24h | 7d | 30d

Overview

  • Mobility46
  • mobility46.se

27 Feb 2026
Published
03 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.4)
EPSS
0.11%

KEV

Description

WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent to the backend. An unauthenticated attacker can connect to the OCPP WebSocket endpoint using a known or discovered charging station identifier, then issue or receive OCPP commands as a legitimate charger. Given that no authentication is required, this can lead to privilege escalation, unauthorized control of charging infrastructure, and corruption of charging network data reported to the backend.

Statistics

  • 1 Post

Last activity: 7 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-27028 - WebSocket endpoints lack proper authentication mechanisms, enabling attackers to perform unauthorized station impersonation and manipulate data sent... https://www.cyberhub.blog/cves/CVE-2026-27028
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Microsoft
  • Windows 10 Version 21H2

13 Jan 2026
Published
26 Feb 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.02%

KEV

Description

Improper handling of insufficient permissions or privileges in Windows Error Reporting allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post

Last activity: 9 hours ago

Bluesky

Profile picture fallback
CVE-2026-20817: The Windows Error Reporting Zero-Day Exploit That Hands Over SYSTEM Privileges + Video Introduction: A critical privilege escalation vulnerability has been publicly disclosed in the core architecture of the Microsoft Windows Error Reporting Service. Designated CVE-2026-20817, this…
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Tenda
  • AC15

01 Mar 2026
Published
02 Mar 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.05%

KEV

Description

A security flaw has been discovered in Tenda AC15 up to 15.13.07.13. Affected by this issue is some unknown functionality of the file /goform/TextEditingConversion. The manipulation of the argument wpapsk_crypto2_4g results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.

Statistics

  • 1 Post

Last activity: Last hour

Bluesky

Profile picture fallback
📌 CVE-2026-3400 - A security flaw has been discovered in Tenda AC15 up to 15.13.07.13. Affected by this issue is some unknown functionality of the file /goform/TextEdit... https://www.cyberhub.blog/cves/CVE-2026-3400
  • 0
  • 0
  • 0
  • Last hour

Overview

  • chamilo
  • chamilo-lms

02 Mar 2026
Published
02 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.29%

KEV

Description

Chamilo is a learning management system. Prior to version 1.11.28, parameter from SOAP request is evaluated without filtering which leads to Remote Code Execution. This issue has been patched in version 1.11.28.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
📌 CVE-2025-50187 - Chamilo is a learning management system. Prior to version 1.11.28, parameter from SOAP request is evaluated without filtering which leads to Remote Co... https://www.cyberhub.blog/cves/CVE-2025-50187
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • EV Energy
  • ev.energy

27 Feb 2026
Published
03 Mar 2026
Updated

CVSS v3.1
HIGH (7.3)
EPSS
0.04%

KEV

Description

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.

Statistics

  • 1 Post

Last activity: 21 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-26290 - The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same sessi... https://www.cyberhub.blog/cves/CVE-2026-26290
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • Mobility46
  • mobility46.se

27 Feb 2026
Published
03 Mar 2026
Updated

CVSS v3.1
HIGH (7.3)
EPSS
0.04%

KEV

Description

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.

Statistics

  • 1 Post

Last activity: 21 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-27647 - The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same sessi... https://www.cyberhub.blog/cves/CVE-2026-27647
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • SolarWinds
  • Web Help Desk

28 Jan 2026
Published
27 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
9.92%

KEV

Description

SolarWinds Web Help Desk was found to be susceptible to an authentication bypass vulnerability that if exploited, would allow a malicious actor to execute actions and methods that should be protected by authentication.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture fallback
📢 SolarWinds Web Help Desk: chaîne RCE pré-auth par désérialisation et doubles contournements (CVE-2025-40552/40553/4055…📝 … https://cyberveille.ch/posts/2026-03-02-solarwinds-web-help-desk-chaine-rce-pre-auth-par-deserialisation-et-doubles-contournements-cve-2025-40552-40553-40554/ #IOC #Cyberveil…
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Linux
  • Linux

03 Jul 2025
Published
19 Jan 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix use-after-free in page_pool_recycle_in_ring syzbot reported a uaf in page_pool_recycle_in_ring: BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 Read of size 8 at addr ffff8880286045a0 by task syz.0.284/6943 CPU: 0 UID: 0 PID: 6943 Comm: syz.0.284 Not tainted 6.13.0-rc3-syzkaller-gdfa94ce54f41 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x169/0x550 mm/kasan/report.c:489 kasan_report+0x143/0x180 mm/kasan/report.c:602 lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:165 [inline] _raw_spin_unlock_bh+0x1b/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_produce_bh include/linux/ptr_ring.h:164 [inline] page_pool_recycle_in_ring net/core/page_pool.c:707 [inline] page_pool_put_unrefed_netmem+0x748/0xb00 net/core/page_pool.c:826 page_pool_put_netmem include/net/page_pool/helpers.h:323 [inline] page_pool_put_full_netmem include/net/page_pool/helpers.h:353 [inline] napi_pp_put_page+0x149/0x2b0 net/core/skbuff.c:1036 skb_pp_recycle net/core/skbuff.c:1047 [inline] skb_free_head net/core/skbuff.c:1094 [inline] skb_release_data+0x6c4/0x8a0 net/core/skbuff.c:1125 skb_release_all net/core/skbuff.c:1190 [inline] __kfree_skb net/core/skbuff.c:1204 [inline] sk_skb_reason_drop+0x1c9/0x380 net/core/skbuff.c:1242 kfree_skb_reason include/linux/skbuff.h:1263 [inline] __skb_queue_purge_reason include/linux/skbuff.h:3343 [inline] root cause is: page_pool_recycle_in_ring ptr_ring_produce spin_lock(&r->producer_lock); WRITE_ONCE(r->queue[r->producer++], ptr) //recycle last page to pool page_pool_release page_pool_scrub page_pool_empty_ring ptr_ring_consume page_pool_return_page //release all page __page_pool_destroy free_percpu(pool->recycle_stats); free(pool) //free spin_unlock(&r->producer_lock); //pool->ring uaf read recycle_stat_inc(pool, ring); page_pool can be free while page pool recycle the last page in ring. Add producer-lock barrier to page_pool_release to prevent the page pool from being free before all pages have been recycled. recycle_stat_inc() is empty when CONFIG_PAGE_POOL_STATS is not enabled, which will trigger Wempty-body build warning. Add definition for pool stat macro to fix warning.

Statistics

  • 1 Post

Last activity: 11 hours ago

Bluesky

Profile picture fallback
Critical patch for #SUSE Linux Enterprise 15 SP7 is out! Advisory SUSE-SU-2026:0748-1 fixes a nasty use-after-free in the kernel (CVE-2025-38129). Read more: 👉 tinyurl.com/4ephaa7r #Security
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Tenda
  • F453

01 Mar 2026
Published
02 Mar 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.05%

KEV

Description

A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. The manipulation of the argument dips leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-3399 - A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetS... https://www.cyberhub.blog/cves/CVE-2026-3399
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • CloudCharge
  • cloudcharge.se

26 Feb 2026
Published
03 Mar 2026
Updated

CVSS v3.1
HIGH (7.3)
EPSS
0.04%

KEV

Description

The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same session identifier. This implementation results in predictable session identifiers and enables session hijacking or shadowing, where the most recent connection displaces the legitimate charging station and receives backend commands intended for that station. This vulnerability may allow unauthorized users to authenticate as other users or enable a malicious actor to cause a denial-of-service condition by overwhelming the backend with valid session requests.

Statistics

  • 1 Post

Last activity: 20 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-27652 - The WebSocket backend uses charging station identifiers to uniquely associate sessions but allows multiple endpoints to connect using the same sessi... https://www.cyberhub.blog/cves/CVE-2026-27652
  • 0
  • 0
  • 0
  • 20h ago
Showing 31 to 40 of 70 CVEs