7.1

CVSS3.1

CVE-2026-22323 - Cross‑Site Request Forgery in Link Aggregation Configuration

A CSRF vulnerability in the Link Aggregation configuration interface allows an unauthenticated remote attacker to trick authenticated users into sending unauthorized POST requests to the device by luring them to a malicious webpage. This can silently alter the device’s configuration without the vic…

📅 Published: March 18, 2026, 7:35 a.m. 🔄 Last Modified: March 24, 2026, 10:59 a.m.

7.1

CVSS3.1

CVE-2026-22322 - Stored Cross‑Site Scripting in Link Aggregation Name Handling

A stored cross‑site scripting (XSS) vulnerability in the Link Aggregation configuration interface allows an unauthenticated remote attacker to create a trunk entry containing malicious HTML/JavaScript code. When the affected page is viewed, the injected script executes in the context of the victim’…

📅 Published: March 18, 2026, 7:34 a.m. 🔄 Last Modified: March 24, 2026, 10:59 a.m.

5.3

CVSS3.1

CVE-2026-22321 - Stack-Based Buffer Overflow in CLI Login Username Handling over CLI

A stack-based buffer overflow in the device's Telnet/SSH CLI login routine occurs when a unauthenticated attacker send an oversized or unexpected username input. An overflow condition crashes the thread handling the login attempt, forcing the session to close. Because other CLI sessions remain unaf…

📅 Published: March 18, 2026, 7:34 a.m. 🔄 Last Modified: March 24, 2026, 10:59 a.m.

6.5

CVSS3.1

CVE-2026-22320 - Stack-Based Buffer Overflow in TFTP File-Transfer Command Handling over CLI

A stack-based buffer overflow in the CLI's TFTP file‑transfer command handling allows a low-privileged attacker with Telnet/SSH access to trigger memory corruption by supplying unexpected or oversized filename input. Exploitation results in the corruption of the internal buffer, causing the CLI and…

📅 Published: March 18, 2026, 7:34 a.m. 🔄 Last Modified: March 24, 2026, 10:59 a.m.

4.9

CVSS3.1

CVE-2026-22319 - Stack-Based Buffer Overflow in File Install Parameter Handling

A stack-based buffer overflow in the device's file installation workflow allows a high-privileged attacker to send oversized POST parameters that overflow a fixed-size stack buffer within an internal process, resulting in a DoS attack.

📅 Published: March 18, 2026, 7:34 a.m. 🔄 Last Modified: March 24, 2026, 10:59 a.m.

4.9

CVSS3.1

CVE-2026-22318 - Stack-Based Buffer Overflow in File Transfer Parameter Handling

A stack-based buffer overflow vulnerability in the device's file transfer parameter workflow allows a high-privileged attacker to send oversized POST parameters, causing memory corruption in an internal process, resulting in a DoS attack.

📅 Published: March 18, 2026, 7:33 a.m. 🔄 Last Modified: March 24, 2026, 10:59 a.m.

7.2

CVSS3.1

CVE-2026-22317 - Command Injection Vulnerability in Root CA Certificate Transfer Workflow

A command injection vulnerability in the device’s Root CA certificate transfer workflow allows a high-privileged attacker to send crafted HTTP POST requests that result in arbitrary command execution on the underlying Linux OS with root privileges.

📅 Published: March 18, 2026, 7:33 a.m. 🔄 Last Modified: March 24, 2026, 10:59 a.m.

6.5

CVSS3.1

CVE-2026-22316 - Buffer Overflow using TFTP Filename

A remote attacker with user privileges for the webUI can use the setting of the TFTP Filename with a POST Request to trigger a stack-based Buffer Overflow, resulting in a DoS attack.

📅 Published: March 18, 2026, 7:33 a.m. 🔄 Last Modified: March 24, 2026, 10:59 a.m.

2.4

CVSS4.0

CVE-2025-31703 - Privilege Escalation via Serial Port Restricted Shell in Dahua NVR/XVR Devices

A vulnerability found in Dahua NVR/XVR device. A third-party malicious attacker with physical access to the device may gain access to a restricted shell via the serial port, and bypasses the shell's authentication mechanism to escalate privileges.

📅 Published: March 18, 2026, 7:13 a.m. 🔄 Last Modified: March 24, 2026, 10:59 a.m.

6.1

CVSS3.1

CVE-2026-3512 - Writeprint Stylometry <= 0.1 - Reflected Cross-Site Scripting via 'p' Parameter

The Writeprint Stylometry plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'p' GET parameter in all versions up to and including 0.1. This is due to insufficient input sanitization and output escaping in the bjl_wprintstylo_comments_nav() function. The function directly …

📅 Published: March 18, 2026, 6:48 a.m. 🔄 Last Modified: April 22, 2026, 9:32 p.m.
Total resulsts: 349182
Page 1065 of 34,919
« previous page » next page
Filters