoid full compromise! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #PHP #Vulnerability

##

CVE-2026-29515(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-03-11T06:31:47

2 posts

MiCode FileExplorer contains an authentication bypass vulnerability in the embedded SwiFTP FTP server component that allows network attackers to log in without valid credentials. Attackers can send arbitrary username and password combinations to the PASS command handler, which unconditionally grants access and allows listing, reading, writing, and deleting files exposed by the FTP server. The MiCo

offseq at 2026-03-11T04:32:41.128Z ##

🚨 CRITICAL vuln: CVE-2026-29515 in MiCode FileExplorer (all versions). FTP auth bypass via SwiFTP — any credentials grant access to read, write, or delete files. No patch; restrict FTP access ASAP! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-11T04:32:41.000Z ##

🚨 CRITICAL vuln: CVE-2026-29515 in MiCode FileExplorer (all versions). FTP auth bypass via SwiFTP — any credentials grant access to read, write, or delete files. No patch; restrict FTP access ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #MiCode #CVE202629515

##

CVE-2026-27842
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-11T06:31:41

2 posts

Authentication bypass issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker to bypass authentication and change the device configuration.

offseq at 2026-03-11T06:00:30.026Z ##

🚩 CVE-2026-27842 (CRITICAL, CVSS 9.8): Auth bypass in Micro Research MR-GM5L-S1 & MR-GM5A-L1 (pre-v2.01.04N1_02). Remote attackers can reconfigure devices. Patch ASAP & segment networks! Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-11T06:00:30.000Z ##

🚩 CVE-2026-27842 (CRITICAL, CVSS 9.8): Auth bypass in Micro Research MR-GM5L-S1 & MR-GM5A-L1 (pre-v2.01.04N1_02). Remote attackers can reconfigure devices. Patch ASAP & segment networks! Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #IoTSecurity

##

CVE-2026-2631
(0 None)

EPSS: 0.00%

updated 2026-03-11T06:17:14.467000

2 posts

The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an unauthenticated REST endpoint that allows any remote user to modify the option `datalogics_token` without verification. This token is subsequently used for authentication in a protected endpoint that allows users to perform arbitrary WordPress `update_option()` operations. Attackers can use this to enable registartion and

offseq at 2026-03-11T09:00:32.546Z ##

🛑 CVE-2026-2631 (CRITICAL): Datalogics Ecommerce Delivery WP plugin (<2.6.60) lets unauthenticated attackers gain admin via REST endpoint. Patch or restrict access now! Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-11T09:00:32.000Z ##

🛑 CVE-2026-2631 (CRITICAL): Datalogics Ecommerce Delivery WP plugin (<2.6.60) lets unauthenticated attackers gain admin via REST endpoint. Patch or restrict access now! Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #Infosec

##

CVE-2026-24448
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-11T06:17:13.697000

2 posts

Use of hard-coded credentials issue exists in MR-GM5L-S1 and MR-GM5A-L1, which may allow an attacker to obtain administrative access.

offseq at 2026-03-11T10:30:28.586Z ##

🔴 CVE-2026-24448 (CRITICAL, CVSS 9.8): Micro Research MR-GM5L-S1/MR-GM5A-L1 devices contain hard-coded credentials, allowing admin access w/o authentication. Update firmware to v2.01.04N1_02 ASAP! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-11T10:30:28.000Z ##

🔴 CVE-2026-24448 (CRITICAL, CVSS 9.8): Micro Research MR-GM5L-S1/MR-GM5A-L1 devices contain hard-coded credentials, allowing admin access w/o authentication. Update firmware to v2.01.04N1_02 ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CVE #IoTSecurity #Vuln

##

CVE-2026-0124(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-03-11T00:31:32

2 posts

There is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

offseq at 2026-03-11T01:30:26.465Z ##

⚠️ CVE-2026-0124 (CRITICAL, CVSS 10) hits Google Pixel devices: local out-of-bounds write means privilege escalation — no user interaction needed. Restrict access, monitor now, patch ASAP when available. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-11T01:30:26.000Z ##

⚠️ CVE-2026-0124 (CRITICAL, CVSS 10) hits Google Pixel devices: local out-of-bounds write means privilege escalation — no user interaction needed. Restrict access, monitor now, patch ASAP when available. radar.offseq.com/threat/cve-20 #OffSeq #Android #Vuln #MobileSecurity

##

CVE-2026-30966
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-03-11T00:21:09

2 posts

### Impact Parse Server's internal tables, which store Relation field mappings such as role memberships, can be directly accessed via the REST API or GraphQL API by any client using only the application key. No master key is required. An attacker can create, read, update, or delete records in any internal relationship table. Exploiting this allows the attacker to inject themselves into any Parse

offseq at 2026-03-11T03:00:29.083Z ##

🚨 CRITICAL: CVE-2026-30966 in parse-server (<9.5.2-alpha.7, <8.6.20) lets attackers gain any role via REST/GraphQL with just the app key. Upgrade now and restrict API access! Full details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-11T03:00:29.000Z ##

🚨 CRITICAL: CVE-2026-30966 in parse-server (<9.5.2-alpha.7, <8.6.20) lets attackers gain any role via REST/GraphQL with just the app key. Upgrade now and restrict API access! Full details: radar.offseq.com/threat/cve-20 #OffSeq #parseServer #CVE202630966 #infosec

##

CVE-2026-26738
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T21:33:20

1 posts

Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows a remote attacker to execute arbitrary code via a crafted .sns snapshot file.

thehackerwire@mastodon.social at 2026-03-10T20:01:29.000Z ##

🟠 CVE-2026-26738 - High (7.8)

Buffer Overflow vulnerability in Uderzo Software SpaceSniffer v.2.0.5.18 allows a remote attacker to execute arbitrary code via a crafted .sns snapshot file.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26801
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-10T21:32:24

1 posts

Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.2 through 0.3.5 allows a remote attacker to obtain sensitive information via the src/URLResolver.js component. The fix was released in version 0.3.6 which introduces the setUrlAccessPolicy() method allowing server operators to define URL access rules. A warning is now logged when pdfmake is used server-side without a p

thehackerwire@mastodon.social at 2026-03-10T20:01:18.000Z ##

🟠 CVE-2026-26801 - High (7.5)

Server-Side Request Forgery (SSRF) vulnerability in pdfmake versions 0.3.0-beta.2 through 0.3.5 allows a remote attacker to obtain sensitive information via the src/URLResolver.js component. The fix was released in version 0.3.6 which introduces t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27276
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T21:32:24

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:44.000Z ##

🟠 CVE-2026-27276 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27273
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T21:32:24

2 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:23.000Z ##

🟠 CVE-2026-27273 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:30:29.000Z ##

🟠 CVE-2026-27273 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27274
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T21:32:24

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:30:31.000Z ##

🟠 CVE-2026-27274 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27280
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T21:32:24

1 posts

DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:30:12.000Z ##

🟠 CVE-2026-27280 - High (7.8)

DNG SDK versions 1.7.1 2471 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim mu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27277
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T21:32:17

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:54.000Z ##

🟠 CVE-2026-27277 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27279
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T21:32:17

2 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:04.000Z ##

🟠 CVE-2026-27279 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:30:08.000Z ##

🟠 CVE-2026-27279 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-11158
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-10T21:32:14

1 posts

Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.6, including 9.3.x and 8.3.x, do not restrict Groovy scripts in new PRPT reports published by users, allowing insertion of arbitrary scripts and leading to a RCE.

thehackerwire@mastodon.social at 2026-03-10T16:39:08.000Z ##

🔴 CVE-2025-11158 - Critical (9.1)

Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.6, including 9.3.x and 8.3.x, do not restrict Groovy scripts in new PRPT reports published by users, allowing insertion of arbitrary scripts and leading to a RCE.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24457
(9.1 CRITICAL)

EPSS: 0.19%

updated 2026-03-10T19:52:11.887000

1 posts

An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read arbitrary files from a MQ Broker's server. A full exploitation could read unauthorized files of the OpenMQ’s host OS. In some scenarios RCE could be achieved.

thehackerwire@mastodon.social at 2026-03-08T12:00:32.000Z ##

🔴 CVE-2026-24457 - Critical (9.1)

An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read arbitrary files from a MQ Broker's server. A full exploitation could read unauthorized files of the OpenMQ’s host OS. In some scenarios RCE could be achieved.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13476
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-10T19:49:55.930000

1 posts

Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block proxy traffic, undermining censorship circumvention. (CWE-327)

thehackerwire@mastodon.social at 2026-03-08T13:00:37.000Z ##

🔴 CVE-2025-13476 - Critical (9.8)

Rakuten Viber Cloak mode in Android v25.7.2.0g and Windows v25.6.0.0–v25.8.1.0 uses a static and predictable TLS ClientHello fingerprint lacking extension diversity, allowing Deep Packet Inspection (DPI) systems to trivially identify and block p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14675
(7.2 HIGH)

EPSS: 0.68%

updated 2026-03-10T19:34:20

1 posts

The Meta Box plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'ajax_delete_file' function in all versions up to, and including, 5.11.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-27826
(8.2 HIGH)

EPSS: 0.00%

updated 2026-03-10T19:17:20.670000

2 posts

MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (Confluence and Jira). Prior to version 0.17.0, an unauthenticated attacker who can reach the mcp-atlassian HTTP endpoint can force the server process to make outbound HTTP requests to an arbitrary attacker-controlled URL by supplying two custom HTTP headers without an `Authorization` header. No authentication is require

1 repos

https://github.com/plutosecurity/MCPwnfluence

thehackerwire@mastodon.social at 2026-03-10T19:31:14.000Z ##

🟠 CVE-2026-27826 - High (8.2)

MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (Confluence and Jira). Prior to version 0.17.0, an unauthenticated attacker who can reach the mcp-atlassian HTTP endpoint can force the server process to make outbound H...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:30:19.000Z ##

🟠 CVE-2026-27826 - High (8.2)

MCP Atlassian is a Model Context Protocol (MCP) server for Atlassian products (Confluence and Jira). Prior to version 0.17.0, an unauthenticated attacker who can reach the mcp-atlassian HTTP endpoint can force the server process to make outbound H...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27275
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T19:17:19.560000

1 posts

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:31:34.000Z ##

🟠 CVE-2026-27275 - High (7.8)

Substance3D - Stager versions 3.1.7 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27269
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T19:17:18.980000

1 posts

Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

thehackerwire@mastodon.social at 2026-03-10T19:32:50.000Z ##

🟠 CVE-2026-27269 - High (7.8)

Premiere Pro versions 25.5 and earlier are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69219
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-10T18:58:35.607000

1 posts

A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airflow, the likelihood of it making any damage is low. You should upgrade to version 6.0.0 of the provider to avoid even that risk.

2 repos

https://github.com/ahmetartuc/poc-cve-2025-69219

https://github.com/sak110/CVE-2025-69219

thehackerwire@mastodon.social at 2026-03-09T16:38:29.000Z ##

🟠 CVE-2025-69219 - High (8.8)

A user with access to the DB could craft a database entry that would result in executing code on Triggerer - which gives anyone who have access to DB the same permissions as Dag Author. Since direct DB access is not usual and recommended for Airfl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3630
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-10T18:48:52.193000

3 posts

Delta Electronics COMMGR2 has Stack-based Buffer Overflow vulnerability.

offseq@infosec.exchange at 2026-03-09T18:00:15.000Z ##

🔔 CVE-2026-3630: CRITICAL stack-based buffer overflow in DeltaWW COMMGR2 (CVSS 9.8). Remote, unauthenticated RCE risk — no patch yet. Segment & restrict network access, monitor for exploits. More: radar.offseq.com/threat/cve-20 #OffSeq #ICS #Vulnerability #OTsecurity

##

offseq@infosec.exchange at 2026-03-09T04:30:28.000Z ##

🔴 CVE-2026-3630: CRITICAL stack-based buffer overflow in DeltaWW COMMGR2 (ver 0) enables unauthenticated RCE. No patch available. Segment networks, enable IDS/IPS, & monitor for exploitation. Details: radar.offseq.com/threat/cve-20 #OffSeq #ICS #Vuln #CyberSecurity

##

thehackerwire@mastodon.social at 2026-03-09T04:19:28.000Z ##

🔴 CVE-2026-3630 - Critical (9.8)

Delta Electronics COMMGR2 has

Stack-based Buffer Overflow vulnerability.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3631
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-10T18:48:42.673000

1 posts

Delta Electronics COMMGR2 has Buffer Over-read DoS vulnerability.

CVE-2026-3823
(8.8 HIGH)

EPSS: 0.14%

updated 2026-03-10T18:46:53.270000

3 posts

EHG2408 series switch developed by Atop Technologies has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and execute arbitrary code.

offseq@infosec.exchange at 2026-03-09T16:30:30.000Z ##

🚨 CRITICAL: CVE-2026-3823 exposes Atop EHG2408 switches to unauthenticated RCE via stack-based buffer overflow. No patch yet — segment, restrict access, and monitor traffic. Full device compromise risk. radar.offseq.com/threat/cve-20 #OffSeq #ICS #Vuln #OTSecurity

##

thehackerwire@mastodon.social at 2026-03-09T08:01:20.000Z ##

🟠 CVE-2026-3823 - High (8.8)

EHG2408 series switch developed by Atop Technologies has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and execute arbitrary code.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-09T07:30:30.000Z ##

CRITICAL: CVE-2026-3823 in Atop EHG2408 switches — stack-based buffer overflow allows unauth'd remote code exec. No patch yet. Segment, monitor & restrict access ASAP! 🛡️ radar.offseq.com/threat/cve-20 #OffSeq #CVE20263823 #ICS #Vulnerability

##

CVE-2026-30944
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:45:50

2 posts

## Summary The /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user (at least Editor) to generate API tokens for any other user, including owner and admin accounts. The endpoint fails to validate whether the requesting user is authorized to create tokens on behalf of the target user ID, resulting in a full privilege escalation. ## Details The API token generation endpoint ac

1 repos

https://github.com/FilipeGaudard/CVE-2026-30944-PoC

thehackerwire@mastodon.social at 2026-03-10T19:01:30.000Z ##

🟠 CVE-2026-30944 - High (8.8)

StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user (at least Editor) to generate API tokens for any other user, incl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:44:25.000Z ##

🟠 CVE-2026-30944 - High (8.8)

StudioCMS is a server-side-rendered, Astro native, headless content management system. Prior to 0.4.0, the /studiocms_api/dashboard/api-tokens endpoint allows any authenticated user (at least Editor) to generate API tokens for any other user, incl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30957
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-03-10T18:45:14

3 posts

### Summary OneUptime Synthetic Monitors allow a low-privileged authenticated project user to execute arbitrary commands on the `oneuptime-probe` server/container. The root cause is that untrusted Synthetic Monitor code is executed inside Node's `vm` while live host-realm Playwright `browser` and `page` objects are exposed to it. A malicious user can call Playwright APIs on the injected `browser

thehackerwire@mastodon.social at 2026-03-10T19:15:55.000Z ##

🔴 CVE-2026-30957 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, OneUptime Synthetic Monitors allow a low-privileged authenticated project user to execute arbitrary commands on the oneuptime-probe server/container. The root c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:01:40.000Z ##

🔴 CVE-2026-30957 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, OneUptime Synthetic Monitors allow a low-privileged authenticated project user to execute arbitrary commands on the oneuptime-probe server/container. The root c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:44:35.000Z ##

🔴 CVE-2026-30957 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, OneUptime Synthetic Monitors allow a low-privileged authenticated project user to execute arbitrary commands on the oneuptime-probe server/container. The root c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30956
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-03-10T18:45:04

1 posts

### Summary A low‑privileged user can bypass authorization and tenant isolation in OneUptime `v10.0.20` by sending a forged `is-multi-tenant-query` header together with a controlled `projectid` header. Because the server trusts this client-supplied header, internal permission checks in `BasePermission` are skipped and tenant scoping is disabled. This allows attackers to: 1. Access project data

thehackerwire@mastodon.social at 2026-03-10T18:44:34.000Z ##

🔴 CVE-2026-30956 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, a low‑privileged user can bypass authorization and tenant isolation in OneUptime v10.0.20 and earlier by sending a forged is-multi-tenant-query header togethe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30921
(10.0 CRITICAL)

EPSS: 0.01%

updated 2026-03-10T18:44:25

2 posts

Summary OneUptime Synthetic Monitors allow low-privileged project users to submit custom Playwright code that is executed on the `oneuptime-probe` service. In the current implementation, this untrusted code is run inside Node's `vm` and is given live host Playwright objects such as `browser` and `page`. This creates a distinct server-side RCE primitive: the attacker does not need the classic `th

thehackerwire@mastodon.social at 2026-03-10T18:01:18.000Z ##

🔴 CVE-2026-30921 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.20, OneUptime Synthetic Monitors allow low-privileged project users to submit custom Playwright code that is executed on the oneuptime-probe service. In the current...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:00:58.000Z ##

🔴 CVE-2026-30921 - Critical (9.9)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.20, OneUptime Synthetic Monitors allow low-privileged project users to submit custom Playwright code that is executed on the oneuptime-probe service. In the current...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30869
(9.3 CRITICAL)

EPSS: 0.43%

updated 2026-03-10T18:43:20

1 posts

### Summary A path traversal vulnerability in the `/export` endpoint allows an attacker to read arbitrary files from the server filesystem. By exploiting double‑encoded traversal sequences, an attacker can access sensitive files such as `conf/conf.json`, which contains secrets including the API token, cookie signing key, and workspace access authentication code. Leaking these secrets may enable a

offseq@infosec.exchange at 2026-03-10T00:00:44.000Z ##

🚨 CRITICAL: CVE-2026-30869 affects SiYuan (< 3.5.10) — path traversal via /export lets attackers read sensitive files (API tokens, keys). Patch to 3.5.10+ now! No auth needed. All admins review configs. radar.offseq.com/threat/cve-20 #OffSeq #CVE202630869 #infosec

##

CVE-2026-28292
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-03-10T18:38:58

3 posts

### Summary The `blockUnsafeOperationsPlugin` in `simple-git` fails to block git protocol override arguments when the config key is passed in uppercase or mixed case. An attacker who controls arguments passed to git operations can enable the `ext::` protocol by passing `-c PROTOCOL.ALLOW=always`, which executes an arbitrary OS command on the host machine. --- ### Details The `preventProtocolOv

_r_netsec at 2026-03-11T07:13:05.299Z ##

CVE-2026-28292: RCE in simple-git via case-sensitivity bypass (CVSS 9.8) codeant.ai/security-research/s

##

_r_netsec@infosec.exchange at 2026-03-11T07:13:05.000Z ##

CVE-2026-28292: RCE in simple-git via case-sensitivity bypass (CVSS 9.8) codeant.ai/security-research/s

##

thehackerwire@mastodon.social at 2026-03-10T19:30:22.000Z ##

🔴 CVE-2026-28292 - Critical (9.8)

`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26128
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:31

1 posts

Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T20:04:09.000Z ##

🟠 CVE-2026-26128 - High (7.8)

Improper authentication in Windows SMB Server allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26130
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:31

3 posts

Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.

thehackerwire@mastodon.social at 2026-03-10T19:18:03.000Z ##

🟠 CVE-2026-26130 - High (7.5)

Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:16:14.000Z ##

🟠 CVE-2026-26130 - High (7.5)

Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

blowdart.me@bsky.brid.gy at 2026-03-10T17:43:04.084Z ##

CVE-2026-26130 - A denial of service attack against SignalR. Update your runtime, restart your SignalR apps. github.com/dotnet/annou... (2/5)

Microsoft Security Advisory CV...

##

CVE-2026-26117
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:30

5 posts

Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.

obivan at 2026-03-11T07:02:21.358Z ##

CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation & Cloud Identity Takeover cymulate.com/blog/cve-2026-261

##

_r_netsec at 2026-03-11T06:28:06.102Z ##

CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation & Cloud Identity Takeover cymulate.com/blog/cve-2026-261

##

obivan@infosec.exchange at 2026-03-11T07:02:21.000Z ##

CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation & Cloud Identity Takeover cymulate.com/blog/cve-2026-261

##

_r_netsec@infosec.exchange at 2026-03-11T06:28:06.000Z ##

CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation & Cloud Identity Takeover cymulate.com/blog/cve-2026-261

##

thehackerwire@mastodon.social at 2026-03-10T20:01:40.000Z ##

🟠 CVE-2026-26117 - High (7.8)

Authentication bypass using an alternate path or channel in Azure Windows Virtual Machine Agent allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26113
(8.4 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:30

1 posts

Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.

thehackerwire@mastodon.social at 2026-03-10T20:04:19.000Z ##

🟠 CVE-2026-26113 - High (8.4)

Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26127
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:30

1 posts

Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.

thehackerwire@mastodon.social at 2026-03-10T20:02:19.000Z ##

🟠 CVE-2026-26127 - High (7.5)

Out-of-bounds read in .NET allows an unauthorized attacker to deny service over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26132
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:30

1 posts

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T19:16:33.000Z ##

🟠 CVE-2026-26132 - High (7.8)

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26131
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:30

1 posts

Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T19:16:24.000Z ##

🟠 CVE-2026-26131 - High (7.8)

Incorrect default permissions in .NET allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2339
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:30

1 posts

Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Liderahenk allows Remote Code Inclusion, Privilege Abuse, Command Injection.This issue affects Liderahenk: before v3.4.0.

thehackerwire@mastodon.social at 2026-03-10T19:02:12.000Z ##

🟠 CVE-2026-2339 - High (7.5)

Missing Authentication for Critical Function vulnerability in TUBITAK BILGEM Software Technologies Research Institute Liderahenk allows Remote Code Inclusion, Privilege Abuse, Command Injection.This issue affects Liderahenk: before v3.4.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3843
(9.8 CRITICAL)

EPSS: 0.46%

updated 2026-03-10T18:31:30

2 posts

Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux contains a SQL Injection vulnerability (CWE-89) in the system configuration module. A remote attacker can send specially crafted HTTP POST requests to the /php/request.php endpoint via the sql parameter in application/x-www-form-urlencoded data (e.g., action=do&sql=<query_here>&reload_driver=0) to execute arbitrary SQL comm

thehackerwire@mastodon.social at 2026-03-10T18:24:44.000Z ##

🔴 CVE-2026-3843 - Critical (9.8)

Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux contains a SQL Injection vulnerability (CWE-89) in the system configuration module. A remote attacker can send specially crafted HTTP POST requests to the /php/request.php ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:20:50.000Z ##

🔴 CVE-2026-3843 - Critical (9.8)

Nefteprodukttekhnika BUK TS-G Gas Station Automation System 2.9.1 on Linux contains a SQL Injection vulnerability (CWE-89) in the system configuration module. A remote attacker can send specially crafted HTTP POST requests to the /php/request.php ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24289
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:26

1 posts

Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally.

Mozilla@activitypub.awakari.com at 2026-03-11T00:32:51.000Z ## Microsoft Patch Tuesday, March 2026 Edition Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressi...

#Security #Bloggers #Network #Adam #Barnett #adobe #Ben #McCarthy #CVE-2026-21262 #CVE-2026-24289 #CVE-2026-24291

Origin | Interest | Match ##

CVE-2026-1261
(7.2 HIGH)

EPSS: 0.07%

updated 2026-03-10T18:31:26

1 posts

The MetForm Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Quiz feature in all versions up to, and including, 3.9.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

offseq@infosec.exchange at 2026-03-10T10:30:27.000Z ##

🚨 CVE-2026-1261: HIGH-severity stored XSS in all Wpmet MetForm Pro versions (Quiz feature). Unauthenticated attackers can inject persistent scripts, risking user data and site integrity. Disable Quiz & monitor for patches. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS

##

CVE-2026-21262
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:25

1 posts

Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network.

Mozilla@activitypub.awakari.com at 2026-03-11T00:32:51.000Z ## Microsoft Patch Tuesday, March 2026 Edition Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressi...

#Security #Bloggers #Network #Adam #Barnett #adobe #Ben #McCarthy #CVE-2026-21262 #CVE-2026-24289 #CVE-2026-24291

Origin | Interest | Match ##

CVE-2026-24291
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:31:25

1 posts

Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to elevate privileges locally.

Mozilla@activitypub.awakari.com at 2026-03-11T00:32:51.000Z ## Microsoft Patch Tuesday, March 2026 Edition Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressi...

#Security #Bloggers #Network #Adam #Barnett #adobe #Ben #McCarthy #CVE-2026-21262 #CVE-2026-24289 #CVE-2026-24291

Origin | Interest | Match ##

CVE-2026-3585
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-10T18:31:24

2 posts

The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.17 via the 'ajax_create_import' function. This makes it possible for authenticated attackers, with Author-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

thehackerwire@mastodon.social at 2026-03-10T18:00:39.000Z ##

🟠 CVE-2026-3585 - High (7.5)

The The Events Calendar plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.15.17 via the 'ajax_create_import' function. This makes it possible for authenticated attackers, with Author-level access and abov...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-10T04:30:27.000Z ##

🚨 CVE-2026-3585 (HIGH): Path traversal in stellarwp The Events Calendar plugin lets Author+ users read any files on WordPress servers up to v6.15.17. Restrict access, monitor logs, and patch ASAP. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #Cybersecurity

##

CVE-2026-2364
(7.3 HIGH)

EPSS: 0.01%

updated 2026-03-10T18:31:24

2 posts

If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low privileged local attacker can gain elevated rights due to a TOCTOU vulnerability in the CODESYS installer.

offseq@infosec.exchange at 2026-03-10T09:00:28.000Z ##

🚩 CVE-2026-2364: HIGH severity TOCTOU flaw in CODESYS Installer (all versions) lets local attackers escalate privileges via user-initiated updates. Restrict access & monitor until patch. No active exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #CODESYS #ICS #Vuln

##

certvde@infosec.exchange at 2026-03-10T07:44:02.000Z ##

#OT #Advisory VDE-2026-012
CODESYS Installer - Possible Privilege Escalation

Exploitation of this vulnerability can lead to a privilege escalation on the host system.
#CVE CVE-2026-2364

certvde.com/en/advisories/vde-

#CSAF codesys.csaf-tp.certvde.com/.w

##

CVE-2026-1508
(4.3 MEDIUM)

EPSS: 0.00%

updated 2026-03-10T18:31:24

1 posts

The Court Reservation WordPress plugin before 1.10.9 does not have CSRF check in place when deleting events, which could allow attackers to make a logged in admin delete them via a CSRF attack

offseq@infosec.exchange at 2026-03-10T07:30:26.000Z ##

🔒 CVE-2026-1508 (HIGH): Court Reservation WordPress plugin <1.10.9 has a CSRF flaw — admins can be tricked into deleting events via crafted requests. No live exploits yet. Update ASAP or add nonce checks! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CSRF #Infosec

##

CVE-2025-41711
(5.3 MEDIUM)

EPSS: 0.02%

updated 2026-03-10T18:31:24

2 posts

An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.

certvde@infosec.exchange at 2026-03-10T07:24:46.000Z ##

#OT #Advisory VDE-2025-096
Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230

An unauthenticated remote attacker can exploit several vulnerabilities in Weidmueller devices Energy Meter 750-24 and Energy Meter 750-230 to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711
#oCSAF
certvde.com/en/advisories/vde-

#CSAF weidmueller.csaf-tp.certvde.co

##

certvde@infosec.exchange at 2026-03-10T07:23:00.000Z ##

#OT #Advisory VDE-2025-079
Janitza: Multiple vulnerabilities in UMG 96RM-E

An unauthenticated remote attacker can exploit several vulnerabilities in Janitza UMG 96RM-E devices to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711

certvde.com/en/advisories/vde-
#oCSAF
#CSAF janitza.csaf-tp.certvde.com/.w

##

CVE-2025-41710
(6.5 MEDIUM)

EPSS: 0.03%

updated 2026-03-10T18:31:24

2 posts

An unauthenticated remote attacker may use hardcodes credentials to get access to the previously activated FTP Server with limited read and write privileges.

certvde@infosec.exchange at 2026-03-10T07:24:46.000Z ##

#OT #Advisory VDE-2025-096
Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230

An unauthenticated remote attacker can exploit several vulnerabilities in Weidmueller devices Energy Meter 750-24 and Energy Meter 750-230 to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711
#oCSAF
certvde.com/en/advisories/vde-

#CSAF weidmueller.csaf-tp.certvde.co

##

certvde@infosec.exchange at 2026-03-10T07:23:00.000Z ##

#OT #Advisory VDE-2025-079
Janitza: Multiple vulnerabilities in UMG 96RM-E

An unauthenticated remote attacker can exploit several vulnerabilities in Janitza UMG 96RM-E devices to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711

certvde.com/en/advisories/vde-
#oCSAF
#CSAF janitza.csaf-tp.certvde.com/.w

##

CVE-2026-0953
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-10T18:31:24

1 posts

The Tutor LMS Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.9.5 via the Social Login addon. This is due to the plugin failing to verify that the email provided in the authentication request matches the email from the validated OAuth token. This makes it possible for unauthenticated attackers to log in as any existing user, including adminis

offseq@infosec.exchange at 2026-03-10T06:02:26.000Z ##

🚨 CRITICAL: CVE-2026-0953 impacts all versions of themeum Tutor LMS Pro for WordPress. Flawed Social Login lets attackers bypass authentication using valid OAuth tokens + victim’s email. Admin accounts at risk. Patch or restrict access! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec

##

CVE-2026-3847
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:19:05.837000

2 posts

Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148.0.2.

thehackerwire@mastodon.social at 2026-03-10T18:40:39.000Z ##

🟠 CVE-2026-3847 - High (8.8)

Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 14...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:21:09.000Z ##

🟠 CVE-2026-3847 - High (8.8)

Memory safety bugs present in Firefox 148.0.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 14...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3845
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:19:05.507000

2 posts

Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android. This vulnerability affects Firefox < 148.0.2.

thehackerwire@mastodon.social at 2026-03-10T18:24:53.000Z ##

🟠 CVE-2026-3845 - High (8.8)

Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android. This vulnerability affects Firefox &lt; 148.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:20:59.000Z ##

🟠 CVE-2026-3845 - High (8.8)

Heap buffer overflow in the Audio/Video: Playback component in Firefox for Android. This vulnerability affects Firefox &lt; 148.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3483
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:19:01.720000

1 posts

An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local authenticated attacker to escalate their privileges.

thehackerwire@mastodon.social at 2026-03-10T18:21:22.000Z ##

🟠 CVE-2026-3483 - High (7.8)

An exposed dangerous method in Ivanti DSM before version 2026.1.1 allows a local authenticated attacker to escalate their privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30985
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:57.663000

1 posts

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow write in CIccMatrixMath::SetRange() causing memory corruption or crash. This vulnerability is fixed in 2.3.1.5.

thehackerwire@mastodon.social at 2026-03-10T18:43:38.000Z ##

🟠 CVE-2026-30985 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow write in CIccMatrixMath::SetRange() causing memory corruption or crash. This vulnerability is fixe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30978
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:56.537000

1 posts

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-use-after-free in CIccCmm::AddXform() causing invalid vptr dereference and crash. This vulnerability is fixed in 2.3.1.5.

thehackerwire@mastodon.social at 2026-03-10T18:43:47.000Z ##

🟠 CVE-2026-30978 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-use-after-free in CIccCmm::AddXform() causing invalid vptr dereference and crash. This vulnerability is fixed in 2.3.1.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30934
(8.9 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:53.257000

1 posts

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, Stored XSS is possible via share metadata fields (e.g., title, description) that are rendered into HTML for /public/share/<hash> without context-aware escaping. The server uses text/template instead of html/template, allowing injected scripts to execute when victims visit the share URL. This v

thehackerwire@mastodon.social at 2026-03-10T18:44:44.000Z ##

🟠 CVE-2026-30934 - High (8.9)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, Stored XSS is possible via share metadata fields (e.g., title, description) that are rendered into HTML for /public/share/ without context-aw...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30910
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-10T18:18:51.633000

1 posts

Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows. Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integer wraparound causing an undersized output buffer. This can cause a crash in bin2hex and encryption algorithms other than aes256gcm. For aes256gcm encryp

thehackerwire@mastodon.social at 2026-03-10T17:16:38.000Z ##

🟠 CVE-2026-30910 - High (7.5)

Crypt::Sodium::XS versions through 0.001000 for Perl has potential integer overflows.

Combined aead encryption, combined signature creation, and bin2hex functions do not check that output size will be less than SIZE_MAX, which could lead to integ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26148
(8.1 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:43.270000

1 posts

External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T19:02:30.000Z ##

🟠 CVE-2026-26148 - High (8.1)

External initialization of trusted variables or data stores in Azure Entra ID allows an unauthorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26144
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:43.110000

4 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office Excel allows an unauthorized attacker to disclose information over a network.

PC_Fluesterer@social.tchncs.de at 2026-03-11T10:23:47.000Z ##

Microsoft Flickentag 2026-03

Nach dem fetten Flickentag im Februar ist der für März wieder auf "normales" Maß geschrumpft. Mit den aktuellen Updates adressiert Microsoft (MS) 83 Sicherheitslücken. Von denen sind 8 als kritisch eingestuft. Von denen wiederum sticht eine (CVE-2026-26144) heraus. Ein führender Sicherheitsfachmann findet sie faszinierend. Es handelt sich um einen Fehler in Excel, nämlich "unzureichende Bereinigung von Eingaben". Der Leckerbissen besteht darin, dass ein Angreifer den Fehler nutzen kann, um mit Hilfe der KI Copilot von Ferne Informationen abzusaugen. Dafür sind keine Anmeldung oder Benutzerrechte

pc-fluesterer.info/wordpress/2

#Empfehlung #Hintergrund #Warnung #0day #datenschutz #Microsoft #office #privacy #sicherheit #UnplugTrump #vorbeugen #unplugmicrosoft

##

PC_Fluesterer@social.tchncs.de at 2026-03-11T10:23:47.000Z ##

Microsoft Flickentag 2026-03

Nach dem fetten Flickentag im Februar ist der für März wieder auf "normales" Maß geschrumpft. Mit den aktuellen Updates adressiert Microsoft (MS) 83 Sicherheitslücken. Von denen sind 8 als kritisch eingestuft. Von denen wiederum sticht eine (CVE-2026-26144) heraus. Ein führender Sicherheitsfachmann findet sie faszinierend. Es handelt sich um einen Fehler in Excel, nämlich "unzureichende Bereinigung von Eingaben". Der Leckerbissen besteht darin, dass ein Angreifer den Fehler nutzen kann, um mit Hilfe der KI Copilot von Ferne Informationen abzusaugen. Dafür sind keine Anmeldung oder Benutzerrechte

pc-fluesterer.info/wordpress/2

#Empfehlung #Hintergrund #Warnung #0day #datenschutz #Microsoft #office #privacy #sicherheit #UnplugTrump #vorbeugen #unplugmicrosoft

##

thezdi@infosec.exchange at 2026-03-10T22:18:05.000Z ##

And don't miss our bug of the month! Each patch Tuesday we'll be selecting our very favorite patch to highlight. This month, it CVE-2026-26144 - a Critical-rated info disclosure in Excel that uses the Copilot Agent to exfiltrate data. Neat! youtube.com/shorts/r4EjP3JxYRk

##

thehackerwire@mastodon.social at 2026-03-10T19:02:21.000Z ##

🟠 CVE-2026-26144 - High (7.5)

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Office Excel allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26141
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:42.957000

1 posts

Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T19:18:12.000Z ##

🟠 CVE-2026-26141 - High (7.8)

Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26134
(7.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:42.803000

1 posts

Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-03-10T19:16:42.000Z ##

🟠 CVE-2026-26134 - High (7.8)

Integer overflow or wraparound in Microsoft Office allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26121
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:41.347000

1 posts

Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network.

thehackerwire@mastodon.social at 2026-03-10T20:02:09.000Z ##

🟠 CVE-2026-26121 - High (7.5)

Server-side request forgery (ssrf) in Azure IoT Explorer allows an unauthorized attacker to perform spoofing over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26118
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-10T18:18:41.180000

1 posts

Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-03-10T20:02:00.000Z ##

🟠 CVE-2026-26118 - High (8.8)

Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41712
(6.5 MEDIUM)

EPSS: 0.03%

updated 2026-03-10T18:17:56.543000

2 posts

An unauthenticated remote attacker who tricks a user to upload a manipulated HTML file can get access to sensitive information on the device. This is a result of incorrect permission assignment for the web server.

certvde@infosec.exchange at 2026-03-10T07:24:46.000Z ##

#OT #Advisory VDE-2025-096
Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230

An unauthenticated remote attacker can exploit several vulnerabilities in Weidmueller devices Energy Meter 750-24 and Energy Meter 750-230 to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711
#oCSAF
certvde.com/en/advisories/vde-

#CSAF weidmueller.csaf-tp.certvde.co

##

certvde@infosec.exchange at 2026-03-10T07:23:00.000Z ##

#OT #Advisory VDE-2025-079
Janitza: Multiple vulnerabilities in UMG 96RM-E

An unauthenticated remote attacker can exploit several vulnerabilities in Janitza UMG 96RM-E devices to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711

certvde.com/en/advisories/vde-
#oCSAF
#CSAF janitza.csaf-tp.certvde.com/.w

##

CVE-2025-41709
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-10T18:17:55.980000

2 posts

[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]

certvde@infosec.exchange at 2026-03-10T07:24:46.000Z ##

#OT #Advisory VDE-2025-096
Weidmueller: Multiple vulnerabilities in Energy Meter 750-24 and Energy Meter 750-230

An unauthenticated remote attacker can exploit several vulnerabilities in Weidmueller devices Energy Meter 750-24 and Energy Meter 750-230 to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711
#oCSAF
certvde.com/en/advisories/vde-

#CSAF weidmueller.csaf-tp.certvde.co

##

certvde@infosec.exchange at 2026-03-10T07:23:00.000Z ##

#OT #Advisory VDE-2025-079
Janitza: Multiple vulnerabilities in UMG 96RM-E

An unauthenticated remote attacker can exploit several vulnerabilities in Janitza UMG 96RM-E devices to ultimately gain full system access and remote code execution.
#CVE CVE-2025-41709, CVE-2025-41712, CVE-2025-41710, CVE-2025-41711

certvde.com/en/advisories/vde-
#oCSAF
#CSAF janitza.csaf-tp.certvde.com/.w

##

CVE-2026-27944
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-10T18:11:27.450000

4 posts

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.3, the /api/backup endpoint is accessible without authentication and discloses the encryption keys required to decrypt the backup in the X-Backup-Security response header. This allows an unauthenticated attacker to download a full system backup containing sensitive data (user credentials, session tokens, SSL private ke

Nuclei template

3 repos

https://github.com/NULL200OK/-nginxui_discover

https://github.com/NULL200OK/CVE-2026-27944

https://github.com/weefunker/CVE-2026-27944-Lab

patrickcmiller@infosec.exchange at 2026-03-10T10:12:01.000Z ##

Critical Nginx UI flaw CVE-2026-27944 exposes server backups securityaffairs.com/189123/sec

##

rhudaur@flipboard.com at 2026-03-09T13:23:09.000Z ##

Critical Nginx UI Vulnerability Exposes Server Backups and Sensitive Data
thecyberexpress.com/cve-2026-2

Posted into Cybersecurity Today @cybersecurity-today-rhudaur

##

oversecurity@mastodon.social at 2026-03-09T11:00:12.000Z ##

Critical Nginx UI Vulnerability Exposes Server Backups and Sensitive Data

A newly disclosed vulnerability in Nginx UI, tracked as CVE-2026-27944, has raised major security concerns after researchers confirmed that...

🔗️ [Thecyberexpress] link.is.it/HfceZC

##

beyondmachines1@infosec.exchange at 2026-03-09T09:01:11.000Z ##

Critical Nginx UI Flaw Allows Unauthenticated Backup Theft and Decryption

Nginx UI version 2.3.3 patches a critical vulnerability (CVE-2026-27944) that allows unauthenticated attackers to download and decrypt full server backups. The flaw exposes sensitive data including SSL private keys, admin credentials, and server configurations via an unprotected API endpoint.

**If you are using Nginx UI, first make sure they are isolated from the internet. Then patch to version 2.3.3 immediately because the exploit is trivial - especially if your Nginix UI is exposed to the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-30920
(8.6 HIGH)

EPSS: 0.01%

updated 2026-03-10T17:40:16

2 posts

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.19, OneUptime's GitHub App callback trusts attacker-controlled state and installation_id values and updates Project.gitHubAppInstallationId with isRoot: true without validating that the caller is authorized for the target project. This allows an attacker to overwrite another project's GitHub App installation binding

thehackerwire@mastodon.social at 2026-03-10T18:01:09.000Z ##

🟠 CVE-2026-30920 - High (8.6)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.19, OneUptime's GitHub App callback trusts attacker-controlled state and installation_id values and updates Project.gitHubAppInstallationId with isRoot: true withou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:00:48.000Z ##

🟠 CVE-2026-30920 - High (8.6)

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.19, OneUptime's GitHub App callback trusts attacker-controlled state and installation_id values and updates Project.gitHubAppInstallationId with isRoot: true withou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27685
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-10T17:38:10.980000

1 posts

SAP NetWeaver Enterprise Portal Administration is vulnerable if a privileged user uploads untrusted or malicious content that, upon deserialization, could result in a high impact on the confidentiality, integrity, and availability of the host system.

offseq@infosec.exchange at 2026-03-10T01:30:28.000Z ##

🚨 CRITICAL: CVE-2026-27685 in SAP NetWeaver EP-RUNTIME 7.50 (Admin) enables privileged users to upload malicious serialized data — risking full system compromise. Restrict uploads, monitor privileged actions, patch ASAP! radar.offseq.com/threat/cve-20 #OffSeq #SAP #CVE #InfoSec

##

CVE-2026-30863
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-03-10T16:50:58.427000

1 posts

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.10 and 9.5.0-alpha.11, the Google, Apple, and Facebook authentication adapters use JWT verification to validate identity tokens. When the adapter's audience configuration option is not set (clientId for Google/Apple, appIds for Facebook), JWT verification silently skips aud

1 repos

https://github.com/Worthes/CVE-2026-30863-Exploit

thehackerwire@mastodon.social at 2026-03-10T17:16:47.000Z ##

🔴 CVE-2026-30863 - Critical (9.8)

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.10 and 9.5.0-alpha.11, the Google, Apple, and Facebook authentication adapters use JWT verification to validate identity ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3814
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-10T14:28:37.057000

2 posts

A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected by this issue is the function strcpy of the file /goform/getOneApConfTempEntry. Performing a manipulation results in buffer overflow. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-03-09T11:02:57.000Z ##

🟠 CVE-2026-3814 - High (8.8)

A security flaw has been discovered in UTT HiPER 810G up to 1.7.7-1711. Affected by this issue is the function strcpy of the file /goform/getOneApConfTempEntry. Performing a manipulation results in buffer overflow. It is possible to initiate the a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-09T10:32:40.000Z ##

🚨 HIGH severity (CVSS 8.7) buffer overflow in UTT HiPER 810G (≤1.7.7-1711), via strcpy in /goform/getOneApConfTempEntry. Public exploit released — urgent monitoring advised. CVE-2026-3814 radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #UTT #InfoSec

##

CVE-2026-1603
(8.6 HIGH)

EPSS: 67.72%

updated 2026-03-10T13:11:30.467000

5 posts

An authentication bypass in Ivanti Endpoint Manager before version 2024 SU5 allows a remote unauthenticated attacker to leak specific stored credential data.

Nuclei template

beyondmachines1 at 2026-03-11T10:01:11.005Z ##

CISA Warns of Active Exploitation in Ivanti Endpoint Manager Authentication Bypass

CISA added an Ivanti Endpoint Manager authentication bypass vulnerability (CVE-2026-1603) to its catalog of known exploited flaws after reports of active use by threat actors.

**If you use Ivanti Endpoint Manager, now patching is urgent. Update to 2024 SU5 immediately because attackers are already using this flaw to take over management servers.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-03-11T10:01:11.000Z ##

CISA Warns of Active Exploitation in Ivanti Endpoint Manager Authentication Bypass

CISA added an Ivanti Endpoint Manager authentication bypass vulnerability (CVE-2026-1603) to its catalog of known exploited flaws after reports of active use by threat actors.

**If you use Ivanti Endpoint Manager, now patching is urgent. Update to 2024 SU5 immediately because attackers are already using this flaw to take over management servers.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-03-09T22:00:20.000Z ##

🚨 [CISA-2026:0309] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22054 (secdb.nttzen.cloud/cve/detail/)
- Name: Omnissa Workspace ONE Server-Side Request Forgery
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Omnissa
- Product: Workspace One UEM
- Notes: web.archive.org/web/2021122215 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-26399 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: solarwinds.com/trust-center/se ; documentation.solarwinds.com/e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-1603 (secdb.nttzen.cloud/cve/detail/)
- Name: Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager (EPM)
- Notes: hub.ivanti.com/s/article/Secur ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260309 #cisa20260309 #cve_2021_22054 #cve_2025_26399 #cve_2026_1603 #cve202122054 #cve202526399 #cve20261603

##

cisakevtracker@mastodon.social at 2026-03-09T20:01:27.000Z ##

CVE ID: CVE-2026-1603
Vendor: Ivanti
Product: Endpoint Manager (EPM)
Date Added: 2026-03-09
Notes: hub.ivanti.com/s/article/Secur ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-09T19:16:13.000Z ##

CISA has updated the KEV catalogue cisa.gov/news-events/alerts/20

- CVE-2021-22054: Omnissa Workspace ONE Server-Side Request Forgery

- CVE-2025-26399 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

- CVE-2026-1603 Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability #CISA #infosec #vulnerability

##

CVE-2025-26399
(9.8 CRITICAL)

EPSS: 34.23%

updated 2026-03-10T13:11:15.553000

6 posts

SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.

1 repos

https://github.com/rxerium/CVE-2025-26399

beyondmachines1 at 2026-03-11T09:01:11.592Z ##

CISA Mandates Emergency Patching for SolarWinds Web Help Desk Vulnerabilities

CISA has shortened the patch deadline for an actively exploited critical SolarWinds Web Help Desk vulnerabilities, including CVE-2025-26399.

**When a federal agency shortens a patch deadline to just a few days, it means the product is actively and successfuly hacked. Treat your SolarWinds as an immediate priority, patch and ideally if possible isolate your help desk software from the public internet.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-03-11T09:01:11.000Z ##

CISA Mandates Emergency Patching for SolarWinds Web Help Desk Vulnerabilities

CISA has shortened the patch deadline for an actively exploited critical SolarWinds Web Help Desk vulnerabilities, including CVE-2025-26399.

**When a federal agency shortens a patch deadline to just a few days, it means the product is actively and successfuly hacked. Treat your SolarWinds as an immediate priority, patch and ideally if possible isolate your help desk software from the public internet.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

oversecurity@mastodon.social at 2026-03-10T14:10:35.000Z ##

CISA shortens patch deadline for critical Ivanti, SolarWinds bugs

The Cybersecurity and Infrastructure Security Agency (CISA) gave all federal civilian agencies until Thursday to patch CVE-2025-26399 — a critical...

🔗️ [Therecord] link.is.it/pp8jNp

##

secdb@infosec.exchange at 2026-03-09T22:00:20.000Z ##

🚨 [CISA-2026:0309] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22054 (secdb.nttzen.cloud/cve/detail/)
- Name: Omnissa Workspace ONE Server-Side Request Forgery
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Omnissa
- Product: Workspace One UEM
- Notes: web.archive.org/web/2021122215 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-26399 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: solarwinds.com/trust-center/se ; documentation.solarwinds.com/e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-1603 (secdb.nttzen.cloud/cve/detail/)
- Name: Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager (EPM)
- Notes: hub.ivanti.com/s/article/Secur ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260309 #cisa20260309 #cve_2021_22054 #cve_2025_26399 #cve_2026_1603 #cve202122054 #cve202526399 #cve20261603

##

cisakevtracker@mastodon.social at 2026-03-09T20:01:11.000Z ##

CVE ID: CVE-2025-26399
Vendor: SolarWinds
Product: Web Help Desk
Date Added: 2026-03-09
Notes: solarwinds.com/trust-center/se ; documentation.solarwinds.com/e ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-09T19:16:13.000Z ##

CISA has updated the KEV catalogue cisa.gov/news-events/alerts/20

- CVE-2021-22054: Omnissa Workspace ONE Server-Side Request Forgery

- CVE-2025-26399 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

- CVE-2026-1603 Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability #CISA #infosec #vulnerability

##

CVE-2026-3288
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-10T09:32:52

2 posts

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/rewrite-target` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets clust

1 repos

https://github.com/SnailSploit/CVE-2026-3288

ChrisShort@hachyderm.io at 2026-03-09T23:06:10.000Z ##

[Security Advisory] CVE-2026-3288: ingress-nginx rewrite-target nginx configuration injection #devopsish groups.google.com/a/kubernetes

##

thehackerwire@mastodon.social at 2026-03-09T21:17:09.000Z ##

🟠 CVE-2026-3288 - High (8.8)

A security issue was discovered in ingress-nginx where the `nginx.ingress.kubernetes.io/rewrite-target` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-ngin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30929
(7.7 HIGH)

EPSS: 0.01%

updated 2026-03-10T07:44:57.127000

1 posts

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

thehackerwire@mastodon.social at 2026-03-10T08:00:00.000Z ##

🟠 CVE-2026-30929 - High (7.7)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70238
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-09T21:32:45

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard52.

thehackerwire@mastodon.social at 2026-03-09T20:43:56.000Z ##

🟠 CVE-2025-70238 - High (7.5)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetWAN_Wizard52.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70363
(7.5 HIGH)

EPSS: 0.05%

updated 2026-03-09T21:32:40

1 posts

Incorrect access control in the REST API of Ibexa & Ciril GROUP eZ Platform / Ciril Platform 2.x allows unauthenticated attackers to access sensitive data via enumerating object IDs.

thehackerwire@mastodon.social at 2026-03-09T19:40:09.000Z ##

🟠 CVE-2025-70363 - High (7.5)

Incorrect access control in the REST API of Ibexa & Ciril GROUP eZ Platform / Ciril Platform 2.x allows unauthenticated attackers to access sensitive data via enumerating object IDs.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3638
(5.9 MEDIUM)

EPSS: 0.03%

updated 2026-03-09T21:31:49

1 posts

Improper access control in user and role restore API endpoints in Devolutions Server 2025.3.11.0 and earlier allows a low-privileged authenticated user to restore deleted users and roles via crafted API requests.

offseq@infosec.exchange at 2026-03-09T19:30:12.000Z ##

CVE-2026-3638 (HIGH): Devolutions Server ≤ 2025.3.11.0 has missing authorization in restore APIs — low-priv users can reinstate deleted accounts, risking privilege escalation. Restrict API access & monitor logs! radar.offseq.com/threat/cve-20 #OffSeq #Devolutions #AppSec

##

CVE-2025-61612
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-09T21:31:37

1 posts

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

thehackerwire@mastodon.social at 2026-03-09T11:07:30.000Z ##

🟠 CVE-2025-61612 - High (7.5)

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61611
(7.5 HIGH)

EPSS: 0.28%

updated 2026-03-09T21:31:37

1 posts

In modem, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed..

thehackerwire@mastodon.social at 2026-03-09T11:07:22.000Z ##

🟠 CVE-2025-61611 - High (7.5)

In modem, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed..

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69279
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-09T21:31:37

1 posts

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

thehackerwire@mastodon.social at 2026-03-09T10:07:08.000Z ##

🟠 CVE-2025-69279 - High (7.5)

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61616
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-09T21:31:37

1 posts

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

thehackerwire@mastodon.social at 2026-03-09T10:01:29.000Z ##

🟠 CVE-2025-61616 - High (7.5)

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61615
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-09T21:31:37

1 posts

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

thehackerwire@mastodon.social at 2026-03-09T10:01:19.000Z ##

🟠 CVE-2025-61615 - High (7.5)

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61613
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-09T21:31:37

1 posts

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

thehackerwire@mastodon.social at 2026-03-09T10:00:40.000Z ##

🟠 CVE-2025-61613 - High (7.5)

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2021-22054
(7.5 HIGH)

EPSS: 93.74%

updated 2026-03-09T21:31:33

3 posts

VMware Workspace ONE UEM console 20.0.8 prior to 20.0.8.37, 20.11.0 prior to 20.11.0.40, 21.2.0 prior to 21.2.0.27, and 21.5.0 prior to 21.5.0.37 contain an SSRF vulnerability. This issue may allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.

Nuclei template

1 repos

https://github.com/MKSx/CVE-2021-22054

secdb@infosec.exchange at 2026-03-09T22:00:20.000Z ##

🚨 [CISA-2026:0309] CISA Adds 3 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 3 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2021-22054 (secdb.nttzen.cloud/cve/detail/)
- Name: Omnissa Workspace ONE Server-Side Request Forgery
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Omnissa
- Product: Workspace One UEM
- Notes: web.archive.org/web/2021122215 ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-26399 (secdb.nttzen.cloud/cve/detail/)
- Name: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SolarWinds
- Product: Web Help Desk
- Notes: solarwinds.com/trust-center/se ; documentation.solarwinds.com/e ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-1603 (secdb.nttzen.cloud/cve/detail/)
- Name: Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager (EPM)
- Notes: hub.ivanti.com/s/article/Secur ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260309 #cisa20260309 #cve_2021_22054 #cve_2025_26399 #cve_2026_1603 #cve202122054 #cve202526399 #cve20261603

##

cisakevtracker@mastodon.social at 2026-03-09T20:00:56.000Z ##

CVE ID: CVE-2021-22054
Vendor: Omnissa
Product: Workspace One UEM
Date Added: 2026-03-09
Notes: web.archive.org/web/2021122215 ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-09T19:16:13.000Z ##

CISA has updated the KEV catalogue cisa.gov/news-events/alerts/20

- CVE-2021-22054: Omnissa Workspace ONE Server-Side Request Forgery

- CVE-2025-26399 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

- CVE-2026-1603 Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability #CISA #infosec #vulnerability

##

CVE-2026-28802
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-09T21:20:56.980000

1 posts

Authlib is a Python library which builds OAuth and OpenID Connect servers. From version 1.6.5 to before version 1.6.7, previous tests involving passing a malicious JWT containing alg: none and an empty signature was passing the signature verification step without any changes to the application code when a failure was expected.. This issue has been patched in version 1.6.7.

thehackerwire@mastodon.social at 2026-03-09T21:25:39.000Z ##

🔴 CVE-2026-28802 - Critical (9.8)

Authlib is a Python library which builds OAuth and OpenID Connect servers. From version 1.6.5 to before version 1.6.7, previous tests involving passing a malicious JWT containing alg: none and an empty signature was passing the signature verificat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-61614
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-09T21:16:12.060000

1 posts

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

thehackerwire@mastodon.social at 2026-03-09T10:00:51.000Z ##

🟠 CVE-2025-61614 - High (7.5)

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0846
(8.6 HIGH)

EPSS: 0.08%

updated 2026-03-09T20:16:05.703000

2 posts

A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, enabling attackers to access sensitive system files by providing absolute paths or traversal paths. This vulnerability can be exploited locally or remotely

offseq@infosec.exchange at 2026-03-09T21:00:16.000Z ##

🚨 CVE-2026-0846: HIGH severity absolute path traversal in nltk v3.9.2 (filestring()). Remote attackers can read files if user input isn’t sanitized. Patch when available & validate inputs! radar.offseq.com/threat/cve-20 #OffSeq #nltk #vuln #infosec

##

thehackerwire@mastodon.social at 2026-03-09T20:22:05.000Z ##

🟠 CVE-2026-0846 - High (8.6)

A vulnerability in the `filestring()` function of the `nltk.util` module in nltk version 3.9.2 allows arbitrary file read due to improper validation of input paths. The function directly opens files specified by user input without sanitization, en...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69278
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-09T20:16:02.127000

1 posts

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

thehackerwire@mastodon.social at 2026-03-09T10:01:38.000Z ##

🟠 CVE-2025-69278 - High (7.5)

In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30933
(7.5 HIGH)

EPSS: 0.00%

updated 2026-03-09T19:48:12

4 posts

### Summary The remediation for CVE-2026-27611 appears incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info in docker image gtstef/filebrowser:1.3.1-webdav-2. ### Details The issue stems from two flaws: 1. Tokenized download URLs are written into the persistent share model ``` backend/http/share.go convertToFrontendShareResponse(line 63) s.Down

thehackerwire@mastodon.social at 2026-03-10T19:17:55.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:16:04.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:01:49.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:44:44.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3038
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-09T18:32:49

1 posts

The rtsock_msg_buffer() function serializes routing information into a buffer. As a part of this, it copies sockaddr structures into a sockaddr_storage structure on the stack. It assumes that the source sockaddr length field had already been validated, but this is not necessarily the case, and it's possible for a malicious userspace program to craft a request which triggers a 127-byte overflow.

thehackerwire@mastodon.social at 2026-03-09T17:32:35.000Z ##

🟠 CVE-2026-3038 - High (7.5)

The rtsock_msg_buffer() function serializes routing information into a buffer. As a part of this, it copies sockaddr structures into a sockaddr_storage structure on the stack. It assumes that the source sockaddr length field had already been val...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3588
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-09T18:31:50

1 posts

A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 allows an attacker to exfiltrate private keys by sending a crafted request.

thehackerwire@mastodon.social at 2026-03-09T16:38:10.000Z ##

🟠 CVE-2026-3588 - High (7.5)

A server-side request forgery (SSRF) vulnerability in IKEA Dirigera v2.866.4 allows an attacker to exfiltrate private keys by sending a crafted request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70047
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-09T18:31:49

1 posts

An issue pertaining to CWE-400: Uncontrolled Resource Consumption was discovered in Nexusoft NexusInterface v3.2.0-beta.2.

thehackerwire@mastodon.social at 2026-03-09T17:32:25.000Z ##

🟠 CVE-2025-70047 - High (7.5)

An issue pertaining to CWE-400: Uncontrolled Resource Consumption was discovered in Nexusoft NexusInterface v3.2.0-beta.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25866
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-09T18:31:49

1 posts

MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search path behavior by placing a malicious executable earlier in the search order, resulting in arbitrary code execution in the context of the affected user.

thehackerwire@mastodon.social at 2026-03-09T16:38:20.000Z ##

🟠 CVE-2026-25866 - High (7.8)

MobaXterm versions prior to 26.1 contain an uncontrolled search path element vulnerability. The application calls WinExec to execute Notepad++ without a fully qualified executable path when opening remote files. An attacker can exploit the search ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29191
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-03-09T15:48:28

1 posts

### Summary A vulnerability was discovered in Zitadel's login V2 interface that allowed a possible account takeover. ### Impact Zitadel exposes an HTTP endpoint named /saml-post. This endpoint is used for handling requests to SAML IdPs and accepts two HTTP GET parameters: url and id. When these parameters are supplied, users’ browsers auto-submit an HTTP POST request to the provided url paramet

beyondmachines1@infosec.exchange at 2026-03-10T11:01:11.000Z ##

Critical 1-Click Account Takeover Vulnerability Patched in ZITADEL IAM Platform

ZITADEL patched a critical XSS vulnerability (CVE-2026-29191) that allows unauthenticated attackers to take over user accounts via a single-click malicious link. The flaw can lead to unauthorized password resets.

**If you are using ZITADEL, this is important. Plan a very quick update to version 4.12.0 because your users will be hacked, the full exploit instruction is already public. If you cannot patch today, block the /saml-post endpoint at your firewall and ensure MFA is active for all users.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-2919
(4.3 MEDIUM)

EPSS: 0.01%

updated 2026-03-09T15:30:48

1 posts

Malicious scripts could display attacker-controlled web content under spoofed domains in Focus for iOS by stalling a _self navigation to an invalid port and triggering an iframe redirect, causing the UI to display a trusted domain without user interaction. This vulnerability affects Focus for iOS < 148.2.

0x3e4@cyberplace.social at 2026-03-09T18:35:38.000Z ##

Mozilla Firefox Focus for iOS.. interesting version jump from 143.0 to 148.2 today

current release fixes CVE-2026-2919

Malicious scripts could display attacker-controlled web content under spoofed domains in Focus for iOS by stalling a _self navigation to an invalid port and triggering an iframe redirect, causing the UI to display a trusted domain without user interaction. This vulnerability affects Focus for iOS < 148.2.

mozilla.org/en-US/security/adv
hecate.pw/vulnerability/CVE-20

##

CVE-2025-14769
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-09T15:30:47

1 posts

In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference. Maliciously crafted packets sent from a remote host may result in a Denial of Service (DoS) if the `tcp-setmss` directive is used and a subsequent rule w

thehackerwire@mastodon.social at 2026-03-09T14:25:32.000Z ##

🟠 CVE-2025-14769 - High (7.5)

In some cases, the `tcp-setmss` handler may free the packet data and throw an error without halting the rule processing engine. A subsequent rule can then allow the traffic after the packet data is gone, resulting in a NULL pointer dereference.

...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2219
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-09T15:30:43

1 posts

It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite loop spinning the CPU).

thehackerwire@mastodon.social at 2026-03-09T16:45:11.000Z ##

🟠 CVE-2026-2219 - High (7.5)

It was discovered that dpkg-deb (a component of dpkg, the Debian package management system) does not properly validate the end of the data stream when uncompressing a zstd-compressed .deb archive, which may result in denial of service (infinite lo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3809
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T15:30:24.130000

1 posts

A flaw has been found in Tenda FH1202 1.2.0.14(408). The impacted element is the function fromNatStaticSetting of the file /goform/NatSaticSetting. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-03-09T08:20:21.000Z ##

🟠 CVE-2026-3809 - High (8.8)

A flaw has been found in Tenda FH1202 1.2.0.14(408). The impacted element is the function fromNatStaticSetting of the file /goform/NatSaticSetting. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3768
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T15:17:08.960000

2 posts

A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet. The manipulation of the argument GO leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

offseq@infosec.exchange at 2026-03-09T03:00:32.000Z ##

🚩 CVE-2026-3768 (HIGH, CVSS 8.7): Stack buffer overflow in Tenda F453 v1.0.0.3 — remote, unauthenticated exploit possible. Public exploit code released. Patch ASAP or restrict remote access! radar.offseq.com/threat/cve-20 #OffSeq #CVE20263768 #RouterSecurity #Infosec

##

thehackerwire@mastodon.social at 2026-03-08T21:27:19.000Z ##

🟠 CVE-2026-3768 - High (8.8)

A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet. The manipulation of the argument GO leads to stack-based buffer overflow. Remote expl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3803
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T15:09:33.580000

1 posts

A vulnerability was identified in Tenda i3 1.0.0.6(2204). This affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-03-09T07:01:20.000Z ##

🟠 CVE-2026-3803 - High (8.8)

A vulnerability was identified in Tenda i3 1.0.0.6(2204). This affects the function formWifiMacFilterGet of the file /goform/WifiMacFilterGet. The manipulation of the argument index leads to stack-based buffer overflow. It is possible to initiate ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41761
(7.8 HIGH)

EPSS: 0.02%

updated 2026-03-09T13:35:07.393000

2 posts

A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.

thehackerwire@mastodon.social at 2026-03-09T12:48:05.000Z ##

🟠 CVE-2025-41761 - High (7.8)

A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-09T12:00:45.000Z ##

🟠 CVE-2025-41761 - High (7.8)

A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41756
(8.1 HIGH)

EPSS: 0.10%

updated 2026-03-09T13:35:07.393000

1 posts

A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to write arbitrary files on the system.

thehackerwire@mastodon.social at 2026-03-09T12:01:34.000Z ##

🟠 CVE-2025-41756 - High (8.1)

A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to write arbitrary files on the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3815
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-09T12:31:49

2 posts

A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects the function strcpy of the file /goform/formApMail. Executing a manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-03-09T12:03:49.000Z ##

🟠 CVE-2026-3815 - High (8.8)

A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects the function strcpy of the file /goform/formApMail. Executing a manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-09T12:00:35.000Z ##

🟠 CVE-2026-3815 - High (8.8)

A weakness has been identified in UTT HiPER 810G up to 1.7.7-1711. This affects the function strcpy of the file /goform/formApMail. Executing a manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41758
(8.8 HIGH)

EPSS: 0.18%

updated 2026-03-09T09:30:37

1 posts

A low-privileged remote attacker can exploit an arbitrary file write vulnerability in the wwupload.cgi endpoint. Due to path traversal this can lead to overwriting arbitrary files on the device and achieving a full system compromise.

thehackerwire@mastodon.social at 2026-03-09T12:48:24.000Z ##

🟠 CVE-2025-41758 - High (8.8)

A low-privileged remote attacker can exploit an arbitrary file write vulnerability in the wwupload.cgi endpoint. Due to path traversal this can lead to overwriting arbitrary files on the device and achieving a full system compromise.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41764
(9.1 CRITICAL)

EPSS: 0.10%

updated 2026-03-09T09:30:37

2 posts

Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.

thehackerwire@mastodon.social at 2026-03-09T12:48:14.000Z ##

🔴 CVE-2025-41764 - Critical (9.1)

Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-09T12:00:54.000Z ##

🔴 CVE-2025-41764 - Critical (9.1)

Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41765
(9.1 CRITICAL)

EPSS: 0.06%

updated 2026-03-09T09:30:37

1 posts

Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupload.cgi endpoint to upload and apply arbitrary data. This includes, but is not limited to, contact images, HTTPS certificates, system backups for restoration, server peer configurations, and BACnet/SC server certificates and keys.

thehackerwire@mastodon.social at 2026-03-09T12:01:23.000Z ##

🔴 CVE-2025-41765 - Critical (9.1)

Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupload.cgi endpoint to upload and apply arbitrary data. This includes, but is not limited to, contact images, HTTPS certificates, system backups for ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41772
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-09T09:30:37

1 posts

An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.

thehackerwire@mastodon.social at 2026-03-09T10:07:27.000Z ##

🟠 CVE-2025-41772 - High (7.5)

An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41766
(8.8 HIGH)

EPSS: 0.39%

updated 2026-03-09T09:30:37

1 posts

A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise.

thehackerwire@mastodon.social at 2026-03-09T10:07:17.000Z ##

🟠 CVE-2025-41766 - High (8.8)

A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3811
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T09:30:37

2 posts

A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-03-09T10:00:31.000Z ##

🟠 CVE-2026-3811 - High (8.8)

A vulnerability was found in Tenda FH1202 1.2.0.14(408). This impacts the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument page results in stack-based buffer overflow. The attack can be executed remote...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-09T09:00:32.000Z ##

⚠️ HIGH severity: Tenda FH1202 (1.2.0.14) vulnerable to stack-based buffer overflow (CVE-2026-3811). Remote exploit is public. No fix yet — monitor, isolate, and watch for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #IoTSecurity #CVE20263811

##

CVE-2025-41757
(8.8 HIGH)

EPSS: 0.22%

updated 2026-03-09T09:30:36

1 posts

A low-privileged remote attacker can abuse the backup restore functionality of UBR (ubr-restore) which runs with elevated privileges and does not validate the contents of the backup archive to create or overwrite arbitrary files anywhere on the system.

thehackerwire@mastodon.social at 2026-03-09T12:01:43.000Z ##

🟠 CVE-2025-41757 - High (8.8)

A low-privileged remote attacker can abuse the backup restore functionality of UBR (ubr-restore) which runs with elevated privileges and does not validate the contents of the backup archive to create or overwrite arbitrary files anywhere on the sy...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3810
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T09:30:36

1 posts

A vulnerability has been found in Tenda FH1202 1.2.0.14(408). This affects the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-03-09T08:20:30.000Z ##

🟠 CVE-2026-3810 - High (8.8)

A vulnerability has been found in Tenda FH1202 1.2.0.14(408). This affects the function fromDhcpListClient of the file /goform/DhcpListClient. The manipulation of the argument page leads to stack-based buffer overflow. Remote exploitation of the a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3808
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-09T09:30:30

1 posts

A vulnerability was detected in Tenda FH1202 1.2.0.14(408). The affected element is the function formWebTypeLibrary of the file /goform/webtypelibrary. Performing a manipulation of the argument webSiteId results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-03-09T08:20:11.000Z ##

🟠 CVE-2026-3808 - High (8.8)

A vulnerability was detected in Tenda FH1202 1.2.0.14(408). The affected element is the function formWebTypeLibrary of the file /goform/webtypelibrary. Performing a manipulation of the argument webSiteId results in stack-based buffer overflow. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3807
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T09:30:30

1 posts

A security vulnerability has been detected in Tenda FH1202 1.2.0.14(408). Impacted is the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Such manipulation of the argument mit_ssid/mit_ssid_index leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-03-09T08:01:11.000Z ##

🟠 CVE-2026-3807 - High (8.8)

A security vulnerability has been detected in Tenda FH1202 1.2.0.14(408). Impacted is the function formWrlsafeset of the file /goform/AdvSetWrlsafeset. Such manipulation of the argument mit_ssid/mit_ssid_index leads to stack-based buffer overflow....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3802
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T06:31:20

1 posts

A vulnerability was determined in Tenda i3 1.0.0.6(2204). Affected by this issue is the function formexeCommand of the file /goform/exeCommand. Executing a manipulation of the argument cmdinput can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-09T06:00:49.000Z ##

🟠 CVE-2026-3802 - High (8.8)

A vulnerability was determined in Tenda i3 1.0.0.6(2204). Affected by this issue is the function formexeCommand of the file /goform/exeCommand. Executing a manipulation of the argument cmdinput can lead to stack-based buffer overflow. The attack m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30896
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-09T06:31:19

1 posts

The installer for Qsee Client versions 1.0.1 and prior insecurely load Dynamic Link Libraries (DLLs). When a user is directed to place some malicious DLL to the same directory and execute the affected installer, then arbitrary code may be executed with the administrative privilege.

thehackerwire@mastodon.social at 2026-03-09T07:01:10.000Z ##

🟠 CVE-2026-30896 - High (7.8)

The installer for Qsee Client versions 1.0.1 and prior insecurely load Dynamic Link Libraries (DLLs). When a user is directed to place some malicious DLL to the same directory and execute the affected installer, then arbitrary code may be executed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3804
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T06:31:19

2 posts

A security flaw has been discovered in Tenda i3 1.0.0.6(2204). This vulnerability affects the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet. The manipulation of the argument index results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-03-09T07:00:58.000Z ##

🟠 CVE-2026-3804 - High (8.8)

A security flaw has been discovered in Tenda i3 1.0.0.6(2204). This vulnerability affects the function formWifiMacFilterSet of the file /goform/WifiMacFilterSet. The manipulation of the argument index results in stack-based buffer overflow. It is ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-09T06:00:26.000Z ##

⚠️ HIGH severity: CVE-2026-3804 in Tenda i3 v1.0.0.6(2204) enables remote stack-based buffer overflow via /goform/WifiMacFilterSet. Exploit is public — prioritize mitigation or isolation. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Tenda #InfoSec

##

CVE-2026-3799
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-09T06:31:19

1 posts

A flaw has been found in Tenda i3 1.0.0.6(2204). This impacts the function formSetCfm of the file /goform/setcfm. This manipulation of the argument funcpara1 causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-03-09T04:19:19.000Z ##

🟠 CVE-2026-3799 - High (8.8)

A flaw has been found in Tenda i3 1.0.0.6(2204). This impacts the function formSetCfm of the file /goform/setcfm. This manipulation of the argument funcpara1 causes stack-based buffer overflow. Remote exploitation of the attack is possible. The ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3801
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-09T06:31:19

1 posts

A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formSetAutoPing of the file /goform/setAutoPing. Performing a manipulation of the argument ping1/ping2 results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-03-09T04:19:09.000Z ##

🟠 CVE-2026-3801 - High (8.8)

A vulnerability was found in Tenda i3 1.0.0.6(2204). Affected by this vulnerability is the function formSetAutoPing of the file /goform/setAutoPing. Performing a manipulation of the argument ping1/ping2 results in stack-based buffer overflow. The ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3787
(7.0 None)

EPSS: 0.01%

updated 2026-03-09T00:30:19

1 posts

A weakness has been identified in UltraVNC 1.6.4.0 on Windows. This affects an unknown function in the library cryptbase.dll of the component Windows Service. This manipulation causes uncontrolled search path. The attack requires local access. A high degree of complexity is needed for the attack. The exploitability is reported as difficult. The vendor was contacted early about this disclosure but

offseq@infosec.exchange at 2026-03-09T00:00:39.000Z ##

UltraVNC 1.6.4.0 on Windows hit by HIGH-severity vuln (CVE-2026-3787): uncontrolled DLL search path in cryptbase.dll. Local attackers could escalate privileges. No patch yet — restrict access & monitor for DLL hijacking. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #UltraVNC

##

CVE-2026-3769
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-08T21:30:22

2 posts

A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function WrlclientSet of the file /goform/WrlclientSet. The manipulation of the argument GO results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-03-09T01:30:26.000Z ##

🚩 CVE-2026-3769: HIGH severity vuln in Tenda F453 (v1.0.0.3) — stack-based buffer overflow in /goform/WrlclientSet. Public exploit released! Limit remote access, monitor traffic, apply mitigations. Details: radar.offseq.com/threat/cve-20 #OffSeq #NetworkSecurity #Vuln

##

thehackerwire@mastodon.social at 2026-03-08T21:27:29.000Z ##

🟠 CVE-2026-3769 - High (8.8)

A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function WrlclientSet of the file /goform/WrlclientSet. The manipulation of the argument GO results in stack-based buffer overflow. The attack can be executed remote...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3732
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-08T12:30:35

1 posts

A security vulnerability has been detected in Tenda F453 1.0.0.3. This affects the function strcpy of the file /goform/exeCommand. The manipulation of the argument cmdinput leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.

offseq@infosec.exchange at 2026-03-08T11:32:31.000Z ##

🛑 CVE-2026-3732: HIGH severity stack buffer overflow in Tenda F453 (v1.0.0.3). Remote, unauthenticated code execution risk — no patch yet. Block remote mgmt & monitor endpoints. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #RouterSecurity #CVE20263732

##

CVE-2026-3729
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-08T12:30:34

1 posts

A vulnerability was identified in Tenda F453 1.0.0.3/3.As. Impacted is the function fromPptpUserAdd of the file /goform/PPTPDClient. Such manipulation of the argument username/opttype leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-03-08T11:19:24.000Z ##

🟠 CVE-2026-3729 - High (8.8)

A vulnerability was identified in Tenda F453 1.0.0.3/3.As. Impacted is the function fromPptpUserAdd of the file /goform/PPTPDClient. Such manipulation of the argument username/opttype leads to stack-based buffer overflow. The attack can be execute...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25070(CVSS UNKNOWN)

EPSS: 1.03%

updated 2026-03-07T03:30:29

1 posts

XikeStor SKS8310-8X Network Switch firmware versions 1.04.B07 and prior contain an OS command injection vulnerability in the /goform/PingTestSet endpoint that allows unauthenticated remote attackers to execute arbitrary operating system commands. Attackers can inject malicious commands through the destIp parameter to achieve remote code execution with root privileges on the network switch.

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-30227(CVSS UNKNOWN)

EPSS: 1.01%

updated 2026-03-06T22:52:51

1 posts

### Summary A CRLF Injection vulnerability in MimeKit 4.15.0 allows an attacker to embed `\r\n` into the SMTP envelope address local-part (when the local-part is a quoted-string). This is non-compliant with RFC 5321 and can result in SMTP command injection (e.g., injecting additional `RCPT TO` / `DATA` / `RSET` commands) and/or mail header injection, depending on how the application uses MailKit/M

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-45691
(7.5 HIGH)

EPSS: 0.05%

updated 2026-03-06T22:23:33

1 posts

An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter when handling multimodal inputs.

thehackerwire@mastodon.social at 2026-03-08T12:31:26.000Z ##

🟠 CVE-2025-45691 - High (7.5)

An Arbitrary File Read vulnerability exists in the ImageTextPromptValue class in Exploding Gradients RAGAS v0.2.3 to v0.2.14. The vulnerability stems from improper validation and sanitization of URLs supplied in the retrieved_contexts parameter wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29058
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-03-06T21:56:51

1 posts

## Impact An unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the `base64Url` GET parameter. This can lead to full server compromise, data exfiltration (e.g., configuration secrets, internal keys, credentials), and service disruption. ## Root Cause The `base64Url` parameter is Base64-decoded and then interpolated directly into

beyondmachines1@infosec.exchange at 2026-03-08T20:01:11.000Z ##

Critical Zero-Click Command Injection in AVideo Platform Allows Stream Hijacking

AVideo version 6.0 contains a critical zero-click command injection vulnerability (CVE-2026-29058) that allows unauthenticated attackers to execute arbitrary OS commands and hijack video streams.

**If you are using AVideo platform this is urgent and important. Patch ASAP to version 7.0, because your server will be attacked. Until you update today, use a web application firewall or reverse proxy to block access to the getImage.php component.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24105
(9.8 CRITICAL)

EPSS: 1.69%

updated 2026-03-06T21:05:36.243000

1 posts

An issue was discovered in goform/formsetUsbUnload in Tenda AC15V1.0 V15.03.05.18_multi. The value of `v1` was not checked, potentially leading to a command injection vulnerability if injected into doSystemCmd.

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-70229
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-06T17:38:28.367000

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSchedule.

thehackerwire@mastodon.social at 2026-03-08T12:31:35.000Z ##

🔴 CVE-2025-70229 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSchedule.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2018-25181
(7.5 HIGH)

EPSS: 0.57%

updated 2026-03-06T15:31:36

1 posts

Musicco 2.0.0 contains a path traversal vulnerability that allows unauthenticated attackers to download arbitrary directories by manipulating the parent parameter. Attackers can supply directory traversal sequences in the parent parameter of the getAlbum endpoint to access sensitive system directories and download them as ZIP files.

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-25921
(9.3 CRITICAL)

EPSS: 0.02%

updated 2026-03-06T14:02:02.117000

1 posts

Gogs is an open source self-hosted Git service. Prior to version 0.14.2, overwritable LFS object across different repos leads to supply-chain attack, all LFS objects are vulnerable to be maliciously overwritten by malicious attackers. This issue has been patched in version 0.14.2.

beyondmachines1@infosec.exchange at 2026-03-10T16:01:11.000Z ##

Critical Gogs Vulnerability Enables Silent Supply-Chain Attacks via LFS Overwrites

Gogs patched a critical vulnerability (CVE-2026-25921) that allows unauthenticated attackers to overwrite Git Large File Storage (LFS) objects across repositories, enabling silent supply-chain attacks.

**If you are using Gogs, this is important, and if you have public access or registration to Gogs, it's urgent. Attackers can exploit this flaw to inject their malicious versions of binaries. You should not only update to version 0.14.2 ASAP and verify the integrity of your existing large files to ensure they haven't been replaced with malicious versions.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-70231
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-03-06T12:31:36

1 posts

D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When processing POST requests related to verification codes in /goform/formLogin, it enters /goform/getAuthCode but fails to filter the value of the FILECODE parameter, resulting in a path traversal vulnerability.

thehackerwire@mastodon.social at 2026-03-08T13:00:27.000Z ##

🔴 CVE-2025-70231 - Critical (9.8)

D-Link DIR-513 version 1.10 contains a critical-level vulnerability. When processing POST requests related to verification codes in /goform/formLogin, it enters /goform/getAuthCode but fails to filter the value of the FILECODE parameter, resulting...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70230
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-06T12:31:36

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDDNS.

thehackerwire@mastodon.social at 2026-03-08T13:00:15.000Z ##

🔴 CVE-2025-70230 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetDDNS.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70616
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-06T12:31:36

1 posts

A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys kernel driver (version 1.2.0.0) in the IOCTL handler for code 0x80102058. The vulnerability is caused by missing bounds checking on the user-controlled Options parameter before copying data into a 40-byte stack buffer (Src[40]) using memmove. An attacker with local access can exploit this vulnerability by sending a cra

thehackerwire@mastodon.social at 2026-03-08T12:00:21.000Z ##

🟠 CVE-2025-70616 - High (7.8)

A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys kernel driver (version 1.2.0.0) in the IOCTL handler for code 0x80102058. The vulnerability is caused by missing bounds checking on the user-controlled Options paramet...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70233
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-06T12:30:31

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetEnableWizard.

thehackerwire@mastodon.social at 2026-03-08T12:31:15.000Z ##

🔴 CVE-2025-70233 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetEnableWizard.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-70232
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-06T12:30:31

1 posts

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetMACFilter.

thehackerwire@mastodon.social at 2026-03-08T12:00:44.000Z ##

🔴 CVE-2025-70232 - Critical (9.8)

Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 via the curTime parameter to goform/formSetMACFilter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26478
(9.8 CRITICAL)

EPSS: 1.22%

updated 2026-03-04T18:32:01

1 posts

A shell command injection vulnerability in Mobvoi Tichome Mini smart speaker 012-18853 and 027-58389 allows remote attackers to send a specially crafted UDP datagram and execute arbitrary shell code as the root account.

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-2256
(6.5 MEDIUM)

EPSS: 2.31%

updated 2026-03-03T21:52:29.877000

1 posts

A command injection vulnerability in ModelScope's ms-agent versions v1.6.0rc1 and earlier exists, allowing an attacker to execute arbitrary operating system commands through crafted prompt-derived input.

1 repos

https://github.com/Itamar-Yochpaz/CVE-2026-2256-PoC

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-21385
(7.8 HIGH)

EPSS: 0.38%

updated 2026-03-03T21:31:13

3 posts

Memory corruption while using alignments for memory allocation.

1 repos

https://github.com/automate-it0/qualcomm-vulnerability-scanner

tierrasapiens@mastodon.social at 2026-03-11T05:28:19.000Z ##

🖲️ #Noticia de #CiberSeguridad #CiberGuerra #CiberAtaque #CiberNoticia
⚫ Zero-Day de Qualcomm explotado en ataques dirigidos contra Android
🔗 blog.segu-info.com.ar/2026/03/

 La actividad de explotación contra CVE-2026-21385, un fallo de corrupción de memoria de alta gravedad, podría estar vinculada a spyware comercial o grupos de amenazas estatales.Un nuevo error de Qualcomm ha sido explotado en ataques limitados y dirigidos contra dispositivos

##

hackmag@infosec.exchange at 2026-03-10T08:00:03.000Z ##

⚪️ Android patches 0‑day vulnerability linked to Qualcomm components

🗨️ Google experts have released the March security updates for Android, fixing a total of 129 vulnerabilities. Among them is a 0‑day issue in a Qualcomm component that is already being used in real-world attacks. The vulnerability has been assigned the…

🔗 hackmag.com/news/cve-2026-2138

#news

##

youranonnewsirc@nerdculture.de at 2026-03-09T20:29:19.000Z ##

Latest Geopolitical, Technology, and Cybersecurity Update (March 6-7, 2026):

Russia is reportedly sharing intelligence with Iran to target US forces in the Middle East, escalating tensions. Cybersecurity faces critical threats as a Cisco SD-WAN flaw (CVE-2026-20127) has been exploited since 2023, and a Qualcomm zero-day (CVE-2026-21385) affects 234 chipsets. Meanwhile, rapid AI advancements are intensifying regulatory debates globally.

#Cybersecurity #Geopolitics #TechNews

##

CVE-2024-47886
(7.2 HIGH)

EPSS: 0.89%

updated 2026-03-03T19:11:21.227000

1 posts

Chamilo is a learning management system. Chamillo is affected by a post-authentication phar unserialize which leads to a remote code execution (RCE) within versions 1.11.12 to 1.11.26. By abusing multiple supported features from the virtualization plugin vchamilo, the vulnerability allows an administrator to execute arbitrary code on the server. This issue has been patched in version 1.11.26.

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-24107
(9.8 CRITICAL)

EPSS: 1.13%

updated 2026-03-03T03:33:44

1 posts

An issue was discovered in Tenda W20E V4.0br_V15.11.0.6. Failure to validate the value of `usbPartitionName`, which is directly used in `doSystemCmd`, may lead to critical command injection vulnerabilities.

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-24101
(9.8 CRITICAL)

EPSS: 1.13%

updated 2026-03-02T18:31:44

1 posts

An issue was discovered in goform/formSetIptv in Tenda AC15V1.0 V15.03.05.18_multi. When the condition is met, `s1_1` will be passed into sub_B0488, concatenated into `doSystemCmd`. The value of s1_1 is not validated, potentially leading to a command injection vulnerability.

secdb@infosec.exchange at 2026-03-09T00:01:23.000Z ##

📈 CVE Published in last 7 days (2026-03-02 - 2026-03-09)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1428

Severity:
- Critical: 187
- High: 549
- Medium: 456
- Low: 43
- None: 193

Status:
- : 38
- Analyzed: 324
- Awaiting Analysis: 475
- Modified: 83
- Received: 445
- Rejected: 7
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 283
- Patchstack: 271
- MITRE: 128
- VulnCheck: 107
- VulDB: 85
- Wordfence: 74
- Android (associated with Google Inc. or Open Handset Alliance): 57
- Cisco Systems, Inc.: 50
- N/A: 38
- Acronis International GmbH: 23

Top Affected Products:
- UNKNOWN: 1003
- Google Android: 74
- Chamilo Lms: 25
- Dlink Dir-513 Firmware: 20
- Huawei Harmonyos: 18
- Qualcomm Qca6595au Firmware: 14
- Qualcomm Wcd9380 Firmware: 14
- Qualcomm Wcd9385 Firmware: 14
- Qualcomm Wsa8830 Firmware: 14
- Qualcomm Wsa8815 Firmware: 14

Top EPSS Score:
- CVE-2026-2256 - 1.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24105 - 1.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-25070 - 1.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-26478 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24101 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24107 - 0.86 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-30227 - 0.80 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2024-47886 - 0.75 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-14675 - 0.68 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2018-25181 - 0.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-27611
(6.5 MEDIUM)

EPSS: 0.03%

updated 2026-02-27T21:42:55

4 posts

### Summary When users share password-protected files, the recipient can completely bypass the password and still download the file. ### Details This happens because the API returns a direct download link in the details of the share, which is accessible to anyone with JUST THE SHARE LINK, even without the password. ### PoC 1. As an authenticated user, create a share for a file, with a password s

thehackerwire@mastodon.social at 2026-03-10T19:17:55.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:16:04.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T19:01:49.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:44:44.000Z ##

🟠 CVE-2026-30933 - High (7.5)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-beta and 1.2.2-stable, the remediation for CVE-2026-27611 is incomplete. Password protected shares still disclose tokenized downloadURL via /public/api/share/info. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27739
(0 None)

EPSS: 0.05%

updated 2026-02-27T14:06:59.787000

1 posts

The Angular SSR is a server-rise rendering tool for Angular applications. Versions prior to 21.2.0-rc.1, 21.1.5, 20.3.17, and 19.2.21 have a Server-Side Request Forgery (SSRF) vulnerability in the Angular SSR request handling pipeline. The vulnerability exists because Angular’s internal URL reconstruction logic directly trusts and consumes user-controlled HTTP headers specifically the Host and `X-

1 repos

https://github.com/bankerke/-CVE-2026-27739-poc

beyondmachines1@infosec.exchange at 2026-03-09T20:01:10.000Z ##

Critical SSRF Vulnerability Patched in Angular Server-Side Rendering

Angular patched a critical SSRF vulnerability (CVE-2026-27739) in its SSR framework that allows attackers to redirect server-side requests to malicious or internal destinations by manipulating HTTP headers.

**If you are using Angular, this is important and urgent. Check your package.json for the possibly risky versions of the libraries, and either patch or sanitize the headers. Always validate incoming headers against a strict allowlist and avoid using client-provided data to build internal request URLs.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-20127
(10.0 CRITICAL)

EPSS: 2.60%

updated 2026-02-25T18:31:45

3 posts

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not

5 repos

https://github.com/BugFor-Pings/CVE-2026-20127_EXP

https://github.com/zerozenxlabs/CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE

https://github.com/yonathanpy/CVE-2026-20127-Cisco-SD-WAN-Preauth-RCE

https://github.com/abrahamsurf/sdwan-scanner-CVE-2026-20127

https://github.com/leemuun/CVE-2026-20127

jbhall56@infosec.exchange at 2026-03-10T13:03:22.000Z ##

WatchTowr reports seeing exploitation attempts for CVE-2026-20127 from numerous unique IP addresses. securityweek.com/recent-cisco-

##

youranonnewsirc@nerdculture.de at 2026-03-09T20:29:19.000Z ##

Latest Geopolitical, Technology, and Cybersecurity Update (March 6-7, 2026):

Russia is reportedly sharing intelligence with Iran to target US forces in the Middle East, escalating tensions. Cybersecurity faces critical threats as a Cisco SD-WAN flaw (CVE-2026-20127) has been exploited since 2023, and a Qualcomm zero-day (CVE-2026-21385) affects 234 chipsets. Meanwhile, rapid AI advancements are intensifying regulatory debates globally.

#Cybersecurity #Geopolitics #TechNews

##

technadu@infosec.exchange at 2026-03-09T11:58:00.000Z ##

Critical Cisco Catalyst SD-WAN vulnerability (CVE-2026-20127, CVSS 10.0) is now under widespread exploitation.

Attackers are deploying webshells after the flaw moved from targeted zero-day use to global opportunistic campaigns.

technadu.com/cisco-catalyst-sd

Have your systems been patched?

#infosec #cybersecurity #cisco #zeroday #threatintel

##

bdking71@mastodon.social at 2026-03-10T11:33:09.000Z ##

Microsoft turned Notepad into a "smart" AI assistant and accidentally handed hackers a "one-click" execution engine. Here is the technical breakdown of CVE-2026-20841 and why feature creep is killing your security. 🛑💻

#CyberSecurity #Windows11 #Infosec

bdking71.wordpress.com/2026/03

##

CVE-2026-2138
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-10T19:28:57.427000

1 posts

A vulnerability was found in Tenda TX9 up to 22.03.02.10_multi. Affected is the function sub_42D03C of the file /goform/SetStaticRouteCfg. The manipulation of the argument list results in buffer overflow. The attack can be launched remotely. The exploit has been made public and could be used.

hackmag@infosec.exchange at 2026-03-10T08:00:03.000Z ##

⚪️ Android patches 0‑day vulnerability linked to Qualcomm components

🗨️ Google experts have released the March security updates for Android, fixing a total of 129 vulnerabilities. Among them is a 0‑day issue in a Qualcomm component that is already being used in real-world attacks. The vulnerability has been assigned the…

🔗 hackmag.com/news/cve-2026-2138

#news

##

CVE-2026-25253
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-02T23:41:06

1 posts

## Summary The Control UI trusts `gatewayUrl` from the query string without validation and auto-connects on load, sending the stored gateway token in the WebSocket connect payload. Clicking a crafted link or visiting a malicious site can send the token to an attacker-controlled server. The attacker can then connect to the victim's local gateway, modify config (sandbox, tool policies), and invoke

7 repos

https://github.com/EQSTLab/CVE-2026-25253

https://github.com/ethiack/moltbot-1click-rce

https://github.com/adibirzu/openclaw-security-monitor

https://github.com/al4n4n/CVE-2026-25253-research

https://github.com/Joseph19820124/openclaw-vuln-report

https://github.com/Ckokoski/moatbot-security

https://github.com/FrigateCaptain/openclaw_vulnerabilities_and_solutions

TiamatEnity@mastodon.social at 2026-03-08T15:12:12.000Z ##

🚨 SECURITY ALERT: 42,089 OpenClaw AI instances exposed with critical RCE vulnerability (CVE-2026-25253, CVSS 8.8).

93% lack authentication. 1.5M API tokens compromised. One-click shell access via malicious websites.

Full analysis + protection strategies:
dev.to/tiamatenity/your-ai-ass

#infosec #privacy #cybersecurity #ai

##

CVE-2025-13154
(5.5 MEDIUM)

EPSS: 0.03%

updated 2026-01-16T15:55:33.063000

2 posts

An improper link following vulnerability was reported in the SmartPerformanceAddin for Lenovo Vantage that could allow an authenticated local user to perform an arbitrary file deletion with elevated privileges.

rtfmkiesel at 2026-03-11T10:54:29.803Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

rtfmkiesel@infosec.exchange at 2026-03-11T10:54:29.000Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

CVE-2025-66005
(0 None)

EPSS: 0.02%

updated 2026-01-14T16:25:12.057000

1 posts

Lack of authorization of the InputManager D-Bus interface in InputPlumber versions before v0.63.0 can lead to local Denial-of-Service, information leak or even privilege escalation in the context of the currently active user session.

GamingNews@meta.masto.host at 2026-03-09T23:25:43.000Z ##

Steam Deck just posted:

SteamOS 3.7.20

SteamOS 3.7.20 has just been released for all users with the following changes previously in Beta:GeneralAdded ntsync driverNon-DeckEnabled polkit for the InputPlumber dbus interface and resolved a potential race condition for the InputPlumber interface, addressing CVE-2025-66005 and CVE-2025-14338

store.steampowered.com/news/ap

#gamingNews #SteamDeck

##

CVE-2025-14338(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-01-14T12:31:48

1 posts

Polkit authentication dis isabled by default and a race condition in the Polkit authorization check in versions before v0.69.0 can lead to the same issues as in CVE-2025-66005.

GamingNews@meta.masto.host at 2026-03-09T23:25:43.000Z ##

Steam Deck just posted:

SteamOS 3.7.20

SteamOS 3.7.20 has just been released for all users with the following changes previously in Beta:GeneralAdded ntsync driverNon-DeckEnabled polkit for the InputPlumber dbus interface and resolved a potential race condition for the InputPlumber interface, addressing CVE-2025-66005 and CVE-2025-14338

store.steampowered.com/news/ap

#gamingNews #SteamDeck

##

CVE-2025-0037
(6.6 MEDIUM)

EPSS: 0.03%

updated 2025-06-10T00:30:36

1 posts

In AMD Versal Adaptive SoC devices, the lack of address validation when executing PLM runtime services through the PLM firmware can allow access to isolated or protected memory spaces, resulting in the loss of integrity and confidentiality.

AAKL@infosec.exchange at 2026-03-10T16:05:40.000Z ##

Medium-severity advisory from AMD:

CVE-2025-0037: Versal Adaptive SoC – Overwriting Protected Memory Regions through PLM Firmware amd.com/en/resources/product-s

A long list of advisories from Adobe: helpx.adobe.com/security/secur

Dell patches for multiple vulnerabilities:

Security Update for Dell Connectrix B-Series SANnav Vulnerabilities dell.com/support/kbdoc/en-us/0

Security Update for Dell Connectrix B-Series FOS and SANnav Vulnerabilities dell.com/support/kbdoc/en-us/0

Security Update for Dell Avamar Data Store Gen5A Multiple Third-Party Component Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell
#infosec #vulnerability #AMD #Adobe

##

CVE-2022-25912
(8.1 HIGH)

EPSS: 43.30%

updated 2025-04-22T21:15:42.690000

1 posts

The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306).

thehackerwire@mastodon.social at 2026-03-10T19:30:22.000Z ##

🔴 CVE-2026-28292 - Critical (9.8)

`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2022-25860
(9.8 CRITICAL)

EPSS: 41.35%

updated 2025-04-01T23:03:12

1 posts

Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of CVE-2022-25912.

thehackerwire@mastodon.social at 2026-03-10T19:30:22.000Z ##

🔴 CVE-2026-28292 - Critical (9.8)

`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1717
(0 None)

EPSS: 0.00%

2 posts

N/A

rtfmkiesel at 2026-03-11T10:54:29.803Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

rtfmkiesel@infosec.exchange at 2026-03-11T10:54:29.000Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

CVE-2026-1716
(0 None)

EPSS: 0.00%

2 posts

N/A

rtfmkiesel at 2026-03-11T10:54:29.803Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

rtfmkiesel@infosec.exchange at 2026-03-11T10:54:29.000Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

CVE-2026-1715
(0 None)

EPSS: 0.00%

2 posts

N/A

rtfmkiesel at 2026-03-11T10:54:29.803Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

rtfmkiesel@infosec.exchange at 2026-03-11T10:54:29.000Z ##

Lenovo released all patches for the Vantage vulnerabilities I reported earlier this year. The blog has been updated with write‑ups for CVE-2025-13154, CVE-2026-1715, CVE-2026-1716, and CVE-2026-1717.

cyllective.com/blog/posts/leno

##

CVE-2026-0866
(0 None)

EPSS: 0.00%

5 posts

N/A

sans_isc at 2026-03-11T10:01:45.937Z ##

Analyzing "Zombie Zip" (CVE-2026-0866) isc.sans.edu/diary/32786

##

unwirehk_mirror@mastodon.hongkongers.net at 2026-03-11T09:51:03.000Z ##

ZIP 壓縮機制大漏洞 全部防毒軟件中招 黑客可藏惡意程式碼
網絡安全公司 Bombadil Systems 研究員 Chris Aziz 發現 ZIP 壓縮檔存在嚴重漏洞 […]
#資訊保安 #7-Zip #Bombadil Systems #CVE-2026-0866
unwire.hk/2026/03/11/zombie-zi

##

decio at 2026-03-11T09:36:00.898Z ##

[ ] "Zombie ZIP : cette technique d'évasion rend aveugles les antivirus"
CVE-2026-0866
⬇️
"Découverte par Chris Aziz, chercheur en sécurité chez Bombadil Systems, la technique Zombie ZIP abuse de la confiance accordée aux moteurs d'analyse à l'en-tête des fichiers ZIP. En effet, cette attaque consiste à manipuler l'en-tête du fichier ZIP de façon à altérer le champ déterminant la méthode de compression au sein de l'archive.

La technique Zombie ZIP consiste à indiquer que les données sont stockées sans aucune compression (méthode STORED ou Method=0), alors que c'est faux ! Le fichier malveillant est bel et bien compressé via l'algorithme standard DEFLATE."
👇
it-connect.fr/zombie-zip-cette

(NDR yet another) " format confusion technique that evades 98% of engines."
⬇️
CVE-2026-0866 | VU#976247 | Published March 10, 2026
👇
github.com/bombadil-systems/zo

💬
⬇️
infosec.pub/post/43258263

##

sans_isc@infosec.exchange at 2026-03-11T10:01:45.000Z ##

Analyzing "Zombie Zip" (CVE-2026-0866) isc.sans.edu/diary/32786

##

decio@infosec.exchange at 2026-03-11T09:36:00.000Z ##

[ #VULN ] "Zombie ZIP : cette technique d'évasion rend aveugles les antivirus"
CVE-2026-0866
⬇️
"Découverte par Chris Aziz, chercheur en sécurité chez Bombadil Systems, la technique Zombie ZIP abuse de la confiance accordée aux moteurs d'analyse à l'en-tête des fichiers ZIP. En effet, cette attaque consiste à manipuler l'en-tête du fichier ZIP de façon à altérer le champ déterminant la méthode de compression au sein de l'archive.

La technique Zombie ZIP consiste à indiquer que les données sont stockées sans aucune compression (méthode STORED ou Method=0), alors que c'est faux ! Le fichier malveillant est bel et bien compressé via l'algorithme standard DEFLATE."
👇
it-connect.fr/zombie-zip-cette

(NDR yet another) " #ZIP format confusion technique that evades 98% of #antivirus engines."
⬇️
CVE-2026-0866 | VU#976247 | Published March 10, 2026
👇
github.com/bombadil-systems/zo

💬
⬇️
infosec.pub/post/43258263

#CyberVeille #CVE_2026_0866

##

CVE-2026-3805
(0 None)

EPSS: 0.00%

3 posts

N/A

Nadsec@cyberplace.social at 2026-03-11T08:06:28.000Z ##

Found this bug on the weekend :)
curl.se/docs/CVE-2026-3805.html

Curl is cool. For the love of the game..

##

bagder@mastodon.social at 2026-03-11T06:56:43.000Z ##

CVE-2026-3805: use after free in SMB connection reuse

When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

curl.se/docs/CVE-2026-3805.html

##

bagder@mastodon.social at 2026-03-11T06:56:43.000Z ##

CVE-2026-3805: use after free in SMB connection reuse

When doing a second SMB request to the same host again, curl would wrongly use a data pointer pointing into already freed memory.

curl.se/docs/CVE-2026-3805.html

##

CVE-2026-3784
(0 None)

EPSS: 0.00%

2 posts

N/A

bagder@mastodon.social at 2026-03-11T06:56:32.000Z ##

CVE-2026-3784: wrong proxy connection reuse with credentials

curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.

curl.se/docs/CVE-2026-3784.html

##

bagder@mastodon.social at 2026-03-11T06:56:32.000Z ##

CVE-2026-3784: wrong proxy connection reuse with credentials

curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a server, even if the new request uses different credentials for the HTTP proxy. The proper behavior is to create or use a separate connection.

curl.se/docs/CVE-2026-3784.html

##

CVE-2026-3783
(0 None)

EPSS: 0.00%

2 posts

N/A

bagder@mastodon.social at 2026-03-11T06:56:22.000Z ##

CVE-2026-3783: token leak with redirect and netrc

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances.

##

bagder@mastodon.social at 2026-03-11T06:56:22.000Z ##

CVE-2026-3783: token leak with redirect and netrc

When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a redirect to a second URL, curl could leak that token to the second hostname under some circumstances.

##

CVE-2026-1965
(0 None)

EPSS: 0.00%

2 posts

N/A

bagder@mastodon.social at 2026-03-11T06:56:11.000Z ##

CVE-2026-1965: bad reuse of HTTP Negotiate connection

libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request.

curl.se/docs/CVE-2026-1965.html

##

bagder@mastodon.social at 2026-03-11T06:56:11.000Z ##

CVE-2026-1965: bad reuse of HTTP Negotiate connection

libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request.

curl.se/docs/CVE-2026-1965.html

##

CVE-2026-28806
(0 None)

EPSS: 0.00%

2 posts

N/A

offseq at 2026-03-11T00:00:41.387Z ##

🚨 CRITICAL: CVE-2026-28806 in nerves_hub_web ≤2.3.x allows authenticated users to take over devices/orgs via improper authorization. Upgrade to 2.4.0+ ASAP! Remote console: high risk of full compromise. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-11T00:00:41.000Z ##

🚨 CRITICAL: CVE-2026-28806 in nerves_hub_web ≤2.3.x allows authenticated users to take over devices/orgs via improper authorization. Upgrade to 2.4.0+ ASAP! Remote console: high risk of full compromise. radar.offseq.com/threat/cve-20 #OffSeq #nerveshub #infosec #CVE202628806

##

CVE-2026-28514
(0 None)

EPSS: 0.11%

2 posts

N/A

harrysintonen@infosec.exchange at 2026-03-10T23:10:53.000Z ##

#RocketChat has a critical authentication bypass vulnerability due to forgetting await keyword ("Users can login with any password via the EE ddp-streamer-servic" CVE-2026-28514):

github.com/RocketChat/Rocket.C

The vulnerability has been patched in RocketChat 8.0.0, 7.13.3, 7.12.4, 7.11.4, 7.10.7, 7.9.8 and 7.8.6.

These issues were discovered by an AI agent developed by the GitHub Security Lab and reviewed by GHSL team members Peter Stöckli and Man Yue Mo.

I often voice my dislike of misguided AI use. This right here is actually good use of AI.

#CVE_2026_28514 #infosec #cybersecurity

##

_r_netsec@infosec.exchange at 2026-03-09T16:28:05.000Z ##

Sign in with ANY password into Rocket.Chat EE (CVE-2026-28514) and other vulnerabilities we’ve found with our open source AI framework github.blog/security/how-to-sc

##

CVE-2026-30983
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:44:25.000Z ##

🟠 CVE-2026-30983 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow in icFixXml() (strcpy) causing stack memory corruption or crash. This vulnerability is fixed in 2.3.1.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-10T18:43:10.000Z ##

🟠 CVE-2026-30983 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow in icFixXml() (strcpy) causing stack memory corruption or crash. This vulnerability is fixed in 2.3.1.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30979
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:43:57.000Z ##

🟠 CVE-2026-30979 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow in CIccCalculatorFunc::InitSelectOp() triggered with local user interaction causing memory corrupt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30987
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:40:59.000Z ##

🟠 CVE-2026-30987 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow in CIccTagNum::GetValues() causing stack memory corruption or crash. This vulnerability is fixed in 2.3...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31795
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:40:49.000Z ##

🟠 CVE-2026-31795 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a stack buffer overflow write in CIccXform3DLut::Apply() corrupting stack memory or crash. This vulnerability is fixed in 2.3.1.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31792
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:21:41.000Z ##

🟠 CVE-2026-31792 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a null pointer dereference in CIccTagXmlStruct::ParseTag() causing a segmentation fault or denial of service. This vulnerabilit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31796
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:21:31.000Z ##

🟠 CVE-2026-31796 - High (7.8)

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to 2.3.1.5, there is a heap-based buffer overflow in icCurvesFromXml() causing heap memory corruption or crash. This vulnerability is fixed in 2.3.1.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30918
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T18:01:28.000Z ##

🟠 CVE-2026-30918 - High (7.6)

facileManager is a modular suite of web apps built with the sysadmin in mind. Prior to 6.0.4 , a reflected XSS occurs when an application receives data from an untrusted source and uses it in its HTTP responses in a way that could lead to vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27603
(0 None)

EPSS: 0.07%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T15:00:23.000Z ##

🟠 CVE-2026-27603 - High (7.5)

Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.4, the chart filter endpoint POST /project/:project_id/chart/:chart_id/filter is missing both verif...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27005
(0 None)

EPSS: 0.12%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T15:00:13.000Z ##

🔴 CVE-2026-27005 - Critical (9.8)

Chartbrew is an open-source web application that can connect directly to databases and APIs and use the data to create charts. Prior to version 4.8.3, an unauthenticated attacker can inject arbitrary SQL into queries executed against databases con...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28693
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T08:00:21.000Z ##

🟠 CVE-2026-28693 - High (8.1)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28691
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-10T08:00:11.000Z ##

🟠 CVE-2026-28691 - High (7.5)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vul...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30862
(0 None)

EPSS: 0.04%

1 posts

N/A

1 repos

https://github.com/drkim-dev/CVE-2026-30862

offseq@infosec.exchange at 2026-03-10T03:00:29.000Z ##

⚠️ CRITICAL: CVE-2026-30862 in Appsmith <1.96 enables stored XSS via TableWidgetV2. Attackers can leverage 'Invite Users' for admin takeover. Patch to 1.96+ ASAP! No active exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #XSS #Appsmith #CVE2026_30862

##

CVE-2026-28431
(0 None)

EPSS: 0.04%

1 posts

N/A

offseq@infosec.exchange at 2026-03-09T22:30:12.000Z ##

🚨 CVE-2026-28431 (CRITICAL, CVSS 9.2) in Misskey (8.45.0 – <2026.3.1): Improper authorization allows unauthenticated data access. Patch to 2026.3.1 now! Review access controls and monitor logs. radar.offseq.com/threat/cve-20 #OffSeq #Misskey #Vuln #InfoSec

##

CVE-2026-30240
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-09T21:18:02.000Z ##

🔴 CVE-2026-30240 - Critical (9.6)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.5 and earlier, a path traversal vulnerability in the PWA (Progressive Web App) ZIP processing endpoint (POST /api/pwa/process-zip) allows an authenti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-09T21:17:10.000Z ##

🔴 CVE-2026-30240 - Critical (9.6)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.5 and earlier, a path traversal vulnerability in the PWA (Progressive Web App) ZIP processing endpoint (POST /api/pwa/process-zip) allows an authenti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31816
(0 None)

EPSS: 0.10%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-09T21:17:52.000Z ##

🔴 CVE-2026-31816 - Critical (9.1)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.4 and earlier, the Budibase server's authorized() middleware that protects every server-side API endpoint can be completely bypassed by appending a w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-09T21:17:00.000Z ##

🔴 CVE-2026-31816 - Critical (9.1)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.31.4 and earlier, the Budibase server's authorized() middleware that protects every server-side API endpoint can be completely bypassed by appending a w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25737
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-09T21:17:18.000Z ##

🟠 CVE-2026-25737 - High (8.9)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In 3.24.0 and earlier, an arbitrary file upload vulnerability exists even though file extension restrictions are configured. The restriction is enforced only...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-62166
(0 None)

EPSS: 0.08%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-09T20:22:15.000Z ##

🟠 CVE-2025-62166 - High (7.5)

FreshRSS is a free, self-hostable RSS aggregator. Prior 1.28.0, a bug in the auth logic related to master authentication tokens, this restriction is bypassed. Usually only the default user's feed should be viewable if anonymous viewing is enabled,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites