CVE tracker
278 subscribers
3.6K links
News monitoring: @irnewsagency

Main channel: @orgsecuritygate

Site: SecurityGate.org
Download Telegram
CVE-2026-21420 - Dell Repository Manager Uncontrolled Search Path Element Remote Code Execution Vulnerability

CVE ID : CVE-2026-21420
Published : Feb. 23, 2026, 2:16 p.m. | 44 minutes ago
Description : Dell Repository Manager (DRM), versions prior to 3.4.8, contains an Uncontrolled Search Path Element vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary code execution and escalation of privileges.
Severity: 7.3 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-3015 - UTT HiPER 810G formPolicyRouteConf strcpy buffer overflow

CVE ID : CVE-2026-3015
Published : Feb. 23, 2026, 2:32 p.m. | 28 minutes ago
Description : A vulnerability was determined in UTT HiPER 810G up to 1.7.7-171114. Impacted is the function strcpy of the file /goform/formPolicyRouteConf. Executing a manipulation of the argument GroupName can lead to buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-14905 - 389-ds-base: 389-ds-base: remote code execution and denial of service via heap buffer overflow

CVE ID : CVE-2025-14905
Published : Feb. 23, 2026, 4:29 p.m. | 2 hours, 31 minutes ago
Description : A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
Severity: 7.2 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70043 - Ayms TLS Certificate Validation Bypass

CVE ID : CVE-2025-70043
Published : Feb. 23, 2026, 4:29 p.m. | 2 hours, 31 minutes ago
Description : An issue pertaining to CWE-295: Improper Certificate Validation was discovered in Ayms node-To master. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in TLS socket options
Severity: 9.1 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70044 - uTools-quickcommand SSL Certificate Validation Weakness

CVE ID : CVE-2025-70044
Published : Feb. 23, 2026, 4:29 p.m. | 2 hours, 31 minutes ago
Description : An issue pertaining to CWE-295: Improper Certificate Validation was discovered in fofolee uTools-quickcommand 5.0.3.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70045 - Jxcore JXM TLS/SSL Certificate Validation Bypass

CVE ID : CVE-2025-70045
Published : Feb. 23, 2026, 4:29 p.m. | 2 hours, 31 minutes ago
Description : An issue pertaining to CWE-295: Improper Certificate Validation was discovered in jxcore jxm master. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in HTTPS request options when 'jx_obj.IsSecure' is true
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-70058 - "YMFE yapi TLS/SSL Certificate Validation Bypass"

CVE ID : CVE-2025-70058
Published : Feb. 23, 2026, 4:29 p.m. | 2 hours, 31 minutes ago
Description : An issue pertaining to CWE-295: Improper Certificate Validation was discovered in YMFE yapi v1.12.0. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in the HTTPS agent configuration for Axios requests
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2697 - Indirect Object Reference (IDOR) in Security Center

CVE ID : CVE-2026-2697
Published : Feb. 23, 2026, 4:29 p.m. | 2 hours, 31 minutes ago
Description : An Indirect Object Reference (IDOR) in Security Center allows an authenticated remote attacker to escalate privileges via the 'owner' parameter.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-3016 - UTT HiPER 810G formP2PLimitConfig strcpy buffer overflow

CVE ID : CVE-2026-3016
Published : Feb. 23, 2026, 4:29 p.m. | 2 hours, 31 minutes ago
Description : A vulnerability was identified in UTT HiPER 810G up to 1.7.7-171114. The affected element is the function strcpy of the file /goform/formP2PLimitConfig. The manipulation of the argument except leads to buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Severity: 9.0 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22567 - ZIA Admin UI Input Validation Bug

CVE ID : CVE-2026-22567
Published : Feb. 23, 2026, 5:23 p.m. | 1 hour, 37 minutes ago
Description : Improper validation of user-supplied input in the ZIA Admin UI could allow an authenticated administrator to initiate backend functions through specific input fields in limited scenarios.
Severity: 7.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-22568 - Unauthorized information retrieval in ZIA Admin UI

CVE ID : CVE-2026-22568
Published : Feb. 23, 2026, 5:23 p.m. | 1 hour, 37 minutes ago
Description : Improper neutralization of special elements in user-supplied input within the ZIA Admin UI could allow an authenticated administrator to access or retrieve unauthorized internal information in rare conditions.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27511 - Tenda F3 Clickjacking in Web Management Interface

CVE ID : CVE-2026-27511
Published : Feb. 23, 2026, 5:23 p.m. | 1 hour, 37 minutes ago
Description : Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a clickjacking vulnerability in the web-based administrative interface. The interface does not set the X-Frame-Options header, allowing attacker-controlled sites to embed administrative pages in an iframe and trick an authenticated administrator into unintended interactions that may result in unauthorized configuration changes.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27512 - Tenda F3 Reflected Script Execution via Missing nosniff Header

CVE ID : CVE-2026-27512
Published : Feb. 23, 2026, 5:23 p.m. | 1 hour, 37 minutes ago
Description : Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a content-type confusion vulnerability in the administrative interface. Responses omit the X-Content-Type-Options: nosniff header and include attacker-influenced content that can be reflected into the response body. Under affected browser behaviors, MIME sniffing may cause the response to be interpreted as active HTML, enabling script execution in the context of the administrative interface.
Severity: 6.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27513 - Tenda F3 CSRF in Web Management Interface

CVE ID : CVE-2026-27513
Published : Feb. 23, 2026, 5:23 p.m. | 1 hour, 37 minutes ago
Description : Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a cross-site request forgery (CSRF) vulnerability in the web-based administrative interface. The interface does not implement anti-CSRF protections, allowing an attacker to induce an authenticated administrator to submit state-changing requests, which can result in unauthorized configuration changes.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-27514 - Tenda F3 Plaintext Credential Exposure in Configuration Download

CVE ID : CVE-2026-27514
Published : Feb. 23, 2026, 5:23 p.m. | 1 hour, 37 minutes ago
Description : Shenzhen Tenda F3 Wireless Router firmware V12.01.01.55_multi contains a sensitive information exposure vulnerability in the configuration download functionality. The configuration download response includes the router password and administrative password in plaintext. The endpoint also omits appropriate Cache-Control directives, which can allow the response to be stored in client-side caches and recovered by other local users or processes with access to cached browser data.
Severity: 7.1 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-2698 - Improper Access Control

CVE ID : CVE-2026-2698
Published : Feb. 23, 2026, 5:23 p.m. | 1 hour, 37 minutes ago
Description : An improper access control vulnerability exists where an authenticated user could access areas outside of their authorized scope.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-26464 - Society Management System Portal Stored XSS Vulnerability

CVE ID : CVE-2026-26464
Published : Feb. 23, 2026, 6:25 p.m. | 35 minutes ago
Description : Stored Cross-Site Scripting (XSS) was found in the /admin/edit_user.php page of Society Management System Portal V1.0, which allows remote attackers to inject and store arbitrary JavaScript code that is executed in users' browsers. This vulnerability can be exploited via the name parameter in a POST HTTP request, leading to execution of malicious scripts when the affected content is viewed by other users, including administrators.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-71056 - GCOM EPON Session Hijacking Vulnerability

CVE ID : CVE-2025-71056
Published : Feb. 23, 2026, 9:19 p.m. | 1 hour, 43 minutes ago
Description : Improper session management in GCOM EPON 1GE ONU version C00R371V00B01 allows attackers to execute a session hijacking attack via spoofing the IP address of an authenticated user.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23521 - Traccar vulnerable to Path Traversal and External Control of File Name or Path

CVE ID : CVE-2026-23521
Published : Feb. 23, 2026, 9:19 p.m. | 1 hour, 43 minutes ago
Description : Versions of the Traccar open-source GPS tracking system up to and including 6.11.1 contain an issue in which authenticated users who can create or edit devices can set a device `uniqueId` to an absolute path. When uploading a device image, Traccar uses that `uniqueId` to build the filesystem path without enforcing that the resolved path stays under the media root. This allows writing files outside the media directory. As of time of publication, it is unclear whether a fix is available.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23693 - ElementsKit Lite < 3.7.9 Unauthenticated Mailchimp REST Endpoint

CVE ID : CVE-2026-23693
Published : Feb. 23, 2026, 9:19 p.m. | 1 hour, 43 minutes ago
Description : ElementsKit Lite (elementskit-lite) WordPress plugin versions prior to 3.7.9 expose the REST endpoint /wp-json/elementskit/v1/widget/mailchimp/subscribe without authentication. The endpoint accepts client-supplied Mailchimp API credentials and insufficiently validates certain parameters, including the list parameter, when constructing upstream Mailchimp API requests. An unauthenticated attacker can abuse the endpoint as an open proxy to Mailchimp, potentially triggering unauthorized API calls, manipulating subscription data, exhausting API quotas, or causing resource consumption on the affected WordPress site.
Severity: 10.0 | CRITICAL
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-23694 - Aruba HiSpeed Cache < 3.0.5 CSRF in Multiple Administrative AJAX Actions

CVE ID : CVE-2026-23694
Published : Feb. 23, 2026, 9:19 p.m. | 1 hour, 43 minutes ago
Description : Aruba HiSpeed Cache (aruba-hispeed-cache) WordPress plugin versions prior to 3.0.5 contain a cross-site request forgery (CSRF) vulnerability affecting multiple administrative AJAX actions. The handlers for ahsc_reset_options, ahsc_debug_status, and ahsc_enable_purge perform authentication and capability checks but do not verify a WordPress nonce for state-changing requests. An attacker can induce a logged-in administrator to visit a malicious webpage that submits forged requests to admin-ajax.php, resulting in unauthorized resetting of plugin settings, toggling of the WordPress WP_DEBUG configuration, or modification of cache purging behavior without the administrator’s intent.
Severity: 5.1 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...