24h | 7d | 30d

Overview

  • Order Up
  • Online Ordering System

23 Feb 2026
Published
23 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.05%

KEV

Description

SQL Injection vulnerability in the /api/integrations/getintegrations endpoint of Order Up Online Ordering System 1.0 allows an unauthenticated attacker to access sensitive backend database data via a crafted store_id parameter in a POST request.

Statistics

  • 1 Post

Last activity: 13 hours ago

Fediverse

Profile picture fallback

⚠️ CVE-2026-24494 (CRITICAL, CVSS 9.8): SQL Injection in Order Up Online Ordering System v1.0 lets unauthenticated attackers run arbitrary SQL via /api/integrations/getintegrations. Patch or mitigate now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 13h ago

Overview

  • D-Link
  • DWR-M960

22 Feb 2026
Published
22 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A vulnerability was detected in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_44E0F8 of the file /boafrm/formNewSchedule. Performing a manipulation of the argument url results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.

Statistics

  • 1 Post

Last activity: 16 hours ago

Fediverse

Profile picture fallback

⚠️ HIGH severity: D-Link DWR-M960 v1.01.07 hit by stack-based buffer overflow (CVE-2026-2959) via /boafrm/formNewSchedule. Remote exploitation possible — public exploit available! Assess & monitor. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 10
  • libxml2

15 Jan 2026
Published
15 Jan 2026
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2026-0990 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/403 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • OpenSSL
  • OpenSSL

27 Jan 2026
Published
29 Jan 2026
Updated

CVSS
Pending
EPSS
0.67%

KEV

Description

Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue. OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2025-15467 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/406 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • D-Link
  • DWR-M960

23 Feb 2026
Published
23 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A vulnerability was found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_460F30 of the file /boafrm/formDateReboot of the component Scheduled Reboot Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.

Statistics

  • 1 Post

Last activity: 14 hours ago

Fediverse

Profile picture fallback

🛡️ HIGH severity: CVE-2026-2962 impacts D-Link DWR-M960 (1.01.07). Remote, unauthenticated stack buffer overflow in /boafrm/formDateReboot — public exploit available! Patch or restrict access immediately. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Go standard library
  • net/url
  • net/url

28 Jan 2026
Published
29 Jan 2026
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2025-61726 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/396 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • D-Link
  • DWR-M960

23 Feb 2026
Published
23 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A flaw has been found in D-Link DWR-M960 1.01.07. Affected by this issue is the function sub_468D64 of the file /boafrm/formDhcpv6s. Executing a manipulation of the argument submit-url can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.

Statistics

  • 1 Post

Last activity: 8 hours ago

Fediverse

Profile picture fallback

🛡️ CVE-2026-2960: HIGH severity stack-based buffer overflow in D-Link DWR-M960 (fw 1.01.07). Remote, unauthenticated RCE possible; PoC exploit published. Patch or restrict access now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 8h ago

Overview

  • GnuTLS
  • libtasn1

07 Jan 2026
Published
20 Jan 2026
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2025-13151 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/402 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Go standard library
  • crypto/tls
  • crypto/tls

05 Feb 2026
Published
20 Feb 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2025-68121 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/401 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • openclaw
  • openclaw

19 Feb 2026
Published
20 Feb 2026
Updated

CVSS v3.1
HIGH (7.2)
EPSS
0.02%

KEV

Description

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, a mismatch between `rawCommand` and `command[]` in the node host `system.run` handler could cause allowlist/approval evaluation to be performed on one command while executing a different argv. This only impacts deployments that use the node host / companion node execution path (`system.run` on a node), enable allowlist-based exec policy (`security=allowlist`) with approval prompting driven by allowlist misses (for example `ask=on-miss`), allow an attacker to invoke `system.run`. Default/non-node configurations are not affected. Version 2026.2.14 enforces `rawCommand`/`command[]` consistency (gateway fail-fast + node host validation).

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
📌 CVE-2026-26325 - OpenClaw is a personal AI assistant. Prior to version 2026.2.14, a mismatch between `rawCommand` and `command[]` in the node host `system.run` handler... https://www.cyberhub.blog/cves/CVE-2026-26325
  • 0
  • 0
  • 0
  • 1h ago
Showing 11 to 20 of 50 CVEs