In a statement issued Friday, the Commission said it had detected an incident affecting the Europa.eu web portal, the European Union’s central online platform hosting websites and services for its institutions.
Some weeks are loud. This one was quieter but not in a good way. Long-running operations are finally hitting courtrooms, old attack methods are showing up in new places, and research that stopped being theoretical right around the time defenders stopped paying attention.
There's a bit of everything this week. Persistence plays, legal wins, influence ops, and at least one thing that looks boring
A vulnerability has been found in ON24 Q&A Chat and classified as problematic. Affected by this vulnerability is an unknown functionality of the file console-survey/api/v1/answer/ of the component History Handler. Performing a manipulation results in authorization bypass.
This vulnerability is cataloged as CVE-2026-3321. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in code-projects Online Food Ordering System 1.0. Affected is an unknown function of the file /form/order.php of the component Order Module. Such manipulation of the argument cust_id leads to cross site scripting.
This vulnerability is listed as CVE-2026-5157. The attack may be performed from remote. In addition, an exploit is available.
A vulnerability, which was classified as critical, has been found in Tenda CH22 1.0.0.1. This impacts the function formQuickIndex of the file /goform/QuickIndex of the component Parameter Handler. This manipulation of the argument mit_linktype causes stack-based buffer overflow.
This vulnerability is tracked as CVE-2026-5156. The attack is possible to be carried out remotely. Moreover, an exploit is present.
A vulnerability classified as critical was found in Tenda CH22 1.0.0.1. This affects the function fromAdvSetWan of the file /goform/AdvSetWan of the component Parameter Handler. The manipulation of the argument wanmode results in stack-based buffer overflow.
This vulnerability is identified as CVE-2026-5155. The attack can be executed remotely. Additionally, an exploit exists.
A vulnerability classified as critical has been found in Tenda CH22 1.0.0.1/1.If. The impacted element is the function fromSetCfm of the file /goform/setcfm of the component Parameter Handler. The manipulation of the argument funcname leads to stack-based buffer overflow.
This vulnerability is referenced as CVE-2026-5154. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
A vulnerability described as critical has been identified in Tenda CH22 1.0.0.1. The affected element is the function FormWriteFacMac of the file /goform/WriteFacMac. Executing a manipulation of the argument mac can lead to command injection.
The identification of this vulnerability is CVE-2026-5153. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability marked as critical has been reported in Tenda CH22 1.0.0.1. Impacted is the function formCreateFileName of the file /goform/createFileName. Performing a manipulation of the argument fileNameMit results in stack-based buffer overflow.
This vulnerability was named CVE-2026-5152. The attack may be initiated remotely. In addition, an exploit is available.