2026年3月9日星期一

Microsoft Edge 多個漏洞

Microsoft Edge 多個漏洞

發佈日期: 2026年03月09日

風險: 中度風險

類型: 用戶端 - 瀏覽器

於 Microsoft Edge 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼、阻斷服務狀況、繞過保安限制、資料篡改及洩露敏感資料。


Microsoft Edge Multiple Vulnerabilities

Microsoft Edge Multiple Vulnerabilities

Release Date: 9 Mar 2026

RISK: Medium Risk

TYPE: Clients - Browsers

Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, data manipulation and sensitive information disclosure on the targeted system.


pac4j-jwt 繞過保安限制漏洞

pac4j-jwt 繞過保安限制漏洞

發佈日期: 2026年03月09日

風險: 中度風險

類型: 伺服器 - 網站伺服器

於 pac4j-jwt 發現一個漏洞。遠端攻擊者可利用此漏洞,於目標系統觸發繞過保安限制。

 

注意:

CVE-2026-29000 的概念驗證碼已被公開。攻擊者若掌握伺服器的 RSA 公鑰,即可建立包含任意主題和角色聲明的 JWE 封裝的 PlainJWT,從而繞過簽章驗證,以包含管理員在內的任何使用者身分進行驗證。因此,風險等級被評為中等風險。


影響

  • 繞過保安限制

受影響之系統或技術

  • 如果您使用的是 4.x 系列版本:請升級至 4.5.9(或更高版本)

  • 如果您使用的是 5.x 系列版本:請升級至 5.7.9(或更高版本)

  • 如果您使用的是 6.x 系列版本:請升級至 6.3.3(或更高版本)


解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

pac4j-jwt Security Restriction Bypass Vulnerability

pac4j-jwt Security Restriction Bypass Vulnerability

Release Date: 9 Mar 2026

RISK: Medium Risk

TYPE: Servers - Web Servers

A vulnerability has been identified in pac4j-jwt. A remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system.

 

Note:

Proof of Concept exploit code Is publicly available for CVE-2026-29000. Attackers who possess the server's RSA public key can create a JWE-wrapped PlainJWT with arbitrary subject and role claims, bypassing signature verification to authenticate as any user including administrators. Hence, the risk level is rated as Medium Risk.


Impact

  • Security Restriction Bypass

System / Technologies affected

  • If you use the 4.x line: upgrade to 4.5.9 (or newer)
  • If you use the 5.x line: upgrade to 5.7.9 (or newer)
  • If you use the 6.x line: upgrade to 6.3.3 (or newer)

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

2026年3月6日星期五

Google Chrome 多個漏洞

Google Chrome 多個漏洞

發佈日期: 2026年03月06日

風險: 中度風險

類型: 用戶端 - 瀏覽器

於 Google Chrome 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼、阻斷服務狀況、繞過保安限制、資料篡改及洩露敏感資料。

 

影響

  • 資料洩露
  • 篡改
  • 繞過保安限制
  • 阻斷服務
  • 遠端執行程式碼

受影響之系統或技術

  • Google Chrome 145.0.7632.159 (Linux) 之前的版本
  • Google Chrome 145.0.7632.159/160 (Mac) 之前的版本
  • Google Chrome 145.0.7632.159/160 (Windows) 之前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

安裝軟件供應商提供的修補程式:

  • 更新至 145.0.7632.159 (Linux) 或之後版本
  • 更新至 145.0.7632.159/160 (Mac) 或之後版本
  • 更新至 145.0.7632.159/160 (Windows) 或之後版本

漏洞識別碼


資料來源


相關連結

Google Chrome Multiple Vulnerabilities

Google Chrome Multiple Vulnerabilities

Release Date: 6 Mar 2026

RISK: Medium Risk

TYPE: Clients - Browsers

Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, data manipulation and sensitive information disclosure on the targeted system.


Impact

  • Information Disclosure
  • Data Manipulation
  • Security Restriction Bypass
  • Denial of Service
  • Remote Code Execution

System / Technologies affected

  • Google Chrome prior to 145.0.7632.159 (Linux)
  • Google Chrome prior to 145.0.7632.159/160 (Mac)
  • Google Chrome prior to 145.0.7632.159/160 (Windows)

Solutions

Before installation of the software, please visit the software vendor web-site for more details.

Apply fixes issued by the vendor:

  • Update to version 145.0.7632.159 (Linux) or later
  • Update to version 145.0.7632.159/160 (Mac) or later
  • Update to version 145.0.7632.159/160 (Windows) or later

Vulnerability Identifier


Source


Related Link

2026年3月5日星期四

Aruba Products Multiple Vulnerabilities

Aruba Products Multiple Vulnerabilities

Release Date: 5 Mar 2026

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

Multiple vulnerabilities were identified in Aruba Products. A remote attacker could exploit these vulnerabilities to trigger denial of service condition, security restriction bypass, sensitive information disclosure and spoofing on the targeted system.


Impact

  • Spoofing
  • Information Disclosure
  • Security Restriction Bypass
  • Denial of Service

System / Technologies affected

  • AOS-8.10.x.x: 8.10.0.21 and below
  • AOS-8.12.x.x: 8.12.0.6 and below
  • AOS-8.13.x.x: 8.13.1.1 and below
  • AOS-10.4.x.x: 10.4.1.10 and below
  • AOS-10.7.x.x: 10.7.2.2 and below
  • AOS-10.8.x.x: 10.8.0.0 and below

 

HPE Aruba Networking End of Maintenance (EoM) Software Version(s):

 

  • AOS-10.6.x.x: all
  • AOS-10.5.x.x: all
  • AOS-10.3.x.x: all
  • AOS-8.12.x.x: all
  • AOS-8.11.x.x: all
  • AOS-8.9.x.x: all
  • AOS-8.8.x.x: all
  • AOS-8.7.x.x: all
  • AOS-8.6.x.x: all
  • AOS-6.5.4.x: all
  • SD-WAN 8.7.0.0-2.3.0.x: all
  • SD-WAN 8.6.0.4-2.2.x.x: all

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:

Note: End of Maintenance (EoM) versions are not addressed by the provided solution.


Vulnerability Identifier


Source


Related Link

思科產品多個漏洞

思科產品多個漏洞

發佈日期: 2026年03月05日

風險: 中度風險

類型: 保安軟件及應用設備 - 保安軟件及應用設備

於思科產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、彷冒、遠端執行任意程式碼、洩露敏感資料、跨網站指令碼、資料篡改及繞過保安限制。


影響

  • 阻斷服務
  • 繞過保安限制
  • 遠端執行程式碼
  • 跨網站指令碼
  • 資料洩露
  • 仿冒
  • 篡改
  • 權限提升

受影響之系統或技術

  • Cisco Secure Firewall Adaptive Security Appliance (ASA)
  • Cisco Secure Firewall Management Center (FMC)
  • Cisco Secure Firewall Threat Defense (FTD)
  • ClamAV

請參考供應商發佈的連結以了解受影響的版本:


解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

Cisco Products Multiple Vulnerabilities

Cisco Products Multiple Vulnerabilities

Release Date: 5 Mar 2026

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

Multiple vulnerabilities were identified in Cisco products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, spoofing, remote code execution, sensitive information disclosure, cross-site scripting, data manipulation and security restriction bypass on the targeted system.


Impact

  • Denial of Service
  • Security Restriction Bypass
  • Remote Code Execution
  • Cross-Site Scripting
  • Information Disclosure
  • Spoofing
  • Data Manipulation
  • Elevation of Privilege

System / Technologies affected

  • Cisco Secure Firewall Adaptive Security Appliance (ASA)
  • Cisco Secure Firewall Management Center (FMC)
  • Cisco Secure Firewall Threat Defense (FTD)
  • ClamAV

For affected versions, please refer to the link issued by the vendor:


Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

2026年3月3日星期二

Android 多個漏洞

Android 多個漏洞

發佈日期: 2026年03月03日

風險: 中度風險

類型: 操作系統 - 流動裝置及操作系統

於 Android 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發執行任意程式碼、洩露敏感資料、阻斷服務狀況及權限提升。


Android Multiple Vulnerabilities

Android Multiple Vulnerabilities

Release Date: 3 Mar 2026

RISK: Medium Risk

TYPE: Operating Systems - Mobile & Apps

Multiple vulnerabilities were identified in Android. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, sensitive information disclosure, denial of service condition and elevation of privilege on the targeted system.


Microsoft Edge 多個漏洞

Microsoft Edge 多個漏洞 發佈日期: 2026年03月09日 風險: 中度風險 類型: 用戶端 - 瀏覽器 於 Microsoft...