## Updated at UTC 2026-03-19T15:35:37.104431

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2025-14031 7.5 0.07% 1 0 2026-03-19T14:20:15.870000 IBM Sterling B2B Integrator and and IBM Sterling File Gateway 6.1.0.0 through 6.
CVE-2026-20131 10.0 0.57% 7 3 2026-03-19T14:16:13.930000 A vulnerability in the web-based management interface of Cisco Secure Firewall M
CVE-2025-71260 8.8 0.00% 2 1 2026-03-19T14:16:13.583000 BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserializa
CVE-2026-32838 7.5 0.01% 1 0 2026-03-19T14:08:34.423000 Edimax GS-5008PL firmware version 1.00.54 and prior use cleartext HTTP for the w
CVE-2026-3658 7.5 0.07% 2 0 2026-03-19T13:25:00.570000 The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin p
CVE-2026-3511 8.6 0.04% 2 0 2026-03-19T13:25:00.570000 Improper Restriction of XML External Entity Reference vulnerability in XMLUtils.
CVE-2026-27065 9.8 0.11% 6 0 2026-03-19T13:25:00.570000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-27542 9.8 0.04% 3 0 2026-03-19T13:25:00.570000 Incorrect Privilege Assignment vulnerability in Rymera Web Co Pty Ltd. Woocommer
CVE-2026-27067 9.1 0.04% 4 0 2026-03-19T13:25:00.570000 Unrestricted Upload of File with Dangerous Type vulnerability in Syarif Mobile A
CVE-2026-27093 8.1 0.11% 2 0 2026-03-19T13:25:00.570000 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP
CVE-2026-32698 9.1 0.03% 4 0 2026-03-19T13:25:00.570000 OpenProject is an open-source, web-based project management software. Versions p
CVE-2026-32255 8.6 0.09% 2 1 2026-03-19T13:25:00.570000 Kan is an open-source project management tool. In versions 0.5.4 and below, the
CVE-2025-15031 8.1 0.03% 2 0 2026-03-19T13:25:00.570000 A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file
CVE-2025-55040 8.8 0.02% 2 0 2026-03-19T13:25:00.570000 The import form CSRF vulnerability in MuraCMS through 10.1.10 allows attackers t
CVE-2026-32321 8.8 0.03% 2 0 2026-03-19T13:25:00.570000 ClipBucket v5 is an open source video sharing platform. An authenticated time-ba
CVE-2026-24062 7.8 0.01% 2 0 2026-03-19T13:25:00.570000 The "Privileged Helper" component of the Arturia Software Center (MacOS) does no
CVE-2026-2992 8.2 0.04% 2 0 2026-03-19T13:25:00.570000 The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is
CVE-2026-32633 9.1 0.05% 2 0 2026-03-19T13:25:00.570000 Glances is an open-source system cross-platform monitoring tool. Prior to versio
CVE-2026-32610 8.1 0.03% 1 0 2026-03-19T13:25:00.570000 Glances is an open-source system cross-platform monitoring tool. Prior to versio
CVE-2026-20963 8.8 9.87% 8 0 2026-03-19T13:09:24.293000 Deserialization of untrusted data in Microsoft Office SharePoint allows an autho
CVE-2026-4064 8.3 0.04% 1 0 2026-03-19T13:03:28.320000 Missing authorization checks on multiple gRPC service endpoints in PowerShell Un
CVE-2025-64301 7.8 0.02% 1 0 2026-03-19T12:24:39.400000 An out‑of‑bounds write vulnerability exists in the EMF functionality of Canva Af
CVE-2025-66342 7.8 0.02% 1 0 2026-03-19T12:11:04.160000 A type confusion vulnerability exists in the EMF functionality of Canva Affinity
CVE-2026-25445 8.8 0.05% 4 0 2026-03-19T09:30:25 Deserialization of Untrusted Data vulnerability in Membership Software WishList
CVE-2025-60237 9.8 0.04% 2 0 2026-03-19T09:30:25 Deserialization of Untrusted Data vulnerability in Themeton Finag allows Object
CVE-2025-60233 9.8 0.04% 2 0 2026-03-19T09:30:25 Deserialization of Untrusted Data vulnerability in Themeton Zuut allows Object I
CVE-2026-25443 7.5 0.04% 2 0 2026-03-19T09:30:25 Missing Authorization vulnerability in Dotstore Fraud Prevention For Woocommerce
CVE-2026-25312 7.5 0.03% 2 0 2026-03-19T09:30:25 Missing Authorization vulnerability in EventPrime allows Exploiting Incorrectly
CVE-2026-25471 8.1 0.07% 2 0 2026-03-19T09:30:25 Authentication Bypass Using an Alternate Path or Channel vulnerability in Themep
CVE-2026-27540 9.1 0.04% 6 1 2026-03-19T06:30:33 Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co P
CVE-2026-27413 9.3 0.03% 6 0 2026-03-19T06:30:33 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-27096 8.1 0.04% 4 0 2026-03-19T06:30:33 Deserialization of Untrusted Data vulnerability in BuddhaThemes ColorFolio - Fre
CVE-2026-28461 7.5 0.08% 2 0 2026-03-19T03:31:03 OpenClaw versions prior to 2026.3.1 contain an unbounded memory growth vulnerabi
CVE-2026-32634 8.1 0.01% 2 0 2026-03-18T21:48:54 ## Summary In Central Browser mode, Glances stores both the Zeroconf-advertised
CVE-2026-26740 8.2 0.10% 2 0 2026-03-18T21:34:01 Buffer Overflow vulnerability in giflib v.5.2.2 allows a remote attacker to caus
CVE-2026-4396 8.3 0.01% 2 0 2026-03-18T21:33:04 Improper certificate validation in Devolutions Hub Reporting Service 2025.3.1.1
CVE-2026-25873 9.8 0.13% 2 0 2026-03-18T21:33:04 OmniGen2-RL contains an unauthenticated remote code execution vulnerability in t
CVE-2025-43520 5.5 0.02% 2 0 2026-03-18T21:32:58 A memory corruption issue was addressed with improved memory handling. This issu
CVE-2026-22730 8.8 0.04% 4 0 2026-03-18T20:20:40 A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionCon
CVE-2026-2603 8.1 0.17% 1 2 2026-03-18T20:17:34 A flaw was found in Keycloak. A remote attacker could bypass security controls b
CVE-2025-66376 7.2 28.82% 5 0 2026-03-18T20:13:37.087000 Zimbra Collaboration (ZCS) 10 before 10.0.18 and 10.1 before 10.1.13 allows Clas
CVE-2026-20643 5.4 0.03% 5 1 2026-03-18T20:10:01.710000 A cross-origin issue in the Navigation API was addressed with improved input val
CVE-2026-27980 7.5 0.01% 2 0 2026-03-18T19:52:54.307000 Next.js is a React framework for building full-stack web applications. Starting
CVE-2026-32731 10.0 0.06% 6 1 2026-03-18T19:49:08 **Reported:** 2026-03-08 **Status:** patched and released in version 3.5.3 of
CVE-2026-32730 8.1 0.06% 2 0 2026-03-18T19:48:52 # MFA/TOTP Bypass via Incorrect MongoDB Query in Bearer Token Middleware ## Sum
CVE-2026-2991 9.8 0.16% 1 1 2026-03-18T18:31:24 The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is
CVE-2026-1463 8.8 0.09% 1 0 2026-03-18T18:31:17 The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for Wor
CVE-2026-24063 8.3 0.01% 2 0 2026-03-18T18:31:16 When a plugin is installed using the Arturia Software Center (MacOS), it also in
CVE-2026-28779 7.5 0.07% 1 0 2026-03-18T16:32:55 Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is
CVE-2026-4208 None 0.05% 1 0 2026-03-18T16:17:26 The extension fails to properly reset the generated MFA code after successful au
CVE-2026-22729 8.6 0.05% 4 0 2026-03-18T16:16:25.990000 A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConver
CVE-2026-4258 7.5 0.02% 2 0 2026-03-18T16:10:10 All versions of the package sjcl are vulnerable to Improper Verification of Cryp
CVE-2026-21994 9.8 0.04% 1 1 2026-03-18T15:30:46 Vulnerability in the Oracle Edge Cloud Infrastructure Designer and Visualisation
CVE-2026-32746 9.8 0.06% 9 1 2026-03-18T15:30:44 telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMO
CVE-2026-30707 8.1 0.03% 2 0 2026-03-18T14:52:44.227000 An issue was discovered in SpeedExam Online Examination System (SaaS) after v.FE
CVE-2026-25449 9.8 0.04% 2 0 2026-03-18T14:52:44.227000 Deserialization of Untrusted Data vulnerability in Shinetheme Traveler allows Ob
CVE-2026-32692 7.6 0.03% 1 0 2026-03-18T14:52:44.227000 An authorization bypass vulnerability in the Vault secrets back-end implementati
CVE-2026-31891 7.7 0.03% 1 0 2026-03-18T14:52:44.227000 Cockpit is a headless content management system. Any Cockpit CMS instance runnin
CVE-2026-32256 7.5 0.01% 1 0 2026-03-18T14:52:44.227000 music-metadata is a metadata parser for audio and video media files. Prior to ve
CVE-2026-22322 7.1 0.08% 1 0 2026-03-18T14:52:44.227000 A stored cross‑site scripting (XSS) vulnerability in the Link Aggregation config
CVE-2026-22320 6.5 0.04% 1 0 2026-03-18T14:52:44.227000 A stack-based buffer overflow in the CLI's TFTP file‑transfer command handling a
CVE-2026-2092 7.7 0.07% 1 0 2026-03-18T14:52:44.227000 A flaw was found in Keycloak. Keycloak's Security Assertion Markup Language (SAM
CVE-2026-4295 7.8 0.01% 1 0 2026-03-18T14:52:44.227000 Improper trust boundary enforcement in Kiro IDE before version 0.8.0 on all supp
CVE-2026-4318 8.8 0.04% 1 0 2026-03-18T14:52:44.227000 A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Affected is
CVE-2026-32298 9.1 0.04% 3 0 2026-03-18T14:52:44.227000 The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by
CVE-2026-30405 7.5 0.11% 2 0 2026-03-18T12:58:46 An issue in GoBGP gobgpd v.4.2.0 allows a remote attacker to cause a denial of s
CVE-2025-41258 8.0 0.03% 1 0 2026-03-18T12:32:03 LibreChat version 0.8.1-rc2 uses the same JWT secret for the user session mechan
CVE-2026-22321 5.3 0.04% 1 0 2026-03-18T09:30:35 A stack-based buffer overflow in the device's Telnet/SSH CLI login routine occur
CVE-2026-22318 4.9 0.04% 1 0 2026-03-18T09:30:34 A stack-based buffer overflow vulnerability in the device's file transfer parame
CVE-2026-22323 7.1 0.04% 1 0 2026-03-18T09:30:34 A CSRF vulnerability in the Link Aggregation configuration interface allows an u
CVE-2026-22319 4.9 0.04% 1 0 2026-03-18T09:30:34 A stack-based buffer overflow in the device's file installation workflow allows
CVE-2026-22316 6.5 0.09% 1 0 2026-03-18T09:30:34 A remote attacker with user privileges for the webUI can use the setting of the
CVE-2026-22317 7.2 0.06% 1 0 2026-03-18T09:30:28 A command injection vulnerability in the device’s Root CA certificate transfer w
CVE-2026-3888 7.8 0.01% 24 2 2026-03-18T04:17:30.720000 Local privilege escalation in snapd on Linux allows local attackers to get root
CVE-2026-22171 None 0.03% 1 0 2026-03-18T01:25:44 ## Summary OpenClaw’s Feishu media download flow used untrusted Feishu media ke
CVE-2026-32841 8.1 0.09% 2 0 2026-03-18T00:30:59 Edimax GS-5008PL firmware version 1.00.54 and prior contain an authentication by
CVE-2026-22727 7.5 0.02% 1 0 2026-03-18T00:30:59 Unprotected internal endpoints in Cloud Foundry Capi Release 1.226.0 and below,
CVE-2026-1376 7.5 0.17% 1 0 2026-03-18T00:30:59 IBM i 7.6 could allow a remote attacker to cause a denial of service using faile
CVE-2026-32981 7.5 0.07% 1 0 2026-03-17T21:31:53 A path traversal vulnerability was identified in Ray Dashboard (default port 826
CVE-2026-2921 7.8 0.07% 1 0 2026-03-17T18:59:00.343000 GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability. Thi
CVE-2026-30881 8.8 0.03% 1 0 2026-03-17T18:52:41.947000 Chamilo LMS is a learning management system. Version 1.11.34 and prior contains
CVE-2026-4276 7.5 0.06% 2 0 2026-03-17T18:31:38 LibreChat RAG API, version 0.7.0, contains a log-injection vulnerability that al
CVE-2026-2673 7.5 0.04% 1 0 2026-03-17T18:31:38 Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected pref
CVE-2026-32297 7.5 0.03% 4 0 2026-03-17T18:30:42 The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary
CVE-2026-32296 8.2 0.05% 5 0 2026-03-17T18:30:42 Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without prope
CVE-2026-32295 7.5 0.03% 1 0 2026-03-17T18:30:42 JetKVM before 0.5.4 does not rate limit login requests, enabling brute-force att
CVE-2026-4148 8.8 0.04% 2 0 2026-03-17T18:30:38 A use-after-free vulnerability can be triggered in sharded clusters by an authen
CVE-2026-32292 7.5 0.03% 2 0 2026-03-17T18:30:37 The GL-iNet Comet (GL-RM1) KVM web interface does not limit login requests, enab
CVE-2026-30911 8.1 0.04% 2 0 2026-03-17T17:32:57.580000 Apache Airflow versions 3.1.0 through 3.1.7 missing authorization vulnerability
CVE-2026-31938 9.6 0.04% 2 0 2026-03-17T17:08:01 ### Impact User control of the `options` argument of the `output` function allo
CVE-2026-31898 8.1 0.03% 1 1 2026-03-17T17:07:52 ### Impact User control of arguments of the `createAnnotation` method allows us
CVE-2026-30922 7.5 0.04% 1 0 2026-03-17T16:17:33 ### Summary The `pyasn1` library is vulnerable to a Denial of Service (DoS) atta
CVE-2026-27979 None 0.04% 2 0 2026-03-17T16:16:52 ## Summary A request containing the `next-resume: 1` header (corresponding with
CVE-2025-15576 7.5 0.01% 1 0 2026-03-17T15:54:59.197000 If two sibling jails are restricted to separate filesystem trees, which is to sa
CVE-2026-28519 8.8 0.01% 1 0 2026-03-17T15:38:55.280000 arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vuln
CVE-2025-50881 8.8 0.20% 2 1 2026-03-17T15:37:26 The `flow/admin/moniteur.php` script in Use It Flow administration website befor
CVE-2026-4177 9.1 0.01% 2 0 2026-03-17T15:37:26 YAML::Syck versions through 1.36 for Perl has several potential security vulnera
CVE-2026-3564 9.1 0.05% 1 0 2026-03-17T15:36:34 A condition in ScreenConnect may allow an actor with access to server-level cryp
CVE-2025-69902 9.8 0.26% 2 0 2026-03-17T15:36:22 A command injection vulnerability in the minimal_wrapper.py component of kubectl
CVE-2026-32267 None 0.03% 3 0 2026-03-17T15:23:52 ### Summary A low-privilege user (or an unauthenticated user who has been sent a
CVE-2025-69783 7.8 0.01% 2 0 2026-03-17T14:20:01.670000 A local attacker can bypass OpenEDR's 2.5.1.0 self-defense mechanism by renaming
CVE-2025-66687 7.5 0.36% 2 0 2026-03-17T14:20:01.670000 Doom Launcher 3.8.1.0 is vulnerable to Directory Traversal due to missing file p
CVE-2026-2579 7.5 0.07% 1 0 2026-03-17T14:20:01.670000 The WowStore – Store Builder & Product Blocks for WooCommerce plugin for WordPre
CVE-2026-4252 9.8 0.14% 1 0 2026-03-17T14:20:01.670000 A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue
CVE-2026-4312 9.8 0.13% 2 0 2026-03-17T09:31:33 GCB/FCB Audit Software developed by DrangSoft has a Missing Authentication vulne
CVE-2026-0708 8.3 0.16% 1 0 2026-03-17T06:31:33 A flaw was found in libucl. A remote attacker could exploit this by providing a
CVE-2026-32313 8.2 0.03% 1 0 2026-03-16T22:01:06 ### Summary XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256
CVE-2026-32640 None 0.13% 2 0 2026-03-16T22:00:16 ### Impact If the objects passed in as `names` to SimpleEval have modules or oth
CVE-2026-28498 None 0.01% 2 0 2026-03-16T21:54:15 ## 1. Executive Summary A critical library-level vulnerability was identified i
CVE-2025-69784 8.8 0.01% 1 0 2026-03-16T21:35:35 A local, non-privileged attacker can abuse a vulnerable IOCTL interface exposed
CVE-2025-69768 7.5 0.04% 2 0 2026-03-16T21:35:34 SQL Injection vulnerability in Chyrp v.2.5.2 and before allows a remote attacker
CVE-2025-69809 9.8 0.04% 2 0 2026-03-16T21:34:38 A write-what-where condition in p2r3 Bareiron commit 8e4d40 allows unauthenticat
CVE-2025-69808 9.1 0.07% 1 0 2026-03-16T21:34:38 An out-of-bounds memory access (OOB) in p2r3 Bareiron commit 8e4d40 allows unaut
CVE-2025-47813 4.3 21.35% 2 0 template 2026-03-16T20:20:49.217000 loginok.html in Wing FTP Server before 7.4.4 discloses the full local installati
CVE-2026-4254 9.8 0.05% 1 0 2026-03-16T18:32:15 A weakness has been identified in Tenda AC8 up to 16.03.50.11. This vulnerabilit
CVE-2026-32609 7.5 0.05% 2 0 2026-03-16T16:26:55 ## Summary The GHSA-gh4x fix (commit 5d3de60) addressed unauthenticated configu
CVE-2026-32606 7.7 0.01% 1 0 2026-03-16T16:26:01 The default configuration of systemd-cryptenroll as used by IncusOS through mkos
CVE-2026-32596 None 0.10% 2 0 template 2026-03-16T16:23:59 ### Summary Glances web server runs without authentication by default when start
CVE-2026-28500 8.6 0.01% 1 0 2026-03-16T16:23:29 ### Summary A security control bypass exists in onnx.hub.load() due to improper
CVE-2026-29112 7.5 0.04% 1 0 2026-03-16T16:15:34 ### Impact The `ensureSize()` function in `@dicebear/converter` (versions < 9.4
CVE-2026-28521 7.7 0.01% 1 0 2026-03-16T15:30:55 arduino-TuyaOpen before version 1.2.1 contains an out-of-bounds memory read vuln
CVE-2026-28520 8.4 0.01% 1 0 2026-03-16T15:30:55 arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vul
CVE-2026-2493 7.5 15.24% 1 0 2026-03-16T15:30:55 IceWarp collaboration Directory Traversal Information Disclosure Vulnerability.
CVE-2026-2920 7.8 0.06% 1 0 2026-03-16T15:30:55 GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerabi
CVE-2026-2922 7.8 0.09% 1 0 2026-03-16T15:30:55 GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerabil
CVE-2026-25534 9.1 0.04% 2 0 2026-03-16T15:24:46 ### Impact Spinnaker updated URL Validation logic on user input to provide sanit
CVE-2026-2476 7.6 0.03% 1 0 2026-03-16T14:53:07.390000 Mattermost Plugins versions <=2.0.3.0 fail to properly mask sensitive configurat
CVE-2026-3909 8.8 33.06% 2 0 2026-03-13T21:32:59 Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a re
CVE-2026-3910 8.8 11.20% 2 0 2026-03-13T21:32:01 Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allow
CVE-2026-32136 9.8 0.79% 1 0 2026-03-12T14:47:49 VULNERABILITY: HTTP/2 Cleartext (h2c) Upgrade Authentication Bypass ============
CVE-2026-1965 6.5 0.05% 1 0 2026-03-12T14:11:19.070000 libcurl can in some circumstances reuse the wrong connection when asked to do an
CVE-2026-20128 7.5 0.02% 1 0 2026-03-04T21:13:56.113000 A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-
CVE-2026-25554 6.5 0.07% 2 0 2026-02-27T19:16:07.717000 OpenSIPS versions 3.1 before 3.6.4 containing the auth_jwt module (prior to comm
CVE-2026-20122 5.4 0.04% 1 0 2026-02-25T18:31:45 A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authe
CVE-2026-20126 8.8 0.04% 1 0 2026-02-25T18:31:44 A vulnerability in Cisco Catalyst SD-WAN Manager could allow an authenticated, l
CVE-2026-27205 None 0.03% 1 0 2026-02-23T22:28:06 When the `session` object is accessed, Flask should set the `Vary: Cookie` heade
CVE-2026-25749 6.6 0.01% 1 0 2026-02-20T15:45:19.210000 Vim is an open source, command line text editor. Prior to version 9.1.2132, a he
CVE-2025-32463 9.3 26.52% 1 82 2025-11-05T19:26:48.393000 Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswi
CVE-2025-59284 3.3 0.04% 1 1 2025-10-14T18:30:47 Exposure of sensitive information to an unauthorized actor in Windows NTLM allow
CVE-2025-4517 9.4 0.10% 2 10 2025-06-03T21:31:40 Allows arbitrary filesystem writes outside the extraction directory during extra
CVE-2026-33058 0 0.02% 3 0 N/A
CVE-2026-32703 0 0.04% 6 0 N/A
CVE-2026-28430 0 0.08% 3 0 N/A
CVE-2026-27894 0 0.06% 2 0 N/A
CVE-2026-27811 0 0.21% 2 0 N/A
CVE-2026-29056 0 0.13% 2 0 N/A
CVE-2026-27135 0 0.01% 2 0 N/A
CVE-2026-30884 0 0.02% 3 0 N/A
CVE-2026-32693 0 0.05% 1 0 N/A
CVE-2026-0667 0 0.00% 1 0 N/A
CVE-2026-24901 0 0.03% 3 0 N/A
CVE-2026-25770 0 0.09% 1 0 N/A
CVE-2026-25769 0 0.42% 1 1 N/A
CVE-2025-30201 0 0.28% 1 0 N/A
CVE-2026-23489 0 0.08% 1 0 N/A
CVE-2026-32628 0 0.03% 1 0 N/A
CVE-2026-30875 0 0.15% 1 0 N/A

CVE-2025-14031
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-19T14:20:15.870000

1 posts

IBM Sterling B2B Integrator and and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 could allow an unauthenticated attacker to send a specially crafted request that causes the application to crash.

thehackerwire@mastodon.social at 2026-03-17T23:32:41.000Z ##

🟠 CVE-2025-14031 - High (7.5)

IBM Sterling B2B Integrator and and IBM Sterling File Gateway 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5_1, 6.2.1.0 through 6.2.1.1_1, and 6.2.2.0 could allow an unauthenticated attacker to send a specially crafted request that causes th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20131
(10.0 CRITICAL)

EPSS: 0.57%

updated 2026-03-19T14:16:13.930000

7 posts

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java ob

3 repos

https://github.com/sak110/CVE-2026-20131

https://github.com/p3Nt3st3r-sTAr/CVE-2026-20131-POC

https://github.com/Sushilsin/CVE-2026-20131

allaboutsecurity@mastodon.social at 2026-03-19T12:11:11.000Z ##

Zero-Day-Lücke in Cisco-Firewall: Interlock-Ransomware nutzte Schwachstelle 36 Tage vor Bekanntgabe aus

Cisco-Schwachstelle CVE-2026-20131 – was steckt dahinter?

all-about-security.de/zero-day

#cisco #firewall #zeroday #itsecurity

##

patrickcmiller at 2026-03-19T11:42:00.868Z ##

Interlock group exploiting the CISCO FMC flaw CVE-2026-20131 36 days before disclosure securityaffairs.com/189636/mal

##

technadu at 2026-03-19T11:31:28.784Z ##

Interlock ransomware exploited Cisco firewall zero-day (CVE-2026-20131) before disclosure.
• Unauth RCE → root
• Memory webshells
• WebSocket C2
technadu.com/interlock-ransomw

##

youranonnewsirc@nerdculture.de at 2026-03-19T07:56:33.000Z ##

Cybersecurity: Interlock ransomware is exploiting a critical Cisco FMC zero-day (CVE-2026-20131, CVSS 10.0) for root access, active since January 2026. CISA added a Microsoft SharePoint vulnerability (CVE-2026-20963) to its Known Exploited Vulnerabilities Catalog. Geopolitical: Tensions in the Gulf region are escalating, with Iran reportedly targeting energy sites, leading to a sharp spike in oil prices. These events underscore the urgent need for enhanced digital resilience and geopolitical stability.

#Cybersecurity #Geopolitics #AnonNews_irc

##

patrickcmiller@infosec.exchange at 2026-03-19T11:42:00.000Z ##

Interlock group exploiting the CISCO FMC flaw CVE-2026-20131 36 days before disclosure securityaffairs.com/189636/mal

##

technadu@infosec.exchange at 2026-03-19T11:31:28.000Z ##

Interlock ransomware exploited Cisco firewall zero-day (CVE-2026-20131) before disclosure.
• Unauth RCE → root
• Memory webshells
• WebSocket C2
technadu.com/interlock-ransomw

#Cybersecurity #ZeroDay #Ransomware

##

youranonnewsirc@nerdculture.de at 2026-03-19T07:56:33.000Z ##

Cybersecurity: Interlock ransomware is exploiting a critical Cisco FMC zero-day (CVE-2026-20131, CVSS 10.0) for root access, active since January 2026. CISA added a Microsoft SharePoint vulnerability (CVE-2026-20963) to its Known Exploited Vulnerabilities Catalog. Geopolitical: Tensions in the Gulf region are escalating, with Iran reportedly targeting energy sites, leading to a sharp spike in oil prices. These events underscore the urgent need for enhanced digital resilience and geopolitical stability.

#Cybersecurity #Geopolitics #AnonNews_irc

##

CVE-2025-71260
(8.8 HIGH)

EPSS: 0.00%

updated 2026-03-19T14:16:13.583000

2 posts

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserialization of untrusted data vulnerability in the ASP.NET servlet's VIEWSTATE handling that allows authenticated attackers to execute arbitrary code. Attackers can supply crafted serialized objects to the VIEWSTATE parameter to achieve remote code execution and fully compromise the application. The following hotfixes remedia

1 repos

https://github.com/watchtowrlabs/watchTowr-vs-BMC-Footprints-RCE-CVE-2025-71257-CVE-2025-71260

thehackerwire@mastodon.social at 2026-03-19T14:17:09.000Z ##

🟠 CVE-2025-71260 - High (8.8)

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserialization of untrusted data vulnerability in the ASP.NET servlet's VIEWSTATE handling that allows authenticated attackers to execute arbitrary code. Attackers can supply cr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T14:17:09.000Z ##

🟠 CVE-2025-71260 - High (8.8)

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserialization of untrusted data vulnerability in the ASP.NET servlet's VIEWSTATE handling that allows authenticated attackers to execute arbitrary code. Attackers can supply cr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32838
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-19T14:08:34.423000

1 posts

Edimax GS-5008PL firmware version 1.00.54 and prior use cleartext HTTP for the web management interface without implementing TLS or SSL encryption. Attackers on the same network can intercept management traffic to capture administrator credentials and sensitive configuration data.

thehackerwire@mastodon.social at 2026-03-17T22:59:49.000Z ##

🟠 CVE-2026-32838 - High (7.5)

Edimax GS-5008PL firmware version 1.00.54 and prior use cleartext HTTP for the web management interface without implementing TLS or SSL encryption. Attackers on the same network can intercept management traffic to capture administrator credentials...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3658
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-19T13:25:00.570000

2 posts

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the 'fields' parameter in all versions up to, and including, 1.6.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional

thehackerwire@mastodon.social at 2026-03-19T12:39:48.000Z ##

🟠 CVE-2026-3658 - High (7.5)

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the 'fields' parameter in all versions up to, and including, 1.6.10.0 due to insufficient escaping on the user...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T12:39:48.000Z ##

🟠 CVE-2026-3658 - High (7.5)

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the 'fields' parameter in all versions up to, and including, 1.6.10.0 due to insufficient escaping on the user...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3511
(8.6 HIGH)

EPSS: 0.04%

updated 2026-03-19T13:25:00.570000

2 posts

Improper Restriction of XML External Entity Reference vulnerability in XMLUtils.java in Slovensko.Digital Autogram allows remote unauthenticated attacker to conduct SSRF (Server Side Request Forgery) attacks and obtain unauthorized access to local files on filesystems running the vulnerable application. Successful exploitation requires the victim to visit a specially crafted website that sends req

thehackerwire@mastodon.social at 2026-03-19T12:39:39.000Z ##

🟠 CVE-2026-3511 - High (8.6)

Improper Restriction of XML External Entity Reference vulnerability in XMLUtils.java in Slovensko.Digital Autogram allows remote unauthenticated attacker to conduct SSRF (Server Side Request Forgery) attacks and obtain unauthorized access to local...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T12:39:39.000Z ##

🟠 CVE-2026-3511 - High (8.6)

Improper Restriction of XML External Entity Reference vulnerability in XMLUtils.java in Slovensko.Digital Autogram allows remote unauthenticated attacker to conduct SSRF (Server Side Request Forgery) attacks and obtain unauthorized access to local...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27065
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-03-19T13:25:00.570000

6 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThimPress BuilderPress allows PHP Local File Inclusion.This issue affects BuilderPress: from n/a through 2.0.1.

offseq at 2026-03-19T12:30:30.005Z ##

🚨 CRITICAL: CVE-2026-27065 in ThimPress BuilderPress (≤2.0.1) lets attackers perform unauthenticated RFI, risking full WordPress compromise. Disable plugin & harden PHP configs immediately! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-19T09:24:30.000Z ##

🔴 CVE-2026-27065 - Critical (9.8)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThimPress BuilderPress allows PHP Local File Inclusion.This issue affects BuilderPress: from n/a through 2.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T09:23:16.000Z ##

🔴 CVE-2026-27065 - Critical (9.8)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThimPress BuilderPress allows PHP Local File Inclusion.This issue affects BuilderPress: from n/a through 2.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-19T12:30:30.000Z ##

🚨 CRITICAL: CVE-2026-27065 in ThimPress BuilderPress (≤2.0.1) lets attackers perform unauthenticated RFI, risking full WordPress compromise. Disable plugin & harden PHP configs immediately! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #RFI #CVE202627065

##

thehackerwire@mastodon.social at 2026-03-19T09:24:30.000Z ##

🔴 CVE-2026-27065 - Critical (9.8)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThimPress BuilderPress allows PHP Local File Inclusion.This issue affects BuilderPress: from n/a through 2.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T09:23:16.000Z ##

🔴 CVE-2026-27065 - Critical (9.8)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThimPress BuilderPress allows PHP Local File Inclusion.This issue affects BuilderPress: from n/a through 2.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27542
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-19T13:25:00.570000

3 posts

Incorrect Privilege Assignment vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Privilege Escalation.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.

Matchbook3469@mastodon.social at 2026-03-19T11:29:15.000Z ##

🚨 New security advisory:

CVE-2026-27542 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #VulnerabilityManagement #CyberSec

##

thehackerwire@mastodon.social at 2026-03-19T06:36:24.000Z ##

🔴 CVE-2026-27542 - Critical (9.8)

Incorrect Privilege Assignment vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Privilege Escalation.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T06:36:24.000Z ##

🔴 CVE-2026-27542 - Critical (9.8)

Incorrect Privilege Assignment vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Privilege Escalation.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27067
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-19T13:25:00.570000

4 posts

Unrestricted Upload of File with Dangerous Type vulnerability in Syarif Mobile App Editor allows Upload a Web Shell to a Web Server.This issue affects Mobile App Editor: from n/a through 1.3.1.

offseq at 2026-03-19T09:30:33.010Z ##

🚨 CRITICAL (CVSS 9.1): Syarif Mobile App Editor ≤1.3.1 hit by CWE-434 unrestricted file upload (CVE-2026-27067). Allows web shell deployment & full compromise. Enforce strict validation, monitor uploads, patch ASAP! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-19T09:23:26.000Z ##

🔴 CVE-2026-27067 - Critical (9.1)

Unrestricted Upload of File with Dangerous Type vulnerability in Syarif Mobile App Editor allows Upload a Web Shell to a Web Server.This issue affects Mobile App Editor: from n/a through 1.3.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-19T09:30:33.000Z ##

🚨 CRITICAL (CVSS 9.1): Syarif Mobile App Editor ≤1.3.1 hit by CWE-434 unrestricted file upload (CVE-2026-27067). Allows web shell deployment & full compromise. Enforce strict validation, monitor uploads, patch ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CVE202627067 #Infosec

##

thehackerwire@mastodon.social at 2026-03-19T09:23:26.000Z ##

🔴 CVE-2026-27067 - Critical (9.1)

Unrestricted Upload of File with Dangerous Type vulnerability in Syarif Mobile App Editor allows Upload a Web Shell to a Web Server.This issue affects Mobile App Editor: from n/a through 1.3.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27093
(8.1 HIGH)

EPSS: 0.11%

updated 2026-03-19T13:25:00.570000

2 posts

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Ovatheme Tripgo allows PHP Local File Inclusion.This issue affects Tripgo: from n/a before 1.5.6.

thehackerwire@mastodon.social at 2026-03-19T07:17:58.000Z ##

🟠 CVE-2026-27093 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Ovatheme Tripgo allows PHP Local File Inclusion.This issue affects Tripgo: from n/a before 1.5.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T07:17:58.000Z ##

🟠 CVE-2026-27093 - High (8.1)

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Ovatheme Tripgo allows PHP Local File Inclusion.This issue affects Tripgo: from n/a before 1.5.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32698
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-03-19T13:25:00.570000

4 posts

OpenProject is an open-source, web-based project management software. Versions prior to 16.6.9, 17.0.6, 17.1.3, and 17.2.1 are vulnerable to an SQL injection attack via a custom field's name. When that custom field was used in a Cost Report, the custom field's name was injected into the SQL query without proper sanitation. This allowed an attacker to execute arbitrary SQL commands during the gener

offseq at 2026-03-19T05:00:29.980Z ##

🚨 CRITICAL: CVE-2026-32698 in OpenProject (CVSS 9.1) enables SQL injection via admin-created custom fields, leading to potential RCE if chained with repo module bug. Patch to 16.6.9/17.0.6/17.1.3/17.2.1+ now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-18T22:47:24.000Z ##

🔴 CVE-2026-32698 - Critical (9.1)

OpenProject is an open-source, web-based project management software. Versions prior to 16.6.9, 17.0.6, 17.1.3, and 17.2.1 are vulnerable to an SQL injection attack via a custom field's name. When that custom field was used in a Cost Report, the c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-19T05:00:29.000Z ##

🚨 CRITICAL: CVE-2026-32698 in OpenProject (CVSS 9.1) enables SQL injection via admin-created custom fields, leading to potential RCE if chained with repo module bug. Patch to 16.6.9/17.0.6/17.1.3/17.2.1+ now! radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #OpenProject #InfoSec

##

thehackerwire@mastodon.social at 2026-03-18T22:47:24.000Z ##

🔴 CVE-2026-32698 - Critical (9.1)

OpenProject is an open-source, web-based project management software. Versions prior to 16.6.9, 17.0.6, 17.1.3, and 17.2.1 are vulnerable to an SQL injection attack via a custom field's name. When that custom field was used in a Cost Report, the c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32255
(8.6 HIGH)

EPSS: 0.09%

updated 2026-03-19T13:25:00.570000

2 posts

Kan is an open-source project management tool. In versions 0.5.4 and below, the /api/download/attatchment endpoint has no authentication and no URL validation. The Attachment Download endpoint accepts a user-supplied URL query parameter and passes it directly to fetch() server-side, and returns the full response body. An unauthenticated attacker can use this to make HTTP requests from the server t

1 repos

https://github.com/kOaDT/poc-cve-2026-32255

thehackerwire@mastodon.social at 2026-03-19T00:31:22.000Z ##

🟠 CVE-2026-32255 - High (8.6)

Kan is an open-source project management tool. In versions 0.5.4 and below, the /api/download/attatchment endpoint has no authentication and no URL validation. The Attachment Download endpoint accepts a user-supplied URL query parameter and passes...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T00:31:22.000Z ##

🟠 CVE-2026-32255 - High (8.6)

Kan is an open-source project management tool. In versions 0.5.4 and below, the /api/download/attatchment endpoint has no authentication and no URL validation. The Attachment Download endpoint accepts a user-supplied URL query parameter and passes...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15031
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-19T13:25:00.570000

2 posts

A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path validation enables crafted tar.gz files containing `..` or absolute paths to escape the intended extraction directory. This issue affects the latest version of MLflow and poses a high/critical risk in scen

thehackerwire@mastodon.social at 2026-03-18T23:19:52.000Z ##

🟠 CVE-2025-15031 - High (8.1)

A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path validation enables crafted tar.gz files containing `...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T23:19:52.000Z ##

🟠 CVE-2025-15031 - High (8.1)

A vulnerability in MLflow's pyfunc extraction process allows for arbitrary file writes due to improper handling of tar archive entries. Specifically, the use of `tarfile.extractall` without path validation enables crafted tar.gz files containing `...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-55040
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-19T13:25:00.570000

2 posts

The import form CSRF vulnerability in MuraCMS through 10.1.10 allows attackers to upload and install malicious form definitions through a CSRF attack. The vulnerable cForm.importform function lacks CSRF token validation, enabling malicious websites to forge file upload requests that install attacker-controlled forms when an authenticated administrator visits a crafted webpage. Full exploitation of

thehackerwire@mastodon.social at 2026-03-18T21:37:03.000Z ##

🟠 CVE-2025-55040 - High (8.8)

The import form CSRF vulnerability in MuraCMS through 10.1.10 allows attackers to upload and install malicious form definitions through a CSRF attack. The vulnerable cForm.importform function lacks CSRF token validation, enabling malicious website...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T21:37:03.000Z ##

🟠 CVE-2025-55040 - High (8.8)

The import form CSRF vulnerability in MuraCMS through 10.1.10 allows attackers to upload and install malicious form definitions through a CSRF attack. The vulnerable cForm.importform function lacks CSRF token validation, enabling malicious website...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32321
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-19T13:25:00.570000

2 posts

ClipBucket v5 is an open source video sharing platform. An authenticated time-based blind SQL injection vulnerability exists in ClipBucket prior to 5.5.3 #80 within the `actions/ajax.php` endpoint. Due to insufficient input sanitization of the `userid` parameter, an authenticated attacker can execute arbitrary SQL queries, leading to full database disclosure and potential administrative account ta

thehackerwire@mastodon.social at 2026-03-18T21:35:32.000Z ##

🟠 CVE-2026-32321 - High (8.8)

ClipBucket v5 is an open source video sharing platform. An authenticated time-based blind SQL injection vulnerability exists in ClipBucket prior to 5.5.3 #80 within the `actions/ajax.php` endpoint. Due to insufficient input sanitization of the `us...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T21:35:32.000Z ##

🟠 CVE-2026-32321 - High (8.8)

ClipBucket v5 is an open source video sharing platform. An authenticated time-based blind SQL injection vulnerability exists in ClipBucket prior to 5.5.3 #80 within the `actions/ajax.php` endpoint. Due to insufficient input sanitization of the `us...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24062
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-19T13:25:00.570000

2 posts

The "Privileged Helper" component of the Arturia Software Center (MacOS) does not perform sufficient client code signature validation when a client connects. This leads to an attacker being able to connect to the helper and execute privileged actions leading to local privilege escalation.

thehackerwire@mastodon.social at 2026-03-18T19:30:40.000Z ##

🟠 CVE-2026-24062 - High (7.8)

The "Privileged Helper" component of the Arturia Software Center (MacOS) does not perform sufficient client code signature validation when a client connects. This leads to an attacker being able to connect to the helper and execute privileged act...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T19:30:40.000Z ##

🟠 CVE-2026-24062 - High (7.8)

The "Privileged Helper" component of the Arturia Software Center (MacOS) does not perform sufficient client code signature validation when a client connects. This leads to an attacker being able to connect to the helper and execute privileged act...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2992
(8.2 HIGH)

EPSS: 0.04%

updated 2026-03-19T13:25:00.570000

2 posts

The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization on the `/wp-json/kivicare/v1/setup-wizard/clinic` REST API endpoint in all versions up to, and including, 4.1.2. This makes it possible for unauthenticated attackers to create a new clinic and a WordPress user with clinic admin privileges.

thehackerwire@mastodon.social at 2026-03-18T18:41:44.000Z ##

🟠 CVE-2026-2992 - High (8.2)

The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization on the `/wp-json/kivicare/v1/setup-wizard/clinic` REST API endpoint in all versions up to, and includ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T18:41:44.000Z ##

🟠 CVE-2026-2992 - High (8.2)

The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization on the `/wp-json/kivicare/v1/setup-wizard/clinic` REST API endpoint in all versions up to, and includ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32633
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-03-19T13:25:00.570000

2 posts

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, the `/api/4/serverslist` endpoint returns raw server objects from `GlancesServersList.get_servers_list()`. Those objects are mutated in-place during background polling and can contain a `uri` field with embedded HTTP Basic credentials for downstream Glances servers, using the reusable

thehackerwire@mastodon.social at 2026-03-18T18:41:24.000Z ##

🔴 CVE-2026-32633 - Critical (9.1)

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, the `/api/4/serverslist` endpoint returns raw server objects from `GlancesServersList.get_servers_list()`. Those objects are mutated ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T18:41:24.000Z ##

🔴 CVE-2026-32633 - Critical (9.1)

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, the `/api/4/serverslist` endpoint returns raw server objects from `GlancesServersList.get_servers_list()`. Those objects are mutated ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32610
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-19T13:25:00.570000

1 posts

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, the Glances REST API web server ships with a default CORS configuration that sets `allow_origins=["*"]` combined with `allow_credentials=True`. When both of these options are enabled together, Starlette's `CORSMiddleware` reflects the requesting `Origin` header value in the `Access-Control-Allow-Origin` respon

thehackerwire@mastodon.social at 2026-03-18T17:28:08.000Z ##

🟠 CVE-2026-32610 - High (8.1)

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, the Glances REST API web server ships with a default CORS configuration that sets `allow_origins=["*"]` combined with `allow_credentials=True`. When both of t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20963
(8.8 HIGH)

EPSS: 9.87%

updated 2026-03-19T13:09:24.293000

8 posts

Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

AAKL at 2026-03-19T14:56:46.481Z ##

If you missed this yesterday, CISA added two vulnerabilities to the KEV catalogue.

- CVE-2026-20963: Microsoft SharePoint Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2025-66376: Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability cve.org/CVERecord?id=CVE-2025-

##

offseq at 2026-03-19T11:00:27.313Z ##

⚠️ CRITICAL: CISA reports active exploits of CVE-2026-20963 in Microsoft SharePoint. Remote code execution allows full server compromise. Patch now, monitor logs, segment networks! radar.offseq.com/threat/cisa-w

##

youranonnewsirc@nerdculture.de at 2026-03-19T07:56:33.000Z ##

Cybersecurity: Interlock ransomware is exploiting a critical Cisco FMC zero-day (CVE-2026-20131, CVSS 10.0) for root access, active since January 2026. CISA added a Microsoft SharePoint vulnerability (CVE-2026-20963) to its Known Exploited Vulnerabilities Catalog. Geopolitical: Tensions in the Gulf region are escalating, with Iran reportedly targeting energy sites, leading to a sharp spike in oil prices. These events underscore the urgent need for enhanced digital resilience and geopolitical stability.

#Cybersecurity #Geopolitics #AnonNews_irc

##

cisakevtracker@mastodon.social at 2026-03-18T21:00:54.000Z ##

CVE ID: CVE-2026-20963
Vendor: Microsoft
Product: SharePoint
Date Added: 2026-03-18
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-19T14:56:46.000Z ##

If you missed this yesterday, CISA added two vulnerabilities to the KEV catalogue.

- CVE-2026-20963: Microsoft SharePoint Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2025-66376: Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #infosec #Zimbra #Microsoft #vulnerability

##

offseq@infosec.exchange at 2026-03-19T11:00:27.000Z ##

⚠️ CRITICAL: CISA reports active exploits of CVE-2026-20963 in Microsoft SharePoint. Remote code execution allows full server compromise. Patch now, monitor logs, segment networks! radar.offseq.com/threat/cisa-w #OffSeq #SharePoint #Vuln #RCE

##

youranonnewsirc@nerdculture.de at 2026-03-19T07:56:33.000Z ##

Cybersecurity: Interlock ransomware is exploiting a critical Cisco FMC zero-day (CVE-2026-20131, CVSS 10.0) for root access, active since January 2026. CISA added a Microsoft SharePoint vulnerability (CVE-2026-20963) to its Known Exploited Vulnerabilities Catalog. Geopolitical: Tensions in the Gulf region are escalating, with Iran reportedly targeting energy sites, leading to a sharp spike in oil prices. These events underscore the urgent need for enhanced digital resilience and geopolitical stability.

#Cybersecurity #Geopolitics #AnonNews_irc

##

cisakevtracker@mastodon.social at 2026-03-18T21:00:54.000Z ##

CVE ID: CVE-2026-20963
Vendor: Microsoft
Product: SharePoint
Date Added: 2026-03-18
Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-4064
(8.3 HIGH)

EPSS: 0.04%

updated 2026-03-19T13:03:28.320000

1 posts

Missing authorization checks on multiple gRPC service endpoints in PowerShell Universal before 2026.1.4 allows an authenticated user with any valid token to bypass role-based access controls and perform privileged operations — including reading sensitive data, creating or deleting resources, and disrupting service operations — via crafted gRPC requests.

thehackerwire@mastodon.social at 2026-03-17T21:49:11.000Z ##

🟠 CVE-2026-4064 - High (8.3)

Missing authorization checks on multiple gRPC service endpoints in PowerShell Universal before 2026.1.4 allows an authenticated user with any valid token to bypass role-based access controls and perform privileged operations — including reading ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-64301
(7.8 HIGH)

EPSS: 0.02%

updated 2026-03-19T12:24:39.400000

1 posts

An out‑of‑bounds write vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out‑of‑bounds write, potentially leading to code execution.

thehackerwire@mastodon.social at 2026-03-17T19:31:06.000Z ##

🟠 CVE-2025-64301 - High (7.8)

An out‑of‑bounds write vulnerability exists in the EMF functionality of Canva Affinity. By using a specially crafted EMF file, an attacker could exploit this vulnerability to perform an out‑of‑bounds write, potentially leading to code exec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66342
(7.8 HIGH)

EPSS: 0.02%

updated 2026-03-19T12:11:04.160000

1 posts

A type confusion vulnerability exists in the EMF functionality of Canva Affinity. A specially crafted EMF file can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution.

thehackerwire@mastodon.social at 2026-03-17T19:30:56.000Z ##

🟠 CVE-2025-66342 - High (7.8)

A type confusion vulnerability exists in the EMF functionality of Canva Affinity. A specially crafted EMF file can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25445
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-19T09:30:25

4 posts

Deserialization of Untrusted Data vulnerability in Membership Software WishList Member X allows Object Injection.This issue affects WishList Member X: from n/a through 3.29.0.

thehackerwire@mastodon.social at 2026-03-19T09:24:19.000Z ##

🟠 CVE-2026-25445 - High (8.8)

Deserialization of Untrusted Data vulnerability in Membership Software WishList Member X allows Object Injection.This issue affects WishList Member X: from n/a through 3.29.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T09:23:07.000Z ##

🟠 CVE-2026-25445 - High (8.8)

Deserialization of Untrusted Data vulnerability in Membership Software WishList Member X allows Object Injection.This issue affects WishList Member X: from n/a through 3.29.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T09:24:19.000Z ##

🟠 CVE-2026-25445 - High (8.8)

Deserialization of Untrusted Data vulnerability in Membership Software WishList Member X allows Object Injection.This issue affects WishList Member X: from n/a through 3.29.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T09:23:07.000Z ##

🟠 CVE-2026-25445 - High (8.8)

Deserialization of Untrusted Data vulnerability in Membership Software WishList Member X allows Object Injection.This issue affects WishList Member X: from n/a through 3.29.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60237
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-19T09:30:25

2 posts

Deserialization of Untrusted Data vulnerability in Themeton Finag allows Object Injection.This issue affects Finag: from n/a through 1.5.0.

thehackerwire@mastodon.social at 2026-03-19T09:23:45.000Z ##

🔴 CVE-2025-60237 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in Themeton Finag allows Object Injection.This issue affects Finag: from n/a through 1.5.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T09:23:45.000Z ##

🔴 CVE-2025-60237 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in Themeton Finag allows Object Injection.This issue affects Finag: from n/a through 1.5.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60233
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-19T09:30:25

2 posts

Deserialization of Untrusted Data vulnerability in Themeton Zuut allows Object Injection.This issue affects Zuut: from n/a through 1.4.2.

thehackerwire@mastodon.social at 2026-03-19T09:23:35.000Z ##

🔴 CVE-2025-60233 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in Themeton Zuut allows Object Injection.This issue affects Zuut: from n/a through 1.4.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T09:23:35.000Z ##

🔴 CVE-2025-60233 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in Themeton Zuut allows Object Injection.This issue affects Zuut: from n/a through 1.4.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25443
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-19T09:30:25

2 posts

Missing Authorization vulnerability in Dotstore Fraud Prevention For Woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fraud Prevention For Woocommerce: from n/a through 2.3.3.

thehackerwire@mastodon.social at 2026-03-19T09:22:58.000Z ##

🟠 CVE-2026-25443 - High (7.5)

Missing Authorization vulnerability in Dotstore Fraud Prevention For Woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fraud Prevention For Woocommerce: from n/a through 2.3.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T09:22:58.000Z ##

🟠 CVE-2026-25443 - High (7.5)

Missing Authorization vulnerability in Dotstore Fraud Prevention For Woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Fraud Prevention For Woocommerce: from n/a through 2.3.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25312
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-19T09:30:25

2 posts

Missing Authorization vulnerability in EventPrime allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EventPrime: from n/a through 4.2.8.3.

thehackerwire@mastodon.social at 2026-03-19T08:23:17.000Z ##

🟠 CVE-2026-25312 - High (7.5)

Missing Authorization vulnerability in EventPrime allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EventPrime: from n/a through 4.2.8.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T08:23:17.000Z ##

🟠 CVE-2026-25312 - High (7.5)

Missing Authorization vulnerability in EventPrime allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects EventPrime: from n/a through 4.2.8.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25471
(8.1 HIGH)

EPSS: 0.07%

updated 2026-03-19T09:30:25

2 posts

Authentication Bypass Using an Alternate Path or Channel vulnerability in Themepaste Admin Safety Guard allows Password Recovery Exploitation.This issue affects Admin Safety Guard: from n/a through 1.2.6.

thehackerwire@mastodon.social at 2026-03-19T08:23:07.000Z ##

🟠 CVE-2026-25471 - High (8.1)

Authentication Bypass Using an Alternate Path or Channel vulnerability in Themepaste Admin Safety Guard allows Password Recovery Exploitation.This issue affects Admin Safety Guard: from n/a through 1.2.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T08:23:07.000Z ##

🟠 CVE-2026-25471 - High (8.1)

Authentication Bypass Using an Alternate Path or Channel vulnerability in Themepaste Admin Safety Guard allows Password Recovery Exploitation.This issue affects Admin Safety Guard: from n/a through 1.2.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27540
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-19T06:30:33

6 posts

Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.

1 repos

https://github.com/DeadExpl0it/CVE-2026-27540-WordPress-Exploit-PoC

offseq at 2026-03-19T08:00:27.726Z ##

🚨 CVE-2026-27540 (CVSS 9.0): Woocommerce Wholesale Lead Capture plugin lets unauthenticated attackers upload malicious files — remote code execution & full compromise possible. Disable plugin, enforce file type restrictions! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-19T06:53:37.000Z ##

🔴 CVE-2026-27540 - Critical (9)

Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T06:36:18.000Z ##

🔴 CVE-2026-27540 - Critical (9)

Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-19T08:00:27.000Z ##

🚨 CVE-2026-27540 (CVSS 9.0): Woocommerce Wholesale Lead Capture plugin lets unauthenticated attackers upload malicious files — remote code execution & full compromise possible. Disable plugin, enforce file type restrictions! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

thehackerwire@mastodon.social at 2026-03-19T06:53:37.000Z ##

🔴 CVE-2026-27540 - Critical (9)

Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T06:36:18.000Z ##

🔴 CVE-2026-27540 - Critical (9)

Unrestricted Upload of File with Dangerous Type vulnerability in Rymera Web Co Pty Ltd. Woocommerce Wholesale Lead Capture allows Using Malicious Files.This issue affects Woocommerce Wholesale Lead Capture: from n/a through 2.0.3.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27413
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-03-19T06:30:33

6 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozmoslabs Profile Builder Pro allows Blind SQL Injection.This issue affects Profile Builder Pro: from n/a through 3.13.9.

thehackerwire@mastodon.social at 2026-03-19T06:53:28.000Z ##

🔴 CVE-2026-27413 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozmoslabs Profile Builder Pro allows Blind SQL Injection.This issue affects Profile Builder Pro: from n/a through 3.13.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T06:36:09.000Z ##

🔴 CVE-2026-27413 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozmoslabs Profile Builder Pro allows Blind SQL Injection.This issue affects Profile Builder Pro: from n/a through 3.13.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-03-19T06:30:27.086Z ##

🔴 CVE-2026-27413: CRITICAL Blind SQL Injection in Cozmoslabs Profile Builder Pro (≤3.13.9) allows unauthenticated data exfiltration. No patch yet — restrict access, monitor logs. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-19T06:53:28.000Z ##

🔴 CVE-2026-27413 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozmoslabs Profile Builder Pro allows Blind SQL Injection.This issue affects Profile Builder Pro: from n/a through 3.13.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T06:36:09.000Z ##

🔴 CVE-2026-27413 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cozmoslabs Profile Builder Pro allows Blind SQL Injection.This issue affects Profile Builder Pro: from n/a through 3.13.9.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-19T06:30:27.000Z ##

🔴 CVE-2026-27413: CRITICAL Blind SQL Injection in Cozmoslabs Profile Builder Pro (≤3.13.9) allows unauthenticated data exfiltration. No patch yet — restrict access, monitor logs. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #SQLi #Infosec

##

CVE-2026-27096
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-19T06:30:33

4 posts

Deserialization of Untrusted Data vulnerability in BuddhaThemes ColorFolio - Freelance Designer WordPress Theme allows Object Injection.This issue affects ColorFolio - Freelance Designer WordPress Theme: from n/a through 1.3.

thehackerwire@mastodon.social at 2026-03-19T06:40:45.000Z ##

🟠 CVE-2026-27096 - High (8.1)

Deserialization of Untrusted Data vulnerability in BuddhaThemes ColorFolio - Freelance Designer WordPress Theme allows Object Injection.This issue affects ColorFolio - Freelance Designer WordPress Theme: from n/a through 1.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T06:36:00.000Z ##

🟠 CVE-2026-27096 - High (8.1)

Deserialization of Untrusted Data vulnerability in BuddhaThemes ColorFolio - Freelance Designer WordPress Theme allows Object Injection.This issue affects ColorFolio - Freelance Designer WordPress Theme: from n/a through 1.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T06:40:45.000Z ##

🟠 CVE-2026-27096 - High (8.1)

Deserialization of Untrusted Data vulnerability in BuddhaThemes ColorFolio - Freelance Designer WordPress Theme allows Object Injection.This issue affects ColorFolio - Freelance Designer WordPress Theme: from n/a through 1.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T06:36:00.000Z ##

🟠 CVE-2026-27096 - High (8.1)

Deserialization of Untrusted Data vulnerability in BuddhaThemes ColorFolio - Freelance Designer WordPress Theme allows Object Injection.This issue affects ColorFolio - Freelance Designer WordPress Theme: from n/a through 1.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28461
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-19T03:31:03

2 posts

OpenClaw versions prior to 2026.3.1 contain an unbounded memory growth vulnerability in the Zalo webhook endpoint that allows unauthenticated attackers to trigger in-memory key accumulation by varying query strings. Remote attackers can exploit this by sending repeated requests with different query parameters to cause memory pressure, process instability, or out-of-memory conditions that degrade s

thehackerwire@mastodon.social at 2026-03-19T03:05:27.000Z ##

🟠 CVE-2026-28461 - High (7.5)

OpenClaw versions prior to 2026.3.1 contain an unbounded memory growth vulnerability in the Zalo webhook endpoint that allows unauthenticated attackers to trigger in-memory key accumulation by varying query strings. Remote attackers can exploit th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-19T03:05:27.000Z ##

🟠 CVE-2026-28461 - High (7.5)

OpenClaw versions prior to 2026.3.1 contain an unbounded memory growth vulnerability in the Zalo webhook endpoint that allows unauthenticated attackers to trigger in-memory key accumulation by varying query strings. Remote attackers can exploit th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32634
(8.1 HIGH)

EPSS: 0.01%

updated 2026-03-18T21:48:54

2 posts

## Summary In Central Browser mode, Glances stores both the Zeroconf-advertised server name and the discovered IP address for dynamic servers, but later builds connection URIs from the untrusted advertised name instead of the discovered IP. When a dynamic server reports itself as protected, Glances also uses that same untrusted name as the lookup key for saved passwords and the global `[passwords

thehackerwire@mastodon.social at 2026-03-18T18:40:20.000Z ##

🟠 CVE-2026-32634 - High (8.1)

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, Glances stores both the Zeroconf-advertised server name and the discovered IP address for dynamic servers, but later builds connectio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T18:40:20.000Z ##

🟠 CVE-2026-32634 - High (8.1)

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.2, in Central Browser mode, Glances stores both the Zeroconf-advertised server name and the discovered IP address for dynamic servers, but later builds connectio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26740
(8.2 HIGH)

EPSS: 0.10%

updated 2026-03-18T21:34:01

2 posts

Buffer Overflow vulnerability in giflib v.5.2.2 allows a remote attacker to cause a denial of service via the EGifGCBToExtension overwriting an existing Graphic Control Extension block without validating its allocated size.

thehackerwire@mastodon.social at 2026-03-18T19:30:31.000Z ##

🟠 CVE-2026-26740 - High (8.2)

Buffer Overflow vulnerability in giflib v.5.2.2 allows a remote attacker to cause a denial of service via the EGifGCBToExtension overwriting an existing Graphic Control Extension block without validating its allocated size.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T19:30:31.000Z ##

🟠 CVE-2026-26740 - High (8.2)

Buffer Overflow vulnerability in giflib v.5.2.2 allows a remote attacker to cause a denial of service via the EGifGCBToExtension overwriting an existing Graphic Control Extension block without validating its allocated size.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4396
(8.3 HIGH)

EPSS: 0.01%

updated 2026-03-18T21:33:04

2 posts

Improper certificate validation in Devolutions Hub Reporting Service 2025.3.1.1 and earlier allows a network attacker to perform a man-in-the-middle attack via disabled TLS certificate verification.

thehackerwire@mastodon.social at 2026-03-18T21:35:51.000Z ##

🟠 CVE-2026-4396 - High (8.3)

Improper certificate validation in Devolutions Hub Reporting Service
2025.3.1.1 and earlier allows a network attacker to perform a
man-in-the-middle attack via disabled TLS certificate verification.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T21:35:51.000Z ##

🟠 CVE-2026-4396 - High (8.3)

Improper certificate validation in Devolutions Hub Reporting Service
2025.3.1.1 and earlier allows a network attacker to perform a
man-in-the-middle attack via disabled TLS certificate verification.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25873
(9.8 CRITICAL)

EPSS: 0.13%

updated 2026-03-18T21:33:04

2 posts

OmniGen2-RL contains an unauthenticated remote code execution vulnerability in the reward server component that allows remote attackers to execute arbitrary commands by sending malicious HTTP POST requests. Attackers can exploit insecure pickle deserialization of request bodies to achieve code execution on the host system running the exposed service.

thehackerwire@mastodon.social at 2026-03-18T21:35:42.000Z ##

🔴 CVE-2026-25873 - Critical (9.8)

OmniGen2-RL contains an unauthenticated remote code execution vulnerability in the reward server component that allows remote attackers to execute arbitrary commands by sending malicious HTTP POST requests. Attackers can exploit insecure pickle de...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T21:35:42.000Z ##

🔴 CVE-2026-25873 - Critical (9.8)

OmniGen2-RL contains an unauthenticated remote code execution vulnerability in the reward server component that allows remote attackers to execute arbitrary commands by sending malicious HTTP POST requests. Attackers can exploit insecure pickle de...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-43520
(5.5 MEDIUM)

EPSS: 0.02%

updated 2026-03-18T21:32:58

2 posts

A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.

fmarini@mastodon.social at 2026-03-18T15:43:31.000Z ##

As usual, Wired is… not great 🙄

Regarding DarkSword, the latest objectively bad exploit affecting iOS and Safari, Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

wired.com/story/hundreds-of-mi

##

fmarini@mastodon.social at 2026-03-18T15:40:31.000Z ##

@agreenberg more in depth analysis from Google.

It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

wired.com/story/hundreds-of-mi

##

CVE-2026-22730
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-18T20:20:40

4 posts

A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attackers to bypass metadata-based access controls and execute arbitrary SQL commands. The vulnerability exists due to missing input sanitization.

_r_netsec at 2026-03-19T08:58:05.274Z ##

CVE-2026-22730: SQL Injection in Spring AI’s MariaDB Vector Store blog.securelayer7.net/cve-2026

##

_r_netsec@infosec.exchange at 2026-03-19T08:58:05.000Z ##

CVE-2026-22730: SQL Injection in Spring AI’s MariaDB Vector Store blog.securelayer7.net/cve-2026

##

offseq@infosec.exchange at 2026-03-18T10:30:29.000Z ##

🚨 CVE-2026-22730: HIGH-severity SQL injection in VMware Spring AI (1.0.x, 1.1.x) lets users with limited privileges run arbitrary SQL via MariaDBFilterExpressionConverter. Patch ASAP & harden input validation! radar.offseq.com/threat/cve-20 #OffSeq #VMware #SQLi #Infosec

##

thehackerwire@mastodon.social at 2026-03-18T10:00:37.000Z ##

🟠 CVE-2026-22730 - High (8.8)

A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attackers to bypass metadata-based access controls and execute arbitrary SQL commands.

The vulnerability exists due to missing input sanitization.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2603
(8.1 HIGH)

EPSS: 0.17%

updated 2026-03-18T20:17:34

1 posts

A flaw was found in Keycloak. A remote attacker could bypass security controls by sending a valid SAML response from an external Identity Provider (IdP) to the Keycloak SAML endpoint for IdP-initiated broker logins. This allows the attacker to complete broker logins even when the SAML Identity Provider is disabled, leading to unauthorized authentication.

2 repos

https://github.com/mbanyamer/CVE-2026-26030-Microsoft-Semantic-Kernel-1.39.4-RCE

https://github.com/piiiico/mcp-check

thehackerwire@mastodon.social at 2026-03-18T02:45:25.000Z ##

🟠 CVE-2026-2603 - High (8.1)

A flaw was found in Keycloak. A remote attacker could bypass security controls by sending a valid SAML response from an external Identity Provider (IdP) to the Keycloak SAML endpoint for IdP-initiated broker logins. This allows the attacker to com...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66376
(7.2 HIGH)

EPSS: 28.82%

updated 2026-03-18T20:13:37.087000

5 posts

Zimbra Collaboration (ZCS) 10 before 10.0.18 and 10.1 before 10.1.13 allows Classic UI stored XSS via Cascading Style Sheets (CSS) @import directives in an HTML e-mail message.

AAKL at 2026-03-19T14:56:46.481Z ##

If you missed this yesterday, CISA added two vulnerabilities to the KEV catalogue.

- CVE-2026-20963: Microsoft SharePoint Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2025-66376: Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability cve.org/CVERecord?id=CVE-2025-

##

secdb at 2026-03-18T20:00:20.324Z ##

🚨 [CISA-2026:0318] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-66376 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Zimbra_Se ; nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-03-19T14:56:46.000Z ##

If you missed this yesterday, CISA added two vulnerabilities to the KEV catalogue.

- CVE-2026-20963: Microsoft SharePoint Deserialization of Untrusted Data Vulnerability cve.org/CVERecord?id=CVE-2026-

- CVE-2025-66376: Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #infosec #Zimbra #Microsoft #vulnerability

##

secdb@infosec.exchange at 2026-03-18T20:00:20.000Z ##

🚨 [CISA-2026:0318] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-66376 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Zimbra_Se ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260318 #cisa20260318 #cve_2025_66376 #cve202566376

##

cisakevtracker@mastodon.social at 2026-03-18T18:00:52.000Z ##

CVE ID: CVE-2025-66376
Vendor: Synacor
Product: Zimbra Collaboration Suite (ZCS)
Date Added: 2026-03-18
Notes: wiki.zimbra.com/wiki/Zimbra_Se ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-20643
(5.4 MEDIUM)

EPSS: 0.03%

updated 2026-03-18T20:10:01.710000

5 posts

A cross-origin issue in the Navigation API was addressed with improved input validation. This issue is fixed in Background Security Improvements for iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2. Processing maliciously crafted web content may bypass Same Origin Policy.

1 repos

https://github.com/zeroxjf/WebKit-NavigationAPI-SOP-Bypass

oversecurity@mastodon.social at 2026-03-19T11:20:12.000Z ##

Apple Patches WebKit Vulnerability CVE-2026-20643 Across iOS, macOS

Apple has released a new security update to address a critical WebKit vulnerability tracked as CVE-2026-20643. The vulnerability was identified

🔗️ [Thecyberexpress] link.is.it/lPLEWn

##

oversecurity@mastodon.social at 2026-03-19T11:20:12.000Z ##

Apple Patches WebKit Vulnerability CVE-2026-20643 Across iOS, macOS

Apple has released a new security update to address a critical WebKit vulnerability tracked as CVE-2026-20643. The vulnerability was identified

🔗️ [Thecyberexpress] link.is.it/lPLEWn

##

jbhall56@infosec.exchange at 2026-03-18T12:08:51.000Z ##

The vulnerability, tracked as CVE-2026-20643 (CVSS score: N/A), has been described as a cross-origin issue in WebKit's Navigation API that could be exploited to bypass the same-origin policy when processing maliciously crafted web content. thehackernews.com/2026/03/appl

##

teezeh@ieji.de at 2026-03-18T06:54:00.000Z ##

“Apple has released its first Background Security Improvements update to fix a WebKit flaw tracked as CVE-2026-20643 on iPhones, iPads, and Macs without requiring a full operating system upgrade.”

bleepingcomputer.com/news/secu

##

oversecurity@mastodon.social at 2026-03-18T01:20:17.000Z ##

Apple pushes first Background Security Improvements update to fix WebKit flaw

Apple has released its first Background Security Improvements update to fix a WebKit flaw tracked as CVE-2026-20643 on iPhones, iPads, and Macs...

🔗️ [Bleepingcomputer] link.is.it/9V9yPV

##

CVE-2026-27980
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-18T19:52:54.307000

2 posts

Next.js is a React framework for building full-stack web applications. Starting in version 10.0.0 and prior to version 16.1.7, the default Next.js image optimization disk cache (`/_next/image`) did not have a configurable upper bound, allowing unbounded cache growth. An attacker could generate many unique image-optimization variants and exhaust disk space, causing denial of service. This is fixed

thehackerwire@mastodon.social at 2026-03-18T20:01:08.000Z ##

🟠 CVE-2026-27980 - High (7.5)

Next.js is a React framework for building full-stack web applications. Starting in version 10.0.0 and prior to version 16.1.7, the default Next.js image optimization disk cache (`/_next/image`) did not have a configurable upper bound, allowing unb...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T20:01:08.000Z ##

🟠 CVE-2026-27980 - High (7.5)

Next.js is a React framework for building full-stack web applications. Starting in version 10.0.0 and prior to version 16.1.7, the default Next.js image optimization disk cache (`/_next/image`) did not have a configurable upper bound, allowing unb...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32731
(10.0 CRITICAL)

EPSS: 0.06%

updated 2026-03-18T19:49:08

6 posts

**Reported:** 2026-03-08 **Status:** patched and released in version 3.5.3 of `@apostrophecms/import-export` --- ## Product | Field | Value | |---|---| | Repository | `apostrophecms/apostrophe` (monorepo) | | Affected Package | `@apostrophecms/import-export` | | Affected File | `packages/import-export/lib/formats/gzip.js` | | Affected Function | `extract(filepath, exportPath)` — lines ~132–15

1 repos

https://github.com/0xEr3n/CVE-2026-32731

offseq at 2026-03-19T02:00:32.017Z ##

🔎 CVE-2026-32731 (CRITICAL, CVSS 10): Path traversal in ApostropheCMS import-export <3.5.3 lets attackers write files as Node.js user via crafted archives. Upgrade to 3.5.3+ and restrict permissions now! Details: radar.offseq.com/threat/cve-20

##

offseq at 2026-03-19T00:00:39.024Z ##

🚨 CRITICAL: CVE-2026-32731 in ApostropheCMS import-export (<3.5.3) allows path traversal via crafted .tar.gz uploads — attackers can write files anywhere the Node.js process can. Upgrade to 3.5.3+ ASAP! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-18T23:19:42.000Z ##

🔴 CVE-2026-32731 - Critical (9.9)

ApostropheCMS is an open-source content management framework. Prior to version 3.5.3 of `@apostrophecms/import-export`,
The `extract()` function in `gzip.js` constructs file-write paths using `fs.createWriteStream(path.join(exportPath, header.name...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-19T02:00:32.000Z ##

🔎 CVE-2026-32731 (CRITICAL, CVSS 10): Path traversal in ApostropheCMS import-export <3.5.3 lets attackers write files as Node.js user via crafted archives. Upgrade to 3.5.3+ and restrict permissions now! Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202632731 #infosec #cms

##

offseq@infosec.exchange at 2026-03-19T00:00:39.000Z ##

🚨 CRITICAL: CVE-2026-32731 in ApostropheCMS import-export (<3.5.3) allows path traversal via crafted .tar.gz uploads — attackers can write files anywhere the Node.js process can. Upgrade to 3.5.3+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CVE202632731 #ApostropheCMS #infosec

##

thehackerwire@mastodon.social at 2026-03-18T23:19:42.000Z ##

🔴 CVE-2026-32731 - Critical (9.9)

ApostropheCMS is an open-source content management framework. Prior to version 3.5.3 of `@apostrophecms/import-export`,
The `extract()` function in `gzip.js` constructs file-write paths using `fs.createWriteStream(path.join(exportPath, header.name...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32730
(8.1 HIGH)

EPSS: 0.06%

updated 2026-03-18T19:48:52

2 posts

# MFA/TOTP Bypass via Incorrect MongoDB Query in Bearer Token Middleware ## Summary The bearer token authentication middleware in `@apostrophecms/express/index.js` (lines 386-389) contains an incorrect MongoDB query that allows incomplete login tokens — where the password was verified but TOTP/MFA requirements were NOT — to be used as fully authenticated bearer tokens. This completely bypasses m

thehackerwire@mastodon.social at 2026-03-18T23:19:33.000Z ##

🟠 CVE-2026-32730 - High (8.1)

ApostropheCMS is an open-source content management framework. Prior to version 4.28.0, the bearer token authentication middleware in `@apostrophecms/express/index.js` (lines 386-389) contains an incorrect MongoDB query that allows incomplete login...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T23:19:33.000Z ##

🟠 CVE-2026-32730 - High (8.1)

ApostropheCMS is an open-source content management framework. Prior to version 4.28.0, the bearer token authentication middleware in `@apostrophecms/express/index.js` (lines 386-389) contains an incorrect MongoDB query that allows incomplete login...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2991
(9.8 CRITICAL)

EPSS: 0.16%

updated 2026-03-18T18:31:24

1 posts

The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 4.1.2. This is due to the `patientSocialLogin()` function not verifying the social provider access token before authenticating a user. This makes it possible for unauthenticated attackers to log in as any patient registered on the system by provi

1 repos

https://github.com/joshuavanderpoll/CVE-2026-2991

thehackerwire@mastodon.social at 2026-03-18T17:28:27.000Z ##

🔴 CVE-2026-2991 - Critical (9.8)

The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 4.1.2. This is due to the `patientSocialLogin()` function not verifying the social provider...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1463
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-18T18:31:17

1 posts

The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.0.3 via the 'template' parameter in gallery shortcodes. This makes it possible for authenticated attackers, with Author-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PH

thehackerwire@mastodon.social at 2026-03-18T17:28:18.000Z ##

🟠 CVE-2026-1463 - High (8.8)

The Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.0.3 via the 'template' parameter in gallery shortcodes. This makes it possible f...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24063
(8.3 HIGH)

EPSS: 0.01%

updated 2026-03-18T18:31:16

2 posts

When a plugin is installed using the Arturia Software Center (MacOS), it also installs an uninstall.sh bash script in a root owned path. This script is written to disk with the file permissions 777, meaning it is writable by any user. When uninstalling a plugin via the Arturia Software Center the Privileged Helper gets instructed to execute this script. When the bash script is manipulated by an at

thehackerwire@mastodon.social at 2026-03-18T19:30:50.000Z ##

🟠 CVE-2026-24063 - High (8.2)

When a plugin is installed using the Arturia Software Center (MacOS), it also installs an uninstall.sh bash script in a root owned path. This script is written to disk with the file permissions 777, meaning it is writable by any user. When uninsta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T19:30:50.000Z ##

🟠 CVE-2026-24063 - High (8.2)

When a plugin is installed using the Arturia Software Center (MacOS), it also installs an uninstall.sh bash script in a root owned path. This script is written to disk with the file permissions 777, meaning it is writable by any user. When uninsta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28779
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-18T16:32:55

1 posts

Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url. This allows any application co-hosted under the same domain to capture valid Airflow session tokens from HTTP request headers, allowing full session takeover without attacking Airflow itself. Users are recommended to upgrade to Apache

thehackerwire@mastodon.social at 2026-03-17T21:02:41.000Z ##

🟠 CVE-2026-28779 - High (7.5)

Apache Airflow versions 3.1.0 through 3.1.7 session token (_token) in cookies is set to path=/ regardless of the configured [webserver] base_url or [api] base_url.
This allows any application co-hosted under the same domain to capture valid Airfl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4208(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-03-18T16:17:26

1 posts

The extension fails to properly reset the generated MFA code after successful authentication. This leads to a possible MFA bypass for future login attempts by providing an empty string as MFA code to the extensions MFA provider.

offseq@infosec.exchange at 2026-03-17T10:30:29.000Z ##

⚠️ HIGH severity: CVE-2026-4208 in TYPO3 "E-Mail MFA Provider" lets attackers bypass MFA by reusing/omitting codes due to faulty state reset. Patch or disable the extension and monitor logs for abuse. radar.offseq.com/threat/cve-20 #OffSeq #TYPO3 #MFA #Vuln

##

CVE-2026-22729
(8.6 HIGH)

EPSS: 0.05%

updated 2026-03-18T16:16:25.990000

4 posts

A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConverter allows authenticated users to bypass metadata-based access controls through crafted filter expressions. User-controlled input passed to FilterExpressionBuilder is concatenated into JSONPath queries without proper escaping, enabling attackers to inject arbitrary JSONPath logic and access unauthorized documents. Thi

_r_netsec at 2026-03-19T12:43:05.102Z ##

CVE-2026-22729: JSONPath Injection in Spring AI’s PgVectorStore blog.securelayer7.net/cve-2026

##

_r_netsec@infosec.exchange at 2026-03-19T12:43:05.000Z ##

CVE-2026-22729: JSONPath Injection in Spring AI’s PgVectorStore blog.securelayer7.net/cve-2026

##

thehackerwire@mastodon.social at 2026-03-18T10:00:27.000Z ##

🟠 CVE-2026-22729 - High (8.6)

A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConverter allows authenticated users to bypass metadata-based access controls through crafted filter expressions. User-controlled input passed to FilterExpressionBuilder is ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-18T09:00:31.000Z ##

🔒 HIGH: CVE-2026-22729 in VMware Spring AI (1.0.x, 1.1.x) enables JSONPath injection, letting authenticated users bypass access controls and access sensitive docs. Patch or sanitize input! radar.offseq.com/threat/cve-20 #OffSeq #SpringAI #CVE202622729 #AppSec

##

CVE-2026-4258
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-18T16:10:10

2 posts

All versions of the package sjcl are vulnerable to Improper Verification of Cryptographic Signature due to missing point-on-curve validation in sjcl.ecc.basicKey.publicKey(). An attacker can recover a victim's ECDH private key by sending crafted off-curve public keys and observing ECDH outputs. The dhJavaEc() function directly returns the raw x-coordinate of the scalar multiplication result (no ha

thehackerwire@mastodon.social at 2026-03-17T22:15:58.000Z ##

🟠 CVE-2026-4258 - High (7.5)

All versions of the package sjcl are vulnerable to Improper Verification of Cryptographic Signature due to missing point-on-curve validation in sjcl.ecc.basicKey.publicKey(). An attacker can recover a victim's ECDH private key by sending crafted o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-17T07:30:29.000Z ##

🚨 CVE-2026-4258 (HIGH): All sjcl versions affected by lack of public key validation could let remote attackers recover ECDH private keys. No patch yet — audit sjcl use, validate keys, avoid dhJavaEc()! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #sjcl #Cryptography #Infosec

##

CVE-2026-21994
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-18T15:30:46

1 posts

Vulnerability in the Oracle Edge Cloud Infrastructure Designer and Visualisation Toolkit product of Oracle Open Source Projects (component: Desktop). The supported version that is affected is 0.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Edge Cloud Infrastructure Designer and Visualisation Toolkit. Successful attacks of

1 repos

https://github.com/TEXploited/CVE-2026-21994

thehackerwire@mastodon.social at 2026-03-17T23:32:22.000Z ##

🔴 CVE-2026-21994 - Critical (9.8)

Vulnerability in the Oracle Edge Cloud Infrastructure Designer and Visualisation Toolkit product of Oracle Open Source Projects (component: Desktop). The supported version that is affected is 0.3.0. Easily exploitable vulnerability allows unauth...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32746
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-18T15:30:44

9 posts

telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.

1 repos

https://github.com/jeffaf/cve-2026-32746

_r_netsec at 2026-03-19T00:28:05.229Z ##

CVE-2026-32746 GNU telnetd Buffer Overflow PoC - Critical (9.8) pwn.guide/free/other/cve-2026-

##

beyondmachines1 at 2026-03-18T20:01:48.219Z ##

Critical Unpatched Telnetd Flaw Enables Unauthenticated Root Remote Code Execution

GNU InetUtils telnetd contains a critical unpatched buffer overflow (CVE-2026-32746) that allow unauthenticated remote code execution.

**Another critical and trivial flaw in Telnet. Check if you are using Telnet anywhere in your network. It's urgent. Stop using Telnet and switch to SSH. Naturally, as a first step make sure to isolate the Telnet interface to trusted networks. But that's not a good long term approach, Telnet is inherently a lot less secure than SSH.**

beyondmachines.net/event_detai

##

_r_netsec@infosec.exchange at 2026-03-19T00:28:05.000Z ##

CVE-2026-32746 GNU telnetd Buffer Overflow PoC - Critical (9.8) pwn.guide/free/other/cve-2026-

##

beyondmachines1@infosec.exchange at 2026-03-18T20:01:48.000Z ##

Critical Unpatched Telnetd Flaw Enables Unauthenticated Root Remote Code Execution

GNU InetUtils telnetd contains a critical unpatched buffer overflow (CVE-2026-32746) that allow unauthenticated remote code execution.

**Another critical and trivial flaw in Telnet. Check if you are using Telnet anywhere in your network. It's urgent. Stop using Telnet and switch to SSH. Naturally, as a first step make sure to isolate the Telnet interface to trusted networks. But that's not a good long term approach, Telnet is inherently a lot less secure than SSH.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

linux@activitypub.awakari.com at 2026-03-18T11:40:06.000Z ## A Ghost From the 1990s: How a Decades-Old Telnet Daemon Is Now a Gateway Into Modern Linux Systems A critical buffer overflow in the BSD-derived telnetd daemon (CVE-2026-32746, CVSS 9.8) enables un...

#CybersecurityUpdate #NetSecPro #buffer #overflow #CVE-2026-32746 #inetutils-telnetd #Linux #security #remote #code #execution

Origin | Interest | Match ##

sambowne@infosec.exchange at 2026-03-18T12:50:36.000Z ##

Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE thehackernews.com/2026/03/crit

##

benzogaga33@mamot.fr at 2026-03-18T10:40:04.000Z ##

CVE-2026-32746 : les serveurs Linux menacés par une nouvelle faille Telnet it-connect.fr/cve-2026-32746-l #ActuCybersécurité #Cybersécurité #Vulnérabilité #Linux

##

patrickcmiller@infosec.exchange at 2026-03-18T09:42:00.000Z ##

Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE via Port 23 thehackernews.com/2026/03/crit

##

hackerworkspace@infosec.exchange at 2026-03-18T06:42:05.000Z ##

Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE via Port 23

thehackernews.com/2026/03/crit

Short summary: hackerworkspace.com/article/cr

#cybersecurity #threatintelligence #vulnerability

##

CVE-2026-30707
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-18T14:52:44.227000

2 posts

An issue was discovered in SpeedExam Online Examination System (SaaS) after v.FEV2026. It allows Broken Access Control via the ReviewAnswerDetails ASP.NET PageMethod. Authenticated attackers can bypass client-side restrictions and invoke this method directly to retrieve the full answer key

thehackerwire@mastodon.social at 2026-03-18T20:16:47.000Z ##

🟠 CVE-2026-30707 - High (8.1)

An issue was discovered in SpeedExam Online Examination System (SaaS) after v.FEV2026. It allows Broken Access Control via the ReviewAnswerDetails ASP.NET PageMethod. Authenticated attackers can bypass client-side restrictions and invoke this meth...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T20:16:47.000Z ##

🟠 CVE-2026-30707 - High (8.1)

An issue was discovered in SpeedExam Online Examination System (SaaS) after v.FEV2026. It allows Broken Access Control via the ReviewAnswerDetails ASP.NET PageMethod. Authenticated attackers can bypass client-side restrictions and invoke this meth...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25449
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-18T14:52:44.227000

2 posts

Deserialization of Untrusted Data vulnerability in Shinetheme Traveler allows Object Injection.This issue affects Traveler: from n/a before 3.2.8.1.

thehackerwire@mastodon.social at 2026-03-18T20:00:24.000Z ##

🔴 CVE-2026-25449 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in Shinetheme Traveler allows Object Injection.This issue affects Traveler: from n/a before 3.2.8.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T20:00:24.000Z ##

🔴 CVE-2026-25449 - Critical (9.8)

Deserialization of Untrusted Data vulnerability in Shinetheme Traveler allows Object Injection.This issue affects Traveler: from n/a before 3.2.8.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32692
(7.6 HIGH)

EPSS: 0.03%

updated 2026-03-18T14:52:44.227000

1 posts

An authorization bypass vulnerability in the Vault secrets back-end implementation of Juju versions 3.1.6 through 3.6.18 allows an authenticated unit agent to perform unauthorized updates to secret revisions. With sufficient information, an attacker can poison any existing secret revision within the scope of that Vault secret back-end.

thehackerwire@mastodon.social at 2026-03-18T13:41:15.000Z ##

🟠 CVE-2026-32692 - High (7.6)

An authorization bypass vulnerability in the Vault secrets back-end implementation of Juju versions 3.1.6 through 3.6.18 allows an authenticated unit agent to perform unauthorized updates to secret revisions. With sufficient information, an attack...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31891
(7.7 HIGH)

EPSS: 0.03%

updated 2026-03-18T14:52:44.227000

1 posts

Cockpit is a headless content management system. Any Cockpit CMS instance running version 2.13.4 or earlier with API access enabled is potentially affected by a a SQL Injection vulnerability in the MongoLite Aggregation Optimizer. Any deployment where the `/api/content/aggregate/{model}` endpoint is publicly accessible or reachable by untrusted users may be vulnerable, and attackers in possession

thehackerwire@mastodon.social at 2026-03-18T12:41:01.000Z ##

🟠 CVE-2026-31891 - High (7.7)

Cockpit is a headless content management system. Any Cockpit CMS instance running version 2.13.4 or earlier with API access enabled is potentially affected by a a SQL Injection vulnerability in the MongoLite Aggregation Optimizer. Any deployment w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32256
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-18T14:52:44.227000

1 posts

music-metadata is a metadata parser for audio and video media files. Prior to version 11.12.3, music-metadata's ASF parser (`parseExtensionObject()` in `lib/asf/AsfParser.ts:112-158`) enters an infinite loop when a sub-object inside the ASF Header Extension Object has `objectSize = 0`. Version 11.12.3 fixes the issue.

thehackerwire@mastodon.social at 2026-03-18T12:39:42.000Z ##

🟠 CVE-2026-32256 - High (7.5)

music-metadata is a metadata parser for audio and video media files. Prior to version 11.12.3, music-metadata's ASF parser (`parseExtensionObject()` in `lib/asf/AsfParser.ts:112-158`) enters an infinite loop when a sub-object inside the ASF Header...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22322
(7.1 HIGH)

EPSS: 0.08%

updated 2026-03-18T14:52:44.227000

1 posts

A stored cross‑site scripting (XSS) vulnerability in the Link Aggregation configuration interface allows an unauthenticated remote attacker to create a trunk entry containing malicious HTML/JavaScript code. When the affected page is viewed, the injected script executes in the context of the victim’s browser, enabling unauthorized actions such as interface manipulation. The session cookie is secure

certvde@infosec.exchange at 2026-03-18T07:36:34.000Z ##

#OT #Advisory VDE-2025-104
Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx Firmware

Multiple vulnerabilities have been identified in the FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx firmware prior to version 3.53. One of these (CVE-2026-22317) enables an attacker to execute system commands as root user on the device. Five other vulnerabilities (CVE-2026-22316, CVE-2026-22318, CVE-2026-22319, CVE-2026-22320 and CVE-2026-22321) are related to Denial of Service (DoS) attacks, which partly limit the device's functionality. Another vulnerability (CVE-2026-22322) relates to reflected cross-site scripting in the web-based management of the device. And one vulnerability (CVE-2026-22323) relates to Cross‑Site Request Forgery in the web-based management of the device. All vulnerabilities have been resolved in firmware version 3.53.
#CVE CVE-2026-22317, CVE-2026-22323, CVE-2026-22322, CVE-2026-22320, CVE-2026-22316, CVE-2026-22321, CVE-2026-22319, CVE-2026-22318

certvde.com/en/advisories/vde-

#CSAF phoenixcontact.csaf-tp.certvde

##

CVE-2026-22320
(6.5 MEDIUM)

EPSS: 0.04%

updated 2026-03-18T14:52:44.227000

1 posts

A stack-based buffer overflow in the CLI's TFTP file‑transfer command handling allows a low-privileged attacker with Telnet/SSH access to trigger memory corruption by supplying unexpected or oversized filename input. Exploitation results in the corruption of the internal buffer, causing the CLI and web dashboard to become unavailable and leading to a denial of service.

certvde@infosec.exchange at 2026-03-18T07:36:34.000Z ##

#OT #Advisory VDE-2025-104
Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx Firmware

Multiple vulnerabilities have been identified in the FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx firmware prior to version 3.53. One of these (CVE-2026-22317) enables an attacker to execute system commands as root user on the device. Five other vulnerabilities (CVE-2026-22316, CVE-2026-22318, CVE-2026-22319, CVE-2026-22320 and CVE-2026-22321) are related to Denial of Service (DoS) attacks, which partly limit the device's functionality. Another vulnerability (CVE-2026-22322) relates to reflected cross-site scripting in the web-based management of the device. And one vulnerability (CVE-2026-22323) relates to Cross‑Site Request Forgery in the web-based management of the device. All vulnerabilities have been resolved in firmware version 3.53.
#CVE CVE-2026-22317, CVE-2026-22323, CVE-2026-22322, CVE-2026-22320, CVE-2026-22316, CVE-2026-22321, CVE-2026-22319, CVE-2026-22318

certvde.com/en/advisories/vde-

#CSAF phoenixcontact.csaf-tp.certvde

##

CVE-2026-2092
(7.7 HIGH)

EPSS: 0.07%

updated 2026-03-18T14:52:44.227000

1 posts

A flaw was found in Keycloak. Keycloak's Security Assertion Markup Language (SAML) broker endpoint does not properly validate encrypted assertions when the overall SAML response is not signed. An attacker with a valid signed SAML assertion can exploit this by crafting a malicious SAML response. This allows the attacker to inject an encrypted assertion for an arbitrary principal, leading to unautho

thehackerwire@mastodon.social at 2026-03-18T02:45:15.000Z ##

🟠 CVE-2026-2092 - High (7.7)

A flaw was found in Keycloak. Keycloak's Security Assertion Markup Language (SAML) broker endpoint does not properly validate encrypted assertions when the overall SAML response is not signed. An attacker with a valid signed SAML assertion can exp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4295
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-18T14:52:44.227000

1 posts

Improper trust boundary enforcement in Kiro IDE before version 0.8.0 on all supported platforms might allow a remote unauthenticated threat actor to execute arbitrary code via maliciously crafted project directory files that bypass workspace trust protections when a local user opens the directory. To remediate this issue, users should upgrade to version 0.8.0 or higher.

thehackerwire@mastodon.social at 2026-03-17T20:48:25.000Z ##

🟠 CVE-2026-4295 - High (7.8)

Improper trust boundary enforcement in Kiro IDE before version 0.8.0 on all supported platforms might allow a remote unauthenticated threat actor to execute arbitrary code via maliciously crafted project directory files that bypass workspace trust...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4318
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-18T14:52:44.227000

1 posts

A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formApLbConfig. This manipulation of the argument loadBalanceNameOld causes buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-17T19:58:36.000Z ##

🟠 CVE-2026-4318 - High (8.8)

A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Affected is the function strcpy of the file /goform/formApLbConfig. This manipulation of the argument loadBalanceNameOld causes buffer overflow. The attack can be initiated remot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32298
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-18T14:52:44.227000

3 posts

The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by the 'cfg.lua' script, allowing an authenticated attacker to execute OS-level commands.

thehackerwire@mastodon.social at 2026-03-17T19:01:50.000Z ##

🔴 CVE-2026-32298 - Critical (9.1)

The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by the 'cfg.lua' script, allowing an authenticated attacker to execute OS-level commands.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:59:35.000Z ##

🔴 CVE-2026-32298 - Critical (9.1)

The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by the 'cfg.lua' script, allowing an authenticated attacker to execute OS-level commands.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:58:53.000Z ##

🔴 CVE-2026-32298 - Critical (9.1)

The Angeet ES3 KVM does not properly sanitize user-supplied variables parsed by the 'cfg.lua' script, allowing an authenticated attacker to execute OS-level commands.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30405
(7.5 HIGH)

EPSS: 0.11%

updated 2026-03-18T12:58:46

2 posts

An issue in GoBGP gobgpd v.4.2.0 allows a remote attacker to cause a denial of service via the NEXT_HOP path attribute.

thehackerwire@mastodon.social at 2026-03-18T22:00:23.000Z ##

🟠 CVE-2026-30405 - High (7.5)

An issue in GoBGP gobgpd v.4.2.0 allows a remote attacker to cause a denial of service via the NEXT_HOP path attribute

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T22:00:23.000Z ##

🟠 CVE-2026-30405 - High (7.5)

An issue in GoBGP gobgpd v.4.2.0 allows a remote attacker to cause a denial of service via the NEXT_HOP path attribute

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41258
(8.0 HIGH)

EPSS: 0.03%

updated 2026-03-18T12:32:03

1 posts

LibreChat version 0.8.1-rc2 uses the same JWT secret for the user session mechanism and RAG API which compromises the service-level authentication of the RAG API.

thehackerwire@mastodon.social at 2026-03-18T12:39:33.000Z ##

🟠 CVE-2025-41258 - High (8)

LibreChat version 0.8.1-rc2 uses the same JWT secret for the user session mechanism and RAG API which compromises the service-level authentication of the RAG API.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22321
(5.3 MEDIUM)

EPSS: 0.04%

updated 2026-03-18T09:30:35

1 posts

A stack-based buffer overflow in the device's Telnet/SSH CLI login routine occurs when a unauthenticated attacker send an oversized or unexpected username input. An overflow condition crashes the thread handling the login attempt, forcing the session to close. Because other CLI sessions remain unaffected, the impact is limited to a low‑severity availability disruption.

certvde@infosec.exchange at 2026-03-18T07:36:34.000Z ##

#OT #Advisory VDE-2025-104
Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx Firmware

Multiple vulnerabilities have been identified in the FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx firmware prior to version 3.53. One of these (CVE-2026-22317) enables an attacker to execute system commands as root user on the device. Five other vulnerabilities (CVE-2026-22316, CVE-2026-22318, CVE-2026-22319, CVE-2026-22320 and CVE-2026-22321) are related to Denial of Service (DoS) attacks, which partly limit the device's functionality. Another vulnerability (CVE-2026-22322) relates to reflected cross-site scripting in the web-based management of the device. And one vulnerability (CVE-2026-22323) relates to Cross‑Site Request Forgery in the web-based management of the device. All vulnerabilities have been resolved in firmware version 3.53.
#CVE CVE-2026-22317, CVE-2026-22323, CVE-2026-22322, CVE-2026-22320, CVE-2026-22316, CVE-2026-22321, CVE-2026-22319, CVE-2026-22318

certvde.com/en/advisories/vde-

#CSAF phoenixcontact.csaf-tp.certvde

##

CVE-2026-22318
(4.9 MEDIUM)

EPSS: 0.04%

updated 2026-03-18T09:30:34

1 posts

A stack-based buffer overflow vulnerability in the device's file transfer parameter workflow allows a high-privileged attacker to send oversized POST parameters, causing memory corruption in an internal process, resulting in a DoS attack.

certvde@infosec.exchange at 2026-03-18T07:36:34.000Z ##

#OT #Advisory VDE-2025-104
Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx Firmware

Multiple vulnerabilities have been identified in the FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx firmware prior to version 3.53. One of these (CVE-2026-22317) enables an attacker to execute system commands as root user on the device. Five other vulnerabilities (CVE-2026-22316, CVE-2026-22318, CVE-2026-22319, CVE-2026-22320 and CVE-2026-22321) are related to Denial of Service (DoS) attacks, which partly limit the device's functionality. Another vulnerability (CVE-2026-22322) relates to reflected cross-site scripting in the web-based management of the device. And one vulnerability (CVE-2026-22323) relates to Cross‑Site Request Forgery in the web-based management of the device. All vulnerabilities have been resolved in firmware version 3.53.
#CVE CVE-2026-22317, CVE-2026-22323, CVE-2026-22322, CVE-2026-22320, CVE-2026-22316, CVE-2026-22321, CVE-2026-22319, CVE-2026-22318

certvde.com/en/advisories/vde-

#CSAF phoenixcontact.csaf-tp.certvde

##

CVE-2026-22323
(7.1 HIGH)

EPSS: 0.04%

updated 2026-03-18T09:30:34

1 posts

A CSRF vulnerability in the Link Aggregation configuration interface allows an unauthenticated remote attacker to trick authenticated users into sending unauthorized POST requests to the device by luring them to a malicious webpage. This can silently alter the device’s configuration without the victim’s knowledge or consent. Availability impact was set to low because after a successful attack the

certvde@infosec.exchange at 2026-03-18T07:36:34.000Z ##

#OT #Advisory VDE-2025-104
Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx Firmware

Multiple vulnerabilities have been identified in the FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx firmware prior to version 3.53. One of these (CVE-2026-22317) enables an attacker to execute system commands as root user on the device. Five other vulnerabilities (CVE-2026-22316, CVE-2026-22318, CVE-2026-22319, CVE-2026-22320 and CVE-2026-22321) are related to Denial of Service (DoS) attacks, which partly limit the device's functionality. Another vulnerability (CVE-2026-22322) relates to reflected cross-site scripting in the web-based management of the device. And one vulnerability (CVE-2026-22323) relates to Cross‑Site Request Forgery in the web-based management of the device. All vulnerabilities have been resolved in firmware version 3.53.
#CVE CVE-2026-22317, CVE-2026-22323, CVE-2026-22322, CVE-2026-22320, CVE-2026-22316, CVE-2026-22321, CVE-2026-22319, CVE-2026-22318

certvde.com/en/advisories/vde-

#CSAF phoenixcontact.csaf-tp.certvde

##

CVE-2026-22319
(4.9 MEDIUM)

EPSS: 0.04%

updated 2026-03-18T09:30:34

1 posts

A stack-based buffer overflow in the device's file installation workflow allows a high-privileged attacker to send oversized POST parameters that overflow a fixed-size stack buffer within an internal process, resulting in a DoS attack.

certvde@infosec.exchange at 2026-03-18T07:36:34.000Z ##

#OT #Advisory VDE-2025-104
Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx Firmware

Multiple vulnerabilities have been identified in the FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx firmware prior to version 3.53. One of these (CVE-2026-22317) enables an attacker to execute system commands as root user on the device. Five other vulnerabilities (CVE-2026-22316, CVE-2026-22318, CVE-2026-22319, CVE-2026-22320 and CVE-2026-22321) are related to Denial of Service (DoS) attacks, which partly limit the device's functionality. Another vulnerability (CVE-2026-22322) relates to reflected cross-site scripting in the web-based management of the device. And one vulnerability (CVE-2026-22323) relates to Cross‑Site Request Forgery in the web-based management of the device. All vulnerabilities have been resolved in firmware version 3.53.
#CVE CVE-2026-22317, CVE-2026-22323, CVE-2026-22322, CVE-2026-22320, CVE-2026-22316, CVE-2026-22321, CVE-2026-22319, CVE-2026-22318

certvde.com/en/advisories/vde-

#CSAF phoenixcontact.csaf-tp.certvde

##

CVE-2026-22316
(6.5 MEDIUM)

EPSS: 0.09%

updated 2026-03-18T09:30:34

1 posts

A remote attacker with user privileges for the webUI can use the setting of the TFTP Filename with a POST Request to trigger a stack-based Buffer Overflow, resulting in a DoS attack.

certvde@infosec.exchange at 2026-03-18T07:36:34.000Z ##

#OT #Advisory VDE-2025-104
Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx Firmware

Multiple vulnerabilities have been identified in the FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx firmware prior to version 3.53. One of these (CVE-2026-22317) enables an attacker to execute system commands as root user on the device. Five other vulnerabilities (CVE-2026-22316, CVE-2026-22318, CVE-2026-22319, CVE-2026-22320 and CVE-2026-22321) are related to Denial of Service (DoS) attacks, which partly limit the device's functionality. Another vulnerability (CVE-2026-22322) relates to reflected cross-site scripting in the web-based management of the device. And one vulnerability (CVE-2026-22323) relates to Cross‑Site Request Forgery in the web-based management of the device. All vulnerabilities have been resolved in firmware version 3.53.
#CVE CVE-2026-22317, CVE-2026-22323, CVE-2026-22322, CVE-2026-22320, CVE-2026-22316, CVE-2026-22321, CVE-2026-22319, CVE-2026-22318

certvde.com/en/advisories/vde-

#CSAF phoenixcontact.csaf-tp.certvde

##

CVE-2026-22317
(7.2 HIGH)

EPSS: 0.06%

updated 2026-03-18T09:30:28

1 posts

A command injection vulnerability in the device’s Root CA certificate transfer workflow allows a high-privileged attacker to send crafted HTTP POST requests that result in arbitrary command execution on the underlying Linux OS with root privileges.

certvde@infosec.exchange at 2026-03-18T07:36:34.000Z ##

#OT #Advisory VDE-2025-104
Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx Firmware

Multiple vulnerabilities have been identified in the FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx firmware prior to version 3.53. One of these (CVE-2026-22317) enables an attacker to execute system commands as root user on the device. Five other vulnerabilities (CVE-2026-22316, CVE-2026-22318, CVE-2026-22319, CVE-2026-22320 and CVE-2026-22321) are related to Denial of Service (DoS) attacks, which partly limit the device's functionality. Another vulnerability (CVE-2026-22322) relates to reflected cross-site scripting in the web-based management of the device. And one vulnerability (CVE-2026-22323) relates to Cross‑Site Request Forgery in the web-based management of the device. All vulnerabilities have been resolved in firmware version 3.53.
#CVE CVE-2026-22317, CVE-2026-22323, CVE-2026-22322, CVE-2026-22320, CVE-2026-22316, CVE-2026-22321, CVE-2026-22319, CVE-2026-22318

certvde.com/en/advisories/vde-

#CSAF phoenixcontact.csaf-tp.certvde

##

CVE-2026-3888
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-18T04:17:30.720000

24 posts

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

2 repos

https://github.com/fevar54/CVE-2026-3888-POC-all-from-the-Qualys-platform.

https://github.com/Many-Hat-Group/Ubuntu-CVE-2026-3888-patcher

AAKL at 2026-03-19T15:02:00.784Z ##

Qualys, posted yesterday: CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root blog.qualys.com/vulnerabilitie

More:

Infosesecurity-Magazine: New Flaw Affecting Ubuntu Enables Local Attackers to Gain Root Access infosecurity-magazine.com/news

##

devuan@toot.community at 2026-03-19T11:31:38.000Z ##

Found yet another high severity #systemd bug in Ubuntu: local root privilege escalation (CVE-2026-3888)

cybersecurity88.com/news/ubunt

Let us wish all #Devuan users a wonderful day out with their family for a merry father's day, instead of shoveling unicorn shit.

##

lobsters@mastodon.social at 2026-03-19T03:40:19.000Z ##

CVE-2026-3888: Snap Flaw, Local Privilege Escalation to Root via @RunxiYu lobste.rs/s/ccys1t #security
blog.qualys.com/vulnerabilitie

##

hn100@social.lansky.name at 2026-03-19T02:25:10.000Z ##

CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root

Link: blog.qualys.com/vulnerabilitie
Discussion: news.ycombinator.com/item?id=4

##

_r_netsec at 2026-03-19T00:43:05.209Z ##

Ubtuntu 24.04+ Snapd Local Privilege Escalation (CVE-2026-3888) blog.qualys.com/vulnerabilitie

##

hn50@social.lansky.name at 2026-03-18T21:10:07.000Z ##

CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root

Link: blog.qualys.com/vulnerabilitie
Discussion: news.ycombinator.com/item?id=4

##

hackernewsdaily@bsd.cafe at 2026-03-18T20:00:08.000Z ##

📰 Today's Top 20 Hacker News Stories (Sorted by Score) 📰
----------------------------------------
🔖 Title: Rob Pike's Rules of Programming (1989)
🔗 URL: cs.unc.edu/~stotts/COMP590-059
👍 Score: [699]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Nightingale – open-source karaoke app that works with any song on your computer
🔗 URL: nightingale.cafe/
👍 Score: [414]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Federal Cyber Experts Called Microsoft's Cloud "A Pile of Shit", yet Approved It
🔗 URL: propublica.org/article/microso
👍 Score: [360]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Death to Scroll Fade
🔗 URL: dbushell.com/2026/01/09/death-
👍 Score: [276]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: The pleasures of poor product design
🔗 URL: inconspicuous.info/p/the-pleas
👍 Score: [232]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Write up of my homebrew CPU build
🔗 URL: willwarren.com/2026/03/12/buil
👍 Score: [209]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: AI coding is gambling
🔗 URL: notes.visaint.space/ai-coding-
👍 Score: [196]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Snowflake AI Escapes Sandbox and Executes Malware
🔗 URL: promptarmor.com/resources/snow
👍 Score: [179]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: OpenRocket
🔗 URL: openrocket.info/
👍 Score: [164]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Show HN: Hacker News archive (47M+ items, 11.6GB) as Parquet, updated every 5m
🔗 URL: huggingface.co/datasets/open-i
👍 Score: [148]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Nvidia NemoClaw
🔗 URL: github.com/NVIDIA/NemoClaw
👍 Score: [138]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Celebrating Tony Hoare's mark on computer science
🔗 URL: bertrandmeyer.com/2026/03/16/c
👍 Score: [108]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Machine Payments Protocol (MPP)
🔗 URL: stripe.com/blog/machine-paymen
👍 Score: [98]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Using calculus to do number theory
🔗 URL: hidden-phenomena.com/articles/
👍 Score: [78]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Google Engineers Launch "Sashiko" for Agentic AI Code Review of the Linux Kernel
🔗 URL: phoronix.com/news/Sashiko-Linu
👍 Score: [62]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Wander – A tiny, decentralised tool (just 2 files) to explore the small web
🔗 URL: susam.net/wander/
👍 Score: [56]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: A ngrok-style secure tunnel server written in Rust and Open Source
🔗 URL: github.com/joaoh82/rustunnel
👍 Score: [50]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: 2025 Turing award given for quantum information science
🔗 URL: awards.acm.org/about/2025-turi
👍 Score: [48]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: Wanter – A tiny, decentralised tool to explore the small web
🔗 URL: susam.net/wander/
👍 Score: [44]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------
🔖 Title: CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root
🔗 URL: blog.qualys.com/vulnerabilitie
👍 Score: [33]
💬 Discussion: news.ycombinator.com/item?id=4
----------------------------------------

##

cktodon@mas.to at 2026-03-18T19:00:10.000Z ##

CVE-2026-3888 en #Ubuntu: escalada a root aprovechando snap-confine y la limpieza de systemd-tmpfiles

unaaldia.hispasec.com/2026/03/

##

hackerworkspace at 2026-03-18T18:50:08.265Z ##

Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit

thehackernews.com/2026/03/ubun

Short summary: hackerworkspace.com/article/ub

##

domdel@mastodon.social at 2026-03-18T18:19:58.000Z ##

Alerte pour les bubuntuistes:
thehackernews.com/2026/03/ubun

##

AAKL@infosec.exchange at 2026-03-19T15:02:00.000Z ##

Qualys, posted yesterday: CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root blog.qualys.com/vulnerabilitie

More:

Infosesecurity-Magazine: New Flaw Affecting Ubuntu Enables Local Attackers to Gain Root Access infosecurity-magazine.com/news #Ubuntu #Linux #infosec #vulnerability

##

devuan@toot.community at 2026-03-19T11:31:38.000Z ##

Found yet another high severity #systemd bug in Ubuntu: local root privilege escalation (CVE-2026-3888)

cybersecurity88.com/news/ubunt

Let us wish all #Devuan users a wonderful day out with their family for a merry father's day, instead of shoveling unicorn shit.

##

lobsters@mastodon.social at 2026-03-19T03:40:19.000Z ##

CVE-2026-3888: Snap Flaw, Local Privilege Escalation to Root via @RunxiYu lobste.rs/s/ccys1t #security
blog.qualys.com/vulnerabilitie

##

hn100@social.lansky.name at 2026-03-19T02:25:10.000Z ##

CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root

Link: blog.qualys.com/vulnerabilitie
Discussion: news.ycombinator.com/item?id=4

##

_r_netsec@infosec.exchange at 2026-03-19T00:43:05.000Z ##

Ubtuntu 24.04+ Snapd Local Privilege Escalation (CVE-2026-3888) blog.qualys.com/vulnerabilitie

##

hn50@social.lansky.name at 2026-03-18T21:10:07.000Z ##

CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root

Link: blog.qualys.com/vulnerabilitie
Discussion: news.ycombinator.com/item?id=4

##

hackerworkspace@infosec.exchange at 2026-03-18T18:50:08.000Z ##

Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit

thehackernews.com/2026/03/ubun

Short summary: hackerworkspace.com/article/ub

#cybersecurity #vulnerability #exploit

##

threatcodex@infosec.exchange at 2026-03-18T16:25:46.000Z ##

CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root
#CVE_2026_3888
blog.qualys.com/vulnerabilitie

##

youranonnewsirc@nerdculture.de at 2026-03-18T15:56:29.000Z ##

Global tensions heighten as the US-Iran conflict escalates, impacting oil markets via the Strait of Hormuz (March 18). Technology sees continued rapid AI advancement, with OpenAI's GPT-5.4 and Anthropic's Claude Sonnet 4.6 released (March 17). In cybersecurity, the EU sanctioned private cyber offensive groups (March 17), and a critical Ubuntu privilege escalation flaw (CVE-2026-3888) was discovered (March 18). AI-driven threats also increasingly impact M&A security.

#Geopolitics #Cybersecurity #AINews

##

sambowne@infosec.exchange at 2026-03-18T13:02:32.000Z ##

Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit thehackernews.com/2026/03/ubun

##

technadu@infosec.exchange at 2026-03-18T12:58:09.000Z ##

Critical Ubuntu flaw (CVE-2026-3888) enables local root escalation via Snap.

Delayed exploit (10–30 days) makes detection harder.

Patch snapd immediately.
technadu.com/critical-cve-2026

#Cybersecurity #Linux #Ubuntu

##

patrickcmiller@infosec.exchange at 2026-03-18T12:12:00.000Z ##

CVE-2026-3888: Ubuntu Desktop 24.04+ vulnerable to Root exploit securityaffairs.com/189614/sec

##

benzogaga33@mamot.fr at 2026-03-18T10:40:04.000Z ##

CVE-2026-3888 : quand le nettoyage système d’Ubuntu offre un accès root it-connect.fr/cve-2026-3888-qu #ActuCybersécurité #Cybersécurité #Vulnérabilité #Linux

##

thehackerwire@mastodon.social at 2026-03-17T19:58:45.000Z ##

🟠 CVE-2026-3888 - High (7.8)

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LT...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22171(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-03-18T01:25:44

1 posts

## Summary OpenClaw’s Feishu media download flow used untrusted Feishu media keys (`imageKey` / `fileKey`) when building temporary file paths in `extensions/feishu/src/media.ts`. Because those keys were interpolated directly into temp-file paths, traversal segments could escape the temp directory and redirect writes outside `os.tmpdir()`. ## Impact This is an arbitrary file write issue (within

thehackerwire@mastodon.social at 2026-03-18T12:41:53.000Z ##

🟠 CVE-2026-22171 - High (8.2)

OpenClaw versions prior to 2026.2.19 contain a path traversal vulnerability in the Feishu media download flow where untrusted media keys are interpolated directly into temporary file paths in extensions/feishu/src/media.ts. An attacker who can con...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32841
(8.1 HIGH)

EPSS: 0.09%

updated 2026-03-18T00:30:59

2 posts

Edimax GS-5008PL firmware version 1.00.54 and prior contain an authentication bypass vulnerability that allows unauthenticated attackers to access the management interface. Attackers can exploit the global authentication flag mechanism to gain administrative access without credentials after any user authenticates, enabling unauthorized password changes, firmware uploads, and configuration modifica

offseq@infosec.exchange at 2026-03-18T00:00:38.000Z ##

⚠️ CRITICAL: Edimax GS-5008PL (≤1.00.54) has an auth bypass flaw (CVE-2026-32841). Attackers can gain admin access with no creds after any login. Isolate devices, restrict access, monitor logs — patch ASAP when available. radar.offseq.com/threat/cve-20 #OffSeq #CVE202632841 #IoTSecurity

##

thehackerwire@mastodon.social at 2026-03-17T22:31:40.000Z ##

🟠 CVE-2026-32841 - High (8.1)

Edimax GS-5008PL firmware version 1.00.54 and prior contain an authentication bypass vulnerability that allows unauthenticated attackers to access the management interface. Attackers can exploit the global authentication flag mechanism to gain adm...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22727
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-18T00:30:59

1 posts

Unprotected internal endpoints in Cloud Foundry Capi Release 1.226.0 and below, and CF Deployment v54.9.0 and below on all platforms allows any user who has bypassed the firewall to potentially replace droplets and therefore applications allowing them to access secure application information.

thehackerwire@mastodon.social at 2026-03-17T23:32:31.000Z ##

🟠 CVE-2026-22727 - High (7.5)

Unprotected internal endpoints in Cloud Foundry Capi Release 1.226.0 and below, and CF Deployment v54.9.0 and below on all platforms allows any user who has bypassed the firewall to potentially replace droplets and therefore applications allowing ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1376
(7.5 HIGH)

EPSS: 0.17%

updated 2026-03-18T00:30:59

1 posts

IBM i 7.6 could allow a remote attacker to cause a denial of service using failed authentication connections due to improper allocation of resources.

thehackerwire@mastodon.social at 2026-03-17T22:31:49.000Z ##

🟠 CVE-2026-1376 - High (7.5)

IBM i 7.6 could allow a remote attacker to cause a denial of service using failed authentication connections due to improper allocation of resources.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32981
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-17T21:31:53

1 posts

A path traversal vulnerability was identified in Ray Dashboard (default port 8265) in Ray versions prior to 2.8.1. Due to improper validation and sanitization of user-supplied paths in the static file handling mechanism, an attacker can use traversal sequences (e.g., ../) to access files outside the intended static directory, resulting in local file disclosure.

thehackerwire@mastodon.social at 2026-03-17T20:24:21.000Z ##

🟠 CVE-2026-32981 - High (7.5)

A path traversal vulnerability was identified in Ray Dashboard (default port 8265) in Ray versions prior to 2.8.1. Due to improper validation and sanitization of user-supplied paths in the static file handling mechanism, an attacker can use traver...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2921
(7.8 HIGH)

EPSS: 0.07%

updated 2026-03-17T18:59:00.343000

1 posts

GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of palette data in AVI files. The i

thehackerwire@mastodon.social at 2026-03-16T20:00:42.000Z ##

🟠 CVE-2026-2921 - High (7.8)

GStreamer RIFF Palette Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vul...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30881
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-17T18:52:41.947000

1 posts

Chamilo LMS is a learning management system. Version 1.11.34 and prior contains a SQL Injection vulnerability in the statistics AJAX endpoint. The parameters date_start and date_end from $_REQUEST are embedded directly into a raw SQL string without proper sanitization. Although Database::escape_string() is called downstream, its output is immediately neutralized by str_replace("\'", "'", ...), whi

thehackerwire@mastodon.social at 2026-03-16T20:17:25.000Z ##

🟠 CVE-2026-30881 - High (8.8)

Chamilo LMS is a learning management system. Version 1.11.34 and prior contains a SQL Injection vulnerability in the statistics AJAX endpoint. The parameters date_start and date_end from $_REQUEST are embedded directly into a raw SQL string withou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4276
(7.5 HIGH)

EPSS: 0.06%

updated 2026-03-17T18:31:38

2 posts

LibreChat RAG API, version 0.7.0, contains a log-injection vulnerability that allows attackers to forge log entries.

thehackerwire@mastodon.social at 2026-03-18T22:00:33.000Z ##

🟠 CVE-2026-4276 - High (7.5)

LibreChat RAG API, version 0.7.0, contains a log-injection vulnerability that allows attackers to forge log entries.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T22:00:33.000Z ##

🟠 CVE-2026-4276 - High (7.5)

LibreChat RAG API, version 0.7.0, contains a log-injection vulnerability that allows attackers to forge log entries.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2673
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-17T18:31:38

1 posts

Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the 'DEFAULT' keyword. Impact summary: A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client's initial predicated

CVE-2026-32297
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-17T18:30:42

4 posts

The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an attacker to take complete control of a vulnerable system.

offseq@infosec.exchange at 2026-03-18T03:00:27.000Z ##

🚨 CVE-2026-32297 (CRITICAL, CVSS 9.3): ANGEET ES3 KVM allows unauthenticated remote file writes — attackers can take full control. Isolate & restrict access immediately. No patch yet. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202632297 #KVM #Vuln #Infosec

##

thehackerwire@mastodon.social at 2026-03-17T19:01:41.000Z ##

🟠 CVE-2026-32297 - High (7.5)

The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an attacker to take complete control of a vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:59:26.000Z ##

🟠 CVE-2026-32297 - High (7.5)

The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an attacker to take complete control of a vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:58:43.000Z ##

🟠 CVE-2026-32297 - High (7.5)

The Angeet ES3 KVM allows a remote, unauthenticated attacker to write arbitrary files, including configuration files or system binaries. Modified configuration files or system binaries could allow an attacker to take complete control of a vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32296
(8.2 HIGH)

EPSS: 0.05%

updated 2026-03-17T18:30:42

5 posts

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a request to exhaust the system memory and terminate the KVM process.

thehackerwire@mastodon.social at 2026-03-17T22:01:18.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T21:02:23.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:58:06.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:59:44.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T18:59:13.000Z ##

🟠 CVE-2026-32296 - High (8.2)

Sipeed NanoKVM before 2.3.1 exposes a Wi-Fi configuration endpoint without proper security checks, allowing an unauthenticated attacker with network access to change the saved configured Wi-Fi network to one of the attacker's choosing, or craft a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32295
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-17T18:30:42

1 posts

JetKVM before 0.5.4 does not rate limit login requests, enabling brute-force attempts to guess credentials.

thehackerwire@mastodon.social at 2026-03-17T18:59:03.000Z ##

🟠 CVE-2026-32295 - High (7.5)

JetKVM before 0.5.4 does not rate limit login requests, enabling brute-force attempts to guess credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4148
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-17T18:30:38

2 posts

A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.

thehackerwire@mastodon.social at 2026-03-17T21:02:31.000Z ##

🟠 CVE-2026-4148 - High (8.8)

A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:58:16.000Z ##

🟠 CVE-2026-4148 - High (8.8)

A use-after-free vulnerability can be triggered in sharded clusters by an authenticated user with the read role who issues a specially crafted $lookup or $graphLookup aggregation pipeline.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32292
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-17T18:30:37

2 posts

The GL-iNet Comet (GL-RM1) KVM web interface does not limit login requests, enabling brute-force attempts to guess credentials.

offseq@infosec.exchange at 2026-03-18T07:30:28.000Z ##

⚠️ CVE-2026-32292: CRITICAL vuln in GL-iNet Comet KVM (CVSS 9.3) — web UI lacks brute-force protections. No patch yet. Restrict access, use strong creds, monitor logs! Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Cybersecurity #BruteForce

##

thehackerwire@mastodon.social at 2026-03-17T18:58:54.000Z ##

🟠 CVE-2026-32292 - High (7.5)

The GL-iNet Comet (GL-RM1) KVM web interface does not limit login requests, enabling brute-force attempts to guess credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30911
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-17T17:32:57.580000

2 posts

Apache Airflow versions 3.1.0 through 3.1.7 missing authorization vulnerability in the Execution API's Human-in-the-Loop (HITL) endpoints that allows any authenticated task instance to read, approve, or reject HITL workflows belonging to any other task instance. Users are recommended to upgrade to Apache Airflow 3.1.8 or later, which resolves this issue.

thehackerwire@mastodon.social at 2026-03-17T22:01:36.000Z ##

🟠 CVE-2026-30911 - High (8.1)

Apache Airflow versions 3.1.0 through 3.1.7 missing authorization vulnerability in the Execution API's Human-in-the-Loop (HITL) endpoints that allows any authenticated task instance to read, approve, or reject HITL workflows belonging to any other...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T21:02:43.000Z ##

🟠 CVE-2026-30911 - High (8.1)

Apache Airflow versions 3.1.0 through 3.1.7 missing authorization vulnerability in the Execution API's Human-in-the-Loop (HITL) endpoints that allows any authenticated task instance to read, approve, or reject HITL workflows belonging to any other...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31938
(9.6 CRITICAL)

EPSS: 0.04%

updated 2026-03-17T17:08:01

2 posts

### Impact User control of the `options` argument of the `output` function allows attackers to inject arbitrary HTML (such as scripts) into the browser context the created PDF is opened in. The affected overloads and options are: * `"pdfobjectnewwindow"`: the `pdfObjectUrl` option and the entire options object, which is JSON-serialized and included verbatim in the generated HTML-string. * `"pdfj

thehackerwire@mastodon.social at 2026-03-18T12:39:51.000Z ##

🔴 CVE-2026-31938 - Critical (9.6)

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of the `options` argument of the `output` function allows attackers to inject arbitrary HTML (such as scripts) into the browser context the created PDF is open...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-18T04:30:27.000Z ##

⚠️ CRITICAL XSS (CVE-2026-31938) in parallax jsPDF <4.2.1 allows attackers to inject scripts via PDF options — exploited when victims open crafted PDFs. Upgrade to 4.2.1+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #XSS #jsPDF #Infosec

##

CVE-2026-31898
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-17T17:07:52

1 posts

### Impact User control of arguments of the `createAnnotation` method allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to the following method, a user can inject arbitrary PDF objects, such as JavaScript actions, which might trigger when the PDF is opened or interacted with.. * `createAnnotation`: `color` parameter Exa

1 repos

https://github.com/CryptoGhost1/MangoPunch-CVE-2022-31898

thehackerwire@mastodon.social at 2026-03-18T12:40:51.000Z ##

🟠 CVE-2026-31898 - High (8.1)

jsPDF is a library to generate PDFs in JavaScript. Prior to version 4.2.1, user control of arguments of the `createAnnotation` method allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsani...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30922
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-17T16:17:33

1 posts

### Summary The `pyasn1` library is vulnerable to a Denial of Service (DoS) attack caused by uncontrolled recursion when decoding ASN.1 data with deeply nested structures. An attacker can supply a crafted payload containing nested `SEQUENCE` (`0x30`) or `SET` (`0x31`) tags with Indefinite Length (`0x80`) markers. This forces the decoder to recursively call itself until the Python interpreter crash

thehackerwire@mastodon.social at 2026-03-18T12:41:34.000Z ##

🟠 CVE-2026-30922 - High (7.5)

pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.3, the `pyasn1` library is vulnerable to a Denial of Service (DoS) attack caused by uncontrolled recursion when decoding ASN.1 data with deeply nested structures. An attacker can supply a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27979(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-03-17T16:16:52

2 posts

## Summary A request containing the `next-resume: 1` header (corresponding with a PPR resume request) would buffer request bodies without consistently enforcing `maxPostponedStateSize` in certain setups. The previous mitigation protected minimal-mode deployments, but equivalent non-minimal deployments remained vulnerable to the same unbounded postponed resume-body buffering behavior. ## Impact In

thehackerwire@mastodon.social at 2026-03-18T20:16:27.000Z ##

🟠 CVE-2026-27979 - High (7.5)

Next.js is a React framework for building full-stack web applications. Starting in version 16.0.1 and prior to version 16.1.7, a request containing the `next-resume: 1` header (corresponding with a PPR resume request) would buffer request bodies w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T20:16:27.000Z ##

🟠 CVE-2026-27979 - High (7.5)

Next.js is a React framework for building full-stack web applications. Starting in version 16.0.1 and prior to version 16.1.7, a request containing the `next-resume: 1` header (corresponding with a PPR resume request) would buffer request bodies w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15576
(7.5 HIGH)

EPSS: 0.01%

updated 2026-03-17T15:54:59.197000

1 posts

If two sibling jails are restricted to separate filesystem trees, which is to say that neither of the two jail root directories is an ancestor of the other, jailed processes may nonetheless be able to access a shared directory via a nullfs mount, if the administrator has configured one. In this case, cooperating processes in the two jails may establish a connection using a unix domain socket and

ricardo@bsd.cafe at 2026-03-18T07:01:01.000Z ##

Jail chroot escape via fd exchange with a different jail
CVE-2025-15576

"Note that in order to exploit this problem, an attacker requires control over processes in two jails which share a nullfs mount in which a unix socket can be installed."

freebsd.org/security/advisorie

#freebsd #jails #security

##

CVE-2026-28519
(8.8 HIGH)

EPSS: 0.01%

updated 2026-03-17T15:38:55.280000

1 posts

arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap buffer, potentially allowing execution of arbitrary code on affected embedded devices.

thehackerwire@mastodon.social at 2026-03-16T20:51:26.000Z ##

🟠 CVE-2026-28519 - High (8.8)

arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-50881
(8.8 HIGH)

EPSS: 0.20%

updated 2026-03-17T15:37:26

2 posts

The `flow/admin/moniteur.php` script in Use It Flow administration website before 10.0.0 is vulnerable to Remote Code Execution. When handling GET requests, the script takes user-supplied input from the `action` URL parameter, performs insufficient validation, and incorporates this input into a string that is subsequently executed by the `eval()` function. Although a `method_exists()` check is per

1 repos

https://github.com/0xdeadbit/CVE-2025-50881

thehackerwire@mastodon.social at 2026-03-18T21:00:39.000Z ##

🟠 CVE-2025-50881 - High (8.8)

The `flow/admin/moniteur.php` script in Use It Flow administration website before 10.0.0 is vulnerable to Remote Code Execution. When handling GET requests, the script takes user-supplied input from the `action` URL parameter, performs insufficien...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T21:00:39.000Z ##

🟠 CVE-2025-50881 - High (8.8)

The `flow/admin/moniteur.php` script in Use It Flow administration website before 10.0.0 is vulnerable to Remote Code Execution. When handling GET requests, the script takes user-supplied input from the `action` URL parameter, performs insufficien...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4177
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-03-17T15:37:26

2 posts

YAML::Syck versions through 1.36 for Perl has several potential security vulnerabilities including a high-severity heap buffer overflow in the YAML emitter. The heap overflow occurs when class names exceed the initial 512-byte allocation. The base64 decoder could read past the buffer end on trailing newlines. strtok mutated n->type_id in place, corrupting shared node data. A memory leak occurr

thehackerwire@mastodon.social at 2026-03-18T21:00:18.000Z ##

🔴 CVE-2026-4177 - Critical (9.1)

YAML::Syck versions through 1.36 for Perl has several potential security vulnerabilities including a high-severity heap buffer overflow in the YAML emitter.

The heap overflow occurs when class names exceed the initial 512-byte allocation.

The ba...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T21:00:18.000Z ##

🔴 CVE-2026-4177 - Critical (9.1)

YAML::Syck versions through 1.36 for Perl has several potential security vulnerabilities including a high-severity heap buffer overflow in the YAML emitter.

The heap overflow occurs when class names exceed the initial 512-byte allocation.

The ba...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3564
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-03-17T15:36:34

1 posts

A condition in ScreenConnect may allow an actor with access to server-level cryptographic material used for authentication to obtain unauthorized access, including elevated privileges, in certain scenarios.

thehackerwire@mastodon.social at 2026-03-17T19:58:27.000Z ##

🔴 CVE-2026-3564 - Critical (9)

A condition in ScreenConnect may allow an actor with access to server-level cryptographic material used for authentication to obtain unauthorized access, including elevated privileges, in certain scenarios.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69902
(9.8 CRITICAL)

EPSS: 0.26%

updated 2026-03-17T15:36:22

2 posts

A command injection vulnerability in the minimal_wrapper.py component of kubectl-mcp-server v1.2.0 allows attackers to execute arbitrary commands via injecting arbitrary shell metacharacters.

thehackerwire@mastodon.social at 2026-03-18T21:00:28.000Z ##

🔴 CVE-2025-69902 - Critical (9.8)

A command injection vulnerability in the minimal_wrapper.py component of kubectl-mcp-server v1.2.0 allows attackers to execute arbitrary commands via injecting arbitrary shell metacharacters.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T21:00:28.000Z ##

🔴 CVE-2025-69902 - Critical (9.8)

A command injection vulnerability in the minimal_wrapper.py component of kubectl-mcp-server v1.2.0 allows attackers to execute arbitrary commands via injecting arbitrary shell metacharacters.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32267(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-03-17T15:23:52

3 posts

### Summary A low-privilege user (or an unauthenticated user who has been sent a shared URL) can escalate their privileges to admin by abusing `UsersController->actionImpersonateWithToken`. Affected users should update to Craft 4.17.6 and 5.9.12 to mitigate the issue. ### Details This vulnerability allows any low-privilege user to escalate their privileges and become an admin, or, in extreme cir

thehackerwire@mastodon.social at 2026-03-18T21:45:48.000Z ##

🔴 CVE-2026-32267 - Critical (9.8)

Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.6 and from version 5.0.0-RC1 to before version 5.9.12, a low-privilege user (or an unauthenticated user who has been sent a shared URL) can escalate thei...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T21:45:48.000Z ##

🔴 CVE-2026-32267 - Critical (9.8)

Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.6 and from version 5.0.0-RC1 to before version 5.9.12, a low-privilege user (or an unauthenticated user who has been sent a shared URL) can escalate thei...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-17T01:30:30.000Z ##

🚨 CRITICAL: CVE-2026-32267 in Craft CMS (4.x <4.17.6, 5.x <5.9.12) — incorrect auth allows privilege escalation to admin via shared URLs. Upgrade ASAP! Details: radar.offseq.com/threat/cve-20 #OffSeq #CraftCMS #CVE202632267 #Vulnerability

##

CVE-2025-69783
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-17T14:20:01.670000

2 posts

A local attacker can bypass OpenEDR's 2.5.1.0 self-defense mechanism by renaming a malicious executable to match a trusted process name (e.g., csrss.exe, edrsvc.exe, edrcon.exe). This allows unauthorized interaction with the OpenEDR kernel driver, granting access to privileged functionality such as configuration changes, process monitoring, and IOCTL communication that should be restricted to trus

thehackerwire@mastodon.social at 2026-03-18T22:14:16.000Z ##

🟠 CVE-2025-69783 - High (7.8)

A local attacker can bypass OpenEDR's 2.5.1.0 self-defense mechanism by renaming a malicious executable to match a trusted process name (e.g., csrss.exe, edrsvc.exe, edrcon.exe). This allows unauthorized interaction with the OpenEDR kernel driver,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T22:14:16.000Z ##

🟠 CVE-2025-69783 - High (7.8)

A local attacker can bypass OpenEDR's 2.5.1.0 self-defense mechanism by renaming a malicious executable to match a trusted process name (e.g., csrss.exe, edrsvc.exe, edrcon.exe). This allows unauthorized interaction with the OpenEDR kernel driver,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-66687
(7.5 HIGH)

EPSS: 0.36%

updated 2026-03-17T14:20:01.670000

2 posts

Doom Launcher 3.8.1.0 is vulnerable to Directory Traversal due to missing file path validation during the extraction of game files

thehackerwire@mastodon.social at 2026-03-18T22:00:14.000Z ##

🟠 CVE-2025-66687 - High (7.5)

Doom Launcher 3.8.1.0 is vulnerable to Directory Traversal due to missing file path validation during the extraction of game files

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T22:00:14.000Z ##

🟠 CVE-2025-66687 - High (7.5)

Doom Launcher 3.8.1.0 is vulnerable to Directory Traversal due to missing file path validation during the extraction of game files

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2579
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-17T14:20:01.670000

1 posts

The WowStore – Store Builder & Product Blocks for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the ‘search’ parameter in all versions up to, and including, 4.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into a

thehackerwire@mastodon.social at 2026-03-17T22:16:17.000Z ##

🟠 CVE-2026-2579 - High (7.5)

The WowStore – Store Builder & Product Blocks for WooCommerce plugin for WordPress is vulnerable to SQL Injection via the ‘search’ parameter in all versions up to, and including, 4.4.3 due to insufficient escaping on the user supplied parame...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4252
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-03-17T14:20:01.670000

1 posts

A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue is the function check_is_ipv6 of the component IPv6 Handler. The manipulation leads to reliance on ip address for authentication. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

offseq@infosec.exchange at 2026-03-17T06:00:27.000Z ##

🚩 CRITICAL: CVE-2026-4252 impacts Tenda AC8 (16.03.50.11). IP-based auth in IPv6 Handler lets remote attackers bypass login. Exploit is public. Disable remote mgmt, restrict access, monitor traffic. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE #RouterSecurity #Infosec

##

CVE-2026-4312
(9.8 CRITICAL)

EPSS: 0.13%

updated 2026-03-17T09:31:33

2 posts

GCB/FCB Audit Software developed by DrangSoft has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to directly access certain APIs to create a new administrative account.

thehackerwire@mastodon.social at 2026-03-17T21:02:50.000Z ##

🔴 CVE-2026-4312 - Critical (9.8)

GCB/FCB Audit Software developed by DrangSoft has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to directly access certain APIs to create a new administrative account.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-17T09:00:30.000Z ##

🚨 CVE-2026-4312 (CRITICAL, CVSS 9.3) in DrangSoft GCB/FCB Audit Software: missing auth allows remote admin account creation & full compromise. No patch yet — restrict API access, monitor closely. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #InfoSec

##

CVE-2026-0708
(8.3 HIGH)

EPSS: 0.16%

updated 2026-03-17T06:31:33

1 posts

A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the `ucl_object_emit` function when parsing and emitting the object, leading to a Denial of Service (DoS) for the affected system.

thehackerwire@mastodon.social at 2026-03-17T22:16:08.000Z ##

🟠 CVE-2026-0708 - High (8.3)

A flaw was found in libucl. A remote attacker could exploit this by providing a specially crafted Universal Configuration Language (UCL) input that contains a key with an embedded null byte. This can cause a segmentation fault (SEGV fault) in the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32313
(8.2 HIGH)

EPSS: 0.03%

updated 2026-03-16T22:01:06

1 posts

### Summary XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256-gcm lack validation of the authentication tag length. An attacker can use this to brute-force an authentication tag, recover the [GHASH key](https://en.wikipedia.org/wiki/Galois/Counter_Mode#:~:text=%29%20is%20the-,hash%20key,-%2C%20a%20string%20of), and decrypt the encrypted nodes. It also allows to forge arbitrary c

thehackerwire@mastodon.social at 2026-03-16T19:16:09.000Z ##

🟠 CVE-2026-32313 - High (8.2)

xmlseclibs is a library written in PHP for working with XML Encryption and Signatures. Prior to 3.1.5, XML nodes encrypted with either aes-128-gcm, aes-192-gcm, or aes-256-gcm lack validation of the authentication tag length. An attacker can use t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32640(CVSS UNKNOWN)

EPSS: 0.13%

updated 2026-03-16T22:00:16

2 posts

### Impact If the objects passed in as `names` to SimpleEval have modules or other disallowed / dangerous objects available as attrs. Additionally, dangerous functions or modules could be accessed by passing them as callbacks to other safe functions to call. Examples (found by @ByamB4): Any module where non-underscore attribute chains reach os or sys: - os.path, pathlib, shutil, glob (direct .os

thehackerwire@mastodon.social at 2026-03-18T22:14:25.000Z ##

🔴 CVE-2026-32640 - Critical (9.8)

SimpleEval is a library for adding evaluatable expressions into python projects. Prior to 1.0.5, objects (including modules) can leak dangerous modules through to direct access inside the sandbox. If the objects you've passed in as names to Simple...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T22:14:25.000Z ##

🔴 CVE-2026-32640 - Critical (9.8)

SimpleEval is a library for adding evaluatable expressions into python projects. Prior to 1.0.5, objects (including modules) can leak dangerous modules through to direct access inside the sandbox. If the objects you've passed in as names to Simple...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28498(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-03-16T21:54:15

2 posts

## 1. Executive Summary A critical library-level vulnerability was identified in the **Authlib** Python library concerning the validation of OpenID Connect (OIDC) ID Tokens. Specifically, the internal hash verification logic (`_verify_hash`) responsible for validating the `at_hash` (Access Token Hash) and `c_hash` (Authorization Code Hash) claims exhibits a **fail-open** behavior when encounterin

thehackerwire@mastodon.social at 2026-03-18T21:46:07.000Z ##

🟠 CVE-2026-28498 - High (7.5)

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a library-level vulnerability was identified in the Authlib Python library concerning the validation of OpenID Connect (OIDC) ID Tokens. Specificall...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T21:46:07.000Z ##

🟠 CVE-2026-28498 - High (7.5)

Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a library-level vulnerability was identified in the Authlib Python library concerning the validation of OpenID Connect (OIDC) ID Tokens. Specificall...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69784
(8.8 HIGH)

EPSS: 0.01%

updated 2026-03-16T21:35:35

1 posts

A local, non-privileged attacker can abuse a vulnerable IOCTL interface exposed by the OpenEDR 2.5.1.0 kernel driver to modify the DLL injection path used by the product. By redirecting this path to a user-writable location, an attacker can cause OpenEDR to load an attacker-controlled DLL into high-privilege processes. This results in arbitrary code execution with SYSTEM privileges, leading to ful

thehackerwire@mastodon.social at 2026-03-16T20:00:31.000Z ##

🟠 CVE-2025-69784 - High (8.8)

A local, non-privileged attacker can abuse a vulnerable IOCTL interface exposed by the OpenEDR 2.5.1.0 kernel driver to modify the DLL injection path used by the product. By redirecting this path to a user-writable location, an attacker can cause ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69768
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-16T21:35:34

2 posts

SQL Injection vulnerability in Chyrp v.2.5.2 and before allows a remote attacker to obtain sensitive information via the Admin.php component

thehackerwire@mastodon.social at 2026-03-16T20:45:53.000Z ##

🟠 CVE-2025-69768 - High (7.5)

SQL Injection vulnerability in Chyrp v.2.5.2 and before allows a remote attacker to obtain sensitive information via the Admin.php component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:17:13.000Z ##

🟠 CVE-2025-69768 - High (7.5)

SQL Injection vulnerability in Chyrp v.2.5.2 and before allows a remote attacker to obtain sensitive information via the Admin.php component

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69809
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-16T21:34:38

2 posts

A write-what-where condition in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to write arbitrary values to memory, enabling arbitrary code execution via a crafted packet.

thehackerwire@mastodon.social at 2026-03-16T20:45:43.000Z ##

🔴 CVE-2025-69809 - Critical (9.8)

A write-what-where condition in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to write arbitrary values to memory, enabling arbitrary code execution via a crafted packet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-16T20:17:03.000Z ##

🔴 CVE-2025-69809 - Critical (9.8)

A write-what-where condition in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to write arbitrary values to memory, enabling arbitrary code execution via a crafted packet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69808
(9.1 CRITICAL)

EPSS: 0.07%

updated 2026-03-16T21:34:38

1 posts

An out-of-bounds memory access (OOB) in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to access sensitive information and cause a Denial of Service (DoS) via supplying a crafted packet.

thehackerwire@mastodon.social at 2026-03-16T20:16:54.000Z ##

🔴 CVE-2025-69808 - Critical (9.1)

An out-of-bounds memory access (OOB) in p2r3 Bareiron commit 8e4d40 allows unauthenticated attackers to access sensitive information and cause a Denial of Service (DoS) via supplying a crafted packet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47813
(4.3 MEDIUM)

EPSS: 21.35%

updated 2026-03-16T20:20:49.217000

2 posts

loginok.html in Wing FTP Server before 7.4.4 discloses the full local installation path of the application when using a long value in the UID cookie.

Nuclei template

technadu@infosec.exchange at 2026-03-17T13:49:21.000Z ##

New KEV addition by CISA:
CVE-2025-47813 (Wing FTP Server)
• Information disclosure flaw
• Actively exploited
• High remediation priority
KEV = real-world threat signal.

Source: cisa.gov/news-events/alerts/20

Follow @technadu for updates.

#InfoSec #CISA #VulnerabilityManagement

##

secdb@infosec.exchange at 2026-03-16T20:00:17.000Z ##

🚨 [CISA-2026:0316] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-47813 (secdb.nttzen.cloud/cve/detail/)
- Name: Wing FTP Server Information Disclosure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Wing FTP Server
- Product: Wing FTP Server
- Notes: wftpserver.com/serverhistory.h ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260316 #cisa20260316 #cve_2025_47813 #cve202547813

##

CVE-2026-4254
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-03-16T18:32:15

1 posts

A weakness has been identified in Tenda AC8 up to 16.03.50.11. This vulnerability affects the function doSystemCmd of the file /goform/SysToolChangePwd of the component HTTP Endpoint. This manipulation of the argument local_2c causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.

offseq@infosec.exchange at 2026-03-17T03:02:39.000Z ##

🚨 CRITICAL: CVE-2026-4254 in Tenda AC8 (fw ≤16.03.50.11) enables remote stack buffer overflow via /goform/SysToolChangePwd. Public exploit out — isolate & monitor! No patch yet. radar.offseq.com/threat/cve-20 #OffSeq #CVE20264254 #RouterSecurity #Vuln

##

CVE-2026-32609
(7.5 HIGH)

EPSS: 0.05%

updated 2026-03-16T16:26:55

2 posts

## Summary The GHSA-gh4x fix (commit 5d3de60) addressed unauthenticated configuration secrets exposure on the `/api/v4/config` endpoints by introducing `as_dict_secure()` redaction. However, the `/api/v4/args` and `/api/v4/args/{item}` endpoints were not addressed by this fix. These endpoints return the complete command-line arguments namespace via `vars(self.args)`, which includes the password h

thehackerwire@mastodon.social at 2026-03-18T20:00:14.000Z ##

🟠 CVE-2026-32609 - High (7.5)

Glances is an open-source system cross-platform monitoring tool. The GHSA-gh4x fix (commit 5d3de60) addressed unauthenticated configuration secrets exposure on the `/api/v4/config` endpoints by introducing `as_dict_secure()` redaction. However, th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T20:00:14.000Z ##

🟠 CVE-2026-32609 - High (7.5)

Glances is an open-source system cross-platform monitoring tool. The GHSA-gh4x fix (commit 5d3de60) addressed unauthenticated configuration secrets exposure on the `/api/v4/config` endpoints by introducing `as_dict_secure()` redaction. However, th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32606
(7.7 HIGH)

EPSS: 0.01%

updated 2026-03-16T16:26:01

1 posts

The default configuration of systemd-cryptenroll as used by IncusOS through mkosi allows for an attacker with physical access to the machine to access the encrypted data without requiring any interaction by the system's owner or any tampering of Secure Boot state or kernel (UKI) boot image. That's because in this configuration, the LUKS key is made available by the TPM so long as the system has t

thehackerwire@mastodon.social at 2026-03-18T06:59:22.000Z ##

🟠 CVE-2026-32606 - High (7.6)

IncusOS is an immutable OS image dedicated to running Incus. Prior to 202603142010, the default configuration of systemd-cryptenroll as used by IncusOS through mkosi allows for an attacker with physical access to the machine to access the encrypte...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32596(CVSS UNKNOWN)

EPSS: 0.10%

updated 2026-03-16T16:23:59

2 posts

### Summary Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process command-lines containing credentials (passwords, API keys, tokens) to any network client. ### Details Root Cause: Authentication is optional and disabled by default. When no password is provided, the API router initializes with

Nuclei template

thehackerwire@mastodon.social at 2026-03-18T20:00:34.000Z ##

🟠 CVE-2026-32596 - High (7.5)

Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2, Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process comman...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T20:00:34.000Z ##

🟠 CVE-2026-32596 - High (7.5)

Glances is an open-source system cross-platform monitoring tool. Prior to 4.5.2, Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process comman...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28500
(8.6 HIGH)

EPSS: 0.01%

updated 2026-03-16T16:23:29

1 posts

### Summary A security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification mechanism. While the function is designed to warn users when loading models from non-official sources, the use of the silent=True parameter completely suppresses all security warnings and confirmation prompts. ### The Technical Flaw The vulnerability is located in onnx/hub.py

thehackerwire@mastodon.social at 2026-03-18T02:45:05.000Z ##

🟠 CVE-2026-28500 - High (8.6)

Open Neural Network Exchange (ONNX) is an open standard for machine learning interoperability. In versions up to and including 1.20.1, a security control bypass exists in onnx.hub.load() due to improper logic in the repository trust verification m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29112
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-16T16:15:34

1 posts

### Impact The `ensureSize()` function in `@dicebear/converter` (versions < 9.4.0) read the `width` and `height` attributes from the input SVG to determine the output canvas size for rasterization (PNG, JPEG, WebP, AVIF). An attacker who can supply a crafted SVG with extremely large dimensions (e.g. `width="999999999"`) could force the server to allocate excessive memory, leading to denial of ser

thehackerwire@mastodon.social at 2026-03-18T12:41:44.000Z ##

🟠 CVE-2026-29112 - High (7.5)

DiceBear is an avatar library for designers and developers. Prior to version 9.4.0, the `ensureSize()` function in `@dicebear/converter` read the `width` and `height` attributes from the input SVG to determine the output canvas size for rasterizat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28521
(7.7 HIGH)

EPSS: 0.01%

updated 2026-03-16T15:30:55

1 posts

arduino-TuyaOpen before version 1.2.1 contains an out-of-bounds memory read vulnerability in the TuyaIoT component. An attacker who hijacks or controls the Tuya cloud service can issue malicious DP event data to victim devices, causing out-of-bounds memory access that may result in information disclosure or a denial-of-service condition.

thehackerwire@mastodon.social at 2026-03-16T20:51:45.000Z ##

🟠 CVE-2026-28521 - High (7.7)

arduino-TuyaOpen before version 1.2.1 contains an out-of-bounds memory read vulnerability in the TuyaIoT component. An attacker who hijacks or controls the Tuya cloud service can issue malicious DP event data to victim devices, causing out-of-boun...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28520
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-16T15:30:55

1 posts

arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, the attacker can exploit the overflow to execute arbitrary code on the affected embedded device.

thehackerwire@mastodon.social at 2026-03-16T20:51:35.000Z ##

🟠 CVE-2026-28520 - High (8.4)

arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, the attacker can exploit the overflow to execute...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2493
(7.5 HIGH)

EPSS: 15.24%

updated 2026-03-16T15:30:55

1 posts

IceWarp collaboration Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of IceWarp. Authentication is not required to exploit this vulnerability. The specific flaw exists within handling of the ticket parameter provided to the collaboration endpoint. The issue results from the lack of pr

thehackerwire@mastodon.social at 2026-03-16T20:03:33.000Z ##

🟠 CVE-2026-2493 - High (7.5)

IceWarp collaboration Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of IceWarp. Authentication is not required to exploit this vulne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2920
(7.8 HIGH)

EPSS: 0.06%

updated 2026-03-16T15:30:55

1 posts

GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of stream headers within

thehackerwire@mastodon.social at 2026-03-16T20:03:12.000Z ##

🟠 CVE-2026-2920 - High (7.8)

GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2922
(7.8 HIGH)

EPSS: 0.09%

updated 2026-03-16T15:30:55

1 posts

GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the processing of video packets. The iss

thehackerwire@mastodon.social at 2026-03-16T20:00:51.000Z ##

🟠 CVE-2026-2922 - High (7.8)

GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25534
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-16T15:24:46

2 posts

### Impact Spinnaker updated URL Validation logic on user input to provide sanitation on user inputted URLs for clouddriver. However, they missed that Java URL objects do not correctly handle underscores on parsing. This led to a bypass of the previous CVE (CVE-2025-61916) through the use of carefully crafted URLs. Note, Spinnaker found this not just in that CVE, but in the existing URL validat

offseq@infosec.exchange at 2026-03-18T01:30:28.000Z ##

🚨 CRITICAL: CVE-2026-25534 SSRF in Spinnaker clouddriver-artifacts. Versions <2025.2.4 & select 2025.x allow SSRF via URL validation bypass. Patch to 2025.2.4+, 2025.3.1, 2025.4.1, or 2026.0.0 ASAP! Details: radar.offseq.com/threat/cve-20 #OffSeq #SSRF #Spinnaker

##

thehackerwire@mastodon.social at 2026-03-17T18:59:50.000Z ##

🔴 CVE-2026-25534 - Critical (9.1)

### Impact
Spinnaker updated URL Validation logic on user input to provide sanitation on user inputted URLs for clouddriver. However, they missed that Java URL objects do not correctly handle underscores on parsing. This led to a bypass of the p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2476
(7.6 HIGH)

EPSS: 0.03%

updated 2026-03-16T14:53:07.390000

1 posts

Mattermost Plugins versions <=2.0.3.0 fail to properly mask sensitive configuration values which allows an attacker with access to support packets to obtain original plugin settings via exported configuration data. Mattermost Advisory ID: MMSA-2026-00606

thehackerwire@mastodon.social at 2026-03-16T20:03:22.000Z ##

🟠 CVE-2026-2476 - High (7.6)

Mattermost Plugins versions &lt;=2.0.3.0 fail to properly mask sensitive configuration values which allows an attacker with access to support packets to obtain original plugin settings via exported configuration data. Mattermost Advisory ID: MMSA-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3909
(8.8 HIGH)

EPSS: 33.06%

updated 2026-03-13T21:32:59

2 posts

Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

hackmag@infosec.exchange at 2026-03-17T20:30:02.000Z ##

⚪️ Google Fixes Two 0-Day Vulnerabilities in Chrome

🗨️ Google developers have released an emergency update for the Chrome browser that fixes two zero-day vulnerabilities, which were already being exploited in real-world attacks. “Google is aware that exploits exist for vulnerabilities CVE-2026-3909 and CVE-2026-3910,” according to the security bulletin…

🔗 hackmag.com/news/two-chrome-0d

#news

##

AAKL@infosec.exchange at 2026-03-17T15:19:00.000Z ##

Google posted this yesterday, addressing CVE-2026-3909 and CVE-2026-3910.

Long Term Support Channel Update for ChromeOS chromereleases.googleblog.com/ #Google #Chrome #infosec

##

CVE-2026-3910
(8.8 HIGH)

EPSS: 11.20%

updated 2026-03-13T21:32:01

2 posts

Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

hackmag@infosec.exchange at 2026-03-17T20:30:02.000Z ##

⚪️ Google Fixes Two 0-Day Vulnerabilities in Chrome

🗨️ Google developers have released an emergency update for the Chrome browser that fixes two zero-day vulnerabilities, which were already being exploited in real-world attacks. “Google is aware that exploits exist for vulnerabilities CVE-2026-3909 and CVE-2026-3910,” according to the security bulletin…

🔗 hackmag.com/news/two-chrome-0d

#news

##

AAKL@infosec.exchange at 2026-03-17T15:19:00.000Z ##

Google posted this yesterday, addressing CVE-2026-3909 and CVE-2026-3910.

Long Term Support Channel Update for ChromeOS chromereleases.googleblog.com/ #Google #Chrome #infosec

##

CVE-2026-32136
(9.8 CRITICAL)

EPSS: 0.79%

updated 2026-03-12T14:47:49

1 posts

VULNERABILITY: HTTP/2 Cleartext (h2c) Upgrade Authentication Bypass ======================================================================== Severity:  CRITICAL CVSS 3.1:  9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CWE:       CWE-287 (Improper Authentication) Component: internal/home/web.go Affected:  AdGuardHome (tested on v0.107.72) ---------------------------------------------------------------

CVE-2026-1965
(6.5 MEDIUM)

EPSS: 0.05%

updated 2026-03-12T14:11:19.070000

1 posts

libcurl can in some circumstances reuse the wrong connection when asked to do an Negotiate-authenticated HTTP or HTTPS request. libcurl features a pool of recent connections so that subsequent requests can reuse an existing connection to avoid overhead. When reusing a connection a range of criterion must first be met. Due to a logical error in the code, a request that was issued by an applicatio

linux@activitypub.awakari.com at 2026-03-16T21:13:26.000Z ## Ubuntu 20.04 curl Critical Authentication Issues USN-8099-1 CVE-2026-1965 Several security issues were fixed in curl.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-20128
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-04T21:13:56.113000

1 posts

A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA user privileges on an affected system. To exploit this vulnerability, the attacker must have valid&nbsp;vmanage credentials on the affected system. This vulnerability is due to the presence of a credential file for the DCA user on an affected syste

AAKL@infosec.exchange at 2026-03-18T15:19:48.000Z ##

New advisory from Cisco addressing critical February 25 vulnerabilities:

"There are no workarounds that address these vulnerabilities. Cisco strongly recommends that customers upgrade to the fixed software indicated in this advisory."

CVE-2026-20122; CVE-2026-20126; CVE-2026-20128: Cisco Catalyst SD-WAN Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2026-25554
(6.5 MEDIUM)

EPSS: 0.07%

updated 2026-02-27T19:16:07.717000

2 posts

OpenSIPS versions 3.1 before 3.6.4 containing the auth_jwt module (prior to commit 3822d33) contain a SQL injection vulnerability in the jwt_db_authorize() function in modules/auth_jwt/authorize.c when db_mode is enabled and a SQL database backend is used. The function extracts the tag claim from a JWT without prior signature verification and incorporates the unescaped value directly into a SQL qu

CVE-2026-20122
(5.4 MEDIUM)

EPSS: 0.04%

updated 2026-02-25T18:31:45

1 posts

A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system. This vulnerability is due to improper file handling on the API interface of an affected system. An attacker could ex

AAKL@infosec.exchange at 2026-03-18T15:19:48.000Z ##

New advisory from Cisco addressing critical February 25 vulnerabilities:

"There are no workarounds that address these vulnerabilities. Cisco strongly recommends that customers upgrade to the fixed software indicated in this advisory."

CVE-2026-20122; CVE-2026-20126; CVE-2026-20128: Cisco Catalyst SD-WAN Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2026-20126
(8.8 HIGH)

EPSS: 0.04%

updated 2026-02-25T18:31:44

1 posts

A vulnerability in Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker with low privileges to gain root privileges on the underlying operating system. This vulnerability is due to an insufficient user authentication mechanism in the REST API. An attacker could exploit this vulnerability by sending a request to the REST API of the affected system. A successful exploit could

AAKL@infosec.exchange at 2026-03-18T15:19:48.000Z ##

New advisory from Cisco addressing critical February 25 vulnerabilities:

"There are no workarounds that address these vulnerabilities. Cisco strongly recommends that customers upgrade to the fixed software indicated in this advisory."

CVE-2026-20122; CVE-2026-20126; CVE-2026-20128: Cisco Catalyst SD-WAN Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2026-27205(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-02-23T22:28:06

1 posts

When the `session` object is accessed, Flask should set the `Vary: Cookie` header. This instructs caches not to cache the response, as it may contain information specific to a logged in user. This is handled in most cases, but some forms of access such as the Python `in` operator were overlooked. The severity depends on the application's use of the session, and the cache's behavior regarding cook

linux@activitypub.awakari.com at 2026-03-18T11:27:47.000Z ## Ubuntu Flask Important Info Exposure CVE-2026-27205 USN-8104-1 Flask could be made to expose sensitive information over the network.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-25749
(6.6 MEDIUM)

EPSS: 0.01%

updated 2026-02-20T15:45:19.210000

1 posts

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1

linux@activitypub.awakari.com at 2026-03-18T04:19:55.000Z ## Ubuntu 25.10 Vim Critical Denial Service Fix USN-8101-1 CVE-2026-25749 Several security issues were fixed in Vim.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-32463
(9.3 CRITICAL)

EPSS: 26.52%

updated 2025-11-05T19:26:48.393000

1 posts

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

82 repos

https://github.com/KaiHT-Ladiant/CVE-2025-32463

https://github.com/shazed-x/CVE-2025-32463

https://github.com/FreeDurok/CVE-2025-32463-PoC

https://github.com/gmh5225/Blackash-CVE-2025-32463

https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab

https://github.com/san8383/CVE-2025-32463

https://github.com/0xb0rn3/CVE-2025-32463-EXPLOIT

https://github.com/hacieda/CVE-2025-32463

https://github.com/SpongeBob-369/cve-2025-32463

https://github.com/AC8999/CVE-2025-32463

https://github.com/justjoeyking/CVE-2025-32463

https://github.com/0p5cur/CVE-2025-32463-POC

https://github.com/muhammedkayag/CVE-2025-32463

https://github.com/robbin0919/CVE-2025-32463

https://github.com/danilo1992-sys/CVE-2025-32463

https://github.com/aldoClau98/CVE-2025-32463

https://github.com/MohamedKarrab/CVE-2025-32463

https://github.com/pr0v3rbs/CVE-2025-32463_chwoot

https://github.com/lakshan-sameera/CVE-2025-32462-and-CVE-2025-32463---Critical-Sudo-Vulnerabilities

https://github.com/SysMancer/CVE-2025-32463

https://github.com/Chocapikk/CVE-2025-32463-lab

https://github.com/ricardomaia/CVE-2025-32463

https://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOIT

https://github.com/Ghstxz/CVE-2025-32463

https://github.com/D3ltaFormation/CVE-2025-32463-Sudo-Chroot-Escape

https://github.com/vpr-labs/CVE-2025-32463

https://github.com/yeremeu/CVE-2025-32463_chwoot

https://github.com/pevinkumar10/CVE-2025-32463

https://github.com/ashardev002/CVE-2025-32463_chwoot

https://github.com/K1tt3h/CVE-2025-32463-POC

https://github.com/Maalfer/Sudo-CVE-2021-3156

https://github.com/hackingyseguridad/root

https://github.com/SpycioKon/CVE-2025-32463

https://github.com/toohau/CVE-2025-32462-32463-Detection-Script-

https://github.com/Mr-Alperen/CVE-2025-32463

https://github.com/NewComrade12211/CVE-2025-32463

https://github.com/painoob/CVE-2025-32463

https://github.com/0xAshwesker/CVE-2025-32463

https://github.com/blackcat4347/CVE-2025-32463_PoC

https://github.com/zinzloun/CVE-2025-32463

https://github.com/daryllundy/CVE-2025-32463

https://github.com/robbert1978/CVE-2025-32463_POC

https://github.com/0x00315732/musical-engine

https://github.com/neko205-mx/CVE-2025-32463_Exploit

https://github.com/MGunturG/CVE-2025-32463

https://github.com/dr4x-c0d3r/sudo-chroot

https://github.com/0x3c4dfa1/CVE-2025-32463

https://github.com/khoazero123/CVE-2025-32463

https://github.com/r3dBust3r/CVE-2025-32463

https://github.com/ill-deed/CVE-2025-32463_illdeed

https://github.com/IC3-512/linux-root-kit

https://github.com/Nowafen/CVE-2025-32463

https://github.com/kh4sh3i/CVE-2025-32463

https://github.com/ankitpandey383/CVE-2025-32463-Sudo-Privilege-Escalation

https://github.com/onniio/CVE-2025-32463

https://github.com/y4ney/CVE-2025-32463-lab

https://github.com/harsh1verma/CVE-Analysis

https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC

https://github.com/Mikivirus0/sudoinjection

https://github.com/morgenm/sudo-chroot-CVE-2025-32463

https://github.com/0xAkarii/CVE-2025-32463

https://github.com/dr4xp/sudo-chroot

https://github.com/CIA911/sudo_patch_CVE-2025-32463

https://github.com/Rajneeshkarya/CVE-2025-32463

https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC

https://github.com/mirchr/CVE-2025-32463-sudo-chwoot

https://github.com/12bijaya/CVE-2025-32463

https://github.com/Yuy0ung/CVE-2025-32463_chwoot

https://github.com/behnamvanda/CVE-2025-32463

https://github.com/zhaduchanhzz/CVE-2025-32463_POC

https://github.com/yonathanpy/CVE-2025-32462-CVE-2025-32463-PoC-Lab

https://github.com/AdityaBhatt3010/Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462

https://github.com/wvverez/CVE-2025-32463

https://github.com/ChetanKomal/sudo_exploit

https://github.com/cybertechajju/CVE-2025-32463

https://github.com/4f-kira/CVE-2025-32463

https://github.com/cybershaolin47/CVE-2025-32463_POC

https://github.com/Floodnut/CVE-2025-32463

https://github.com/mihnasdsad/CVE-2025-32463

https://github.com/7r00t/cve-2025-32463-lab

https://github.com/aexdyhaxor/CVE-2025-32463

https://github.com/lowercasenumbers/CVE-2025-32463_sudo_chroot

toxy4ny@defcon.social at 2026-03-17T18:42:19.000Z ##

Internal redteam, 8h, no tools except one exploit.
Result: VP account, full AD control. SOC: 0 alerts.

github.com/toxy4ny/semetsky---

Why it matters: PXE-boot Linux, unmonitored, unpatched since 2023.
CVE-2025-32463 → bash_history with plaintext creds → RDP hop →
custom AD delegation. All "legitimate" actions, no SOC triggers.

What's your "Yuri Semetsky" story? (obfuscated, of course)

#redteam #internalpentest #ad #soc #linux

##

CVE-2025-59284
(3.3 LOW)

EPSS: 0.04%

updated 2025-10-14T18:30:47

1 posts

Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally.

1 repos

https://github.com/lytnc/CVE-2025-59284-PoC

_r_netsec@infosec.exchange at 2026-03-17T19:43:05.000Z ##

CVE-2025-59284: How reading a gnu manpage led to a Windows NetNTLM phishing exploit sec-fault.com/blog/cve-2025-59

##

CVE-2025-4517
(9.4 CRITICAL)

EPSS: 0.10%

updated 2025-06-03T21:31:40

2 posts

Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/librar

10 repos

https://github.com/StealthByte0/CVE-2025-4517-poc

https://github.com/Rohitberiwala/PyPath-Escape-CVE-2025-4517-Exploit-Research

https://github.com/AzureADTrent/CVE-2025-4517-POC

https://github.com/kerburenthusiasm/CVE-2025-4517-PoC

https://github.com/kyakei/CVE-2025-4138-poc

https://github.com/estebanzarate/CVE-2025-4517-Python-tarfile-filter-data-Bypass-PoC

https://github.com/AnimePrincess420/CVE-2025-4517-PoC

https://github.com/bgutowski/CVE-2025-4517-POC-Sudoers

https://github.com/0xDTC/CVE-2025-4517-tarfile-PATH_MAX-bypass

https://github.com/DesertDemons/CVE-2025-4138-4517-POC

w5hacksphere at 2026-03-18T19:34:11.426Z ##

The dizzying exercise of trying to wrap my head around the escape in CVE-2025-4517 made WingData an interesting box for me. 16 layers of symlinks just to read the root flag! labs.hackthebox.com/achievemen

##

w5hacksphere@infosec.exchange at 2026-03-18T19:34:11.000Z ##

The dizzying exercise of trying to wrap my head around the escape in CVE-2025-4517 made WingData an interesting box for me. 16 layers of symlinks just to read the root flag! labs.hackthebox.com/achievemen

##

CVE-2026-33058
(0 None)

EPSS: 0.02%

3 posts

N/A

CVE-2026-32703
(0 None)

EPSS: 0.04%

6 posts

N/A

offseq at 2026-03-19T03:30:29.333Z ##

🚨 OpenProject CRITICAL XSS (CVE-2026-32703): Attackers with repo push access can inject persistent scripts via filenames, impacting all users viewing affected pages. Patch to 16.6.9/17.0.6/17.1.3/17.2.1+ now! radar.offseq.com/threat/cve-20

##

offseq at 2026-03-19T01:30:29.991Z ##

⚠️ CRITICAL: CVE-2026-32703 in OpenProject (<16.6.9, <17.0.6, <17.1.3, <17.2.1) enables persistent XSS via repo filenames. Attackers w/ push access can inject scripts — risk: session hijack, data theft. Patch now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-03-18T22:47:33.000Z ##

🔴 CVE-2026-32703 - Critical (9)

OpenProject is an open-source, web-based project management software. In versions prior to 16.6.9, 17.0.6, 17.1.3, and 17.2.1, the Repositories module did not properly escape filenames displayed from repositories. This allowed an attacker with pus...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-19T03:30:29.000Z ##

🚨 OpenProject CRITICAL XSS (CVE-2026-32703): Attackers with repo push access can inject persistent scripts via filenames, impacting all users viewing affected pages. Patch to 16.6.9/17.0.6/17.1.3/17.2.1+ now! radar.offseq.com/threat/cve-20 #OffSeq #XSS #OpenProject #infosec

##

offseq@infosec.exchange at 2026-03-19T01:30:29.000Z ##

⚠️ CRITICAL: CVE-2026-32703 in OpenProject (<16.6.9, <17.0.6, <17.1.3, <17.2.1) enables persistent XSS via repo filenames. Attackers w/ push access can inject scripts — risk: session hijack, data theft. Patch now! radar.offseq.com/threat/cve-20 #OffSeq #XSS #OpenProject #Vuln

##

thehackerwire@mastodon.social at 2026-03-18T22:47:33.000Z ##

🔴 CVE-2026-32703 - Critical (9)

OpenProject is an open-source, web-based project management software. In versions prior to 16.6.9, 17.0.6, 17.1.3, and 17.2.1, the Repositories module did not properly escape filenames displayed from repositories. This allowed an attacker with pus...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28430
(0 None)

EPSS: 0.08%

3 posts

N/A

thehackerwire@mastodon.social at 2026-03-18T21:45:58.000Z ##

🔴 CVE-2026-28430 - Critical (9.8)

Chamilo LMS is a learning management system. Prior to version 1.11.34, there is an unauthenticated SQL injection vulnerability which allows remote attackers to execute arbitrary SQL commands via the custom_dates parameter. By chaining this with a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T21:45:58.000Z ##

🔴 CVE-2026-28430 - Critical (9.8)

Chamilo LMS is a learning management system. Prior to version 1.11.34, there is an unauthenticated SQL injection vulnerability which allows remote attackers to execute arbitrary SQL commands via the custom_dates parameter. By chaining this with a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-17T00:00:46.000Z ##

Chamilo LMS < 1.11.34 has a CRITICAL SQL injection vuln (CVE-2026-28430, CVSS 9.3). Unauth attackers can hijack admin accounts & access PII. Upgrade to 1.11.34 ASAP. No public exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Chamilo #InfoSec

##

CVE-2026-27894
(0 None)

EPSS: 0.06%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-18T20:16:37.000Z ##

🟠 CVE-2026-27894 - High (8.8)

LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. Prior to version 9.5, a local file inclusion was detected in the PDF export that allows users to include local PHP fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T20:16:37.000Z ##

🟠 CVE-2026-27894 - High (8.8)

LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. Prior to version 9.5, a local file inclusion was detected in the PDF export that allows users to include local PHP fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27811
(0 None)

EPSS: 0.21%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-18T20:01:18.000Z ##

🟠 CVE-2026-27811 - High (8.8)

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.3, a command injection vulnerability exists in the `/config/compare///show` endpoint, allowed authenticated users to execute arbitrary sy...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T20:01:18.000Z ##

🟠 CVE-2026-27811 - High (8.8)

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.3, a command injection vulnerability exists in the `/config/compare///show` endpoint, allowed authenticated users to execute arbitrary sy...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29056
(0 None)

EPSS: 0.13%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-18T20:00:58.000Z ##

🟠 CVE-2026-29056 - High (8.8)

Kanboard is project management software focused on Kanban methodology. Prior to 1.2.51, Kanboard's user invite registration endpoint (`UserInviteController::register()`) accepts all POST parameters and passes them to `UserModel::create()` without ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T20:00:58.000Z ##

🟠 CVE-2026-29056 - High (8.8)

Kanboard is project management software focused on Kanban methodology. Prior to 1.2.51, Kanboard's user invite registration endpoint (`UserInviteController::register()`) accepts all POST parameters and passes them to `UserModel::create()` without ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27135
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-18T18:41:34.000Z ##

🟠 CVE-2026-27135 - High (7.5)

nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1, the nghttp2 library stops reading the incoming data when user facing public API `nghttp2_session_terminate_session` or `nghttp2_session_termin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T18:41:34.000Z ##

🟠 CVE-2026-27135 - High (7.5)

nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1, the nghttp2 library stops reading the incoming data when user facing public API `nghttp2_session_terminate_session` or `nghttp2_session_termin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30884
(0 None)

EPSS: 0.02%

3 posts

N/A

thehackerwire@mastodon.social at 2026-03-18T13:41:34.000Z ##

🔴 CVE-2026-30884 - Critical (9.6)

mdjnelson/moodle-mod_customcert is a Moodle plugin for creating dynamically generated certificates with complete customization via the web browser. Prior to versions 4.4.9 and 5.0.3, a teacher who holds `mod/customcert:manage` in any single course...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-18T12:41:11.000Z ##

🔴 CVE-2026-30884 - Critical (9.6)

mdjnelson/moodle-mod_customcert is a Moodle plugin for creating dynamically generated certificates with complete customization via the web browser. Prior to versions 4.4.9 and 5.0.3, a teacher who holds `mod/customcert:manage` in any single course...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-18T06:00:28.000Z ##

CRITICAL: CVE-2026-30884 in mdjnelson moodle-mod_customcert (<4.4.9, 5.0.0 – 5.0.3) enables cross-course certificate tampering by teachers. Update to 4.4.9/5.0.3+ and review permissions. radar.offseq.com/threat/cve-20 #OffSeq #Moodle #Infosec #Vulnerability

##

CVE-2026-32693
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-18T13:41:25.000Z ##

🟠 CVE-2026-32693 - High (8.8)

In Juju from version 3.0.0 through 3.6.18, the authorization of the "secret-set" tool is not performed correctly, which allows a grantee to update the secret content, and can lead to reading or updating other secrets. When the "secret-set" tool lo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0667
(0 None)

EPSS: 0.00%

1 posts

N/A

beyondmachines1@infosec.exchange at 2026-03-18T09:01:48.000Z ##

Schneider Electric Patches Critical RCE Vulnerability in SCADAPack RTUs

Schneider Electric disclosed a critical vulnerability (CVE-2026-0667) in its SCADAPack RTUs and RemoteConnect software that allows unauthenticated attackers to execute arbitrary code via Modbus TCP. The flaw poses a severe risk to critical infrastructure, potentially leading to full system takeover or denial of service.

**If you have SCADAPack x70 RTUs (47x, 47xi, or 57x series) or use RemoteConnect software, make sure all devices are isolated from the internet and accessible from trusted networks only. Then immediately update RemoteConnect to R3.4.2 and firmware to 9.12.2 on your 47x/47xi devices. If you can't patch right now, block unauthorized Modbus TCP access using the built-in firewall and disable the logic debug service.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-24901
(0 None)

EPSS: 0.03%

3 posts

N/A

thehackerwire@mastodon.social at 2026-03-17T22:01:27.000Z ##

🟠 CVE-2026-24901 - High (8.1)

Outline is a service that allows for collaborative documentation. Prior to 1.4.0, an Insecure Direct Object Reference (IDOR) vulnerability in the document restoration logic allows any team member to unauthorizedly restore, view, and seize ownershi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T21:02:33.000Z ##

🟠 CVE-2026-24901 - High (8.1)

Outline is a service that allows for collaborative documentation. Prior to 1.4.0, an Insecure Direct Object Reference (IDOR) vulnerability in the document restoration logic allows any team member to unauthorizedly restore, view, and seize ownershi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-17T19:58:25.000Z ##

🟠 CVE-2026-24901 - High (8.1)

Outline is a service that allows for collaborative documentation. Prior to 1.4.0, an Insecure Direct Object Reference (IDOR) vulnerability in the document restoration logic allows any team member to unauthorizedly restore, view, and seize ownershi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25770
(0 None)

EPSS: 0.09%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-17T19:00:58.000Z ##

🔴 CVE-2026-25770 - Critical (9.1)

Wazuh is a free and open source platform used for threat prevention, detection, and response. Starting in version 3.9.0 and prior to version 4.14.3, a privilege escalation vulnerability exists in the Wazuh Manager's cluster synchronization protoco...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25769
(0 None)

EPSS: 0.42%

1 posts

N/A

1 repos

https://github.com/hakaioffsec/CVE-2026-25769

thehackerwire@mastodon.social at 2026-03-17T19:00:48.000Z ##

🔴 CVE-2026-25769 - Critical (9.1)

Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using clu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-30201
(0 None)

EPSS: 0.28%

1 posts

N/A

moltenbit@infosec.exchange at 2026-03-17T13:24:02.000Z ##

Found a bypass in Wazuh's UNC path validation for Windows agents.

The existing mitigation (CVE-2025-30201) blocked standard UNC paths like \\server\share, but extended-length UNC paths using the \\?\UNC\ prefix slipped right through. This affects the OSQuery wodle's log_path and config_path fields.

Impact: An attacker who controls the centralized agent config can coerce domain-joined Windows agents into authenticating to an attacker-controlled SMB server, leaking the machine account's NetNTLMv2 hash. From there it's NTLM relay and potentially full Active Directory domain compromise.

Patched in Wazuh 4.14.3. CVSS 7.7 High.

Full writeup with technical details on my blog:
moltenbit.net/posts/wazuh-unc-mitigation-bypass-cve-2025-30201/

#infosec #bugbounty #wazuh #security #cybersecurity #vulnerabilityresearch

##

CVE-2026-23489
(0 None)

EPSS: 0.08%

1 posts

N/A

offseq@infosec.exchange at 2026-03-17T04:30:26.000Z ##

🚨 CVE-2026-23489 (CRITICAL, CVSS 9.1): GLPI 'fields' plugin (<1.23.3) allows privileged users to execute arbitrary PHP code (RCE risk). Patch to 1.23.3+, review permissions, and monitor activity. radar.offseq.com/threat/cve-20 #OffSeq #GLPI #CVE202623489 #infosec

##

CVE-2026-32628
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-16T20:46:02.000Z ##

🟠 CVE-2026-32628 - High (8.8)

AnythingLLM is an application that turns pieces of content into context that any LLM can use as references during chatting. In 1.11.1 and earlier, a SQL injection vulnerability in the built-in SQL Agent plugin allows any user who can invoke the ag...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30875
(0 None)

EPSS: 0.15%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-16T20:17:16.000Z ##

🟠 CVE-2026-30875 - High (8.8)

Chamilo LMS is a learning management system. Prior to version 1.11.36, an arbitrary file upload vulnerability in the H5P Import feature allows authenticated users with Teacher role to achieve Remote Code Execution (RCE). The H5P package validation...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites