Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis

Most Critical CVE List from the Last 3 Days

Below are the critical vulnerabilities published in recent days by the National Vulnerability Database (NVD). Exercise maximum caution to prevent potential exploitation.
Single vulnerability search

29/03/2026

Unknown

HIGH (8.8)
CVE-2026-4946
Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution...
Vendor/s:

Full Description

Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This allows a crafted binary to present seemingly benign clickable text which, when clicked, executes attacker-controlled commands on the analyst’s machine.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: REQUIRED / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
HIGH (8.8)
CVE-2026-34005
In Sofia on Xiongmai DVR/NVR (AHB7008T-MH-V2 and NBD7024H-P) 4.03.R11 devices, root OS command injection can occur via shell metacharacters in...
Vendor/s:

Full Description

In Sofia on Xiongmai DVR/NVR (AHB7008T-MH-V2 and NBD7024H-P) 4.03.R11 devices, root OS command injection can occur via shell metacharacters in the HostName value via an authenticated DVRIP protocol (TCP port 34567) request to the NetWork.NetCommon configuration handler, because system() is used.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

Additional Information

Published on: 29/03/2026 17:16:44
Last Modified: 29/03/2026 17:16:44

Sources and References

HIGH (8.8)
CVE-2026-5046
A flaw has been found in Tenda FH1201 1.2.0.14(408). Affected is the function formWrlExtraSet of the file /goform/WrlExtraSet of the...
Vendor/s:

Full Description

A flaw has been found in Tenda FH1201 1.2.0.14(408). Affected is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component Parameter Handler. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been published and may be used.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
HIGH (8.8)
CVE-2026-5045
A vulnerability was detected in Tenda FH1201 1.2.0.14(408). This impacts the function WrlclientSet of the file /goform/WrlclientSet of the component...
Vendor/s:

Full Description

A vulnerability was detected in Tenda FH1201 1.2.0.14(408). This impacts the function WrlclientSet of the file /goform/WrlclientSet of the component Parameter Handler. Performing a manipulation of the argument GO results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
HIGH (8.8)
CVE-2026-5044
A security vulnerability has been detected in Belkin F9K1122 1.00.33. This affects the function formSetSystemSettings of the file /goform/formSetSystemSettings of...
Vendor/s:

Full Description

A security vulnerability has been detected in Belkin F9K1122 1.00.33. This affects the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. Such manipulation of the argument webpage leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

Additional Information

Published on: 29/03/2026 13:17:03
Last Modified: 29/03/2026 13:17:03

Sources and References

CRITICAL (9.8)
CVE-2026-32987
OpenClaw before 2026.3.13 allows bootstrap setup codes to be replayed during device pairing verification in src/infra/device-bootstrap.ts. Attackers can verify a...
Vendor/s:

Full Description

OpenClaw before 2026.3.13 allows bootstrap setup codes to be replayed during device pairing verification in src/infra/device-bootstrap.ts. Attackers can verify a valid bootstrap code multiple times before approval to escalate pending pairing scopes, including privilege escalation to operator.admin.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9
HIGH (8.8)
CVE-2026-33573
OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in the gateway agent RPC that allows authenticated operators with operator.write permission...
Vendor/s:

Full Description

OpenClaw before 2026.3.11 contains an authorization bypass vulnerability in the gateway agent RPC that allows authenticated operators with operator.write permission to override workspace boundaries by supplying attacker-controlled spawnedBy and workspaceDir values. Remote operators can escape the configured workspace boundary and execute arbitrary file and exec operations from any process-accessible directory.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
CRITICAL (9.8)
CVE-2026-32973
OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where matchesExecAllowlistPattern improperly normalizes patterns with lowercasing and glob matching that...
Vendor/s:

Full Description

OpenClaw before 2026.3.11 contains an exec allowlist bypass vulnerability where matchesExecAllowlistPattern improperly normalizes patterns with lowercasing and glob matching that overmatches on POSIX paths. Attackers can exploit the ? wildcard matching across path segments to execute commands or paths not intended by operators.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9
HIGH (8.6)
CVE-2026-32974
OpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing...
Vendor/s:

Full Description

OpenClaw before 2026.3.12 contains an authentication bypass vulnerability in Feishu webhook mode when only verificationToken is configured without encryptKey, allowing acceptance of forged events. Unauthenticated network attackers can inject forged Feishu events and trigger downstream tool execution by reaching the webhook endpoint.

CVSS Metrics v3.1

  • Impact: Confid.: LOW, Integ.: HIGH, Avail.: LOW
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
  • Exploitability/Impact Score: 3.9 / 4.7
CRITICAL (9.8)
CVE-2026-32975
OpenClaw before 2026.3.12 contains a weak authorization vulnerability in Zalouser allowlist mode that matches mutable group display names instead of...
Vendor/s:

Full Description

OpenClaw before 2026.3.12 contains a weak authorization vulnerability in Zalouser allowlist mode that matches mutable group display names instead of stable group identifiers. Attackers can create groups with identical names to allowlisted groups to bypass channel authorization and route messages from unintended groups to the agent.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9
CRITICAL (9.9)
CVE-2026-32922
OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in device.token.rotate that allows callers with operator.pairing scope to mint tokens with...
Vendor/s:

Full Description

OpenClaw before 2026.3.11 contains a privilege escalation vulnerability in device.token.rotate that allows callers with operator.pairing scope to mint tokens with broader scopes by failing to constrain newly minted scopes to the caller's current scope set. Attackers can obtain operator.admin tokens for paired devices and achieve remote code execution on connected nodes via system.run or gain unauthorized gateway-admin access.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.1 / 6
CRITICAL (9.8)
CVE-2026-32924
OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where Feishu reaction events with omitted chat_type are misclassified as p2p conversations...
Vendor/s:

Full Description

OpenClaw before 2026.3.12 contains an authorization bypass vulnerability where Feishu reaction events with omitted chat_type are misclassified as p2p conversations instead of group chats. Attackers can exploit this misclassification to bypass groupAllowFrom and requireMention protections in group chat reaction-derived events.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9
HIGH (8.8)
CVE-2026-32914
OpenClaw before 2026.3.12 contains an insufficient access control vulnerability in the /config and /debug command handlers that allows command-authorized non-owners...
Vendor/s:

Full Description

OpenClaw before 2026.3.12 contains an insufficient access control vulnerability in the /config and /debug command handlers that allows command-authorized non-owners to access owner-only surfaces. Attackers with command authorization can read or modify privileged configuration settings restricted to owners by exploiting missing owner-level permission checks.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
HIGH (8.8)
CVE-2026-32915
OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability allowing leaf subagents to access the subagents control surface and resolve...
Vendor/s:

Full Description

OpenClaw before 2026.3.11 contains a sandbox boundary bypass vulnerability allowing leaf subagents to access the subagents control surface and resolve against parent requester scope instead of their own session tree. A low-privilege sandboxed leaf worker can steer or kill sibling runs and cause execution with broader tool policies by exploiting insufficient authorization checks on subagent control requests.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: LOCAL
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Exploitability/Impact Score: 2 / 6
HIGH (8.8)
CVE-2026-5043
A weakness has been identified in Belkin F9K1122 1.00.33. The impacted element is the function formSetPassword of the file /goform/formSetPassword...
Vendor/s:

Full Description

A weakness has been identified in Belkin F9K1122 1.00.33. The impacted element is the function formSetPassword of the file /goform/formSetPassword of the component Parameter Handler. This manipulation of the argument webpage causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

Additional Information

Published on: 29/03/2026 12:15:57
Last Modified: 29/03/2026 12:15:57

Sources and References

HIGH (8.8)
CVE-2026-5042
A security flaw has been discovered in Belkin F9K1122 1.00.33. The affected element is the function formCrossBandSwitch of the file...
Vendor/s:

Full Description

A security flaw has been discovered in Belkin F9K1122 1.00.33. The affected element is the function formCrossBandSwitch of the file /goform/formCrossBandSwitch of the component Parameter Handler. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

Additional Information

Published on: 29/03/2026 11:16:34
Last Modified: 29/03/2026 11:16:34

Sources and References

HIGH (8.8)
CVE-2026-5036
A vulnerability was found in Tenda 4G06 04.06.01.29. This vulnerability affects the function fromDhcpListClient of the file /goform/DhcpListClient of the...
Vendor/s:

Full Description

A vulnerability was found in Tenda 4G06 04.06.01.29. This vulnerability affects the function fromDhcpListClient of the file /goform/DhcpListClient of the component Endpoint. Performing a manipulation of the argument page results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

Additional Information

Published on: 29/03/2026 08:15:56
Last Modified: 29/03/2026 08:15:56

Sources and References

HIGH (8.8)
CVE-2026-5021
A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromPPTPUserSetting of the file /goform/PPTPUserSetting of the...
Vendor/s:

Full Description

A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromPPTPUserSetting of the file /goform/PPTPUserSetting of the component httpd. This manipulation of the argument delno causes stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been published and may be used.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

D-link

HIGH (8.8)
CVE-2026-5024
A vulnerability was found in D-Link DIR-513 1.10. This issue affects the function formSetEmail of the file /goform/formSetEmail. Performing a...
Vendor/s: D-link

Full Description

A vulnerability was found in D-Link DIR-513 1.10. This issue affects the function formSetEmail of the file /goform/formSetEmail. Performing a manipulation of the argument curTime results in stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the maintainer.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

28/03/2026

Unknown

HIGH (8.8)
CVE-2026-5004
A vulnerability was determined in Wavlink WL-WN579X3-C 231124. This impacts the function sub_4019FC of the file /cgi-bin/firewall.cgi of the component...
Vendor/s:

Full Description

A vulnerability was determined in Wavlink WL-WN579X3-C 231124. This impacts the function sub_4019FC of the file /cgi-bin/firewall.cgi of the component UPNP Handler. Executing a manipulation of the argument UpnpEnabled can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
CRITICAL (9.8)
CVE-2018-25223
Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending malicious input...
Vendor/s:

Full Description

Crashmail 1.6 contains a stack-based buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending malicious input to the application. Attackers can craft payloads with ROP chains to achieve code execution in the application context, with failed attempts potentially causing denial of service.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9
CRITICAL (9.8)
CVE-2017-20229
MAWK 1.3.3-17 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate...
Vendor/s:

Full Description

MAWK 1.3.3-17 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary checks on user-supplied input. Attackers can craft malicious input that overflows the stack buffer and execute a return-oriented programming chain to spawn a shell with application privileges.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9

Additional Information

Published on: 28/03/2026 12:16:02
Last Modified: 28/03/2026 12:16:02

Sources and References

CRITICAL (9.8)
CVE-2018-25220
Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input...
Vendor/s:

Full Description

Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9

Additional Information

Published on: 28/03/2026 12:16:02
Last Modified: 28/03/2026 12:16:02

Sources and References

CRITICAL (9.8)
CVE-2018-25221
EChat Server 3.1 contains a buffer overflow vulnerability in the chat.ghp endpoint that allows remote attackers to execute arbitrary code...
Vendor/s:

Full Description

EChat Server 3.1 contains a buffer overflow vulnerability in the chat.ghp endpoint that allows remote attackers to execute arbitrary code by supplying an oversized username parameter. Attackers can send a GET request to chat.ghp with a malicious username value containing shellcode and ROP gadgets to achieve code execution in the application context.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9

Additional Information

Published on: 28/03/2026 12:16:02
Last Modified: 28/03/2026 12:16:02

Sources and References

CRITICAL (9.8)
CVE-2016-20049
JAD 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying oversized...
Vendor/s:

Full Description

JAD 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying oversized input that exceeds buffer boundaries. Attackers can craft malicious input strings exceeding 8150 bytes to overflow the stack, overwrite return addresses, and execute shellcode in the application context.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9
CRITICAL (9.8)
CVE-2017-20225
TiEmu 2.08 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate...
Vendor/s:

Full Description

TiEmu 2.08 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary checks on user-supplied input. Attackers can trigger the overflow through command-line arguments passed to the application, leveraging ROP gadgets to bypass protections and execute shellcode in the application context.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9

Additional Information

Published on: 28/03/2026 12:16:01
Last Modified: 28/03/2026 12:16:01

Sources and References

CRITICAL (9.8)
CVE-2017-20227
JAD Java Decompiler 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by...
Vendor/s:

Full Description

JAD Java Decompiler 1.5.8e-1kali1 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying overly long input that exceeds buffer boundaries. Attackers can craft malicious input passed to the jad command to overflow the stack and execute a return-oriented programming chain that spawns a shell.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9

Additional Information

Published on: 28/03/2026 12:16:01
Last Modified: 28/03/2026 12:16:01

Sources and References

27/03/2026

Unknown

HIGH (8.8)
CVE-2026-33991
WeGIA is a web manager for charitable institutions. Prior to version 3.6.7, the file `html/socio/sistema/deletar_tag.php` uses `extract($_REQUEST)` on line 14...
Vendor/s:

Full Description

WeGIA is a web manager for charitable institutions. Prior to version 3.6.7, the file `html/socio/sistema/deletar_tag.php` uses `extract($_REQUEST)` on line 14 and directly concatenates the `$id_tag` variable into SQL queries on lines 16-17 without prepared statements or sanitization. Version 3.6.7 patches the vulnerability.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

Additional Information

Published on: 27/03/2026 23:17:13
Last Modified: 27/03/2026 23:17:13

Sources and References

HIGH (8.6)
CVE-2026-33955
Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop, a cross-site scripting vulnerability stored in the note history...
Vendor/s:

Full Description

Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop, a cross-site scripting vulnerability stored in the note history comparison viewer can escalate to remote code execution in a desktop application. The issue is triggered when an attacker-controlled note header is displayed using `dangerouslySetInnerHTML` without secure handling. When combined with the full backup and restore feature in the desktop application, this becomes remote code execution because Electron is configured with `nodeIntegration: true` and `contextIsolation: false`. Version 3.3.11 patches the issue.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: LOCAL
  • Attack Complexity: LOW
  • Interaction/Privileges: REQUIRED / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Exploitability/Impact Score: 1.8 / 6

Additional Information

Published on: 27/03/2026 22:16:22
Last Modified: 27/03/2026 22:16:22

Sources and References

HIGH (8.8)
CVE-2026-33943
Happy DOM is a JavaScript implementation of a web browser without its graphical user interface. In versions 15.10.0 through 20.8.7,...
Vendor/s:

Full Description

Happy DOM is a JavaScript implementation of a web browser without its graphical user interface. In versions 15.10.0 through 20.8.7, a code injection vulnerability in `ECMAScriptModuleCompiler` allows an attacker to achieve Remote Code Execution (RCE) by injecting arbitrary JavaScript expressions inside `export { }` declarations in ES module scripts processed by happy-dom. The compiler directly interpolates unsanitized content into generated code as an executable expression, and the quote filter does not strip backticks, allowing template literal-based payloads to bypass sanitization. Version 20.8.8 fixes the issue.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: REQUIRED / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
HIGH (8.5)
CVE-2026-33953
LinkAce is a self-hosted archive to collect website links. Versions prior to 2.5.3 block direct requests to private IP literals,...
Vendor/s:

Full Description

LinkAce is a self-hosted archive to collect website links. Versions prior to 2.5.3 block direct requests to private IP literals, but still performs server-side requests to internal-only resources when those resources are referenced through an internal hostname. This allows an authenticated user to trigger server-side requests to internal services reachable by the LinkAce server but not directly reachable by an external user. Version 2.5.3 patches the issue.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: LOW, Avail.: NONE
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
  • Exploitability/Impact Score: 3.1 / 4.7

Additional Information

Published on: 27/03/2026 22:16:21
Last Modified: 27/03/2026 22:16:21

Sources and References

HIGH (8.8)
CVE-2026-4976
A vulnerability was found in Totolink LR350 9.3.5u.6369_B20220309. This vulnerability affects the function setWiFiGuestCfg of the file /cgi-bin/cstecgi.cgi. The manipulation...
Vendor/s:

Full Description

A vulnerability was found in Totolink LR350 9.3.5u.6369_B20220309. This vulnerability affects the function setWiFiGuestCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid results in buffer overflow. The attack can be launched remotely. The exploit has been made public and could be used.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
CRITICAL (9.8)
CVE-2026-33937
Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, `Handlebars.compile()` accepts a pre-parsed...
Vendor/s:

Full Description

Handlebars provides the power necessary to let users build semantic templates. In versions 4.0.0 through 4.7.8, `Handlebars.compile()` accepts a pre-parsed AST object in addition to a template string. The `value` field of a `NumberLiteral` AST node is emitted directly into the generated JavaScript without quoting or sanitization. An attacker who can supply a crafted AST to `compile()` can therefore inject and execute arbitrary JavaScript, leading to Remote Code Execution on the server. Version 4.7.9 fixes the issue. Some workarounds are available. Validate input type before calling `Handlebars.compile()`; ensure the argument is always a `string`, never a plain object or JSON-deserialized value. Use the Handlebars runtime-only build (`handlebars/runtime`) on the server if templates are pre-compiled at build time; `compile()` will be unavailable.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9
CRITICAL (9.3)
CVE-2026-33875
Gematik Authenticator securely authenticates users for login to digital health applications. Versions prior to 4.16.0 are vulnerable to authentication flow...
Vendor/s:

Full Description

Gematik Authenticator securely authenticates users for login to digital health applications. Versions prior to 4.16.0 are vulnerable to authentication flow hijacking, potentially allowing attackers to authenticate with the identities of victim users who click on a malicious deep link. Update Gematik Authenticator to version 4.16.0 or greater to receive a patch. There are no known workarounds.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: NONE
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: REQUIRED / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
  • Exploitability/Impact Score: 2.8 / 5.8

Additional Information

Published on: 27/03/2026 21:17:24
Last Modified: 27/03/2026 21:17:24

Sources and References

HIGH (8.8)
CVE-2026-4974
A flaw has been found in Tenda AC7 15.03.06.44. Affected by this issue is the function fromSetSysTime of the file...
Vendor/s:

Full Description

A flaw has been found in Tenda AC7 15.03.06.44. Affected by this issue is the function fromSetSysTime of the file /goform/SetSysTimeCfg of the component POST Request Handler. Executing a manipulation of the argument Time can lead to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been published and may be used.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
HIGH (8.8)
CVE-2026-4975
A vulnerability has been found in Tenda AC15 15.03.05.19. This affects the function formSetCfm of the file /goform/setcfm of the...
Vendor/s:

Full Description

A vulnerability has been found in Tenda AC15 15.03.05.19. This affects the function formSetCfm of the file /goform/setcfm of the component POST Request Handler. The manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
CRITICAL (9.1)
CVE-2026-34374
WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `Live_schedule::keyExists()` method constructs a...
Vendor/s:

Full Description

WWBN AVideo is an open source video platform. In versions up to and including 26.0, the `Live_schedule::keyExists()` method constructs a SQL query by interpolating a stream key directly into the query string without parameterization. This method is called as a fallback from `LiveTransmition::keyExists()` when the initial parameterized lookup returns no results. Although the calling function correctly uses parameterized queries for its own lookup, the fallback path to `Live_schedule::keyExists()` undoes this protection entirely. This vulnerability is distinct from GHSA-pvw4-p2jm-chjm, which covers SQL injection via the `live_schedule_id` parameter in the reminder function. This finding targets the stream key lookup path used during RTMP publish authentication. As of time of publication, no patched versions are available.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: NONE
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  • Exploitability/Impact Score: 3.9 / 5.2

Additional Information

Published on: 27/03/2026 19:16:42
Last Modified: 27/03/2026 19:16:42

Sources and References

HIGH (8.8)
CVE-2026-4961
A vulnerability was identified in Tenda AC6 15.03.05.16. Affected by this vulnerability is the function formQuickIndex of the file /goform/QuickIndex...
Vendor/s:

Full Description

A vulnerability was identified in Tenda AC6 15.03.05.16. Affected by this vulnerability is the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
HIGH (8.8)
CVE-2026-4960
A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component...
Vendor/s:

Full Description

A vulnerability was determined in Tenda AC6 15.03.05.16. Affected is the function fromWizardHandle of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
HIGH (8.7)
CVE-2026-28369
A flaw was found in Undertow. When Undertow receives an HTTP request where the first header line starts with one...
Vendor/s:

Full Description

A flaw was found in Undertow. When Undertow receives an HTTP request where the first header line starts with one or more spaces, it incorrectly processes the request by stripping these leading spaces. This behavior, which violates HTTP standards, can be exploited by a remote attacker to perform request smuggling. Request smuggling allows an attacker to bypass security mechanisms, access restricted information, or manipulate web caches, potentially leading to unauthorized actions or data exposure.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: NONE
  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Interaction/Privileges: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
  • Exploitability/Impact Score: 2.2 / 5.8

Additional Information

Published on: 27/03/2026 17:16:28
Last Modified: 27/03/2026 17:16:28

Sources and References

HIGH (8.7)
CVE-2026-28368
A flaw was found in Undertow. This vulnerability allows a remote attacker to construct specially crafted requests where header names...
Vendor/s:

Full Description

A flaw was found in Undertow. This vulnerability allows a remote attacker to construct specially crafted requests where header names are parsed differently by Undertow compared to upstream proxies. This discrepancy in header interpretation can be exploited to launch request smuggling attacks, potentially bypassing security controls and accessing unauthorized resources.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: NONE
  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Interaction/Privileges: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
  • Exploitability/Impact Score: 2.2 / 5.8

Additional Information

Published on: 27/03/2026 17:16:27
Last Modified: 27/03/2026 17:16:27

Sources and References

CRITICAL (10.0)
CVE-2026-30302
The command auto-approval module in CodeRider-Kilo contains an OS Command Injection vulnerability, rendering its whitelist security mechanism ineffective. The vulnerability...
Vendor/s:

Full Description

The command auto-approval module in CodeRider-Kilo contains an OS Command Injection vulnerability, rendering its whitelist security mechanism ineffective. The vulnerability stems from the incorrect use of an incompatible command parser (the Unix-based shell-quote library) to analyze commands on the Windows platform, coupled with a failure to correctly handle Windows CMD-specific escape sequences (^). Attackers can exploit this discrepancy between the parsing logic and the execution environment by constructing payloads such as git log ^" & malicious_command ^". The CodeRider-Kilo parser is deceived by the escape characters, misinterpreting the malicious command connector (&) as being within a protected string argument and thus auto-approving the command. However, the underlying Windows CMD interpreter ignores the escaped quotes, parsing and executing the subsequent malicious command directly. This allows attackers to achieve arbitrary Remote Code Execution (RCE) after bypassing what appears to be a legitimate Git whitelist check.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 6

Additional Information

Published on: 27/03/2026 16:16:23
Last Modified: 27/03/2026 21:17:21

Sources and References

HIGH (8.8)
CVE-2026-30529
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Actions.php file (specifically the save_user action)....
Vendor/s:

Full Description

A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Actions.php file (specifically the save_user action). The application fails to properly sanitize user input supplied to the "username" parameter. This allows an authenticated attacker to inject malicious SQL commands.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

Additional Information

Published on: 27/03/2026 16:16:23
Last Modified: 27/03/2026 20:16:28

Sources and References

CRITICAL (9.8)
CVE-2026-30530
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Actions.php file (specifically the save_customer action)....
Vendor/s:

Full Description

A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Actions.php file (specifically the save_customer action). The application fails to properly sanitize user input supplied to the "username" parameter. This allows an attacker to inject malicious SQL commands.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9

Additional Information

Published on: 27/03/2026 16:16:23
Last Modified: 27/03/2026 20:16:28

Sources and References

HIGH (8.8)
CVE-2026-30531
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Actions.php file (specifically the save_category action)....
Vendor/s:

Full Description

A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the Actions.php file (specifically the save_category action). The application fails to properly sanitize user input supplied to the "name" parameter. This allows an authenticated attacker to inject malicious SQL commands.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

Additional Information

Published on: 27/03/2026 16:16:23
Last Modified: 27/03/2026 21:17:21

Sources and References

CRITICAL (9.8)
CVE-2026-30532
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the admin/view_product.php file via the "id" parameter.
Vendor/s:

Full Description

A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the admin/view_product.php file via the "id" parameter.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9

Additional Information

Published on: 27/03/2026 16:16:23
Last Modified: 27/03/2026 21:17:21

Sources and References

CRITICAL (9.8)
CVE-2026-30533
A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the admin/manage_product.php file via the "id" parameter.
Vendor/s:

Full Description

A SQL Injection vulnerability exists in SourceCodester Online Food Ordering System v1.0 in the admin/manage_product.php file via the "id" parameter.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9

Additional Information

Published on: 27/03/2026 16:16:23
Last Modified: 27/03/2026 21:17:22

Sources and References

HIGH (8.8)
CVE-2026-5027
The 'POST /api/v2/files' endpoint does not sanitize the 'filename' parameter from the multipart form data, allowing an attacker to write...
Vendor/s:

Full Description

The 'POST /api/v2/files' endpoint does not sanitize the 'filename' parameter from the multipart form data, allowing an attacker to write files to arbitrary locations on the filesystem using path traversal sequences ('../').

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

Additional Information

Published on: 27/03/2026 15:17:04
Last Modified: 27/03/2026 15:17:04

Sources and References

HIGH (8.8)
CVE-2026-33755
Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.158, 25.0.92, and 26.0.17, an authenticated SQL...
Vendor/s:

Full Description

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.158, 25.0.92, and 26.0.17, an authenticated SQL Injection vulnerability in the JMAP `Contact/query` endpoint allows any authenticated user with basic addressbook access to extract arbitrary data from the database — including active session tokens of other users. This enables full account takeover of any user, including the System Administrator, without knowing their password. Versions 6.8.158, 25.0.92, and 26.0.17 fix the issue.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

Additional Information

Published on: 27/03/2026 15:16:57
Last Modified: 27/03/2026 15:16:57

Sources and References

CRITICAL (9.6)
CVE-2026-33757
OpenBao is an open source identity-based secrets management system. Prior to version 2.5.2, OpenBao does not prompt for user confirmation...
Vendor/s:

Full Description

OpenBao is an open source identity-based secrets management system. Prior to version 2.5.2, OpenBao does not prompt for user confirmation when logging in via JWT/OIDC and a role with `callback_mode` set to `direct`. This allows an attacker to start an authentication request and perform "remote phishing" by having the victim visit the URL and automatically log-in to the session of the attacker. Despite being based on the authorization code flow, the `direct` mode calls back directly to the API and allows an attacker to poll for an OpenBao token until it is issued. Version 2.5.2 includes an additional confirmation screen for `direct` type logins that requires manual user interaction in order to finish the authentication. This issue can be worked around either by removing any roles with `callback_mode=direct` or enforcing confirmation for every session on the token issuer side for the Client ID used by OpenBao.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: LOW
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: REQUIRED / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L
  • Exploitability/Impact Score: 2.8 / 6
CRITICAL (9.6)
CVE-2026-30304
In its design for automatic terminal command execution, AI Code offers two options: Execute safe commands and execute all commands....
Vendor/s:

Full Description

In its design for automatic terminal command execution, AI Code offers two options: Execute safe commands and execute all commands. The description for the former states that commands determined by the model to be safe will be automatically executed, whereas if the model judges a command to be potentially destructive, it still requires user approval. However, this design is highly susceptible to prompt injection attacks. An attacker can employ a generic template to wrap any malicious command and mislead the model into misclassifying it as a 'safe' command, thereby bypassing the user approval requirement and resulting in arbitrary command execution.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: REQUIRED / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 6

Additional Information

Published on: 27/03/2026 15:16:53
Last Modified: 27/03/2026 20:16:28

Sources and References

CRITICAL (9.8)
CVE-2026-30303
The command auto-approval module in Axon Code contains an OS Command Injection vulnerability, rendering its whitelist security mechanism ineffective. The...
Vendor/s:

Full Description

The command auto-approval module in Axon Code contains an OS Command Injection vulnerability, rendering its whitelist security mechanism ineffective. The vulnerability stems from the incorrect use of an incompatible command parser (the Unix-based shell-quote library) to analyze commands on the Windows platform, coupled with a failure to correctly handle Windows CMD-specific escape sequences (^). Attackers can exploit this discrepancy between the parsing logic and the execution environment by constructing payloads such as git log ^" & malicious_command ^". The Axon Code parser is deceived by the escape characters, misinterpreting the malicious command connector (&) as being within a protected string argument and thus auto-approving the command. However, the underlying Windows CMD interpreter ignores the escaped quotes, parsing and executing the subsequent malicious command directly. This allows attackers to achieve arbitrary Remote Code Execution (RCE) after bypassing what appears to be a legitimate Git whitelist check.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9

Additional Information

Published on: 27/03/2026 15:16:52
Last Modified: 27/03/2026 20:16:28

Sources and References

HIGH (8.8)
CVE-2026-27650
OS Command Injection vulnerability exists in BUFFALO Wi-Fi router products. If this vulnerability is exploited, an arbitrary OS command may...
Vendor/s:

Full Description

OS Command Injection vulnerability exists in BUFFALO Wi-Fi router products. If this vulnerability is exploited, an arbitrary OS command may be executed on the products.

CVSS Metrics v3.0

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: REQUIRED / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

Additional Information

Published on: 27/03/2026 06:16:38
Last Modified: 27/03/2026 06:16:38

Sources and References

HIGH (8.8)
CVE-2026-32669
Code injection vulnerability exists in BUFFALO Wi-Fi router products. If this vulnerability is exploited, an arbitrary code may be executed...
Vendor/s:

Full Description

Code injection vulnerability exists in BUFFALO Wi-Fi router products. If this vulnerability is exploited, an arbitrary code may be executed on the products.

CVSS Metrics v3.0

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: REQUIRED / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

Additional Information

Published on: 27/03/2026 06:16:38
Last Modified: 27/03/2026 06:16:38

Sources and References

CRITICAL (9.8)
CVE-2026-22738
In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A...
Vendor/s:

Full Description

In Spring AI, a SpEL injection vulnerability exists in SimpleVectorStore when a user-supplied value is used as a filter expression key. A malicious actor could exploit this to execute arbitrary code. Only applications that use SimpleVectorStore and pass user-supplied input as a filter expression key are affected. This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.9 / 5.9

Additional Information

Published on: 27/03/2026 06:16:37
Last Modified: 27/03/2026 06:16:37

Sources and References

HIGH (8.6)
CVE-2026-22742
Spring AI's spring-ai-bedrock-converse contains a Server-Side Request Forgery (SSRF) vulnerability in BedrockProxyChatModel when processing multimodal messages that include user-supplied media URLs. Insufficient validation...
Vendor/s:

Full Description

Spring AI's spring-ai-bedrock-converse contains a Server-Side Request Forgery (SSRF) vulnerability in BedrockProxyChatModel when processing multimodal messages that include user-supplied media URLs. Insufficient validation of those URLs allows an attacker to induce the server to issue HTTP requests to unintended internal or external destinations. This issue affects Spring AI: from 1.0.0 before 1.0.5, from 1.1.0 before 1.1.4.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: NONE, Avail.: NONE
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
  • Exploitability/Impact Score: 3.9 / 4

Additional Information

Published on: 27/03/2026 06:16:37
Last Modified: 27/03/2026 06:16:37

Sources and References

HIGH (8.8)
CVE-2026-4906
A vulnerability was determined in Tenda AC5 15.03.06.47. The affected element is the function decodePwd of the file /goform/WizardHandle of...
Vendor/s:

Full Description

A vulnerability was determined in Tenda AC5 15.03.06.47. The affected element is the function decodePwd of the file /goform/WizardHandle of the component POST Request Handler. Executing a manipulation of the argument WANT/WANS can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
HIGH (8.8)
CVE-2026-4904
A vulnerability has been found in Tenda AC5 15.03.06.47. This issue affects the function formSetCfm of the file /goform/setcfm of...
Vendor/s:

Full Description

A vulnerability has been found in Tenda AC5 15.03.06.47. This issue affects the function formSetCfm of the file /goform/setcfm of the component POST Request Handler. Such manipulation of the argument funcpara1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
HIGH (8.8)
CVE-2026-4905
A vulnerability was found in Tenda AC5 15.03.06.47. Impacted is the function formWifiWpsOOB of the file /goform/WifiWpsOOB of the component...
Vendor/s:

Full Description

A vulnerability was found in Tenda AC5 15.03.06.47. Impacted is the function formWifiWpsOOB of the file /goform/WifiWpsOOB of the component POST Request Handler. Performing a manipulation of the argument index results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9
HIGH (8.8)
CVE-2026-33898
Incus is a system container and virtual machine manager. Prior to version 6.23.0, the web server spawned by `incus webui`...
Vendor/s:

Full Description

Incus is a system container and virtual machine manager. Prior to version 6.23.0, the web server spawned by `incus webui` incorrectly validates the authentication token such that an invalid value will be accepted. `incus webui` runs a local web server on a random localhost port. For authentication, it provides the user with a URL containing an authentication token. When accessed with that token, Incus creates a cookie persisting that token without needing to include it in subsequent HTTP requests. While the Incus client correctly validates the value of the cookie, it does not correctly validate the token when passed int the URL. This allows for an attacker able to locate and talk to the temporary web server on localhost to have as much access to Incus as the user who ran `incus webui`. This can lead to privilege escalation by another local user or an access to the user's Incus instances and possibly system resources by a remote attack able to trick the local user into interacting with the Incus UI web server. Version 6.23.0 patches the issue.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: REQUIRED / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

Additional Information

Published on: 27/03/2026 00:16:23
Last Modified: 27/03/2026 00:16:23

Sources and References

CRITICAL (9.9)
CVE-2026-33945
Incus is a system container and virtual machine manager. Incus instances have an option to provide credentials to systemd in...
Vendor/s:

Full Description

Incus is a system container and virtual machine manager. Incus instances have an option to provide credentials to systemd in the guest. For containers, this is handled through a shared directory. Prior to version 6.23.0, an attacker can set a configuration key named something like `systemd.credential.../../../../../../root/.bashrc` to cause Incus to write outside of the `credentials` directory associated with the container. This makes use of the fact that the Incus syntax for such credentials is `systemd.credential.XYZ` where `XYZ` can itself contain more periods. While it's not possible to read any data this way, it's possible to write to arbitrary files as root, enabling both privilege escalation and denial of service attacks. Version 6.23.0 fixes the issue.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Exploitability/Impact Score: 3.1 / 6

Additional Information

Published on: 27/03/2026 00:16:23
Last Modified: 27/03/2026 00:16:23

Sources and References

HIGH (8.8)
CVE-2026-27893
vLLM is an inference and serving engine for large language models (LLMs). Starting in version 0.10.1 and prior to version...
Vendor/s:

Full Description

vLLM is an inference and serving engine for large language models (LLMs). Starting in version 0.10.1 and prior to version 0.18.0, two model implementation files hardcode `trust_remote_code=True` when loading sub-components, bypassing the user's explicit `--trust-remote-code=False` security opt-out. This enables remote code execution via malicious model repositories even when the user has explicitly disabled remote code trust. Version 0.18.0 patches the issue.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: REQUIRED / NONE
  • Scope: UNCHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 5.9

Grafana

CRITICAL (9.1)
CVE-2026-27876
A chained attack via SQL Expressions and a Grafana Enterprise plugin can lead to a remote arbitrary code execution impact...
Vendor/s: Grafana

Full Description

A chained attack via SQL Expressions and a Grafana Enterprise plugin can lead to a remote arbitrary code execution impact (RCE). This is enabled by a feature in Grafana (OSS), so all users are always recommended to update to avoid future attack vectors going this path. Only instances with the sqlExpressions feature toggle enabled are vulnerable.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / HIGH
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.3 / 6

Additional Information

Published on: 27/03/2026 15:16:50
Last Modified: 27/03/2026 17:16:27

Sources and References

Google

HIGH (8.7)
CVE-2026-28367
A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending `\r\r\r` as a header block...
Vendor/s: Google, Apache

Full Description

A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending `\r\r\r` as a header block terminator. This can be used for request smuggling with certain proxy servers, such as older versions of Apache Traffic Server and Google Cloud Classic Application Load Balancer, potentially leading to unauthorized access or manipulation of web requests.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: NONE
  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Interaction/Privileges: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
  • Exploitability/Impact Score: 2.2 / 5.8

Additional Information

Published on: 27/03/2026 17:16:27
Last Modified: 27/03/2026 17:16:27

Sources and References

Apache

HIGH (8.7)
CVE-2026-28367
A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending `\r\r\r` as a header block...
Vendor/s: Google, Apache

Full Description

A flaw was found in Undertow. A remote attacker can exploit this vulnerability by sending `\r\r\r` as a header block terminator. This can be used for request smuggling with certain proxy servers, such as older versions of Apache Traffic Server and Google Cloud Classic Application Load Balancer, potentially leading to unauthorized access or manipulation of web requests.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: NONE
  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Interaction/Privileges: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
  • Exploitability/Impact Score: 2.2 / 5.8

Additional Information

Published on: 27/03/2026 17:16:27
Last Modified: 27/03/2026 17:16:27

Sources and References

Aws

HIGH (8.5)
CVE-2026-31943
LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.3, `isPrivateIP()` in `packages/api/src/auth/domain.ts` fails to detect IPv4-mapped IPv6...
Vendor/s: Aws

Full Description

LibreChat is a ChatGPT clone with additional features. Prior to version 0.8.3, `isPrivateIP()` in `packages/api/src/auth/domain.ts` fails to detect IPv4-mapped IPv6 addresses in their hex-normalized form, allowing any authenticated user to bypass SSRF protection and make the server issue HTTP requests to internal network resources — including cloud metadata services (e.g., AWS `169.254.169.254`), loopback, and RFC1918 ranges. Version 0.8.3 fixes the issue.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: LOW, Avail.: NONE
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / LOW
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
  • Exploitability/Impact Score: 3.1 / 4.7

Additional Information

Published on: 27/03/2026 20:16:29
Last Modified: 27/03/2026 20:16:29

Sources and References

Linux

CRITICAL (9.6)
CVE-2026-34205
Home Assistant is open source home automation software that puts local control and privacy first. Home Assistant apps (formerly add-ons)...
Vendor/s: Linux, Docker

Full Description

Home Assistant is open source home automation software that puts local control and privacy first. Home Assistant apps (formerly add-ons) configured with host network mode expose unauthenticated endpoints bound to the internal Docker bridge interface to the local network. On Linux, this configuration does not restrict access to the app as intended, allowing any device on the same network to reach these endpoints without authentication. Home Assistant Supervisor 2026.03.02 addresses the issue.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: ADJACENT_NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 6

Additional Information

Published on: 27/03/2026 20:16:35
Last Modified: 27/03/2026 20:16:35

Sources and References

Docker

CRITICAL (9.6)
CVE-2026-34205
Home Assistant is open source home automation software that puts local control and privacy first. Home Assistant apps (formerly add-ons)...
Vendor/s: Linux, Docker

Full Description

Home Assistant is open source home automation software that puts local control and privacy first. Home Assistant apps (formerly add-ons) configured with host network mode expose unauthenticated endpoints bound to the internal Docker bridge interface to the local network. On Linux, this configuration does not restrict access to the app as intended, allowing any device on the same network to reach these endpoints without authentication. Home Assistant Supervisor 2026.03.02 addresses the issue.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: ADJACENT_NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: NONE / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 6

Additional Information

Published on: 27/03/2026 20:16:35
Last Modified: 27/03/2026 20:16:35

Sources and References

Android

CRITICAL (9.6)
CVE-2026-33976
Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop and 3.3.17 on Android/iOS, a stored XSS in the...
Vendor/s: Android, Ios

Full Description

Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop and 3.3.17 on Android/iOS, a stored XSS in the Web Clipper rendering flow can be escalated to remote code execution in the desktop app. The root cause is that the clipper preserves attacker-controlled attributes from the source page’s root element and stores them inside web-clip HTML. When the clip is later opened, Notesnook renders that HTML into a same-origin, unsandboxed iframe using `contentDocument.write(...)`. Event-handler attributes such as `onload`, `onclick`, or `onmouseover` execute in the Notesnook origin. In the desktop app, this becomes RCE because Electron is configured with `nodeIntegration: true` and `contextIsolation: false`. Version 3.3.11 Web/Desktop and 3.3.17 on Android/iOS patch the issue.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: REQUIRED / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 6

Additional Information

Published on: 27/03/2026 22:16:22
Last Modified: 27/03/2026 22:16:22

Sources and References

Ios

CRITICAL (9.6)
CVE-2026-33976
Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop and 3.3.17 on Android/iOS, a stored XSS in the...
Vendor/s: Android, Ios

Full Description

Notesnook is a note-taking app. Prior to version 3.3.11 on Web/Desktop and 3.3.17 on Android/iOS, a stored XSS in the Web Clipper rendering flow can be escalated to remote code execution in the desktop app. The root cause is that the clipper preserves attacker-controlled attributes from the source page’s root element and stores them inside web-clip HTML. When the clip is later opened, Notesnook renders that HTML into a same-origin, unsandboxed iframe using `contentDocument.write(...)`. Event-handler attributes such as `onload`, `onclick`, or `onmouseover` execute in the Notesnook origin. In the desktop app, this becomes RCE because Electron is configured with `nodeIntegration: true` and `contextIsolation: false`. Version 3.3.11 Web/Desktop and 3.3.17 on Android/iOS patch the issue.

CVSS Metrics v3.1

  • Impact: Confid.: HIGH, Integ.: HIGH, Avail.: HIGH
  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Interaction/Privileges: REQUIRED / NONE
  • Scope: CHANGED
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Exploitability/Impact Score: 2.8 / 6

Additional Information

Published on: 27/03/2026 22:16:22
Last Modified: 27/03/2026 22:16:22

Sources and References