24h | 7d | 30d

Overview

  • D-Link
  • DWR-M960

22 Feb 2026
Published
22 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_462590 of the file /boafrm/formOpMode of the component Operation Mode Configuration Endpoint. The manipulation of the argument submit-url leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

Statistics

  • 1 Post

Last activity: 11 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-2927 - A vulnerability has been found in D-Link DWR-M960 1.01.07. This vulnerability affects the function sub_462590 of the file /boafrm/formOpMode of the co... https://www.cyberhub.blog/cves/CVE-2026-2927
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Moxa
  • UC-1200A Series

05 Feb 2026
Published
05 Feb 2026
Updated

CVSS v4.0
HIGH (7.0)
EPSS
0.01%

KEV

Description

A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.

Statistics

  • 1 Post

Last activity: Last hour

Bluesky

Profile picture fallback
[CVE-2026-0714] TPM-sniffing LUKS Keys on an Embedded Device
  • 0
  • 0
  • 0
  • Last hour

Overview

  • openclaw
  • openclaw

19 Feb 2026
Published
20 Feb 2026
Updated

CVSS v3.1
HIGH (7.2)
EPSS
0.02%

KEV

Description

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, a mismatch between `rawCommand` and `command[]` in the node host `system.run` handler could cause allowlist/approval evaluation to be performed on one command while executing a different argv. This only impacts deployments that use the node host / companion node execution path (`system.run` on a node), enable allowlist-based exec policy (`security=allowlist`) with approval prompting driven by allowlist misses (for example `ask=on-miss`), allow an attacker to invoke `system.run`. Default/non-node configurations are not affected. Version 2026.2.14 enforces `rawCommand`/`command[]` consistency (gateway fail-fast + node host validation).

Statistics

  • 1 Post

Last activity: 18 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-26325 - OpenClaw is a personal AI assistant. Prior to version 2026.2.14, a mismatch between `rawCommand` and `command[]` in the node host `system.run` handler... https://www.cyberhub.blog/cves/CVE-2026-26325
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • openclaw
  • openclaw

19 Feb 2026
Published
20 Feb 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.01%

KEV

Description

OpenClaw is a personal AI assistant. Prior to version 2026.2.14, OpenClaw's SSRF protection could be bypassed using full-form IPv4-mapped IPv6 literals such as `0:0:0:0:0:ffff:7f00:1` (which is `127.0.0.1`). This could allow requests that should be blocked (loopback / private network / link-local metadata) to pass the SSRF guard. Version 2026.2.14 patches the issue.

Statistics

  • 1 Post

Last activity: 14 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-26324 - OpenClaw is a personal AI assistant. Prior to version 2026.2.14, OpenClaw's SSRF protection could be bypassed using full-form IPv4-mapped IPv6 literal... https://www.cyberhub.blog/cves/CVE-2026-26324
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • D-Link
  • DWR-M960

20 Feb 2026
Published
20 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the component Filter Configuration Endpoint. The manipulation of the argument submit-url results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used.

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-2856 - A vulnerability was found in D-Link DWR-M960 1.01.07. Affected by this vulnerability is the function sub_424AFC of the file /boafrm/formFilter of the ... https://www.cyberhub.blog/cves/CVE-2026-2856
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • QuantumNous
  • new-api

24 Feb 2026
Published
24 Feb 2026
Updated

CVSS v4.0
HIGH (7.1)
EPSS
Pending

KEV

Description

New API is a large language mode (LLM) gateway and artificial intelligence (AI) asset management system. Prior to version 0.10.8-alpha.10, a SQL LIKE wildcard injection vulnerability in the `/api/token/search` endpoint allows authenticated users to cause denial of service through resource exhaustion by crafting malicious search patterns. The token search endpoint accepts user-supplied `keyword` and `token` parameters that are directly concatenated into SQL LIKE clauses without escaping wildcard characters (`%`, `_`). This allows attackers to inject patterns that trigger expensive database queries. Version 0.10.8-alpha.10 contains a patch.

Statistics

  • 1 Post

Last activity: Last hour

Fediverse

Profile picture fallback

🚨 CVE-2026-25591 (HIGH): QuantumNous new-api <0.10.8-alpha.10 vulnerable to SQL LIKE wildcard injection in /api/token/search. Auth users can cause DoS via crafted search patterns. Patch ASAP! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • Last hour

Overview

  • NaturalIntelligence
  • fast-xml-parser

30 Jan 2026
Published
11 Feb 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.03%

KEV

Description

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. In versions 5.0.9 through 5.3.3, a RangeError vulnerability exists in the numeric entity processing of fast-xml-parser when parsing XML with out-of-range entity code points (e.g., `&#9999999;` or `&#xFFFFFF;`). This causes the parser to throw an uncaught exception, crashing any application that processes untrusted XML input. Version 5.3.4 fixes the issue.

Statistics

  • 1 Post

Last activity: 21 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2026-25128 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/393 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • parallax
  • jsPDF

19 Feb 2026
Published
19 Feb 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.03%

KEV

Description

jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of properties and methods of the Acroform module allows users to inject arbitrary PDF objects, such as JavaScript actions. If given the possibility to pass unsanitized input to one of the following property, a user can inject arbitrary PDF objects, such as JavaScript actions, which are executed when the victim hovers over the radio option. The vulnerability has been fixed in jsPDF@4.2.0. As a workaround, sanitize user input before passing it to the vulnerable API members.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-25940 - jsPDF is a library to generate PDFs in JavaScript. Prior to 4.2.0, user control of properties and methods of the Acroform module allows users to injec... https://www.cyberhub.blog/cves/CVE-2026-25940
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • NixOS
  • nixpkgs

02 Feb 2026
Published
04 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.04%

KEV

Description

The NixOs Odoo package is an open source ERP and CRM system. From 21.11 to before 25.11 and 26.05, every NixOS based Odoo setup publicly exposes the database manager without any authentication. This allows unauthorized actors to delete and download the entire database, including Odoos file store. Unauthorized access is evident from http requests. If kept, searching access logs and/or Odoos log for requests to /web/database can give indicators, if this has been actively exploited. The database manager is a featured intended for development and not meant to be publicly reachable. On other setups, a master password acts as 2nd line of defence. However, due to the nature of NixOS, Odoo is not able to modify its own configuration file and thus unable to persist the auto-generated password. This also applies when manually setting a master password in the web-UI. This means, the password is lost when restarting Odoo. When no password is set, the user is prompted to set one directly via the database manager. This requires no authentication or action by any authorized user or the system administrator. Thus, the database is effectively world readable by anyone able to reach Odoo. This vulnerability is fixed in 25.11 and 26.05.

Statistics

  • 1 Post

Last activity: 9 hours ago

Bluesky

Profile picture fallback
Critical Odoo Vulnerability CVE-2026-25137 Exposes ERP Databases on NixOS – Patch Now! Introduction: A newly disclosed critical vulnerability, CVE-2026-25137, is putting thousands of Odoo ERP instances on NixOS at risk of complete data compromise. Discovered and reported by security researchers…
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Tenda
  • A21

21 Feb 2026
Published
23 Feb 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of the file /goform/SetIpMacBind. This manipulation of the argument list causes stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.

Statistics

  • 1 Post

Last activity: 5 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-2871 - A weakness has been identified in Tenda A21 1.0.0.0. This affects the function fromSetIpMacBind of the file /goform/SetIpMacBind. This manipulation of... https://www.cyberhub.blog/cves/CVE-2026-2871
  • 0
  • 0
  • 0
  • 5h ago
Showing 31 to 40 of 92 CVEs