CVE tracker
279 subscribers
3.78K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-26993 - Flare has XSS vulnerability in Raw File Preview

CVE ID : CVE-2026-26993
Published : Feb. 20, 2026, 3:16 a.m. | 1 hour, 11 minutes ago
Description : Flare is a Next.js-based, self-hostable file sharing platform that integrates with screenshot tools. Versions 1.7.0 and below allow users to upload files without proper content validation or sanitization. By embedding malicious JavaScript within an SVG (or other active content formats such as HTML or XML), an attacker can achieve script execution in the context of the application's origin when a victim views the file in “raw” mode. This results in a stored Cross-Site Scripting (XSS) vulnerability that can be exploited to exfiltrate user data. This issue has been fixed in version 1.7.1.
Severity: 4.6 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26994 - uTLS ServerHellos are accepted without checking TLS 1.3 downgrade canaries

CVE ID : CVE-2026-26994
Published : Feb. 20, 2026, 3:16 a.m. | 1 hour, 11 minutes ago
Description : uTLS is a fork of crypto/tls, created to customize ClientHello for fingerprinting resistance while still using it for the handshake. In versions 1.6.7 and below, uTLS did not implement the TLS 1.3 downgrade protection mechanism specified in RFC 8446 Section 4.1.3 when using a uTLS ClientHello spec. This allowed an active network adversary to downgrade TLS 1.3 connections initiated by a uTLS client to a lower TLS version (e.g., TLS 1.2) by modifying the ClientHello message to exclude the SupportedVersions extension, causing the server to respond with a TLS 1.2 ServerHello (along with a downgrade canary in the ServerHello random field). Because uTLS did not check the downgrade canary in the ServerHello random field, clients would accept the downgraded connection without detecting the attack. This attack could also be used by an active network attacker to fingerprint uTLS connections. This issue has been fixed in version 1.7.0.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26995 - Apache Log4j Remote Code Execution Vulnerability

CVE ID : CVE-2026-26995
Published : Feb. 20, 2026, 3:16 a.m. | 1 hour, 11 minutes ago
Description : Rejected reason: Further research determined the issue is an external dependency vulnerability.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26996 - minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern

CVE ID : CVE-2026-26996
Published : Feb. 20, 2026, 3:16 a.m. | 1 hour, 11 minutes ago
Description : minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27017 - uTLS has a Chrome Parrot Fingerprint Vulnerability due to GREASE ECH Cipher Suite Mismatch

CVE ID : CVE-2026-27017
Published : Feb. 20, 2026, 3:16 a.m. | 1 hour, 11 minutes ago
Description : uTLS is a fork of crypto/tls, created to customize ClientHello for fingerprinting resistance while still using it for the handshake. Versions 1.6.0 through 1.8.0 contain a fingerprint mismatch with Chrome when using GREASE ECH, related to cipher suite selection. When Chrome selects the preferred cipher suite in the outer ClientHello and for ECH, it does so consistently based on hardware support—for example, if it prefers AES for the outer cipher suite, it also uses AES for ECH. However, the Chrome parrot in uTLS hardcodes AES preference for outer cipher suites but selects the ECH cipher suite randomly between AES and ChaCha20. This creates a 50% chance of selecting ChaCha20 for ECH while using AES for the outer cipher suite, a combination impossible in Chrome. This issue only affects GREASE ECH; in real ECH, Chrome selects the first valid cipher suite when AES is preferred, which uTLS handles correctly. This issue has been fixed in version 1.8.1.
Severity: 2.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2384 - Quiz Maker <= 6.7.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode

CVE ID : CVE-2026-2384
Published : Feb. 20, 2026, 3:16 a.m. | 1 hour, 11 minutes ago
Description : The Quiz Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `vc_quizmaker` shortcode in all versions up to, and including, 6.7.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: This vulnerability requires WPBakery Page Builder to be installed and active
Severity: 6.4 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2821 - Fujian Smart Integrated Management Platform System XCamera.ashx sql injection

CVE ID : CVE-2026-2821
Published : Feb. 20, 2026, 3:16 a.m. | 1 hour, 11 minutes ago
Description : A weakness has been identified in Fujian Smart Integrated Management Platform System up to 7.5. Impacted is an unknown function of the file /Module/CRXT/Controller/XCamera.ashx. This manipulation of the argument ChannelName causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
Severity: 7.5 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27317 - Cisco Webex Vulnerability in Handling of Shared Files

CVE ID : CVE-2026-27317
Published : Feb. 20, 2026, 4:15 a.m. | 4 hours, 13 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27318 - Apache HTTP Server Unvalidated User Input

CVE ID : CVE-2026-27318
Published : Feb. 20, 2026, 4:15 a.m. | 4 hours, 13 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27319 - Apache HTTP Server Cross-Site Request Forgery

CVE ID : CVE-2026-27319
Published : Feb. 20, 2026, 4:15 a.m. | 4 hours, 13 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27320 - Apache Struts Code Injection Vulnerability

CVE ID : CVE-2026-27320
Published : Feb. 20, 2026, 4:15 a.m. | 4 hours, 13 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27321 - Cisco Wireless Access Point Authentication Bypass

CVE ID : CVE-2026-27321
Published : Feb. 20, 2026, 4:15 a.m. | 4 hours, 13 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27322 - Apache Struts Deserialization Vulnerability

CVE ID : CVE-2026-27322
Published : Feb. 20, 2026, 4:15 a.m. | 4 hours, 13 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27323 - Apache HTTP Server Cross-Site Request Forgery

CVE ID : CVE-2026-27323
Published : Feb. 20, 2026, 4:15 a.m. | 4 hours, 13 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27324 - Apache HTTP Server Authentication Bypass

CVE ID : CVE-2026-27324
Published : Feb. 20, 2026, 4:15 a.m. | 4 hours, 13 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27325 - Apache HTTP Server Cross-Site Request Forgery

CVE ID : CVE-2026-27325
Published : Feb. 20, 2026, 4:15 a.m. | 4 hours, 13 minutes ago
Description : Rejected reason: Not used
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2739 - Bouncy Castle BN JavaScript Infinite Loop Vulnerability

CVE ID : CVE-2026-2739
Published : Feb. 20, 2026, 5:17 a.m. | 3 hours, 11 minutes ago
Description : This affects versions of the package bn.js before 5.2.3. Calling maskn(0) on any BN instance corrupts the internal state, causing toString(), divmod(), and other methods to enter an infinite loop, hanging the process indefinitely.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2822 - JeecgBoot Backend airag_app,1,create_by sql injection

CVE ID : CVE-2026-2822
Published : Feb. 20, 2026, 5:17 a.m. | 3 hours, 11 minutes ago
Description : A security vulnerability has been detected in JeecgBoot up to 3.9.1. The affected element is an unknown function of the file /jeecgboot/sys/dict/loadDict/airag_app,1,create_by of the component Backend Interface. Such manipulation of the argument keyword leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2823 - Comfast CF-E7 webmggnt mbox-config sub_41ACCC command injection

CVE ID : CVE-2026-2823
Published : Feb. 20, 2026, 5:17 a.m. | 3 hours, 11 minutes ago
Description : A vulnerability was detected in Comfast CF-E7 2.6.0.9. The impacted element is the function sub_41ACCC of the file /cgi-bin/mbox-config?method=SET§ion=ntp_timezone of the component webmggnt. Performing a manipulation of the argument timestr results in command injection. The attack is possible to be carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2824 - Comfast CF-E7 webmggnt mbox-config sub_441CF4 command injection

CVE ID : CVE-2026-2824
Published : Feb. 20, 2026, 6:17 a.m. | 2 hours, 12 minutes ago
Description : A flaw has been found in Comfast CF-E7 2.6.0.9. This affects the function sub_441CF4 of the file /cgi-bin/mbox-config?method=SET§ion=ping_config of the component webmggnt. Executing a manipulation of the argument destination can lead to command injection. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2825 - rachelos WeRSS we-mp-rss Article fix.py fix_html cross site scripting

CVE ID : CVE-2026-2825
Published : Feb. 20, 2026, 7:16 a.m. | 1 hour, 13 minutes ago
Description : A vulnerability has been found in rachelos WeRSS we-mp-rss up to 1.4.8. This impacts the function fix_html of the file tools/fix.py of the component Article Module. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...