24h | 7d | 30d

Overview

  • D-Link
  • DHP-1320

21 Mar 2026
Published
21 Mar 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.04%

KEV

Description

A vulnerability was identified in D-Link DHP-1320 1.00WWB04. This affects the function redirect_count_down_page of the component SOAP Handler. Such manipulation leads to stack-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

Statistics

  • 1 Post

Last activity: 16 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-4529: HIGH severity stack-based buffer overflow in D-Link DHP-1320 (1.00WWB04) via SOAP Handler. Public exploit out. Device is EOL, no patch — isolate or replace now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Pending

Pending
Published
04 Oct 2023
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

Issue has been found to be non-reproducible, therefore not a viable flaw.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
Is your website secure? A new vulnerability (CVE-2023-4567) in the SPIP publishing engine highlights the importance of constant vigilance. Read more: 👉 tinyurl.com/38p8hufh #Security #ubuntu
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

10 Mar 2026
Published
20 Mar 2026
Updated

CVSS v3.1
HIGH (8.0)
EPSS
0.07%

KEV

Description

Integer overflow or wraparound in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network.

Statistics

  • 1 Post

Last activity: 23 hours ago

Bluesky

Profile picture fallback
Alerta Crítica CVE-2026-25172: Manual de aplicación del Hotpatch para RRAS en Windows 11 (+DETALLES) www.newstecnicas.info.ve/2026/03/micr...
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Cisco
  • Cisco Secure Firewall Management Center (FMC)

04 Mar 2026
Published
20 Mar 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.88%

Description

A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device. This vulnerability is due to insecure deserialization of a user-supplied Java byte stream. An attacker could exploit this vulnerability by sending a crafted serialized Java object to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the device and elevate privileges to root. Note: If the FMC management interface does not have public internet access, the attack surface that is associated with this vulnerability is reduced.

Statistics

  • 1 Post

Last activity: 19 hours ago

Bluesky

Profile picture fallback
📢 Interlock Ransomware exploite un zero-day Cisco FMC (CVE-2026-20131) 36 jours avant divulgation 📝 *Amazon Threat Intelligence a décou… https://cyberveille.ch/posts/2026-03-21-interlock-ransomware-exploite-un-zero-day-cisco-fmc-cve-2026-20131-36-jours-avant-divulgation/ #CVE_2026_20131 #Cyberveille
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • ultrajson
  • ultrajson

20 Mar 2026
Published
20 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.05%

KEV

Description

UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Versions 5.4.0 through 5.11.0 contain an accumulating memory leak in JSON parsing large (outside of the range [-2^63, 2^64 - 1]) integers. The leaked memory is a copy of the string form of the integer plus an additional NULL byte. The leak occurs irrespective of whether the integer parses successfully or is rejected due to having more than sys.get_int_max_str_digits() digits, meaning that any sized leak per malicious JSON can be achieved provided that there is no limit on the overall size of the payload. Any service that calls ujson.load()/ujson.loads()/ujson.decode() on untrusted inputs is affected and vulnerable to denial of service attacks. This issue has been fixed in version 5.12.0.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 3 hours ago

Bluesky

Profile picture fallback
Critical Security Advisory for #Fedora 42: python-ujson 5.12.0 is out, fixing CVE-2026-32875 (buffer overflow DoS) and CVE-2026-32874 (memory leak). 🛡️ Read more: 👉 tinyurl.com/45nmxz5e #Security
  • 0
  • 1
  • 0
  • 3h ago

Overview

  • Google
  • Chrome

12 Mar 2026
Published
14 Mar 2026
Updated

CVSS
Pending
EPSS
1.33%

Description

Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
🚨 URGENT: #Fedora42 users must patch #Chromium NOW! 🚨 CVE-2026-3909 (Skia OOB write) & CVE-2026-3910 (V8 flaw) are fixed in version 146.0.7680.80. Don't be the low-hanging fruit for attackers. #Read more: 👉 tinyurl.com/4vpsfnjx #Security
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Google
  • Chrome

12 Mar 2026
Published
14 Mar 2026
Updated

CVSS
Pending
EPSS
4.44%

Description

Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
🚨 URGENT: #Fedora42 users must patch #Chromium NOW! 🚨 CVE-2026-3909 (Skia OOB write) & CVE-2026-3910 (V8 flaw) are fixed in version 146.0.7680.80. Don't be the low-hanging fruit for attackers. #Read more: 👉 tinyurl.com/4vpsfnjx #Security
  • 0
  • 0
  • 0
  • 2h ago
Showing 21 to 27 of 27 CVEs