75 CVEs tracked today. 1 Critical, 42 High, 30 Medium, 2 Low.
-
CVE-2025-15027
CRITICAL
CVSS 9.8
Privilege escalation in JAY Login & Register WordPress plugin allows unauthenticated attackers to register as administrators. All versions up to 1.1.6 affected.
WordPress
Privilege Escalation
PHP
-
CVE-2026-2192
HIGH
CVSS 7.2
Stack buffer overflow in Tenda AC9 firmware versions up to 15.03.06.42_multi allows remote attackers to achieve code execution by manipulating scheduled reboot parameters without authentication. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires high privileges but succeeds over the network with minimal complexity.
Buffer Overflow
Stack Overflow
Ac9 Firmware
-
CVE-2026-2191
HIGH
CVSS 7.2
Stack overflow in Tenda AC9 firmware versions up to 15.03.06.42_multi allows remote attackers with high privileges to achieve complete system compromise through manipulation of the security.ddos.map parameter. Public exploit code exists for this vulnerability, increasing exploitation risk. No patch is currently available.
Buffer Overflow
Stack Overflow
Ac9 Firmware
-
CVE-2026-2190
HIGH
CVSS 7.3
SQL injection in itsourcecode School Management System 1.0 via the ID parameter in /ramonsys/user/controller.php allows unauthenticated remote attackers to execute arbitrary SQL queries and potentially access or modify sensitive data. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. No patch is currently available, requiring organizations to implement alternative mitigations or restrict access to vulnerable systems.
PHP
SQLi
School Management System
-
CVE-2026-2189
HIGH
CVSS 7.3
SQL injection in itsourcecode School Management System 1.0 allows unauthenticated remote attackers to manipulate the 'ay' parameter in /ramonsys/report/index.php, potentially enabling data exfiltration, modification, or service disruption. Public exploit code exists for this vulnerability and no patch is currently available, creating immediate risk for deployed instances.
PHP
SQLi
School Management System
-
CVE-2026-2188
HIGH
CVSS 7.2
Remote code execution in UTT 521G firmware 3.1.1-190816 allows unauthenticated attackers to inject arbitrary OS commands through the policyNames parameter in the /goform/formPdbUpConfig endpoint. Public exploit code exists for this vulnerability, and no patch is currently available. Affected organizations using this device should immediately implement network segmentation or disable remote access until a fix is released.
Command Injection
521g Firmware
-
CVE-2026-2187
HIGH
CVSS 8.8
Stack-based buffer overflow in Tenda RX3 firmware 16.03.13.11 allows remote attackers with low privileges to achieve complete system compromise through manipulation of QoS parameters. Public exploit code exists for this vulnerability, and no patch is currently available. The flaw affects the set_qosMib_list function in the /goform/formSetQosBand endpoint, enabling unauthorized code execution and data theft.
Buffer Overflow
Stack Overflow
Rx3 Firmware
-
CVE-2026-2186
HIGH
CVSS 8.8
Stack-based buffer overflow in Tenda RX3 firmware 16.03.13.11 allows authenticated remote attackers to achieve full system compromise through improper argument handling in the SetIpMacBind function. Public exploit code exists for this vulnerability, and no patch is currently available. Affected organizations should implement network segmentation and access controls to restrict administrative functionality until remediation is possible.
Dns
Buffer Overflow
Stack Overflow
Rx3 Firmware
-
CVE-2026-2185
HIGH
CVSS 8.8
Stack-based buffer overflow in Tenda RX3 firmware 16.03.13.11 MAC filtering endpoint allows authenticated remote attackers to achieve code execution through crafted device name or MAC address parameters. Public exploit code exists for this vulnerability and no patch is currently available. The flaw affects the /goform/setBlackRule component with high impact on confidentiality, integrity, and availability.
Buffer Overflow
Stack Overflow
Rx3 Firmware
-
CVE-2026-2184
HIGH
CVSS 7.3
OS command injection in Great Developers Certificate Generation System's CSV processing functionality allows unauthenticated remote attackers to execute arbitrary system commands through the photo parameter in /restructured/csv.php. Public exploit code exists for this vulnerability, and no patch is currently available, affecting systems using the abandoned project with a rolling release model.
PHP
Command Injection
Certificate
-
CVE-2026-2182
HIGH
CVSS 7.2
521G Firmware versions up to 3.1.1-190816 contains a vulnerability that allows attackers to command injection (CVSS 7.2).
Command Injection
521g Firmware
-
CVE-2026-2181
HIGH
CVSS 8.8
Remote code execution in Tenda RX3 firmware versions up to 16.03.13.11 via stack-based buffer overflow in the /goform/openSchedWifi endpoint allows unauthenticated attackers to execute arbitrary code by manipulating the schedStartTime and schedEndTime parameters. Public exploit code exists and no patch is currently available. This vulnerability affects network devices and poses an immediate risk to deployed systems.
Buffer Overflow
Stack Overflow
Rx3 Firmware
-
CVE-2026-2180
HIGH
CVSS 8.8
Stack-based buffer overflow in Tenda RX3 firmware 16.03.13.11 allows unauthenticated remote attackers to achieve code execution by sending a malicious SSID value to the /goform/fast_setting_wifi_set endpoint. Public exploit code exists for this vulnerability and no patch is currently available. An attacker can exploit this to gain complete system compromise with high integrity and availability impact.
Buffer Overflow
Stack Overflow
Rx3 Firmware
-
CVE-2026-2177
HIGH
CVSS 7.3
SourceCodester Prison Management System 1.0 contains a session fixation vulnerability in its login component that allows unauthenticated remote attackers to hijack user sessions. Public exploit code exists for this vulnerability, which enables attackers to impersonate legitimate users and gain unauthorized access to the system. No patch is currently available.
Information Disclosure
Prison Management System
-
CVE-2026-2175
HIGH
CVSS 7.2
Unauthenticated attackers can execute arbitrary operating system commands on D-Link DIR-823X routers through the /goform/set_upnp endpoint via the upnp_enable parameter. Public exploit code is available for this vulnerability, and no patch has been released. This allows complete compromise of affected devices with high impact on confidentiality, integrity, and availability.
D-Link
Command Injection
Dir 823x Firmware
-
CVE-2026-2174
HIGH
CVSS 7.3
Improper authentication in the CRUD endpoint of code-projects Contact Management System 1.0 allows unauthenticated remote attackers to manipulate ID parameters and bypass access controls. This vulnerability enables unauthorized users to read, modify, or delete sensitive contact data without valid credentials. No patch is currently available.
Authentication Bypass
Contact Management System
-
CVE-2026-2173
HIGH
CVSS 7.3
SQL injection in code-projects Online Examination System 1.0 allows unauthenticated remote attackers to manipulate the username and password parameters in login.php, potentially enabling unauthorized access to sensitive data or system compromise. The vulnerability requires no user interaction and can be exploited over the network with low complexity. No patch is currently available for this issue.
PHP
SQLi
Online Examination System
-
CVE-2026-2172
HIGH
CVSS 7.3
Online Application System For Admission versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 7.3).
PHP
SQLi
Online Application System For Admission
-
CVE-2026-2171
HIGH
CVSS 7.3
SQL injection in the login function of code-projects Online Student Management System 1.0 allows unauthenticated attackers to manipulate username and password parameters in accounts.php, enabling unauthorized data access, modification, and potential service disruption. Public exploit code is available for this vulnerability, increasing exploitation risk. No patch is currently available.
PHP
SQLi
Online Student Management System
-
CVE-2026-2166
HIGH
CVSS 7.3
SQL injection in the Online Reviewer System 1.0 login function allows unauthenticated remote attackers to manipulate username and password parameters, potentially enabling unauthorized database access and data modification. With public exploit code available and no patch released, this vulnerability poses an immediate risk to deployed instances.
PHP
SQLi
Online Reviewer System
-
CVE-2026-2165
HIGH
CVSS 7.3
Detronetdip E-commerce 1.0.0 contains an authentication bypass vulnerability in the seller account creation endpoint that allows unauthenticated remote attackers to manipulate the email parameter and gain unauthorized access. The vulnerability affects PHP-based e-commerce installations and has public exploit code available, though no patch is currently available from the vendor.
PHP
E Commerce
-
CVE-2026-2164
HIGH
CVSS 7.3
Unrestricted file upload in detronetdip E-commerce 1.0.0 via the /seller/assets/backend/profile/addadhar.php endpoint allows unauthenticated remote attackers to upload arbitrary files. Public exploit code exists for this vulnerability, and the vendor has not yet released a patch despite early notification.
PHP
E Commerce
-
CVE-2026-2161
HIGH
CVSS 7.3
SQL injection in itsourcecode Directory Management System 1.0 allows unauthenticated remote attackers to manipulate the email parameter in /admin/forget-password.php and execute arbitrary database queries. Public exploit code exists for this vulnerability and no patch is currently available. An attacker can leverage this to extract sensitive data or modify database contents with minimal complexity.
PHP
SQLi
Directory Management System
-
CVE-2026-2158
HIGH
CVSS 7.3
SQL injection in the Student Web Portal 1.0 /check_user.php endpoint allows unauthenticated remote attackers to manipulate the Username parameter and execute arbitrary database queries. The vulnerability enables attackers to read, modify, or delete sensitive data with public exploit code readily available. This affects PHP-based installations of the Student Web Portal with no patch currently available.
PHP
SQLi
Student Web Portal
-
CVE-2026-2157
HIGH
CVSS 7.2
Remote code execution in D-Link DIR-823X routers through OS command injection in the static route configuration endpoint allows unauthenticated remote attackers to execute arbitrary commands with high privileges. The vulnerability affects the /goform/set_static_route_table function and can be exploited by manipulating interface, destination IP, netmask, gateway, or metric parameters. Public exploit code exists for this vulnerability, and no patch is currently available.
D-Link
Command Injection
Dir 823x Firmware
-
CVE-2026-2155
HIGH
CVSS 7.2
Remote code execution in D-Link DIR-823X routers through OS command injection in the DMZ configuration handler allows unauthenticated attackers to execute arbitrary commands on affected devices. The vulnerability exists in the /goform/set_dmz endpoint where the dmz_host and dmz_enable parameters are insufficiently sanitized, and public exploit code is currently available. Organizations using DIR-823X firmware should prioritize patching as no official fix is currently available.
D-Link
Command Injection
Dir 823x Firmware
-
CVE-2026-2152
HIGH
CVSS 7.2
Unauthenticated remote attackers can execute arbitrary OS commands on D-Link DIR-615 4.10 routers through manipulated routing parameters in the web configuration interface, requiring only network access and no user interaction. Public exploit code is available for this vulnerability, and D-Link has not released a patch for the end-of-life device.
D-Link
PHP
Command Injection
Dir 615 Firmware
-
CVE-2026-2151
HIGH
CVSS 7.2
Remote code execution in D-Link DIR-615 firmware through os command injection via the dmz_ipaddr parameter in the DMZ Host Feature allows authenticated attackers to execute arbitrary commands with high privileges. Public exploit code exists for this vulnerability, which affects unsupported product versions with no available patch. The attack requires high-level authentication but can be launched over the network without user interaction.
D-Link
PHP
Command Injection
Dir 615 Firmware
-
CVE-2026-2143
HIGH
CVSS 7.2
Unauthenticated attackers can achieve remote code execution on D-Link DIR-823X routers through OS command injection in the DDNS service component via the /goform/set_ddns endpoint. The vulnerability allows manipulation of DDNS parameters (ddnsType, ddnsDomain, ddnsUserName, ddnsPwd) to execute arbitrary system commands with high privileges. Public exploit code exists and no patch is currently available.
D-Link
Command Injection
Dir 823x Firmware
-
CVE-2026-2142
HIGH
CVSS 7.2
Remote code execution in D-Link DIR-823X firmware via command injection in the QoS configuration function allows unauthenticated attackers to execute arbitrary OS commands over the network. The vulnerability affects the /goform/set_qos endpoint and has public exploit code available, increasing the risk of active exploitation. No patch is currently available.
D-Link
Command Injection
Dir 823x Firmware
-
CVE-2026-2140
HIGH
CVSS 8.8
Remote code execution in Tenda TX9 firmware through version 22.03.02.10_multi allows authenticated attackers to achieve complete system compromise via a buffer overflow in the /goform/setMacFilterCfg endpoint. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires valid credentials but can be executed over the network with high impact on confidentiality, integrity, and availability.
Buffer Overflow
Tx9 Firmware
-
CVE-2026-2139
HIGH
CVSS 8.8
Buffer overflow in Tenda TX9 firmware versions up to 22.03.02.10_multi allows authenticated remote attackers to achieve full system compromise through a malicious SSID parameter in the WiFi configuration interface. Public exploit code is available for this vulnerability, and no patch has been released. The high CVSS score of 8.8 reflects the ability to execute arbitrary code with complete confidentiality, integrity, and availability impact.
Buffer Overflow
Tx9 Firmware
-
CVE-2026-2138
HIGH
CVSS 8.8
Remote code execution in Tenda TX9 firmware versions up to 22.03.02.10_multi through a buffer overflow in the static route configuration function allows authenticated attackers to achieve full system compromise. Public exploit code exists for this vulnerability, significantly increasing the risk of active exploitation. No patch is currently available, making this a critical threat requiring immediate network segmentation or device replacement.
Buffer Overflow
Tx9 Firmware
-
CVE-2026-2137
HIGH
CVSS 8.8
Remote code execution in Tenda TX3 firmware through version 16.03.13.11_multi allows authenticated attackers to execute arbitrary code via buffer overflow in the /goform/SetIpMacBind endpoint. Public exploit code exists for this vulnerability and no patch is currently available. This high-severity flaw requires valid credentials but can be exploited over the network without user interaction.
Buffer Overflow
Tx3 Firmware
-
CVE-2026-2136
HIGH
CVSS 7.3
Online Food Ordering System versions up to 1.0 contains a vulnerability that allows attackers to sql injection (CVSS 7.3).
PHP
SQLi
Online Food Ordering System
-
CVE-2026-2133
HIGH
CVSS 7.3
Unrestricted file upload in Online Music Site 1.0's AdminUpdateCategory.php allows unauthenticated remote attackers to upload arbitrary files by manipulating the txtimage parameter. Public exploit code exists for this vulnerability, enabling potential remote code execution and system compromise. A security patch is not currently available, leaving affected installations vulnerable to active exploitation.
PHP
Online Music Site
-
CVE-2026-2132
HIGH
CVSS 7.3
SQL injection in Online Music Site 1.0's AdminUpdateCategory.php allows unauthenticated remote attackers to manipulate the txtcat parameter and execute arbitrary SQL queries. Public exploit code exists for this vulnerability, with no patch currently available. The attack requires no user interaction and can compromise the confidentiality, integrity, and availability of the underlying database.
PHP
SQLi
Online Music Site
-
CVE-2026-2129
HIGH
CVSS 7.2
Unauthenticated remote attackers can execute arbitrary OS commands on D-Link DIR-823X routers through command injection in the /goform/set_ac_status endpoint via manipulation of ac_ipaddr, ac_ipstatus, or ap_randtime parameters. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected devices at immediate risk.
D-Link
Command Injection
Dir 823x Firmware
-
CVE-2026-2120
HIGH
CVSS 7.2
Remote code execution in D-Link DIR-823X routers through OS command injection in the /goform/set_server_settings endpoint allows unauthenticated attackers to execute arbitrary commands by manipulating terminal_addr, server_ip, or server_port parameters. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected devices at high risk.
D-Link
Command Injection
Dir 823x Firmware
-
CVE-2026-2118
HIGH
CVSS 7.2
810 Firmware versions up to 1.7.4-141218 contains a vulnerability that allows attackers to command injection (CVSS 7.2).
Command Injection
810 Firmware
-
CVE-2026-2117
HIGH
CVSS 7.3
SQL injection in itsourcecode Society Management System 1.0 allows unauthenticated remote attackers to manipulate the activity_id parameter in /admin/edit_activity.php, enabling data exfiltration, modification, or denial of service. Public exploit code exists for this vulnerability, and no patch is currently available.
PHP
SQLi
Society Management System
-
CVE-2026-2116
HIGH
CVSS 7.3
SQL injection in itsourcecode Society Management System 1.0's expense editing functionality allows unauthenticated remote attackers to manipulate the expenses_id parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and no patch is currently available. The flaw enables attackers to access, modify, or delete sensitive financial data with minimal complexity.
PHP
SQLi
Society Management System
-
CVE-2025-15100
HIGH
CVSS 8.8
The JAY Login & Register plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.6.03. This is due to the plugin allowing a user to update arbitrary user meta through the 'jay_panel_ajax_update_profile' function. [CVSS 8.8 HIGH]
WordPress
Privilege Escalation
PHP
-
CVE-2026-2209
MEDIUM
CVSS 6.3
Wekan versions up to 8.18 contain an authorization bypass in the custom translation handler that allows authenticated users to manipulate translation settings they should not have access to. An attacker with valid credentials can exploit the setCreateTranslation function to gain unauthorized access to modify translations, potentially affecting application functionality and data integrity. The vulnerability has been patched in version 8.19 and users should upgrade immediately.
Information Disclosure
Wekan
-
CVE-2026-2208
MEDIUM
CVSS 4.3
Wekan versions up to 8.20 contain an authorization bypass in the Rules Handler component that allows authenticated remote attackers to access unauthorized information through the rules.js file. The vulnerability requires valid credentials but no user interaction, enabling low-impact confidentiality breaches. Upgrading to version 8.21 resolves this issue.
Authentication Bypass
Wekan
-
CVE-2026-2207
MEDIUM
CVSS 5.3
WeKan versions up to 8.20 contain an information disclosure vulnerability in the Activity Publication Handler that allows unauthenticated remote attackers to access sensitive data through manipulation of the activities.js file. The vulnerability requires no user interaction and can be exploited over the network with low complexity. Users should upgrade to version 8.21 or apply patch 91a936e07d2976d4246dfe834281c3aaa87f9503 to remediate this issue.
Information Disclosure
Wekan
-
CVE-2026-2206
MEDIUM
CVSS 6.3
Improper access controls in WeKan's administrative repair handler (fixDuplicateLists.js) allow authenticated remote attackers to manipulate list data and gain unauthorized access to sensitive information. Affected versions through 8.20 can be remediated by upgrading to version 8.21 or applying the referenced patch.
Information Disclosure
Wekan
-
CVE-2026-2205
MEDIUM
CVSS 4.3
WeKan versions up to 8.20 contain an information disclosure vulnerability in the Meteor Publication Handler's card publication mechanism that allows authenticated remote attackers to access sensitive data. The vulnerability requires valid credentials but no user interaction to exploit, and is resolved in version 8.21.
Information Disclosure
Wekan
-
CVE-2026-2193
MEDIUM
CVSS 6.3
Command injection in D-Link DI-7100G C1 firmware version 24.04.18D1 allows authenticated remote attackers to execute arbitrary commands through manipulation of the usb_username parameter in the set_jhttpd_info function. Public exploit code exists for this vulnerability, and no patch is currently available. The medium-severity flaw requires valid credentials but can be exploited over the network with minimal complexity.
D-Link
Command Injection
Di 7100g C1 Firmware
-
CVE-2026-2183
MEDIUM
CVSS 6.3
Unrestricted file upload in Great Developers Certificate Generation System's CSV processing endpoint allows authenticated attackers to upload arbitrary files remotely. Public exploit code exists for this vulnerability, though no patch is available and the project is no longer actively maintained. The vulnerability affects PHP-based certificate generation functionality with medium severity (CVSS 6.3).
PHP
Certificate
-
CVE-2026-2179
MEDIUM
CVSS 4.7
SQL injection in PHPGurukul Hospital Management System 4.0's user management interface allows remote attackers with administrative privileges to manipulate the ID parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, though no patch is currently available. The attack requires high-level credentials but poses risks to data confidentiality, integrity, and availability within affected hospital deployments.
PHP
SQLi
Hospital Management System
-
CVE-2026-2178
MEDIUM
CVSS 6.3
Command injection in Xcode MCP Server's LLDB integration allows authenticated network attackers to execute arbitrary commands by manipulating the args parameter in the registerXcodeTools function. Public exploit code exists for this vulnerability, increasing the practical risk to organizations using affected versions. Users should apply the available patch to remediate this medium-severity flaw affecting the AI/ML tooling component.
Command Injection
AI / ML
Xcode Mcp Server
-
CVE-2026-2176
MEDIUM
CVSS 6.3
SQL injection in code-projects Contact Management System 1.0 allows authenticated remote attackers to manipulate the selecteditem[0] parameter in index.py and execute arbitrary SQL queries. The vulnerability requires valid user credentials but enables data exfiltration, modification, and potential system compromise. No patch is currently available.
SQLi
Contact Management System
-
CVE-2026-2169
MEDIUM
CVSS 6.3
Command injection in D-Link DWR-M921 firmware via the fota_url parameter allows authenticated remote attackers to execute arbitrary commands with network access. The vulnerability affects firmware version 1.1.50 and has public exploit code available. A patch is not currently available.
D-Link
Command Injection
Dwr M921 Firmware
-
CVE-2026-2168
MEDIUM
CVSS 6.3
D-Link DWR-M921 firmware versions up to 1.1.50 contain a command injection vulnerability in the LTE firmware update function that allows authenticated remote attackers to execute arbitrary commands via a manipulated fota_url parameter. Public exploit code is available for this vulnerability, and no patch is currently available. An attacker with network access and valid credentials could achieve remote code execution on affected devices.
D-Link
Command Injection
Dwr M921 Firmware
-
CVE-2026-2167
MEDIUM
CVSS 6.3
OS command injection in Totolik WA300 firmware via the setAPNetwork function allows authenticated remote attackers to execute arbitrary commands with network access. Public exploit code exists for this vulnerability, and no patch is currently available. The flaw affects firmware version 5.2cu.7112_B20190227 and impacts the /cgi-bin/cstecgi.cgi endpoint through manipulation of the Ipaddr parameter.
Command Injection
Wa300 Firmware
-
CVE-2026-2163
MEDIUM
CVSS 4.7
Command injection in D-Link DIR-600 firmware through the ssdp.cgi file allows remote attackers to execute arbitrary commands by manipulating HTTP parameters (HTTP_ST, REMOTE_ADDR, REMOTE_PORT, SERVER_ID). Public exploit code exists for this vulnerability, though it affects only unsupported product versions. The attack requires high-level privileges but has low complexity and impacts confidentiality, integrity, and availability.
D-Link
Command Injection
Dir 600 Firmware
-
CVE-2026-2162
MEDIUM
CVSS 4.7
SQL injection in the News Portal Project 1.0 admin panel (/admin/aboutus.php) allows authenticated attackers with high privileges to manipulate the pagetitle parameter and execute arbitrary SQL queries, potentially compromising database integrity and confidentiality. Public exploit code exists for this vulnerability, and no patch is currently available. The attack requires network access and valid administrative credentials but no user interaction.
PHP
SQLi
News Portal Project
-
CVE-2026-2160
MEDIUM
CVSS 4.3
Simple Responsive Tourism Website versions up to 1.0 is affected by cross-site scripting (xss) (CVSS 4.3).
PHP
XSS
Simple Responsive Tourism Website
-
CVE-2026-2159
MEDIUM
CVSS 4.3
Simple Responsive Tourism Website versions up to 1.0 is affected by cross-site scripting (xss) (CVSS 4.3).
PHP
XSS
Simple Responsive Tourism Website
-
CVE-2026-2154
MEDIUM
CVSS 4.3
Patients Waiting Area Queue Management System versions up to 1.0 is affected by cross-site scripting (xss) (CVSS 4.3).
PHP
XSS
Patients Waiting Area Queue Management System
-
CVE-2026-2153
MEDIUM
CVSS 4.3
Doorman versions up to 0.6. is affected by url redirection to untrusted site (open redirect) (CVSS 4.3).
Open Redirect
Doorman
-
CVE-2026-2150
MEDIUM
CVSS 4.3
Patients Waiting Area Queue Management System versions up to 1.0 is affected by cross-site scripting (xss) (CVSS 4.3).
PHP
XSS
Patients Waiting Area Queue Management System
-
CVE-2026-2149
MEDIUM
CVSS 4.3
Patients Waiting Area Queue Management System versions up to 1.0 is affected by cross-site scripting (xss) (CVSS 4.3).
PHP
XSS
Patients Waiting Area Queue Management System
-
CVE-2026-2148
MEDIUM
CVSS 5.3
Tenda AC21 firmware version 16.03.08.16 contains an information disclosure vulnerability in the /cgi-bin/DownloadFlash web management interface that allows unauthenticated remote attackers to access sensitive data. Public exploit code exists for this vulnerability, and no patch is currently available, leaving affected devices at risk of data exposure.
Information Disclosure
Ac21 Firmware
-
CVE-2026-2147
MEDIUM
CVSS 5.3
Tenda AC21 firmware version 16.03.08.16 contains an information disclosure vulnerability in the web management interface's /cgi-bin/DownloadLog endpoint that allows unauthenticated remote attackers to access sensitive data. Public exploit code is available for this vulnerability, increasing the risk of active exploitation. No patch is currently available for affected devices.
Information Disclosure
Ac21 Firmware
-
CVE-2026-2146
MEDIUM
CVSS 6.3
Unrestricted file upload in Yshopmall up to version 1.9.1 allows authenticated attackers to upload arbitrary files via manipulation of the updateAvatar function in the FileUtil component. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. The vendor has not yet released a patch despite early notification.
File Upload
Authentication Bypass
Yshopmall
-
CVE-2026-2141
MEDIUM
CVSS 6.3
Improper authorization in WukongCRM up to version 11.3.3 allows authenticated remote attackers to manipulate URL handling logic and bypass access controls. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite early notification. The flaw affects the PermissionServiceImpl component and enables attackers to gain unauthorized access to restricted functionality.
Java
Wukongcrm
Suse
-
CVE-2026-2135
MEDIUM
CVSS 6.3
Command injection in UTT HiPER 810 Firmware version 1.7.4-141218 allows authenticated remote attackers to execute arbitrary commands through manipulation of the policyNames parameter in the /goform/formPdbUpConfig endpoint. Public exploit code exists for this vulnerability, and no patch is currently available. Attackers with login credentials can achieve code execution with minimal complexity.
Command Injection
810 Firmware
-
CVE-2026-2134
MEDIUM
CVSS 4.7
PHPGurukul Hospital Management System 4.0 contains a SQL injection vulnerability in the doctor management interface that allows authenticated remote attackers to manipulate the ID parameter and execute arbitrary database queries. Public exploit code exists for this vulnerability, and no patch is currently available. An attacker with administrative credentials could potentially extract or modify sensitive hospital data.
PHP
SQLi
Hospital Management System
-
CVE-2026-2131
MEDIUM
CVSS 6.3
OS command injection in XixianLiang HarmonyOS-mcp-server 0.1.0 allows authenticated remote attackers to execute arbitrary commands through unsanitized input to the input_text function. Public exploit code exists for this vulnerability, and no patch is currently available. An attacker with valid credentials can exploit this over the network to achieve remote code execution with limited complexity.
Command Injection
AI / ML
Harmonyos Mcp Server
-
CVE-2026-2130
MEDIUM
CVSS 6.3
Maigret Mcp Server versions up to 1.0.12. contains a vulnerability that allows attackers to command injection (CVSS 6.3).
Command Injection
AI / ML
Maigret Mcp Server
-
CVE-2026-2122
MEDIUM
CVSS 6.3
SQL injection in Xiaopi Panel's WAF Firewall component (up to version 20260126) allows authenticated remote attackers to manipulate the ID parameter in /demo.php and execute arbitrary SQL queries. Public exploit code is available and the vendor has not provided a patch despite early notification. This vulnerability requires valid credentials to exploit but enables attackers to access or modify sensitive database information.
PHP
SQLi
Panel
-
CVE-2026-2156
LOW
CVSS 2.4
Online Student Management System versions up to 1.0 is affected by cross-site scripting (xss) (CVSS 2.4).
PHP
XSS
-
CVE-2026-2145
LOW
CVSS 3.5
A vulnerability was identified in cym1102 nginxWebUI up to 4.3.7. The impacted element is an unknown function of the file /adminPage/conf/check of the component Web Management Interface. [CVSS 3.5 LOW]
Nginx
XSS