24h | 7d | 30d

Overview

  • Tenda
  • FH1201

29 Mar 2026
Published
29 Mar 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A flaw has been found in Tenda FH1201 1.2.0.14(408). Affected is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component Parameter Handler. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been published and may be used.

Statistics

  • 1 Post

Last activity: 3 hours ago

Fediverse

Profile picture fallback

⚠️ CVE-2026-5046 (HIGH): Tenda FH1201 v1.2.0.14(408) suffers stack-based buffer overflow via /goform/WrlExtraSet. Public exploit available — restrict remote access, monitor logs, and segment affected devices. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 3h ago

Overview

  • wpchill
  • Download Monitor

30 Mar 2026
Published
30 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
Pending

KEV

Description

The Download Monitor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.7 via the executePayment() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to complete arbitrary pending orders by exploiting a mismatch between the PayPal transaction token and the local order, allowing theft of paid digital goods by paying a minimal amount for a low-cost item and using that payment token to finalize a high-value order.

Statistics

  • 1 Post

Last activity: 6 hours ago

Fediverse

Profile picture fallback

🛑 CVE-2026-3124: HIGH-severity IDOR in wpchill Download Monitor (all versions) lets unauth attackers finalize orders by reusing PayPal tokens — digital goods can be stolen. Patch or apply strict validation ASAP! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 6h ago

Overview

  • nodejs
  • node

20 Jan 2026
Published
21 Jan 2026
Updated

CVSS v3.0
MEDIUM (5.9)
EPSS
0.04%

KEV

Description

A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.

Statistics

  • 1 Post

Last activity: 13 hours ago

Bluesky

Profile picture fallback
BREAKING: #Debian just issued DSA-6183-1 for Node.js. 7 CVEs (CVE-2026-21637 series) enable DoS, side-channel attacks & data leaks. If you run Debian trixie with Node.js <20.19.2, you're exposed. Thread: What you need to do NOW? Read more: 👉 tinyurl.com/ycpfae6r #Security
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • strongSwan
  • strongSwan

23 Mar 2026
Published
27 Mar 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.15%

KEV

Description

strongSwan versions 4.5.0 prior to 6.0.5 contain an integer underflow vulnerability in the EAP-TTLS AVP parser that allows unauthenticated remote attackers to cause a denial of service by sending crafted AVP data with invalid length fields during IKEv2 authentication. Attackers can exploit the failure to validate AVP length fields before subtraction to trigger excessive memory allocation or NULL pointer dereference, crashing the charon IKE daemon.

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture fallback
Essential reading for infrastructure teams: Our comprehensive pillar page on strongSwan CVE-2026-25075 covers technical remediation, compliance mapping, and ROI analysis for enterprise VPN security. Read more: 👉 tinyurl.com/mtfkbh4e #Security #Mageia
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • ultrajson
  • ultrajson

20 Mar 2026
Published
20 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.07%

KEV

Description

UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Versions 5.4.0 through 5.11.0 contain an accumulating memory leak in JSON parsing large (outside of the range [-2^63, 2^64 - 1]) integers. The leaked memory is a copy of the string form of the integer plus an additional NULL byte. The leak occurs irrespective of whether the integer parses successfully or is rejected due to having more than sys.get_int_max_str_digits() digits, meaning that any sized leak per malicious JSON can be achieved provided that there is no limit on the overall size of the payload. Any service that calls ujson.load()/ujson.loads()/ujson.decode() on untrusted inputs is affected and vulnerable to denial of service attacks. This issue has been fixed in version 5.12.0.

Statistics

  • 1 Post

Last activity: 14 hours ago

Bluesky

Profile picture fallback
New resource for security engineers: Comprehensive pillar guide on the #python-ujson vulnerabilities (CVE-2026-32874/75). Read more: 👉 tinyurl.com/yvnnyr5y #Security
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Canonical
  • lxd
  • lxd

12 Mar 2026
Published
13 Mar 2026
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
0.13%

KEV

Description

An improper sanitization of the compression_algorithm parameter in Canonical LXD allows an authenticated, unprivileged user to execute commands as the LXD daemon on the LXD server via API calls to the image and backup endpoints. This issue affected LXD from 4.12 through 6.6 and was fixed in the snap versions 5.0.6-e49d9f4 (channel 5.0/stable), 5.21.4-1374f39 (channel 5.21/stable), and 6.7-1f11451 (channel 6.0 stable). The channel 4.0/stable is not affected as it contains version 4.0.10.

Statistics

  • 1 Post

Last activity: 13 hours ago

Bluesky

Profile picture fallback
🚨 BREAKING: #Debian DSA-6184-1 patches 3 critical Incus vulnerabilities (CVE-2026-28384/33542/33743). If you run containers on Debian Trixie, read this thread Read more: 👉 tinyurl.com/2ye9cmh8 #Security
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Cisco
  • Cisco Secure Firewall Management Center (FMC)

04 Mar 2026
Published
05 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.05%

KEV

Description

A vulnerability in the web interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to bypass authentication and execute script files on an affected device to obtain root access to the underlying operating system. This vulnerability is due to an improper system process that is created at boot time. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute a variety of scripts and commands that allow root access to the device.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
CVE-2026-20079 - Cisco FMC Authentication Bypass RCE Analysis www.vulncheck.com/blog/cisco-f...
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • code-projects
  • Chamber of Commerce Membership Management System

29 Mar 2026
Published
29 Mar 2026
Updated

CVSS v4.0
MEDIUM (5.1)
EPSS
0.23%

KEV

Description

A vulnerability was identified in code-projects Chamber of Commerce Membership Management System 1.0. Impacted is the function fwrite of the file admin/pageMail.php. The manipulation of the argument mailSubject/mailMessage leads to command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.

Statistics

  • 1 Post

Last activity: 23 hours ago

Fediverse

Profile picture fallback

⚠️ CVE-2026-5041 (MEDIUM): Command injection in Chamber of Commerce Membership Mgmt System v1.0 via admin/pageMail.php. High privileges needed, public exploit exists. Input validation & patching advised. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 23h ago

Overview

  • OneUptime
  • oneuptime

12 Mar 2026
Published
14 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.40%

KEV

Description

OneUptime is a solution for monitoring and managing online services. Prior to 10.0.23, the telemetry aggregation API accepts user-controlled aggregationType, aggregateColumnName, and aggregationTimestampColumnName parameters and interpolates them directly into ClickHouse SQL queries via the .append() method (documented as "trusted SQL"). There is no allowlist, no parameterized query binding, and no input validation. An authenticated user can inject arbitrary SQL into ClickHouse, enabling full database read (including telemetry data from all tenants), data modification, and potential remote code execution via ClickHouse table functions. This vulnerability is fixed in 10.0.23.

Statistics

  • 1 Post

Last activity: Last hour

Bluesky

Profile picture fallback
CVE-2026-32306 - OneUptime ClickHouse SQL Injection via Aggregate Query Parameters scq.ms/4sC5f9O
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Microsoft
  • Windows 10 Version 1607

10 Mar 2026
Published
27 Mar 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.06%

KEV

Description

Incorrect permission assignment for critical resource in Windows Accessibility Infrastructure (ATBroker.exe) allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture fallback
CVE-2026-24291 (RegPwn): Critical Windows LPE Exploit Exposes Full System Compromise – Patch Now! + Video Introduction: A newly disclosed Windows Local Privilege Escalation (LPE) vulnerability, designated CVE-2026-24291 and dubbed “RegPwn,” leverages improper registry permission assignments to…
  • 0
  • 0
  • 0
  • 22h ago
Showing 11 to 20 of 78 CVEs