5.1

CVSS4.0

CVE-2026-3486 - itsourcecode College Management System student-fee.php sql injection

A vulnerability has been found in itsourcecode College Management System 1.0. This vulnerability affects unknown code of the file /admin/student-fee.php. Such manipulation of the argument roll_no leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed toโ€ฆ

๐Ÿ“… Published: March 3, 2026, 9:02 p.m. ๐Ÿ”„ Last Modified: March 3, 2026, 9:02 p.m.

9.3

CVSS4.0

CVE-2026-3485 - D-Link DIR-868L SSDP Service sub_1BF84 os command injection

A flaw has been found in D-Link DIR-868L 110b03. This affects the function sub_1BF84 of the component SSDP Service. This manipulation of the argument ST causes os command injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. This vulnerability onโ€ฆ

๐Ÿ“… Published: March 3, 2026, 9:02 p.m. ๐Ÿ”„ Last Modified: March 3, 2026, 9:02 p.m.

7.3

CVSS3.1

CVE-2026-25906 -

Dell Optimizer, versions prior to 6.3.1, contain an Improper Link Resolution Before File Access ('Link Following') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.

๐Ÿ“… Published: March 3, 2026, 8:55 p.m. ๐Ÿ”„ Last Modified: March 3, 2026, 8:55 p.m.

6.3

CVSS3.1

CVE-2025-13686 - DataStage on Cloud Pak for Data is vulnerable to arbitrary code injection due to runtime environment

IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 could allow an authenticated user to execute arbitrary commands with normal user privileges on the system due to improper validation of user supplied input through the job subroutine component.

๐Ÿ“… Published: March 3, 2026, 8:51 p.m. ๐Ÿ”„ Last Modified: March 3, 2026, 8:51 p.m.

6.3

CVSS3.1

CVE-2025-13687 - DataStage on Cloud Pak for Data is vulnerable to arbitrary code injection due to runtime environment

IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 could allow an authenticated user to execute arbitrary commands with normal user privileges on the system due to improper validation of user supplied input through the user-defined function component.

๐Ÿ“… Published: March 3, 2026, 8:45 p.m. ๐Ÿ”„ Last Modified: March 3, 2026, 8:45 p.m.
Load More Vulnerability
avatar

Mehmet Ince

@mdisec

CVE stats coming here

avatar

Nuri ร‡ilengir

@ncilengir

CVE stats coming here

avatar

@aydinnyunus

CVE stats coming here

avatar

Onurcan Genรง

@onurcangnc

CVE stats coming here

avatar

Seyit Sigirci

@h3xecute

CVE stats coming here

avatar

Ali ฤฐltizar

@iltosec

CVE stats coming here

avatar

@b3rsec

CVE stats coming here

avatar

@furkank

CVE stats coming here

avatar

kutaysec

@kutaysec

CVE stats coming here