A vulnerability described as critical has been identified in Tenda F451 1.0.0.7_cn_svn7958. This issue affects the function fromSetIpBind of the file /goform/SetIpBind. Executing a manipulation of the argument page can lead to stack-based buffer overflow.
This vulnerability appears as CVE-2026-6135. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability classified as critical has been found in Tenda F451 1.0.0.7_cn_svn7958. Impacted is the function frmL7ImForm of the file /goform/L7Im. The manipulation of the argument page leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2026-6136. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in Pachno 1.0.6. It has been declared as critical. Affected is an unknown function. Executing a manipulation can lead to deserialization.
This vulnerability is tracked as CVE-2026-40044. The attack can be launched remotely. No exploit exists.
A vulnerability classified as problematic has been found in Pachno 1.0.6. The affected element is the function runSwitchUser. The manipulation leads to authorization bypass.
This vulnerability is traded as CVE-2026-40043. It is possible to initiate the attack remotely. There is no exploit available.
Microsoft on Tuesday released updates to address a record 169 security flaws across its product portfolio, including one vulnerability that has been actively exploited in the wild.
Of these 169 vulnerabilities, 157 are rated Important, eight are rated Critical, three are rated Moderate, and one is rated Low in severity. Ninety-three of the flaws are
Active HanGhost Loader campaign targets enterprise payment and logistics workflows with fileless attacks, multi-stage execution, and stealthy malware delivery.
A vulnerability classified as problematic has been found in JDEGUEST Apache::API::Password up to 0.5.2 on Perl. The affected element is the function Crypt::Urandom. The manipulation leads to cryptographically weak prng.
This vulnerability is documented as CVE-2026-5088. The attack can be initiated remotely. There is not any exploit available.
Two high-severity flaws in PHP Composer could let attackers run arbitrary commands via malicious repository configs and crafted inputs affecting Perforce VCS. Two high-severity vulnerabilities in PHP Composer could allow attackers to execute arbitrary commands. PHP Composer is a dependency manager for PHP that helps developers install and manage libraries their projects need. By defining […]