CVE-2026-4217 - XREAL Nebula App ai.nreal.nebula.universal CloudStoragePlugin.java key management
CVE ID :CVE-2026-4217
Published : March 16, 2026, 5:02 a.m. | 1 hour, 31 minutes ago
Description :A security vulnerability has been detected in XREAL Nebula App up to 3.2.1 on Android. This impacts an unknown function of the file in ai/nreal/nebula/flutterPlugin/CloudStoragePlugin.java of the component ai.nreal.nebula.universal. Such manipulation of the argument accessKey/secretAccessKey/securityToken leads to key management error. The attack can only be performed from a local environment. The attack requires a high level of complexity. The exploitability is said to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-4217
Published : March 16, 2026, 5:02 a.m. | 1 hour, 31 minutes ago
Description :A security vulnerability has been detected in XREAL Nebula App up to 3.2.1 on Android. This impacts an unknown function of the file in ai/nreal/nebula/flutterPlugin/CloudStoragePlugin.java of the component ai.nreal.nebula.universal. Such manipulation of the argument accessKey/secretAccessKey/securityToken leads to key management error. The attack can only be performed from a local environment. The attack requires a high level of complexity. The exploitability is said to be difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-31386 - LiteSpeed Technologies OpenLiteSpeed and LSWS Enterprise OS Command Injection Vulnerability
CVE ID :CVE-2026-31386
Published : March 16, 2026, 5:21 a.m. | 1 hour, 12 minutes ago
Description :OpenLiteSpeed and LSWS Enterprise provided by LiteSpeed Technologies contain an OS command injection vulnerability. An arbitrary OS command may be executed by an attacker with the administrative privilege.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-31386
Published : March 16, 2026, 5:21 a.m. | 1 hour, 12 minutes ago
Description :OpenLiteSpeed and LSWS Enterprise provided by LiteSpeed Technologies contain an OS command injection vulnerability. An arbitrary OS command may be executed by an attacker with the administrative privilege.
Severity: 8.6 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-4218 - myAEDES App aedes.me.beta EngageBayUtils.java information disclosure
CVE ID :CVE-2026-4218
Published : March 16, 2026, 5:32 a.m. | 1 hour, 1 minute ago
Description :A vulnerability was detected in myAEDES App up to 1.18.4 on Android. Affected is an unknown function of the file aedes/me/beta/utils/EngageBayUtils.java of the component aedes.me.beta. Performing a manipulation of the argument AUTH_KEY results in information disclosure. The attack is only possible with local access. The attack's complexity is rated as high. The exploitability is told to be difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-4218
Published : March 16, 2026, 5:32 a.m. | 1 hour, 1 minute ago
Description :A vulnerability was detected in myAEDES App up to 1.18.4 on Android. Affected is an unknown function of the file aedes/me/beta/utils/EngageBayUtils.java of the component aedes.me.beta. Performing a manipulation of the argument AUTH_KEY results in information disclosure. The attack is only possible with local access. The attack's complexity is rated as high. The exploitability is told to be difficult. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-25083 - GROWI OpenAI Authorization Bypass
CVE ID :CVE-2026-25083
Published : March 16, 2026, 6:47 a.m. | 3 hours, 47 minutes ago
Description :GROWI OpenAI thread/message API endpoints do not perform authorization. Affected are v7.4.5 and earlier versions. A logged-in user who knows a shared AI assistant's identifier may view and/or tamper the other user's threads/messages.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-25083
Published : March 16, 2026, 6:47 a.m. | 3 hours, 47 minutes ago
Description :GROWI OpenAI thread/message API endpoints do not perform authorization. Affected are v7.4.5 and earlier versions. A logged-in user who knows a shared AI assistant's identifier may view and/or tamper the other user's threads/messages.
Severity: 8.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-32776 - Expat XML Parser NULL Pointer Dereference Vulnerability
CVE ID :CVE-2026-32776
Published : March 16, 2026, 6:54 a.m. | 3 hours, 41 minutes ago
Description :libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-32776
Published : March 16, 2026, 6:54 a.m. | 3 hours, 41 minutes ago
Description :libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-32777 - Apache libexpat DTD Infinite Loop Vulnerability
CVE ID :CVE-2026-32777
Published : March 16, 2026, 6:58 a.m. | 3 hours, 37 minutes ago
Description :libexpat before 2.7.5 allows an infinite loop while parsing DTD content.
Severity: 4.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-32777
Published : March 16, 2026, 6:58 a.m. | 3 hours, 37 minutes ago
Description :libexpat before 2.7.5 allows an infinite loop while parsing DTD content.
Severity: 4.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-4223 - itsourcecode Payroll Management System manage_employee.php sql injection
CVE ID :CVE-2026-4223
Published : March 16, 2026, 7:02 a.m. | 3 hours, 33 minutes ago
Description :A vulnerability was identified in itsourcecode Payroll Management System 1.0. This issue affects some unknown processing of the file /manage_employee.php. Such manipulation of the argument ID leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-4223
Published : March 16, 2026, 7:02 a.m. | 3 hours, 33 minutes ago
Description :A vulnerability was identified in itsourcecode Payroll Management System 1.0. This issue affects some unknown processing of the file /manage_employee.php. Such manipulation of the argument ID leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-32778 - Libexpat NULL Pointer Dereference Vulnerability
CVE ID :CVE-2026-32778
Published : March 16, 2026, 7:02 a.m. | 3 hours, 32 minutes ago
Description :libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.
Severity: 2.9 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-32778
Published : March 16, 2026, 7:02 a.m. | 3 hours, 32 minutes ago
Description :libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.
Severity: 2.9 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-0639 - liteos_a has a missing release of memory vulnerability
CVE ID :CVE-2026-0639
Published : March 16, 2026, 7:08 a.m. | 3 hours, 26 minutes ago
Description :in OpenHarmony v6.0 and prior versions allow a local attacker case DOS through missing release of memory.
Severity: 3.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-0639
Published : March 16, 2026, 7:08 a.m. | 3 hours, 26 minutes ago
Description :in OpenHarmony v6.0 and prior versions allow a local attacker case DOS through missing release of memory.
Severity: 3.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-12736 - multimedia_audio_standard has an insecure storage of sensitive information vulnerability
CVE ID :CVE-2025-12736
Published : March 16, 2026, 7:09 a.m. | 3 hours, 26 minutes ago
Description :in OpenHarmony v5.0.3 and prior versions allow a local attacker case sensitive information leak through use of uninitialized resource.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2025-12736
Published : March 16, 2026, 7:09 a.m. | 3 hours, 26 minutes ago
Description :in OpenHarmony v5.0.3 and prior versions allow a local attacker case sensitive information leak through use of uninitialized resource.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-25277 - arkcompiler_ets_runtime has a type confusion vulnerability
CVE ID :CVE-2025-25277
Published : March 16, 2026, 7:09 a.m. | 3 hours, 26 minutes ago
Description :in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through using incompatible type. This vulnerability can be exploited only in restricted scenarios.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2025-25277
Published : March 16, 2026, 7:09 a.m. | 3 hours, 26 minutes ago
Description :in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through using incompatible type. This vulnerability can be exploited only in restricted scenarios.
Severity: 6.3 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-41432 - arkcompiler_ets_runtime has an out-of-bounds write vulnerability
CVE ID :CVE-2025-41432
Published : March 16, 2026, 7:09 a.m. | 3 hours, 25 minutes ago
Description :in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2025-41432
Published : March 16, 2026, 7:09 a.m. | 3 hours, 25 minutes ago
Description :in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-52458 - arkcompiler_ets_runtime has an out-of-bounds write vulnerability
CVE ID :CVE-2025-52458
Published : March 16, 2026, 7:10 a.m. | 3 hours, 25 minutes ago
Description :in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2025-52458
Published : March 16, 2026, 7:10 a.m. | 3 hours, 25 minutes ago
Description :in OpenHarmony v5.1.0 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through out-of-bounds write. This vulnerability can be exploited only in restricted scenarios.
Severity: 5.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-26474 - communication_ipc an improper input validation vulnerability
CVE ID :CVE-2025-26474
Published : March 16, 2026, 7:10 a.m. | 3 hours, 24 minutes ago
Description :in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information improper input. This vulnerability can be exploited only in restricted scenarios.
Severity: 3.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2025-26474
Published : March 16, 2026, 7:10 a.m. | 3 hours, 24 minutes ago
Description :in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information improper input. This vulnerability can be exploited only in restricted scenarios.
Severity: 3.3 | LOW
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2025-6969 - ability_ability_runtime an improper input validation vulnerability
CVE ID :CVE-2025-6969
Published : March 16, 2026, 7:10 a.m. | 3 hours, 24 minutes ago
Description :in OpenHarmony v5.1.0 and prior versions allow a local attacker cause DOS through improper input.
Severity: 5.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2025-6969
Published : March 16, 2026, 7:10 a.m. | 3 hours, 24 minutes ago
Description :in OpenHarmony v5.1.0 and prior versions allow a local attacker cause DOS through improper input.
Severity: 5.0 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-4255 - DLL Injection Privilege Escalation
CVE ID :CVE-2026-4255
Published : March 16, 2026, 7:14 a.m. | 3 hours, 21 minutes ago
Description :A DLL search order hijacking vulnerability in Thermalright TR-VISION HOME on Windows (64-bit) allows a local attacker to escalate privileges via DLL side-loading. The application loads certain dynamic-link library (DLL) dependencies using the default Windows search order, which includes directories that may be writable by non-privileged users.\n\n\n\nBecause these directories can be modified by unprivileged users, an attacker can place a malicious DLL with the same name as a legitimate dependency in a directory that is searched before trusted system locations. When the application is executed, which is always with administrative privileges, the malicious DLL is loaded instead of the legitimate library.\n\n\n\nThe application does not enforce restrictions on DLL loading locations and does not verify the integrity or digital signature of loaded libraries. As a result, attacker-controlled code may be executed within the security context of the application, allowing arbitrary code execution with elevated privileges.\n\n\n\nSuccessful exploitation requires that an attacker place a crafted malicious DLL in a user-writable directory that is included in the application's DLL search path and then cause the affected application to be executed. Once loaded, the malicious DLL runs with the same privileges as the application.\n\n\n\nThis issue affects \nTR-VISION HOME versions up to and including 2.0.5.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-4255
Published : March 16, 2026, 7:14 a.m. | 3 hours, 21 minutes ago
Description :A DLL search order hijacking vulnerability in Thermalright TR-VISION HOME on Windows (64-bit) allows a local attacker to escalate privileges via DLL side-loading. The application loads certain dynamic-link library (DLL) dependencies using the default Windows search order, which includes directories that may be writable by non-privileged users.\n\n\n\nBecause these directories can be modified by unprivileged users, an attacker can place a malicious DLL with the same name as a legitimate dependency in a directory that is searched before trusted system locations. When the application is executed, which is always with administrative privileges, the malicious DLL is loaded instead of the legitimate library.\n\n\n\nThe application does not enforce restrictions on DLL loading locations and does not verify the integrity or digital signature of loaded libraries. As a result, attacker-controlled code may be executed within the security context of the application, allowing arbitrary code execution with elevated privileges.\n\n\n\nSuccessful exploitation requires that an attacker place a crafted malicious DLL in a user-writable directory that is included in the application's DLL search path and then cause the affected application to be executed. Once loaded, the malicious DLL runs with the same privileges as the application.\n\n\n\nThis issue affects \nTR-VISION HOME versions up to and including 2.0.5.
Severity: 8.4 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-4225 - CMS Made Simple User Management listusers.php cross site scripting
CVE ID :CVE-2026-4225
Published : March 16, 2026, 7:32 a.m. | 3 hours, 3 minutes ago
Description :A security flaw has been discovered in CMS Made Simple up to 2.2.21. Impacted is an unknown function of the file admin/listusers.php of the component User Management Module. Performing a manipulation of the argument Message results in cross site scripting. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-4225
Published : March 16, 2026, 7:32 a.m. | 3 hours, 3 minutes ago
Description :A security flaw has been discovered in CMS Made Simple up to 2.2.21. Impacted is an unknown function of the file admin/listusers.php of the component User Management Module. Performing a manipulation of the argument Message results in cross site scripting. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-4226 - LB-LINK BL-WR9000 get_virtual_cfg sub_44E8D0 stack-based overflow
CVE ID :CVE-2026-4226
Published : March 16, 2026, 7:32 a.m. | 3 hours, 3 minutes ago
Description :A weakness has been identified in LB-LINK BL-WR9000 2.4.9. The affected element is the function sub_44E8D0 of the file /goform/get_virtual_cfg. Executing a manipulation can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-4226
Published : March 16, 2026, 7:32 a.m. | 3 hours, 3 minutes ago
Description :A weakness has been identified in LB-LINK BL-WR9000 2.4.9. The affected element is the function sub_44E8D0 of the file /goform/get_virtual_cfg. Executing a manipulation can lead to stack-based buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-4227 - LB-LINK BL-WR9000 get_hidessid_cfg sub_44D844 buffer overflow
CVE ID :CVE-2026-4227
Published : March 16, 2026, 8:02 a.m. | 2 hours, 33 minutes ago
Description :A security vulnerability has been detected in LB-LINK BL-WR9000 2.4.9. The impacted element is the function sub_44D844 of the file /goform/get_hidessid_cfg. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-4227
Published : March 16, 2026, 8:02 a.m. | 2 hours, 33 minutes ago
Description :A security vulnerability has been detected in LB-LINK BL-WR9000 2.4.9. The impacted element is the function sub_44D844 of the file /goform/get_hidessid_cfg. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-4228 - LB-LINK BL-WR9000 set_wifi sub_458754 command injection
CVE ID :CVE-2026-4228
Published : March 16, 2026, 8:02 a.m. | 2 hours, 33 minutes ago
Description :A vulnerability was detected in LB-LINK BL-WR9000 2.4.9. This affects the function sub_458754 of the file /goform/set_wifi. The manipulation results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-4228
Published : March 16, 2026, 8:02 a.m. | 2 hours, 33 minutes ago
Description :A vulnerability was detected in LB-LINK BL-WR9000 2.4.9. This affects the function sub_458754 of the file /goform/set_wifi. The manipulation results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE-2026-4229 - vanna-ai vanna bigquery_vector.py remove_training_data sql injection
CVE ID :CVE-2026-4229
Published : March 16, 2026, 8:32 a.m. | 2 hours, 3 minutes ago
Description :A flaw has been found in vanna-ai vanna up to 2.0.2. This impacts the function remove_training_data of the file src/vanna/legacy/google/bigquery_vector.py. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...
CVE ID :CVE-2026-4229
Published : March 16, 2026, 8:32 a.m. | 2 hours, 3 minutes ago
Description :A flaw has been found in vanna-ai vanna up to 2.0.2. This impacts the function remove_training_data of the file src/vanna/legacy/google/bigquery_vector.py. This manipulation of the argument ID causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Severity: 0.0 | NA
Visit the link for more details, such as CVSS details, affected products, timeline, and more...