A vulnerability was found in Comfast CF-AC100 2.6.0.8. It has been declared as critical. This impacts an unknown function of the file /cgi-bin/mbox-config?method=SET§ion=wireless_device_dissoc. The manipulation results in command injection.
This vulnerability is identified as CVE-2026-4467. The attack can be executed remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability categorized as problematic has been discovered in Free5GC up to 1.2.1. This impacts an unknown function of the file /nchf-convergedcharging/v3/recharging/ of the component CHF SBI Interface. Such manipulation leads to improper validation of array index.
This vulnerability is referenced as CVE-2026-32937. It is possible to launch the attack remotely. No exploit is available.
It is advisable to upgrade the affected component.
A vulnerability labeled as critical has been found in Free5GC up to 1.4.1. Affected by this vulnerability is the function EncodeGroupId of the component NRF Service. Executing a manipulation can lead to improper access controls.
This vulnerability is tracked as CVE-2026-33062. The attack can be launched remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability was found in Free5GC up to 1.4.1. It has been declared as problematic. This affects the function GetSupiFromSuciSupiMap of the file /nausf-auth/v1/ue-authentications of the component AUSF Service. Executing a manipulation can lead to null pointer dereference.
This vulnerability is handled as CVE-2026-33063. The attack can be executed remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in BishopFox Sliver up to 1.7.3. Affected by this issue is some unknown functionality. This manipulation causes allocation of resources.
This vulnerability is tracked as CVE-2026-32941. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability, which was classified as critical, has been found in pjsip pjproject up to 2.16. This vulnerability affects unknown code of the component DNS Parser. Performing a manipulation results in heap-based buffer overflow.
This vulnerability is cataloged as CVE-2026-32945. It is possible to initiate the attack remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in pjsip pjproject up to 2.16. This issue affects some unknown processing. Executing a manipulation can lead to use after free.
This vulnerability is registered as CVE-2026-32942. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
A vulnerability was found in DataEase up to 2.10.19. It has been rated as problematic. Affected by this issue is the function String.toUpperCase. The manipulation leads to improper handling of case sensitivity.
This vulnerability is traded as CVE-2026-32939. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is advised.
A vulnerability was found in SiYuan up to 3.6.0. It has been declared as problematic. This vulnerability affects unknown code of the file /api/icon/getDynamicIcon of the component Endpoint. The manipulation results in cross site scripting.
This vulnerability is reported as CVE-2026-32940. The attack can be launched remotely. No exploit exists.
It is recommended to upgrade the affected component.
美国国务院已发布全球安全警示信息,郑重提醒所有美国公民:伊朗及其同情势力可能会针对身处海外的美国利益目标发动袭击。
致所有美国公民、美国合法永久居民及身处海外的盟友:
• 请时刻保持高度警惕,务必小心谨慎。
• 请避免前往大型集会、公开示威游行、抗议活动现场或人群密集的区域。
• 请避免进行非必要的旅行,尤其是靠近边境地区、军事设施周边或据报有可疑活动发生的区域。
• 请通过美国政府官方渠道(包括美国国务院及当地美国使领馆)获取最新资讯;切勿仅凭社交媒体上的信息来判断安全状况。
• 如果您目前正在海外旅行或计划出国,请密切关注当地局势动态;因为局势动荡或突发状况随时可能发生,且有加剧的风险——尤其是在中东地区。
---原文引用结束---
以下再引用一些美国民众的回复:
“So it isn’t safe to be an American anywhere in the world now? Way to go Trump!”
(所以,如今无论身处世界何处,身为美国人都不再安全了吗?干得好,特朗普!)
“This doesn't render a warm fuzzy feeling. . . .”
(这并没有给人带来那种温暖、舒心的感觉……)
“I've seen my fair share of security alerts from Department of State all around the world during times of strife, but this one is unique. This is the first time I have seen a "worldwide" caution alert. While I understand this is precautionary, it is still a unique precedent. ”
(在动荡时期,我见惯了美国国务院针对世界各地发布的各类安全警报,但这回的警报却非同寻常。这是我第一次见到针对“全球范围”发布的预警。尽管我明白此举属于预防性措施,但这依然开创了一个独特的先例。)
#OSINT#海外安全#国际形势解读#出海威胁情报
A vulnerability described as problematic has been identified in vercel next.js up to 16.1.6. Affected by this issue is some unknown functionality. Such manipulation leads to resource consumption.
This vulnerability is referenced as CVE-2026-27980. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability, which was classified as critical, has been found in vercel next.js up to 15.5.12/16.1.6. Affected by this issue is some unknown functionality. Performing a manipulation results in http request smuggling.
This vulnerability is cataloged as CVE-2026-29057. It is possible to initiate the attack remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability was found in Veeam Backup and Recovery up to 12.3.1/13.0.0 on Windows and classified as critical. Impacted is an unknown function. The manipulation results in Local Privilege Escalation.
This vulnerability was named CVE-2026-21672. The attack needs to be approached locally. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability has been found in Veeam Backup and Recovery up to 12.3.1/13.0.0 and classified as critical. This issue affects some unknown processing. The manipulation leads to privilege escalation.
This vulnerability is uniquely identified as CVE-2026-21708. The attack is possible to be carried out remotely. No exploit exists.
The affected component should be upgraded.
A vulnerability categorized as critical has been discovered in Veeam Software Appliance up to 13.0.0. This affects an unknown function. Such manipulation leads to privilege escalation.
This vulnerability is documented as CVE-2026-21671. The attack can be executed remotely. There is not any exploit available.
It is advisable to upgrade the affected component.