## Updated at UTC 2026-03-24T17:49:26.982788

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-4673 8.8 0.06% 4 0 2026-03-24T16:54:37.343000 Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowe
CVE-2026-4676 8.8 0.07% 2 0 2026-03-24T16:50:03.117000 Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote
CVE-2026-33649 8.1 0.01% 2 0 2026-03-24T16:16:34.487000 WWBN AVideo is an open source video platform. In versions up to and including 26
CVE-2026-4368 0 0.02% 6 0 2026-03-24T15:54:09.400000 Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configur
CVE-2026-3055 0 0.02% 6 0 2026-03-24T15:54:09.400000 Insufficient input validation in NetScaler ADC and NetScaler Gateway when config
CVE-2026-25075 7.5 0.12% 1 0 2026-03-24T15:54:09.400000 strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerabil
CVE-2026-33512 7.5 0.03% 1 0 2026-03-24T15:54:09.400000 WWBN AVideo is an open source video platform. In versions up to and including 26
CVE-2026-33651 8.1 0.03% 1 0 2026-03-24T15:54:09.400000 WWBN AVideo is an open source video platform. In versions up to and including 26
CVE-2026-33650 7.6 0.03% 1 0 2026-03-24T15:54:09.400000 WWBN AVideo is an open source video platform. In versions up to and including 26
CVE-2026-26828 7.5 0.04% 1 0 2026-03-24T15:54:09.400000 A NULL pointer dereference in the daap_reply_playlists function (src/httpd_daap.
CVE-2026-26829 7.5 0.73% 1 0 2026-03-24T15:54:09.400000 A NULL pointer dereference in the safe_atou64 function (src/misc.c) of owntone-s
CVE-2026-33483 7.5 0.15% 1 0 2026-03-24T15:54:09.400000 WWBN AVideo is an open source video platform. In versions up to and including 26
CVE-2026-33478 10.0 0.66% 1 0 2026-03-24T15:54:09.400000 WWBN AVideo is an open source video platform. In versions up to and including 26
CVE-2026-4001 9.8 0.14% 2 0 2026-03-24T15:53:48.067000 The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to
CVE-2026-4739 0 0.04% 4 0 2026-03-24T15:53:48.067000 Integer Overflow or Wraparound vulnerability in InsightSoftwareConsortium ITK (‎
CVE-2026-3509 7.5 0.08% 2 0 2026-03-24T15:53:48.067000 An unauthenticated remote attacker may be able to control the format string of m
CVE-2026-4753 9.1 0.04% 2 0 2026-03-24T15:53:48.067000 Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects Re
CVE-2026-4746 0 0.04% 2 0 2026-03-24T15:53:48.067000 Out-of-bounds Write vulnerability in timeplus-io proton (base/poco/Foundation/sr
CVE-2026-4744 0 0.01% 2 0 2026-03-24T15:53:48.067000 Out-of-bounds Read vulnerability in rizonesoft Notepad3 (‎scintilla/oniguruma/sr
CVE-2026-22739 8.6 0.02% 2 0 2026-03-24T15:53:48.067000 Vulnerability in Spring Cloud when substituting the profile parameter from a req
CVE-2026-33250 7.5 0.21% 3 0 2026-03-24T15:53:48.067000 Freeciv21 is a free open source, turn-based, empire-building strategy game. Vers
CVE-2026-33282 7.5 0.02% 1 0 2026-03-24T15:53:48.067000 Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 pa
CVE-2026-4306 7.5 0.07% 1 0 2026-03-24T15:53:48.067000 The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'r
CVE-2026-32278 8.2 0.04% 2 0 2026-03-24T15:53:48.067000 Connect-CMS is a content management system. In versions on the 1.x series up to
CVE-2026-32300 8.1 0.03% 1 0 2026-03-24T15:53:48.067000 Connect-CMS is a content management system. In versions on the 1.x series up to
CVE-2025-41660 8.8 0.21% 2 0 2026-03-24T09:30:41 A low-privileged remote attacker may be able to replace the boot application of
CVE-2026-4755 9.8 0.06% 2 0 2026-03-24T09:30:41 CWE-20 vulnerability in MolotovCherry Android-ImageMagick7.This issue affects An
CVE-2026-4745 None 0.05% 2 0 2026-03-24T06:31:25 Improper Control of Generation of Code ('Code Injection') vulnerability in dendi
CVE-2026-4750 9.1 0.04% 2 0 2026-03-24T06:31:25 Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof
CVE-2026-4662 7.5 0.08% 2 0 2026-03-24T06:31:25 The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listi
CVE-2026-4640 7.5 0.07% 2 0 2026-03-24T06:31:25 Vitals ESP developed by Galaxy Software Services has a Missing Authentication vu
CVE-2026-4283 9.1 0.10% 2 0 2026-03-24T06:31:20 The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized acc
CVE-2026-4639 8.8 0.10% 4 0 2026-03-24T06:31:14 Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization v
CVE-2026-4674 8.8 0.07% 4 0 2026-03-24T03:31:25 Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a rem
CVE-2026-4679 8.8 0.07% 2 0 2026-03-24T03:31:25 Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a rem
CVE-2026-4678 8.8 0.07% 2 0 2026-03-24T03:31:25 Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remo
CVE-2026-4677 8.8 0.06% 2 0 2026-03-24T03:31:25 Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.16
CVE-2026-4675 8.8 0.06% 2 0 2026-03-24T03:31:25 Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a
CVE-2026-4680 8.8 0.08% 2 0 2026-03-24T03:31:25 Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remot
CVE-2026-4021 8.1 0.12% 1 0 2026-03-24T00:30:34 The Contest Gallery plugin for WordPress is vulnerable to an authentication bypa
CVE-2026-3533 8.8 0.22% 1 0 2026-03-24T00:30:33 The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads du
CVE-2025-60947 8.8 0.19% 1 0 2026-03-24T00:30:28 Census CSWeb 8.0.1 allows arbitrary file upload. A remote, authenticated attacke
CVE-2025-60949 9.1 0.03% 1 0 2026-03-24T00:30:28 Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployme
CVE-2026-32902 None 0.00% 1 0 2026-03-24T00:30:28 Rejected reason: This CVE ID has been rejected.
CVE-2025-60946 8.8 0.12% 1 0 2026-03-24T00:30:24 Census CSWeb 8.0.1 allows arbitrary file path input. A remote, authenticated att
CVE-2026-32907 0 0.00% 1 0 2026-03-23T23:17:12.130000 Rejected reason: This CVE ID has been rejected.
CVE-2026-32913 7.5 0.03% 1 1 2026-03-23T21:54:50 OpenClaw's `fetchWithSsrFGuard(...)` followed cross-origin redirects while prese
CVE-2026-32066 None 0.00% 1 0 2026-03-23T21:52:25 ### Summary Unauthenticated requests to a reachable Zalo webhook endpoint could
CVE-2026-32845 8.4 0.01% 1 0 2026-03-23T21:31:53 cgltf version 1.15 and prior contain an integer overflow vulnerability in the cg
CVE-2026-32299 7.5 0.03% 1 0 2026-03-23T20:38:17 # Security Advisory — Page Content Retrieval (Improper Authorization) ## Summar
CVE-2026-32277 8.7 0.03% 2 0 2026-03-23T20:35:51 # Security Advisory — Cabinet Plugin (DOM-based XSS) ## Summary A DOM-based Cr
CVE-2026-32276 8.8 0.07% 1 0 2026-03-23T20:33:35 # Security Advisory — Code Study Plugin ## Summary An authenticated user may b
CVE-2026-26209 7.5 0.04% 1 0 2026-03-23T20:24:00 ### Summary - The `cbor2` library is vulnerable to a Denial of Service (DoS) at
CVE-2026-33228 9.8 0.03% 1 0 2026-03-23T19:14:31.040000 flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function
CVE-2026-4437 7.5 0.04% 1 0 2026-03-23T18:31:30 Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that sp
CVE-2026-4404 9.4 0.04% 1 0 2026-03-23T18:30:31 Use of hard coded credentials in GoHarbor Harbor version 2.15.0 and below, allow
CVE-2026-33513 8.6 0.15% 1 0 2026-03-23T17:31:53 ### Summary An unauthenticated API endpoint (`APIName=locale`) concatenates user
CVE-2026-32049 7.5 0.12% 1 0 2026-03-23T17:09:08.487000 OpenClaw versions prior to 2026.2.22 fail to consistently enforce configured inb
CVE-2026-33292 7.5 0.04% 1 0 2026-03-23T16:18:24.447000 WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS str
CVE-2026-4599 9.1 0.03% 3 0 2026-03-23T16:17:45.400000 Versions of the package jsrsasign from 7.0.0 and before 11.1.1 are vulnerable to
CVE-2026-33017 0 0.36% 3 3 2026-03-23T16:16:48.757000 Langflow is a tool for building and deploying AI-powered agents and workflows. I
CVE-2026-24060 9.1 0.02% 1 0 2026-03-23T16:16:43.553000 Service information is not encrypted when transmitted as BACnet packets over th
CVE-2026-4602 7.5 0.04% 2 0 2026-03-23T16:08:58.320000 Versions of the package jsrsasign before 11.1.1 are vulnerable to Incorrect Conv
CVE-2026-33352 9.8 0.03% 1 0 2026-03-23T15:56:03.963000 WWBN AVideo is an open source video platform. Prior to version 26.0, an unauthen
CVE-2025-46597 7.5 0.03% 1 0 2026-03-23T15:31:42 Bitcoin Core 0.13.0 through 29.x has an integer overflow.
CVE-2026-22163 7.9 0.01% 2 0 2026-03-23T15:31:41 Requires malware code to misuse the DDK kernel module IOCTL interface. Such cod
CVE-2026-21992 9.8 0.04% 5 0 2026-03-23T15:30:30.950000 Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware
CVE-2026-4434 8.1 0.02% 1 0 2026-03-23T15:16:35.523000 Improper certificate validation in the PAM propagation WinRM connections allows
CVE-2026-23554 7.8 0.01% 2 0 2026-03-23T15:16:32.060000 The Intel EPT paging code uses an optimization to defer flushing of any cached E
CVE-2026-21732 9.6 0.04% 1 0 2026-03-23T15:16:31.653000 A web page that contains unusual GPU shader code is loaded into the GPU compiler
CVE-2025-63261 7.8 0.05% 1 0 2026-03-23T15:16:29.387000 AWStats 8.0 is vulnerable to Command Injection via the open function
CVE-2026-4497 7.3 2.40% 1 0 2026-03-23T14:32:02.800000 A vulnerability was determined in Totolink WA300 5.2cu.7112_B20190227. Affected
CVE-2026-31904 7.5 0.08% 1 0 2026-03-23T14:32:02.800000 The WebSocket Application Programming Interface lacks restrictions on the number
CVE-2026-33180 7.5 0.03% 1 0 2026-03-23T14:32:02.800000 HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare i
CVE-2026-33243 8.2 0.01% 1 0 2026-03-23T14:32:02.800000 barebox is a bootloader. In barebox from version 2016.03.0 to before version 202
CVE-2026-32048 7.5 0.04% 1 0 2026-03-23T14:32:02.800000 OpenClaw versions prior to 2026.3.1 fail to enforce sandbox inheritance during c
CVE-2026-4585 9.8 0.15% 2 0 2026-03-23T14:31:37.267000 A vulnerability has been found in Tiandy Easy7 Integrated Management Platform up
CVE-2026-4567 9.8 0.09% 2 0 2026-03-23T14:31:37.267000 A vulnerability has been found in Tenda A15 15.13.07.13. The impacted element is
CVE-2026-4534 8.8 0.05% 2 0 2026-03-23T14:31:37.267000 A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlE
CVE-2026-4552 8.8 0.05% 1 0 2026-03-23T14:31:37.267000 A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the fun
CVE-2026-4551 8.8 0.05% 1 0 2026-03-23T14:31:37.267000 A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the
CVE-2026-4540 7.3 0.03% 1 0 2026-03-23T14:31:37.267000 A vulnerability was detected in projectworlds Online Notes Sharing System 1.0. T
CVE-2026-4529 8.8 0.04% 2 0 2026-03-23T14:31:37.267000 A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the fu
CVE-2026-32969 7.5 0.15% 4 0 2026-03-23T12:30:36 An unauthenticated remote attacker can exploit a Pre-Auth blind SQL Injection vu
CVE-2026-32968 9.8 0.11% 3 0 2026-03-23T12:30:31 Due to the improper neutralisation of special elements used in an OS command, an
CVE-2026-3587 10.0 0.09% 3 1 2026-03-23T09:30:29 An unauthenticated remote attacker can exploit a hidden function in the CLI prom
CVE-2026-4601 8.7 0.02% 2 0 2026-03-23T06:30:39 Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Crypto
CVE-2026-4598 7.5 0.04% 2 0 2026-03-23T06:30:39 Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop
CVE-2026-4606 None 0.04% 1 0 2026-03-23T03:31:45 GV Edge Recording Manager (ERM) v2.3.1 improperly runs application components wi
CVE-2026-4566 8.8 0.04% 2 0 2026-03-23T03:31:45 A flaw has been found in Belkin F9K1122 1.00.33. The affected element is the fun
CVE-2026-4565 8.8 0.09% 2 0 2026-03-23T03:31:45 A vulnerability was detected in Tenda AC21 16.03.08.16. Impacted is the function
CVE-2026-2580 7.5 0.07% 2 1 2026-03-23T00:31:08 The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory &
CVE-2026-4553 8.8 0.02% 1 0 2026-03-22T18:30:22 A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is the function f
CVE-2026-4555 8.8 0.04% 1 0 2026-03-22T18:30:22 A weakness has been identified in D-Link DIR-513 1.10. The impacted element is t
CVE-2026-4558 8.8 0.15% 1 0 2026-03-22T18:30:22 A flaw has been found in Linksys MR9600 2.0.6.206937. Affected is the function s
CVE-2026-4543 6.3 0.18% 1 0 2026-03-22T12:32:35 A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is
CVE-2026-4314 8.8 0.04% 1 0 2026-03-22T06:30:22 The 'The Ultimate WordPress Toolkit – WP Extended' plugin for WordPress is vulne
CVE-2026-4535 8.8 0.05% 2 0 2026-03-22T06:30:22 A vulnerability has been found in Tenda FH451 1.0.0.9. This vulnerability affect
CVE-2026-4533 6.3 0.03% 1 0 2026-03-22T03:30:31 A vulnerability was detected in code-projects Simple Food Ordering System 1.0. A
CVE-2026-3629 8.1 0.04% 2 0 2026-03-22T00:30:33 The Import and export users and customers plugin for WordPress is vulnerable to
CVE-2026-32042 8.8 0.11% 1 0 2026-03-21T03:31:17 OpenClaw versions 2026.2.22 prior to 2026.2.25 contain a privilege escalation vu
CVE-2026-25192 9.4 0.13% 1 0 2026-03-21T00:32:47 WebSocket endpoints lack proper authentication mechanisms, enabling attackers to
CVE-2026-31903 7.5 0.07% 1 0 2026-03-21T00:32:47 The WebSocket Application Programming Interface lacks restrictions on the number
CVE-2026-29796 9.4 0.10% 1 0 2026-03-21T00:31:52 WebSocket endpoints lack proper authentication mechanisms, enabling attackers to
CVE-2026-32666 7.5 0.04% 1 0 2026-03-21T00:31:52 WebCTRL systems that communicate over BACnet inherit the protocol's lack of net
CVE-2026-25086 7.7 0.01% 1 0 2026-03-21T00:31:51 Under certain conditions, an attacker could bind to the same port used by WebCT
CVE-2026-33502 9.3 0.04% 1 0 2026-03-20T22:07:02 ### Summary An unauthenticated server-side request forgery vulnerability in `plu
CVE-2026-33507 8.8 0.06% 1 0 2026-03-20T21:47:51 ## Summary The `objects/pluginImport.json.php` endpoint allows admin users to u
CVE-2026-33143 None 0.02% 2 0 2026-03-20T21:33:34 ### Summary The WhatsApp POST webhook handler (`/notification/whatsapp/webhook`
CVE-2026-32933 7.5 0.04% 1 0 2026-03-20T21:20:06 ### Summary AutoMapper is vulnerable to a Denial of Service (DoS) attack. When
CVE-2026-33485 7.5 0.19% 1 0 2026-03-20T20:47:20 ## Summary The RTMP `on_publish` callback at `plugin/Live/on_publish.php` is ac
CVE-2026-33482 8.1 0.15% 1 0 2026-03-20T20:46:42 ## Summary The `sanitizeFFmpegCommand()` function in `plugin/API/standAlone/fun
CVE-2026-33480 8.6 0.03% 1 0 2026-03-20T20:44:12 ## Summary The `isSSRFSafeURL()` function in AVideo can be bypassed using IPv4-
CVE-2026-33479 8.8 0.15% 1 0 2026-03-20T20:44:04 ## Summary The Gallery plugin's `saveSort.json.php` endpoint passes unsanitized
CVE-2026-33476 7.5 0.61% 1 0 2026-03-20T20:43:22 ## Summary The Siyuan kernel exposes an unauthenticated file-serving endpoint
CVE-2026-4445 8.8 0.09% 1 0 2026-03-20T19:32:35.237000 Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remo
CVE-2025-43520 7.1 0.47% 16 0 2026-03-20T18:39:07.610000 A memory corruption issue was addressed with improved memory handling. This issu
CVE-2026-4452 8.8 0.07% 1 0 2026-03-20T18:32:23 Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.153 al
CVE-2025-67260 None 0.06% 1 0 2026-03-20T18:31:19 The Terrapack software, from ASTER TEC / ASTER S.p.A., with the indicated compon
CVE-2026-4464 8.8 0.07% 1 0 2026-03-20T18:31:18 Integer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a rem
CVE-2026-4451 8.8 0.10% 1 0 2026-03-20T18:05:44.367000 Insufficient validation of untrusted input in Navigation in Google Chrome prior
CVE-2026-4455 8.8 0.07% 1 0 2026-03-20T17:59:44.053000 Heap buffer overflow in PDFium in Google Chrome prior to 146.0.7680.153 allowed
CVE-2026-4456 8.8 0.10% 1 0 2026-03-20T17:59:23.127000 Use after free in Digital Credentials API in Google Chrome prior to 146.0.7680.1
CVE-2026-4458 8.8 0.03% 1 0 2026-03-20T17:58:37.903000 Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an
CVE-2026-4462 8.8 0.07% 1 0 2026-03-20T17:57:26.947000 Out of bounds read in Blink in Google Chrome prior to 146.0.7680.153 allowed a r
CVE-2026-33056 None 0.02% 3 0 2026-03-20T17:25:11 ## Summary When unpacking a tar archive, the `tar` crate's `unpack_dir` functio
CVE-2026-33286 9.1 0.04% 3 0 2026-03-20T15:58:17 ### Summary An arbitrary method execution vulnerability has been found which af
CVE-2026-4463 8.8 0.06% 1 0 2026-03-20T15:32:14 Heap buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed
CVE-2026-4447 8.8 0.09% 1 0 2026-03-20T15:32:13 Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allo
CVE-2026-4446 8.8 0.09% 1 0 2026-03-20T15:32:13 Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remo
CVE-2026-4444 8.8 0.06% 1 0 2026-03-20T15:32:13 Stack buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed
CVE-2026-4457 8.8 0.07% 1 0 2026-03-20T15:31:12 Type Confusion in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote a
CVE-2026-4454 8.8 0.10% 1 0 2026-03-20T15:31:12 Use after free in Network in Google Chrome prior to 146.0.7680.153 allowed a rem
CVE-2026-4461 8.8 0.07% 1 0 2026-03-20T15:31:12 Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allo
CVE-2026-4460 8.8 0.07% 1 0 2026-03-20T15:31:12 Out of bounds read in Skia in Google Chrome prior to 146.0.7680.153 allowed a re
CVE-2026-4459 8.8 0.07% 1 0 2026-03-20T15:31:12 Out of bounds read and write in WebAudio in Google Chrome prior to 146.0.7680.15
CVE-2025-71258 4.3 1.87% 1 0 template 2026-03-20T13:39:46.493000 BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind serve
CVE-2025-71259 4.3 1.87% 1 0 template 2026-03-20T13:39:46.493000 BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind serve
CVE-2026-32596 None 4.20% 1 0 template 2026-03-19T21:01:58 ### Summary Glances web server runs without authentication by default when start
CVE-2026-33354 7.6 0.04% 1 0 2026-03-19T19:34:07 ## Summary `POST /objects/aVideoEncoder.json.php` accepts a requester-controlled
CVE-2026-33351 9.1 0.07% 1 0 2026-03-19T19:13:30 ### Summary A Server-Side Request Forgery (SSRF) vulnerability exists in `plugi
CVE-2026-20131 10.0 0.65% 2 3 2026-03-19T18:32:21 A vulnerability in the web-based management interface of Cisco Secure Firewall M
CVE-2026-27459 None 0.02% 1 0 2026-03-19T18:28:12 If a user provided callback to `set_cookie_generate_callback` returned a cookie
CVE-2026-33297 None 0.03% 2 0 2026-03-19T17:25:37 ### Summary The `setPassword.json.php` endpoint in the CustomizeUser plugin all
CVE-2026-33293 8.1 0.04% 1 0 2026-03-19T17:12:05 ## Summary The `deleteDump` parameter in `plugin/CloneSite/cloneServer.json.php
CVE-2025-71260 8.8 8.28% 1 1 2026-03-19T15:31:27 BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserializa
CVE-2025-71257 7.3 3.58% 1 1 template 2026-03-19T15:31:21 BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentica
CVE-2026-33242 7.5 0.02% 2 0 2026-03-19T12:44:28 ### Details A Path Traversal and Access Control Bypass vulnerability was discov
CVE-2026-33236 8.1 0.04% 1 0 2026-03-19T12:42:43 ## Vulnerability Description The NLTK downloader does not validate the `subdir`
CVE-2026-33231 7.5 0.04% 1 0 2026-03-19T12:42:23 ### Summary `nltk.app.wordnet_app` allows unauthenticated remote shutdown of the
CVE-2026-33226 8.7 0.01% 1 0 2026-03-18T20:22:12 ### Summary The REST datasource query preview endpoint (`POST /api/queries/previ
CVE-2026-33211 9.6 0.02% 3 0 2026-03-18T20:20:10 ### Summary The Tekton Pipelines git resolver is vulnerable to path traversal v
CVE-2026-33204 7.5 0.04% 1 0 2026-03-18T20:16:59 ## Summary An unauthenticated attacker can perform a Denial of Service via JWE
CVE-2026-33203 7.5 0.11% 1 0 2026-03-18T20:11:01 ## Summary The SiYuan kernel WebSocket server accepts unauthenticated connection
CVE-2026-33186 9.1 0.01% 1 0 2026-03-18T20:10:30 ### Impact _What kind of vulnerability is it? Who is impacted?_ It is an **Auth
CVE-2026-3888 7.9 0.01% 1 5 2026-03-18T06:31:20 Local privilege escalation in snapd on Linux allows local attackers to get root
CVE-2026-3838 8.8 1.57% 1 0 2026-03-17T14:18:58.587000 Unraid Update Request Path Traversal Remote Code Execution Vulnerability. This v
CVE-2026-32583 5.3 2.73% 1 0 template 2026-03-16T18:32:14 Missing Authorization vulnerability in Webnus Inc. Modern Events Calendar allows
CVE-2026-31979 8.8 0.02% 1 0 2026-03-16T18:18:34.750000 Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune.
CVE-2026-2493 7.5 15.24% 1 0 2026-03-16T15:30:55 IceWarp collaboration Directory Traversal Information Disclosure Vulnerability.
CVE-2025-15060 9.8 1.71% 1 0 2026-03-16T15:30:53 claude-hovercraft executeClaudeCode Command Injection Remote Code Execution Vuln
CVE-2026-3909 8.8 4.44% 2 0 2026-03-13T21:32:59 Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a re
CVE-2026-27446 None 0.12% 1 0 2026-03-05T15:28:06 Missing Authentication for Critical Function (CWE-306) vulnerability in Apache A
CVE-2026-27210 6.1 0.03% 2 0 2026-03-02T15:21:06.073000 Pannellum is a lightweight, free, and open source panorama viewer for the web. I
CVE-2026-26119 8.8 0.05% 1 0 2026-02-18T00:30:22 Improper authentication in Windows Admin Center allows an authorized attacker to
CVE-2026-1207 5.4 5.38% 1 0 template 2026-02-04T17:34:46.147000 An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4
CVE-2026-25253 8.8 0.08% 1 8 2026-02-02T23:41:06 ## Summary The Control UI trusts `gatewayUrl` from the query string without val
CVE-2025-68602 6.1 1.44% 1 0 template 2026-01-20T15:33:48 URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Scott Pater
CVE-2026-20817 7.8 0.02% 1 1 2026-01-14T20:31:32.760000 Improper handling of insufficient permissions or privileges in Windows Error Rep
CVE-2025-55182 10.0 65.08% 1 100 template 2025-12-09T16:53:25 ### Impact There is an unauthenticated remote code execution vulnerability in R
CVE-2025-32975 10.0 0.17% 2 0 2025-11-03T20:18:29.263000 Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef
CVE-2025-20720 8.8 0.03% 1 0 2025-10-15T21:31:40 In wlan AP driver, there is a possible out of bounds write due to an incorrect b
CVE-2025-41241 4.4 0.05% 1 0 2025-07-29T14:14:29.590000 VMware vCenter contains a denial-of-service vulnerability. A malicious actor who
CVE-2018-0204 7.5 1.69% 1 0 2023-02-01T05:08:53 A vulnerability in the web portal of the Cisco Prime Collaboration Provisioning
CVE-2026-33872 0 0.00% 1 0 N/A
CVE-2025-33244 0 0.00% 2 0 N/A
CVE-2026-33307 0 0.03% 2 0 N/A
CVE-2026-33298 0 0.04% 4 0 N/A
CVE-2026-32948 0 0.00% 1 0 N/A
CVE-2026-33634 0 0.04% 1 0 N/A
CVE-2026-33164 0 0.05% 1 0 N/A
CVE-2026-33648 0 0.09% 1 0 N/A
CVE-2026-33647 0 0.21% 1 0 N/A
CVE-2026-33717 0 0.04% 2 0 N/A
CVE-2026-33716 0 0.08% 2 0 N/A
CVE-2026-33719 0 0.12% 1 0 N/A
CVE-2026-4645 0 0.11% 1 0 N/A
CVE-2023-4567 0 0.00% 1 0 N/A
CVE-2026-32888 0 0.03% 1 0 N/A

CVE-2026-4673
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-24T16:54:37.343000

4 posts

Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:43:42.000Z ##

🟠 CVE-2026-4673 - High (8.8)

Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:43:12.000Z ##

🟠 CVE-2026-4673 - High (8.8)

Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:43:42.000Z ##

🟠 CVE-2026-4673 - High (8.8)

Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:43:12.000Z ##

🟠 CVE-2026-4673 - High (8.8)

Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4676
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-24T16:50:03.117000

2 posts

Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:17:24.000Z ##

🟠 CVE-2026-4676 - High (8.8)

Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:17:24.000Z ##

🟠 CVE-2026-4676 - High (8.8)

Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33649
(8.1 HIGH)

EPSS: 0.01%

updated 2026-03-24T16:16:34.487000

2 posts

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/Permissions/setPermission.json.php` endpoint accepts GET parameters for a state-changing operation that modifies user group permissions. The endpoint has no CSRF token validation, and the application explicitly sets `session.cookie_samesite=None` on session cookies. This allows an unauthenticated attack

thehackerwire@mastodon.social at 2026-03-23T20:09:02.000Z ##

🟠 CVE-2026-33649 - High (8.1)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/Permissions/setPermission.json.php` endpoint accepts GET parameters for a state-changing operation that modifies user group permissions. The endpoint h...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T19:19:19.000Z ##

🟠 CVE-2026-33649 - High (8.1)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `plugin/Permissions/setPermission.json.php` endpoint accepts GET parameters for a state-changing operation that modifies user group permissions. The endpoint h...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4368
(0 None)

EPSS: 0.02%

updated 2026-03-24T15:54:09.400000

6 posts

Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configured as Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server leading to User Session Mixup

AAKL at 2026-03-24T16:22:25.381Z ##

Citrix patched this yesterday.

Arctic Wolf: CVE‑2026‑3055: Critical Unauthenticated Memory-Read Vulnerability in Citrix NetScaler ADC and Gateway arcticwolf.com/resources/blog/

Citrix: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368 support.citrix.com/support-hom

##

beyondmachines1 at 2026-03-24T15:01:25.240Z ##

Critical Memory Leak and Session Hijacking Vulnerabilities Patched in Citrix NetScaler

Citrix patched a critical memory overread (CVE-2026-3055) and a high-severity session-swapping race condition (CVE-2026-4368) in NetScaler ADC and Gateway. These vulnerabilities allow unauthenticated attackers to leak sensitive memory data or hijack user sessions in environments configured for SAML or VPN services.

**If possible, make sure your NetScaler ADC and Gateway appliances are isolated from the internet and accessible from trusted networks only. Them plan a quick update. If you can't isolate from the internet, this is urgent. Update the firmware to the fixed versions (14.1-66.59, 13.1-62.23, or 13.1-37.262 for FIPS/NDcPP). Attackers have previously exploited similar flaws via the CitrixBleed exploit.**

beyondmachines.net/event_detai

##

571906@ap.podcastindex.org at 2026-03-24T02:00:02.000Z ##

New Episode: SANS Stormcast Tuesday, March 24th, 2026: Tax Scam to EDR Kill; Netscaler Patches; gRPC-Go Authz Bypass;

Shownotes:

From W-2 to BYOVD: How a Tax Search Leads to Kernel-Mode AV/EDR Kill
https://www.huntress.com/blog/w2-malvertising-to-kernel-mode-edr-kill
NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368
https:

Transcript

AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans

Or Listen right here.

##

AAKL@infosec.exchange at 2026-03-24T16:22:25.000Z ##

Citrix patched this yesterday.

Arctic Wolf: CVE‑2026‑3055: Critical Unauthenticated Memory-Read Vulnerability in Citrix NetScaler ADC and Gateway arcticwolf.com/resources/blog/

Citrix: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368 support.citrix.com/support-hom #infosec #vulnerability

##

beyondmachines1@infosec.exchange at 2026-03-24T15:01:25.000Z ##

Critical Memory Leak and Session Hijacking Vulnerabilities Patched in Citrix NetScaler

Citrix patched a critical memory overread (CVE-2026-3055) and a high-severity session-swapping race condition (CVE-2026-4368) in NetScaler ADC and Gateway. These vulnerabilities allow unauthenticated attackers to leak sensitive memory data or hijack user sessions in environments configured for SAML or VPN services.

**If possible, make sure your NetScaler ADC and Gateway appliances are isolated from the internet and accessible from trusted networks only. Them plan a quick update. If you can't isolate from the internet, this is urgent. Update the firmware to the fixed versions (14.1-66.59, 13.1-62.23, or 13.1-37.262 for FIPS/NDcPP). Attackers have previously exploited similar flaws via the CitrixBleed exploit.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

decio@infosec.exchange at 2026-03-23T15:48:01.000Z ##

➡️ CVE-2026-3055 👀
👇
support.citrix.com/support-hom

  • CVE-2026-3055 - Out-of-Bounds Read vulnerability - CVSSv4 base score: 9.3
    Note: Citrix NetScaler ADC or Citrix Gateway must be configured as SAML IDP to be vulnerable to CVE-2026-3055.

    • CVE-2026-4368 - Race Condition vulnerability - CVSSv4 base score: 7.7Note: Affected appliances must be configured as a Gateway (SSL VPN, ICA Proxy, CVPN, RDP proxy) or AAA virtual server to be vulnerable CVE-2026-4368.

( -> cve.circl.lu/search?q=CVE-2026 )

#cyberveille #CVE_2026_3055 #infosec

##

CVE-2026-3055
(0 None)

EPSS: 0.02%

updated 2026-03-24T15:54:09.400000

6 posts

Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread

AAKL at 2026-03-24T16:22:25.381Z ##

Citrix patched this yesterday.

Arctic Wolf: CVE‑2026‑3055: Critical Unauthenticated Memory-Read Vulnerability in Citrix NetScaler ADC and Gateway arcticwolf.com/resources/blog/

Citrix: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368 support.citrix.com/support-hom

##

beyondmachines1 at 2026-03-24T15:01:25.240Z ##

Critical Memory Leak and Session Hijacking Vulnerabilities Patched in Citrix NetScaler

Citrix patched a critical memory overread (CVE-2026-3055) and a high-severity session-swapping race condition (CVE-2026-4368) in NetScaler ADC and Gateway. These vulnerabilities allow unauthenticated attackers to leak sensitive memory data or hijack user sessions in environments configured for SAML or VPN services.

**If possible, make sure your NetScaler ADC and Gateway appliances are isolated from the internet and accessible from trusted networks only. Them plan a quick update. If you can't isolate from the internet, this is urgent. Update the firmware to the fixed versions (14.1-66.59, 13.1-62.23, or 13.1-37.262 for FIPS/NDcPP). Attackers have previously exploited similar flaws via the CitrixBleed exploit.**

beyondmachines.net/event_detai

##

571906@ap.podcastindex.org at 2026-03-24T02:00:02.000Z ##

New Episode: SANS Stormcast Tuesday, March 24th, 2026: Tax Scam to EDR Kill; Netscaler Patches; gRPC-Go Authz Bypass;

Shownotes:

From W-2 to BYOVD: How a Tax Search Leads to Kernel-Mode AV/EDR Kill
https://www.huntress.com/blog/w2-malvertising-to-kernel-mode-edr-kill
NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368
https:

Transcript

AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans

Or Listen right here.

##

AAKL@infosec.exchange at 2026-03-24T16:22:25.000Z ##

Citrix patched this yesterday.

Arctic Wolf: CVE‑2026‑3055: Critical Unauthenticated Memory-Read Vulnerability in Citrix NetScaler ADC and Gateway arcticwolf.com/resources/blog/

Citrix: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2026-3055 and CVE-2026-4368 support.citrix.com/support-hom #infosec #vulnerability

##

beyondmachines1@infosec.exchange at 2026-03-24T15:01:25.000Z ##

Critical Memory Leak and Session Hijacking Vulnerabilities Patched in Citrix NetScaler

Citrix patched a critical memory overread (CVE-2026-3055) and a high-severity session-swapping race condition (CVE-2026-4368) in NetScaler ADC and Gateway. These vulnerabilities allow unauthenticated attackers to leak sensitive memory data or hijack user sessions in environments configured for SAML or VPN services.

**If possible, make sure your NetScaler ADC and Gateway appliances are isolated from the internet and accessible from trusted networks only. Them plan a quick update. If you can't isolate from the internet, this is urgent. Update the firmware to the fixed versions (14.1-66.59, 13.1-62.23, or 13.1-37.262 for FIPS/NDcPP). Attackers have previously exploited similar flaws via the CitrixBleed exploit.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

decio@infosec.exchange at 2026-03-23T15:48:01.000Z ##

➡️ CVE-2026-3055 👀
👇
support.citrix.com/support-hom

  • CVE-2026-3055 - Out-of-Bounds Read vulnerability - CVSSv4 base score: 9.3
    Note: Citrix NetScaler ADC or Citrix Gateway must be configured as SAML IDP to be vulnerable to CVE-2026-3055.

    • CVE-2026-4368 - Race Condition vulnerability - CVSSv4 base score: 7.7Note: Affected appliances must be configured as a Gateway (SSL VPN, ICA Proxy, CVPN, RDP proxy) or AAA virtual server to be vulnerable CVE-2026-4368.

( -> cve.circl.lu/search?q=CVE-2026 )

#cyberveille #CVE_2026_3055 #infosec

##

CVE-2026-25075
(7.5 HIGH)

EPSS: 0.12%

updated 2026-03-24T15:54:09.400000

1 posts

strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication. Attackers can exploit the failure to validate AVP length fields before subtraction to trigger excessive memory allocation or NULL p

thehackerwire@mastodon.social at 2026-03-23T20:15:20.000Z ##

🟠 CVE-2026-25075 - High (7.5)

strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33512
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-24T15:54:09.400000

1 posts

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the API plugin exposes a `decryptString` action without any authentication. Anyone can submit ciphertext and receive plaintext. Ciphertext is issued publicly (e.g., `view/url2Embed.json.php`), so any user can recover protected tokens/metadata. Commit 3fdeecef37bb88967a02ccc9b9acc8da95de1c13 contains a patch.

thehackerwire@mastodon.social at 2026-03-23T20:09:11.000Z ##

🟠 CVE-2026-33512 - High (7.5)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the API plugin exposes a `decryptString` action without any authentication. Anyone can submit ciphertext and receive plaintext. Ciphertext is issued publicly (e.g....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33651
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-24T15:54:09.400000

1 posts

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `remindMe.json.php` endpoint passes `$_REQUEST['live_schedule_id']` through multiple functions without sanitization until it reaches `Scheduler_commands::getAllActiveOrToRepeat()`, which directly concatenates it into a SQL `LIKE` clause. Although intermediate functions (`new Live_schedule()`, `getUsers_idOrComp

thehackerwire@mastodon.social at 2026-03-23T19:19:37.000Z ##

🟠 CVE-2026-33651 - High (8.1)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `remindMe.json.php` endpoint passes `$_REQUEST['live_schedule_id']` through multiple functions without sanitization until it reaches `Scheduler_commands::getAl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33650
(7.6 HIGH)

EPSS: 0.03%

updated 2026-03-24T15:54:09.400000

1 posts

WWBN AVideo is an open source video platform. In versions up to and including 26.0, a user with the "Videos Moderator" permission can escalate privileges to perform full video management operations — including ownership transfer and deletion of any video — despite the permission being documented as only allowing video publicity changes (Active, Inactive, Unlisted). The root cause is that `Permissi

thehackerwire@mastodon.social at 2026-03-23T19:19:28.000Z ##

🟠 CVE-2026-33650 - High (7.6)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, a user with the "Videos Moderator" permission can escalate privileges to perform full video management operations — including ownership transfer and deletion of ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26828
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-24T15:54:09.400000

1 posts

A NULL pointer dereference in the daap_reply_playlists function (src/httpd_daap.c) of owntone-server commit 3d1652d allows attackers to cause a Denial of Service (DoS) via sending a crafted DAAP request to the server

thehackerwire@mastodon.social at 2026-03-23T17:41:42.000Z ##

🟠 CVE-2026-26828 - High (7.5)

A NULL pointer dereference in the daap_reply_playlists function (src/httpd_daap.c) of owntone-server commit 3d1652d allows attackers to cause a Denial of Service (DoS) via sending a crafted DAAP request to the server

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26829
(7.5 HIGH)

EPSS: 0.73%

updated 2026-03-24T15:54:09.400000

1 posts

A NULL pointer dereference in the safe_atou64 function (src/misc.c) of owntone-server through commit c4d57aa allows attackers to cause a Denial of Service (DoS) via sending a series of crafted HTTP requests to the server.

thehackerwire@mastodon.social at 2026-03-23T17:41:32.000Z ##

🟠 CVE-2026-26829 - High (7.5)

A NULL pointer dereference in the safe_atou64 function (src/misc.c) of owntone-server through commit c4d57aa allows attackers to cause a Denial of Service (DoS) via sending a series of crafted HTTP requests to the server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33483
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-24T15:54:09.400000

1 posts

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `aVideoEncoderChunk.json.php` endpoint is a completely standalone PHP script with no authentication, no framework includes, and no resource limits. An unauthenticated remote attacker can send arbitrary POST data which is written to persistent temp files in `/tmp/` with no size cap, no rate limiting, and no clea

thehackerwire@mastodon.social at 2026-03-23T15:28:09.000Z ##

🟠 CVE-2026-33483 - High (7.5)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `aVideoEncoderChunk.json.php` endpoint is a completely standalone PHP script with no authentication, no framework includes, and no resource limits. An unauthen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33478
(10.0 CRITICAL)

EPSS: 0.66%

updated 2026-03-24T15:54:09.400000

1 posts

WWBN AVideo is an open source video platform. In versions up to and including 26.0, multiple vulnerabilities in AVideo's CloneSite plugin chain together to allow a completely unauthenticated attacker to achieve remote code execution. The `clones.json.php` endpoint exposes clone secret keys without authentication, which can be used to trigger a full database dump via `cloneServer.json.php`. The dum

thehackerwire@mastodon.social at 2026-03-23T15:25:48.000Z ##

🔴 CVE-2026-33478 - Critical (10)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, multiple vulnerabilities in AVideo's CloneSite plugin chain together to allow a completely unauthenticated attacker to achieve remote code execution. The `clones.j...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4001
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-03-24T15:53:48.067000

2 posts

The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.4.1 via the custom pricing formula eval() in the process_custom_formula() function within includes/process/price.php. This is due to insufficient sanitization and validation of user-submitted field values before passing them to PHP's eval() function. The san

Matchbook3469@mastodon.social at 2026-03-24T14:15:02.000Z ##

⛔ New security advisory:

CVE-2026-4001 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

thehackerwire@mastodon.social at 2026-03-24T00:18:58.000Z ##

🔴 CVE-2026-4001 - Critical (9.8)

The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.4.1 via the custom pricing formula eval() in the process_custom_formula() function within includes/proces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4739
(0 None)

EPSS: 0.04%

updated 2026-03-24T15:53:48.067000

4 posts

Integer Overflow or Wraparound vulnerability in InsightSoftwareConsortium ITK (‎Modules/ThirdParty/Expat/src/expat modules).This issue affects ITK: before 2.7.1.

ivycyber@privacysafe.social at 2026-03-24T12:02:16.000Z ##

🛡️ #Cybersecurity news & tips across the #fediverse 👇

“🚨 CVE-2026-4739 (CRITICAL, CVSS 9.4) in ITK: Integer overflow in Expat XML parser enables remote code execution or DoS in medical/scientific apps. Update to v2.7.1 now. User interaction required. Details: https:// ra...”

infosec.exchange/@offseq/11628

🤖 via RSS feed. Not an endorsement.

##

offseq at 2026-03-24T10:30:32.394Z ##

🚨 CVE-2026-4739 (CRITICAL, CVSS 9.4) in ITK: Integer overflow in Expat XML parser enables remote code execution or DoS in medical/scientific apps. Update to v2.7.1 now. User interaction required. Details: radar.offseq.com/threat/cve-20

##

ivycyber@privacysafe.social at 2026-03-24T12:02:16.000Z ##

🛡️ #Cybersecurity news & tips across the #fediverse 👇

“🚨 CVE-2026-4739 (CRITICAL, CVSS 9.4) in ITK: Integer overflow in Expat XML parser enables remote code execution or DoS in medical/scientific apps. Update to v2.7.1 now. User interaction required. Details: https:// ra...”

infosec.exchange/@offseq/11628

🤖 via RSS feed. Not an endorsement.

##

offseq@infosec.exchange at 2026-03-24T10:30:32.000Z ##

🚨 CVE-2026-4739 (CRITICAL, CVSS 9.4) in ITK: Integer overflow in Expat XML parser enables remote code execution or DoS in medical/scientific apps. Update to v2.7.1 now. User interaction required. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #ITK #Infosec

##

CVE-2026-3509
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-24T15:53:48.067000

2 posts

An unauthenticated remote attacker may be able to control the format string of messages processed by the Audit Log of the CODESYS Control runtime system, potentially resulting in a denial‑of‑service (DoS) condition.

certvde at 2026-03-24T07:48:12.401Z ##

VDE-2026-018
CODESYS Control V3 - Externally-controlled format string in Auditlog

The CODESYS Control runtime system's CmpAuditLog component allows potentially unauthenticated remote attackers to control the format string of processed log messages. Due to the internal processing logic, the impact is limited to a crash of the CODESYS Control runtime.
CVE-2026-3509

certvde.com/en/advisories/vde-

codesys.csaf-tp.certvde.com/.w

##

certvde@infosec.exchange at 2026-03-24T07:48:12.000Z ##

#OT #Advisory VDE-2026-018
CODESYS Control V3 - Externally-controlled format string in Auditlog

The CODESYS Control runtime system's CmpAuditLog component allows potentially unauthenticated remote attackers to control the format string of processed log messages. Due to the internal processing logic, the impact is limited to a crash of the CODESYS Control runtime.
#CVE CVE-2026-3509

certvde.com/en/advisories/vde-

#CSAF codesys.csaf-tp.certvde.com/.w

##

CVE-2026-4753
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-24T15:53:48.067000

2 posts

Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects RetroDebugger: before v0.64.72.

thehackerwire@mastodon.social at 2026-03-24T06:23:29.000Z ##

🔴 CVE-2026-4753 - Critical (9.1)

Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects RetroDebugger: before v0.64.72.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T06:23:29.000Z ##

🔴 CVE-2026-4753 - Critical (9.1)

Out-of-bounds Read vulnerability in slajerek RetroDebugger.This issue affects RetroDebugger: before v0.64.72.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4746
(0 None)

EPSS: 0.04%

updated 2026-03-24T15:53:48.067000

2 posts

Out-of-bounds Write vulnerability in timeplus-io proton (base/poco/Foundation/src‎ modules). This vulnerability is associated with program files inflate.C. This issue affects proton: before 1.6.16.

offseq at 2026-03-24T06:00:30.261Z ##

🚨 CRITICAL: CVE-2026-4746 in timeplus-io proton (<1.6.16) allows remote out-of-bounds writes — risk of code execution, system takeover. No auth or user action needed. Patch when available, restrict access now. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-24T06:00:30.000Z ##

🚨 CRITICAL: CVE-2026-4746 in timeplus-io proton (<1.6.16) allows remote out-of-bounds writes — risk of code execution, system takeover. No auth or user action needed. Patch when available, restrict access now. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE20264746 #Vuln

##

CVE-2026-4744
(0 None)

EPSS: 0.01%

updated 2026-03-24T15:53:48.067000

2 posts

Out-of-bounds Read vulnerability in rizonesoft Notepad3 (‎scintilla/oniguruma/src modules). This vulnerability is associated with program files regcomp.C‎. This issue affects Notepad3: before 6.25.714.1.

offseq at 2026-03-24T04:30:30.422Z ##

🛡️ CRITICAL: CVE-2026-4744 in rizonesoft Notepad3 (<6.25.714.1) enables out-of-bounds reads — possible data disclosure & crashes. Patch ASAP, restrict access, and avoid untrusted files. More info: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-24T04:30:30.000Z ##

🛡️ CRITICAL: CVE-2026-4744 in rizonesoft Notepad3 (<6.25.714.1) enables out-of-bounds reads — possible data disclosure & crashes. Patch ASAP, restrict access, and avoid untrusted files. More info: radar.offseq.com/threat/cve-20 #OffSeq #CVE20264744 #infosec #vuln

##

CVE-2026-22739
(8.6 HIGH)

EPSS: 0.02%

updated 2026-03-24T15:53:48.067000

2 posts

Vulnerability in Spring Cloud when substituting the profile parameter from a request made to the Spring Cloud Config Server configured to the native file system as a backend, because it was possible to access files outside of the configured search directories.This issue affects Spring Cloud: from 3.1.X before 3.1.13, from 4.1.X before 4.1.9, from 4.2.X before 4.2.3, from 4.3.X before 4.3.2, from 5

thehackerwire@mastodon.social at 2026-03-24T01:30:39.000Z ##

🟠 CVE-2026-22739 - High (8.6)

Vulnerability in Spring Cloud when substituting the profile parameter from a request made to the Spring Cloud Config Server configured to the native file system as a backend, because it was possible to access files outside of the configured search...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T01:30:39.000Z ##

🟠 CVE-2026-22739 - High (8.6)

Vulnerability in Spring Cloud when substituting the profile parameter from a request made to the Spring Cloud Config Server configured to the native file system as a backend, because it was possible to access files outside of the configured search...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33250
(7.5 HIGH)

EPSS: 0.21%

updated 2026-03-24T15:53:48.067000

3 posts

Freeciv21 is a free open source, turn-based, empire-building strategy game. Versions prior to 3.1.1 crash with a stack overflow when receiving specially-crafted packets. A remote attacker can use this to take down any public server. A malicious server can use this to crash the game on the player's machine. Authentication is not needed and, by default, logs do not contain any useful information. Al

thehackerwire@mastodon.social at 2026-03-24T00:39:20.000Z ##

🟠 CVE-2026-33250 - High (7.5)

Freeciv21 is a free open source, turn-based, empire-building strategy game. Versions prior to 3.1.1 crash with a stack overflow when receiving specially-crafted packets. A remote attacker can use this to take down any public server. A malicious se...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T00:39:20.000Z ##

🟠 CVE-2026-33250 - High (7.5)

Freeciv21 is a free open source, turn-based, empire-building strategy game. Versions prior to 3.1.1 crash with a stack overflow when receiving specially-crafted packets. A remote attacker can use this to take down any public server. A malicious se...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

linux@activitypub.awakari.com at 2026-03-21T20:07:16.000Z ## Debian Bookworm Freeciv Critical DoS Issue DSA-6173-1 CVE-2026-33250 Louis Moureaux discovered that incorrect packet processing in the game server of Freeciv, a free clone of the turn based strateg...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-33282
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-24T15:53:48.067000

1 posts

Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 panic when processing a malformed NGAP LocationReport message with `ue-presence-in-area-of-interest` event type and omitting the optional `UEPresenceInAreaOfInterestList` IE. An attacker able to send crafted NGAP messages to Ella Core can crash the process, causing service disruption for all connected subscribers. No au

thehackerwire@mastodon.social at 2026-03-24T00:19:18.000Z ##

🟠 CVE-2026-33282 - High (7.5)

Ella Core is a 5G core designed for private networks. Versions prior to 1.6.0 panic when processing a malformed NGAP LocationReport message with `ue-presence-in-area-of-interest` event type and omitting the optional `UEPresenceInAreaOfInterestLis...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4306
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-24T15:53:48.067000

1 posts

The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter in all versions up to, and including, 2.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to e

thehackerwire@mastodon.social at 2026-03-23T23:18:06.000Z ##

🟠 CVE-2026-4306 - High (7.5)

The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter in all versions up to, and including, 2.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the exis...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32278
(8.2 HIGH)

EPSS: 0.04%

updated 2026-03-24T15:53:48.067000

2 posts

Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, a Stored Cross-site Scripting (XSS) issue exists in the file field of the Form Plugin. Versions 1.41.1 and 2.41.1 contain a patch.

thehackerwire@mastodon.social at 2026-03-23T22:41:12.000Z ##

🟠 CVE-2026-32278 - High (8.2)

Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, a Stored Cross-site Scripting (XSS) issue exists in the file field of the Form Plugin. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T22:30:41.000Z ##

🟠 CVE-2026-32278 - High (8.2)

Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, a Stored Cross-site Scripting (XSS) issue exists in the file field of the Form Plugin. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32300
(8.1 HIGH)

EPSS: 0.03%

updated 2026-03-24T15:53:48.067000

1 posts

Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, an improper authorization issue in the My Page profile update feature may allow modification of arbitrary user information. Versions 1.41.1 and 2.41.1 contain a patch.

thehackerwire@mastodon.social at 2026-03-23T22:30:57.000Z ##

🟠 CVE-2026-32300 - High (8.1)

Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, an improper authorization issue in the My Page profile update feature may allow modific...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-41660
(8.8 HIGH)

EPSS: 0.21%

updated 2026-03-24T09:30:41

2 posts

A low-privileged remote attacker may be able to replace the boot application of the CODESYS Control runtime system, enabling unauthorized code execution.

certvde at 2026-03-24T07:47:49.079Z ##

VDE-2026-011
CODESYS Control V3 - Untrusted boot application

The CODESYS Control runtime system provides a user management mechanism with multiple privilege groups. While only the privileged Administrators and Developer groups are intended to load or debug applications on the controller, users in the restricted Service group are allowed to perform maintenance operations, including explicitly replacing the boot application.
CVE-2025-41660

certvde.com/en/advisories/vde-

codesys.csaf-tp.certvde.com/.w

##

certvde@infosec.exchange at 2026-03-24T07:47:49.000Z ##

#OT #Advisory VDE-2026-011
CODESYS Control V3 - Untrusted boot application

The CODESYS Control runtime system provides a user management mechanism with multiple privilege groups. While only the privileged Administrators and Developer groups are intended to load or debug applications on the controller, users in the restricted Service group are allowed to perform maintenance operations, including explicitly replacing the boot application.
#CVE CVE-2025-41660

certvde.com/en/advisories/vde-

#CSAF codesys.csaf-tp.certvde.com/.w

##

CVE-2026-4755
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-03-24T09:30:41

2 posts

CWE-20 vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-11.

offseq at 2026-03-24T07:30:27.085Z ##

⚠️ CVE-2026-4755: Critical vuln in MolotovCherry Android-ImageMagick7 (<7.1.2-11). Remote, unauthenticated RCE possible due to improper input validation. Patch ASAP & enforce input checks. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-24T07:30:27.000Z ##

⚠️ CVE-2026-4755: Critical vuln in MolotovCherry Android-ImageMagick7 (<7.1.2-11). Remote, unauthenticated RCE possible due to improper input validation. Patch ASAP & enforce input checks. Details: radar.offseq.com/threat/cve-20 #OffSeq #Android #Vuln #ImageMagick #CVE2026_4755

##

CVE-2026-4745(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-03-24T06:31:25

2 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in dendibakh perf-ninja (labs/misc/pgo/lua modules). This vulnerability is associated with program files ldo.C. This issue affects perf-ninja.

offseq at 2026-03-24T09:00:29.160Z ##

🚨 CRITICAL: CVE-2026-4745 in dendibakh perf-ninja (CVSS 10) — remote code injection flaw in labs/misc/pgo/lua & ldo.C. No exploits yet, but restrict access, monitor logs, and prep for urgent patches. Full system compromise risk. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-24T09:00:29.000Z ##

🚨 CRITICAL: CVE-2026-4745 in dendibakh perf-ninja (CVSS 10) — remote code injection flaw in labs/misc/pgo/lua & ldo.C. No exploits yet, but restrict access, monitor logs, and prep for urgent patches. Full system compromise risk. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #AppSec

##

CVE-2026-4750
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-24T06:31:25

2 posts

Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof: before woof_15.3.0.

thehackerwire@mastodon.social at 2026-03-24T06:23:20.000Z ##

🔴 CVE-2026-4750 - Critical (9.1)

Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof: before woof_15.3.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T06:23:20.000Z ##

🔴 CVE-2026-4750 - Critical (9.1)

Out-of-bounds Read vulnerability in fabiangreffrath woof.This issue affects woof: before woof_15.3.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4662
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-24T06:31:25

2 posts

The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listing_load_more` AJAX action in all versions up to, and including, 3.8.6.1. This is due to the `filtered_query` parameter being excluded from the HMAC signature validation (allowing attacker-controlled input to bypass security checks) combined with the `prepare_where_clause()` method in the SQL Query Builder not sanitizin

thehackerwire@mastodon.social at 2026-03-24T05:25:20.000Z ##

🟠 CVE-2026-4662 - High (7.5)

The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listing_load_more` AJAX action in all versions up to, and including, 3.8.6.1. This is due to the `filtered_query` parameter being excluded from the HMAC signature validatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T05:25:20.000Z ##

🟠 CVE-2026-4662 - High (7.5)

The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listing_load_more` AJAX action in all versions up to, and including, 3.8.6.1. This is due to the `filtered_query` parameter being excluded from the HMAC signature validatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4640
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-24T06:31:25

2 posts

Vitals ESP developed by Galaxy Software Services has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to execute certain functions to obtain sensitive information.

thehackerwire@mastodon.social at 2026-03-24T05:25:11.000Z ##

🟠 CVE-2026-4640 - High (7.5)

Vitals ESP developed by Galaxy Software Services has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to execute certain functions to obtain sensitive information.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T05:25:11.000Z ##

🟠 CVE-2026-4640 - High (7.5)

Vitals ESP developed by Galaxy Software Services has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to execute certain functions to obtain sensitive information.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4283
(9.1 CRITICAL)

EPSS: 0.10%

updated 2026-03-24T06:31:20

2 posts

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthenticated users, which bypasses the intended email-confirmation flow and immediately triggers irreversible account anonymization. This makes it possible for un

thehackerwire@mastodon.social at 2026-03-24T05:26:09.000Z ##

🔴 CVE-2026-4283 - Critical (9.1)

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthentica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T05:26:09.000Z ##

🔴 CVE-2026-4283 - Critical (9.1)

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthentica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4639
(8.8 HIGH)

EPSS: 0.10%

updated 2026-03-24T06:31:14

4 posts

Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby escalating privileges.

ivycyber@privacysafe.social at 2026-03-24T06:02:18.000Z ##

🛡️ #Cybersecurity news & tips across the #fediverse 👇

“🟠 CVE-2026-4639 - High (8.8) Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby es...”

mastodon.social/@thehackerwire

🤖 via RSS feed. Not an endorsement.

##

thehackerwire@mastodon.social at 2026-03-24T05:25:01.000Z ##

🟠 CVE-2026-4639 - High (8.8)

Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby escalating privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

ivycyber@privacysafe.social at 2026-03-24T06:02:18.000Z ##

🛡️ #Cybersecurity news & tips across the #fediverse 👇

“🟠 CVE-2026-4639 - High (8.8) Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby es...”

mastodon.social/@thehackerwire

🤖 via RSS feed. Not an endorsement.

##

thehackerwire@mastodon.social at 2026-03-24T05:25:01.000Z ##

🟠 CVE-2026-4639 - High (8.8)

Vitals ESP developed by Galaxy Software Services has a Incorrect Authorization vulnerability, allowing authenticated remote attackers to perform certain administrative functions, thereby escalating privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4674
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-24T03:31:25

4 posts

Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:43:52.000Z ##

🟠 CVE-2026-4674 - High (8.8)

Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:43:21.000Z ##

🟠 CVE-2026-4674 - High (8.8)

Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:43:52.000Z ##

🟠 CVE-2026-4674 - High (8.8)

Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:43:21.000Z ##

🟠 CVE-2026-4674 - High (8.8)

Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4679
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-24T03:31:25

2 posts

Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:24:05.000Z ##

🟠 CVE-2026-4679 - High (8.8)

Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:24:05.000Z ##

🟠 CVE-2026-4679 - High (8.8)

Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4678
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-24T03:31:25

2 posts

Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:23:56.000Z ##

🟠 CVE-2026-4678 - High (8.8)

Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:23:56.000Z ##

🟠 CVE-2026-4678 - High (8.8)

Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4677
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-24T03:31:25

2 posts

Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:23:47.000Z ##

🟠 CVE-2026-4677 - High (8.8)

Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:23:47.000Z ##

🟠 CVE-2026-4677 - High (8.8)

Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4675
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-24T03:31:25

2 posts

Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T02:17:14.000Z ##

🟠 CVE-2026-4675 - High (8.8)

Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:17:14.000Z ##

🟠 CVE-2026-4675 - High (8.8)

Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4680
(8.8 HIGH)

EPSS: 0.08%

updated 2026-03-24T03:31:25

2 posts

Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-24T01:30:30.000Z ##

🟠 CVE-2026-4680 - High (8.8)

Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T01:30:30.000Z ##

🟠 CVE-2026-4680 - High (8.8)

Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4021
(8.1 HIGH)

EPSS: 0.12%

updated 2026-03-24T00:30:34

1 posts

The Contest Gallery plugin for WordPress is vulnerable to an authentication bypass leading to admin account takeover in all versions up to, and including, 28.1.5. This is due to the email confirmation handler in `users-registry-check-after-email-or-pin-confirmation.php` using the user's email string in a `WHERE ID = %s` clause instead of the numeric user ID, combined with an unauthenticated key-ba

thehackerwire@mastodon.social at 2026-03-24T00:19:08.000Z ##

🟠 CVE-2026-4021 - High (8.1)

The Contest Gallery plugin for WordPress is vulnerable to an authentication bypass leading to admin account takeover in all versions up to, and including, 28.1.5. This is due to the email confirmation handler in `users-registry-check-after-email-o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3533
(8.8 HIGH)

EPSS: 0.22%

updated 2026-03-24T00:30:33

1 posts

The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads due to missing authorization on import_popup_templates() function as well as insufficient file type validation in the upload_files() function in all versions up to, and including, 4.14.1. This makes it possible for Authenticated attackers with Subscriber-level access and above, to upload files with dangerous types that c

thehackerwire@mastodon.social at 2026-03-24T00:23:20.000Z ##

🟠 CVE-2026-3533 - High (8.8)

The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads due to missing authorization on import_popup_templates() function as well as insufficient file type validation in the upload_files() function in all versions up to, and ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60947
(8.8 HIGH)

EPSS: 0.19%

updated 2026-03-24T00:30:28

1 posts

Census CSWeb 8.0.1 allows arbitrary file upload. A remote, authenticated attacker could upload a malicious file, possibly leading to remote code execution. Fixed in 8.1.0 alpha.

thehackerwire@mastodon.social at 2026-03-23T22:43:04.000Z ##

🟠 CVE-2025-60947 - High (8.8)

Census CSWeb 8.0.1 allows arbitrary file upload. A remote, authenticated attacker could upload a malicious file, possibly leading to remote code execution. Fixed in 8.1.0 alpha.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60949
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-03-24T00:30:28

1 posts

Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployments. A remote, unauthenticated attacker could send requests to configuration files and obtain leaked secrets. Fixed in 8.1.0 alpha.

thehackerwire@mastodon.social at 2026-03-23T22:42:46.000Z ##

🔴 CVE-2025-60949 - Critical (9.1)

Census CSWeb 8.0.1 allows "app/config" to be reachable via HTTP in some deployments. A remote, unauthenticated attacker could send requests to configuration files and obtain leaked secrets. Fixed in 8.1.0 alpha.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32902(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-03-24T00:30:28

1 posts

Rejected reason: This CVE ID has been rejected.

thehackerwire@mastodon.social at 2026-03-23T22:29:13.000Z ##

🟠 CVE-2026-32902 - High (8.3)

OpenClaw before 2026.3.1 contains a server-side request forgery vulnerability in web_search citation redirect resolution that allows attackers to target private-network destinations. Attackers who influence citation redirect targets can trigger in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-60946
(8.8 HIGH)

EPSS: 0.12%

updated 2026-03-24T00:30:24

1 posts

Census CSWeb 8.0.1 allows arbitrary file path input. A remote, authenticated attacker could access unintended file directories. Fixed in 8.1.0 alpha.

thehackerwire@mastodon.social at 2026-03-23T22:42:54.000Z ##

🟠 CVE-2025-60946 - High (8.8)

Census CSWeb 8.0.1 allows arbitrary file path input. A remote, authenticated attacker could access unintended file directories. Fixed in 8.1.0 alpha.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32907
(0 None)

EPSS: 0.00%

updated 2026-03-23T23:17:12.130000

1 posts

Rejected reason: This CVE ID has been rejected.

thehackerwire@mastodon.social at 2026-03-23T22:29:04.000Z ##

🟠 CVE-2026-32907 - High (7.8)

OpenClaw before 2026.2.19 contains a local command injection vulnerability in Windows scheduled task script generation that allows attackers to execute arbitrary commands by injecting cmd metacharacters into unsafe gateway.cmd arguments. Attackers...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32913
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-23T21:54:50

1 posts

OpenClaw's `fetchWithSsrFGuard(...)` followed cross-origin redirects while preserving arbitrary caller-supplied headers except for a narrow denylist (`Authorization`, `Proxy-Authorization`, `Cookie`, `Cookie2`). This allowed custom authorization headers such as `X-Api-Key`, `Private-Token`, and similar sensitive headers to be forwarded to a different origin after a redirect. The fix switches cros

1 repos

https://github.com/Rickidevs/CVE-2026-32913

thehackerwire@mastodon.social at 2026-03-23T22:28:54.000Z ##

🔴 CVE-2026-32913 - Critical (9.3)

OpenClaw before 2026.3.7 contains an improper header validation vulnerability in fetchWithSsrFGuard that forwards custom authorization headers across cross-origin redirects. Attackers can trigger redirects to different origins to intercept sensiti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32066(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-03-23T21:52:25

1 posts

### Summary Unauthenticated requests to a reachable Zalo webhook endpoint could trigger unbounded in-memory key growth by varying query strings on the same valid webhook route. ### Impact An attacker could cause memory pressure and potential process instability or OOM, degrading availability. ### Fix Webhook security tracking now normalizes keys to matched webhook path semantics (query excluded)

thehackerwire@mastodon.social at 2026-03-23T22:31:07.000Z ##

🟠 CVE-2026-32066 - High (7.5)

OpenClaw before 2026.3.1 contains an unbounded memory growth vulnerability in the Zalo webhook endpoint that allows unauthenticated attackers to trigger memory exhaustion by varying query strings. Attackers can send repeated requests with differen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32845
(8.4 HIGH)

EPSS: 0.01%

updated 2026-03-23T21:31:53

1 posts

cgltf version 1.15 and prior contain an integer overflow vulnerability in the cgltf_validate() function when validating sparse accessors that allows attackers to trigger out-of-bounds reads by supplying crafted glTF/GLB input files with attacker-controlled size values. Attackers can exploit unchecked arithmetic operations in sparse accessor validation to cause heap buffer over-reads in cgltf_calc_

thehackerwire@mastodon.social at 2026-03-23T21:00:12.000Z ##

🟠 CVE-2026-32845 - High (8.4)

cgltf version 1.15 and prior contain an integer overflow vulnerability in the cgltf_validate() function when validating sparse accessors that allows attackers to trigger out-of-bounds reads by supplying crafted glTF/GLB input files with attacker-c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32299
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-23T20:38:17

1 posts

# Security Advisory — Page Content Retrieval (Improper Authorization) ## Summary An improper authorization issue in the page content retrieval feature may allow retrieval of non-public information. ## Affected Versions - 1.x series: <= 1.41.0 - 2.x series: <= 2.41.0 ## Patched Versions - 1.41.1 - 2.41.1 ## Description In part of the page content retrieval feature, insufficient authorizatio

thehackerwire@mastodon.social at 2026-03-23T22:30:48.000Z ##

🟠 CVE-2026-32299 - High (7.5)

Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, an improper authorization issue in the page content retrieval feature may allow retriev...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32277
(8.7 HIGH)

EPSS: 0.03%

updated 2026-03-23T20:35:51

2 posts

# Security Advisory — Cabinet Plugin (DOM-based XSS) ## Summary A DOM-based Cross-Site Scripting (XSS) issue exists in the Cabinet Plugin list view. ## Affected Versions - 1.x series: >= 1.35.0, <= 1.41.0 - 2.x series: >= 2.35.0, <= 2.41.0 ## Patched Versions - 1.41.1 - 2.41.1 ## Description In the Cabinet Plugin list view, DOM-based Cross-Site Scripting (XSS) could occur due to how saved

thehackerwire@mastodon.social at 2026-03-23T22:41:02.000Z ##

🟠 CVE-2026-32277 - High (8.7)

Connect-CMS is a content management system. In versions 1.35.0 through 1.41.0 and 2.35.0 through 2.41.0, a DOM-based Cross-Site Scripting (XSS) issue exists in the Cabinet Plugin list view. Versions 1.41.1 and 2.41.1 contain a patch.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T22:30:31.000Z ##

🟠 CVE-2026-32277 - High (8.7)

Connect-CMS is a content management system. In versions 1.35.0 through 1.41.0 and 2.35.0 through 2.41.0, a DOM-based Cross-Site Scripting (XSS) issue exists in the Cabinet Plugin list view. Versions 1.41.1 and 2.41.1 contain a patch.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32276
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-23T20:33:35

1 posts

# Security Advisory — Code Study Plugin ## Summary An authenticated user may be able to execute arbitrary code in the Code Study Plugin. ## Affected Versions - 1.x series: <= 1.41.0 - 2.x series: <= 2.41.0 ## Patched Versions - 1.41.1 - 2.41.1 ## Description In the Code Study Plugin, an authenticated user could trigger unintended code execution. If exploited, it may lead to code execution

thehackerwire@mastodon.social at 2026-03-23T22:30:22.000Z ##

🟠 CVE-2026-32276 - High (8.8)

Connect-CMS is a content management system. In versions on the 1.x series up to and including 1.41.0 and versions on the 2.x series up to and including 2.41.0, an authenticated user may be able to execute arbitrary code in the Code Study Plugin. V...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26209
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-23T20:24:00

1 posts

### Summary - The `cbor2` library is vulnerable to a Denial of Service (DoS) attack caused by uncontrolled recursion when decoding deeply nested CBOR structures. - This vulnerability affects both the pure Python implementation and the C extension (`_cbor2`). The C extension correctly uses Python's C-API for recursion protection (`Py_EnterRecursiveCall`), but this mechanism is designed to prevent

thehackerwire@mastodon.social at 2026-03-23T21:00:02.000Z ##

🟠 CVE-2026-26209 - High (7.5)

cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) serialization format. Versions prior to 5.9.0 are vulnerable to a Denial of Service (DoS) attack caused by uncontrolled recursion when decoding deeply nested ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33228
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-23T19:14:31.040000

1 posts

flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function in flatted can use attacker-controlled string values from the parsed JSON as direct array index keys, without validating that they are numeric. Since the internal input buffer is a JavaScript Array, accessing it with the key "__proto__" returns Array.prototype via the inherited getter. This object is then treated as a

thehackerwire@mastodon.social at 2026-03-23T21:00:24.000Z ##

🔴 CVE-2026-33228 - Critical (9.8)

flatted is a circular JSON parser. Prior to version 3.4.2, the parse() function in flatted can use attacker-controlled string values from the parsed JSON as direct array index keys, without validating that they are numeric. Since the internal inpu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4437
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-23T18:31:30

1 posts

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violation of the DNS specification that causes the application to treat a non-answer section of the DNS response as a valid answer.

thehackerwire@mastodon.social at 2026-03-23T17:00:28.000Z ##

🟠 CVE-2026-4437 - High (7.5)

Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server, result in a violatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4404
(9.4 CRITICAL)

EPSS: 0.04%

updated 2026-03-23T18:30:31

1 posts

Use of hard coded credentials in GoHarbor Harbor version 2.15.0 and below, allows attackers to use the default password and gain access to the web UI.

thehackerwire@mastodon.social at 2026-03-23T16:17:47.000Z ##

🔴 CVE-2026-4404 - Critical (9.4)

Use of hard coded credentials in GoHarbor Harbor version 2.15.0 and below, allows attackers to use the default password and gain access to the web UI.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33513
(8.6 HIGH)

EPSS: 0.15%

updated 2026-03-23T17:31:53

1 posts

### Summary An unauthenticated API endpoint (`APIName=locale`) concatenates user input into an `include` path with no canonicalization or whitelist. Path traversal is accepted, so arbitrary PHP files under the web root can be included. In our test this yielded confirmed file disclosure and code execution of existing PHP content (e.g., `view/about.php`), and it *can* escalate to RCE if an attacker

thehackerwire@mastodon.social at 2026-03-23T20:09:21.000Z ##

🟠 CVE-2026-33513 - High (8.6)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, an unauthenticated API endpoint (`APIName=locale`) concatenates user input into an `include` path with no canonicalization or whitelist. Path traversal is accepted...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32049
(7.5 HIGH)

EPSS: 0.12%

updated 2026-03-23T17:09:08.487000

1 posts

OpenClaw versions prior to 2026.2.22 fail to consistently enforce configured inbound media byte limits before buffering remote media across multiple channel ingestion paths. Remote attackers can send oversized media payloads to trigger elevated memory usage and potential process instability.

thehackerwire@mastodon.social at 2026-03-21T22:15:38.000Z ##

🟠 CVE-2026-32049 - High (7.5)

OpenClaw versions prior to 2026.2.22 fail to consistently enforce configured inbound media byte limits before buffering remote media across multiple channel ingestion paths. Remote attackers can send oversized media payloads to trigger elevated me...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33292
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-23T16:18:24.447000

1 posts

WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS streaming endpoint (`view/hls.php`) is vulnerable to a path traversal attack that allows an unauthenticated attacker to stream any private or paid video on the platform. The `videoDirectory` GET parameter is used in two divergent code paths — one for authorization (which truncates at the first `/` segment) and one for fil

thehackerwire@mastodon.social at 2026-03-22T20:03:42.000Z ##

🟠 CVE-2026-33292 - High (7.5)

WWBN AVideo is an open source video platform. Prior to version 26.0, the HLS streaming endpoint (`view/hls.php`) is vulnerable to a path traversal attack that allows an unauthenticated attacker to stream any private or paid video on the platform. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4599
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-03-23T16:17:45.400000

3 posts

Versions of the package jsrsasign from 7.0.0 and before 11.1.1 are vulnerable to Incomplete Comparison with Missing Factors via the getRandomBigIntegerZeroToMax and getRandomBigIntegerMinToMax functions in src/crypto-1.1.js; an attacker can recover the private key by exploiting the incorrect compareTo checks that accept out-of-range candidates and thus bias DSA nonces during signature generation.

offseq@infosec.exchange at 2026-03-23T10:30:26.000Z ##

🔥 CRITICAL: CVE-2026-4599 in jsrsasign 7.0.0 – 11.1.1 lets attackers recover private keys via DSA nonce bias. No auth needed — patch ASAP or add nonce checks! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Cryptography #CVE20264599

##

thehackerwire@mastodon.social at 2026-03-23T06:33:05.000Z ##

🔴 CVE-2026-4599 - Critical (9.1)

Versions of the package jsrsasign from 7.0.0 and before 11.1.1 are vulnerable to Incomplete Comparison with Missing Factors via the getRandomBigIntegerZeroToMax and getRandomBigIntegerMinToMax functions in src/crypto-1.1.js; an attacker can recove...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T06:18:14.000Z ##

🔴 CVE-2026-4599 - Critical (9.1)

Versions of the package jsrsasign from 7.0.0 and before 11.1.1 are vulnerable to Incomplete Comparison with Missing Factors via the getRandomBigIntegerZeroToMax and getRandomBigIntegerMinToMax functions in src/crypto-1.1.js; an attacker can recove...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33017
(0 None)

EPSS: 0.36%

updated 2026-03-23T16:16:48.757000

3 posts

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored f

3 repos

https://github.com/SimoesCTT/Sovereign-Echo-33017

https://github.com/omer-efe-curkus/CVE-2026-33017-Langflow-RCE-PoC

https://github.com/MaxMnMl/langflow-CVE-2026-33017-poc

threatcodex@infosec.exchange at 2026-03-23T13:29:46.000Z ##

CVE-2026-33017: How attackers compromised Langflow AI pipelines in 20 hours
#CVE_2026_33017
sysdig.com/blog/cve-2026-33017

##

_r_netsec@infosec.exchange at 2026-03-22T16:58:05.000Z ##

Langflow Got Hacked Twice Through the Same exec() Call - CVE-2026-33017 (CVSS 9.3) exploited in 20 hours with no public PoC blog.barrack.ai/langflow-exec-

##

threatcodex@infosec.exchange at 2026-03-22T00:29:59.000Z ##

CVE-2026–33017: How I Found an Unauthenticated RCE in Langflow by Reading the Code They Already Fixed
#CVE_2026–33017
medium.com/@aviral23/cve-2026-

##

CVE-2026-24060
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-03-23T16:16:43.553000

1 posts

Service information is not encrypted when transmitted as BACnet packets over the wire, and can be sniffed, intercepted, and modified by an attacker. Valuable information such as the File Start Position and File Data can be sniffed from network traffic using Wireshark's BACnet dissector filter. The proprietary format used by WebCTRL to receive updates from the PLC can also be sniffed and rever

thehackerwire@mastodon.social at 2026-03-21T23:00:22.000Z ##

🔴 CVE-2026-24060 - Critical (9.1)

Service information is not encrypted when transmitted as BACnet packets
over the wire, and can be sniffed, intercepted, and modified by an
attacker. Valuable information such as the File Start Position and File
Data can be sniffed from network ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4602
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-23T16:08:58.320000

2 posts

Versions of the package jsrsasign before 11.1.1 are vulnerable to Incorrect Conversion between Numeric Types due to handling negative exponents in ext/jsbn2.js. An attacker can force the computation of incorrect modular inverses and break signature verification by calling modPow with a negative exponent.

thehackerwire@mastodon.social at 2026-03-23T06:32:47.000Z ##

🟠 CVE-2026-4602 - High (7.5)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Incorrect Conversion between Numeric Types due to handling negative exponents in ext/jsbn2.js. An attacker can force the computation of incorrect modular inverses and break signatur...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T06:17:55.000Z ##

🟠 CVE-2026-4602 - High (7.5)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Incorrect Conversion between Numeric Types due to handling negative exponents in ext/jsbn2.js. An attacker can force the computation of incorrect modular inverses and break signatur...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33352
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-23T15:56:03.963000

1 posts

WWBN AVideo is an open source video platform. Prior to version 26.0, an unauthenticated SQL injection vulnerability exists in `objects/category.php` in the `getAllCategories()` method. The `doNotShowCats` request parameter is sanitized only by stripping single-quote characters (`str_replace("'", '', ...)`), but this is trivially bypassed using a backslash escape technique to shift SQL string bound

thehackerwire@mastodon.social at 2026-03-23T14:38:22.000Z ##

🔴 CVE-2026-33352 - Critical (9.8)

WWBN AVideo is an open source video platform. Prior to version 26.0, an unauthenticated SQL injection vulnerability exists in `objects/category.php` in the `getAllCategories()` method. The `doNotShowCats` request parameter is sanitized only by str...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-46597
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-23T15:31:42

1 posts

Bitcoin Core 0.13.0 through 29.x has an integer overflow.

CVE-2026-22163
(7.9 HIGH)

EPSS: 0.01%

updated 2026-03-23T15:31:41

2 posts

Requires malware code to misuse the DDK kernel module IOCTL interface. Such code can use the interface in an unsupported way that allows subversion of the GPU to perform writes to arbitrary physical memory pages. The product utilises a shared resource in a concurrent manner but does not attempt to synchronise access to the resource.

thehackerwire@mastodon.social at 2026-03-23T17:00:19.000Z ##

🟠 CVE-2026-22163 - High (7.8)

Requires malware code to misuse the DDK kernel module IOCTL interface.

Such code can use the interface in an unsupported way that allows subversion of the GPU to perform writes to arbitrary physical memory pages.

The product utilises a shared re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T16:13:36.000Z ##

🟠 CVE-2026-22163 - High (7.8)

Requires malware code to misuse the DDK kernel module IOCTL interface.

Such code can use the interface in an unsupported way that allows subversion of the GPU to perform writes to arbitrary physical memory pages.

The product utilises a shared re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21992
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-03-23T15:30:30.950000

5 posts

Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) and Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle

jbhall56 at 2026-03-24T12:28:46.090Z ##

CVE-2026-21992 can be used without authentication for remote code execution and it may have been exploited in the wild. securityweek.com/oracle-releas

##

jbhall56@infosec.exchange at 2026-03-24T12:28:46.000Z ##

CVE-2026-21992 can be used without authentication for remote code execution and it may have been exploited in the wild. securityweek.com/oracle-releas

##

technadu@infosec.exchange at 2026-03-23T10:33:23.000Z ##

Oracle alert 🚨
CVE-2026-21992 → unauth RCE (9.8)
Identity systems = high-value target
Emergency patch released

Source: securityweek.com/oracle-releas

Assume breach? 👇
Follow @technadu

#Infosec #ZeroDay #Oracle

##

offseq@infosec.exchange at 2026-03-23T06:00:26.000Z ##

🔴 CRITICAL: Oracle Identity Manager RCE (CVE-2026-21992) allows unauthenticated remote code execution. No active exploitation reported yet, but patch now to avoid full compromise. Review deployments and restrict access. radar.offseq.com/threat/oracle #OffSeq #Oracle #Vuln #Patch

##

thehackerwire@mastodon.social at 2026-03-22T01:41:03.000Z ##

🔴 CVE-2026-21992 - Critical (9.8)

Vulnerability in the Oracle Identity Manager product of Oracle Fusion Middleware (component: REST WebServices) and Oracle Web Services Manager product of Oracle Fusion Middleware (component: Web Services Security). Supported versions that are aff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4434
(8.1 HIGH)

EPSS: 0.02%

updated 2026-03-23T15:16:35.523000

1 posts

Improper certificate validation in the PAM propagation WinRM connections allows a network attacker to perform a man-in-the-middle attack via disabled TLS certificate verification.

thehackerwire@mastodon.social at 2026-03-23T17:00:38.000Z ##

🟠 CVE-2026-4434 - High (8.1)

Improper certificate validation in the PAM propagation WinRM connections
allows a network attacker to perform a man-in-the-middle attack via
disabled TLS certificate verification.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23554
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-23T15:16:32.060000

2 posts

The Intel EPT paging code uses an optimization to defer flushing of any cached EPT state until the p2m lock is dropped, so that multiple modifications done under the same locked region only issue a single flush. Freeing of paging structures however is not deferred until the flushing is done, and can result in freed pages transiently being present in cached state. Such stale entries can point to m

thehackerwire@mastodon.social at 2026-03-23T16:14:25.000Z ##

🟠 CVE-2026-23554 - High (7.8)

The Intel EPT paging code uses an optimization to defer flushing of any cached
EPT state until the p2m lock is dropped, so that multiple modifications done
under the same locked region only issue a single flush.

Freeing of paging structures howev...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T16:13:26.000Z ##

🟠 CVE-2026-23554 - High (7.8)

The Intel EPT paging code uses an optimization to defer flushing of any cached
EPT state until the p2m lock is dropped, so that multiple modifications done
under the same locked region only issue a single flush.

Freeing of paging structures howev...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21732
(9.6 CRITICAL)

EPSS: 0.04%

updated 2026-03-23T15:16:31.653000

1 posts

A web page that contains unusual GPU shader code is loaded into the GPU compiler process and can trigger a write out-of-bounds write crash in the GPU shader compiler library. On certain platforms, when the compiler process has system privileges this could enable further exploits on the device. An edge case using a very large value in switch statements in GPU shader code can cause a segmentation

thehackerwire@mastodon.social at 2026-03-23T16:13:30.000Z ##

🔴 CVE-2026-21732 - Critical (9.6)

A web page that contains unusual GPU shader code is loaded into the GPU compiler process and can trigger a write out-of-bounds write crash in the GPU shader compiler library. On certain platforms, when the compiler process has system privileges th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63261
(7.8 HIGH)

EPSS: 0.05%

updated 2026-03-23T15:16:29.387000

1 posts

AWStats 8.0 is vulnerable to Command Injection via the open function

thehackerwire@mastodon.social at 2026-03-23T16:13:39.000Z ##

🟠 CVE-2025-63261 - High (7.8)

AWStats 8.0 is vulnerable to Command Injection via the open function

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4497
(7.3 HIGH)

EPSS: 2.40%

updated 2026-03-23T14:32:02.800000

1 posts

A vulnerability was determined in Totolink WA300 5.2cu.7112_B20190227. Affected by this issue is the function recvUpgradeNewFw of the file /cgi-bin/cstecgi.cgi. This manipulation causes os command injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

📈 CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-31904
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-23T14:32:02.800000

1 posts

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access.

thehackerwire@mastodon.social at 2026-03-22T00:01:41.000Z ##

🟠 CVE-2026-31904 - High (7.5)

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charge...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33180
(7.5 HIGH)

EPSS: 0.03%

updated 2026-03-23T14:32:02.800000

1 posts

HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.0, when setting headers in HTTP requests, the internal HTTP client sends headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the Location: response header value. Sendin

thehackerwire@mastodon.social at 2026-03-22T00:00:23.000Z ##

🟠 CVE-2026-33180 - High (7.5)

HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.0, when setting headers in HTTP requests, the internal HTTP client sends headers first to the host in the initial URL but...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33243
(8.2 HIGH)

EPSS: 0.01%

updated 2026-03-23T14:32:02.800000

1 posts

barebox is a bootloader. In barebox from version 2016.03.0 to before version 2025.09.3 and from version 2025.10.0 to before version 2026.03.1, when creating a FIT, mkimage(1) sets the hashed-nodes property of the FIT signature node to list which nodes of the FIT were hashed as part of the signing process as these will need to be verified later on by the bootloader. However, hashed-nodes itself is

thehackerwire@mastodon.social at 2026-03-21T23:17:02.000Z ##

🟠 CVE-2026-33243 - High (8.2)

barebox is a bootloader. In barebox from version 2016.03.0 to before version 2025.09.3 and from version 2025.10.0 to before version 2026.03.1, when creating a FIT, mkimage(1) sets the hashed-nodes property of the FIT signature node to list which n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32048
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-23T14:32:02.800000

1 posts

OpenClaw versions prior to 2026.3.1 fail to enforce sandbox inheritance during cross-agent sessions_spawn operations, allowing sandboxed sessions to create child processes under unsandboxed agents. An attacker with a sandboxed session can exploit this to spawn child runtimes with sandbox.mode set to off, bypassing runtime confinement restrictions.

thehackerwire@mastodon.social at 2026-03-21T22:15:28.000Z ##

🟠 CVE-2026-32048 - High (7.5)

OpenClaw versions prior to 2026.3.1 fail to enforce sandbox inheritance during cross-agent sessions_spawn operations, allowing sandboxed sessions to create child processes under unsandboxed agents. An attacker with a sandboxed session can exploit ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4585
(9.8 CRITICAL)

EPSS: 0.15%

updated 2026-03-23T14:31:37.267000

2 posts

A vulnerability has been found in Tiandy Easy7 Integrated Management Platform up to 7.17.0. This vulnerability affects unknown code of the file /Easy7/apps/WebService/ImportSystemConfiguration.jsp of the component Configuration Handler. The manipulation of the argument File leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be

thehackerwire@mastodon.social at 2026-03-23T13:14:52.000Z ##

🔴 CVE-2026-4585 - Critical (9.8)

A vulnerability has been found in Tiandy Easy7 Integrated Management Platform up to 7.17.0. This vulnerability affects unknown code of the file /Easy7/apps/WebService/ImportSystemConfiguration.jsp of the component Configuration Handler. The manipu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T13:06:36.000Z ##

🔴 CVE-2026-4585 - Critical (9.8)

A vulnerability has been found in Tiandy Easy7 Integrated Management Platform up to 7.17.0. This vulnerability affects unknown code of the file /Easy7/apps/WebService/ImportSystemConfiguration.jsp of the component Configuration Handler. The manipu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4567
(9.8 CRITICAL)

EPSS: 0.09%

updated 2026-03-23T14:31:37.267000

2 posts

A vulnerability has been found in Tenda A15 15.13.07.13. The impacted element is the function UploadCfg of the file /cgi-bin/UploadCfg. The manipulation of the argument File leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-03-23T03:18:40.000Z ##

🔴 CVE-2026-4567 - Critical (9.8)

A vulnerability has been found in Tenda A15 15.13.07.13. The impacted element is the function UploadCfg of the file /cgi-bin/UploadCfg. The manipulation of the argument File leads to stack-based buffer overflow. The attack may be initiated remotel...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-23T03:00:27.000Z ##

🔥 CVE-2026-4567: Critical stack buffer overflow in Tenda A15 (v15.13.07.13). Remote, unauthenticated code execution possible via /cgi-bin/UploadCfg. Patch or restrict access immediately! radar.offseq.com/threat/cve-20 #OffSeq #infosec #routersecurity #CVE20264567

##

CVE-2026-4534
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-23T14:31:37.267000

2 posts

A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-03-22T20:59:59.000Z ##

🟠 CVE-2026-4534 - High (8.8)

A flaw has been found in Tenda FH451 1.0.0.9. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. This manipulation of the argument GO causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-22T07:30:26.000Z ##

🔎 CVE-2026-4534 (HIGH, CVSS 8.7): Stack-based buffer overflow in Tenda FH451 (v1.0.0.9) lets remote attackers execute code. PoC exploit published. Patch/mitigate now — restrict access & monitor for attacks. Info: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Tenda #InfoSec

##

CVE-2026-4552
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-23T14:31:37.267000

1 posts

A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component Parameters Handler. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-03-22T20:59:47.000Z ##

🟠 CVE-2026-4552 - High (8.8)

A vulnerability was determined in Tenda F453 1.0.0.3. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component Parameters Handler. Executing a manipulation of the argument page can lead to stack-based buffer o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4551
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-23T14:31:37.267000

1 posts

A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSafeClientFilter of the file /goform/SafeClientFilter of the component Parameters Handler. Performing a manipulation of the argument menufacturer/Go results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-03-22T20:20:23.000Z ##

🟠 CVE-2026-4551 - High (8.8)

A vulnerability was found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSafeClientFilter of the file /goform/SafeClientFilter of the component Parameters Handler. Performing a manipulation of the argument menufacturer/Go resul...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4540
(7.3 HIGH)

EPSS: 0.03%

updated 2026-03-23T14:31:37.267000

1 posts

A vulnerability was detected in projectworlds Online Notes Sharing System 1.0. This issue affects some unknown processing of the file /login.php of the component Parameters Handler. The manipulation of the argument User results in sql injection. The attack can be executed remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-03-22T09:00:27.000Z ##

🛡️ CVE-2026-4540: MEDIUM-severity SQL Injection in projectworlds Online Notes Sharing System v1.0. Exploit code is public, no active attacks yet. Patch or mitigate — focus on the 'Benutzer' param in /login.php. More info: radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Vuln

##

CVE-2026-4529
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-23T14:31:37.267000

2 posts

A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

offseq@infosec.exchange at 2026-03-22T01:30:27.000Z ##

🚨 CVE-2026-4529: HIGH severity stack-based buffer overflow in D-Link DHP-1320 (1.00WWB04) via SOAP Handler. Public exploit out. Device is EOL, no patch — isolate or replace now! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #DLink #BufferOverflow #InfoSec

##

thehackerwire@mastodon.social at 2026-03-21T23:17:53.000Z ##

🟠 CVE-2026-4529 - High (8.8)

A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. The attack can be executed remotely. The exploit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32969
(7.5 HIGH)

EPSS: 0.15%

updated 2026-03-23T12:30:36

4 posts

An unauthenticated remote attacker can exploit a Pre-Auth blind SQL Injection vulnerability in the userinfo endpoint’s authentication method due to improper neutralization of special elements in a SQL SELECT command. This can result in a total loss of confidentiality.

thehackerwire@mastodon.social at 2026-03-23T13:15:02.000Z ##

🟠 CVE-2026-32969 - High (7.5)

An unauthenticated remote attacker can exploit a Pre-Auth blind SQL Injection vulnerability in the userinfo endpoint’s authentication method due to improper neutralization of special elements in a SQL SELECT command. This can result in a total l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T13:06:46.000Z ##

🟠 CVE-2026-32969 - High (7.5)

An unauthenticated remote attacker can exploit a Pre-Auth blind SQL Injection vulnerability in the userinfo endpoint’s authentication method due to improper neutralization of special elements in a SQL SELECT command. This can result in a total l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

certvde@infosec.exchange at 2026-03-23T11:20:27.000Z ##

#OT #Advisory VDE-2026-025
Helmholz: Multiple Vulnerabilities in myREX24V2 / myREX24V2.virtual

Multiple vulnerabilities have been discovered in Helmholz myREX24V2 / myREX24V2.virtual that could allow unauthenticated RCE or SQLi.
#CVE CVE-2026-32968, CVE-2026-32969

certvde.com/en/advisories/vde-

#CSAF helmholz.csaf-tp.certvde.com/.

##

certvde@infosec.exchange at 2026-03-23T11:20:00.000Z ##

#OT #Advisory VDE-2026-024
MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24

Multiple vulnerabilities have been discovered in MB connect line mbCONNECT24/mymbCONNECT24 that could allow unauthenticated RCE or SQLi.
#CVE CVE-2026-32968, CVE-2026-32969

certvde.com/en/advisories/vde-

#CSAF mbconnectline.csaf-tp.certvde.

##

CVE-2026-32968
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-03-23T12:30:31

3 posts

Due to the improper neutralisation of special elements used in an OS command, an unauthenticated remote attacker can exploit an RCE vulnerability in the com_mb24sysapi module, resulting in full system compromise. This vulnerability is a variant attack for CVE-2020-10383.

thehackerwire@mastodon.social at 2026-03-23T13:06:49.000Z ##

🔴 CVE-2026-32968 - Critical (9.8)

Due to the improper neutralisation of special elements used in an OS command, an unauthenticated remote attacker can exploit an RCE vulnerability in the com_mb24sysapi module, resulting in full system compromise. This vulnerability is a variant at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

certvde@infosec.exchange at 2026-03-23T11:20:27.000Z ##

#OT #Advisory VDE-2026-025
Helmholz: Multiple Vulnerabilities in myREX24V2 / myREX24V2.virtual

Multiple vulnerabilities have been discovered in Helmholz myREX24V2 / myREX24V2.virtual that could allow unauthenticated RCE or SQLi.
#CVE CVE-2026-32968, CVE-2026-32969

certvde.com/en/advisories/vde-

#CSAF helmholz.csaf-tp.certvde.com/.

##

certvde@infosec.exchange at 2026-03-23T11:20:00.000Z ##

#OT #Advisory VDE-2026-024
MB connect line: Multiple Vulnerabilities in mbCONNECT24/mymbCONNECT24

Multiple vulnerabilities have been discovered in MB connect line mbCONNECT24/mymbCONNECT24 that could allow unauthenticated RCE or SQLi.
#CVE CVE-2026-32968, CVE-2026-32969

certvde.com/en/advisories/vde-

#CSAF mbconnectline.csaf-tp.certvde.

##

CVE-2026-3587
(10.0 CRITICAL)

EPSS: 0.09%

updated 2026-03-23T09:30:29

3 posts

An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface and gain root access to the underlying Linux based OS, leading to full compromise of the device.

1 repos

https://github.com/z3r0h3ro/cve-2026-3587-poc

offseq@infosec.exchange at 2026-03-23T09:00:32.000Z ##

WAGO 852-1812 switch hit with CRITICAL CVE-2026-3587 (CVSS 10.0): hidden CLI lets remote attackers gain root with no auth. No patch yet. Isolate, restrict access, & monitor closely. radar.offseq.com/threat/cve-20 #OffSeq #ICS #Infosec #Vulnerability

##

thehackerwire@mastodon.social at 2026-03-23T08:16:56.000Z ##

🔴 CVE-2026-3587 - Critical (10)

An unauthenticated remote attacker can exploit a hidden function in the CLI prompt to escape the restricted interface and gain root access to the underlying Linux based OS, leading to full compromise of the device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

certvde@infosec.exchange at 2026-03-23T08:02:01.000Z ##

#OT #Advisory VDE-2026-020
WAGO: Vulnerability in managed switches

A vulnerability has been found affecting the Managed Switches of WAGO. An unauthenticated attacker can fully compromise the device via an undocumented function.
#CVE CVE-2026-3587

certvde.com/en/advisories/vde-

#CSAF wago.csaf-tp.certvde.com/.well

##

CVE-2026-4601
(8.7 HIGH)

EPSS: 0.02%

updated 2026-03-23T06:30:39

2 posts

Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Cryptographic Step via the KJUR.crypto.DSA.signWithMessageHash process in the DSA signing implementation. An attacker can recover the private key by forcing r or s to be zero, so the library emits an invalid signature without retrying, and then solves for x from the resulting signature.

offseq@infosec.exchange at 2026-03-23T07:30:30.000Z ##

🛡️ CVE-2026-4601: CRITICAL bug in jsrsasign <11.1.1 misses a vital DSA signing step, letting attackers recover private keys if exploited. No active attacks yet, but update ASAP! Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE20264601 #Crypto #Vuln

##

thehackerwire@mastodon.social at 2026-03-23T06:18:16.000Z ##

🟠 CVE-2026-4601 - High (8.7)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Missing Cryptographic Step via the KJUR.crypto.DSA.signWithMessageHash process in the DSA signing implementation. An attacker can recover the private key by forcing r or s to be zer...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4598
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-23T06:30:39

2 posts

Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop via the bnModInverse function in ext/jsbn2.js when the BigInteger.modInverse implementation receives zero or negative inputs, allowing an attacker to hang the process permanently by supplying such crafted values (e.g., modInverse(0, m) or modInverse(-1, m)).

thehackerwire@mastodon.social at 2026-03-23T06:32:56.000Z ##

🟠 CVE-2026-4598 - High (7.5)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop via the bnModInverse function in ext/jsbn2.js when the BigInteger.modInverse implementation receives zero or negative inputs, allowing an attacker to hang the process ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T06:18:05.000Z ##

🟠 CVE-2026-4598 - High (7.5)

Versions of the package jsrsasign before 11.1.1 are vulnerable to Infinite loop via the bnModInverse function in ext/jsbn2.js when the BigInteger.modInverse implementation receives zero or negative inputs, allowing an attacker to hang the process ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4606(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-03-23T03:31:45

1 posts

GV Edge Recording Manager (ERM) v2.3.1 improperly runs application components with SYSTEM-level privileges, allowing any local user to gain full control of the operating system.  During installation, ERM creates a Windows service that runs under the LocalSystem account.  When the ERM application is launched, related processes are spawned under SYSTEM privileges rather than the security context o

offseq@infosec.exchange at 2026-03-23T04:30:28.000Z ##

🚨 CRITICAL: CVE-2026-4606 in GeoVision GV-Edge Recording Manager 2.3.1 allows any local user to escalate to SYSTEM privileges (CVSS 10.0). Patch or restrict local access now! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #WindowsSecurity #GeoVision

##

CVE-2026-4566
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-23T03:31:45

2 posts

A flaw has been found in Belkin F9K1122 1.00.33. The affected element is the function formWISP5G of the file /goform/formWISP5G. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-03-23T03:19:00.000Z ##

🟠 CVE-2026-4566 - High (8.8)

A flaw has been found in Belkin F9K1122 1.00.33. The affected element is the function formWISP5G of the file /goform/formWISP5G. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T03:18:33.000Z ##

🟠 CVE-2026-4566 - High (8.8)

A flaw has been found in Belkin F9K1122 1.00.33. The affected element is the function formWISP5G of the file /goform/formWISP5G. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4565
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-23T03:31:45

2 posts

A vulnerability was detected in Tenda AC21 16.03.08.16. Impacted is the function formSetQosBand of the file /goform/SetNetControlList. Performing a manipulation of the argument list results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-03-23T01:30:28.000Z ##

🚨 HIGH: CVE-2026-4565 — Tenda AC21 (16.03.08.16) has a remote buffer overflow in /goform/SetNetControlList. Public exploit out; full device compromise possible. Disable WAN admin, monitor, and segment networks ASAP. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #NetSec #Router

##

thehackerwire@mastodon.social at 2026-03-23T01:26:57.000Z ##

🟠 CVE-2026-4565 - High (8.8)

A vulnerability was detected in Tenda AC21 16.03.08.16. Impacted is the function formSetQosBand of the file /goform/SetNetControlList. Performing a manipulation of the argument list results in buffer overflow. The attack can be initiated remotely....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2580
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-23T00:31:08

2 posts

The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 4.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers

1 repos

https://github.com/ibrahmsql/CVE-2026-25807-Exploit

thehackerwire@mastodon.social at 2026-03-23T00:44:52.000Z ##

🟠 CVE-2026-2580 - High (7.5)

The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 4.9.1 due to insufficie...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-23T00:00:38.000Z ##

⚠️ HIGH severity alert: CVE-2026-2580 – SQL Injection in flippercode WP Maps plugin for WordPress (all versions). Unauthenticated attackers can exfiltrate data via 'orderby'. Patch or mitigate ASAP. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #SQLi

##

CVE-2026-4553
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-22T18:30:22

1 posts

A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is the function fromNatlimit of the file /goform/Natlimit of the component Parameters Handler. The manipulation of the argument page leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-03-22T20:20:14.000Z ##

🟠 CVE-2026-4553 - High (8.8)

A vulnerability was identified in Tenda F453 1.0.0.3. Impacted is the function fromNatlimit of the file /goform/Natlimit of the component Parameters Handler. The manipulation of the argument page leads to stack-based buffer overflow. It is possibl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4555
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-22T18:30:22

1 posts

A weakness has been identified in D-Link DIR-513 1.10. The impacted element is the function formEasySetTimezone of the file /goform/formEasySetTimezone of the component boa. This manipulation of the argument curTime causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. This vulnerability only affec

thehackerwire@mastodon.social at 2026-03-22T20:03:32.000Z ##

🟠 CVE-2026-4555 - High (8.8)

A weakness has been identified in D-Link DIR-513 1.10. The impacted element is the function formEasySetTimezone of the file /goform/formEasySetTimezone of the component boa. This manipulation of the argument curTime causes stack-based buffer overf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4558
(8.8 HIGH)

EPSS: 0.15%

updated 2026-03-22T18:30:22

1 posts

A flaw has been found in Linksys MR9600 2.0.6.206937. Affected is the function smartConnectConfigure of the file SmartConnect.lua. Executing a manipulation of the argument configApSsid/configApPassphrase/srpLogin/srpPassword can lead to os command injection. The attack may be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but

thehackerwire@mastodon.social at 2026-03-22T20:03:22.000Z ##

🟠 CVE-2026-4558 - High (8.8)

A flaw has been found in Linksys MR9600 2.0.6.206937. Affected is the function smartConnectConfigure of the file SmartConnect.lua. Executing a manipulation of the argument configApSsid/configApPassphrase/srpLogin/srpPassword can lead to os command...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4543
(6.3 MEDIUM)

EPSS: 0.18%

updated 2026-03-22T12:32:35

1 posts

A vulnerability was found in Wavlink WL-WN578W2 221110. The impacted element is an unknown function of the file /cgi-bin/firewall.cgi of the component POST Request Handler. Performing a manipulation of the argument dmz_flag/del_flag results in command injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about

offseq@infosec.exchange at 2026-03-22T10:30:28.000Z ##

⚠️ CVE-2026-4543: Wavlink WL-WN578W2 (v221110) has a MEDIUM severity command injection flaw in /cgi-bin/firewall.cgi. No patch; public exploit exists. Isolate, restrict access, and monitor traffic urgently. radar.offseq.com/threat/cve-20 #OffSeq #Infosec #Vulnerability #Router

##

CVE-2026-4314
(8.8 HIGH)

EPSS: 0.04%

updated 2026-03-22T06:30:22

1 posts

The 'The Ultimate WordPress Toolkit – WP Extended' plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.4. This is due to the `isDashboardOrProfileRequest()` method in the Menu Editor module using an insecure `strpos()` check against `$_SERVER['REQUEST_URI']` to determine if a request targets the dashboard or profile page. The `grantVirtualCaps()` me

thehackerwire@mastodon.social at 2026-03-22T21:00:19.000Z ##

🟠 CVE-2026-4314 - High (8.8)

The 'The Ultimate WordPress Toolkit – WP Extended' plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.4. This is due to the `isDashboardOrProfileRequest()` method in the Menu Editor module using ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4535
(8.8 HIGH)

EPSS: 0.05%

updated 2026-03-22T06:30:22

2 posts

A vulnerability has been found in Tenda FH451 1.0.0.9. This vulnerability affects the function WrlclientSet of the file /goform/WrlclientSet. Such manipulation of the argument GO leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-03-22T21:00:09.000Z ##

🟠 CVE-2026-4535 - High (8.8)

A vulnerability has been found in Tenda FH451 1.0.0.9. This vulnerability affects the function WrlclientSet of the file /goform/WrlclientSet. Such manipulation of the argument GO leads to stack-based buffer overflow. The attack can be launched rem...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-03-22T06:00:29.000Z ##

⚠️ HIGH severity: CVE-2026-4535 in Tenda FH451 (v1.0.0.9) — stack-based buffer overflow in /goform/WrlclientSet. Remote, unauthenticated code execution possible. Patch or mitigate now! radar.offseq.com/threat/cve-20 #OffSeq #vulnerability #IoT #bufferOverflow

##

CVE-2026-4533
(6.3 MEDIUM)

EPSS: 0.03%

updated 2026-03-22T03:30:31

1 posts

A vulnerability was detected in code-projects Simple Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file all-tickets.php. The manipulation of the argument Status results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-03-22T04:30:27.000Z ##

⚠️ MEDIUM: CVE-2026-4533 in code-projects Simple Food Ordering System v1.0 allows unauthenticated SQL injection via 'Status' in all-tickets.php. Public exploit code exists — patch or mitigate now! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #SQLInjection #CVE2026_4533

##

CVE-2026-3629
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-22T00:30:33

2 posts

The Import and export users and customers plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.29.7. This is due to the 'save_extra_user_profile_fields' function not properly restricting which user meta keys can be updated via profile fields. The 'get_restricted_fields' method does not include sensitive meta keys such as 'wp_capabilities'. This makes i

offseq@infosec.exchange at 2026-03-22T03:00:27.000Z ##

⚠️ CVE-2026-3629: HIGH severity in carazo's 'Import and export users and customers' WP plugin (≤1.29.7). Privilege escalation to admin possible if 'Show fields in profile' is on and CSV with 'wp_capabilities' imported. Mitigate now! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec

##

thehackerwire@mastodon.social at 2026-03-21T23:17:43.000Z ##

🟠 CVE-2026-3629 - High (8.1)

The Import and export users and customers plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.29.7. This is due to the 'save_extra_user_profile_fields' function not properly restricting which user met...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32042
(8.8 HIGH)

EPSS: 0.11%

updated 2026-03-21T03:31:17

1 posts

OpenClaw versions 2026.2.22 prior to 2026.2.25 contain a privilege escalation vulnerability allowing unpaired device identities to bypass operator pairing requirements and self-assign elevated operator scopes including operator.admin. Attackers with valid shared gateway authentication can present a self-signed unpaired device identity to request and obtain higher operator scopes before pairing app

thehackerwire@mastodon.social at 2026-03-21T22:15:48.000Z ##

🟠 CVE-2026-32042 - High (8.8)

OpenClaw versions 2026.2.22 prior to 2026.2.25 contain a privilege escalation vulnerability allowing unpaired device identities to bypass operator pairing requirements and self-assign elevated operator scopes including operator.admin. Attackers wi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25192
(9.4 CRITICAL)

EPSS: 0.13%

updated 2026-03-21T00:32:47

1 posts

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this

thehackerwire@mastodon.social at 2026-03-22T01:00:50.000Z ##

🔴 CVE-2026-25192 - Critical (9.4)

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a kno...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31903
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-21T00:32:47

1 posts

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger telemetry, or conduct brute-force attacks to gain unauthorized access.

thehackerwire@mastodon.social at 2026-03-22T01:00:41.000Z ##

🟠 CVE-2026-31903 - High (7.5)

The WebSocket Application Programming Interface lacks restrictions on the number of authentication requests. This absence of rate limiting may allow an attacker to conduct denial-of-service attacks by suppressing or mis-routing legitimate charger ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29796
(9.4 CRITICAL)

EPSS: 0.10%

updated 2026-03-21T00:31:52

1 posts

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this

thehackerwire@mastodon.social at 2026-03-22T01:00:31.000Z ##

🔴 CVE-2026-29796 - Critical (9.4)

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a kno...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32666
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-21T00:31:52

1 posts

WebCTRL systems that communicate over BACnet inherit the protocol's lack of network layer authentication. WebCTRL does not implement additional validation of BACnet traffic so an attacker with network access could spoof BACnet packets directed at either the WebCTRL server or associated AutomatedLogic controllers. Spoofed packets may be processed as legitimate.

thehackerwire@mastodon.social at 2026-03-21T23:00:11.000Z ##

🟠 CVE-2026-32666 - High (7.5)

WebCTRL systems that communicate over BACnet inherit the protocol's lack
of network layer authentication. WebCTRL does not implement additional
validation of BACnet traffic so an attacker with network access could
spoof BACnet packets directed ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25086
(7.7 HIGH)

EPSS: 0.01%

updated 2026-03-21T00:31:51

1 posts

Under certain conditions, an attacker could bind to the same port used by WebCTRL. This could allow the attacker to craft and send malicious packets and impersonate the WebCTRL service without requiring code injection into the WebCTRL software.

thehackerwire@mastodon.social at 2026-03-21T23:00:32.000Z ##

🟠 CVE-2026-25086 - High (7.7)

Under certain conditions, an attacker could bind to the same port used
by WebCTRL. This could allow the attacker to craft and send malicious
packets and impersonate the WebCTRL service without requiring code
injection into the WebCTRL software.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33502
(9.3 CRITICAL)

EPSS: 0.04%

updated 2026-03-20T22:07:02

1 posts

### Summary An unauthenticated server-side request forgery vulnerability in `plugin/Live/test.php` allows any remote user to make the AVideo server send HTTP requests to arbitrary URLs. This can be used to probe localhost/internal services and, when reachable, access internal HTTP resources or cloud metadata endpoints. ### Details The endpoint accepts `$_REQUEST['statsURL']` and only checks that

thehackerwire@mastodon.social at 2026-03-23T17:17:58.000Z ##

🔴 CVE-2026-33502 - Critical (9.3)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, an unauthenticated server-side request forgery vulnerability in `plugin/Live/test.php` allows any remote user to make the AVideo server send HTTP requests to arbit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33507
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-20T21:47:51

1 posts

## Summary The `objects/pluginImport.json.php` endpoint allows admin users to upload and install plugin ZIP files containing executable PHP code, but lacks any CSRF protection. Combined with the application explicitly setting `session.cookie_samesite = 'None'` for HTTPS connections, an unauthenticated attacker can craft a page that, when visited by an authenticated admin, silently uploads a malic

thehackerwire@mastodon.social at 2026-03-23T17:41:23.000Z ##

🟠 CVE-2026-33507 - High (8.8)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `objects/pluginImport.json.php` endpoint allows admin users to upload and install plugin ZIP files containing executable PHP code, but lacks any CSRF protectio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33143(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-03-20T21:33:34

2 posts

### Summary The WhatsApp POST webhook handler (`/notification/whatsapp/webhook`) processes incoming status update events without verifying the Meta/WhatsApp `X-Hub-Signature-256` HMAC signature, allowing any unauthenticated attacker to send forged webhook payloads that manipulate notification delivery status records, suppress alerts, and corrupt audit trails. The codebase already implements prope

ivycyber@privacysafe.social at 2026-03-23T22:24:37.000Z ##

🛡️ #Cybersecurity news & tips across the #fediverse 👇

“🟠 CVE-2026-33143 - High (7.5) OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.34, the WhatsApp POST webhook handler (/notification/whatsapp/webhook) processes incoming status ...”

mastodon.social/@thehackerwire

🤖 via RSS feed. Not an endorsement.

##

thehackerwire@mastodon.social at 2026-03-23T22:00:02.000Z ##

🟠 CVE-2026-33143 - High (7.5)

OneUptime is a solution for monitoring and managing online services. Prior to version 10.0.34, the WhatsApp POST webhook handler (/notification/whatsapp/webhook) processes incoming status update events without verifying the Meta/WhatsApp X-Hub-Sig...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32933
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-20T21:20:06

1 posts

### Summary AutoMapper is vulnerable to a Denial of Service (DoS) attack. When mapping deeply nested object graphs, the library uses recursive method calls without enforcing a default maximum depth limit. This allows an attacker to provide a specially crafted object graph that exhausts the thread's stack memory, triggering a `StackOverflowException` and causing the entire application process to t

thehackerwire@mastodon.social at 2026-03-22T01:40:45.000Z ##

🟠 CVE-2026-32933 - High (7.5)

AutoMapper is a convention-based object-object mapper in .NET. Versions prior to 15.1.1 and 16.1.1 are vulnerable to a Denial of Service (DoS) attack. When mapping deeply nested object graphs, the library uses recursive method calls without enforc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33485
(7.5 HIGH)

EPSS: 0.19%

updated 2026-03-20T20:47:20

1 posts

## Summary The RTMP `on_publish` callback at `plugin/Live/on_publish.php` is accessible without authentication. The `$_POST['name']` parameter (stream key) is interpolated directly into SQL queries in two locations — `LiveTransmitionHistory::getLatest()` and `LiveTransmition::keyExists()` — without parameterized binding or escaping. An unauthenticated attacker can exploit time-based blind SQL inj

thehackerwire@mastodon.social at 2026-03-23T15:28:18.000Z ##

🟠 CVE-2026-33485 - High (7.5)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the RTMP `on_publish` callback at `plugin/Live/on_publish.php` is accessible without authentication. The `$_POST['name']` parameter (stream key) is interpolated di...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33482
(8.1 HIGH)

EPSS: 0.15%

updated 2026-03-20T20:46:42

1 posts

## Summary The `sanitizeFFmpegCommand()` function in `plugin/API/standAlone/functions.php` is designed to prevent OS command injection in ffmpeg commands by stripping dangerous shell metacharacters (`&&`, `;`, `|`, `` ` ``, `<`, `>`). However, it fails to strip `$()` (bash command substitution syntax). Since the sanitized command is executed inside a double-quoted `sh -c` context in `execAsync()`

thehackerwire@mastodon.social at 2026-03-23T15:28:00.000Z ##

🟠 CVE-2026-33482 - High (8.1)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `sanitizeFFmpegCommand()` function in `plugin/API/standAlone/functions.php` is designed to prevent OS command injection in ffmpeg commands by stripping dangero...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33480
(8.6 HIGH)

EPSS: 0.03%

updated 2026-03-20T20:44:12

1 posts

## Summary The `isSSRFSafeURL()` function in AVideo can be bypassed using IPv4-mapped IPv6 addresses (`::ffff:x.x.x.x`). The unauthenticated `plugin/LiveLinks/proxy.php` endpoint uses this function to validate URLs before fetching them with curl, but the IPv4-mapped IPv6 prefix passes all checks, allowing an attacker to access cloud metadata services, internal networks, and localhost services. #

thehackerwire@mastodon.social at 2026-03-23T15:26:07.000Z ##

🟠 CVE-2026-33480 - High (8.6)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `isSSRFSafeURL()` function in AVideo can be bypassed using IPv4-mapped IPv6 addresses (`::ffff:x.x.x.x`). The unauthenticated `plugin/LiveLinks/proxy.php` endp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33479
(8.8 HIGH)

EPSS: 0.15%

updated 2026-03-20T20:44:04

1 posts

## Summary The Gallery plugin's `saveSort.json.php` endpoint passes unsanitized user input from `$_REQUEST['sections']` array values directly into PHP's `eval()` function. While the endpoint is gated behind `User::isAdmin()`, it has no CSRF token validation. Combined with AVideo's explicit `SameSite=None` session cookie configuration, an attacker can exploit this via cross-site request forgery to

thehackerwire@mastodon.social at 2026-03-23T15:25:58.000Z ##

🟠 CVE-2026-33479 - High (8.8)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the Gallery plugin's `saveSort.json.php` endpoint passes unsanitized user input from `$_REQUEST['sections']` array values directly into PHP's `eval()` function. Wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33476
(7.5 HIGH)

EPSS: 0.61%

updated 2026-03-20T20:43:22

1 posts

## Summary The Siyuan kernel exposes an unauthenticated file-serving endpoint under **/appearance/*filepath.** Due to improper path sanitization, attackers can perform directory traversal and read arbitrary files accessible to the server process. Authentication checks explicitly exclude this endpoint, allowing exploitation without valid credentials. ## Details Vulnerable Code Location **File

thehackerwire@mastodon.social at 2026-03-21T23:16:43.000Z ##

🟠 CVE-2026-33476 - High (7.5)

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the Siyuan kernel exposes an unauthenticated file-serving endpoint under `/appearance/*filepath.` Due to improper path sanitization, attackers can perform directory traversa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4445
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-20T19:32:35.237000

1 posts

Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T04:00:33.000Z ##

🟠 CVE-2026-4445 - High (8.8)

Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-43520
(7.1 HIGH)

EPSS: 0.47%

updated 2026-03-20T18:39:07.610000

16 posts

A memory corruption issue was addressed with improved memory handling. This issue is fixed in watchOS 26.1, iOS 18.7.2 and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1, tvOS 26.1, macOS Sonoma 14.8.2, macOS Sequoia 15.7.2, iOS 26.1 and iPadOS 26.1. A malicious application may be able to cause unexpected system termination or write kernel memory.

jjtech at 2026-03-24T13:45:52.271Z ##

Unfortunately it looks like CVE-2025-43520 was patched in iOS 26.1b4, the exact build I happened to leave my test device on...

I might play around with it on my Mac or in one of the new iOS pccvre VMs though.

##

fmarini@mastodon.social at 2026-03-24T09:09:10.000Z ##

There has been a lot of sloppy reporting regarding DarkSword, with basically every news outlet saying that iOS 18 is vulnerable. It’s not, if you have the latest 18.7.3.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

#iOS #DarkSword

##

fmarini@mastodon.social at 2026-03-24T09:06:55.000Z ##

@peternlewis sloppy reporting, as usual.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:54:03.000Z ##

@mackuba

Google has a more in-depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:52:15.000Z ##

@helge the reporting on DarkSword is incredibly sloppy.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:50:52.000Z ##

@slightlyoff @owa
Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:41:46.000Z ##

@9to5Mac sloppy reporting, as usual.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:35:44.000Z ##

@evacide

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

jjtech@infosec.exchange at 2026-03-24T13:45:52.000Z ##

Unfortunately it looks like CVE-2025-43520 was patched in iOS 26.1b4, the exact build I happened to leave my test device on...

I might play around with it on my Mac or in one of the new iOS pccvre VMs though.

##

fmarini@mastodon.social at 2026-03-24T09:09:10.000Z ##

There has been a lot of sloppy reporting regarding DarkSword, with basically every news outlet saying that iOS 18 is vulnerable. It’s not, if you have the latest 18.7.3.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

#iOS #DarkSword

##

fmarini@mastodon.social at 2026-03-24T09:06:55.000Z ##

@peternlewis sloppy reporting, as usual.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:54:03.000Z ##

@mackuba

Google has a more in-depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:52:15.000Z ##

@helge the reporting on DarkSword is incredibly sloppy.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:50:52.000Z ##

@slightlyoff @owa
Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:41:46.000Z ##

@9to5Mac sloppy reporting, as usual.

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

fmarini@mastodon.social at 2026-03-24T08:35:44.000Z ##

@evacide

Google has a more in depth analysis, with a lot more information on the specific versions of iOS that are affected.

TL;DR It doesn’t seem to affect 18.7.3 at least (might also not work on 18.7.2 given that CVE-2025-43520, which DarkSword uses, has been patched in .2).

cloud.google.com/blog/topics/t

##

CVE-2026-4452
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T18:32:23

1 posts

Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:34:11.000Z ##

🟠 CVE-2026-4452 - High (8.8)

Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67260(CVSS UNKNOWN)

EPSS: 0.06%

updated 2026-03-20T18:31:19

1 posts

The Terrapack software, from ASTER TEC / ASTER S.p.A., with the indicated components and versions has a file upload vulnerability that may allow attackers to execute arbitrary code. Vulnerable components include Terrapack TkWebCoreNG:: 1.0.20200914, Terrapack TKServerCGI 2.5.4.150, and Terrapack TpkWebGIS Client 1.0.0.

thehackerwire@mastodon.social at 2026-03-23T16:13:49.000Z ##

🟠 CVE-2025-67260 - High (8.8)

The Terrapack software, from ASTER TEC / ASTER S.p.A., with the indicated components and versions has a file upload vulnerability that may allow attackers to execute arbitrary code. Vulnerable components include Terrapack TkWebCoreNG:: 1.0.2020091...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4464
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T18:31:18

1 posts

Integer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-03-22T02:33:52.000Z ##

🟠 CVE-2026-4464 - High (8.8)

Integer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4451
(8.8 HIGH)

EPSS: 0.10%

updated 2026-03-20T18:05:44.367000

1 posts

Insufficient validation of untrusted input in Navigation in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:34:01.000Z ##

🟠 CVE-2026-4451 - High (8.8)

Insufficient validation of untrusted input in Navigation in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium securit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4455
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T17:59:44.053000

1 posts

Heap buffer overflow in PDFium in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T03:00:49.000Z ##

🟠 CVE-2026-4455 - High (8.8)

Heap buffer overflow in PDFium in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4456
(8.8 HIGH)

EPSS: 0.10%

updated 2026-03-20T17:59:23.127000

1 posts

Use after free in Digital Credentials API in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T03:00:59.000Z ##

🟠 CVE-2026-4456 - High (8.8)

Use after free in Digital Credentials API in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4458
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-20T17:58:37.903000

1 posts

Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:00:15.000Z ##

🟠 CVE-2026-4458 - High (8.8)

Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4462
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T17:57:26.947000

1 posts

Out of bounds read in Blink in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:33:22.000Z ##

🟠 CVE-2026-4462 - High (8.8)

Out of bounds read in Blink in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33056(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-03-20T17:25:11

3 posts

## Summary When unpacking a tar archive, the `tar` crate's `unpack_dir` function uses `fs::metadata()` to check whether a path that already exists is a directory. Because `fs::metadata()` follows symbolic links, a crafted tarball containing a symlink entry followed by a directory entry with the same name causes the crate to treat the symlink target as a valid existing directory — and subsequently

mastokukei@social.josko.org at 2026-03-24T09:02:05.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei masto.kukei.eu/browse/programm category:
- **AI coding tools & agentic frameworks**: Claude Code, Cursor Composer 2, GitHub Copilot SDK, OpenClaw security flaws, AI-generated insecure code (Trivy attack).
- **Programming language updates**: Python 3.15 JIT, Rust supply-chain vulnerability (CVE-2026-33056), Vite 8.0, Gren 26.03.
- **Security & vulnerabilities**: VMware vCenter DoS [1/2]

##

alip@mastodon.online at 2026-03-22T22:04:44.000Z ##

Code does not become better out of thin air just because you rewrite it in #rustlang. TOCTOUs are typically language agnostic. Here's one for tar: blog.rust-lang.org/2026/03/21/ #security

##

lobsters@mastodon.social at 2026-03-22T09:05:10.000Z ##

Security advisory for Cargo lobste.rs/s/hmb3mz #rust #security
blog.rust-lang.org/2026/03/21/

##

CVE-2026-33286
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-03-20T15:58:17

3 posts

### Summary An arbitrary method execution vulnerability has been found which affects Graphiti's JSONAPI write functionality. An attacker can craft a malicious JSONAPI payload with arbitrary relationship names to invoke any public method on the underlying model instance, class or its associations. ### Impact Any application exposing Graphiti write endpoints (create/update/delete) to untrusted us

offseq at 2026-03-24T03:00:31.365Z ##

🚨 CRITICAL: CVE-2026-33286 in Graphiti (<1.10.2) lets unauthenticated attackers invoke arbitrary public methods via JSONAPI write requests. Patch to v1.10.2, restrict access, and validate inputs! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-24T03:00:31.000Z ##

🚨 CRITICAL: CVE-2026-33286 in Graphiti (<1.10.2) lets unauthenticated attackers invoke arbitrary public methods via JSONAPI write requests. Patch to v1.10.2, restrict access, and validate inputs! radar.offseq.com/threat/cve-20 #OffSeq #CVE202633286 #Ruby #APIsecurity

##

thehackerwire@mastodon.social at 2026-03-24T00:23:11.000Z ##

🔴 CVE-2026-33286 - Critical (9.1)

Graphiti is a framework that sits on top of models and exposes them via a JSON:API-compliant interface. Versions prior to 1.10.2 have an arbitrary method execution vulnerability that affects Graphiti's JSONAPI write functionality. An attacker can ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4463
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-20T15:32:14

1 posts

Heap buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:33:31.000Z ##

🟠 CVE-2026-4463 - High (8.8)

Heap buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4447
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-20T15:32:13

1 posts

Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T04:01:59.000Z ##

🟠 CVE-2026-4447 - High (8.8)

Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4446
(8.8 HIGH)

EPSS: 0.09%

updated 2026-03-20T15:32:13

1 posts

Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T04:01:50.000Z ##

🟠 CVE-2026-4446 - High (8.8)

Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4444
(8.8 HIGH)

EPSS: 0.06%

updated 2026-03-20T15:32:13

1 posts

Stack buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T04:00:24.000Z ##

🟠 CVE-2026-4444 - High (8.8)

Stack buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4457
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T15:31:12

1 posts

Type Confusion in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T04:00:13.000Z ##

🟠 CVE-2026-4457 - High (8.8)

Type Confusion in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4454
(8.8 HIGH)

EPSS: 0.10%

updated 2026-03-20T15:31:12

1 posts

Use after free in Network in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T03:00:40.000Z ##

🟠 CVE-2026-4454 - High (8.8)

Use after free in Network in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4461
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T15:31:12

1 posts

Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:33:13.000Z ##

🟠 CVE-2026-4461 - High (8.8)

Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4460
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T15:31:12

1 posts

Out of bounds read in Skia in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:00:35.000Z ##

🟠 CVE-2026-4460 - High (8.8)

Out of bounds read in Skia in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4459
(8.8 HIGH)

EPSS: 0.07%

updated 2026-03-20T15:31:12

1 posts

Out of bounds read and write in WebAudio in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-03-22T02:00:25.000Z ##

🟠 CVE-2026-4459 - High (8.8)

Out of bounds read and write in WebAudio in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71258
(4.3 MEDIUM)

EPSS: 1.87%

updated 2026-03-20T13:39:46.493000

1 posts

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind server-side request forgery vulnerability in the searchWeb API component that allows authenticated attackers to cause the server to initiate arbitrary outbound requests. Attackers can exploit improper URL validation to perform internal network scanning or interact with internal services, impacting system availability. The f

Nuclei template

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

📈 CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-71259
(4.3 MEDIUM)

EPSS: 1.87%

updated 2026-03-20T13:39:46.493000

1 posts

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a blind server-side request forgery vulnerability in the externalfeed/RSS API component that allows authenticated attackers to trigger arbitrary outbound requests from the server. Attackers can exploit insufficient validation of externally supplied resource references to interact with internal services or cause resource exhaustion

Nuclei template

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

📈 CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-32596(CVSS UNKNOWN)

EPSS: 4.20%

updated 2026-03-19T21:01:58

1 posts

### Summary Glances web server runs without authentication by default when started with `glances -w`, exposing REST API with sensitive system information including process command-lines containing credentials (passwords, API keys, tokens) to any network client. ### Details Root Cause: Authentication is optional and disabled by default. When no password is provided, the API router initializes with

Nuclei template

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

📈 CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-33354
(7.6 HIGH)

EPSS: 0.04%

updated 2026-03-19T19:34:07

1 posts

## Summary `POST /objects/aVideoEncoder.json.php` accepts a requester-controlled `chunkFile` parameter intended for staged upload chunks. Instead of restricting that path to trusted server-generated chunk locations, the endpoint accepts arbitrary local filesystem paths that pass `isValidURLOrPath()`. That helper allows files under broad server directories including `/var/www/`, the application roo

thehackerwire@mastodon.social at 2026-03-23T15:36:52.000Z ##

🟠 CVE-2026-33354 - High (7.6)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, `POST /objects/aVideoEncoder.json.php` accepts a requester-controlled `chunkFile` parameter intended for staged upload chunks. Instead of restricting that path to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33351
(9.1 CRITICAL)

EPSS: 0.07%

updated 2026-03-19T19:13:30

1 posts

### Summary A Server-Side Request Forgery (SSRF) vulnerability exists in `plugin/Live/standAloneFiles/saveDVR.json.php`. When the AVideo Live plugin is deployed in standalone mode (the intended configuration for this file), the `$_REQUEST['webSiteRootURL']` parameter is used directly to construct a URL that is fetched server-side via `file_get_contents()`. No authentication, origin validation, or

thehackerwire@mastodon.social at 2026-03-23T14:38:13.000Z ##

🔴 CVE-2026-33351 - Critical (9.1)

WWBN AVideo is an open source video platform. Prior to version 26.0, a Server-Side Request Forgery (SSRF) vulnerability exists in `plugin/Live/standAloneFiles/saveDVR.json.php`. When the AVideo Live plugin is deployed in standalone mode (the inten...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20131
(10.0 CRITICAL)

EPSS: 0.65%

updated 2026-03-19T18:32:21

2 posts

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java obj

3 repos

https://github.com/Sushilsin/CVE-2026-20131

https://github.com/p3Nt3st3r-sTAr/CVE-2026-20131-POC

https://github.com/sak110/CVE-2026-20131

steelefortress at 2026-03-24T11:00:30.417Z ##

Critical patch alert: The US government has ordered a maximum severity patch for a Cisco vulnerability (CVE-2026-20131) that's being exploited in ransomware campaigns.

Read more: steelefortress.com/86cy1e

##

steelefortress@infosec.exchange at 2026-03-24T11:00:30.000Z ##

Critical patch alert: The US government has ordered a maximum severity patch for a Cisco vulnerability (CVE-2026-20131) that's being exploited in ransomware campaigns.

Read more: steelefortress.com/86cy1e

#Encryption #ThreatIntel #Security #DataPrivacy #CyberDefense

##

CVE-2026-27459(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-03-19T18:28:12

1 posts

If a user provided callback to `set_cookie_generate_callback` returned a cookie value greater than 256 bytes, pyOpenSSL would overflow an OpenSSL provided buffer. Cookie values that are too long are now rejected.

linux@activitypub.awakari.com at 2026-03-23T13:59:27.000Z ## Ubuntu 25.10 pyOpenSSL Critical Fix for Denial of Service CVE-2026-27459 Several security issues were fixed in pyOpenSSL.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-33297(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-03-19T17:25:37

2 posts

### Summary The `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due to a logic error in how the submitted password value is processed, any password containing non-numeric characters is silently coerced to the integer zero before being stored. This means that regardless of the intended password, the stored channel password b

thehackerwire@mastodon.social at 2026-03-23T16:14:16.000Z ##

🔴 CVE-2026-33297 - Critical (9.1)

WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due to a logic error in how the submitted password v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T16:13:16.000Z ##

🔴 CVE-2026-33297 - Critical (9.1)

WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due to a logic error in how the submitted password v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33293
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-19T17:12:05

1 posts

## Summary The `deleteDump` parameter in `plugin/CloneSite/cloneServer.json.php` is passed directly to `unlink()` without any path sanitization. An attacker with valid clone credentials can use path traversal sequences (e.g., `../../`) to delete arbitrary files on the server, including critical application files such as `configuration.php`, causing complete denial of service or enabling further a

thehackerwire@mastodon.social at 2026-03-22T20:20:03.000Z ##

🟠 CVE-2026-33293 - High (8.1)

WWBN AVideo is an open source video platform. Prior to version 26.0, the `deleteDump` parameter in `plugin/CloneSite/cloneServer.json.php` is passed directly to `unlink()` without any path sanitization. An attacker with valid clone credentials can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71260
(8.8 HIGH)

EPSS: 8.28%

updated 2026-03-19T15:31:27

1 posts

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain a deserialization of untrusted data vulnerability in the ASP.NET servlet's VIEWSTATE handling that allows authenticated attackers to execute arbitrary code. Attackers can supply crafted serialized objects to the VIEWSTATE parameter to achieve remote code execution and fully compromise the application. The following hotfixes remedia

1 repos

https://github.com/watchtowrlabs/watchTowr-vs-BMC-Footprints-RCE-CVE-2025-71257-CVE-2025-71260

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

📈 CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-71257
(7.3 HIGH)

EPSS: 3.58%

updated 2026-03-19T15:31:21

1 posts

BMC FootPrints ITSM versions 20.20.02 through 20.24.01.001 contain an authentication bypass vulnerability due to improper enforcement of security filters on restricted REST API endpoints and servlets. Unauthenticated remote attackers can bypass access controls to invoke restricted functionality and gain unauthorized access to application data and modify system resources. The following hotfixes rem

Nuclei template

1 repos

https://github.com/watchtowrlabs/watchTowr-vs-BMC-Footprints-RCE-CVE-2025-71257-CVE-2025-71260

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

📈 CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-33242
(7.5 HIGH)

EPSS: 0.02%

updated 2026-03-19T12:44:28

2 posts

### Details A Path Traversal and Access Control Bypass vulnerability was discovered in the salvo-proxy component of the Salvo Rust framework (v0.89.2). The vulnerability allows an unauthenticated external attacker to bypass proxy routing constraints and access unintended backend paths (e.g., protected endpoints or administrative dashboards). This issue stems from the encode_url_path function, whi

thehackerwire@mastodon.social at 2026-03-24T00:39:10.000Z ##

🟠 CVE-2026-33242 - High (7.5)

Salvo is a Rust web framework. Versions 0.39.0 through 0.89.2 have a Path Traversal and Access Control Bypass vulnerability in the salvo-proxy component. The vulnerability allows an unauthenticated external attacker to bypass proxy routing constra...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T00:39:10.000Z ##

🟠 CVE-2026-33242 - High (7.5)

Salvo is a Rust web framework. Versions 0.39.0 through 0.89.2 have a Path Traversal and Access Control Bypass vulnerability in the salvo-proxy component. The vulnerability allows an unauthenticated external attacker to bypass proxy routing constra...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33236
(8.1 HIGH)

EPSS: 0.04%

updated 2026-03-19T12:42:43

1 posts

## Vulnerability Description The NLTK downloader does not validate the `subdir` and `id` attributes when processing remote XML index files. Attackers can control a remote XML index server to provide malicious values containing path traversal sequences (such as `../`), which can lead to: 1. **Arbitrary Directory Creation**: Create directories at arbitrary locations in the file system 2. **Arbitra

thehackerwire@mastodon.social at 2026-03-21T23:16:52.000Z ##

🟠 CVE-2026-33236 - High (8.1)

NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, the NLTK downloader does not validate the `subdir` ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33231
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-19T12:42:23

1 posts

### Summary `nltk.app.wordnet_app` allows unauthenticated remote shutdown of the local WordNet Browser HTTP server when it is started in its default mode. A simple `GET /SHUTDOWN%20THE%20SERVER` request causes the process to terminate immediately via `os._exit(0)`, resulting in a denial of service. ### Details The vulnerable logic is in `nltk/app/wordnet_app.py`: - [`nltk/app/wordnet_app.py:242`

thehackerwire@mastodon.social at 2026-03-22T00:00:13.000Z ##

🟠 CVE-2026-33231 - High (7.5)

NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. In versions 3.9.3 and prior, `nltk.app.wordnet_app` allows unauthenticated remot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33226
(8.7 HIGH)

EPSS: 0.01%

updated 2026-03-18T20:22:12

1 posts

### Summary The REST datasource query preview endpoint (`POST /api/queries/preview`) makes server-side HTTP requests to any URL supplied by the user in `fields.path` with no validation. An authenticated admin can reach internal services that are not exposed to the internet — including cloud metadata endpoints (AWS/GCP/Azure), internal databases, Kubernetes APIs, and other pods on the internal netw

thehackerwire@mastodon.social at 2026-03-21T23:18:03.000Z ##

🟠 CVE-2026-33226 - High (8.7)

Budibase is a low code platform for creating internal tools, workflows, and admin panels. In versions from 3.30.6 and prior, the REST datasource query preview endpoint (POST /api/queries/preview) makes server-side HTTP requests to any URL supplied...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33211
(9.6 CRITICAL)

EPSS: 0.02%

updated 2026-03-18T20:20:10

3 posts

### Summary The Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter. A tenant with permission to create `ResolutionRequests` (e.g. by creating `TaskRuns` or `PipelineRuns` that use the git resolver) can read arbitrary files from the resolver pod's filesystem, including ServiceAccount tokens. The file contents are returned base64-encoded in `resolutionreque

offseq at 2026-03-24T01:30:27.199Z ##

🚨 CRITICAL: CVE-2026-33211 in Tekton Pipelines (git resolver) enables path traversal attacks via pathInRepo, exposing sensitive files (like ServiceAccount tokens). Upgrade to fixed versions immediately. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-03-24T01:30:27.000Z ##

🚨 CRITICAL: CVE-2026-33211 in Tekton Pipelines (git resolver) enables path traversal attacks via pathInRepo, exposing sensitive files (like ServiceAccount tokens). Upgrade to fixed versions immediately. Details: radar.offseq.com/threat/cve-20 #OffSeq #Tekton #Kubernetes #Infosec

##

thehackerwire@mastodon.social at 2026-03-24T00:23:30.000Z ##

🔴 CVE-2026-33211 - Critical (9.6)

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 1.0.0 and prior to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, the Tekton Pipelines git resolver is vulnerable to path traversal vi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33204
(7.5 HIGH)

EPSS: 0.04%

updated 2026-03-18T20:16:59

1 posts

## Summary An unauthenticated attacker can perform a Denial of Service via JWE header tampering when PBES2 algorithms are used. Applications that call `JWE::decrypt()` on attacker-controlled JWEs using PBES2 algorithms are affected. ## Details PHP version: `PHP 8.4.11` SimpleJWT version: `v1.1.0` The relevant portion of the vulnerable implementation is shown below ([PBES2.php](https://github

thehackerwire@mastodon.social at 2026-03-22T00:01:32.000Z ##

🟠 CVE-2026-33204 - High (7.5)

SimpleJWT is a simple JSON web token library written in PHP. Prior to version 1.1.1, an unauthenticated attacker can perform a Denial of Service via JWE header tampering when PBES2 algorithms are used. Applications that call JWE::decrypt() on atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33203
(7.5 HIGH)

EPSS: 0.11%

updated 2026-03-18T20:11:01

1 posts

## Summary The SiYuan kernel WebSocket server accepts unauthenticated connections when a specific “auth keepalive” query parameter is present. After connection, incoming messages are parsed using unchecked type assertions on attacker-controlled JSON. A remote attacker can send malformed messages that trigger a runtime panic, potentially crashing the kernel process and causing denial of service.

thehackerwire@mastodon.social at 2026-03-22T00:01:23.000Z ##

🟠 CVE-2026-33203 - High (7.5)

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the SiYuan kernel WebSocket server accepts unauthenticated connections when a specific "auth keepalive" query parameter is present. After connection, incoming messages are p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33186
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-03-18T20:10:30

1 posts

### Impact _What kind of vulnerability is it? Who is impacted?_ It is an **Authorization Bypass** resulting from **Improper Input Validation** of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepting requests where the `:path` omitted the mandatory leading slash (e.g., `Service/Method` instead of `/Service/Method`). While the server successfully rou

thehackerwire@mastodon.social at 2026-03-22T00:00:38.000Z ##

🔴 CVE-2026-33186 - Critical (9.1)

gRPC-Go is the Go language implementation of gRPC. Versions prior to 1.79.3 have an authorization bypass resulting from improper input validation of the HTTP/2 `:path` pseudo-header. The gRPC-Go server was too lenient in its routing logic, accepti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3888
(7.9 HIGH)

EPSS: 0.01%

updated 2026-03-18T06:31:20

1 posts

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

5 repos

https://github.com/fevar54/CVE-2026-3888-POC-all-from-the-Qualys-platform.

https://github.com/Many-Hat-Group/Ubuntu-CVE-2026-3888-patcher

https://github.com/nomaisthere/CVE-2026-3888

https://github.com/netw0rk7/CVE-2026-3888-PoC

https://github.com/TheCyberGeek/CVE-2026-3888-snap-confine-systemd-tmpfiles-LPE

hackmag@infosec.exchange at 2026-03-23T18:30:03.000Z ##

⚪️ Ubuntu vulnerability lets attackers gain root privileges

🗨️ A serious vulnerability has been discovered in default installations of Ubuntu Desktop 24.04 and later (CVE-2026-3888, scored 7.8 on the CVSS scale), which allows a local attacker to escalate privileges to root. The issue was discovered by specialists from the…

🔗 hackmag.com/news/ubuntu-flaw?u

#news

##

CVE-2026-3838
(8.8 HIGH)

EPSS: 1.57%

updated 2026-03-17T14:18:58.587000

1 posts

Unraid Update Request Path Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Unraid. Authentication is required to exploit this vulnerability. The specific flaw exists within the update.php file. The issue results from the lack of proper validation of a user-supplied path prior to using it in file opera

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

📈 CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-32583
(5.3 MEDIUM)

EPSS: 2.73%

updated 2026-03-16T18:32:14

1 posts

Missing Authorization vulnerability in Webnus Inc. Modern Events Calendar allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Modern Events Calendar: from n/a through 7.29.0.

Nuclei template

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

📈 CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-31979
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-16T18:18:34.750000

1 posts

Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Prior to 3.1.0 and 2.3.8, the himmelblaud-tasks daemon, running as root, writes Kerberos cache files under /tmp/krb5cc_<uid> without symlink protections. Since commit 87a51ee, PrivateTmp is explicitly removed from the tasks daemon's systemd hardening, exposing it to the host /tmp. A local user can exploit this via sym

campuscodi@mastodon.social at 2026-03-22T12:01:18.000Z ##

A vulnerability in a Linux enterprise app can allow attackers root access over devices

The issue impacts Himmelblau, an interoperability suite to integrate Linux with Entra ID and Intune networks.

akamai.com/blog/security-resea

##

CVE-2026-2493
(7.5 HIGH)

EPSS: 15.24%

updated 2026-03-16T15:30:55

1 posts

IceWarp collaboration Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of IceWarp. Authentication is not required to exploit this vulnerability. The specific flaw exists within handling of the ticket parameter provided to the collaboration endpoint. The issue results from the lack of pr

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

📈 CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-15060
(9.8 CRITICAL)

EPSS: 1.71%

updated 2026-03-16T15:30:53

1 posts

claude-hovercraft executeClaudeCode Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of claude-hovercraft. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the executeClaudeCode method. The issue results from the lack of proper val

secdb@infosec.exchange at 2026-03-23T00:01:26.000Z ##

📈 CVE Published in last 7 days (2026-03-16 - 2026-03-23)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1444

Severity:
- Critical: 89
- High: 472
- Medium: 648
- Low: 83
- None: 152

Status:
- : 57
- Analyzed: 366
- Awaiting Analysis: 475
- Modified: 12
- Received: 339
- Rejected: 13
- Undergoing Analysis: 182

Top CNAs:
- GitHub, Inc.: 376
- VulnCheck: 209
- VulDB: 151
- Wordfence: 133
- MITRE: 72
- N/A: 57
- kernel.org: 45
- Patchstack: 39
- Chrome: 26
- Zero Day Initiative: 23

Top Affected Products:
- UNKNOWN: 994
- Openclaw: 79
- Google Chrome: 26
- Mattermost Server: 20
- Canva Affinity: 19
- Dlink Dns-321 Firmware: 15
- Dlink Dns-320 Firmware: 15
- Dlink Dns-345 Firmware: 15
- Dlink Dns-326 Firmware: 15
- Dlink Dns-1100-4 Firmware: 15

Top EPSS Score:
- CVE-2026-2493 - 15.24 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71260 - 6.54 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71257 - 3.58 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32596 - 2.26 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-32583 - 2.09 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4497 - 1.91 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71259 - 1.87 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-15060 - 1.71 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2025-71258 - 1.62 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3838 - 1.57 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-3909
(8.8 HIGH)

EPSS: 4.44%

updated 2026-03-13T21:32:59

2 posts

Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

youranonnewsirc@nerdculture.de at 2026-03-24T00:27:11.000Z ##

Global cybersecurity alerts include active exploitation of Chrome Zero-Days (CVE-2026-3909/3910) and a Quest KACE SMA flaw for credential harvesting. Advanced threats like Android haptic keyloggers and deepfake identity fraud are emerging. Geopolitically, Persian Gulf tensions remain high, while the US announced a new cyber strategy to defend companies from foreign adversaries. In tech, NVIDIA Nemotron 3 Super is now on Amazon Bedrock.

#Cybersecurity #GeopoliticalNews #TechBrief

##

youranonnewsirc@nerdculture.de at 2026-03-24T00:27:11.000Z ##

Global cybersecurity alerts include active exploitation of Chrome Zero-Days (CVE-2026-3909/3910) and a Quest KACE SMA flaw for credential harvesting. Advanced threats like Android haptic keyloggers and deepfake identity fraud are emerging. Geopolitically, Persian Gulf tensions remain high, while the US announced a new cyber strategy to defend companies from foreign adversaries. In tech, NVIDIA Nemotron 3 Super is now on Amazon Bedrock.

#Cybersecurity #GeopoliticalNews #TechBrief

##

CVE-2026-27446(CVSS UNKNOWN)

EPSS: 0.12%

updated 2026-03-05T15:28:06

1 posts

Missing Authentication for Critical Function (CWE-306) vulnerability in Apache Artemis, Apache ActiveMQ Artemis. An unauthenticated remote attacker can use the Core protocol to force a target broker to establish an outbound Core federation connection to an attacker-controlled rogue broker. This could potentially result in message injection into any queue and/or message exfiltration from any queue

EUVD_Bot@mastodon.social at 2026-03-24T10:01:07.000Z ##

🚨 EUVD-2026-14786

📊 Score: 5.3/10 (CVSS v3.1)
📦 Product: KNIME Business Hub, KNIME Business Hub, KNIME Business Hub
🏢 Vendor: KNIME
📅 Updated: 2026-03-24

📝 Apache Artemis before version 2.52.0 is affected by an authentication bypass flaw which allows reading all messages exchanged via the broker and injection of new message ( CVE-2026-27446 cve.org/CV...

🔗 euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

CVE-2026-27210
(6.1 MEDIUM)

EPSS: 0.03%

updated 2026-03-02T15:21:06.073000

2 posts

Pannellum is a lightweight, free, and open source panorama viewer for the web. In versions 3.5.0 through 2.5.6, the hot spot attributes configuration property allowed any attribute to be set, including HTML event handler attributes, allowing for potential XSS attacks. This affects websites hosting the standalone viewer HTML file and any other use of untrusted JSON config files (bypassing the prote

InfobloxThreatIntel at 2026-03-24T15:00:51.516Z ##

Dios mio! While researching a particular type of Colombian folk music, we stumbled across a .edu domain selling... accordions? Our first thought was potentially domain hijacking, but it appears to be more likely an exploitation of CVE-2026-27210 (TLDR; cross-site scripting). While the vulnerability has been patched in the plugin itself, not all pages have updated their plugins, and search engines have already indexed the poisoned pages! Pivoting led to 50+ additional domains found spread across three risky TLDs: .sbs, .pics, and .shop. The domains on .sbs and .pics appear to be config servers to exploit the vulnerability; the domains on .shop are the landing pages where victims can be scammed.

IOCs:
000o[.]sbs,0pen[.]sbs,123buys[.]shop,123me[.]shop,1bg[.]pics,1ki[.]pics,1mage[.]sbs,1ql[.]pics,1ty[.]pics,1vi[.]pics,1wr[.]pics,2ty[.]pics,569oagri[.]shop,66buys[.]shop,6ip[.]pics,6ym[.]pics,7rt[.]pics,8pi[.]pics,99buys[.]shop,99i[.]pics,9gwe[.]shop,a25n[.]shop,bk2[.]pics,bk59t[.]shop,buysok[.]shop,c68k[.]shop,cc1[.]pics,doo[.]pics,ep7[.]pics,estore-1[.]com,g9gvv[.]sbs,gaer896[.]shop,gm5[.]pics,gosok[.]shop,gt3[.]pics,h66p[.]shop,hh6[.]pics,iilvw[.]sbs,im9[.]pics,img1[.]sbs,in6[.]pics,jj3[.]pics,kk9[.]pics,lilil[.]sbs,llvvw[.]sbs,m66p6[.]shop,mebuys[.]shop,mg6[.]pics,mh8f6k[.]shop,mkk[.]pics,ms1[.]pics,nn6[.]pics,onsgs[.]com,p6[.]pics,p888p[.]shop,pan1[.]top,pic1[.]sbs,pic2[.]sbs,pt11[.]sbs,py3y[.]com,qq1[.]pics,rey89p[.]shop,shop56[.]shop,t88t8[.]shop,tp1[.]pics,tp9[.]pics,trues[.]sbs,up9[.]pics,upimg[.]sbs,uu2[.]pics,vt5[.]pics,vteyu[.]shop,vvf1[.]sbs,vvp1[.]sbs,w2w[.]pics,w88p[.]shop,wp59q[.]shop,wvlll[.]sbs,wvv1[.]sbs,wvvvv[.]sbs,x2p[.]pics,xyaer548[.]shop,yi1[.]pics

##

InfobloxThreatIntel@infosec.exchange at 2026-03-24T15:00:51.000Z ##

Dios mio! While researching a particular type of Colombian folk music, we stumbled across a .edu domain selling... accordions? Our first thought was potentially domain hijacking, but it appears to be more likely an exploitation of CVE-2026-27210 (TLDR; cross-site scripting). While the vulnerability has been patched in the plugin itself, not all pages have updated their plugins, and search engines have already indexed the poisoned pages! Pivoting led to 50+ additional domains found spread across three risky TLDs: .sbs, .pics, and .shop. The domains on .sbs and .pics appear to be config servers to exploit the vulnerability; the domains on .shop are the landing pages where victims can be scammed.

IOCs:
000o[.]sbs,0pen[.]sbs,123buys[.]shop,123me[.]shop,1bg[.]pics,1ki[.]pics,1mage[.]sbs,1ql[.]pics,1ty[.]pics,1vi[.]pics,1wr[.]pics,2ty[.]pics,569oagri[.]shop,66buys[.]shop,6ip[.]pics,6ym[.]pics,7rt[.]pics,8pi[.]pics,99buys[.]shop,99i[.]pics,9gwe[.]shop,a25n[.]shop,bk2[.]pics,bk59t[.]shop,buysok[.]shop,c68k[.]shop,cc1[.]pics,doo[.]pics,ep7[.]pics,estore-1[.]com,g9gvv[.]sbs,gaer896[.]shop,gm5[.]pics,gosok[.]shop,gt3[.]pics,h66p[.]shop,hh6[.]pics,iilvw[.]sbs,im9[.]pics,img1[.]sbs,in6[.]pics,jj3[.]pics,kk9[.]pics,lilil[.]sbs,llvvw[.]sbs,m66p6[.]shop,mebuys[.]shop,mg6[.]pics,mh8f6k[.]shop,mkk[.]pics,ms1[.]pics,nn6[.]pics,onsgs[.]com,p6[.]pics,p888p[.]shop,pan1[.]top,pic1[.]sbs,pic2[.]sbs,pt11[.]sbs,py3y[.]com,qq1[.]pics,rey89p[.]shop,shop56[.]shop,t88t8[.]shop,tp1[.]pics,tp9[.]pics,trues[.]sbs,up9[.]pics,upimg[.]sbs,uu2[.]pics,vt5[.]pics,vteyu[.]shop,vvf1[.]sbs,vvp1[.]sbs,w2w[.]pics,w88p[.]shop,wp59q[.]shop,wvlll[.]sbs,wvv1[.]sbs,wvvvv[.]sbs,x2p[.]pics,xyaer548[.]shop,yi1[.]pics

#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #seo_poisoning #seopoisoning

##

CVE-2026-26119
(8.8 HIGH)

EPSS: 0.05%

updated 2026-02-18T00:30:22

1 posts

Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.

CVE-2026-1207
(5.4 MEDIUM)

EPSS: 5.38%

updated 2026-02-04T17:34:46.147000

1 posts

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. Raster lookups on ``RasterField`` (only implemented on PostGIS) allows remote attackers to inject SQL via the band index parameter. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Tarek Nakkouch for reporting this issue.

Nuclei template

cyberveille@mastobot.ping.moi at 2026-03-24T17:00:12.000Z ##

📢 CVE-2026-1207 : Injection SQL dans Django/GeoDjango activement exploitée dans la nature
📝 ## 🔍 Contexte

Publié le 23 mars 2026 par CrowdSec, cet article rapporte la confirmation par la plateforme de l'exploitation active de *...
📖 cyberveille : cyberveille.ch/posts/2026-03-2
🌐 source : crowdsec.net/vulntracking-repo
#CVE_2026_1207 #Django #Cyberveille

##

CVE-2026-25253
(8.8 HIGH)

EPSS: 0.08%

updated 2026-02-02T23:41:06

1 posts

## Summary The Control UI trusts `gatewayUrl` from the query string without validation and auto-connects on load, sending the stored gateway token in the WebSocket connect payload. Clicking a crafted link or visiting a malicious site can send the token to an attacker-controlled server. The attacker can then connect to the victim's local gateway, modify config (sandbox, tool policies), and invoke

8 repos

https://github.com/EQSTLab/CVE-2026-25253

https://github.com/al4n4n/CVE-2026-25253-research

https://github.com/ZhaoymOvO/openclaw-1click-rce-env

https://github.com/ethiack/moltbot-1click-rce

https://github.com/FrigateCaptain/openclaw_vulnerabilities_and_solutions

https://github.com/Ckokoski/moatbot-security

https://github.com/Joseph19820124/openclaw-vuln-report

https://github.com/adibirzu/openclaw-security-monitor

_r_netsec@infosec.exchange at 2026-03-23T14:13:06.000Z ##

OpenClaw CVE-2026-25253 is worse than it looks (quick security checklist) blink.new/blog/openclaw-securi

##

CVE-2025-68602
(6.1 MEDIUM)

EPSS: 1.44%

updated 2026-01-20T15:33:48

1 posts

URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Scott Paterson Accept Donations with PayPal easy-paypal-donation allows Phishing.This issue affects Accept Donations with PayPal: from n/a through <= 1.5.1.

Nuclei template

CVE-2026-20817
(7.8 HIGH)

EPSS: 0.02%

updated 2026-01-14T20:31:32.760000

1 posts

Improper handling of insufficient permissions or privileges in Windows Error Reporting allows an authorized attacker to elevate privileges locally.

1 repos

https://github.com/oxfemale/CVE-2026-20817

itm4n@infosec.exchange at 2026-03-22T16:30:29.000Z ##

This is my analysis (and PoC) for CVE-2026-20817, a privilege escalation in the Windows Error Reporting service.

👉 itm4n.github.io/cve-2026-20817

Credit goes to Denis Faiustov and Ruslan Sayfiev for the discovery.

TL;DR A low privilege user could send an ALPC message to the WER service and coerce it to start a WerFault.exe process as SYSTEM with user-controlled arguments and options. I did not achieve arbitrary code execution, but perhaps someone knows how this can be done? 🤷‍♂️

##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 65.08%

updated 2025-12-09T16:53:25

1 posts

### Impact There is an unauthenticated remote code execution vulnerability in React Server Components. We recommend upgrading immediately. The vulnerability is present in versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 of: * [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack) * [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel) * [react-s

Nuclei template

100 repos

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/momika233/CVE-2025-55182-bypass

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/Faithtiannn/CVE-2025-55182

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/hualy13/CVE-2025-55182

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182

https://github.com/freeqaz/react2shell

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/xalgord/React2Shell

https://github.com/sumanrox/rschunter

https://github.com/kavienanj/CVE-2025-55182

https://github.com/zzhorc/CVE-2025-55182

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/Cillian-Collins/CVE-2025-55182

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/ynsmroztas/NextRce

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/theman001/CVE-2025-55182

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/BlackTechX011/React2Shell

https://github.com/kondukto-io/vulnerable-next-js-poc

https://github.com/Updatelap/CVE-2025-55182

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/alsaut1/react2shell-lab

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/shamo0/react2shell-PoC

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/nehkark/CVE-2025-55182

https://github.com/vulncheck-oss/cve-2025-55182

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/zr0n/react2shell

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182

https://github.com/mrknow001/RSC_Detector

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/theori-io/reactguard

https://github.com/emredavut/CVE-2025-55182

https://github.com/assetnote/react2shell-scanner

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/msanft/CVE-2025-55182

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/hoosin/CVE-2025-55182

https://github.com/surajhacx/react2shellpoc

https://github.com/rix4uni/CVE-2025-55182

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/shyambhanushali/React2Shell

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/snipevx/React2Shell-POC

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/alptexans/RSC-Detect-CVE-2025-55182

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/gensecaihq/react2shell-scanner

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/MemerGamer/CVE-2025-55182

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/Archerkong/CVE-2025-55182

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/sickwell/CVE-2025-55182

https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182

https://github.com/jctommasi/react2shellVulnApp

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/l4rm4nd/CVE-2025-55182

db@social.lol at 2026-03-24T06:33:58.000Z ##

"These two environments only communicate through serialized messages, which allows safe execution of AI-generated code and makes the sandbox a good fit for inline UI produced by chat agents."

arrow-js.com/#sandbox

hmm yes serialization that's bulletproof *cough* CVE-2025-55182 *cough*

(at least they're not pretending to review code anymore)

##

CVE-2025-32975
(10.0 CRITICAL)

EPSS: 0.17%

updated 2025-11-03T20:18:29.263000

2 posts

Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead

hackerworkspace@infosec.exchange at 2026-03-23T18:45:02.000Z ##

Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems

thehackernews.com/2026/03/hack

Short summary: hackerworkspace.com/article/ha

#cybersecurity #vulnerability #exploit

##

offseq@infosec.exchange at 2026-03-22T00:00:39.000Z ##

⚠️ CRITICAL: Quest KACE vuln (CVE-2025-32975) under active exploitation, mainly in education. No patch yet — segment networks, monitor KACE activity, and restrict access. Global risk. Details: radar.offseq.com/threat/critic #OffSeq #Vulnerability #QuestKACE #Education

##

CVE-2025-20720
(8.8 HIGH)

EPSS: 0.03%

updated 2025-10-15T21:31:40

1 posts

In wlan AP driver, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00418954; Issue ID: MSV-3569.

beyondmachines1@infosec.exchange at 2026-03-22T11:01:25.000Z ##

PolyShell Vulnerability Exposes Adobe Commerce and Magento to Remote Code Execution

Sansec reports "PolyShell," an unrestricted file upload vulnerability (CVE-2025-20720) in Magento and Adobe Commerce that allows unauthenticated attackers to achieve remote code execution via the REST API.

**If you are using Adobe Commerce and Magento Open Source, restrict web server access to the pub/media/custom_options/ directory to prevent the execution of uploaded malicious scripts. Since a production patch is currently not afailable, deploy a web application firewall to block exploit attempts in real-time.**
#cybersecurity #infosec #advisory #databreach
beyondmachines.net/event_detai

##

CVE-2025-41241
(4.4 MEDIUM)

EPSS: 0.05%

updated 2025-07-29T14:14:29.590000

1 posts

VMware vCenter contains a denial-of-service vulnerability. A malicious actor who is authenticated through vCenter and has permission to perform API calls for guest OS customisation may trigger this vulnerability to create a denial-of-service condition.

mastokukei@social.josko.org at 2026-03-24T09:02:05.000Z ##

(CVE-2025-41241), McKinsey AI platform hack (SQL injection), systemd age verification field.
- **Open-source tools & libraries**: Libreboot’s `mkhtemp` hardening, libdvd-package, Floci (AWS emulator), Grafeo (graph database), Regex Blaster.
- **Retro computing & niche projects**: FPGA 3dfx Voodoo implementation, AmigaOS updates (atrace, amigactl). [2/2]

##

CVE-2018-0204
(7.5 HIGH)

EPSS: 1.69%

updated 2023-02-01T05:08:53

1 posts

A vulnerability in the web portal of the Cisco Prime Collaboration Provisioning Tool could allow an unauthenticated, remote attacker to create a denial of service (DoS) condition for individual users. The vulnerability is due to weak login controls. An attacker could exploit this vulnerability by using a brute-force attack (Repeated Bad Login Attempts). A successful exploit could allow the attacke

BugBountyShorts@infosec.exchange at 2026-03-22T22:07:22.000Z ##

From a Silent Math Error to Certificate Bypass: Uncovering an Integer Overflow in a TLS Parser
This article details an integer overflow vulnerability within a Transport Layer Security (TLS) parser. The flaw allowed attackers to bypass certificate checks due to improper validation of parsed values. When the server received maliciously crafted client hello messages containing excessively large extensions, it failed to handle the unexpected data size. As a result, an integer overflow occurred, leading to buffer overflows and arbitrary code execution. The researcher exploited this vulnerability by sending a specially crafted TLS handshake request with extended client hello payloads that contained large, incorrectly parsed values. By modifying the length of extension fields, they tricked the parser into interpreting non-existent data as valid, causing unintended execution of malicious code and certificate bypass. The exploit resulted in a high severity vulnerability (CVE-2018-0204) with a CVSS score of 9.8. The researcher was awarded $36,000 for their findings, and the vendor promptly released patches to address this issue. To prevent similar issues, developers should perform rigorous input validation and limit the size of parsed values during TLS handshake processing. Key lesson: Proper input validation is crucial in TLS parsing to avoid buffer overflows and other security vulnerabilities #BugBounty #Cryptography #TLS #IntegerOverflow #BufferOverFlow

medium.com/@HackerMD/from-a-si

##

CVE-2026-33872
(0 None)

EPSS: 0.00%

1 posts

N/A

tylerayoung@fosstodon.org at 2026-03-24T16:25:43.000Z ##

If you're using the #ElixirLang NodeJS package, be advised there's an information disclosure security vulnerability (CVE-2026-33872).

It'd be quite difficult for an attacker to intentionally exploit, but fairly easy to accidentally trigger yourself. Update to 3.1.4 ASAP.

github.com/revelrylabs/elixir-

##

CVE-2025-33244
(0 None)

EPSS: 0.00%

2 posts

N/A

AAKL at 2026-03-24T16:07:04.698Z ##

New Nvidia advisories. This is a long list of vulnerabilities with varying severity.

Of note is the critical CVE-2025-33244: Security Bulletin: NVIDIA Apex - March 2026 nvidia.custhelp.com/app/answer

The rest: nvidia.com/en-us/product-secur

##

AAKL@infosec.exchange at 2026-03-24T16:07:04.000Z ##

New Nvidia advisories. This is a long list of vulnerabilities with varying severity.

Of note is the critical CVE-2025-33244: Security Bulletin: NVIDIA Apex - March 2026 nvidia.custhelp.com/app/answer

The rest: nvidia.com/en-us/product-secur #infosec #Nvidia #vulnerability

##

CVE-2026-33307
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-24T02:17:05.000Z ##

🟠 CVE-2026-33307 - High (7.5)

Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. In versions prior to 0.12.3 and 0.13.0, code for client certificate verification imported the certificate chain sent by the client into a fixed size `gnutls_x509_crt_t x509[]` array with...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T02:17:05.000Z ##

🟠 CVE-2026-33307 - High (7.5)

Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. In versions prior to 0.12.3 and 0.13.0, code for client certificate verification imported the certificate chain sent by the client into a fixed size `gnutls_x509_crt_t x509[]` array with...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33298
(0 None)

EPSS: 0.04%

4 posts

N/A

thehackerwire@mastodon.social at 2026-03-24T01:48:19.000Z ##

🟠 CVE-2026-33298 - High (7.8)

llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an integer overflow vulnerability in the `ggml_nbytes` function allows an attacker to bypass memory validation by crafting a GGUF file with specific tensor dimensions. This ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T01:30:32.000Z ##

🟠 CVE-2026-33298 - High (7.8)

llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an integer overflow vulnerability in the `ggml_nbytes` function allows an attacker to bypass memory validation by crafting a GGUF file with specific tensor dimensions. This ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T01:48:19.000Z ##

🟠 CVE-2026-33298 - High (7.8)

llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an integer overflow vulnerability in the `ggml_nbytes` function allows an attacker to bypass memory validation by crafting a GGUF file with specific tensor dimensions. This ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-24T01:30:32.000Z ##

🟠 CVE-2026-33298 - High (7.8)

llama.cpp is an inference of several LLM models in C/C++. Prior to b7824, an integer overflow vulnerability in the `ggml_nbytes` function allows an attacker to bypass memory validation by crafting a GGUF file with specific tensor dimensions. This ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32948
(0 None)

EPSS: 0.00%

1 posts

N/A

eed3si9n@mastodon.social at 2026-03-24T01:09:30.000Z ##

🔐 released sbt 1.12.7, featuring a security fix for CVE-2026-32948, Source dependency feature (via crafted VCS URL) leading to arbitrary code execution on Windows

this was discovered and fixed by Anatolii "Toli" Kmetiuk at Scala Center, who is also a new sbt committer
eed3si9n.com/sbt-1.12.7 #Scala

##

CVE-2026-33634
(0 None)

EPSS: 0.04%

1 posts

N/A

offseq@infosec.exchange at 2026-03-24T00:00:39.000Z ##

CVE-2026-33634: CRITICAL supply chain vuln in aquasecurity Trivy & GitHub Actions (<0.2.6) — credential-stealing malware deployed. Rotate all secrets, use safe versions, audit logs for 'tpcp-docs'. Full details: radar.offseq.com/threat/cve-20 #OffSeq #SupplyChain #CVE2026_33634

##

CVE-2026-33164
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-23T21:59:52.000Z ##

🟠 CVE-2026-33164 - High (7.5)

libde265 is an open source implementation of the h.265 video codec. Prior to version 1.0.17, a malformed H.265 PPS NAL unit causes a segmentation fault in pic_parameter_set::set_derived_values(). This issue has been patched in version 1.0.17.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33648
(0 None)

EPSS: 0.09%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-23T20:15:11.000Z ##

🟠 CVE-2026-33648 - High (8.8)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the restreamer endpoint constructs a log file path by embedding user-controlled `users_id` and `liveTransmitionHistory_id` values from the JSON request body withou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33647
(0 None)

EPSS: 0.21%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-23T20:15:01.000Z ##

🟠 CVE-2026-33647 - High (8.8)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `ImageGallery::saveFile()` method validates uploaded file content using `finfo` MIME type detection but derives the saved filename extension from the user-supp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33717
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-23T20:05:25.000Z ##

🟠 CVE-2026-33717 - High (8.8)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `downloadVideoFromDownloadURL()` function in `objects/aVideoEncoder.json.php` saves remote content to a web-accessible temporary directory using the original U...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T19:19:10.000Z ##

🟠 CVE-2026-33717 - High (8.8)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `downloadVideoFromDownloadURL()` function in `objects/aVideoEncoder.json.php` saves remote content to a web-accessible temporary directory using the original U...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33716
(0 None)

EPSS: 0.08%

2 posts

N/A

thehackerwire@mastodon.social at 2026-03-23T19:20:50.000Z ##

🔴 CVE-2026-33716 - Critical (9.4)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the standalone live stream control endpoint at `plugin/Live/standAloneFiles/control.json.php` accepts a user-supplied `streamerURL` parameter that overrides where ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-03-23T19:19:01.000Z ##

🔴 CVE-2026-33716 - Critical (9.4)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the standalone live stream control endpoint at `plugin/Live/standAloneFiles/control.json.php` accepts a user-supplied `streamerURL` parameter that overrides where ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33719
(0 None)

EPSS: 0.12%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-23T19:19:19.000Z ##

🟠 CVE-2026-33719 - High (8.6)

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the CDN plugin endpoints `plugin/CDN/status.json.php` and `plugin/CDN/disable.json.php` use key-based authentication with an empty string default key. When the CDN...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4645
(0 None)

EPSS: 0.11%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-23T14:26:00.000Z ##

🟠 CVE-2026-4645 - High (7.5)

A flaw was found in the `github.com/antchfx/xpath` component. A remote attacker could exploit this vulnerability by submitting crafted Boolean XPath expressions that evaluate to true. This can cause an infinite loop in the `logicalQuery.Select` fu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2023-4567
(0 None)

EPSS: 0.00%

1 posts

N/A

linux@activitypub.awakari.com at 2026-03-22T09:40:34.000Z ## Ubuntu Jammy SPIP Security Vulnerability Identified as CVE-2023-4567 Jul Blobul discovered that SPIP, a website engine for publishing, is prone to a privilege escalation vulnerability. For the stab...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-32888
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-03-22T01:40:54.000Z ##

🟠 CVE-2026-32888 - High (8.8)

Open Source Point of Sale is a web based point-of-sale application written in PHP using CodeIgniter framework. Versions contain an SQL Injection in the Items search functionality. When the custom attribute search feature is enabled (search_custom ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites