Overview
Description
This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.
Statistics
- 1 Post
Last activity: 16 hours ago
Bluesky
Overview
- Microsoft
- Windows 10 Version 1607
10 Mar 2026
Published
12 Mar 2026
Updated
CVSS v3.1
MEDIUM (5.3)
EPSS
Pending
KEV
Description
Exposure of sensitive information to an unauthorized actor in Windows Shell Link Processing allows an unauthorized attacker to perform spoofing over a network.
Statistics
- 1 Post
Last activity: 16 hours ago
Bluesky
Overview
- itsourcecode
- University Management System
11 Mar 2026
Published
11 Mar 2026
Updated
CVSS v4.0
MEDIUM (6.9)
EPSS
Pending
KEV
Description
A vulnerability was determined in itsourcecode University Management System 1.0. This vulnerability affects unknown code of the file /att_add.php. This manipulation of the argument Name causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Statistics
- 1 Post
Last activity: 16 hours ago
Overview
- Microsoft
- ASP.NET Core 10.0
10 Mar 2026
Published
12 Mar 2026
Updated
CVSS v3.1
HIGH (7.5)
EPSS
Pending
KEV
Description
Allocation of resources without limits or throttling in ASP.NET Core allows an unauthorized attacker to deny service over a network.
Statistics
- 1 Post
Last activity: 20 hours ago
Overview
- OneUptime
- oneuptime
10 Mar 2026
Published
10 Mar 2026
Updated
CVSS v3.1
CRITICAL (10.0)
EPSS
Pending
KEV
Description
OneUptime is a solution for monitoring and managing online services. Prior to 10.0.21, a low‑privileged user can bypass authorization and tenant isolation in OneUptime v10.0.20 and earlier by sending a forged is-multi-tenant-query header together with a controlled projectid header. Because the server trusts this client-supplied header, internal permission checks in BasePermission are skipped and tenant scoping is disabled. This allows attackers to access project data belonging to other tenants, read sensitive User fields via nested relations, leak plaintext resetPasswordToken, and reset the victim’s password and fully take over the account. This results in cross‑tenant data exposure and full account takeover. This vulnerability is fixed in 10.0.21.
Statistics
- 1 Post
Last activity: 17 hours ago
Overview
- OliveTin
- OliveTin
10 Mar 2026
Published
11 Mar 2026
Updated
CVSS v3.1
HIGH (8.5)
EPSS
0.21%
KEV
Description
OliveTin gives access to predefined shell commands from a web interface. Prior to 3000.11.2, when the saveLogs feature is enabled, OliveTin persists execution log entries to disk. The filename used for these log files is constructed in part from the user-supplied UniqueTrackingId field in the StartAction API request. This value is not validated or sanitized before being used in a file path, allowing an attacker to use directory traversal sequences (e.g., ../../../) to write files to arbitrary locations on the filesystem. This vulnerability is fixed in 3000.11.2.
Statistics
- 1 Post
Last activity: 13 hours ago
Overview
- parse-community
- parse-server
07 Mar 2026
Published
09 Mar 2026
Updated
CVSS v4.0
CRITICAL (9.3)
EPSS
0.07%
KEV
Description
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.10 and 9.5.0-alpha.11, the Google, Apple, and Facebook authentication adapters use JWT verification to validate identity tokens. When the adapter's audience configuration option is not set (clientId for Google/Apple, appIds for Facebook), JWT verification silently skips audience claim validation. This allows an attacker to use a validly signed JWT issued for a different application to authenticate as any user on the target Parse Server. This issue has been patched in versions 8.6.10 and 9.5.0-alpha.11.
Statistics
- 1 Post
Last activity: 22 hours ago
Overview
- Honeywell
- IQ4E
12 Mar 2026
Published
12 Mar 2026
Updated
CVSS v4.0
CRITICAL (10.0)
EPSS
Pending
KEV
Description
The Honeywell IQ4x building management controller, exposes its full web-based HMI without authentication in its factory-default configuration. With no user module configured, security is disabled by design and the system operates under a System Guest (level 100) context, granting read/write privileges to any party able to reach the HTTP interface. Authentication controls are only enforced after a web user is created via U.htm, which dynamically enables the user module. Because this function is accessible prior to authentication, a remote user can create a new account with administrative read/write permissions enabling the user module and imposing authentication under attacker-controlled credentials. This action can effectively lock legitimate operators out of local and web-based configuration and administration.
Statistics
- 1 Post
Last activity: 4 hours ago
Fediverse
🚨 CRITICAL: CVE-2026-3611 impacts Honeywell IQ4E (v3.50_3.44) — missing web HMI authentication lets remote attackers create admin accounts, lock out operators, and control building systems. Restrict access & create user accounts ASAP. https://radar.offseq.com/threat/cve-2026-3611-cwe-306-missing-authentication-for-c-2be1059b #OffSeq #ICS #Honeywell
Overview
Description
A vulnerability was identified in Tenda FH451 1.0.0.9. Affected by this vulnerability is the function formQuickIndex of the file /goform/QuickIndex. Such manipulation of the argument mit_linktype/PPPOEPassword leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Statistics
- 1 Post
Last activity: 2 hours ago