Latest Vulnerabilities Updates on the latest vulnerabilities detected.
- CVE-2026-3399 – Tenda F453 httpd GstDhcpSetSer fromGstDhcpSetSer buffer overflowon March 1, 2026 at 11:16 pm
CVE ID : CVE-2026-3399 Published : March 1, 2026, 11:16 p.m. | 27 minutes ago Description : A vulnerability was identified in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. The manipulation of the argument dips leads to buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used. Severity: 9.0 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3398 – Tenda F453 httpd AdvSetWan fromAdvSetWan buffer overflowon March 1, 2026 at 10:16 pm
CVE ID : CVE-2026-3398 Published : March 1, 2026, 10:16 p.m. | 1 hour, 27 minutes ago Description : A vulnerability was determined in Tenda F453 1.0.0.3. Affected is the function fromAdvSetWan of the file /goform/AdvSetWan of the component httpd. Executing a manipulation of the argument wanmode/PPPOEPassword can lead to buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. Severity: 9.0 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3395 – MaxSite CMS MarkItUp Preview AJAX Endpoint preview-ajax.php eval code injectionon March 1, 2026 at 2:16 pm
CVE ID : CVE-2026-3395 Published : March 1, 2026, 2:16 p.m. | 9 hours, 27 minutes ago Description : A flaw has been found in MaxSite CMS up to 109.1. This impacts the function eval of the file application/maxsite/admin/plugins/editor_markitup/preview-ajax.php of the component MarkItUp Preview AJAX Endpoint. Executing a manipulation can lead to code injection. It is possible to launch the attack remotely. The exploit has been published and may be used. Upgrading to version 109.2 will fix this issue. This patch is called 08937a3c5d672a242d68f53e9fccf8a748820ef3. You should upgrade the affected component. The code maintainer was informed beforehand about the issues. He reacted very fast and highly professional. Severity: 7.5 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3394 – jarikomppa soloud WAV File soloud_wav.cpp loadwav memory corruptionon March 1, 2026 at 1:16 pm
CVE ID : CVE-2026-3394 Published : March 1, 2026, 1:16 p.m. | 10 hours, 27 minutes ago Description : A vulnerability was detected in jarikomppa soloud up to 20200207. This affects the function SoLoud::Wav::loadwav of the file src/audiosource/wav/soloud_wav.cpp of the component WAV File Parser. Performing a manipulation results in memory corruption. The attack must be initiated from a local position. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3393 – jarikomppa soloud Audio File soloud_wav.cpp loadflac heap-based overflowon March 1, 2026 at 1:16 pm
CVE ID : CVE-2026-3393 Published : March 1, 2026, 1:16 p.m. | 10 hours, 27 minutes ago Description : A security vulnerability has been detected in jarikomppa soloud up to 20200207. The impacted element is the function SoLoud::Wav::loadflac of the file src/audiosource/wav/soloud_wav.cpp of the component Audio File Handler. Such manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3392 – FascinatedBox lily lily_emitter.c eval_tree null pointer dereferenceon March 1, 2026 at 12:16 pm
CVE ID : CVE-2026-3392 Published : March 1, 2026, 12:16 p.m. | 11 hours, 27 minutes ago Description : A weakness has been identified in FascinatedBox lily up to 2.3. The affected element is the function eval_tree of the file src/lily_emitter.c. This manipulation causes null pointer dereference. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3391 – FascinatedBox lily lily_emitter.c clear_storages out-of-boundson March 1, 2026 at 12:15 pm
CVE ID : CVE-2026-3391 Published : March 1, 2026, 12:15 p.m. | 11 hours, 27 minutes ago Description : A security flaw has been discovered in FascinatedBox lily up to 2.3. Impacted is the function clear_storages of the file src/lily_emitter.c. The manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3388 – Squirrel sqcompiler.cpp UnaryOP recursionon March 1, 2026 at 10:16 am
CVE ID : CVE-2026-3388 Published : March 1, 2026, 10:16 a.m. | 13 hours, 27 minutes ago Description : A vulnerability was found in Squirrel up to 3.2. This affects the function SQCompiler::Factor/SQCompiler::UnaryOP of the file squirrel/sqcompiler.cpp. Performing a manipulation results in uncontrolled recursion. The attack needs to be approached locally. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3389 – Squirrel sqstdrex.cpp sqstd_rex_newnode null pointer dereferenceon March 1, 2026 at 10:16 am
CVE ID : CVE-2026-3389 Published : March 1, 2026, 10:16 a.m. | 13 hours, 27 minutes ago Description : A vulnerability was determined in Squirrel up to 3.2. This vulnerability affects the function sqstd_rex_newnode in the library sqstdlib/sqstdrex.cpp. Executing a manipulation can lead to null pointer dereference. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3390 – FascinatedBox lily Error Reporting lily_build_error.c patch_line_end out-of-boundson March 1, 2026 at 10:16 am
CVE ID : CVE-2026-3390 Published : March 1, 2026, 10:16 a.m. | 13 hours, 27 minutes ago Description : A vulnerability was identified in FascinatedBox lily up to 2.3. This issue affects the function patch_line_end of the file src/lily_build_error.c of the component Error Reporting. The manipulation leads to out-of-bounds read. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3387 – wren-lang wren wren_compiler.c getByteCountForArguments null pointer dereferenceon March 1, 2026 at 10:16 am
CVE ID : CVE-2026-3387 Published : March 1, 2026, 10:16 a.m. | 13 hours, 27 minutes ago Description : A vulnerability has been found in wren-lang wren up to 0.4.0. Affected by this issue is the function getByteCountForArguments of the file src/vm/wren_compiler.c. Such manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3386 – wren-lang wren wren_compiler.c emitOp out-of-boundson March 1, 2026 at 9:15 am
CVE ID : CVE-2026-3386 Published : March 1, 2026, 9:15 a.m. | 14 hours, 27 minutes ago Description : A flaw has been found in wren-lang wren up to 0.4.0. Affected by this vulnerability is the function emitOp of the file src/vm/wren_compiler.c. This manipulation causes out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3385 – wren-lang wren wren_compiler.c resolveLocal recursionon March 1, 2026 at 9:15 am
CVE ID : CVE-2026-3385 Published : March 1, 2026, 9:15 a.m. | 14 hours, 27 minutes ago Description : A vulnerability was detected in wren-lang wren up to 0.4.0. Affected is the function resolveLocal of the file src/vm/wren_compiler.c. The manipulation results in uncontrolled recursion. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3384 – ChaiScript chaiscript_eval.hpp Function_Push_Pop recursionon March 1, 2026 at 8:15 am
CVE ID : CVE-2026-3384 Published : March 1, 2026, 8:15 a.m. | 15 hours, 27 minutes ago Description : A security vulnerability has been detected in ChaiScript up to 6.1.0. This impacts the function chaiscript::eval::AST_Node_Impl::eval/chaiscript::eval::Function_Push_Pop of the file include/chaiscript/language/chaiscript_eval.hpp. The manipulation leads to uncontrolled recursion. An attack has to be approached locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3383 – ChaiScript boxed_number.hpp go divide by zeroon March 1, 2026 at 7:15 am
CVE ID : CVE-2026-3383 Published : March 1, 2026, 7:15 a.m. | 16 hours, 27 minutes ago Description : A weakness has been identified in ChaiScript up to 6.1.0. This affects the function chaiscript::Boxed_Number::go of the file include/chaiscript/dispatchkit/boxed_number.hpp. Executing a manipulation can lead to divide by zero. The attack requires local access. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3382 – ChaiScript boxed_number.hpp get_as memory corruptionon March 1, 2026 at 6:15 am
CVE ID : CVE-2026-3382 Published : March 1, 2026, 6:15 a.m. | 17 hours, 27 minutes ago Description : A security flaw has been discovered in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::Boxed_Number::get_as of the file include/chaiscript/dispatchkit/boxed_number.hpp. Performing a manipulation results in memory corruption. The attack requires a local approach. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet. Severity: 4.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3380 – Tenda F453 L7Im frmL7ImForm buffer overflowon March 1, 2026 at 4:16 am
CVE ID : CVE-2026-3380 Published : March 1, 2026, 4:16 a.m. | 19 hours, 27 minutes ago Description : A vulnerability was found in Tenda F453 1.0.0.3. This issue affects the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page results in buffer overflow. The attack may be launched remotely. The exploit has been made public and could be used. Severity: 9.0 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3379 – Tenda F453 SetIpBind fromSetIpBind buffer overflowon March 1, 2026 at 3:16 am
CVE ID : CVE-2026-3379 Published : March 1, 2026, 3:16 a.m. | 20 hours, 27 minutes ago Description : A vulnerability has been found in Tenda F453 1.0.0.3. This vulnerability affects the function fromSetIpBind of the file /goform/SetIpBind. The manipulation of the argument page leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Severity: 9.0 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3378 – Tenda F453 qossetting fromqossetting buffer overflowon March 1, 2026 at 3:16 am
CVE ID : CVE-2026-3378 Published : March 1, 2026, 3:16 a.m. | 20 hours, 27 minutes ago Description : A flaw has been found in Tenda F453 1.0.0.3. This affects the function fromqossetting of the file /goform/qossetting. Executing a manipulation of the argument qos can lead to buffer overflow. The attack can be launched remotely. The exploit has been published and may be used. Severity: 9.0 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3377 – Tenda F453 SafeUrlFilter fromSafeUrlFilter buffer overflowon March 1, 2026 at 12:16 am
CVE ID : CVE-2026-3377 Published : March 1, 2026, 12:16 a.m. | 23 hours, 27 minutes ago Description : A vulnerability was detected in Tenda F453 1.0.0.3. Affected by this issue is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter. Performing a manipulation of the argument page results in buffer overflow. The attack can be initiated remotely. The exploit is now public and may be used. Severity: 9.0 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-3376 – Tenda F453 SafeMacFilter fromSafeMacFilter buffer overflowon February 28, 2026 at 11:16 pm
CVE ID : CVE-2026-3376 Published : Feb. 28, 2026, 11:16 p.m. | 1 day ago Description : A security vulnerability has been detected in Tenda F453 1.0.0.3. Affected by this vulnerability is the function fromSafeMacFilter of the file /goform/SafeMacFilter. Such manipulation of the argument page leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. Severity: 9.0 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-28560 – wpForo Forum 2.4.14 Stored XSS via Unsafe JSON Encoding in Inline Scripton February 28, 2026 at 10:16 pm
CVE ID : CVE-2026-28560 Published : Feb. 28, 2026, 10:16 p.m. | 1 day, 1 hour ago Description : wpForo Forum 2.4.14 contains a stored cross-site scripting vulnerability that allows script injection via forum URL data output into an inline script block using json_encode without the JSON_HEX_TAG flag. Attackers set a forum slug containing a closing script tag or unescaped single quote to break out of the JavaScript string context and execute arbitrary script in all visitors’ browsers. Severity: 5.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-28561 – wpForo Forum 2.4.14 Stored XSS via Unescaped Forum Description in Templateson February 28, 2026 at 10:16 pm
CVE ID : CVE-2026-28561 Published : Feb. 28, 2026, 10:16 p.m. | 1 day, 1 hour ago Description : wpForo Forum 2.4.14 contains a stored cross-site scripting vulnerability that allows administrators to inject persistent JavaScript via forum description fields echoed without output escaping across multiple theme template files. On multisite installations or with a compromised admin account, attackers set a forum description containing HTML event handlers that execute when any user views the forum listing. Severity: 5.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-28562 – wpForo Forum 2.4.14 SQL Injection via Topics ORDER BY Parameteron February 28, 2026 at 10:16 pm
CVE ID : CVE-2026-28562 Published : Feb. 28, 2026, 10:16 p.m. | 1 day, 1 hour ago Description : wpForo 2.4.14 contains an unauthenticated SQL injection vulnerability in Topics::get_topics() where the ORDER BY clause relies on ineffective esc_sql() sanitization on unquoted identifiers. Attackers exploit the wpfob parameter with CASE WHEN payloads to perform blind boolean extraction of credentials from the WordPress database. Severity: 8.2 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more…
- CVE-2026-28559 – wpForo Forum 2.4.14 Information Disclosure via Global RSS Feedon February 28, 2026 at 10:16 pm
CVE ID : CVE-2026-28559 Published : Feb. 28, 2026, 10:16 p.m. | 1 day, 1 hour ago Description : wpForo Forum 2.4.14 contains an information disclosure vulnerability that allows unauthenticated users to retrieve private and unapproved forum topics via the global RSS feed endpoint. Attackers request the RSS feed without a forum ID parameter, bypassing the privacy and status WHERE clauses that are only applied when a specific forum ID is present in the query. Severity: 5.3 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more…







