Aggregator
Submit #778514: Shenzhen Ruiming Technology Co., Ltd. Streamax Crocus O&M Platform 1.3.44 SQL Injection [Duplicate]
1 month ago
Submit #778514 / VDB-353143
Submit #778514: Shenzhen Ruiming Technology Co., Ltd. Streamax Crocus O&M Platform 1.3.44 SQL Injection [Duplicate]
1 month ago
Submit #778514 / VDB-353143
CVE-2026-5024 | D-Link DIR-513 1.10 /goform/formSetEmail curTime stack-based overflow
1 month ago
A vulnerability, which was classified as critical, has been found in D-Link DIR-513 1.10. This issue affects the function formSetEmail of the file /goform/formSetEmail. Performing a manipulation of the argument curTime results in stack-based buffer overflow. This vulnerability only affects products that are no longer supported by the maintainer.
This vulnerability is reported as CVE-2026-5024. The attack is possible to be carried out remotely. Moreover, an exploit is present.
vuldb.com
Хочешь защититься от слежки? Следуй советам ФБР — и тебя будут следить еще сильнее
1 month ago
Почему использование VPN, которое советуют федеральные ведомства, может лишить защиты от слежки?
DragonForce
1 month ago
You must login to view this content
cohenido
CVE-2026-5023 | DeDeveloper23 codebase-mcp up to 3ec749d237dd8eabbeef48657cf917275792fde6 RepoMix Command src/tools/codebase.ts getCodebase/getRemoteCodebase/saveCodebase os command injection
1 month ago
A vulnerability classified as critical was found in DeDeveloper23 codebase-mcp up to 3ec749d237dd8eabbeef48657cf917275792fde6. This vulnerability affects the function getCodebase/getRemoteCodebase/saveCodebase of the file src/tools/codebase.ts of the component RepoMix Command Handler. Such manipulation leads to os command injection.
This vulnerability is documented as CVE-2026-5023. The attack needs to be performed locally. Additionally, an exploit exists.
This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable.
The project was informed of the problem early through an issue report but has not responded yet.
vuldb.com
Submit #778414: D-Link DIR-513 1.10 Stack-based Buffer Overflow [Accepted]
1 month ago
Submit #778414 / VDB-353908
LtzHust2
Submit #778414: D-Link DIR-513 1.10 Stack-based Buffer Overflow [Accepted]
1 month ago
Submit #778414 / VDB-353908
LtzHust2
Submit #778413: D-Link DIR-513 1.10 Stack-based Buffer Overflow [Duplicate]
1 month ago
Submit #778413 / VDB-348871
LtzHust2
Submit #778413: D-Link DIR-513 1.10 Stack-based Buffer Overflow [Duplicate]
1 month ago
Submit #778413 / VDB-348871
LtzHust2
Submit #778412: D-Link DIR-513 1.10 Stack-based Buffer Overflow [Duplicate]
1 month ago
Submit #778412 / VDB-350784
LtzHust2
Submit #778412: D-Link DIR-513 1.10 Stack-based Buffer Overflow [Duplicate]
1 month ago
Submit #778412 / VDB-350784
LtzHust2
Submit #778348: DeDeveloper23 codebase-mcp <=1.0.0 Command Injection [Accepted]
1 month ago
Submit #778348 / VDB-353907
Yinci Chen
Submit #778348: DeDeveloper23 codebase-mcp <=1.0.0 Command Injection [Accepted]
1 month ago
Submit #778348 / VDB-353907
Yinci Chen
ShinyHunters Disavows BreachForums Threatens Massive Data Leak
1 month ago
You must login to view this content
cohenido
CVE-2026-5021 | Tenda F453 1.0.0.3 httpd /goform/PPTPUserSetting fromPPTPUserSetting delno stack-based overflow
1 month ago
A vulnerability classified as critical has been found in Tenda F453 1.0.0.3. This affects the function fromPPTPUserSetting of the file /goform/PPTPUserSetting of the component httpd. This manipulation of the argument delno causes stack-based buffer overflow.
This vulnerability is registered as CVE-2026-5021. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
vuldb.com
Submit #778327: Tenda W3 V1.0.0.4(3822)_EN Buffer Overflow [Duplicate]
1 month ago
Submit #778327 / VDB-350531
Svigo
Submit #778327: Tenda W3 V1.0.0.4(3822)_EN Buffer Overflow [Duplicate]
1 month ago
Submit #778327 / VDB-350531
Svigo
Akira
1 month ago
You must login to view this content
cohenido