{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T04:26:12.843","vulnerabilities":[{"cve":{"id":"CVE-2026-32968","sourceIdentifier":"info@cert.vde.com","published":"2026-03-23T12:16:08.407","lastModified":"2026-03-23T14:31:37.267","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"Due to the improper neutralisation of special elements used in an OS command, an unauthenticated remote attacker can exploit an RCE vulnerability in the com_mb24sysapi module, resulting in full system compromise. This vulnerability is a variant attack for CVE-2020-10383."},{"lang":"es","value":"Debido a la neutralización incorrecta de elementos especiales utilizados en un comando del SO, un atacante remoto no autenticado puede explotar una vulnerabilidad RCE en el módulo com_mb24sysapi, resultando en un compromiso total del sistema. Esta vulnerabilidad es un ataque variante para CVE-2020-10383."}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"references":[{"url":"https://certvde.com/de/advisories/VDE-2026-024","source":"info@cert.vde.com"},{"url":"https://certvde.com/de/advisories/VDE-2026-025","source":"info@cert.vde.com"}]}}]}