CVE Monitor
3.34K subscribers
31.8K links
Download Telegram
{
"Source": "CVE FEED",
"Title": "CVE-2026-24152 - NVIDIA Megatron-LM Remote Code Execution Vulnerability",
"Content": "CVE ID :CVE-2026-24152
Published : March 24, 2026, 9:16 p.m. | 1 hour, 4 minutes ago
Description :NVIDIA Megatron-LM contains a vulnerability in checkpoint loading where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-24157 - NVIDIA NeMo Framework Remote Code Execution Vulnerability",
"Content": "CVE ID :CVE-2026-24157
Published : March 24, 2026, 9:16 p.m. | 1 hour, 4 minutes ago
Description :NVIDIA NeMo Framework contains a vulnerability in checkpoint loading where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure and data tampering.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-24158 - NVIDIA Triton Inference Server HTTP Compressed Payload Denial of Service",
"Content": "CVE ID :CVE-2026-24158
Published : March 24, 2026, 9:16 p.m. | 1 hour, 4 minutes ago
Description :NVIDIA Triton Inference Server contains a vulnerability in the HTTP endpoint where an attacker may cause a denial of service by providing a large compressed payload. A successful exploit of this vulnerability may lead to denial of service.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-24141 - NVIDIA Model Optimizer ONNX Deserialization Code Execution Vulnerability",
"Content": "CVE ID :CVE-2026-24141
Published : March 24, 2026, 9:16 p.m. | 1 hour, 4 minutes ago
Description :NVIDIA Model Optimizer for Windows and Linux contains a vulnerability in the ONNX quantization feature, where a user could cause unsafe deserialization by providing a specially crafted input file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, and information disclosure.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-21790 - HCL Traveler is susceptible to a weak default HTTP header validation vulnerability",
"Content": "CVE ID :CVE-2026-21790
Published : March 24, 2026, 9:16 p.m. | 1 hour, 4 minutes ago
Description :HCL Traveler is susceptible to a weak default HTTP header validation vulnerability, which could allow an attacker to bypass additional authentication checks.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-33238 - NVIDIA Triton Inference Server Sagemaker HTTP Server Denial of Service Vulnerability",
"Content": "CVE ID :CVE-2025-33238
Published : March 24, 2026, 9:16 p.m. | 1 hour, 4 minutes ago
Description :NVIDIA Triton Inference Server Sagemaker HTTP server contains a vulnerability where an attacker may cause an exception. A successful exploit of this vulnerability may lead to denial of service.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-33242 - NVIDIA B300 MCU CX8 MCU Registry Modification Vulnerability",
"Content": "CVE ID :CVE-2025-33242
Published : March 24, 2026, 9:16 p.m. | 1 hour, 4 minutes ago
Description :NVIDIA B300 MCU contains a vulnerability in the CX8 MCU that could allow a malicious actor to modify unsupported registries, causing a bad state. A successful exploit of this vulnerability might lead to denial of service and data tampering.
Severity: 5.9 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-33244 - NVIDIA APEX Deserialization Vulnerability",
"Content": "CVE ID :CVE-2025-33244
Published : March 24, 2026, 9:16 p.m. | 1 hour, 4 minutes ago
Description :NVIDIA APEX for Linux contains a vulnerability where an unauthorized attacker could cause a deserialization of untrusted data. This vulnerability affects environments that use PyTorch versions earlier than 2.6. A successful exploit of this vulnerability might lead to code execution, denial of service, escalation of privileges, data tampering, and information disclosure.
Severity: 9.0 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-33247 - NVIDIA Megatron LM Remote Code Execution Vulnerability",
"Content": "CVE ID :CVE-2025-33247
Published : March 24, 2026, 9:16 p.m. | 1 hour, 4 minutes ago
Description :NVIDIA Megatron LM contains a vulnerability in quantization configuration loading, which could allow remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-33248 - NVIDIA Megatron-LM Remote Code Execution Vulnerability",
"Content": "CVE ID :CVE-2025-33248
Published : March 24, 2026, 9:16 p.m. | 1 hour, 4 minutes ago
Description :NVIDIA Megatron-LM contains a vulnerability in the hybrid conversion script where an Attacker may cause an RCE by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering.
Severity: 7.8 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2025-33254 - NVIDIA Triton Inference Server State Corruption Denial of Service Vulnerability",
"Content": "CVE ID :CVE-2025-33254
Published : March 24, 2026, 9:16 p.m. | 1 hour, 4 minutes ago
Description :NVIDIA Triton Inference Server contains a vulnerability where an attacker may cause internal state corruption. A successful exploit of this vulnerability may lead to a denial of service.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "24 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-4779 - SourceCodester Sales and Inventory System HTTP GET Parameter update_customer_details.php sql injection",
"Content": "CVE ID :CVE-2026-4779
Published : March 24, 2026, 11:17 p.m. | 1 hour, 3 minutes ago
Description :A security vulnerability has been detected in SourceCodester Sales and Inventory System 1.0. This issue affects some unknown processing of the file update_customer_details.php of the component HTTP GET Parameter Handler. Such manipulation of the argument sid leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-4778 - SourceCodester Sales and Inventory System HTTP GET Parameter update_category.php sql injection",
"Content": "CVE ID :CVE-2026-4778
Published : March 24, 2026, 11:17 p.m. | 1 hour, 3 minutes ago
Description :A weakness has been identified in SourceCodester Sales and Inventory System 1.0. This vulnerability affects unknown code of the file update_category.php of the component HTTP GET Parameter Handler. This manipulation of the argument sid causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-4781 - SourceCodester Sales and Inventory System HTTP GET Parameter update_purchase.php sql injection",
"Content": "CVE ID :CVE-2026-4781
Published : March 24, 2026, 11:11 p.m. | 1 hour, 9 minutes ago
Description :A flaw has been found in SourceCodester Sales and Inventory System 1.0. The affected element is an unknown function of the file update_purchase.php of the component HTTP GET Parameter Handler. Executing a manipulation of the argument sid can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-4780 - SourceCodester Sales and Inventory System HTTP GET Parameter update_out_standing.php sql injection",
"Content": "CVE ID :CVE-2026-4780
Published : March 24, 2026, 11:11 p.m. | 1 hour, 9 minutes ago
Description :A vulnerability was detected in SourceCodester Sales and Inventory System 1.0. Impacted is an unknown function of the file update_out_standing.php of the component HTTP GET Parameter Handler. Performing a manipulation of the argument sid results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-4766 - Easy Image Gallery <= 1.5.3 - authenticated (contributor+) stored cross-site scripting via gallery shortcode post meta",
"Content": "CVE ID :CVE-2026-4766
Published : March 25, 2026, 1:25 a.m. | 56 minutes ago
Description :The Easy Image Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Gallery shortcode post meta field in all versions up to, and including, 1.5.3. This is due to insufficient input sanitization and output escaping on user-supplied gallery shortcode values. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-4783 - itsourcecode College Management System Parameter add-single-student-results.php sql injection",
"Content": "CVE ID :CVE-2026-4783
Published : March 25, 2026, 1:17 a.m. | 1 hour, 3 minutes ago
Description :A vulnerability has been found in itsourcecode College Management System 1.0. The impacted element is an unknown function of the file /admin/add-single-student-results.php of the component Parameter Handler. The manipulation of the argument course_code leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-28888 - "macOS Root Privilege Escalation Vulnerability"",
"Content": "CVE ID :CVE-2026-28888
Published : March 25, 2026, 1:17 a.m. | 1 hour, 3 minutes ago
Description :A race condition was addressed with improved state handling. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to gain root privileges.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-28889 - Apple Xcode Root File Read Vulnerability",
"Content": "CVE ID :CVE-2026-28889
Published : March 25, 2026, 1:17 a.m. | 1 hour, 3 minutes ago
Description :A permissions issue was addressed with additional restrictions. This issue is fixed in Xcode 26.4. An app may be able to read arbitrary files as root.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-28890 - Apple Xcode Out-of-Bounds Read Vulnerability",
"Content": "CVE ID :CVE-2026-28890
Published : March 25, 2026, 1:17 a.m. | 1 hour, 3 minutes ago
Description :An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in Xcode 26.4. An app may be able to cause unexpected system termination.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹
{
"Source": "CVE FEED",
"Title": "CVE-2026-28891 - Apple macOS Sandbox Escalation",
"Content": "CVE ID :CVE-2026-28891
Published : March 25, 2026, 1:17 a.m. | 1 hour, 3 minutes ago
Description :A race condition was addressed with additional validation. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to break out of its sandbox.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...",
"Detection Date": "25 Mar 2026",
"Type": "Vulnerability"
}
🔹 t.me/cvedetector 🔹