{
"Source": "CVE FEED",
"Title": "CVE-2026-2800 - Spoofing issue in the WebAuthn component in Firefox for Android",
"Content": "CVE ID : CVE-2026-2800
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Spoofing issue in the WebAuthn component in Firefox for Android. This vulnerability affects Firefox < 148.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-2800 - Spoofing issue in the WebAuthn component in Firefox for Android",
"Content": "CVE ID : CVE-2026-2800
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Spoofing issue in the WebAuthn component in Firefox for Android. This vulnerability affects Firefox < 148.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-2801 - Incorrect boundary conditions in the JavaScript: WebAssembly component",
"Content": "CVE ID : CVE-2026-2801
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-2801 - Incorrect boundary conditions in the JavaScript: WebAssembly component",
"Content": "CVE ID : CVE-2026-2801
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-2802 - Race condition in the JavaScript: GC component",
"Content": "CVE ID : CVE-2026-2802
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Race condition in the JavaScript: GC component. This vulnerability affects Firefox < 148.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-2802 - Race condition in the JavaScript: GC component",
"Content": "CVE ID : CVE-2026-2802
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Race condition in the JavaScript: GC component. This vulnerability affects Firefox < 148.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-2803 - Information disclosure, mitigation bypass in the Settings UI component",
"Content": "CVE ID : CVE-2026-2803
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Information disclosure, mitigation bypass in the Settings UI component. This vulnerability affects Firefox < 148.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-2803 - Information disclosure, mitigation bypass in the Settings UI component",
"Content": "CVE ID : CVE-2026-2803
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Information disclosure, mitigation bypass in the Settings UI component. This vulnerability affects Firefox < 148.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-2804 - Use-after-free in the JavaScript: WebAssembly component",
"Content": "CVE ID : CVE-2026-2804
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-2804 - Use-after-free in the JavaScript: WebAssembly component",
"Content": "CVE ID : CVE-2026-2804
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 148.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-2795 - Use-after-free in the JavaScript: GC component",
"Content": "CVE ID : CVE-2026-2795
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-2795 - Use-after-free in the JavaScript: GC component",
"Content": "CVE ID : CVE-2026-2795
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-2787 - Use-after-free in the DOM: Window and Location component",
"Content": "CVE ID : CVE-2026-2787
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Use-after-free in the DOM: Window and Location component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-2787 - Use-after-free in the DOM: Window and Location component",
"Content": "CVE ID : CVE-2026-2787
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Use-after-free in the DOM: Window and Location component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-2786 - Use-after-free in the JavaScript Engine component",
"Content": "CVE ID : CVE-2026-2786
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-2786 - Use-after-free in the JavaScript Engine component",
"Content": "CVE ID : CVE-2026-2786
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-2789 - Use-after-free in the Graphics: ImageLib component",
"Content": "CVE ID : CVE-2026-2789
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Use-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-2789 - Use-after-free in the Graphics: ImageLib component",
"Content": "CVE ID : CVE-2026-2789
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Use-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-2788 - Incorrect boundary conditions in the Audio/Video: GMP component",
"Content": "CVE ID : CVE-2026-2788
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-2788 - Incorrect boundary conditions in the Audio/Video: GMP component",
"Content": "CVE ID : CVE-2026-2788
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-2790 - Same-origin policy bypass in the Networking: JAR component",
"Content": "CVE ID : CVE-2026-2790
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-2790 - Same-origin policy bypass in the Networking: JAR component",
"Content": "CVE ID : CVE-2026-2790
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-2791 - Mitigation bypass in the Networking: Cache component",
"Content": "CVE ID : CVE-2026-2791
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-2791 - Mitigation bypass in the Networking: Cache component",
"Content": "CVE ID : CVE-2026-2791
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-2792 - Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148",
"Content": "CVE ID : CVE-2026-2792
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-2792 - Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148",
"Content": "CVE ID : CVE-2026-2792
Published : Feb. 24, 2026, 2:16 p.m. | 14 minutes ago
Description : Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 148 and Firefox ESR < 140.8.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-27521 - Binardat 10G08-0800GSM Network Switch Missing Login Rate Limiting",
"Content": "CVE ID : CVE-2026-27521
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior do not implement rate limiting or account lockout on failed login attempts, enabling brute-force attacks against user credentials.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-27521 - Binardat 10G08-0800GSM Network Switch Missing Login Rate Limiting",
"Content": "CVE ID : CVE-2026-27521
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior do not implement rate limiting or account lockout on failed login attempts, enabling brute-force attacks against user credentials.
Severity: 6.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-27520 - Binardat 10G08-0800GSM Network Switch Base64-encoded Password Stored in Cookie",
"Content": "CVE ID : CVE-2026-27520
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 store a user password in a client-side cookie as a Base64-encoded value accessible via the web interface. Because Base64 is reversible and provides no confidentiality, an attacker who can access the cookie value can recover the plaintext password.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-27520 - Binardat 10G08-0800GSM Network Switch Base64-encoded Password Stored in Cookie",
"Content": "CVE ID : CVE-2026-27520
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 store a user password in a client-side cookie as a Base64-encoded value accessible via the web interface. Because Base64 is reversible and provides no confidentiality, an attacker who can access the cookie value can recover the plaintext password.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-27516 - Binardat 10G08-0800GSM Network Switch Plaintext Password Exposure",
"Content": "CVE ID : CVE-2026-27516
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior expose user passwords in plaintext within the administrative interface and HTTP responses, allowing recovery of valid credentials.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-27516 - Binardat 10G08-0800GSM Network Switch Plaintext Password Exposure",
"Content": "CVE ID : CVE-2026-27516
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior expose user passwords in plaintext within the administrative interface and HTTP responses, allowing recovery of valid credentials.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-27517 - Binardat 10G08-0800GSM Network Switch XSS",
"Content": "CVE ID : CVE-2026-27517
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior reflect unsanitized user input in the web interface, allowing an attacker to inject and execute arbitrary JavaScript in the context of an authenticated user.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-27517 - Binardat 10G08-0800GSM Network Switch XSS",
"Content": "CVE ID : CVE-2026-27517
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior reflect unsanitized user input in the web interface, allowing an attacker to inject and execute arbitrary JavaScript in the context of an authenticated user.
Severity: 5.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-27518 - Binardat 10G08-0800GSM Network Switch CSRF",
"Content": "CVE ID : CVE-2026-27518
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior lack CSRF protections for state-changing actions in the administrative interface. An attacker can trick an authenticated administrator into performing unauthorized configuration changes.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-27518 - Binardat 10G08-0800GSM Network Switch CSRF",
"Content": "CVE ID : CVE-2026-27518
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior lack CSRF protections for state-changing actions in the administrative interface. An attacker can trick an authenticated administrator into performing unauthorized configuration changes.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-27519 - Binardat 10G08-0800GSM Network Switch Hard-coded RC4 Encryption Key",
"Content": "CVE ID : CVE-2026-27519
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior use RC4 with a hard-coded key embedded in client-side JavaScript. Because the key is static and exposed, an attacker can decrypt protected values and defeat confidentiality protections.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-27519 - Binardat 10G08-0800GSM Network Switch Hard-coded RC4 Encryption Key",
"Content": "CVE ID : CVE-2026-27519
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior use RC4 with a hard-coded key embedded in client-side JavaScript. Because the key is static and exposed, an attacker can decrypt protected values and defeat confidentiality protections.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-23678 - Binardat 10G08-0800GSM Network Switch Traceroute CLI Command Injection",
"Content": "CVE ID : CVE-2026-23678
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain a command injection vulnerability in the traceroute diagnostic function of the affected device web management interface. By injecting the %1a character into the hostname parameter, an authenticated attacker with access to the web interface can execute arbitrary CLI commands on the device.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-23678 - Binardat 10G08-0800GSM Network Switch Traceroute CLI Command Injection",
"Content": "CVE ID : CVE-2026-23678
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain a command injection vulnerability in the traceroute diagnostic function of the affected device web management interface. By injecting the %1a character into the hostname parameter, an authenticated attacker with access to the web interface can execute arbitrary CLI commands on the device.
Severity: 8.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-27507 - Binardat 10G08-0800GSM Network Switch Hard-coded Credentials",
"Content": "CVE ID : CVE-2026-27507
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain hard-coded administrative credentials that cannot be changed by users. Knowledge of these credentials allows full administrative access to the device.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
"Source": "CVE FEED",
"Title": "CVE-2026-27507 - Binardat 10G08-0800GSM Network Switch Hard-coded Credentials",
"Content": "CVE ID : CVE-2026-27507
Published : Feb. 24, 2026, 4:24 p.m. | 7 minutes ago
Description : Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain hard-coded administrative credentials that cannot be changed by users. Knowledge of these credentials allows full administrative access to the device.
Severity: 9.8 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Feb 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹