Ghostwire — CVE Vulnerability Tracker

Tracking 200+ vulnerabilities from NVD, Tenable, and CNNVD. Exploit and PoC data updated continuously.

CVE-2026-5205 MEDIUM CVSS 6.3

A vulnerability was identified in chatwoot up to 4.11.2. Affected by this vulnerability is the function Webhooks::Trigger in the library lib/webhooks/trigger.rb of the component Webhook API. Such manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this d

2026-03-31
CVE-2026-34361 CRITICAL CVSS 9.3

HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.4, the FHIR Validator HTTP service exposes an unauthenticated "/loadIG" endpoint that makes outbound HTTP requests to attacker-controlled URLs. Combined with a startsWith() URL prefix matching flaw in the credential provider (ManagedWebAccessUtils.getServer()), an attacker

PoC: hapifhir/org.hl7.fhir.core
2026-03-31
CVE-2026-34359 HIGH CVSS 7.4

HAPI FHIR is a complete implementation of the HL7 FHIR standard for healthcare interoperability in Java. Prior to version 6.9.4, ManagedWebAccessUtils.getServer() uses String.startsWith() to match request URLs against configured server URLs for authentication credential dispatch. Because configured server URLs (e.g., http://tx.fhir.org) lack a trailing slash or host boundary check, an attacker-con

PoC: hapifhir/org.hl7.fhir.core
2026-03-31
CVE-2026-24165 HIGH CVSS 7.8

NVIDIA BioNeMo contains a vulnerability where a user could cause a deserialization of untrusted data. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

2026-03-31
CVE-2026-24154 HIGH CVSS 7.6

NVIDIA Jetson Linux has vulnerability in initrd, where an unprivileged attacker with physical access coul inject incorrect command line arguments. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, denial of service, data tampering, and information disclosure.

2026-03-31
CVE-2026-5204 HIGH CVSS 8.8

A vulnerability was determined in Tenda CH22 1.0.0.1. Affected is the function formWebTypeLibrary of the file /goform/webtypelibrary of the component Parameter Handler. This manipulation of the argument webSiteId causes stack-based buffer overflow. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.

2026-03-31
CVE-2026-5203 MEDIUM CVSS 4.7

A vulnerability was found in CMS Made Simple up to 2.2.22. This impacts the function _copyFilesToFolder in the library modules/UserGuide/lib/class.UserGuideImporterExporter.php of the component UserGuide Module XML Import. The manipulation results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. This issue has been reported early

2026-03-31
CVE-2026-5087

PAGI::Middleware::Session::Store::Cookie versions through 0.001003 for Perl generates random bytes insecurely. PAGI::Middleware::Session::Store::Cookie attempts to read bytes from the /dev/urandom device directly. If that fails (for example, on systems without the device, such as Windows), then it will emit a warning that recommends the user install Crypt::URandom, and then return a string of ran

2026-03-31
CVE-2026-4818 MEDIUM CVSS 6.8

In Search Guard FLX versions from 3.0.0 up to 4.0.1, there exists an issue which allows users without the necessary privileges to execute some management operations against data streams.

2026-03-31
CVE-2026-34595

Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. Prior to versions 8.6.70 and 9.7.0-alpha.18, an authenticated user with find class-level permission can bypass the protectedFields class-level permission setting on LiveQuery subscriptions. By sending a subscription with a $or, $and, or $nor operator value as a plain object with numeric keys and

PoC: parse-community/parse-server · PoC: parse-community/parse-server · PoC: parse-community/parse-server
2026-03-31
CVE-2026-5152 HIGH CVSS 7.5 EPSS 0.0%

A vulnerability was detected in Tenda CH22 1.0.0.1. Impacted is the function formCreateFileName of the file /goform/createFileName. Performing a manipulation of the argument fileNameMit results in stack-based buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.

2026-03-30
CVE-2026-4789 MEDIUM CVSS 5 EPSS 0.0%

Kyverno, versions 1.16.0 and later, are vulnerable to SSRF due to unrestricted CEL HTTP functions.

2026-03-30
CVE-2026-34558 MEDIUM CVSS 5 EPSS 0.0%

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input within the Methods Management functionality when creating or managing application methods/pages. Multiple input fields accept attacker-controlled JavaScript payloads

PoC: ci4-cms-erp/ci4ms
2026-03-30
CVE-2026-32884 MEDIUM CVSS 5 EPSS 0.0%

Botan is a C++ cryptography library. Prior to version 3.11.0, during processing of an X.509 certificate path using name constraints which restrict the set of allowable DNS names, if no subject alternative name is defined in the end-entity certificate Botan would check that the CN was allowed by the DNS name constraints, even though this check is technically not required by RFC 5280. However this c

PoC: randombit/botan
2026-03-30
CVE-2026-32883 MEDIUM CVSS 5 EPSS 0.0%

Botan is a C++ cryptography library. From version 3.0.0 to before version 3.11.0, during X509 path validation, OCSP responses were checked for an appropriate status code, but critically omitted verifying the signature of the OCSP response itself. This issue has been patched in version 3.11.0.

PoC: randombit/botan
2026-03-30
CVE-2026-32877 MEDIUM CVSS 5 EPSS 0.0%

Botan is a C++ cryptography library. From version 2.3.0 to before version 3.11.0, during SM2 decryption, the code that checked the authentication code value (C3) failed to check that the encoded value was of the expected length prior to comparison. An invalid ciphertext can cause a heap over-read of up to 31 bytes, resulting in a crash or potentially other undefined behavior. This issue has been p

PoC: randombit/botan
2026-03-30
CVE-2026-31946 MEDIUM CVSS 5 EPSS 0.0%

OpenOlat is an open source web-based e-learning platform for teaching, learning, assessment and communication. From version 10.5.4 to before version 20.2.5, OpenOLAT's OpenID Connect implicit flow implementation does not verify JWT signatures. The JSONWebToken.parse() method silently discards the signature segment of the compact JWT (header.payload.signature), and the getAccessToken() methods in b

PoC: OpenOLAT/OpenOLAT
2026-03-30
CVE-2026-28228 MEDIUM CVSS 5 EPSS 0.0%

OpenOlat is an open source web-based e-learning platform for teaching, learning, assessment and communication. Prior to versions 19.1.31, 20.1.18, and 20.2.5, an authenticated user with the Author role can inject Velocity directives into a reminder email template. When the reminder is processed (either triggered manually or via the daily cron job), the injected directives are evaluated server-side

PoC: OpenOLAT/OpenOLAT
2026-03-30
CVE-2026-5150 HIGH CVSS 7.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A security vulnerability has been detected in code-projects Accounting System 1.0. This issue affects some unknown processing of the file /viewin_costumer.php of the component Parameter Handler. Such manipulation of the argument cos_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

PoC: Xu-Zhihan/CVE
2026-03-30
CVE-2026-5148 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A weakness has been identified in YunaiV yudao-cloud up to 2026.01. This vulnerability affects unknown code of the file /admin-api/system/mail-log/page. This manipulation of the argument toMail causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not

PoC: NarcherAlter/Security_Note · PoC: NarcherAlter/Security_Note
2026-03-30
CVE-2026-33026 MEDIUM CVSS 5 EPSS 0.0%

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, the nginx-ui backup restore mechanism allows attackers to tamper with encrypted backup archives and inject malicious configuration during restoration. This issue has been patched in version 2.3.4.

PoC: 0xJacky/nginx-ui
2026-03-30
CVE-2026-32275 MEDIUM CVSS 5 EPSS 0.0%

Tautulli is a Python based monitoring and tracking tool for Plex Media Server. From version 1.3.10 to before version 2.17.0, an unsanitized JSONP callback parameter allows cross-origin script injection and API key theft. This issue has been patched in version 2.17.0.

PoC: Tautulli/Tautulli
2026-03-30
CVE-2026-31831 MEDIUM CVSS 5 EPSS 0.1%

Tautulli is a Python based monitoring and tracking tool for Plex Media Server. Prior to version 2.17.0, the /newsletter/image/images API endpoint is vulnerable to path traversal, allowing unauthenticated attackers to read arbitrary files from the application server's filesystem. This issue has been patched in version 2.17.0.

PoC: Tautulli/Tautulli
2026-03-30
CVE-2026-31799 MEDIUM CVSS 5 EPSS 0.0%

Tautulli is a Python based monitoring and tracking tool for Plex Media Server. From version 2.14.2 to before version 2.17.0 for parameters "before" and "after" and from version 2.1.0-beta to before version 2.17.0 for parameters "section_id" and "user_id", the /api/v2?cmd=get_home_stats endpoint passes the section_id, user_id, before, and after query parameters directly into SQL via Python %-string

PoC: Tautulli/Tautulli
2026-03-30
CVE-2026-30307 MEDIUM CVSS 5 EPSS 0.1% ⚠ EXPLOIT AVAILABLE

Roo Code's command auto-approval module contains a critical OS command injection vulnerability that renders its whitelist security mechanism completely ineffective. The system relies on fragile regular expressions to parse command structures; while it attempts to intercept dangerous operations, it fails to account for standard Shell command substitution Roo Code (specifically$(...)and backticks ..

PoC: Secsys-FDU/LLM-Tool-Calling-CVEs
2026-03-30
CVE-2026-28505 MEDIUM CVSS 5 EPSS 0.0%

Tautulli is a Python based monitoring and tracking tool for Plex Media Server. Prior to version 2.17.0, the str_eval() function in notification_handler.py implements a sandboxed eval() for notification text templates. The sandbox attempts to restrict callable names by inspecting code.co_names of the compiled code object. However, co_names only contains names from the outer code object. When a lamb

PoC: Tautulli/Tautulli
2026-03-30
CVE-2026-21716 MEDIUM CVSS 5 EPSS 0.0%

An incomplete fix for CVE-2024-36137 leaves `FileHandle.chmod()` and `FileHandle.chown()` in the promises API without the required permission checks, while their callback-based equivalents (`fs.fchmod()`, `fs.fchown()`) were correctly patched. As a result, code running under `--permission` with restricted `--allow-fs-write` can still use promise-based `FileHandle` methods to modify file permiss

2026-03-30
CVE-2026-5147 HIGH CVSS 7.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A security flaw has been discovered in YunaiV yudao-cloud up to 2026.01. This affects an unknown part of the file /admin-api/system/tenant/get-by-website. The manipulation of the argument Website results in sql injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but di

PoC: NarcherAlter/Security_Note · PoC: NarcherAlter/Security_Note
2026-03-30
CVE-2026-3991 MEDIUM CVSS 5 EPSS 0.0%

Symantec Data Loss Prevention Windows Endpoint, prior to 25.1 MP1, 16.1 MP2, 16.0 RU2 HF9, 16.0 RU1 MP1 HF12, and 16.0 MP2 HF15, may be susceptible to a Elevation of Privilege vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

2026-03-30
CVE-2026-3502 MEDIUM CVSS 5 EPSS 0.0%

TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

2026-03-30
CVE-2026-34714 HIGH CVSS 7.5 EPSS 0.0%

Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE.

PoC: vim/vim · PoC: vim/vim
2026-03-30
CVE-2026-29925 MEDIUM CVSS 5 EPSS 0.0%

Invoice Ninja v5.12.46 and v5.12.48 is vulnerable to Server-Side Request Forgery (SSRF) in CheckDatabaseRequest.php.

2026-03-30
CVE-2026-29924 MEDIUM CVSS 5 EPSS 0.1%

Grav CMS v1.7.x and before is vulnerable to XML External Entity (XXE) through the SVG file upload functionality in the admin panel and File Manager plugin.

2026-03-30
CVE-2026-5126 MEDIUM CVSS 5.5 EPSS 0.0%

A flaw has been found in SourceCodester RSS Feed Parser 1.0. Affected by this issue is the function file_get_contents. This manipulation causes server-side request forgery. The attack is possible to be carried out remotely. The exploit has been published and may be used.

2026-03-30
CVE-2026-5125 MEDIUM CVSS 5.5 EPSS 0.2% ⚠ EXPLOIT AVAILABLE

A vulnerability was detected in raine consult-llm-mcp up to 2.5.3. Affected by this vulnerability is the function child_process.execSync of the file src/server.ts. The manipulation of the argument git_diff.base_ref/git_diff.files results in os command injection. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 2.5.4 addresses this issue

PoC: raine/consult-llm-mcp · PoC: raine/consult-llm-mcp
2026-03-30
CVE-2026-4046 HIGH CVSS 7.5 EPSS 0.0%

The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application. This vulnerability can be trivially mitigated by removing the IBM1390 and IBM1399 character sets from systems that do not need them.

2026-03-30
CVE-2026-33032 MEDIUM CVSS 5 EPSS 0.1%

Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and prior, the nginx-ui MCP (Model Context Protocol) integration exposes two HTTP endpoints: /mcp and /mcp_message. While /mcp requires both IP whitelisting and authentication (AuthRequired() middleware), the /mcp_message endpoint only applies IP whitelisting - and the default IP whitelist is empty, which the middleware t

PoC: 0xJacky/nginx-ui · PoC: 0xJacky/nginx-ui
2026-03-30
CVE-2026-33030 MEDIUM CVSS 5 EPSS 0.0%

Nginx UI is a web user interface for the Nginx web server. In versions 2.3.3 and prior, Nginx-UI contains an Insecure Direct Object Reference (IDOR) vulnerability that allows any authenticated user to access, modify, and delete resources belonging to other users. The application's base Model struct lacks a user_id field, and all resource endpoints perform queries by ID without verifying user owner

PoC: 0xJacky/nginx-ui
2026-03-30
CVE-2026-33029 MEDIUM CVSS 5 EPSS 0.1%

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, an input validation vulnerability in the logrotate configuration allows an authenticated user to cause a complete Denial of Service (DoS). By submitting a negative integer for the rotation interval, the backend enters an infinite loop or an invalid state, rendering the web interface unresponsive. This issue has been

PoC: 0xJacky/nginx-ui
2026-03-30
CVE-2026-33028 MEDIUM CVSS 5 EPSS 0.1%

Nginx UI is a web user interface for the Nginx web server. Prior to version 2.3.4, the nginx-ui application is vulnerable to a Race Condition. Due to the complete absence of synchronization mechanisms (Mutex) and non-atomic file writes, concurrent requests lead to the severe corruption of the primary configuration file (app.ini). This vulnerability results in a persistent Denial of Service (DoS) a

PoC: 0xJacky/nginx-ui
2026-03-30
CVE-2026-27508 MEDIUM CVSS 5.5 EPSS 0.0%

Smoothwall Express versions prior to 3.1 Update 13 contain a reflected cross-site scripting vulnerability in the /redirect.cgi endpoint due to improper sanitation of the url parameter. Attackers can craft malicious URLs with javascript: schemes that execute arbitrary JavaScript in victims' browsers when clicked through the unsanitized link.

2026-03-30
CVE-2026-5170 MEDIUM CVSS 5 EPSS 0.0%

A user with access to the cluster with a limited set of privilege actions can trigger a crash of a mongod process during the limited and unpredictable window when the cluster is being promoted from a replica set to a sharded cluster. This may cause a denial of service by taking down the primary of the replica set. This issue affects MongoDB Server v8.2 versions prior to 8.2.2, MongoDB Server v8.0

2026-03-30
CVE-2026-5123 LOW CVSS 2.5 EPSS 0.0%

A weakness has been identified in osrg GoBGP up to 4.3.0. This impacts the function DecodeFromBytes of the file pkg/packet/bgp/bgp.go. Executing a manipulation of the argument data[1] can lead to off-by-one. The attack may be launched remotely. Attacks of this nature are highly complex. The exploitability is said to be difficult. This patch is called 67c059413470df64bc20801c46f64058e88f800f. A pat

PoC: osrg/gobgp
2026-03-30
CVE-2026-34472 MEDIUM CVSS 5 EPSS 0.0%

Unauthenticated credential disclosure in the wizard interface in ZTE ZXHN H188A V6.0.10P2_TE and V6.0.10P3N3_TE allows unauthenticated attackers on the local network to retrieve sensitive credentials from the router's web management interface, including the default administrator password, WLAN PSK, and PPPoE credentials. In some observed cases, configuration changes may also be performed without a

2026-03-30
CVE-2026-33643 MEDIUM CVSS 5 EPSS 0.0%

SQL Injection vulnerability in SchemaHero 0.23.0 via the column parameter to the mysqlColumnAsInsert function in file plugins/mysql/lib/column.go.

2026-03-30
CVE-2026-30562 MEDIUM CVSS 5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the add_stock.php file via the "msg" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL.

PoC: meifukun/Web-Security-PoCs
2026-03-30
CVE-2026-2287 MEDIUM CVSS 5 EPSS 0.0%

CrewAI does not properly check that Docker is still running during runtime, and will fall back to a sandbox setting that allows for RCE exploitation.

2026-03-30
CVE-2026-2286 MEDIUM CVSS 5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

CrewAI contains a server-side request forgery vulnerability that enables content acquisition from internal and cloud services, facilitated by the RAG search tools not properly validating URLs provided at runtime.

PoC: qzhodl/CVE-2026-22862
2026-03-30
CVE-2026-2285 MEDIUM CVSS 5 EPSS 0.0%

CrewAI contains a arbitrary local file read vulnerability in the JSON loader tool that reads files without path validation, enabling access to files on the server.

2026-03-30
CVE-2026-2275 MEDIUM CVSS 5 EPSS 0.0%

The CrewAI CodeInterpreter tool falls back to SandboxPython when it cannot reach Docker, which can enable RCE through arbitrary C function calling.

2026-03-30
CVE-2026-29597 MEDIUM CVSS 5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

Incorrect access control in the file_details.asp endpoint of DDSN Interactive Acora CMS v10.7.1 allows attackers with editor privileges to access sensitive files via crafted requests.

PoC: padayali-JD/CVE-2026-29597
2026-03-30
CVE-2026-5164 MEDIUM CVSS 5.5 EPSS 0.0%

A flaw was found in virtio-win. The `RhelDoUnMap()` function does not properly validate the number of descriptors provided by a user during an unmap request. A local user could exploit this input validation vulnerability by supplying an excessive number of descriptors, leading to a buffer overrun. This can cause a system crash, resulting in a Denial of Service (DoS).

2026-03-30
CVE-2018-25234 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

SmartFTP Client 9.0.2615.0 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Host field. Attackers can paste a buffer of 300 repeated characters into the Host connection parameter to trigger an application crash.

2026-03-30
CVE-2018-25233 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

WebDrive 18.00.5057 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the username field during Secure WebDAV connection setup. Attackers can input a buffer-overflow payload of 5000 bytes in the username parameter and trigger a connection test to cause the application to crash.

2026-03-30
CVE-2018-25232 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

Softros LAN Messenger 9.2 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string to the custom log files location field. Attackers can input a buffer of 2000 characters in the Log Files Location custom path parameter to trigger a crash when the OK button is clicked.

2026-03-30
CVE-2018-25231 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

HeidiSQL 9.5.0.5196 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long file path in the logging preferences. Attackers can input a buffer-overflow payload through the SQL log file path field in Preferences > Logging to trigger an application crash.

2026-03-30
CVE-2018-25230 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

Free IP Switcher 3.1 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Computer Name field. Attackers can paste a malicious payload into the Computer Name input field and click Activate to trigger a denial of service condition that crashes the application.

2026-03-30
CVE-2018-25229 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

BulletProof FTP Server 2019.0.0.50 contains a denial of service vulnerability in the SMTP configuration interface that allows local attackers to crash the application by supplying an oversized string. Attackers can input a buffer of 257 'A' characters in the SMTP Server field and trigger a crash by clicking the Test button.

2026-03-30
CVE-2018-25228 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

NetSetMan 4.7.1 contains a buffer overflow vulnerability in the Workgroup feature that allows local attackers to crash the application by supplying oversized input. Attackers can create a malicious configuration file with excessive data and paste it into the Workgroup field to trigger a denial of service condition.

2026-03-30
CVE-2018-25227 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

Valentina Studio 9.0.4 contains a denial of service vulnerability that allows local attackers to crash the application by supplying an excessively long string in the Host field. Attackers can trigger the crash by pasting a 256-byte buffer of repeated characters into the Host parameter during server connection attempts.

2026-03-30
CVE-2018-25226 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

FTPShell Server 6.83 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an excessively long string in the account name field. Attackers can trigger a denial of service by pasting a 417-byte payload into the 'Account name to ban' parameter within the Manage FTP Accounts interface.

2026-03-30
CVE-2026-1612 MEDIUM CVSS 5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

AL-KO Robolinho Update Software has hard-coded AWS Access and Secret keys that allow anyone to access AL-KO's AWS bucket. Using the keys directly might give the attacker greater access than the app itself. Key grants AT LEAST read access to some of the objects in bucket. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable vers

2026-03-30
CVE-2026-5128 MEDIUM CVSS 5 EPSS 0.1% ⚠ EXPLOIT AVAILABLE

A sensitive information exposure vulnerability exists in ArthurFiorette steam-trader 2.1.1. An unauthenticated attacker can send a request to the /users API endpoint to retrieve highly sensitive Steam account data, including the account username, password, identity secret, and shared secret. In addition, application logs expose authentication artifacts such as access tokens, refresh tokens, and se

2026-03-30
CVE-2026-5121 MEDIUM CVSS 5 EPSS 0.1% ⚠ EXPLOIT AVAILABLE

A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote attacker can exploit this by providing a specially crafted ISO9660 image, which can lead to a heap buffer overflow. This could potentially allow for arbitrary code execution on the affected system.

2026-03-30
CVE-2026-4416 HIGH CVSS 7.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

The Performance Library component of Gigabyte Control Center has an Insecure Deserialization vulnerability. Authenticated local attackers can send a malicious serialized payload to the EasyTune Engine service, resulting in privilege escalation.

2026-03-30
CVE-2026-4415 HIGH CVSS 7.5 EPSS 0.4% ⚠ EXPLOIT AVAILABLE

Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulnerability. When the pairing feature is enabled, unauthenticated remote attackers can write arbitrary files to any location on the underlying operating system, leading to arbitrary code execution or privilege escalation.

2026-03-30
CVE-2026-3945 MEDIUM CVSS 5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG

PoC: tinyproxy/tinyproxy · PoC: tinyproxy/tinyproxy · PoC: tinyproxy/tinyproxy
2026-03-30
CVE-2026-2328 HIGH CVSS 7.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

An unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, resulting in exposure of sensitive information.

2026-03-30
CVE-2026-25704 MEDIUM CVSS 5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A Privilege Dropping / Lowering Errors/Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in  cosmic-greeter can allow an attacker to regain privileges that should have been dropped and abuse them in the racy checking logic. This issue affects cosmic-greeter before https://github.Com/pop-os/cosmic-greeter/pull/426.

2026-03-30
CVE-2025-3716 MEDIUM CVSS 5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

User enumeration in ESET Protect (on-prem) via Response Timing.

PoC: g0vguy/CVE-2025-37164-PoC · PoC: rxerium/CVE-2025-37164 · PoC: LACHHAB-Anas/Exploit_CVE-2025-37164
2026-03-30
CVE-2025-15379 MEDIUM CVSS 5 EPSS 0.2% ⚠ EXPLOIT AVAILABLE

A command injection vulnerability exists in MLflow's model serving container initialization code, specifically in the `_install_model_dependencies_to_env()` function. When deploying a model with `env_manager=LOCAL`, MLflow reads dependency specifications from the model artifact's `python_env.yaml` file and directly interpolates them into a shell command without sanitization. This allows an attacke

PoC: mlflow/mlflow
2026-03-30
CVE-2026-5119 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A flaw was found in libsoup. When establishing HTTPS tunnels through a configured HTTP proxy, sensitive session cookies are transmitted in cleartext within the initial HTTP CONNECT request. A network-positioned attacker or a malicious HTTP proxy can intercept these cookies, leading to potential session hijacking or user impersonation.

2026-03-30
CVE-2026-5107 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A vulnerability has been found in FRRouting FRR up to 10.5.1. This affects the function process_type2_route of the file bgpd/bgp_evpn.c of the component EVPN Type-2 Route Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is reported as difficult. The identifier of the patch is 7676

PoC: FRRouting/frr
2026-03-30
CVE-2026-5106 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A flaw has been found in code-projects Exam Form Submission 1.0. The impacted element is an unknown function of the file /admin/update_fst.php. Executing a manipulation of the argument sname can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been published and may be used.

PoC: sxc2044-pixel/hajimi
2026-03-30
CVE-2026-5105 HIGH CVSS 7.5 EPSS 1.6% ⚠ EXPLOIT AVAILABLE

A vulnerability was detected in Totolink A3300R 17.0.0cu.557_b20221024. The affected element is the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. Performing a manipulation of the argument pptpPassThru results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.

PoC: LvHongW/Vuln-of-totolink_A3300R
2026-03-30
CVE-2026-5104 HIGH CVSS 7.5 EPSS 1.6% ⚠ EXPLOIT AVAILABLE

A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_b20221024. Impacted is the function setStaticRoute of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument ip leads to command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

PoC: LvHongW/Vuln-of-totolink_A3300R
2026-03-30
CVE-2026-5103 HIGH CVSS 7.5 EPSS 1.6% ⚠ EXPLOIT AVAILABLE

A weakness has been identified in Totolink A3300R 17.0.0cu.557_b20221024. This issue affects the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument enable causes command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.

PoC: LvHongW/Vuln-of-totolink_A3300R
2026-03-30
CVE-2026-3124 HIGH CVSS 7.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

The Download Monitor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.7 via the executePayment() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to complete arbitrary pending orders by exploiting a mismatch between the PayPal transaction token and the local order, allow

2026-03-30
CVE-2025-15036 CRITICAL CVSS 9.5 EPSS 0.1% ⚠ EXPLOIT AVAILABLE

A path traversal vulnerability exists in the `extract_archive_to_dir` function within the `mlflow/pyfunc/dbconnect_artifact_cache.py` file of the mlflow/mlflow repository. This vulnerability, present in versions before v3.7.0, arises due to the lack of validation of tar member paths during extraction. An attacker with control over the tar.gz file can exploit this issue to overwrite arbitrary files

PoC: mlflow/mlflow
2026-03-30
CVE-2026-2370 HIGH CVSS 7.5 EPSS 0.0%

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 14.3 before 18.8.7, 18.9 before 18.9.3, and 18.10 before 18.10.1 affecting Jira Connect installations that could have allowed an authenticated user with minimal workspace permissions to obtain installation credentials and impersonate the GitLab app due to improper authorization checks.

2026-03-30
CVE-2026-5102 HIGH CVSS 7.5 EPSS 1.6%

A security flaw has been discovered in Totolink A3300R 17.0.0cu.557_b20221024. This vulnerability affects the function setSmartQosCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. The manipulation of the argument qos_up_bw results in command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

2026-03-30
CVE-2025-7741 MEDIUM CVSS 5 EPSS 0.0%

Hardcoded Password Vulnerability have been found in CENTUM. Affected products contain a hardcoded password for the user account (PROG) used for CENTUM Authentication Mode within the system. Under the following conditions, there is a risk that an attacker could log in as the PROG user. The default permission for the PROG users is S1 permission (equivalent to OFFUSER). Therefore, for properly permi

2026-03-30
CVE-2018-25235 MEDIUM CVSS 5.5 EPSS 0.0%

[CNNVD CNNVD-202603-6001] NetworkActiv Web Server 缓冲区错误漏洞

2026-03-30
CVE-2019-25654 HIGH CVSS 7.5 EPSS 0.0%

[CNNVD CNNVD-202603-6000] Core FTP/SFTP Server 缓冲区错误漏洞

2026-03-30
CVE-2019-25653 MEDIUM CVSS 5.5 EPSS 0.0%

[CNNVD CNNVD-202603-5999] Navicat 安全漏洞

2026-03-30
CVE-2019-25655 MEDIUM CVSS 5.5 EPSS 0.0%

[CNNVD CNNVD-202603-5997] HDD Device Monitoring Studio 安全漏洞

2026-03-30
CVE-2026-28527 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5996] BTstack 安全漏洞

2026-03-30
CVE-2026-4266 MEDIUM CVSS 5 EPSS 0.1%

[CNNVD CNNVD-202603-5995] WatchGuard Fireware OS 安全漏洞

2026-03-30
CVE-2026-28526 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5994] BTstack 安全漏洞

2026-03-30
CVE-2026-4315 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5993] WatchGuard Fireware OS 安全漏洞

2026-03-30
CVE-2026-28528 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5992] BTstack 安全漏洞

2026-03-30
CVE-2026-30082 MEDIUM CVSS 5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

[CNNVD CNNVD-202603-5990] IngEstate Server 安全漏洞

PoC: Cr0wld3r/CVE-2026-30082
2026-03-30
CVE-2026-30563 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5988] SourceCodester Sales and Inventory System 安全漏洞

2026-03-30
CVE-2026-30564 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5987] SourceCodester Sales and Inventory System 安全漏洞

2026-03-30
CVE-2026-30566 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5986] SourceCodester Sales and Inventory System 安全漏洞

2026-03-30
CVE-2026-33373 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5985] Zimbra Collaboration 安全漏洞

2026-03-30
CVE-2026-5122 LOW CVSS 2.5 EPSS 0.0%

[CNNVD CNNVD-202603-5984] GoBGP 访问控制错误漏洞

2026-03-30
CVE-2026-29953 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5982] SchemaHero 安全漏洞

2026-03-30
CVE-2026-30556 MEDIUM CVSS 5 EPSS 0.1%

[CNNVD CNNVD-202603-5976] SourceCodester Sales and Inventory System 安全漏洞

2026-03-30
CVE-2026-30557 MEDIUM CVSS 5 EPSS 0.1%

[CNNVD CNNVD-202603-5975] SourceCodester Sales and Inventory System 安全漏洞

2026-03-30
CVE-2026-30558 MEDIUM CVSS 5 EPSS 0.1%

[CNNVD CNNVD-202603-5974] SourceCodester Sales and Inventory System 安全漏洞

2026-03-30
CVE-2026-30559 MEDIUM CVSS 5 EPSS 0.1%

[CNNVD CNNVD-202603-5973] SourceCodester Sales and Inventory System 安全漏洞

2026-03-30
CVE-2026-30560 MEDIUM CVSS 5 EPSS 0.1%

[CNNVD CNNVD-202603-5972] SourceCodester Sales and Inventory System 安全漏洞

2026-03-30
CVE-2026-30561 MEDIUM CVSS 5 EPSS 0.1%

[CNNVD CNNVD-202603-5971] SourceCodester Sales and Inventory System 安全漏洞

2026-03-30
CVE-2026-26352 MEDIUM CVSS 5.5 EPSS 0.0%

[CNNVD CNNVD-202603-5965] Smoothwall Express 跨站脚本漏洞

2026-03-30
CVE-2026-5124 LOW CVSS 2.5 EPSS 0.0%

[CNNVD CNNVD-202603-5961] GoBGP 访问控制错误漏洞

2026-03-30
CVE-2025-66037 LOW CVSS 2.5 EPSS 0.0%

[CNNVD CNNVD-202603-5960] OpenSC 缓冲区错误漏洞

2026-03-30
CVE-2025-49010 LOW CVSS 2.5 EPSS 0.0%

[CNNVD CNNVD-202603-5959] OpenSC 安全漏洞

2026-03-30
CVE-2025-66038 LOW CVSS 2.5 EPSS 0.0%

[CNNVD CNNVD-202603-5958] OpenSC 安全漏洞

2026-03-30
CVE-2025-66215 LOW CVSS 2.5 EPSS 0.0%

[CNNVD CNNVD-202603-5957] OpenSC 安全漏洞

2026-03-30
CVE-2026-29872 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5956] Awesome LLM Apps 安全漏洞

2026-03-30
CVE-2026-30077 MEDIUM CVSS 5 EPSS 0.1%

[CNNVD CNNVD-202603-5955] OpenAirInterface 安全漏洞

2026-03-30
CVE-2026-33027 MEDIUM CVSS 5 EPSS 0.1%

[CNNVD CNNVD-202603-5954] Nginx UI 安全漏洞

2026-03-30
CVE-2026-5165 MEDIUM CVSS 5.5 EPSS 0.0%

[CNNVD CNNVD-202603-5950] virtio-win 安全漏洞

2026-03-30
CVE-2026-30305 MEDIUM CVSS 5 EPSS 0.1%

[CNNVD CNNVD-202603-5930] Syntx 安全漏洞

2026-03-30
CVE-2026-31804 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5926] Tautulli 代码问题漏洞

2026-03-30
CVE-2026-25627 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5921] NanoMQ 缓冲区错误漏洞

2026-03-30
CVE-2026-27018 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5920] Gotenberg 代码问题漏洞

2026-03-30
CVE-2026-30306 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5919] SakaDev 安全漏洞

2026-03-30
CVE-2026-27599 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5917] CI4MS 跨站脚本漏洞

2026-03-30
CVE-2026-30313 MEDIUM CVSS 5 EPSS 0.2%

[CNNVD CNNVD-202603-5914] Cline 安全漏洞

2026-03-30
CVE-2026-32696 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5912] NanoMQ 代码问题漏洞

2026-03-30
CVE-2026-33983 HIGH CVSS 7.5 EPSS 0.0%

[CNNVD CNNVD-202603-5904] FreeRDP 安全漏洞

2026-03-30
CVE-2026-33952 MEDIUM CVSS 5.5 EPSS 0.1%

[CNNVD CNNVD-202603-5903] FreeRDP 安全漏洞

2026-03-30
CVE-2026-33985 MEDIUM CVSS 5.5 EPSS 0.0%

[CNNVD CNNVD-202603-5902] FreeRDP 安全漏洞

2026-03-30
CVE-2026-33982 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5901] FreeRDP 缓冲区错误漏洞

2026-03-30
CVE-2026-33984 HIGH CVSS 7.5 EPSS 0.0%

[CNNVD CNNVD-202603-5900] FreeRDP 安全漏洞

2026-03-30
CVE-2026-33986 HIGH CVSS 7.5 EPSS 0.0%

[CNNVD CNNVD-202603-5898] FreeRDP 安全漏洞

2026-03-30
CVE-2026-29909 MEDIUM CVSS 5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

[CNNVD CNNVD-202603-5963] MRCMS 安全漏洞

PoC: qflksheep/CVE-2026-29909-MRCMS-vulnerability
2026-03-30
CVE-2026-33977 MEDIUM CVSS 5.5 EPSS 0.0%

[CNNVD CNNVD-202603-5897] FreeRDP 安全漏洞

2026-03-30
CVE-2026-5130 HIGH CVSS 7.5 EPSS 0.0%

[CNNVD CNNVD-202603-5893] WordPress plugin Debugger & Troubleshooter 安全漏洞

2026-03-30
CVE-2026-33987 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5891] FreeRDP 安全漏洞

2026-03-30
CVE-2026-33995 MEDIUM CVSS 5.5 EPSS 0.1%

[CNNVD CNNVD-202603-5890] FreeRDP 资源管理错误漏洞

2026-03-30
CVE-2026-4257 CRITICAL CVSS 9.5 EPSS 0.2%

[CNNVD CNNVD-202603-5889] WordPress plugin Contact Form by Supsystic 代码注入漏洞

2026-03-30
CVE-2026-5154 HIGH CVSS 7.5 EPSS 0.0%

[CNNVD CNNVD-202603-5888] Tenda CH22 安全漏洞

2026-03-30
CVE-2026-5155 HIGH CVSS 7.5 EPSS 0.0%

[CNNVD CNNVD-202603-5887] Tenda CH22 安全漏洞

2026-03-30
CVE-2026-30565 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5989] SourceCodester Sales and Inventory System 安全漏洞

2026-03-30
CVE-2026-30308 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5916] HAI Builds Code Generator 安全漏洞

2026-03-30
CVE-2026-34557 MEDIUM CVSS 5 EPSS 0.0%

[CNNVD CNNVD-202603-5908] CI4MS 跨站脚本漏洞

2026-03-30
CVE-2026-5153 MEDIUM CVSS 5.5 EPSS 2.7%

[CNNVD CNNVD-202603-5894] Tenda CH22 命令注入漏洞

2026-03-30
CVE-2026-32794 MEDIUM CVSS 5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

[CNNVD CNNVD-202603-5905] Apache Airflow 信任管理问题漏洞

PoC: SnailSploit/CVE-2026-32794
2026-03-30
CVE-2026-3321 MEDIUM CVSS 5 EPSS 0.1%

[CNNVD CNNVD-202603-5991] ON24 Q&A Chat 安全漏洞

2026-03-30
CVE-2026-4176 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib. Compress::Raw::Zlib is included in the Perl package as a dual-life core module, and is vulnerable to CVE-2026-3381 due to a vendored version of zlib which has several vulnerabilities, including CVE-2026-27171. The bundled Compress::Raw::Zlib was

PoC: Perl/perl5
2026-03-29
CVE-2026-4946 HIGH CVSS 7.5 EPSS 0.0%

Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This a

PoC: NationalSecurityAgency/ghidra
2026-03-29
CVE-2026-0562 HIGH CVSS 7.5 EPSS 0.0%

A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows any authenticated user to accept or reject friend requests belonging to other users. The `respond_request()` function in `backend/routers/friends.py` does not implement proper authorization checks, enabling Insecure Direct Object Reference (IDOR) attacks. Specifically, the `/api/friends/requests/{friendship_id}` endpo

PoC: parisneo/lollms
2026-03-29
CVE-2026-0560 HIGH CVSS 7.5 EPSS 0.1%

A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms versions prior to 2.2.0, specifically in the `/api/files/export-content` endpoint. The `_download_image_to_temp()` function in `backend/routers/files.py` fails to validate user-controlled URLs, allowing attackers to make arbitrary HTTP requests to internal services and cloud metadata endpoints. This vulnerability can lead

PoC: parisneo/lollms
2026-03-29
CVE-2026-0558 HIGH CVSS 7.5 EPSS 0.1%

A vulnerability in parisneo/lollms, up to and including version 2.2.0, allows unauthenticated users to upload and process files through the `/api/files/extract-text` endpoint. This endpoint does not enforce authentication, unlike other file-related endpoints, and lacks the `Depends(get_current_active_user)` dependency. This issue can lead to denial of service (DoS) through resource exhaustion, inf

PoC: parisneo/lollms
2026-03-29
CVE-2026-34005 HIGH CVSS 7.5 EPSS 0.1% ⚠ EXPLOIT AVAILABLE

In Sofia on Xiongmai DVR/NVR (AHB7008T-MH-V2 and NBD7024H-P) 4.03.R11 devices, root OS command injection can occur via shell metacharacters in the HostName value via an authenticated DVRIP protocol (TCP port 34567) request to the NetWork.NetCommon configuration handler, because system() is used.

PoC: uky007/CVE-2026-34005
2026-03-29
CVE-2026-34221 HIGH CVSS 7.5

MikroORM has Prototype Pollution in Utils.merge

2026-03-29
CVE-2026-34220 CRITICAL CVSS 9.5

MikroORM is vulnerable to SQL Injection via specially crafted object

2026-03-29
CVE-2026-34243 CRITICAL CVSS 9.5

wenxian: Command Injection in GitHub Actions Workflow via `issue_comment.body`

2026-03-29
CVE-2026-34224 LOW CVSS 2.5

Parse Server has an MFA single-use token bypass via concurrent authData login requests

2026-03-29
CVE-2026-5046 HIGH CVSS 7.5 EPSS 0.0%

A flaw has been found in Tenda FH1201 1.2.0.14(408). Affected is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component Parameter Handler. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been published and may be used.

2026-03-29
CVE-2026-34215 HIGH CVSS 7.5

Parse Server exposes auth data via verify password endpoint

2026-03-29
CVE-2026-34214 HIGH CVSS 7.5

Trino: Iceberg REST catalog static and vended credentials are accessible via query JSON

2026-03-29
CVE-2026-34210 MEDIUM CVSS 5.5

mppx has Stripe charge credential replay via missing idempotency check

2026-03-29
CVE-2026-34209 HIGH CVSS 7.5

mppx: Tempo has a session close voucher bypass vulnerability due to settled amount equality

2026-03-29
CVE-2026-5045 HIGH CVSS 7.5 EPSS 0.0%

A vulnerability was detected in Tenda FH1201 1.2.0.14(408). This impacts the function WrlclientSet of the file /goform/WrlclientSet of the component Parameter Handler. Performing a manipulation of the argument GO results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.

2026-03-29
CVE-2026-5044 HIGH CVSS 7.5 EPSS 0.0%

A security vulnerability has been detected in Belkin F9K1122 1.00.33. This affects the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. Such manipulation of the argument webpage leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early a

2026-03-29
CVE-2026-33575 HIGH CVSS 7.5 EPSS 0.0%

OpenClaw before 2026.3.12 embeds long-lived shared gateway credentials directly in pairing setup codes generated by /pair endpoint and OpenClaw qr command. Attackers with access to leaked setup codes from chat history, logs, or screenshots can recover and reuse the shared gateway credential outside the intended one-time pairing flow.

PoC: openclaw/openclaw
2026-03-29
CVE-2026-33574 MEDIUM CVSS 5.5 EPSS 0.0%

OpenClaw before 2026.3.8 contains a path traversal vulnerability in the skills download installer that validates the tools root lexically but reuses the mutable path during archive download and copy operations. A local attacker can rebind the tools-root path between validation and final write to redirect the installer outside the intended tools directory.

PoC: openclaw/openclaw · PoC: openclaw/openclaw
2026-03-29
CVE-2026-33573 HIGH CVSS 7.5 EPSS 0.0%

OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in the gateway agent RPC that allows authenticated operators with operator.write permission to override workspace boundaries by supplying attacker-controlled spawnedBy and workspaceDir values. Remote operators can escape the configured workspace boundary and execute arbitrary file and exec operations from any process-accessib

PoC: openclaw/openclaw
2026-03-29
CVE-2026-33572 HIGH CVSS 7.5 EPSS 0.0%

OpenClaw before 2026.2.17 creates session transcript JSONL files with overly broad default permissions, allowing local users to read transcript contents. Attackers with local access can read transcript files to extract sensitive information including secrets from tool output.

PoC: openclaw/openclaw · PoC: openclaw/openclaw
2026-03-29
CVE-2026-32987 CRITICAL CVSS 9.5 EPSS 0.0%

OpenClaw before 2026.3.13 allows bootstrap setup codes to be replayed during device pairing verification in src/infra/device-bootstrap.ts. Attackers can verify a valid bootstrap code multiple times before approval to escalate pending pairing scopes, including privilege escalation to operator.admin.

PoC: openclaw/openclaw · PoC: openclaw/openclaw
2026-03-29
CVE-2026-32980 HIGH CVSS 7.5 EPSS 0.1%

OpenClaw before 2026.3.13 reads and buffers Telegram webhook request bodies before validating the x-telegram-bot-api-secret-token header, allowing unauthenticated attackers to exhaust server resources. Attackers can send POST requests to the webhook endpoint to force memory consumption, socket time, and JSON parsing work before authentication validation occurs.

PoC: openclaw/openclaw · PoC: openclaw/openclaw
2026-03-29
CVE-2026-32979 HIGH CVSS 7.5 EPSS 0.0%

OpenClaw before 2026.3.11 contains an approval integrity vulnerability allowing attackers to execute rewritten local code by modifying scripts between approval and execution when exact file binding cannot occur. Remote attackers can change approved local scripts before execution to achieve unintended code execution as the OpenClaw runtime user.

PoC: openclaw/openclaw
2026-03-29
CVE-2026-32975 CRITICAL CVSS 9.5 EPSS 0.1%

OpenClaw before 2026.3.12 contains a weak authorization vulnerability in Zalouser allowlist mode that matches mutable group display names instead of stable group identifiers. Attackers can create groups with identical names to allowlisted groups to bypass channel authorization and route messages from unintended groups to the agent.

PoC: openclaw/openclaw
2026-03-29
CVE-2026-32974 HIGH CVSS 7.5 EPSS 0.1%

OpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing acceptance of forged events. Unauthenticated network attackers can inject forged Feishu events and trigger downstream tool execution by reaching the webhook endpoint.

PoC: openclaw/openclaw
2026-03-29
CVE-2026-32973 CRITICAL CVSS 9.5 EPSS 0.1%

OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where matchesExecAllowlistPattern improperly normalizes patterns with lowercasing and glob matching that overmatches on POSIX paths. Attackers can exploit the ? wildcard matching across path segments to execute commands or paths not intended by operators.

PoC: openclaw/openclaw
2026-03-29
CVE-2026-32972 HIGH CVSS 7.5 EPSS 0.0%

OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing authenticated operators with only operator.write permission to access admin-only browser profile management routes through browser.request. Attackers can create or modify browser profiles and persist attacker-controlled remote CDP endpoints to disk without holding operator.admin privileges.

PoC: openclaw/openclaw
2026-03-29
CVE-2026-32922 CRITICAL CVSS 9.5 EPSS 0.2%

OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in device.token.rotate that allows callers with operator.pairing scope to mint tokens with broader scopes by failing to constrain newly minted scopes to the caller's current scope set. Attackers can obtain operator.admin tokens for paired devices and achieve remote code execution on connected nodes via system.run or gain unaut

PoC: openclaw/openclaw
2026-03-29
CVE-2026-32919 MEDIUM CVSS 5.5 EPSS 0.0%

OpenClaw before 2026.3.11 contains an authorization bypass vulnerability allowing write-scoped callers to reach admin-only session reset logic. Attackers with operator.write scope can issue agent requests containing /new or /reset slash commands to reset targeted conversation state without holding operator.admin privileges.

PoC: openclaw/openclaw
2026-03-29
CVE-2026-32918 HIGH CVSS 7.5 EPSS 0.0%

OpenClaw before 2026.3.11 contains a session sandbox escape vulnerability in the session_status tool that allows sandboxed subagents to access parent or sibling session state. Attackers can supply arbitrary sessionKey values to read or modify session data outside their sandbox scope, including persisted model overrides.

PoC: openclaw/openclaw
2026-03-29
CVE-2026-32914 HIGH CVSS 7.5 EPSS 0.0%

OpenClaw before 2026.3.12 contains an insufficient access control vulnerability in the /config and /debug command handlers that allows command-authorized non-owners to access owner-only surfaces. Attackers with command authorization can read or modify privileged configuration settings restricted to owners by exploiting missing owner-level permission checks.

PoC: openclaw/openclaw
2026-03-29
CVE-2026-23400 MEDIUM CVSS 5.5 EPSS 0.0%

In the Linux kernel, the following vulnerability has been resolved: rust_binder: call set_notification_done() without proc lock Consider the following sequence of events on a death listener: 1. The remote process dies and sends a BR_DEAD_BINDER message. 2. The local process invokes the BC_CLEAR_DEATH_NOTIFICATION command. 3. The local process then invokes the BC_DEAD_BINDER_DONE. Then, the kerne

2026-03-29
CVE-2026-5043 HIGH CVSS 7.5 EPSS 0.0%

A weakness has been identified in Belkin F9K1122 1.00.33. The impacted element is the function formSetPassword of the file /goform/formSetPassword of the component Parameter Handler. This manipulation of the argument webpage causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. The vendor

2026-03-29
CVE-2026-5042 HIGH CVSS 7.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A security flaw has been discovered in Belkin F9K1122 1.00.33. The affected element is the function formCrossBandSwitch of the file /goform/formCrossBandSwitch of the component Parameter Handler. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor wa

2026-03-29
CVE-2026-5041 MEDIUM CVSS 5.5 EPSS 0.2% ⚠ EXPLOIT AVAILABLE

A vulnerability was identified in code-projects Chamber of Commerce Membership Management System 1.0. Impacted is the function fwrite of the file admin/pageMail.php. The manipulation of the argument mailSubject/mailMessage leads to command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.

2026-03-29
CVE-2026-5037 LOW CVSS 2.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A vulnerability was determined in mxml up to 4.0.4. This issue affects the function index_sort of the file mxml-index.c of the component mxmlIndexNew. Executing a manipulation of the argument tempr can lead to stack-based buffer overflow. The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. This patch is called 6e27354466092a1ac65601e01ce6708710

PoC: michaelrsweet/mxml · PoC: michaelrsweet/mxml · PoC: michaelrsweet/mxml
2026-03-29
CVE-2026-5036 HIGH CVSS 7.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A vulnerability was found in Tenda 4G06 04.06.01.29. This vulnerability affects the function fromDhcpListClient of the file /goform/DhcpListClient of the component Endpoint. Performing a manipulation of the argument page results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used.

PoC: Kiciot/cve
2026-03-29
CVE-2026-5035 HIGH CVSS 7.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A vulnerability has been found in code-projects Accounting System 1.0. This affects an unknown part of the file /view_work.php of the component Parameter Handler. Such manipulation of the argument en_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

PoC: Xu-Zhihan/CVE
2026-03-29
CVE-2026-5034 HIGH CVSS 7.5 EPSS 0.0%

A flaw has been found in code-projects Accounting System 1.0. Affected by this issue is some unknown functionality of the file /edit_costumer.php of the component Parameter Handler. This manipulation of the argument cos_id causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.

2026-03-29
CVE-2026-5033 HIGH CVSS 7.5 EPSS 0.0%

A vulnerability was detected in code-projects Accounting System 1.0. Affected by this vulnerability is an unknown functionality of the file /view_costumer.php of the component Parameter Handler. The manipulation of the argument cos_id results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.

2026-03-29
CVE-2026-5031 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A vulnerability was found in BichitroGan ISP Billing Software 2025.3.20. Impacted is an unknown function of the file /?_route=settings/users-view/ of the component Endpoint. The manipulation of the argument ID results in improper control of resource identifiers. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclo

PoC: 4m3rr0r/PoCVulDb
2026-03-29
CVE-2026-5030 MEDIUM CVSS 5.5 EPSS 1.2%

A vulnerability has been found in Totolink NR1800X 9.1.0u.6279_B20210910. This issue affects the function NTPSyncWithHost of the file /cgi-bin/cstecgi.cgi of the component Telnet Service. The manipulation of the argument host_time leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

2026-03-29
CVE-2026-5024 HIGH CVSS 7.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A vulnerability was found in D-Link DIR-513 1.10. This issue affects the function formSetEmail of the file /goform/formSetEmail. Performing a manipulation of the argument curTime results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the m

2026-03-29
CVE-2026-5023 MEDIUM CVSS 5.5 EPSS 0.3% ⚠ EXPLOIT AVAILABLE

A vulnerability has been found in DeDeveloper23 codebase-mcp up to 3ec749d237dd8eabbeef48657cf917275792fde6. This vulnerability affects the function getCodebase/getRemoteCodebase/saveCodebase of the file src/tools/codebase.ts of the component RepoMix Command Handler. Such manipulation leads to os command injection. The attack needs to be performed locally. The exploit has been disclosed to the pub

PoC: DeDeveloper23/codebase-mcp
2026-03-29
CVE-2026-5021 HIGH CVSS 7.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromPPTPUserSetting of the file /goform/PPTPUserSetting of the component httpd. This manipulation of the argument delno causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.

2026-03-29
CVE-2026-2602 MEDIUM CVSS 5.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

The Twentig plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'featuredImageSizeWidth' parameter in versions up to, and including, 1.9.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an

2026-03-29
CVE-2026-5020 MEDIUM CVSS 5.5 EPSS 1.2% ⚠ EXPLOIT AVAILABLE

A vulnerability was detected in Totolink A3600R 4.1.2cu.5182_B20201102. Affected by this issue is the function setNoticeCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. The manipulation of the argument NoticeUrl results in command injection. The attack may be launched remotely. The exploit is now public and may be used.

2026-03-29
CVE-2026-4851 HIGH CVSS 7.5 EPSS 0.1% ⚠ EXPLOIT AVAILABLE

GRID::Machine versions through 0.127 for Perl allows arbitrary code execution via unsafe deserialization. GRID::Machine provides Remote Procedure Calls (RPC) over SSH for Perl. The client connects to remote hosts to execute code on them. A compromised or malicious remote host can execute arbitrary code back on the client through unsafe deserialization in the RPC protocol. read_operation() in lib

2026-03-29
CVE-2026-5019 HIGH CVSS 7.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A security vulnerability has been detected in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file all-orders.php of the component Parameter Handler. The manipulation of the argument Status leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

PoC: 6Justdododo6/CVE
2026-03-29
CVE-2026-5101 MEDIUM CVSS 5.5 EPSS 2.2%

[CNNVD CNNVD-202603-5838] TOTOLINK A3300R 命令注入漏洞

2026-03-29
CVE-2026-32978 HIGH CVSS 7.5 EPSS 0.0%

[CNNVD CNNVD-202603-5852] OpenClaw 安全漏洞

2026-03-29
CVE-2026-32924 CRITICAL CVSS 9.5 EPSS 0.0%

[CNNVD CNNVD-202603-5858] OpenClaw 安全漏洞

2026-03-29
CVE-2026-32915 HIGH CVSS 7.5 EPSS 0.0%

[CNNVD CNNVD-202603-5862] OpenClaw 安全漏洞

2026-03-29
CVE-2026-32923 MEDIUM CVSS 5.5 EPSS 0.0%

[CNNVD CNNVD-202603-5860] OpenClaw 安全漏洞

2026-03-29
CVE-2026-5018 HIGH CVSS 7.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A weakness has been identified in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

PoC: 6Justdododo6/CVE
2026-03-28
CVE-2026-5017 HIGH CVSS 7.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A security flaw has been discovered in code-projects Simple Food Order System 1.0. This impacts an unknown function of the file /all-tickets.php of the component Parameter Handler. Performing a manipulation of the argument Status results in sql injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.

PoC: 6Justdododo6/CVE
2026-03-28
CVE-2026-5016 HIGH CVSS 7.5 EPSS 0.0% ⚠ EXPLOIT AVAILABLE

A vulnerability was identified in elecV2 elecV2P up to 3.8.3. This affects the function eAxios of the file /mock of the component URL Handler. Such manipulation of the argument req leads to server-side request forgery. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not

PoC: elecV2/elecV2P
2026-03-28