24h | 7d | 30d

Overview

  • wpeverest
  • User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder

03 Mar 2026
Published
03 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.07%

KEV

Description

The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to improper privilege management in all versions up to, and including, 5.1.2. This is due to the plugin accepting a user-supplied role during membership registration without properly enforcing a server-side allowlist. This makes it possible for unauthenticated attackers to create administrator accounts by supplying a role value during membership registration.

Statistics

  • 4 Posts

Last activity: 6 hours ago

Fediverse

Profile picture fallback

Hackers are exploiting a WordPress plugin flaw (CVE-2026-1492) that lets attackers create admin accounts without authentication on

If you run WordPress, update or disable the plugin immediately.

bleepingcomputer.com/news/secu

  • 0
  • 0
  • 1
  • 6h ago

Bluesky

Profile picture fallback
🛑 WordPress – CVE-2026-1492 : une faille dans un plugin permet de devenir admin très facilement 👇 Tous les détails - www.it-connect.fr/wordpress-cv... #WordPress #Web #infosec #cybersecurity
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • VMware
  • Aria Operations
  • vmware-aria-operations

25 Feb 2026
Published
04 Mar 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
7.35%

Description

VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.  To remediate CVE-2026-22719, apply the patches listed in the 'Fixed Version' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001  Workarounds for CVE-2026-22719 are documented in the 'Workarounds' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 7 hours ago

Bluesky

Profile picture fallback
CISA added CVE-2026-22719 to KEV after active exploitation of VMware Aria Operations (incl. Cloud Foundation & vSphere Foundation). Patch immediately. Query: web.html~"com.vmware.vsphere.client" OR web.title~"VMware Cloud Director Availability" OR web.title~"VMware Aria Operations"
  • 0
  • 1
  • 0
  • 10h ago
Profile picture fallback
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • WWBN
  • AVideo-Encoder

06 Mar 2026
Published
06 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.10%

KEV

Description

AVideo is a video-sharing Platform software. Prior to version 7.0, an unauthenticated attacker can execute arbitrary OS commands on the server by injecting shell command substitution into the base64Url GET parameter. This can lead to full server compromise, data exfiltration (e.g., configuration secrets, internal keys, credentials), and service disruption. This issue has been patched in version 7.0.

Statistics

  • 2 Posts

Last activity: 12 hours ago

Fediverse

Profile picture fallback

⚠️ CRITICAL OS command injection in WWBN AVideo-Encoder < 7.0 (CVE-2026-29058). Unauthenticated attackers can execute arbitrary commands, risking full server takeover. Patch to v7.0 ASAP! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 17h ago

Bluesky

Profile picture fallback
CVE-2026-29058: The Zero-Click AVideo Hack That Lets Attackers Run Wild on Your Streaming Servers + Video Introduction: In the high-stakes world of streaming infrastructure, a newly disclosed zero-click vulnerability (CVE-2026-29058) is sending ripples through the cybersecurity community. This…
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Cisco
  • Cisco Catalyst SD-WAN Manager

25 Feb 2026
Published
06 Mar 2026
Updated

CVSS v3.1
MEDIUM (5.4)
EPSS
0.04%

KEV

Description

A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system. This vulnerability is due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system&nbsp;and gain vmanage user privileges.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 6 hours ago

Bluesky

Profile picture fallback
Cisco has confirmed active exploitation targeting two vulnerabilities in Cisco Catalyst SD-WAN Manager (formerly vManage), tracked as CVE-2026-20122 and CVE-2026-20128. socradar.io/blog/cisco-c...
  • 0
  • 1
  • 0
  • 10h ago
Profile picture fallback
Cisco Catalyst SD-WANの脆弱性、さらに2件の悪用が明らかに:CVE-2026-20128、CVE-2026-20122 | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/44386/
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
Cisco advierte sobre la explotación de SD-WAN Manager y corrige 48 vulnerabilidades de firewall. Los hackers ya están explotando activamente dos fallos críticos (CVE-2026-20128 y CVE-2026-20122). Si usas equipos Cisco, ¡parcha ahora antes de que sea tarde! www.linkedin.com/pulse/cisco-...
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Cisco
  • Cisco Catalyst SD-WAN Manager

25 Feb 2026
Published
06 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.02%

KEV

Description

A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA user privileges on an affected system. To exploit this vulnerability, the attacker must have valid&nbsp;vmanage credentials on the affected system. This vulnerability is due to the presence of a credential file for the DCA user on an affected system. An attacker could exploit this vulnerability by accessing the filesystem as a low-privileged user and reading the file that contains the DCA password from that affected system. A successful exploit could allow the attacker to access another affected system and gain DCA user privileges. Note: Cisco Catalyst SD-WAN Manager releases 20.18 and later are not affected by this vulnerability.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 6 hours ago

Bluesky

Profile picture fallback
Cisco has confirmed active exploitation targeting two vulnerabilities in Cisco Catalyst SD-WAN Manager (formerly vManage), tracked as CVE-2026-20122 and CVE-2026-20128. socradar.io/blog/cisco-c...
  • 0
  • 1
  • 0
  • 10h ago
Profile picture fallback
Cisco Catalyst SD-WANの脆弱性、さらに2件の悪用が明らかに:CVE-2026-20128、CVE-2026-20122 | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/44386/
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
Cisco advierte sobre la explotación de SD-WAN Manager y corrige 48 vulnerabilidades de firewall. Los hackers ya están explotando activamente dos fallos críticos (CVE-2026-20128 y CVE-2026-20122). Si usas equipos Cisco, ¡parcha ahora antes de que sea tarde! www.linkedin.com/pulse/cisco-...
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • pac4j
  • pac4j-jwt

04 Mar 2026
Published
05 Mar 2026
Updated

CVSS v4.0
CRITICAL (10.0)
EPSS
0.24%

KEV

Description

pac4j-jwt versions prior to 4.5.9, 5.7.9, and 6.3.3 contain an authentication bypass vulnerability in JwtAuthenticator when processing encrypted JWTs that allows remote attackers to forge authentication tokens. Attackers who possess the server's RSA public key can create a JWE-wrapped PlainJWT with arbitrary subject and role claims, bypassing signature verification to authenticate as any user including administrators.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 3 hours ago

Bluesky

Profile picture fallback
CVE-2026-29000: Critical Auth Bypass in pac4j-jwt: Full PoC Using Only a Public Key
  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback
The latest update for #ArcticWolf includes "CVE-2026-29000: Authentication Bypass in pac4j-jwt #Java Library" and "CVE-2026-20079 & CVE-2026-20131: Maximum-severity Vulnerabilities in Cisco FMC". #cybersecurity #infosec #networks https://opsmtrs.com/2ZFbaTl
  • 1
  • 1
  • 0
  • 3h ago

Overview

  • Google
  • Chrome

04 Mar 2026
Published
05 Mar 2026
Updated

CVSS
Pending
EPSS
0.07%

KEV

Description

Integer overflow in ANGLE in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Critical)

Statistics

  • 2 Posts

Last activity: 13 hours ago

Bluesky

Profile picture fallback
Heads up, #Debian self-hosters and sysadmins. DSA-6157-1 is out for Chromium, addressing CVE-2026-3536 (arbitrary code execution) and friends. Read more: 👉 tinyurl.com/4hrbcfek #Security
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
Google、Chromeの致命的な脆弱性3件を含む脆弱性 10件を修正(CVE-2026-3536,CVE-2026-3537,CVE-2026-3538) rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • zed-industries
  • zed

25 Feb 2026
Published
27 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.05%

KEV

Description

Zed, a code editor, has an extension installer allows tar/gzip downloads. Prior to version 0.224.4, the tar extractor (`async_tar::Archive::unpack`) creates symlinks from the archive without validation, and the path guard (`writeable_path_from_extension`) only performs lexical prefix checks without resolving symlinks. An attacker can ship a tar that first creates a symlink inside the extension workdir pointing outside (e.g., `escape -> /`), then writes files through the symlink, causing writes to arbitrary host paths. This escapes the extension sandbox and enables code execution. Version 0.224.4 patches the issue.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 11 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-27976 - Zed, a code editor, has an extension installer allows tar/gzip downloads. Prior to version 0.224.4, the tar extractor (`async_tar::Archive::unpack`) c... https://www.cyberhub.blog/cves/CVE-2026-27976
  • 0
  • 2
  • 0
  • 11h ago

Overview

  • n8n-io
  • n8n

04 Feb 2026
Published
05 Feb 2026
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
0.02%

KEV

Description

n8n is an open source workflow automation platform. Prior to versions 1.123.10 and 2.5.0, vulnerabilities in the Git node allowed authenticated users with permission to create or modify workflows to execute arbitrary system commands or read arbitrary files on the n8n host. This issue has been patched in versions 1.123.10 and 2.5.0.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 8 hours ago

Bluesky

Profile picture fallback
Critical 0-Day in n8n (CVE-2026-25053): How a Simple Bypass Led to Full RCE – Full Technical Breakdown + Video Introduction n8n is a popular open‑source workflow automation tool that allows users to connect apps and services using a visual interface. Its flexibility, however, comes with a…
  • 0
  • 2
  • 0
  • 8h ago

Overview

  • gogs
  • gogs

05 Mar 2026
Published
06 Mar 2026
Updated

CVSS v3.1
HIGH (8.7)
EPSS
0.03%

KEV

Description

Gogs is an open source self-hosted Git service. Prior to version 0.14.2, a stored cross-site scripting (XSS) vulnerability exists in the comment and issue description functionality. The application's HTML sanitizer explicitly allows data: URI schemes, enabling authenticated users to inject arbitrary JavaScript execution via malicious links. This issue has been patched in version 0.14.2.

Statistics

  • 1 Post

Last activity: 9 hours ago

Bluesky

Profile picture fallback
📌 CVE-2026-26022 - Gogs is an open source self-hosted Git service. Prior to version 0.14.2, a stored cross-site scripting (XSS) vulnerability exists in the comment and i... https://www.cyberhub.blog/cves/CVE-2026-26022
  • 0
  • 0
  • 0
  • 9h ago
Showing 1 to 10 of 99 CVEs