24h | 7d | 30d

Overview

  • wpeverest
  • User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder

03 Mar 2026
Published
03 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.07%

KEV

Description

The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to improper privilege management in all versions up to, and including, 5.1.2. This is due to the plugin accepting a user-supplied role during membership registration without properly enforcing a server-side allowlist. This makes it possible for unauthenticated attackers to create administrator accounts by supplying a role value during membership registration.

Statistics

  • 5 Posts
  • 3 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

⚠️ WordPress membership plugin bug exploited to create admin accounts

「 The security vulnerability is tracked as CVE-2026-1492 and received a critical severity rating of 9.8. Because the plugin accepts a user-supplied role during membership registration, hackers can create administrator accounts without authentication 」

bleepingcomputer.com/news/secu

#wordpress #cybersecurity

  • 2
  • 1
  • 0
  • 22h ago
Profile picture fallback

Hackers are exploiting a WordPress plugin flaw (CVE-2026-1492) that lets attackers create admin accounts without authentication on

If you run WordPress, update or disable the plugin immediately.

bleepingcomputer.com/news/secu

  • 0
  • 0
  • 1
  • Last hour

Bluesky

Profile picture fallback
🛑 WordPress – CVE-2026-1492 : une faille dans un plugin permet de devenir admin très facilement 👇 Tous les détails - www.it-connect.fr/wordpress-cv... #WordPress #Web #infosec #cybersecurity
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • VMware
  • Aria Operations
  • vmware-aria-operations

25 Feb 2026
Published
04 Mar 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
7.35%

Description

VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.  To remediate CVE-2026-22719, apply the patches listed in the 'Fixed Version' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001  Workarounds for CVE-2026-22719 are documented in the 'Workarounds' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 1 hour ago

Bluesky

Profile picture fallback
CISA added CVE-2026-22719 to KEV after active exploitation of VMware Aria Operations (incl. Cloud Foundation & vSphere Foundation). Patch immediately. Query: web.html~"com.vmware.vsphere.client" OR web.title~"VMware Cloud Director Availability" OR web.title~"VMware Aria Operations"
  • 0
  • 1
  • 0
  • 4h ago
Profile picture fallback
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • WWBN
  • AVideo-Encoder

06 Mar 2026
Published
06 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.10%

KEV

Description

AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the base64Url GET parameter. This can lead to full server compromise, data exfiltration (e.g., configuration secrets, internal keys, credentials), and service disruption. This issue has been patched in version 7.0.

Statistics

  • 2 Posts

Last activity: 5 hours ago

Fediverse

Profile picture fallback

⚠️ CRITICAL OS command injection in WWBN AVideo-Encoder < 7.0 (CVE-2026-29058). Unauthenticated attackers can execute arbitrary commands, risking full server takeover. Patch to v7.0 ASAP! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 10h ago

Bluesky

Profile picture fallback
CVE-2026-29058: The Zero-Click AVideo Hack That Lets Attackers Run Wild on Your Streaming Servers + Video Introduction: In the high-stakes world of streaming infrastructure, a newly disclosed zero-click vulnerability (CVE-2026-29058) is sending ripples through the cybersecurity community. This…
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • pac4j
  • pac4j-jwt

04 Mar 2026
Published
05 Mar 2026
Updated

CVSS v4.0
CRITICAL (10.0)
EPSS
0.24%

KEV

Description

pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication bypass vulnerability in JwtAuthenticator when processing encrypted JWTs that allows remote attackers to forge authentication tokens. Attackers who possess the server's RSA public key can create a JWE-wrapped PlainJWT with arbitrary subject and role claims, bypassing signature verification to authenticate as any user including administrators.

Statistics

  • 2 Posts

Last activity: Last hour

Bluesky

Profile picture fallback
JWT Java a rischio: la falla in pac4j-jwt permette di diventare admin con un solo token La vulnerabilità CVE-2026-29000 in pac4j-jwt consente di aggirare l’autenticaz... https://www.ilsoftware.it/vulnerabilita-applicazioni-jwt-java-libreria-pac4j-jwt/
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
CVE-2026-29000: Critical Auth Bypass in pac4j-jwt: Full PoC Using Only a Public Key
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Cisco
  • Cisco Catalyst SD-WAN Manager

25 Feb 2026
Published
06 Mar 2026
Updated

CVSS v3.1
MEDIUM (5.4)
EPSS
0.04%

KEV

Description

A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system. This vulnerability is due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system&nbsp;and gain vmanage user privileges.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: Last hour

Bluesky

Profile picture fallback
Cisco has confirmed active exploitation targeting two vulnerabilities in Cisco Catalyst SD-WAN Manager (formerly vManage), tracked as CVE-2026-20122 and CVE-2026-20128. socradar.io/blog/cisco-c...
  • 0
  • 1
  • 0
  • 3h ago
Profile picture fallback
Cisco Catalyst SD-WANの脆弱性、さらに2件の悪用が明らかに:CVE-2026-20128、CVE-2026-20122 | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/44386/
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Cisco advierte sobre la explotación de SD-WAN Manager y corrige 48 vulnerabilidades de firewall. Los hackers ya están explotando activamente dos fallos críticos (CVE-2026-20128 y CVE-2026-20122). Si usas equipos Cisco, ¡parcha ahora antes de que sea tarde! www.linkedin.com/pulse/cisco-...
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Cisco
  • Cisco Catalyst SD-WAN Manager

25 Feb 2026
Published
06 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.02%

KEV

Description

A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA user privileges on an affected system. To exploit this vulnerability, the attacker must have valid&nbsp;vmanage credentials on the affected system. This vulnerability is due to the presence of a credential file for the DCA user on an affected system. An attacker could exploit this vulnerability by accessing the filesystem as a low-privileged user and reading the file that contains the DCA password from that affected system. A successful exploit could allow the attacker to access another affected system and gain DCA user privileges. Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: Last hour

Bluesky

Profile picture fallback
Cisco has confirmed active exploitation targeting two vulnerabilities in Cisco Catalyst SD-WAN Manager (formerly vManage), tracked as CVE-2026-20122 and CVE-2026-20128. socradar.io/blog/cisco-c...
  • 0
  • 1
  • 0
  • 3h ago
Profile picture fallback
Cisco Catalyst SD-WANの脆弱性、さらに2件の悪用が明らかに:CVE-2026-20128、CVE-2026-20122 | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/44386/
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Cisco advierte sobre la explotación de SD-WAN Manager y corrige 48 vulnerabilidades de firewall. Los hackers ya están explotando activamente dos fallos críticos (CVE-2026-20128 y CVE-2026-20122). Si usas equipos Cisco, ¡parcha ahora antes de que sea tarde! www.linkedin.com/pulse/cisco-...
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Google
  • Chrome

04 Mar 2026
Published
05 Mar 2026
Updated

CVSS
Pending
EPSS
0.07%

KEV

Description

Integer overflow in ANGLE in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Critical)

Statistics

  • 2 Posts

Last activity: 7 hours ago

Bluesky

Profile picture fallback
Heads up, #Debian self-hosters and sysadmins. DSA-6157-1 is out for Chromium, addressing CVE-2026-3536 (arbitrary code execution) and friends. Read more: 👉 tinyurl.com/4hrbcfek #Security
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
Google、Chromeの致命的な脆弱性3件を含む脆弱性 10件を修正(CVE-2026-3536,CVE-2026-3537,CVE-2026-3538) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Cisco
  • Cisco Catalyst SD-WAN Manager

25 Feb 2026
Published
26 Feb 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
2.60%

Description

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root&nbsp;user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.&nbsp;

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 22 hours ago

Fediverse

Profile picture fallback

Cisco Catalyst SD-WAN CVSS 10.0 zero-day (CVE-2026-20127) has been actively exploited, with attackers gaining admin access.

Full technical breakdown: forum.hashpwn.net/post/10802

  • 3
  • 0
  • 0
  • 22h ago

Overview

  • zed-industries
  • zed

25 Feb 2026
Published
27 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.05%

KEV

Description

Zed, a code editor, has an extension installer allows tar/gzip downloads. Prior to version 0.224.4, the tar extractor (`async_tar::Archive::unpack`) creates symlinks from the archive without validation, and the path guard (`writeable_path_from_extension`) only performs lexical prefix checks without resolving symlinks. An attacker can ship a tar that first creates a symlink inside the extension workdir pointing outside (e.g., `escape -> /`), then writes files through the symlink, causing writes to arbitrary host paths. This escapes the extension sandbox and enables code execution. Version 0.224.4 patches the issue.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 4 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-27976 - Zed, a code editor, has an extension installer allows tar/gzip downloads. Prior to version 0.224.4, the tar extractor (`async_tar::Archive::unpack`) c... https://www.cyberhub.blog/cves/CVE-2026-27976
  • 0
  • 2
  • 0
  • 4h ago

Overview

  • authlib
  • joserfc

03 Mar 2026
Published
04 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.08%

KEV

Description

joserfc is a Python library that provides an implementation of several JSON Object Signing and Encryption (JOSE) standards. In 1.6.2 and earlier, a resource exhaustion vulnerability in joserfc allows an unauthenticated attacker to cause a Denial of Service (DoS) via CPU exhaustion. When the library decrypts a JSON Web Encryption (JWE) token using Password-Based Encryption (PBES2) algorithms, it reads the p2c (PBES2 Count) parameter directly from the token's protected header. This parameter defines the number of iterations for the PBKDF2 key derivation function. Because joserfc does not validate or bound this value, an attacker can specify an extremely large iteration count (e.g., 2^31 - 1), forcing the server to expend massive CPU resources processing a single token. This vulnerability exists at the JWA layer and impacts all high-level JWE and JWT decryption interfaces if PBES2 algorithms are allowed by the application's policy.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 22 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-27932 - joserfc is a Python library that provides an implementation of several JSON Object Signing and Encryption (JOSE) standards. In 1.6.2 and earlier, a re... https://www.cyberhub.blog/cves/CVE-2026-27932
  • 0
  • 1
  • 0
  • 22h ago
Showing 1 to 10 of 97 CVEs