24h | 7d | 30d

Overview

  • Moxa
  • EDR-8010 Series

27 Apr 2026
Published
27 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.09%

KEV

Description

An improper handling of the length parameter inconsistency vulnerability has been identified in Moxa’s Secure Router. Because of improper validation of length parameters in the HTTPS management interface, an unauthenticated remote attacker could send specially crafted requests that trigger a buffer overflow condition, causing the web service to become unresponsive. Successful exploitation may result in a denial-of-service condition requiring a device reboot to restore normal operation. While successful exploitation can severely impact the availability of the affected device, no impact to the confidentiality or integrity of the affected product has been identified. Additionally, no confidentiality, integrity, or availability impact to the subsequent system has been identified.

Statistics

  • 1 Post

Last activity: 8 hours ago

Fediverse

Profile picture fallback

⚠️ HIGH severity: CVE-2026-3868 affects Moxa EDR-8010 v1.0 routers. Remote attackers can trigger a DoS via HTTPS mgmt interface buffer overflow. No patch yet — restrict access & monitor for outages. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 8h ago

Overview

  • PowerDNS
  • Recursor
  • pdns-recursor

22 Apr 2026
Published
22 Apr 2026
Updated

CVSS v3.1
MEDIUM (5.3)
EPSS
0.00%

KEV

Description

An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.

Statistics

  • 1 Post

Last activity: 9 hours ago

Bluesky

Profile picture fallback
PowerDNS Recursorの脆弱性情報が公開されました(CVE-2026-33256、他8件) https://jprs.jp/tech/security/2026-04-27-powerdns-recursor.html
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • FreeBSD
  • FreeBSD

26 Mar 2026
Published
02 Apr 2026
Updated

CVSS
Pending
EPSS
0.09%

KEV

Description

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel. In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system.

Statistics

  • 1 Post

Last activity: 10 hours ago

Fediverse

Profile picture fallback

@bagder maybe edit your post to show his full name:

Devansh Batham.

In a post to Substack, Devansh (surname unknown, @chocolatemilkcultleader) is horribly mistaken about Claude, Carlini, and FreeBSD CVE-2026-4747.

Thanks.

Cc @sszuecs

#human #slop #confusion #AI #FreeBSD

  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Japan Computer Emergency Response Team Coordination Center (JPCERT/CC)
  • LogonTracer

27 Apr 2026
Published
27 Apr 2026
Updated

CVSS v3.0
HIGH (8.8)
EPSS
0.23%

KEV

Description

An OS command Injection issue exists in LogonTracer prior to v2.0.0. An arbitrary OS command may be executed by a logged-in user.

Statistics

  • 1 Post

Last activity: 12 hours ago

Fediverse

Profile picture fallback

⚠️ HIGH severity: OS command injection in JPCERT/CC LogonTracer before v2.0.0 (CVE-2026-33277). Logged-in users can run arbitrary OS commands. Restrict access & monitor logs until patch available. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Microsoft
  • Windows 10 Version 1507

10 Jun 2025
Published
26 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
49.24%

Description

Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
Authentication reflection attacks are still not dead! In our new blogpost series, @yaumn.bsky.social shares his journey into bypassing the mitigations of CVE-2025-33073 to pop SYSTEM shells again! 🚀 👇 www.synacktiv.com/en/node/1337
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Tenda
  • F456

27 Apr 2026
Published
27 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.05%

KEV

Description

A security vulnerability has been detected in Tenda F456 1.0.0.5. This impacts the function fromPPTPUserSetting of the file /goform/PPTPUserSetting of the component httpd. Such manipulation of the argument delno leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

Statistics

  • 1 Post

Last activity: 6 hours ago

Fediverse

Profile picture fallback

⚠️ HIGH severity: Tenda F456 (v1.0.0.5) buffer overflow in httpd's fromPPTPUserSetting (CVE-2026-7080) enables remote code execution or DoS. No patch yet — restrict device exposure & monitor for updates. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

14 Apr 2026
Published
24 Apr 2026
Updated

CVSS v3.1
MEDIUM (4.3)
EPSS
0.09%

KEV

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Fortinet
  • FortiClientEMS

06 Feb 2026
Published
14 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
43.14%

Description

An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Statistics

  • 2 Posts

Last activity: 2 hours ago

Bluesky

Profile picture fallback
🚨 In this week’s newsletter, we cover CVE-2026-21643, a FortiClient EMS SQL injection now under active exploitation. We break down how it moved from advisory to real attacks and what defenders should do next. Read the full analysis and protect your systems 👉 www.crowdsec.net/vulntracking...
  • 0
  • 0
  • 1
  • 2h ago

Overview

  • Apache Software Foundation
  • Apache Camel
  • org.apache.camel:camel-infinispan

27 Apr 2026
Published
27 Apr 2026
Updated

CVSS
Pending
EPSS
0.08%

KEV

Description

The camel-infinispan component's ProtoStream-based remote aggregation repository deserializes data read from a remote Infinispan cache using java.io.ObjectInputStream without applying any ObjectInputFilter. An attacker who can write to the Infinispan cache used by a Camel application can inject a crafted serialized Java object that, when read during normal aggregation repository operations such as get or recover, results in arbitrary code execution in the context of the application. This issue affects Apache Camel: from 4.0.0 before 4.14.7, from 4.15.0 before 4.18.2, from 4.19.0 before 4.20.0. Users are recommended to upgrade to version 4.20.0, which fixes the issue. If users are on the 4.14.x LTS releases stream, then they are suggested to upgrade to 4.14.7. If users are on the 4.18.x releases stream, then they are suggested to upgrade to 4.18.2. The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-23322 refers to the various commits that resolved the issue, and have more details. This issue follows the same class of vulnerability previously addressed in CVE-2024-22369, CVE-2024-23114 and CVE-2026-25747.

Statistics

  • 1 Post

Last activity: 5 hours ago

Fediverse

Profile picture fallback

🔴 CRITICAL: CVE-2026-40858 in Apache Camel's camel-infinispan lets attackers with cache write access trigger arbitrary code execution. Patch to 4.20.0/4.14.7/4.18.2 ASAP! More info: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 5h ago

Overview

  • GStreamer
  • GStreamer

22 May 2025
Published
17 Jun 2025
Updated

CVSS v3.0
HIGH (8.8)
EPSS
1.62%

KEV

Description

GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the parsing of H265 slice headers. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26596.

Statistics

  • 2 Posts

Last activity: 21 hours ago

Bluesky

Profile picture fallback
There is a buffer overflow in Ubuntu's H.265 parser (CVE-2025-3887). Yes, your video player can be hacked. Read more-> tinyurl.com/yjxk8wek #Ubuntu
  • 0
  • 0
  • 1
  • 21h ago
Showing 11 to 20 of 29 CVEs