24h | 7d | 30d

Overview

  • Totolink
  • A7100RU

09 Apr 2026
Published
09 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.89%

KEV

Description

A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument pptpPassThru leads to os command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Statistics

  • 1 Post

Last activity: 10 hours ago

Fediverse

Profile picture fallback

🛑 CRITICAL: CVE-2026-5850 in Totolink A7100RU (fw 7.4cu.2313_b20191024) enables unauthenticated OS command injection via pptpPassThru. No patch yet — restrict access & monitor advisories. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 10h ago

Overview

  • obsidianforensics
  • unfurl
  • dfir-unfurl

08 Apr 2026
Published
09 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.10%

KEV

Description

Unfurl through 2025.08 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string to evaluate truthy, allowing attackers to access the Werkzeug debugger and disclose sensitive information or achieve remote code execution.

Statistics

  • 1 Post

Last activity: 18 hours ago

Fediverse

Profile picture fallback

⚠️ CRITICAL: obsidianforensics unfurl up to 2025.08 enables Flask debug mode by default. Attackers can exploit CVE-2026-40035 for RCE & info disclosure. Avoid production use, disable debug mode, monitor for fixes. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Fortinet
  • FortiClientEMS

04 Apr 2026
Published
07 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
5.95%

Description

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

Statistics

  • 1 Post

Last activity: 21 hours ago

Bluesky

Profile picture fallback
FortiClient EMSの脆弱性 CVE-2026-35616を各国当局が警告 rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • Google
  • Chrome

08 Apr 2026
Published
08 Apr 2026
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

Heap buffer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
Critical Chrome 0-Days Under Active Exploit? 6K Bounty Flaws Let Attackers Hijack Your Browser Remotely + Video Introduction Google’s Chrome 147 stable channel update patches two critical heap buffer overflow vulnerabilities (CVE-2026-5858 and CVE-2026-5859) in the Web Machine Learning (WebML) API…
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Joomla! Project
  • Joomla! CMS

01 Apr 2026
Published
02 Apr 2026
Updated

CVSS v4.0
HIGH (8.6)
EPSS
0.02%

KEV

Description

An improper access check allows unauthorized access to webservice endpoints.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
CVE-2026-23898 & CVE-2026-23899: Joomla’s Critical File Deletion & Webservice Flaws – Exploit, Detect, and Harden Now + Video Introduction: Joomla, one of the world’s most popular content management systems (CMS), has disclosed two critical vulnerabilities – CVE-2026-23898 (unauthenticated file…
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Joomla! Project
  • Joomla! CMS

01 Apr 2026
Published
02 Apr 2026
Updated

CVSS v4.0
HIGH (8.6)
EPSS
0.02%

KEV

Description

Lack of input validation leads to an arbitrary file deletion vulnerability in the autoupdate server mechanism.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
CVE-2026-23898 & CVE-2026-23899: Joomla’s Critical File Deletion & Webservice Flaws – Exploit, Detect, and Harden Now + Video Introduction: Joomla, one of the world’s most popular content management systems (CMS), has disclosed two critical vulnerabilities – CVE-2026-23898 (unauthenticated file…
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • WSO2
  • WSO2 API Manager

16 Oct 2025
Published
16 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.28%

KEV

Description

Due to an insufficient access control implementation in multiple WSO2 Products, authentication and authorization checks for certain REST APIs can be bypassed, allowing them to be invoked without proper validation. Successful exploitation of this vulnerability could lead to a malicious actor gaining administrative access and performing unauthenticated and unauthorized administrative operations.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
WSO2 #2: The many ways to bypass authentication in WSO2 products (CVE-2025-9152, CVE-2025-10611, CVE-2025-9804)
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • WSO2
  • WSO2 Identity Server as Key Manager

16 Oct 2025
Published
17 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.6)
EPSS
0.03%

KEV

Description

An improper access control vulnerability exists in multiple WSO2 products due to insufficient permission enforcement in certain internal SOAP Admin Services and System REST APIs. A low-privileged user may exploit this flaw to perform unauthorized operations, including accessing server-level information. This vulnerability affects only internal administrative interfaces. APIs exposed through the WSO2 API Manager's API Gateway remain unaffected.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
WSO2 #2: The many ways to bypass authentication in WSO2 products (CVE-2025-9152, CVE-2025-10611, CVE-2025-9804)
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • WSO2
  • WSO2 API Manager

16 Oct 2025
Published
17 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.08%

KEV

Description

An improper privilege management vulnerability exists in WSO2 API Manager due to missing authentication and authorization checks in the keymanager-operations Dynamic Client Registration (DCR) endpoint. A malicious user can exploit this flaw to generate access tokens with elevated privileges, potentially leading to administrative access and the ability to perform unauthorized operations.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
WSO2 #2: The many ways to bypass authentication in WSO2 products (CVE-2025-9152, CVE-2025-10611, CVE-2025-9804)
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • OpenSSL
  • OpenSSL

13 Mar 2026
Published
17 Mar 2026
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the 'DEFAULT' keyword. Impact summary: A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client's initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. If an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to interpolate the built-in default group list into its own configuration, perhaps adding or removing specific elements, then an implementation defect causes the 'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups were treated as a single sufficiently secure 'tuple', with the server not sending a Hello Retry Request (HRR) even when a group in a more preferred tuple was mutually supported. As a result, the client and server might fail to negotiate a mutually supported post-quantum key agreement group, such as 'X25519MLKEM768', if the client's configuration results in only 'classical' groups (such as 'X25519' being the only ones in the client's initial keyshare prediction). OpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS 1.3 key agreement group on TLS servers. The old syntax had a single 'flat' list of groups, and treated all the supported groups as sufficiently secure. If any of the keyshares predicted by the client were supported by the server the most preferred among these was selected, even if other groups supported by the client, but not included in the list of predicted keyshares would have been more preferred, if included. The new syntax partitions the groups into distinct 'tuples' of roughly equivalent security. Within each tuple the most preferred group included among the client's predicted keyshares is chosen, but if the client supports a group from a more preferred tuple, but did not predict any corresponding keyshares, the server will ask the client to retry the ClientHello (by issuing a Hello Retry Request or HRR) with the most preferred mutually supported group. The above works as expected when the server's configuration uses the built-in default group list, or explicitly defines its own list by directly defining the various desired groups and group 'tuples'. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary. OpenSSL 3.6 and 3.5 are vulnerable to this issue. OpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released. OpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released. OpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 8 hours ago

Fediverse

Profile picture fallback

mail-index.netbsd.org/source-c
> Import OpenSSL-3.5.6 (previous was 3.5.5)
CVE-2026-31790, CVE-2026-2673, CVE-2026-28387, CVE-2026-28388, CVE-2026-28389, CVE-2026-28390, CVE-2026-31789

mail-index.netbsd.org/source-c
> Import OpenSSH-10.3 (previous was 10.2)
これは CVE はなくて Security 関連仕様変更のみ?

mail-index.netbsd.org/source-c
> Import xz-5.8.3 (previous was 5.2.4)

> Fix a buffer overflow in lzma_index_append()
はあるけど、そもそも backdoor 以前のバージョンからの更新なのか?

少なくとも bind に加えて openssl は 11.0_RC4 不可避なのか

  • 1
  • 1
  • 0
  • 8h ago
Showing 31 to 40 of 45 CVEs