##
Updated at UTC 2026-01-08T23:09:19.127029
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-15464 | 7.5 | 0.00% | 1 | 0 | 2026-01-08T22:16:01.950000 | Exported Activity allows external applications to gain application context and d | |
| CVE-2025-50334 | 7.5 | 0.00% | 2 | 0 | 2026-01-08T21:31:39 | An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a den | |
| CVE-2025-59468 | 9.0 | 0.00% | 2 | 0 | 2026-01-08T21:31:39 | This vulnerability allows a Backup Administrator to perform remote code executio | |
| CVE-2025-14025 | 8.6 | 0.00% | 1 | 0 | 2026-01-08T21:31:39 | A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 A | |
| CVE-2025-52691 | 10.0 | 0.23% | 5 | 9 | 2026-01-08T21:31:33 | Successful exploitation of the vulnerability could allow an unauthenticated atta | |
| CVE-2025-66916 | 9.4 | 0.00% | 1 | 0 | 2026-01-08T21:30:40 | The snailjob component in RuoYi-Vue-Plus versions 5.5.1 and earlier, interface / | |
| CVE-2025-66913 | 9.8 | 0.00% | 1 | 0 | 2026-01-08T21:30:40 | JimuReport thru version 2.1.3 is vulnerable to remote code execution when proces | |
| CVE-2025-65518 | 7.5 | 0.00% | 2 | 1 | 2026-01-08T21:30:40 | Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Serv | |
| CVE-2025-65731 | None | 0.00% | 1 | 1 | 2026-01-08T21:30:40 | An issue was discovered in D-Link Router DIR-605L (Hardware version F1; Firmware | |
| CVE-2025-68719 | 8.8 | 0.00% | 1 | 0 | 2026-01-08T21:15:43.603000 | KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 mishandle configuration managem | |
| CVE-2025-68717 | 9.4 | 0.00% | 3 | 0 | 2026-01-08T21:15:43.353000 | KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass dur | |
| CVE-2025-68716 | 8.4 | 0.00% | 1 | 0 | 2026-01-08T21:15:43.187000 | KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled | |
| CVE-2025-15346 | None | 0.06% | 1 | 0 | 2026-01-08T20:57:58 | A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Py | |
| CVE-2026-21858 | 10.0 | 0.03% | 10 | 3 | 2026-01-08T20:15:45.453000 | n8n is an open source workflow automation platform. Versions starting with 1.65. | |
| CVE-2025-61548 | 9.8 | 0.00% | 1 | 0 | 2026-01-08T20:15:44.070000 | SQL Injection is present on the hfInventoryDistFormID parameter in the /PSP/appN | |
| CVE-2025-61246 | 9.8 | 0.00% | 1 | 1 | 2026-01-08T20:15:43.923000 | indieka900 online-shopping-system-php 1.0 is vulnerable to SQL Injection in mast | |
| CVE-2025-56424 | 7.5 | 0.00% | 1 | 0 | 2026-01-08T20:15:43.677000 | An issue in Insiders Technologies GmbH e-invoice pro before release 1 Service Pa | |
| CVE-2025-13151 | 7.5 | 0.04% | 1 | 0 | 2026-01-08T19:15:55.983000 | Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to | |
| CVE-2017-20216 | 9.8 | 0.31% | 1 | 0 | 2026-01-08T19:15:54.793000 | FLIR Thermal Camera PT-Series firmware version 8.0.0.64 contains multiple unauth | |
| CVE-2017-20215 | 8.8 | 0.26% | 1 | 0 | 2026-01-08T19:15:54.677000 | FLIR Thermal Camera FC-S/PT firmware version 8.0.0.64 contains an authenticated | |
| CVE-2025-12543 | 9.6 | 0.10% | 1 | 0 | 2026-01-08T18:31:46 | A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBo | |
| CVE-2025-15026 | 9.8 | 0.03% | 1 | 0 | 2026-01-08T18:31:36 | Missing Authentication for Critical Function vulnerability in Centreon Infra Mon | |
| CVE-2025-15029 | 9.8 | 0.02% | 1 | 0 | 2026-01-08T18:31:36 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2025-12513 | 6.8 | 0.01% | 1 | 0 | 2026-01-08T18:31:36 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2025-5965 | 7.2 | 0.10% | 1 | 0 | 2026-01-08T18:31:36 | In the backup parameters, a user with high privilege is able to concatenate cust | |
| CVE-2025-12519 | 5.3 | 0.01% | 1 | 0 | 2026-01-08T18:31:36 | Missing Authorization vulnerability in Centreon Infra Monitoring (Administration | |
| CVE-2026-22230 | 7.6 | 0.00% | 1 | 0 | 2026-01-08T18:30:57 | OPEXUS eCASE Audit allows an authenticated attacker to modify client-side JavaSc | |
| CVE-2026-22235 | 7.5 | 0.00% | 1 | 0 | 2026-01-08T18:30:57 | OPEXUS eComplaint before version 9.0.45.0 allows an attacker to visit the the 'D | |
| CVE-2025-55125 | 7.8 | 0.00% | 3 | 0 | 2026-01-08T18:30:56 | This vulnerability allows a Backup or Tape Operator to perform remote code execu | |
| CVE-2025-59470 | 9.0 | 0.00% | 7 | 1 | 2026-01-08T18:30:56 | This vulnerability allows a Backup Operator to perform remote code execution (RC | |
| CVE-2025-59469 | 9.0 | 0.00% | 3 | 0 | 2026-01-08T18:30:56 | This vulnerability allows a Backup or Tape Operator to write files as root. | |
| CVE-2025-67090 | 5.1 | 0.00% | 1 | 0 | 2026-01-08T18:30:56 | The LuCI web interface on Gl Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulne | |
| CVE-2025-67091 | 6.5 | 0.00% | 1 | 0 | 2026-01-08T18:30:56 | An issue in GL Inet GL.Inet AX1800 Version 4.6.4 & 4.6.8 are vulnerable. GL.Inet | |
| CVE-2025-67089 | 8.1 | 0.00% | 1 | 0 | 2026-01-08T18:30:56 | A command injection vulnerability exists in the GL-iNet GL-AXT1800 router firmwa | |
| CVE-2026-0625 | None | 1.38% | 3 | 0 | 2026-01-08T18:30:33 | Multiple D-Link DSL gateway devices contain a command injection vulnerability in | |
| CVE-2026-21440 | 0 | 0.32% | 1 | 3 | 2026-01-08T18:09:49.800000 | AdonisJS is a TypeScript-first web framework. A Path Traversal vulnerability in | |
| CVE-2025-67303 | 7.5 | 0.03% | 1 | 0 | 2026-01-08T18:09:49.800000 | An issue in ComfyUI-Manager prior to version 3.38 allowed remote attackers to po | |
| CVE-2025-13056 | 6.8 | 0.01% | 1 | 0 | 2026-01-08T18:09:49.800000 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2025-12511 | 6.8 | 0.01% | 1 | 0 | 2026-01-08T18:09:49.800000 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2025-12793 | 0 | 0.01% | 1 | 0 | 2026-01-08T18:09:23.230000 | An uncontrolled DLL loading path vulnerability exists in AsusSoftwareManagerAgen | |
| CVE-2020-36918 | 4.3 | 0.02% | 1 | 0 | 2026-01-08T18:09:23.230000 | iDS6 DSSPro Digital Signage System 6.2 contains a cross-site request forgery vul | |
| CVE-2020-36925 | 9.8 | 0.52% | 1 | 0 | 2026-01-08T18:09:23.230000 | Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insuff | |
| CVE-2020-36923 | 9.8 | 0.07% | 1 | 0 | 2026-01-08T18:09:23.230000 | Sony BRAVIA Digital Signage 1.7.8 contains an insecure direct object reference v | |
| CVE-2020-36910 | 8.8 | 0.33% | 1 | 0 | 2026-01-08T18:09:23.230000 | Cayin Signage Media Player 3.0 contains an authenticated remote command injectio | |
| CVE-2020-36912 | 9.8 | 0.04% | 1 | 0 | 2026-01-08T18:09:23.230000 | Plexus anblick Digital Signage Management 3.1.13 contains an open redirect vulne | |
| CVE-2020-36915 | 7.5 | 0.04% | 1 | 0 | 2026-01-08T18:09:23.230000 | Adtec Digital SignEdje Digital Signage Player v2.08.28 contains multiple hardcod | |
| CVE-2026-20026 | 5.8 | 0.09% | 1 | 0 | 2026-01-08T18:08:54.147000 | Multiple Cisco products are affected by a vulnerability in the processing o | |
| CVE-2025-6225 | 0 | 0.71% | 1 | 0 | 2026-01-08T18:08:54.147000 | Kieback&Peter Neutrino-GLT product is used for building management. It's web com | |
| CVE-2025-15472 | 7.2 | 0.12% | 1 | 0 | 2026-01-08T18:08:54.147000 | A flaw has been found in TRENDnet TEW-811DRU 1.0.2.0. This affects the function | |
| CVE-2025-63611 | 8.7 | 0.00% | 1 | 0 | 2026-01-08T18:08:18.457000 | Cross-Site Scripting in phpgurukul Hostel Management System v2.1 user-provided c | |
| CVE-2025-15224 | 3.1 | 0.03% | 2 | 0 | 2026-01-08T18:08:18.457000 | When doing SSH-based transfers using either SCP or SFTP, and asked to do public | |
| CVE-2025-14819 | 5.3 | 0.01% | 2 | 0 | 2026-01-08T18:08:18.457000 | When doing TLS related transfers with reused easy or multi handles and altering | |
| CVE-2025-69259 | 7.5 | 0.00% | 1 | 0 | 2026-01-08T18:08:18.457000 | A message unchecked NULL return value vulnerability in Trend Micro Apex Central | |
| CVE-2025-15079 | 5.3 | 0.02% | 2 | 0 | 2026-01-08T15:32:30 | When doing SSH-based transfers using either SCP or SFTP, and setting the known_h | |
| CVE-2025-13034 | 5.9 | 0.01% | 2 | 0 | 2026-01-08T15:32:29 | When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey` wit | |
| CVE-2025-69260 | 7.5 | 0.00% | 1 | 0 | 2026-01-08T15:31:29 | A message out-of-bounds read vulnerability in Trend Micro Apex Central could all | |
| CVE-2025-69258 | 9.8 | 0.00% | 1 | 0 | 2026-01-08T15:31:28 | A LoadLibraryEX vulnerability in Trend Micro Apex Central could allow an unauthe | |
| CVE-2025-14017 | None | 0.01% | 2 | 0 | 2026-01-08T12:30:38 | When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl, changing | |
| CVE-2025-14524 | None | 0.02% | 2 | 0 | 2026-01-08T12:30:37 | When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer p | |
| CVE-2025-37164 | 10.0 | 84.25% | 3 | 3 | template | 2026-01-08T00:32:16 | A remote code execution issue exists in HPE OneView. |
| CVE-2025-62224 | 5.5 | 0.06% | 2 | 0 | 2026-01-08T00:31:21 | User interface (ui) misrepresentation of critical information in Microsoft Edge | |
| CVE-2017-20214 | 7.5 | 0.03% | 1 | 0 | 2026-01-08T00:31:21 | FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains hard-coded SSH | |
| CVE-2017-20213 | 7.5 | 0.10% | 1 | 0 | 2026-01-08T00:31:21 | FLIR Thermal Camera F/FC/PT/D Stream firmware version 8.0.0.64 contains an unaut | |
| CVE-2017-20212 | 6.2 | 0.19% | 1 | 0 | 2026-01-08T00:31:21 | FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64 contains an information | |
| CVE-2009-0556 | 8.8 | 76.76% | 5 | 0 | 2026-01-07T21:32:42 | Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in | |
| CVE-2026-22184 | None | 0.08% | 2 | 0 | 2026-01-07T21:32:07 | zlib versions up to and including 1.3.1.2 contain a global buffer overflow in th | |
| CVE-2026-20029 | 4.9 | 0.03% | 2 | 0 | 2026-01-07T18:30:33 | A vulnerability in the licensing features of Cisco Identity Services Engine | |
| CVE-2026-22536 | None | 0.01% | 1 | 0 | 2026-01-07T18:30:33 | The absence of permissions control for the user XXX allows the current configura | |
| CVE-2026-20027 | 5.3 | 0.03% | 1 | 0 | 2026-01-07T18:30:33 | Multiple Cisco products are affected by a vulnerability in the processing of DCE | |
| CVE-2026-22542 | None | 0.04% | 1 | 0 | 2026-01-07T18:30:33 | An attacker with access to the system's internal network can cause a denial of s | |
| CVE-2026-22541 | None | 0.04% | 1 | 0 | 2026-01-07T18:30:33 | The massive sending of ICMP requests causes a denial of service on one of the bo | |
| CVE-2026-21635 | 5.3 | 0.01% | 1 | 0 | 2026-01-07T18:30:25 | An Improper Access Control could allow a malicious actor in Wi-Fi range to the E | |
| CVE-2025-69277 | 4.5 | 0.02% | 1 | 0 | 2026-01-07T18:30:24 | libsodium before ad3004e, in atypical use cases involving certain custom cryptog | |
| CVE-2025-13947 | 7.4 | 0.05% | 1 | 0 | 2026-01-07T16:15:48.950000 | A flaw was found in WebKitGTK. This vulnerability allows remote, user-assisted i | |
| CVE-2026-0628 | 8.8 | 0.02% | 2 | 1 | 2026-01-07T15:31:20 | Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7 | |
| CVE-2025-0980 | 6.4 | 0.01% | 1 | 0 | 2026-01-07T15:31:20 | Nokia SR Linux is vulnerable to an authentication vulnerability allowing unautho | |
| CVE-2026-22540 | None | 0.04% | 1 | 0 | 2026-01-07T15:30:25 | The massive sending of ARP requests causes a denial of service on one board of t | |
| CVE-2025-38352 | 7.4 | 0.19% | 5 | 3 | 2026-01-07T15:30:14 | In the Linux kernel, the following vulnerability has been resolved: posix-cpu-t | |
| CVE-2025-68926 | 9.8 | 3.14% | 4 | 2 | template | 2026-01-07T15:22:22 | ## Vulnerability Overview ### Description RustFS implements gRPC authenticatio |
| CVE-2025-14631 | None | 0.02% | 1 | 0 | 2026-01-07T12:31:27 | A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1(802.11 modul | |
| CVE-2025-15471 | 9.8 | 0.15% | 3 | 0 | 2026-01-07T03:30:32 | A vulnerability was detected in TRENDnet TEW-713RE 1.02. The impacted element is | |
| CVE-2020-36913 | 5.3 | 0.09% | 1 | 0 | 2026-01-06T21:31:40 | All-Dynamics Software enlogic:show 2.0.2 contains a session fixation vulnerabili | |
| CVE-2026-0641 | 6.3 | 2.54% | 1 | 0 | 2026-01-06T21:30:45 | A security vulnerability has been detected in TOTOLINK WA300 5.2cu.7112_B2019022 | |
| CVE-2025-63525 | 9.6 | 0.03% | 1 | 0 | 2026-01-06T21:15:43.240000 | An issue was discovered in Blood Bank Management System 1.0 allowing authenticat | |
| CVE-2026-0640 | 8.8 | 0.09% | 1 | 0 | 2026-01-06T18:31:44 | A weakness has been identified in Tenda AC23 16.03.07.52. This affects the funct | |
| CVE-2025-14942 | None | 0.07% | 1 | 0 | 2026-01-06T18:31:43 | wolfSSH’s key exchange state machine can be manipulated to leak the client’s pas | |
| CVE-2025-39477 | 9.8 | 0.04% | 1 | 0 | 2026-01-06T18:31:43 | Missing Authorization vulnerability in Sfwebservice InWave Jobs allows Exploitin | |
| CVE-2020-36924 | 7.5 | 0.06% | 1 | 0 | 2026-01-06T18:31:43 | Sony BRAVIA Digital Signage 1.7.8 contains a remote file inclusion vulnerability | |
| CVE-2025-60262 | 9.8 | 0.11% | 1 | 0 | 2026-01-06T18:31:43 | An issue in H3C M102G HM1A0V200R010 wireless controller and BA1500L SWBA1A0V100R | |
| CVE-2020-36920 | 8.8 | 0.05% | 1 | 0 | 2026-01-06T18:31:42 | iDS6 DSSPro Digital Signage System 6.2 contains an improper access control vulne | |
| CVE-2020-36916 | 8.8 | 0.02% | 1 | 0 | 2026-01-06T18:31:42 | TDM Digital Signage PC Player 4.1.0.4 contains an elevation of privileges vulner | |
| CVE-2020-36906 | 4.3 | 0.02% | 1 | 0 | 2026-01-06T18:31:42 | P5 FNIP-8x16A FNIP-4xSH 1.0.20 contains a cross-site request forgery vulnerabili | |
| CVE-2020-36917 | 7.5 | 0.06% | 1 | 0 | 2026-01-06T18:31:42 | iDS6 DSSPro Digital Signage System 6.2 contains a sensitive information disclosu | |
| CVE-2020-36909 | 6.5 | 0.03% | 1 | 0 | 2026-01-06T18:31:42 | SnapGear Management Console SG560 3.1.5 contains a file manipulation vulnerabili | |
| CVE-2020-36921 | 7.5 | 0.19% | 1 | 0 | 2026-01-06T18:31:42 | RED-V Super Digital Signage System 5.1.1 contains an information disclosure vuln | |
| CVE-2020-36922 | 7.5 | 0.08% | 1 | 0 | 2026-01-06T18:31:42 | Sony BRAVIA Digital Signage 1.7.8 contains an information disclosure vulnerabili | |
| CVE-2020-36907 | 7.5 | 0.38% | 1 | 0 | 2026-01-06T18:31:42 | Aerohive HiveOS contains a denial of service vulnerability in the NetConfig UI t | |
| CVE-2020-36914 | 7.5 | 0.04% | 1 | 0 | 2026-01-06T18:31:35 | QiHang Media Web Digital Signage 3.0.9 contains a sensitive information disclosu | |
| CVE-2020-36908 | 5.3 | 0.02% | 1 | 0 | 2026-01-06T18:31:34 | SnapGear Management Console SG560 version 3.1.5 contains a cross-site request fo | |
| CVE-2020-36905 | 7.5 | 0.05% | 1 | 0 | 2026-01-06T18:31:33 | FIBARO System Home Center 5.021 contains a remote file inclusion vulnerability i | |
| CVE-2026-21877 | 10.0 | 0.05% | 5 | 1 | 2026-01-06T17:48:25 | ### Impact n8n is affected by an authenticated Remote Code Execution (RCE) vulne | |
| CVE-2025-54957 | 5.4 | 0.05% | 3 | 1 | 2026-01-06T17:15:44.213000 | An issue was discovered in Dolby UDC 4.5 through 4.13. A crash of the DD+ decode | |
| CVE-2025-68428 | None | 0.06% | 1 | 0 | 2026-01-06T15:51:59 | ### Impact User control of the first argument of the loadFile method in the node | |
| CVE-2025-48769 | 8.1 | 0.06% | 1 | 0 | 2026-01-06T14:35:26.893000 | Use After Free vulnerability was discovered in fs/vfs/fs_rename code of the Apac | |
| CVE-2026-21634 | 6.5 | 0.02% | 1 | 0 | 2026-01-05T21:31:38 | A malicious actor with access to the adjacent network could overflow the UniFi P | |
| CVE-2026-21633 | 8.8 | 0.02% | 2 | 0 | 2026-01-05T21:31:37 | A malicious actor with access to the adjacent network could obtain unauthorized | |
| CVE-2025-68668 | 9.9 | 0.10% | 2 | 0 | 2026-01-05T19:06:07 | ### Impact A sandbox bypass vulnerability exists in the Python Code Node that us | |
| CVE-2025-14346 | 9.8 | 0.09% | 4 | 0 | 2026-01-05T18:30:29 | WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce auth | |
| CVE-2025-12514 | 7.2 | 0.02% | 1 | 0 | 2026-01-05T12:31:32 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2025-54890 | 6.8 | 0.02% | 1 | 0 | 2026-01-05T12:31:32 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2025-8460 | 6.8 | 0.02% | 1 | 0 | 2026-01-05T10:15:58.160000 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site | |
| CVE-2025-15215 | 8.8 | 0.05% | 1 | 0 | 2026-01-02T21:28:56.470000 | A vulnerability was determined in Tenda AC10U 15.03.06.48/15.03.06.49. This affe | |
| CVE-2025-66848 | 9.8 | 0.40% | 1 | 0 | 2026-01-02T18:31:27 | JD Cloud NAS routers AX1800 (4.3.1.r4308 and earlier), AX3000 (4.3.1.r4318 and e | |
| CVE-2025-47411 | None | 0.07% | 1 | 0 | 2026-01-02T16:29:42 | A user with a legitimate non-administrator account can exploit a vulnerability i | |
| CVE-2021-47741 | 7.5 | 0.04% | 1 | 0 | 2025-12-31T21:31:05 | ZBL EPON ONU Broadband Router V100R001 contains a privilege escalation vulnerabi | |
| CVE-2021-47726 | 7.5 | 0.08% | 1 | 0 | 2025-12-31T21:31:05 | NuCom 11N Wireless Router 5.07.90 contains a privilege escalation vulnerability | |
| CVE-2025-15217 | 8.8 | 0.08% | 1 | 0 | 2025-12-30T21:30:32 | A security flaw has been discovered in Tenda AC23 16.03.07.52. Affected is the f | |
| CVE-2025-15255 | 9.8 | 0.18% | 1 | 0 | 2025-12-30T18:30:21 | A vulnerability was determined in Tenda W6-S 1.0.0.4(510). This impacts an unkno | |
| CVE-2025-15218 | 8.8 | 0.08% | 1 | 0 | 2025-12-30T06:30:25 | A weakness has been identified in Tenda AC10U 15.03.06.48/15.03.06.49. Affected | |
| CVE-2025-15216 | 8.8 | 0.08% | 1 | 0 | 2025-12-30T03:30:17 | A vulnerability was identified in Tenda AC23 16.03.07.52. This impacts the funct | |
| CVE-2025-14847 | 7.5 | 68.33% | 22 | 28 | template | 2025-12-30T00:32:58 | Mismatched length fields in Zlib compressed protocol headers may allow a read of |
| CVE-2019-25236 | 9.8 | 0.11% | 1 | 0 | 2025-12-29T15:58:13.147000 | iSeeQ Hybrid DVR WH-H4 1.03R contains an unauthenticated vulnerability in the ge | |
| CVE-2018-25140 | 7.5 | 0.08% | 1 | 0 | 2025-12-29T15:58:13.147000 | FLIR thermal traffic cameras contain an unauthenticated device manipulation vuln | |
| CVE-2025-13915 | 9.8 | 0.37% | 3 | 0 | 2025-12-26T15:30:23 | IBM API Connect 10.0.8.0 through 10.0.8.5, and 10.0.11.0 could allow a remote at | |
| CVE-2019-25248 | 7.5 | 0.14% | 1 | 0 | 2025-12-24T21:30:40 | Beward N100 M2.1.6.04C014 contains an unauthenticated vulnerability that allows | |
| CVE-2019-25251 | 5.3 | 0.03% | 1 | 0 | 2025-12-24T21:30:35 | Teradek VidiU Pro 3.0.3 contains a server-side request forgery vulnerability in | |
| CVE-2018-25139 | 7.5 | 0.12% | 1 | 0 | 2025-12-24T21:30:35 | FLIR AX8 Thermal Camera 1.32.16 contains an unauthenticated vulnerability that a | |
| CVE-2018-25138 | 7.5 | 0.13% | 1 | 0 | 2025-12-24T21:30:35 | FLIR AX8 Thermal Camera 1.32.16 contains hard-coded SSH and web panel credential | |
| CVE-2019-25247 | 5.3 | 0.02% | 1 | 0 | 2025-12-24T21:30:34 | Beward N100 H.264 VGA IP Camera M2.1.6 contains a cross-site request forgery vul | |
| CVE-2019-25246 | 8.8 | 0.03% | 1 | 0 | 2025-12-24T21:30:34 | Beward N100 H.264 VGA IP Camera M2.1.6 contains an authenticated file disclosure | |
| CVE-2018-25141 | 7.5 | 0.11% | 1 | 0 | 2025-12-24T21:30:34 | FLIR thermal traffic cameras contain an unauthenticated vulnerability that allow | |
| CVE-2025-14704 | 7.3 | 0.23% | 1 | 0 | 2025-12-23T17:10:50.713000 | A vulnerability was found in Shiguangwu sgwbox N3 2.0.25. The impacted element i | |
| CVE-2025-68613 | 10.0 | 8.42% | 3 | 28 | template | 2025-12-22T16:19:13 | ### Impact n8n contains a critical Remote Code Execution (RCE) vulnerability in |
| CVE-2024-12087 | 6.5 | 2.36% | 1 | 0 | 2025-12-22T15:30:20 | A path traversal vulnerability exists in rsync. It stems from behavior enabled b | |
| CVE-2025-2486 | 8.8 | 0.02% | 1 | 0 | 2025-12-19T18:31:07 | The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI Shell to be | |
| CVE-2019-6110 | 6.8 | 51.29% | 1 | 1 | 2025-12-18T15:15:47.940000 | In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the | |
| CVE-2025-55182 | 10.0 | 53.46% | 2 | 100 | template | 2025-12-09T16:53:25 | ### Impact There is an unauthenticated remote code execution vulnerability in R |
| CVE-2025-1910 | None | 0.02% | 1 | 1 | 2025-12-05T00:31:05 | The WatchGuard Mobile VPN with SSL Client on Windows allows a locally authentic | |
| CVE-2025-43300 | 8.8 | 1.08% | 1 | 8 | 2025-11-26T15:35:16 | An out-of-bounds write issue was addressed with improved bounds checking. This i | |
| CVE-2025-13601 | 7.7 | 0.02% | 1 | 0 | 2025-11-26T15:34:20 | A heap-based buffer overflow problem was found in glib through an incorrect calc | |
| CVE-2025-6389 | 9.8 | 0.37% | 1 | 3 | 2025-11-25T03:30:26 | The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution | |
| CVE-2025-64432 | 4.7 | 0.01% | 1 | 0 | 2025-11-17T21:44:47 | ### Summary _Short summary of the problem. Make the impact and severity as clear | |
| CVE-2025-47812 | 10.0 | 92.40% | 1 | 10 | template | 2025-11-05T19:26:31.650000 | In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\0 |
| CVE-2025-31161 | 9.8 | 82.33% | 1 | 15 | template | 2025-10-31T22:04:34.230000 | CrushFTP 10 before 10.8.4 and 11 before 11.3.1 allows authentication bypass and |
| CVE-2021-44228 | 10.0 | 94.36% | 1 | 100 | template | 2025-10-27T17:40:33.680000 | Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12 |
| CVE-2020-12812 | 9.8 | 46.01% | 1 | 0 | 2025-10-22T00:32:58 | An improper authentication vulnerability in SSL VPN in FortiOS 6.4.0, 6.2.0 to 6 | |
| CVE-2025-10492 | 9.8 | 0.33% | 2 | 1 | 2025-10-14T15:31:20 | A Java deserialisation vulnerability has been discovered in Jaspersoft Library. | |
| CVE-2025-11155 | None | 0.02% | 1 | 0 | 2025-09-29T18:33:13 | The credentials required to access the device's web server are sent in base64 wi | |
| CVE-2025-47987 | 7.8 | 0.08% | 5 | 1 | 2025-07-14T17:38:41.223000 | Heap-based buffer overflow in Windows Cred SSProvider Protocol allows an authori | |
| CVE-2025-4330 | 7.5 | 0.16% | 1 | 6 | 2025-06-03T21:30:37 | Allows the extraction filter to be ignored, allowing symlink targets to point ou | |
| CVE-2025-47934 | None | 0.03% | 1 | 0 | 2025-05-19T21:54:44 | ### Impact A maliciously modified message can be passed to either `openpgp.verif | |
| CVE-2025-26529 | 8.4 | 0.12% | 1 | 2 | 2025-02-24T22:02:54 | Description information displayed in the site administration live log required a | |
| CVE-2024-32019 | 8.8 | 0.48% | 1 | 12 | 2024-11-21T09:14:20.453000 | Netdata is an open source observability tool. In affected versions the `ndsudo` | |
| CVE-2024-38063 | 9.8 | 90.06% | 1 | 29 | 2024-08-16T20:54:12.043000 | Windows TCP/IP Remote Code Execution Vulnerability | |
| CVE-2024-2537 | 4.4 | 0.06% | 1 | 1 | 2024-03-15T18:30:45 | Improper Control of Dynamically-Managed Code Resources vulnerability in Logitech | |
| CVE-2019-6109 | 6.8 | 9.74% | 1 | 0 | 2023-01-29T05:03:50 | An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the | |
| CVE-2026-21876 | 0 | 0.00% | 5 | 1 | N/A | ||
| CVE-2025-69222 | 0 | 0.09% | 1 | 0 | N/A | ||
| CVE-2025-67859 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-69139 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-14558 | 0 | 0.00% | 1 | 2 | N/A | ||
| CVE-2025-65606 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2025-68615 | 0 | 0.05% | 1 | 1 | N/A | ||
| CVE-2025-59157 | 0 | 0.21% | 1 | 0 | N/A | ||
| CVE-2025-69194 | 0 | 0.00% | 1 | 1 | N/A | ||
| CVE-1973-0001 | 0 | 0.00% | 1 | 0 | N/A |
updated 2026-01-08T22:16:01.950000
1 posts
🟠 CVE-2025-15464 - High (7.5)
Exported Activity allows external applications to gain application context and directly launch Gmail with inbox access, bypassing security controls.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15464/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2026-01-08T21:31:39
2 posts
🟠 CVE-2025-50334 - High (7.5)
An issue in Technitium DNS Server v.13.5 allows a remote attacker to cause a denial of service via the rate-limiting component
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-50334/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##DoS in Technitium DNS server.
https://github.com/FPokerFace/Security-Advisory/tree/main/CVE-2025-50334
##updated 2026-01-08T21:31:39
2 posts
CVEs are now published for this.
https://www.cve.org/CVERecord?id=CVE-2025-55125
https://www.cve.org/CVERecord?id=CVE-2025-59468
##🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions
CVE-2025-55125:
A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59468:
A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.
▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing
CVE-2025-59469
A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59470
A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing
Veeam: https://www.veeam.com/kb4738
Blog format: https://darkwebinformer.com/multiple-veeam-cves-identified-critical-flaws-allow-rce-and-high-privilege-actions/
updated 2026-01-08T21:31:39
1 posts
##A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access controls (RBAC).
updated 2026-01-08T21:31:33
5 posts
9 repos
https://github.com/Ashwesker/Ashwesker-CVE-2025-52691
https://github.com/sajjadsiam/CVE-2025-52691-poc
https://github.com/you-ssef9/CVE-2025-52691
https://github.com/hilwa24/CVE-2025-52691
https://github.com/DeathShotXD/CVE-2025-52691-APT-PoC
https://github.com/yt2w/CVE-2025-52691
https://github.com/nxgn-kd01/smartermail-cve-scanner
https://github.com/watchtowrlabs/watchTowr-vs-SmarterMail-CVE-2025-52691
Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691) - watchTowr Labs https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/
##New.
WatchTower: Do Smart People Ever Say They’re Smart? (SmarterTools SmarterMail Pre-Auth RCE CVE-2025-52691) https://labs.watchtowr.com/do-smart-people-ever-say-theyre-smart-smartertools-smartermail-pre-auth-rce-cve-2025-52691/ #infosec #threatresearch #vulnerability
##Get your popcorn, it's time for another watchTowr Labs post. This one is a pre-auth RCE in SmarterMail. :blobcatpopcorn:
##CSA has published guidance on CVE-2025-52691, a critical SmarterMail vulnerability enabling potential unauthenticated remote code execution through arbitrary file uploads.
Although exploitation has not been observed, the advisory highlights the continued exposure of mail server infrastructure and the importance of timely upgrades to fixed builds.
Engage in the discussion and follow TechNadu for sober, research-driven security reporting.
#InfoSec #VulnerabilityResearch #EmailInfrastructure #RCE #PatchManagement #CyberDefense #TechNadu
##Critical SmarterMail flaw allows unauthenticated remote code execution
SmarterTools released a critical update for SmarterMail to fix CVE-2025-52691 that allows unauthenticated remote code execution. Attackers can exploit this flaw to upload malicious files and gain full control over email servers.
**If you are using SmarterMail update ASAP. There is a trivial flaw to upload files and take over your system. You can't hide this behind a firewall, it's designed to be exposed to the internet. After patching, check your server logs for any new or strange files that appeared before you patched.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-smartermail-flaw-allows-unauthenticated-remote-code-execution-h-6-z-p-1/gD2P6Ple2L
updated 2026-01-08T21:30:40
1 posts
🔴 CVE-2025-66916 - Critical (9.4)
The snailjob component in RuoYi-Vue-Plus versions 5.5.1 and earlier, interface /snail-job/workflow/check-node-expression can execute QLExpress expressions, but it does not filter user input, allowing attackers to use the File class to perform arbi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66916/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2026-01-08T21:30:40
1 posts
🔴 CVE-2025-66913 - Critical (9.8)
JimuReport thru version 2.1.3 is vulnerable to remote code execution when processing user-controlled H2 JDBC URLs. The application passes the attacker-supplied JDBC URL directly to the H2 driver, allowing the use of certain directives to execute a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66913/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2026-01-08T21:30:40
2 posts
1 repos
🟠 CVE-2025-65518 - High (7.5)
Plesk Obsidian versions 8.0.1 through 18.0.73 are vulnerable to a Denial of Service (DoS) condition. The vulnerability exists in the get_password.php endpoint, where a crafted request containing a malicious payload can cause the affected web inter...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65518/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##DoS in Plesk.
https://github.com/Jainil-89/CVE-2025-65518/blob/main/cve.md
##updated 2026-01-08T21:30:40
1 posts
1 repos
updated 2026-01-08T21:15:43.603000
1 posts
🟠 CVE-2025-68719 - High (8.8)
KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 mishandle configuration management. Once any user is logged in and maintains an active session, an attacker can directly query the backup endpoint and download a full configuration archive. This arc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68719/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2026-01-08T21:15:43.353000
3 posts
🔴 CVE-2025-68717 - Critical (9.4)
KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This des...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##🔴 CVE-2025-68717 - Critical (9.4)
KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This des...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##🔴 CVE-2025-68717 - Critical (9.4)
KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 allow authentication bypass during session validation. If any user is logged in, endpoints such as /cgi-bin/system-tool accept unauthenticated requests with empty or invalid session values. This des...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2026-01-08T21:15:43.187000
1 posts
🟠 CVE-2025-68716 - High (8.4)
KAYSUS KS-WR3600 routers with firmware 1.0.5.9.1 enable the SSH service enabled by default on the LAN interface. The root account is configured with no password, and administrators cannot disable SSH or enforce authentication via the CLI or web GU...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-68716/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2026-01-08T20:57:58
1 posts
No awoo for you.
https://www.cve.org/CVERecord?id=CVE-2025-15346
##A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced. Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided. This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake. The issue affects versions up to and including 5.8.2.
updated 2026-01-08T20:15:45.453000
10 posts
3 repos
https://github.com/eduardorossi84/CVE-2026-21858-POC
📰 Ni8mare: критична вразливість у n8n дозволяє віддалене виконання коду без автентифікації
CyberCalm Ni8mare: критична вразливість у n8n дозволяє віддалене виконання коду без автентифікації Дослідники виявили критичну вразливість (CVE-2026-21858, CVSS 10.0) у платформі автоматизації n8n, яка дозволяє зловмисникам повністю захопити...
##🚨 CVE-2026-21858 - Ni8mare
n8n is an open source workflow automation platform. Versions below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant access to an unauthenticated remote attacker, resulting in exposure of sensitive information stored on the system and may enable further compromise depending on deployment configuration and workflow usage. This issue is fixed in version 1.121.0.
https://secdb.nttzen.cloud/cve/detail/CVE-2026-21858
#SecDB #InfoSec #n8n #Ni8mare #CVE #CVE202621858 #NTTDATA #CyberSecurity
##New.
Picus: Ni8mare: n8n CVE-2026-21858 Remote Code Execution Vulnerability Explained https://www.picussecurity.com/resource/blog/ni8mare-n8n-cve-2026-21858-remote-code-execution-vulnerability-explained #threatresearch #infosec
##Tracked as CVE-2026-21858 (CVSS score 10), the bug enables remote code execution without authentication. https://www.securityweek.com/critical-vulnerability-exposes-n8n-instances-to-takeover-attacks/
##Ni8mare – CVE-2026-21858 : cette faille critique permet de pirater les serveurs n8n https://www.it-connect.fr/ni8mare-cve-2026-21858-faille-critique-n8n/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #n8n
##qui c'est qui se servait de #n8n ici ? on a un petit #CVE à niveau 10 là https://github.com/Chocapikk/CVE-2026-21858 #iagenIsHell
##Critical Ni8mare flaw in n8n allows unauthenticated remote takeover
n8n patched a critical vulnerability (CVE-2026-21858) that allows unauthenticated attackers to steal server files and gain full remote code execution. The flaw exploits a logic error in webhook and file upload handling to bypass authentication and compromise sensitive automation credentials.
**If you are using n8n, this is urgent. If possible, try to isolate all n8n instances from the internet and accessible from trusted networks only. Then update to version 1.121.0 ASAP. If you can't patch, block webhooks and file uploads from any access from untrusted networks and the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-ni8mare-flaw-in-n8n-allows-unauthenticated-remote-takeover-4-x-4-z-8/gD2P6Ple2L
Say hello to #Ni8mare, the first named vulnerability of 2026.
#cve-2026-21858
##RE: https://infosec.exchange/@cR0w/115849435087390469
LMFAO another one. 🥳
https://github.com/n8n-io/n8n/security/advisories/GHSA-v4pr-fm98-w9pg
https://www.cve.org/CVERecord?id=CVE-2026-21858 ( not yet published )
##Ni8mare - Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) https://www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858
##updated 2026-01-08T20:15:44.070000
1 posts
🔴 CVE-2025-61548 - Critical (9.8)
SQL Injection is present on the hfInventoryDistFormID parameter in the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint in edu Business Solutions Print Shop Pro WebDesk version 18.34. Unsanitized user input is incorporated directly into SQL qu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61548/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2026-01-08T20:15:43.923000
1 posts
1 repos
🔴 CVE-2025-61246 - Critical (9.8)
indieka900 online-shopping-system-php 1.0 is vulnerable to SQL Injection in master/review_action.php via the proId parameter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-61246/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2026-01-08T20:15:43.677000
1 posts
🟠 CVE-2025-56424 - High (7.5)
An issue in Insiders Technologies GmbH e-invoice pro before release 1 Service Pack 2 allows a remote attacker to cause a denial of service via a crafted script
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-56424/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2026-01-08T19:15:55.983000
1 posts
Reset the "Days since ASN1 vuln" sign to 0.
https://www.cve.org/CVERecord?id=CVE-2025-13151
##Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.
updated 2026-01-08T19:15:54.793000
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-08T19:15:54.677000
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-08T18:31:46
1 posts
https://access.redhat.com/security/cve/cve-2025-12543
##A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.
updated 2026-01-08T18:31:36
1 posts
Centreon
sev:CRIT - https://www.cve.org/CVERecord?id=CVE-2025-15026
sev:CRIT - https://www.cve.org/CVERecord?id=CVE-2025-15029
sev:HIGH - https://www.cve.org/CVERecord?id=CVE-2025-5965
sev:MED - https://www.cve.org/CVERecord?id=CVE-2025-12511
sev:MED - https://www.cve.org/CVERecord?id=CVE-2025-12513
updated 2026-01-08T18:31:36
1 posts
Centreon
sev:CRIT - https://www.cve.org/CVERecord?id=CVE-2025-15026
sev:CRIT - https://www.cve.org/CVERecord?id=CVE-2025-15029
sev:HIGH - https://www.cve.org/CVERecord?id=CVE-2025-5965
sev:MED - https://www.cve.org/CVERecord?id=CVE-2025-12511
sev:MED - https://www.cve.org/CVERecord?id=CVE-2025-12513
updated 2026-01-08T18:31:36
1 posts
Centreon
sev:CRIT - https://www.cve.org/CVERecord?id=CVE-2025-15026
sev:CRIT - https://www.cve.org/CVERecord?id=CVE-2025-15029
sev:HIGH - https://www.cve.org/CVERecord?id=CVE-2025-5965
sev:MED - https://www.cve.org/CVERecord?id=CVE-2025-12511
sev:MED - https://www.cve.org/CVERecord?id=CVE-2025-12513
updated 2026-01-08T18:31:36
1 posts
Centreon
sev:CRIT - https://www.cve.org/CVERecord?id=CVE-2025-15026
sev:CRIT - https://www.cve.org/CVERecord?id=CVE-2025-15029
sev:HIGH - https://www.cve.org/CVERecord?id=CVE-2025-5965
sev:MED - https://www.cve.org/CVERecord?id=CVE-2025-12511
sev:MED - https://www.cve.org/CVERecord?id=CVE-2025-12513
updated 2026-01-08T18:31:36
1 posts
Centreon
sev:CRIT - https://www.cve.org/CVERecord?id=CVE-2025-15026
sev:CRIT - https://www.cve.org/CVERecord?id=CVE-2025-15029
sev:HIGH - https://www.cve.org/CVERecord?id=CVE-2025-5965
sev:MED - https://www.cve.org/CVERecord?id=CVE-2025-12511
sev:MED - https://www.cve.org/CVERecord?id=CVE-2025-12513
updated 2026-01-08T18:30:57
1 posts
🟠 CVE-2026-22230 - High (7.6)
OPEXUS eCASE Audit allows an authenticated attacker to modify client-side JavaScript or craft HTTP requests to access functions or buttons that have been disabled or blocked by an administrator. Fixed in eCASE Platform 11.14.1.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22230/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2026-01-08T18:30:57
1 posts
🟠 CVE-2026-22235 - High (7.5)
OPEXUS eComplaint before version 9.0.45.0 allows an attacker to visit the the 'DocumentOpen.aspx' endpoint, iterate through predictable values of 'chargeNumber', and download any uploaded files.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22235/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2026-01-08T18:30:56
3 posts
🟠 CVE-2025-55125 - High (7.8)
This vulnerability allows a Backup or Tape Operator to perform remote code execution (RCE) as root by creating a malicious
backup configuration file.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-55125/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##CVEs are now published for this.
https://www.cve.org/CVERecord?id=CVE-2025-55125
https://www.cve.org/CVERecord?id=CVE-2025-59468
##🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions
CVE-2025-55125:
A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59468:
A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.
▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing
CVE-2025-59469
A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59470
A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing
Veeam: https://www.veeam.com/kb4738
Blog format: https://darkwebinformer.com/multiple-veeam-cves-identified-critical-flaws-allow-rce-and-high-privilege-actions/
updated 2026-01-08T18:30:56
7 posts
1 repos
🔴 CVE-2025-59470 - Critical (9)
This vulnerability allows a Backup Operator to perform remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59470/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##CVEs are now published for this.
https://www.cve.org/CVERecord?id=CVE-2025-55125
https://www.cve.org/CVERecord?id=CVE-2025-59468
##Veeam Patches Critical Remote Code Execution Flaw in Backup & Replication v13
Veeam patched multiple vulnerabilities in Backup & Replication version 13, including a critical RCE flaw (CVE-2025-59470) that allows privileged operators to execute commands as the database user. These flaws are high-value targets for ransomware groups seeking to disable recovery options during attacks.
**If you are using Veeam Backup & Replication version 13, make sure all backup systems are isolated from the internet and accessible from trusted networks only. Limit the number of users with Backup or Tape Operator roles and update to version 13.0.1.1071 as soon as possible.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/veeam-patches-critical-remote-code-execution-flaw-in-backup-replication-v13-f-f-r-b-m/gD2P6Ple2L
🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions
CVE-2025-55125:
A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59468:
A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.
▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing
CVE-2025-59469
A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59470
A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing
Veeam: https://www.veeam.com/kb4738
Blog format: https://darkwebinformer.com/multiple-veeam-cves-identified-critical-flaws-allow-rce-and-high-privilege-actions/
Tracked as CVE-2025-59470, this RCE security flaw affects Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds. https://www.bleepingcomputer.com/news/security/new-veeam-vulnerabilities-expose-backup-servers-to-rce-attacks/
##updated 2026-01-08T18:30:56
3 posts
🔴 CVE-2025-59469 - Critical (9)
This vulnerability allows a Backup or Tape Operator to write files as root.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59469/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##CVEs are now published for this.
https://www.cve.org/CVERecord?id=CVE-2025-55125
https://www.cve.org/CVERecord?id=CVE-2025-59468
##🚨 Multiple Veeam CVEs Identified: Critical Flaws Allow RCE and High-Privilege Actions
CVE-2025-55125:
A flaw that allows a Backup or Tape Operator to achieve remote code execution (RCE) as root by crafting a malicious backup configuration file.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59468:
A vulnerability enabling a Backup Administrator to execute remote code as the postgres user by supplying a malicious password parameter.
▪️Severity: Medium
▪️CVSS v3.1: 6.7
▪️Source: Discovered during internal testing
CVE-2025-59469
A security issue that allows a Backup or Tape Operator to write arbitrary files with root privileges.
▪️Severity: High
▪️CVSS v3.1: 7.2
▪️Source: Discovered during internal testing
CVE-2025-59470
A vulnerability that permits a Backup or Tape Operator to achieve remote code execution (RCE) as the postgres user by sending a malicious interval or order parameter.
▪️CVSS Severity: Critical
▪️CVSS v3.1: 9.0
▪️Source: Discovered during internal testing
Veeam: https://www.veeam.com/kb4738
Blog format: https://darkwebinformer.com/multiple-veeam-cves-identified-critical-flaws-allow-rce-and-high-privilege-actions/
updated 2026-01-08T18:30:56
1 posts
updated 2026-01-08T18:30:56
1 posts
updated 2026-01-08T18:30:56
1 posts
updated 2026-01-08T18:30:33
3 posts
Tracked as CVE-2026-0625 (CVSS score of 9.3), the security defect exists because the dnscfg.cgi library does not properly sanitize user-supplied DNS configuration parameters. https://www.securityweek.com/hackers-exploit-zero-day-in-discontinued-d-link-devices/
##Critical RCE Vulnerability Exploited in Legacy D-Link DSL Routers
D-Link legacy DSL are actively exploited using a vulnerability, CVE-2026-0625, which allows unauthenticated remote code execution and DNS hijacking.
**If you are using D-Link routers, check this advisory whether you are using any of the vulnerable devices. If yes, make sure the devices are isolated from the internet, reset to complex password and force trusted upstream DNS servers. Plan a very quick replacement for these devices, they are exploitable and won't be getting patches.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/critical-rce-vulnerability-exploited-in-legacy-d-link-dsl-routers-j-2-i-i-g/gD2P6Ple2L
First D-Link of 2026 :dumpster_fire_gif:
##updated 2026-01-08T18:09:49.800000
1 posts
3 repos
https://github.com/you-ssef9/CVE-2026-21440
Critical path traversal flaw in AdonisJS enable server takeover
AdonisJS patched a critical path traversal vulnerabilities (CVE-2026-21440) that allow attackers to write or read arbitrary files on servers.
**Update your AdonisJS dependencies immediately to prevent attackers from overwriting your application code or stealing local files. Always sanitize user-provided filenames and use the Node.js permission flag to limit file system access.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-path-traversal-flaw-in-adonisjs-enable-server-takeover-l-o-y-a-8/gD2P6Ple2L
updated 2026-01-08T18:09:49.800000
1 posts
This might be one to keep an eye on.
https://www.cve.org/CVERecord?id=CVE-2025-67303
##An issue in ComfyUI-Manager prior to version 3.38 allowed remote attackers to potentially manipulate its configuration and critical data. This was due to the application storing its files in an insufficiently protected location that was accessible via the web interface
updated 2026-01-08T18:09:49.800000
1 posts
Centreon
sev:CRIT - https://www.cve.org/CVERecord?id=CVE-2025-15026
sev:CRIT - https://www.cve.org/CVERecord?id=CVE-2025-15029
sev:HIGH - https://www.cve.org/CVERecord?id=CVE-2025-5965
sev:MED - https://www.cve.org/CVERecord?id=CVE-2025-12511
sev:MED - https://www.cve.org/CVERecord?id=CVE-2025-12513
updated 2026-01-08T18:09:49.800000
1 posts
Centreon
sev:CRIT - https://www.cve.org/CVERecord?id=CVE-2025-15026
sev:CRIT - https://www.cve.org/CVERecord?id=CVE-2025-15029
sev:HIGH - https://www.cve.org/CVERecord?id=CVE-2025-5965
sev:MED - https://www.cve.org/CVERecord?id=CVE-2025-12511
sev:MED - https://www.cve.org/CVERecord?id=CVE-2025-12513
updated 2026-01-08T18:09:23.230000
1 posts
ASUS released a patch yesterday for CVE-2025-12793.
Security Update for MyASUS https://www.asus.com/security-advisory/#bulletins #ASUS #infosec
##updated 2026-01-08T18:09:23.230000
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-08T18:09:23.230000
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-08T18:09:23.230000
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-08T18:09:23.230000
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-08T18:09:23.230000
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-08T18:09:23.230000
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-08T18:08:54.147000
1 posts
Cisco has two new advisories:
CVE-2026-20026 and CVE-2026-20027: Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH
CVE-2026-20029: Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt @TalosSecurity #Cisco #vulnerability #infosec
##updated 2026-01-08T18:08:54.147000
1 posts
updated 2026-01-08T18:08:54.147000
1 posts
updated 2026-01-08T18:08:18.457000
1 posts
🟠 CVE-2025-63611 - High (8.7)
Cross-Site Scripting in phpgurukul Hostel Management System v2.1 user-provided complaint fields (Explain the Complaint) submitted via /register-complaint.php are stored and rendered unescaped in the admin viewer (/admin/complaint-details.php?cid=)...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-63611/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2026-01-08T18:08:18.457000
2 posts
ZOMG curl CVEs.
https://curl.se/docs/CVE-2025-14017.html
https://curl.se/docs/CVE-2025-14524.html
https://curl.se/docs/CVE-2025-14819.html
https://curl.se/docs/CVE-2025-15079.html
###curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS https://curl.se/docs/CVE-2025-13034.html
- CVE-2025-14017: broken TLS options for threaded LDAPS https://curl.se/docs/CVE-2025-14017.html
- CVE-2025-14524: bearer token leak on cross-protocol redirect https://curl.se/docs/CVE-2025-14524.html
- CVE-2025-14819: OpenSSL partial chain store policy bypass https://curl.se/docs/CVE-2025-14819.html
- CVE-2025-15079: libssh global knownhost override https://curl.se/docs/CVE-2025-15079.html
- CVE-2025-15224: libssh key passphrase bypass without agent set https://curl.se/docs/CVE-2025-15224.html
I discovered the last 2 vulnerabilities.
Download curl 8.18.0 from https://curl.se/download.html
#vulnerabilityresearch #vulnerability #cybersecurity #infosec
##updated 2026-01-08T18:08:18.457000
2 posts
ZOMG curl CVEs.
https://curl.se/docs/CVE-2025-14017.html
https://curl.se/docs/CVE-2025-14524.html
https://curl.se/docs/CVE-2025-14819.html
https://curl.se/docs/CVE-2025-15079.html
###curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS https://curl.se/docs/CVE-2025-13034.html
- CVE-2025-14017: broken TLS options for threaded LDAPS https://curl.se/docs/CVE-2025-14017.html
- CVE-2025-14524: bearer token leak on cross-protocol redirect https://curl.se/docs/CVE-2025-14524.html
- CVE-2025-14819: OpenSSL partial chain store policy bypass https://curl.se/docs/CVE-2025-14819.html
- CVE-2025-15079: libssh global knownhost override https://curl.se/docs/CVE-2025-15079.html
- CVE-2025-15224: libssh key passphrase bypass without agent set https://curl.se/docs/CVE-2025-15224.html
I discovered the last 2 vulnerabilities.
Download curl 8.18.0 from https://curl.se/download.html
#vulnerabilityresearch #vulnerability #cybersecurity #infosec
##updated 2026-01-08T18:08:18.457000
1 posts
Tenable Research Advisories have a new entry:
Critical: CVE-2025-69258; CVE-2025-69259 and CVE-2025-69260: Trend Micro Apex Central Multiple Vulnerabilities https://www.tenable.com/security/research/tra-2026-01 @tenable #vulnerability #infosec
##updated 2026-01-08T15:32:30
2 posts
ZOMG curl CVEs.
https://curl.se/docs/CVE-2025-14017.html
https://curl.se/docs/CVE-2025-14524.html
https://curl.se/docs/CVE-2025-14819.html
https://curl.se/docs/CVE-2025-15079.html
###curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS https://curl.se/docs/CVE-2025-13034.html
- CVE-2025-14017: broken TLS options for threaded LDAPS https://curl.se/docs/CVE-2025-14017.html
- CVE-2025-14524: bearer token leak on cross-protocol redirect https://curl.se/docs/CVE-2025-14524.html
- CVE-2025-14819: OpenSSL partial chain store policy bypass https://curl.se/docs/CVE-2025-14819.html
- CVE-2025-15079: libssh global knownhost override https://curl.se/docs/CVE-2025-15079.html
- CVE-2025-15224: libssh key passphrase bypass without agent set https://curl.se/docs/CVE-2025-15224.html
I discovered the last 2 vulnerabilities.
Download curl 8.18.0 from https://curl.se/download.html
#vulnerabilityresearch #vulnerability #cybersecurity #infosec
##updated 2026-01-08T15:32:29
2 posts
ZOMG curl CVEs.
https://curl.se/docs/CVE-2025-14017.html
https://curl.se/docs/CVE-2025-14524.html
https://curl.se/docs/CVE-2025-14819.html
https://curl.se/docs/CVE-2025-15079.html
###curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS https://curl.se/docs/CVE-2025-13034.html
- CVE-2025-14017: broken TLS options for threaded LDAPS https://curl.se/docs/CVE-2025-14017.html
- CVE-2025-14524: bearer token leak on cross-protocol redirect https://curl.se/docs/CVE-2025-14524.html
- CVE-2025-14819: OpenSSL partial chain store policy bypass https://curl.se/docs/CVE-2025-14819.html
- CVE-2025-15079: libssh global knownhost override https://curl.se/docs/CVE-2025-15079.html
- CVE-2025-15224: libssh key passphrase bypass without agent set https://curl.se/docs/CVE-2025-15224.html
I discovered the last 2 vulnerabilities.
Download curl 8.18.0 from https://curl.se/download.html
#vulnerabilityresearch #vulnerability #cybersecurity #infosec
##updated 2026-01-08T15:31:29
1 posts
Tenable Research Advisories have a new entry:
Critical: CVE-2025-69258; CVE-2025-69259 and CVE-2025-69260: Trend Micro Apex Central Multiple Vulnerabilities https://www.tenable.com/security/research/tra-2026-01 @tenable #vulnerability #infosec
##updated 2026-01-08T15:31:28
1 posts
Tenable Research Advisories have a new entry:
Critical: CVE-2025-69258; CVE-2025-69259 and CVE-2025-69260: Trend Micro Apex Central Multiple Vulnerabilities https://www.tenable.com/security/research/tra-2026-01 @tenable #vulnerability #infosec
##updated 2026-01-08T12:30:38
2 posts
ZOMG curl CVEs.
https://curl.se/docs/CVE-2025-14017.html
https://curl.se/docs/CVE-2025-14524.html
https://curl.se/docs/CVE-2025-14819.html
https://curl.se/docs/CVE-2025-15079.html
###curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS https://curl.se/docs/CVE-2025-13034.html
- CVE-2025-14017: broken TLS options for threaded LDAPS https://curl.se/docs/CVE-2025-14017.html
- CVE-2025-14524: bearer token leak on cross-protocol redirect https://curl.se/docs/CVE-2025-14524.html
- CVE-2025-14819: OpenSSL partial chain store policy bypass https://curl.se/docs/CVE-2025-14819.html
- CVE-2025-15079: libssh global knownhost override https://curl.se/docs/CVE-2025-15079.html
- CVE-2025-15224: libssh key passphrase bypass without agent set https://curl.se/docs/CVE-2025-15224.html
I discovered the last 2 vulnerabilities.
Download curl 8.18.0 from https://curl.se/download.html
#vulnerabilityresearch #vulnerability #cybersecurity #infosec
##updated 2026-01-08T12:30:37
2 posts
ZOMG curl CVEs.
https://curl.se/docs/CVE-2025-14017.html
https://curl.se/docs/CVE-2025-14524.html
https://curl.se/docs/CVE-2025-14819.html
https://curl.se/docs/CVE-2025-15079.html
###curl 8.18.0 has been released. This release fixes 2 medium and 4 low level vulnerabilities:
- CVE-2025-13034: No QUIC certificate pinning with GnuTLS https://curl.se/docs/CVE-2025-13034.html
- CVE-2025-14017: broken TLS options for threaded LDAPS https://curl.se/docs/CVE-2025-14017.html
- CVE-2025-14524: bearer token leak on cross-protocol redirect https://curl.se/docs/CVE-2025-14524.html
- CVE-2025-14819: OpenSSL partial chain store policy bypass https://curl.se/docs/CVE-2025-14819.html
- CVE-2025-15079: libssh global knownhost override https://curl.se/docs/CVE-2025-15079.html
- CVE-2025-15224: libssh key passphrase bypass without agent set https://curl.se/docs/CVE-2025-15224.html
I discovered the last 2 vulnerabilities.
Download curl 8.18.0 from https://curl.se/download.html
#vulnerabilityresearch #vulnerability #cybersecurity #infosec
##updated 2026-01-08T00:32:16
3 posts
3 repos
https://github.com/g0vguy/CVE-2025-37164-PoC
🚨 CISA adds two vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability
CVSS: 9.3
CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability
CVSS: 10
##CISA has updated the KEV catalogue.
CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-37164
CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2009-0556 #infosec #CISA #Microsoft #HP
##CVE ID: CVE-2025-37164
Vendor: Hewlett Packard (HP)
Product: OneView
Date Added: 2026-01-07
Notes: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04985en_us&docLocale=en_US ; https://nvd.nist.gov/vuln/detail/CVE-2025-37164
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-37164
updated 2026-01-08T00:31:21
2 posts
Microsoft posted an update to its security guide yesterday:
Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-62224 #Microsoft #vulnerability #Android #Chromium #Edge
##updated 2026-01-08T00:31:21
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-08T00:31:21
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-08T00:31:21
1 posts
Old FLIR CVEs just published.
https://www.cve.org/CVERecord?id=CVE-2017-20212
https://www.cve.org/CVERecord?id=CVE-2017-20213
https://www.cve.org/CVERecord?id=CVE-2017-20214
https://www.cve.org/CVERecord?id=CVE-2017-20215
##updated 2026-01-07T21:32:42
5 posts
🚨 CISA adds two vulnerabilities to the KEV Catalog
https://darkwebinformer.com/cisa-kev-catalog/
CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability
CVSS: 9.3
CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability
CVSS: 10
##Yesterday (2026-01-07) CISA added a new entry to it's catalog of known exploited vulnerabilities. It's about CVE-2009-0556, a vulnerability in PowerPoint 2003 which is EOL since 2014.
#InfoSec is a lost cause if we keep using unmaintained software.
##CISA has updated the KEV catalogue.
CVE-2025-37164: Hewlett Packard Enterprise OneView Code Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2025-37164
CVE-2009-0556: Microsoft Office PowerPoint Code Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2009-0556 #infosec #CISA #Microsoft #HP
##Huh, CVE-2009-0556 added to KEV? :blobcateyes: https://www.cisa.gov/news-events/alerts/2026/01/07/cisa-adds-two-known-exploited-vulnerabilities-catalog
##CVE ID: CVE-2009-0556
Vendor: Microsoft
Product: Office
Date Added: 2026-01-07
Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017 ; https://nvd.nist.gov/vuln/detail/CVE-2009-0556
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2009-0556
updated 2026-01-07T21:32:07
2 posts
There is a critical security vulnerability in zlib that allows code smuggling. Currently, there does not appear to be an update available.
• https://seclists.org/fulldisclosure/2026/Jan/3
• https://nvd.nist.gov/vuln/detail/CVE-2026-22184
#Security #zlib #Vulnerability
sev:CRIT BoF in zlib.
##zlib versions up to and including 1.3.1.2 contain a global buffer overflow in the untgz utility. The TGZfname() function copies an attacker-supplied archive name from argv[] into a fixed-size 1024-byte static global buffer using an unbounded strcpy() call without length validation. Supplying an archive name longer than 1024 bytes results in an out-of-bounds write that can lead to memory corruption, denial of service, and potentially code execution depending on compiler, build flags, architecture, and memory layout. The overflow occurs prior to any archive parsing or validation.
updated 2026-01-07T18:30:33
2 posts
The vulnerability, tracked as CVE-2026-20029 (CVSS score: 4.9), resides in the licensing feature and could allow an authenticated, remote attacker with administrative privileges to gain access to sensitive information. https://thehackernews.com/2026/01/cisco-patches-ise-security.html
##Cisco has two new advisories:
CVE-2026-20026 and CVE-2026-20027: Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH
CVE-2026-20029: Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt @TalosSecurity #Cisco #vulnerability #infosec
##updated 2026-01-07T18:30:33
1 posts
WTF kind of CVE is this? It doesn't even say what product is vulnerable.
https://nvd.nist.gov/vuln/detail/CVE-2026-22536
All it says is:
The absence of permissions control for the user XXX allows the current configuration in the sudoers file to escalate privileges without any restrictions
Slow clap for S21sec.
##updated 2026-01-07T18:30:33
1 posts
Cisco has two new advisories:
CVE-2026-20026 and CVE-2026-20027: Multiple Cisco Products Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH
CVE-2026-20029: Cisco Identity Services Engine XML External Entity Processing Information Disclosure Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt @TalosSecurity #Cisco #vulnerability #infosec
##updated 2026-01-07T18:30:33
1 posts
RE: https://infosec.exchange/@cR0w/115854579789971369
This one is even better. 🤣
An attacker with access to the system's internal network can cause a denial of service on the system by making two concurrent connections through the Telnet service.
Good luck with your Nessus scans.
##updated 2026-01-07T18:30:33
1 posts
RE: https://infosec.exchange/@cR0w/115854304322324575
Ooh, this one only requires L3 access to DoS.
The massive sending of ICMP requests causes a denial of service on one of the boards from the EVCharger that allows control the EV interfaces. Since the board must be operating correctly for the charger to also function correctly.
https://www.cve.org/CVERecord?id=CVE-2026-22541
Edit to correct the link.
##updated 2026-01-07T18:30:25
1 posts
Did you do it? Did you hack the Ubiquiti shit? Good. Here's more.
##updated 2026-01-07T18:30:24
1 posts
updated 2026-01-07T16:15:48.950000
1 posts
updated 2026-01-07T15:31:20
2 posts
1 repos
Google patches high-risk WebView flaw in first 2026 Chrome update
Google released Chrome 143.0.7499.192/193 to fix a high-risk vulnerability (CVE-2026-0628) in the WebView component that could allow malicious extensions to inject scripts into privileged pages.
**If you are using Google Chrome or other Chromium-based browsers (Edge, Brave, Vivaldi, Opera...) patch your browser ASAP. No critical flaws in this update, but don't wait for the flaw to become actively exploited. Update now, it's trivial and all your tabs reopen after the update.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/google-patches-high-risk-webview-flaw-in-first-2026-chrome-update-8-y-o-a-0/gD2P6Ple2L
Google has patched a high-severity Chrome WebView vulnerability tracked as CVE-2026-0628, caused by insufficient policy enforcement in the tag component.
The flaw could allow attackers to bypass security controls in applications embedding WebView, increasing risk across desktop and mobile ecosystems.
Full Article :
https://www.technadu.com/google-patches-high-severity-chrome-webview-flaw-cve-2026-0628-in-the-tag-component/617762/
#ChromeSecurity #WebView #CVE2026 #Infosec #ApplicationSecurity
##updated 2026-01-07T15:31:20
1 posts
No PoC but this one could be interesting to watch.
https://www.nokia.com/we-are-nokia/security/product-security-advisory/CVE-2025-0980/
##Nokia SR Linux is vulnerable to an authentication vulnerability allowing unauthorized access to the JSON-RPC service. When exploited, an invalid validation allows JSON RPC access without providing valid authentication credentials.
updated 2026-01-07T15:30:25
1 posts
DoS via ARP flood. In 2026. And this is the kind of shit people are putting on the Internet and connecting to home and industrial networks.
##The massive sending of ARP requests causes a denial of service on one board of the charger that allows control of the EV interfaces. Since the board must be operating correctly for the charger to also function correctly, the denial of service (DoS) results in a restart of the charger functionalities.
updated 2026-01-07T15:30:14
5 posts
3 repos
https://github.com/farazsth98/poc-CVE-2025-38352
updated 2026-01-07T15:22:22
4 posts
2 repos
⚪ A pre-defined access token was found in the open-source project RustFS
🗨️ In the source code of the open-source project RustFS (which develops an S3-compatible distributed object storage solution), experts identified a critical vulnerability (CVE-2025-68926). The issue arises due to the presence of a hardcoded access token in the code, allowing connection to the network s…
##В исходном коде открытого проекта RustFS выявлена критическая уязвимость (CVE-2025-68926) 🚨. Проблема вызвана наличием жёстко прошитого в коде токена доступа, позволяющего подключиться к сетевому сервису по протоколу gRPC, указав в заголовке authorization значение rustfs rpc 🔑. Токен присутствовал в коде сервера и клиента 💻. Проблеме присвоен критический уровень опасности (9.8 из 10) ☢️.
https://github.com/rustfs/rustfs/security/advisories/GHSA-h956-rh7x-ppgj
#RustFS #CVE202568926 #InfoSec #CyberSecurity #HardcodedSecrets #gRPC #OpenSource
##CVE-2025-68926, or GHSA-h956-rh7x-ppgj
##RustFS, a distributed object storage system written by LLMs, but in rust so it's fine everything is fine, hardcoded a fully privileged API token, apparently from Alpha.13 through Alpha.77.
If you're running any of those versions, probably you want to upgrade asap.
##updated 2026-01-07T12:31:27
1 posts
updated 2026-01-07T03:30:32
3 posts
Unpatched command Injection flaw reported in Trendnet TEW-713RE extenders
Trendnet TEW-713RE range extenders are reportd to have a critical command injection flaw (CVE-2025-15471) that allows unauthenticated attackers to gain root access. The flaw is not patched and the company has not responded to disclosure attempts.
**If you are using TEW-713RE range extenders, make sure they are isolated from the internet and accessible from trusted networks only. Since Trendnet has not released a fix, plan a replacement with supported hardware.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/unpatched-command-injection-flaw-reported-in-trendnet-tew-713re-extenders-i-2-q-8-w/gD2P6Ple2L
This was updated yesterday.
EUVD: Critical TRENDnet vulnerability, also known as CVE-2025-15471 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-206251
New:
Critical: Blood Bank Management System 1.0 vulnerability CVE-2025-63525 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-200000 #infosec
##TRENDnet
##updated 2026-01-06T21:31:40
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T21:30:45
1 posts
updated 2026-01-06T21:15:43.240000
1 posts
This was updated yesterday.
EUVD: Critical TRENDnet vulnerability, also known as CVE-2025-15471 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-206251
New:
Critical: Blood Bank Management System 1.0 vulnerability CVE-2025-63525 https://euvd.enisa.europa.eu/vulnerability/EUVD-2025-200000 #infosec
##updated 2026-01-06T18:31:44
1 posts
updated 2026-01-06T18:31:43
1 posts
Oops.
wolfSSH’s key exchange state machine can be manipulated to leak the client’s password in the clear, trick the client to send a bogus signature, or trick the client into skipping user authentication. This affects client applications with wolfSSH version 1.4.21 and earlier. Users of wolfSSH must update or apply the fix patch and it’s recommended to update credentials used. This fix is also recommended for wolfSSH server applications. While there aren’t any specific attacks on server applications, the same defect is present. Thanks to Aina Toky Rasoamanana of Valeo and Olivier Levillain of Telecom SudParis for the report.
sev:CRIT 9.4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/U:Red
updated 2026-01-06T18:31:43
1 posts
🔴 CVE-2025-39477 - Critical (9.8)
Missing Authorization vulnerability in Sfwebservice InWave Jobs allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects InWave Jobs: from n/a through 3.5.8.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-39477/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2026-01-06T18:31:43
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:43
1 posts
updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:42
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:35
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:34
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T18:31:33
1 posts
Assorted old vulns whose CVEs were just published. Quick glance looks like mostly random IoS stuff.
https://www.cve.org/CVERecord?id=CVE-2020-36905
https://www.cve.org/CVERecord?id=CVE-2020-36906
https://www.cve.org/CVERecord?id=CVE-2020-36907
https://www.cve.org/CVERecord?id=CVE-2020-36908
https://www.cve.org/CVERecord?id=CVE-2020-36909
https://www.cve.org/CVERecord?id=CVE-2020-36910
https://www.cve.org/CVERecord?id=CVE-2020-36912
https://www.cve.org/CVERecord?id=CVE-2020-36913
https://www.cve.org/CVERecord?id=CVE-2020-36914
https://www.cve.org/CVERecord?id=CVE-2020-36915
https://www.cve.org/CVERecord?id=CVE-2020-36916
https://www.cve.org/CVERecord?id=CVE-2020-36917
https://www.cve.org/CVERecord?id=CVE-2020-36918
https://www.cve.org/CVERecord?id=CVE-2020-36920
https://www.cve.org/CVERecord?id=CVE-2020-36921
https://www.cve.org/CVERecord?id=CVE-2020-36922
https://www.cve.org/CVERecord?id=CVE-2020-36923
https://www.cve.org/CVERecord?id=CVE-2020-36924
##updated 2026-01-06T17:48:25
5 posts
1 repos
n8n users need to update immediately after a CVSS 10.0 (CVE-2026-21877) authenticated remote code execution flaw was found that could let an attacker take over the system. Update to version 1.121.3 or higher and restrict privileges now.
Read: https://hackread.com/n8n-users-patch-full-system-takeover-vulnerability/
##n8n users need to update immediately after a CVSS 10.0 (CVE-2026-21877) authenticated remote code execution flaw was found that could let an attacker take over the system. Update to version 1.121.3 or higher and restrict privileges now.
Read: https://hackread.com/n8n-users-patch-full-system-takeover-vulnerability/
##"Une seconde faille critique RCE affecte n8n – CVE-2026-21877 : comment se protéger ?"
👇
https://www.it-connect.fr/n8n-cve-2026-21877-faille-critique-rce/
Pas mal d'instances pas à jour et exposées aussi sur les réseaux EU et CH selon Onyphe
👇
https://bsky.app/profile/onyphe.io/post/3mbvqc665zc2w
Infos
👇
https://cve.circl.lu/vuln/CVE-2026-21877
Une seconde faille critique RCE affecte n8n – CVE-2026-21877 : comment se protéger ? https://www.it-connect.fr/n8n-cve-2026-21877-faille-critique-rce/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #n8n
##Another perfect 10 in n8n? LMFAO. 🥳
https://github.com/n8n-io/n8n/security/advisories/GHSA-v364-rw7m-3263
Edit to add the link to the CVE. It's not published at this time though.
##updated 2026-01-06T17:15:44.213000
3 posts
1 repos
The flaw is tracked as CVE-2025-54957 and its existence came to light in October 2025 after it was discovered by Google researchers. https://www.securityweek.com/critical-dolby-vulnerability-patched-in-android/
##updated 2026-01-06T15:51:59
1 posts
Critical path traversal flaw reported in jsPDF library
jsPDF version 4.0.0 patches a critical path traversal vulnerability (CVE-2025-68428) that allows attackers to extract sensitive server files by embedding them into generated PDFs. The flaw affects Node.js environments where user-supplied paths are passed to methods like loadFile or addImage.
**If you are using jsPDF, review this advisory and your use case. Ideally, update to version 4.0.0 and use the Node.js --permission flag to limit which files the process can read. Also, as a normal best practice, always sanitize and validate user input before passing it to libraries.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-path-traversal-flaw-reported-in-jspdf-library-a-5-v-c-c/gD2P6Ple2L
updated 2026-01-06T14:35:26.893000
1 posts
Apache NuttX RTOS memory flaw exposes IoT devices to remote crashes
Apache NuttX RTOS contains a critical Use After Free vulnerability (CVE-2025-48769) that allows remote attackers to crash embedded devices or manipulate files via network services like FTP.
**If you are using devices with NuttX, make sure all devices are isolated from the internet and accessible from trusted networks only. Update any hardware running Apache NuttX to version 12.11.0, especially if the device uses network file services with write permissions. In the meantime, disable file upload/sharing where possible.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/apache-nuttx-rtos-memory-flaw-exposes-iot-devices-to-remote-crashes-k-g-o-s-6/gD2P6Ple2L
updated 2026-01-05T21:31:38
1 posts
updated 2026-01-05T21:31:37
2 posts
Ubiquiti patches security flaws in UniFi Protect camera software
Ubiquiti patched two vulnerabilities in the UniFi Protect Application, including CVE-2026-21633 which allows attackers on the local network to access camera feeds without authorization.
**If you are using UniFi Protect Application, plan a quick update. And as usual, make sure all cameras and camera controllers are isolated from the internet and accessible from trusted networks only. Use VLANs to separate your security cameras from guest or general-purpose networks.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/ubiquiti-patches-security-flaws-in-unifi-protect-camera-software-s-f-f-b-f/gD2P6Ple2L
Go hack more Ubiquiti shit.
##updated 2026-01-05T19:06:07
2 posts
Critical sandbox bypass reported in n8n automation platform
n8n patched a critical sandbox bypass vulnerability (CVE-2025-68668) that allows authenticated users to run arbitrary system commands on the host server.
**If you are using n8n, make sure it's isolated from the internet and accessible from trusted users only. Then patch n8n to version 2.0.0 ASAP. Until you can patch, either disable the Python or the entire Code Node.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-sandbox-bypass-reported-in-n8n-automation-platform-v-9-8-b-2/gD2P6Ple2L
Critical n8n vulnerability (CVE-2025-68668, CVSS 9.9) enables authenticated arbitrary command execution via the Code Node.
Patch released: mitigations include disabling the node or using the task-runner Python sandbox.
Are automation platforms getting enough security scrutiny?
##updated 2026-01-05T18:30:29
4 posts
This seems perfect fodder for a plot device.
> https://www.cve.org/CVERecord?id=CVE-2025-14346
(Edit: original post is gone, but this is the CVE mentioned in it.)
##🔴 CVE-2025-14346 - Critical (9.8)
WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within range can pair with the device and issue movement commands, override speed restrictions, and manipulate config...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14346/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##"WHILL Model C2 Electric Wheelchairs and Model F Power Chairs do not enforce authentication for Bluetooth connections. An attacker within range can pair with the device and issue movement commands, override speed restrictions, and manipulate configuration profiles without any credentials or user interaction."
No comments...
##WHILL electric wheelchairs vulnerable to remote bluetooth hijacking
WHILL Inc. reported a critical vulnerability (CVE-2025-14346) in its electric wheelchairs that allows attackers within Bluetooth range to take control of the device. The flaw enables unauthorized movement and configuration changes because the system does not require authentication for pairing.
**If you are using WHILL wheelchairs, they may be vulnerable to hijacking. Review the advisory and contact WHILL Inc. to confirm your wheelchair has the December 29, 2025 firmware update installed.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/whill-electric-wheelchairs-vulnerable-to-remote-bluetooth-hijacking-f-4-r-9-y/gD2P6Ple2L
updated 2026-01-05T12:31:32
1 posts
I don't remember if I posted the Centreon stuff yesterday but it's still open in a tab so here you are anyway.
##updated 2026-01-05T12:31:32
1 posts
I don't remember if I posted the Centreon stuff yesterday but it's still open in a tab so here you are anyway.
##updated 2026-01-05T10:15:58.160000
1 posts
I don't remember if I posted the Centreon stuff yesterday but it's still open in a tab so here you are anyway.
##updated 2026-01-02T21:28:56.470000
1 posts
updated 2026-01-02T18:31:27
1 posts
updated 2026-01-02T16:29:42
1 posts
Critical privilege escalation flaw in Apache StreamPipes allows admin takeover
Apache StreamPipes fixed a critical privilege escalation vulnerability (CVE-2025-47411) that allows non-admin users to hijack administrator accounts through JWT manipulation. Attackers can exploit this flaw to gain full system control, tamper with data, and compromise streaming infrastructure.
**If you are using Apache StreamPipes, this is important. First, make sure it's isolated from the internet and accessible from trusted networks and users only. Then plan a very quick update, because the exploit is just changing a value in the JWT token.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-privilege-escalation-flaw-in-apache-streampipes-allows-admin-takeover-9-x-s-k-i/gD2P6Ple2L
updated 2025-12-31T21:31:05
1 posts
Random older vulns with newly published CVEs. But at least there are links to ExploitDB in there.
https://nvd.nist.gov/vuln/detail/CVE-2021-47741
https://nvd.nist.gov/vuln/detail/CVE-2021-47726
https://nvd.nist.gov/vuln/detail/CVE-2019-25251
##updated 2025-12-31T21:31:05
1 posts
Random older vulns with newly published CVEs. But at least there are links to ExploitDB in there.
https://nvd.nist.gov/vuln/detail/CVE-2021-47741
https://nvd.nist.gov/vuln/detail/CVE-2021-47726
https://nvd.nist.gov/vuln/detail/CVE-2019-25251
##updated 2025-12-30T21:30:32
1 posts
updated 2025-12-30T18:30:21
1 posts
🔴 CVE-2025-15255 - Critical (9.8)
A vulnerability was determined in Tenda W6-S 1.0.0.4(510). This impacts an unknown function of the file /bin/httpd of the component R7websSsecurityHandler. Executing manipulation of the argument Cookie can lead to stack-based buffer overflow. The ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15255/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##updated 2025-12-30T06:30:25
1 posts
updated 2025-12-30T03:30:17
1 posts
updated 2025-12-30T00:32:58
22 posts
28 repos
https://github.com/14mb1v45h/CYBERDUDEBIVASH-MONGODB-DETECTOR-v2026
https://github.com/demetriusford/mongobleed
https://github.com/cybertechajju/CVE-2025-14847_Expolit
https://github.com/vfa-tuannt/CVE-2025-14847
https://github.com/joshuavanderpoll/CVE-2025-14847
https://github.com/NoNameError/MongoBLEED---CVE-2025-14847-POC-
https://github.com/FurkanKAYAPINAR/CVE-2025-14847-MongoBleed-Exploit
https://github.com/Security-Phoenix-demo/mongobleed-exploit-CVE-2025-14847
https://github.com/Ashwesker/Ashwesker-CVE-2025-14847
https://github.com/Rishi-kaul/CVE-2025-14847-MongoBleed
https://github.com/nma-io/mongobleed
https://github.com/chinaxploiter/CVE-2025-14847-PoC
https://github.com/Systemhaus-Schulz/MongoBleed-CVE-2025-14847
https://github.com/KingHacker353/CVE-2025-14847_Expolit
https://github.com/j0lt-github/mongobleedburp
https://github.com/onewinner/CVE-2025-14847
https://github.com/lincemorado97/CVE-2025-14847
https://github.com/CadGoose/MongoBleed-CVE-2025-14847-Fully-Automated-scanner
https://github.com/ProbiusOfficial/CVE-2025-14847
https://github.com/tunahantekeoglu/MongoDeepDive
https://github.com/ElJoamy/MongoBleed-exploit
https://github.com/JemHadar/MongoBleed-DFIR-Triage-Script-CVE-2025-14847
https://github.com/franksec42/mongobleed-exploit-CVE-2025-14847
https://github.com/keraattin/Mongobleed-Detector-CVE-2025-14847
https://github.com/waheeb71/CVE-2025-14847
https://github.com/Black1hp/mongobleed-scanner
CVE-2025-14847 (MongoBleed): MongoDB mismatched length fields in Zlib compressed protocol headers may allow a read of uninitialized heap memory by an unauthenticated client
PoC: https://github.com/joe-desimone/mongobleed
Credit: youtube.com/@S0n1c-AFK
##Technical Analysis - MongoBleed (CVE-2025-14847): Memory Corruption in MongoDB https://phoenix.security/mongobleed-vulnerability-cve-2025-14847/
##⚪ New MongoDB Zero‑Day Vulnerability Actively Exploited in Attacks
🗨️ The RCE vulnerability CVE-2025-14847 fixed last week, also dubbed MongoBleed, is already being exploited by hackers. Security experts warn that more than 87,000 vulnerable servers are still accessible on the internet.
##🫤 We know the *last* thing you want to deal with on Dec 31st is a new vulnerability. But #MongoBleed (CVE-2025-14847) isn't waiting for the ball to drop.
Our team already updated the Pentest-Tools.com Network Scanner to detect this information disclosure flaw that's currently letting unauthenticated attackers leak MongoDB server info.
Whether you’re on-call or just checking in, we’ve made it fast to see if your servers are at risk. 🎯 Scan your IPs for CVE-2025-14847, patch it fast, and have a safe New Year.
Deets and detection here: 👉 https://pentest-tools.com/vulnerabilities-exploits/mongodb-server-information-disclosure-mongobleed_28455
##Massive Data Exposure as Attackers Exploit MongoBleed Vulnerability
Attackers are actively exploiting CVE-2025-14847 vulnerability in MongoDB dubbed MongoBleed to steal credentials. Over 75,000 internet-exposed databases are reported in security scans.
**Make sure all database servers are isolated from the internet and accessible from trusted networks only. Then patch ASAP! If you can't update your MongoDB instance immediately, disable zlib compression.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/massive-data-exposure-as-attackers-exploit-mongobleed-vulnerability-c-f-s-5-u/gD2P6Ple2L
updated 2025-12-29T15:58:13.147000
1 posts
Random older vulns with newly published CVEs. But at least there are links to ExploitDB in there.
https://nvd.nist.gov/vuln/detail/CVE-2021-47741
https://nvd.nist.gov/vuln/detail/CVE-2021-47726
https://nvd.nist.gov/vuln/detail/CVE-2019-25251
##updated 2025-12-29T15:58:13.147000
1 posts
updated 2025-12-26T15:30:23
3 posts
New.
Cyble: Singapore Cyber Agency Warns of Critical IBM API Connect Vulnerability (CVE-2025-13915) https://cyble.com/blog/cve-2025-13915-ibm-api-connect-vulnerability/ #infosec #vulnerability #IBM
##Singapore Cyber Agency Warns of Critical IBM API Connect Vulnerability (CVE-2025-13915)
Singapore warns of critical CVE-2025-13915 in IBM API Connect. Authentication bypass flaw scored 9.8 CVSS. Patches and mitigations released.
🔗️ [Cyble] https://link.is.it/WZmUnX
##IBM patches critical authentication bypass flaw in API Connect
IBM released urgent fixes for a critical authentication bypass vulnerability (CVE-2025-13915) in API Connect that allows remote attackers to gain full system access without credentials.
**If you are using API Connect, this is an urgent and important patch. Patch the system ASAP. Until you can patch, disable the self-service sign-up feature to block attackers from skipping the login. If possible, isolate the API Connect service from the public internet and make it accessible via trusted networks.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/ibm-patches-critical-authentication-bypass-in-api-connect-f-h-k-3-f/gD2P6Ple2L
updated 2025-12-24T21:30:40
1 posts
Old Beward vulns with recently published CVEs
https://nvd.nist.gov/vuln/detail/CVE-2019-25246
https://nvd.nist.gov/vuln/detail/CVE-2019-25247
##updated 2025-12-24T21:30:35
1 posts
Random older vulns with newly published CVEs. But at least there are links to ExploitDB in there.
https://nvd.nist.gov/vuln/detail/CVE-2021-47741
https://nvd.nist.gov/vuln/detail/CVE-2021-47726
https://nvd.nist.gov/vuln/detail/CVE-2019-25251
##updated 2025-12-24T21:30:35
1 posts
updated 2025-12-24T21:30:35
1 posts
updated 2025-12-24T21:30:34
1 posts
Old Beward vulns with recently published CVEs
https://nvd.nist.gov/vuln/detail/CVE-2019-25246
https://nvd.nist.gov/vuln/detail/CVE-2019-25247
##updated 2025-12-24T21:30:34
1 posts
Old Beward vulns with recently published CVEs
https://nvd.nist.gov/vuln/detail/CVE-2019-25246
https://nvd.nist.gov/vuln/detail/CVE-2019-25247
##updated 2025-12-24T21:30:34
1 posts
updated 2025-12-23T17:10:50.713000
1 posts
../ in Shiguangwu sgwbox NAS
##updated 2025-12-22T16:19:13
3 posts
28 repos
https://github.com/AbdulRKB/n8n-RCE
https://github.com/rxerium/CVE-2025-68613
https://github.com/Dlanang/homelab-CVE-2025-68613
https://github.com/J4ck3LSyN-Gen2/n8n-CVE-2025-68613-TryHackMe
https://github.com/intbjw/CVE-2025-68613-poc-via-copilot
https://github.com/secjoker/CVE-2025-68613
https://github.com/Ashwesker/Ashwesker-CVE-2025-68613
https://github.com/hackersatyamrastogi/n8n-exploit-CVE-2025-68613-n8n-God-Mode-Ultimate
https://github.com/mbanyamer/n8n-Authenticated-Expression-Injection-RCE-CVE-2025-68613
https://github.com/cv-sai-kamesh/n8n-CVE-2025-68613
https://github.com/r4j3sh-com/CVE-2025-68613-n8n-lab
https://github.com/shibaaa204/CVE-2025-68613
https://github.com/TheInterception/n8n_CVE-2025-68613_exploit_payloads
https://github.com/gagaltotal/n8n-cve-2025-68613
https://github.com/JohannesLks/CVE-2025-68613-Python-Exploit
https://github.com/manyaigdtuw/CVE-2025-68613_Scanner
https://github.com/ali-py3/Exploit-CVE-2025-68613
https://github.com/TheStingR/CVE-2025-68613-POC
https://github.com/reem-012/poc_CVE-2025-68613
https://github.com/GnuTLam/POC-CVE-2025-68613
https://github.com/wioui/n8n-CVE-2025-68613-exploit
https://github.com/Ak-cybe/CVE-2025-68613-n8n-rce-analysis
https://github.com/releaseown/analysis-and-poc-n8n-CVE-2025-68613
https://github.com/intelligent-ears/CVE-2025-68613
https://github.com/ahmedshamsddin/n8n-RCE-CVE-2025-68613
https://github.com/Khin-96/n8n-cve-2025-68613-thm
Another video showing how incredibly easy the n8n RCE vulnerability (CVE-2025-68613) is.
Credit: http://youtube.com/@0xmrsecurity
##Une faille critique affecte n8n – CVE-2025-68613 : comment se protéger ? https://www.it-connect.fr/n8n-cve-2025-68613-faille-securite-critique/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #n8n
##CVE-2025-68613: n8n RCE Vulnerability
Exploit/PoC: https://github.com/wioui/n8n-CVE-2025-68613-exploit
n8n has a critical security flaw that lets authenticated users execute arbitrary code through its workflow expression system. When users configure workflows, the expressions they provide can sometimes be evaluated without proper isolation from the underlying runtime environment.
Credit: NexxelSecurity
##updated 2025-12-22T15:30:20
1 posts
updated 2025-12-19T18:31:07
1 posts
updated 2025-12-18T15:15:47.940000
1 posts
1 repos
@hanno this question came up in the SSH world, relating to terminal SCP clients: https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
An SCP client had some missing validation checks in download mode, allowing a malicious server to modify parts of the client's filesystem other than the ones the user authorised it to. As a side effect, the client printed diagnostics which would have given the game away – but the client was also happy to print unsanitised escape sequences sent by the SSH server, which allowed the malicious server to send a well chosen combination of 'move up, clear line of text' escapes to wipe those telltale diagnostics off the screen and allow the attack to go undetected.
In that context, the failure to sanitise escape sequences was assigned a CVE number. (In fact, two: CVE-2019-6109 and CVE-2019-6110.) But that was only because in that particular context it allowed the attacker to hide evidence of a more serious crime.
PuTTY's SCP client was not vulnerable to the 'missing validation check' issue, and didn't allow the server to make unauthorised modifications. It _did_ have the 'failure to sanitise escape sequences' issue, but we didn't regard this as a vulnerability when it _wasn't_ allowing the covering-up of a real attack, and the original researcher agreed.
(We did regard it as a _bug_, and we fixed it. But not, by itself, a vulnerability.)
##updated 2025-12-09T16:53:25
2 posts
100 repos
https://github.com/surajhacx/react2shellpoc
https://github.com/sumanrox/rschunter
https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/yz9yt/React2Shell-CTF
https://github.com/zr0n/react2shell
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/sickwell/CVE-2025-55182
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/gensecaihq/react2shell-scanner
https://github.com/TrixSec/CVE-2025-55182-Scanner
https://github.com/XiaomingX/CVE-2025-55182-poc
https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/f0xyx/CVE-2025-55182-Scanner
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/BlackTechX011/React2Shell
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/xalgord/React2Shell
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/kavienanj/CVE-2025-55182
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/shyambhanushali/React2Shell
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/fullhunt/react2shell-test-server
https://github.com/ynsmroztas/NextRce
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/Updatelap/CVE-2025-55182
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/vrx7men2/RSC-Detect-CVE-2025-55182
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/freeqaz/react2shell
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/mrknow001/RSC_Detector
https://github.com/theori-io/reactguard
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/kondukto-io/vulnerable-next-js-poc
https://github.com/hualy13/CVE-2025-55182
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/zzhorc/CVE-2025-55182
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/hoosin/CVE-2025-55182
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/Saturate/CVE-2025-55182-Scanner
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/assetnote/react2shell-scanner
https://github.com/rix4uni/CVE-2025-55182
https://github.com/SainiONHacks/CVE-2025-55182-Scanner
https://github.com/theman001/CVE-2025-55182
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/nehkark/CVE-2025-55182
https://github.com/momika233/CVE-2025-55182-bypass
https://github.com/msanft/CVE-2025-55182
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/emredavut/CVE-2025-55182
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/sho-luv/React2Shell
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/shamo0/react2shell-PoC
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/alsaut1/react2shell-lab
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/onlylovetx/CVE-2025-55182-CVE-2025-66478-Exploit-GUI
📰 React2Shell Vulnerability Exploited to Build Massive IoT Botnet
The React2Shell vulnerability, identified as CVE-2025-55182, poses a critical risk by allowing attackers to exploit IoT devices and web servers with a single malicious HTTP request, leveraging flaws in how React Server Components handle data. In...
🔗 https://hackers-arise.com/react2shell-vulnerability-exploited-to-build-massive-iot-botnet/
##RondoDox botnet exploits React2Shell flaw to breach Next.js servers
The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js servers with malware...
🔗️ [Bleepingcomputer] https://link.is.it/MFqNDQ
##updated 2025-12-05T00:31:05
1 posts
1 repos
https://github.com/lutrasecurity/CVE-2025-1910-WatchGuard-Privilege-Escalation
After coming across an outdated version of WatchGuard's Mobile VPN with SSL last year and being unable to quickly find a public proof of concept for CVE-2025-1910, we took a closer look and created one ourselves: https://lutrasecurity.com/en/articles/cve-2025-1910-watchguard-privilege-escalation/
Thanks to @tomtom of #AKASEC for finding the vulnerability and providing a great write-up!
##updated 2025-11-26T15:35:16
1 posts
8 repos
https://github.com/ticofookfook/CVE-2025-43300
https://github.com/JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201
https://github.com/PwnToday/CVE-2025-43300
https://github.com/7amzahard/CVE-2025-43300
https://github.com/veniversum/cve-2025-43300
https://github.com/Dark-life944/CVE-2025
⚪ Apple urgently patches a zero-day vulnerability
🗨️ Apple has released out-of-band patches to fix a zero-day vulnerability. The new issue has reportedly already been exploited as part of an “extremely sophisticated attack.”
##updated 2025-11-26T15:34:20
1 posts
updated 2025-11-25T03:30:26
1 posts
3 repos
https://github.com/thorat-shubham/JXL_Infotainment_CVE-2025-63895
🚨 CVE-2025-6389: WordPress Sneeit Framework plugin vulnerability currently under active exploitation
PoC: https://github.com/Ashwesker/Ashwesker-CVE-2025-6389
▪️Vulnerability Type: Remote Code Execution (RCE)
▪️CVSS: 9.8
▪️Published: 11/24/2025
Impact:
▪️Full site compromise
▪️Create admin accounts
▪️Install backdoors/malicious files
▪️Redirect visitors or inject malware
Credit: youtube.com/@Nxploited
##updated 2025-11-17T21:44:47
1 posts
updated 2025-11-05T19:26:31.650000
1 posts
10 repos
https://github.com/0xcan1337/CVE-2025-47812-poC
https://github.com/r0otk3r/CVE-2025-47812
https://github.com/blindma1den/CVE-2025-47812
https://github.com/0xgh057r3c0n/CVE-2025-47812
https://github.com/pevinkumar10/CVE-2025-47812
https://github.com/CTY-Research-1/CVE-2025-47812_Lab_environment
https://github.com/Ashwesker/Ashwesker-CVE-2025-47812
https://github.com/rxerium/CVE-2025-47812
Stubborn AI honeypots give me grey hair.
Attacker sends payload:
"username=anonymous%00]]%0dlocal+h+%3d+io.popen("this is vulnerable to CVE-2025-47812")%0dlocal+r+%3d+h%3aread("*a")%0dh%3aclose()%0dprint(r)%0d--&password=
"
And the AI responsible for handling the response sends the following back to the attacker:
"This system is not affected by CVE-2025-47812.
"
*sigh*
##updated 2025-10-31T22:04:34.230000
1 posts
15 repos
https://github.com/acan0007/CVE-2025-31161
https://github.com/f4dee-backup/CVE-2025-31161
https://github.com/TX-One/CVE-2025-31161
https://github.com/Immersive-Labs-Sec/CVE-2025-31161
https://github.com/ghostsec420/ShatteredFTP
https://github.com/cesarbtakeda/CVE-2025-31161
https://github.com/r0otk3r/CVE-2025-31161
https://github.com/Teexo/CVE-2025-31161
https://github.com/SUPRAAA-1337/CVE-2025-31161_exploit
https://github.com/0xgh057r3c0n/CVE-2025-31161
https://github.com/ibrahmsql/CVE-2025-31161
https://github.com/ch3m1cl/CVE-2025-31161
https://github.com/0xDTC/CrushFTP-auth-bypass-CVE-2025-31161
https://github.com/Ashwesker/Ashwesker-CVE-2025-31161
https://github.com/SUPRAAA-1337/Nuclei_CVE-2025-31161_CVE-2025-2825
updated 2025-10-27T17:40:33.680000
1 posts
100 repos
https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce
https://github.com/cyberxml/log4j-poc
https://github.com/puzzlepeaches/Log4jUnifi
https://github.com/faisalfs10x/Log4j2-CVE-2021-44228-revshell
https://github.com/DragonSurvivalEU/RCE
https://github.com/fullhunt/log4j-scan
https://github.com/justakazh/Log4j-CVE-2021-44228
https://github.com/1lann/log4shelldetect
https://github.com/Nanitor/log4fix
https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector
https://github.com/wortell/log4j
https://github.com/puzzlepeaches/Log4jCenter
https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words
https://github.com/mr-vill4in/log4j-fuzzer
https://github.com/darkarnium/Log4j-CVE-Detect
https://github.com/nccgroup/log4j-jndi-be-gone
https://github.com/bigsizeme/Log4j-check
https://github.com/kubearmor/log4j-CVE-2021-44228
https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes
https://github.com/MalwareTech/Log4jTools
https://github.com/lfama/log4j_checker
https://github.com/logpresso/CVE-2021-44228-Scanner
https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch
https://github.com/infiniroot/nginx-mitigate-log4shell
https://github.com/twseptian/spring-boot-log4j-cve-2021-44228-docker-lab
https://github.com/momos1337/Log4j-RCE
https://github.com/sec13b/CVE-2021-44228-POC
https://github.com/Malwar3Ninja/Exploitation-of-Log4j2-CVE-2021-44228
https://github.com/christophetd/log4shell-vulnerable-app
https://github.com/hackinghippo/log4shell_ioc_ips
https://github.com/claranet/ansible-role-log4shell
https://github.com/future-client/CVE-2021-44228
https://github.com/Kadantte/CVE-2021-44228-poc
https://github.com/CERTCC/CVE-2021-44228_scanner
https://github.com/thecyberneh/Log4j-RCE-Exploiter
https://github.com/CrackerCat/CVE-2021-44228-Log4j-Payloads
https://github.com/cisagov/log4j-scanner
https://github.com/back2root/log4shell-rex
https://github.com/puzzlepeaches/Log4jHorizon
https://github.com/boundaryx/cloudrasp-log4j2
https://github.com/alexbakker/log4shell-tools
https://github.com/shamo0/CVE-2021-44228
https://github.com/julian911015/Log4j-Scanner-Exploit
https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit
https://github.com/HynekPetrak/log4shell-finder
https://github.com/leonjza/log4jpwn
https://github.com/greymd/CVE-2021-44228
https://github.com/ssl/scan4log4j
https://github.com/qingtengyun/cve-2021-44228-qingteng-patch
https://github.com/LiveOverflow/log4shell
https://github.com/NCSC-NL/log4shell
https://github.com/mufeedvh/log4jail
https://github.com/irgoncalves/f5-waf-quick-patch-cve-2021-44228
https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent
https://github.com/fox-it/log4j-finder
https://github.com/blake-fm/vcenter-log4j
https://github.com/f0ng/log4j2burpscanner
https://github.com/mergebase/log4j-detector
https://github.com/takito1812/log4j-detect
https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator
https://github.com/NorthwaveSecurity/log4jcheck
https://github.com/pedrohavay/exploit-CVE-2021-44228
https://github.com/sunnyvale-it/CVE-2021-44228-PoC
https://github.com/0xDexter0us/Log4J-Scanner
https://github.com/rubo77/log4j_checker_beta
https://github.com/tippexs/nginx-njs-waf-cve2021-44228
https://github.com/kozmer/log4j-shell-poc
https://github.com/Jeromeyoung/log4j2burpscanner
https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes
https://github.com/alexandre-lavoie/python-log4rce
https://github.com/redhuntlabs/Log4JHunt
https://github.com/Diverto/nse-log4shell
https://github.com/sassoftware/loguccino
https://github.com/simonis/Log4jPatch
https://github.com/korteke/log4shell-demo
https://github.com/marcourbano/CVE-2021-44228
https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228
https://github.com/dwisiswant0/look4jar
https://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228
https://github.com/roxas-tan/CVE-2021-44228
https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept
https://github.com/mzlogin/CVE-2021-44228-Demo
https://github.com/giterlizzi/nmap-log4shell
https://github.com/fireeye/CVE-2021-44228
https://github.com/lucab85/log4j-cve-2021-44228
https://github.com/mr-r3b00t/CVE-2021-44228
https://github.com/corelight/cve-2021-44228
https://github.com/BinaryDefense/log4j-honeypot-flask
https://github.com/corretto/hotpatch-for-apache-log4j2
https://github.com/toramanemre/log4j-rce-detect-waf-bypass
https://github.com/thomaspatzke/Log4Pot
https://github.com/AlexandreHeroux/Fix-CVE-2021-44228
https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs
https://github.com/jas502n/Log4j2-CVE-2021-44228
https://github.com/NS-Sp4ce/Vm4J
https://github.com/KosmX/CVE-2021-44228-example
https://github.com/0xInfection/LogMePwn
https://github.com/stripe/log4j-remediation-tools
Cloudflare has even bragged on their blog¹ about how they run data analytics on all of the web requests going through their system. This data may be collected for government surveillance purposes as well.
##updated 2025-10-22T00:32:58
1 posts
Over 10K Fortinet firewalls remain exposed to a five-year-old 2FA bypass (CVE-2020-12812), letting attackers skip authentication with simple username changes. 🛡️
Admins are urged to patch or adjust settings as active exploitation continues. ⚠️
#TechNews #CyberSecurity #DataBreach #Infosec #Vulnerability #ZeroDay #NetworkSecurity #ThreatIntel #Ransomware #Privacy #Security #Firewall #CISA #Fortinet #ExposedSystems #Network #Infrastructure #CVE #2FA #MFA #Hacking
##updated 2025-10-14T15:31:20
2 posts
1 repos
CISA ICS advisory: Hitachi Energy Asset Suite vulnerability CVE-2025-10492 https://www.cisa.gov/news-events/ics-advisories/icsa-26-008-01 #CISA #infosec #Java #JavaScript
##CISA ICS advisory: Hitachi Energy Asset Suite vulnerability CVE-2025-10492 https://www.cisa.gov/news-events/ics-advisories/icsa-26-008-01 #CISA #infosec #Java #JavaScript
##updated 2025-09-29T18:33:13
1 posts
updated 2025-07-14T17:38:41.223000
5 posts
1 repos
updated 2025-06-03T21:30:37
1 posts
6 repos
https://github.com/ticofookfook/CVE-2025-43300
https://github.com/PwnToday/CVE-2025-43300
https://github.com/veniversum/cve-2025-43300
https://github.com/hunters-sec/CVE-2025-43300
⚪ Apple urgently patches a zero-day vulnerability
🗨️ Apple has released out-of-band patches to fix a zero-day vulnerability. The new issue has reportedly already been exploited as part of an “extremely sophisticated attack.”
##updated 2025-05-19T21:54:44
1 posts
New.
Codean Labs: CVE-2025-47934 – Spoofing OpenPGP.js signature verification https://codeanlabs.com/2025/06/cve-2025-47934-spoofing-openpgp-js-signatures/ @Codean #threatresearch #infosec #vulnerability #JavaScript
##updated 2025-02-24T22:02:54
1 posts
2 repos
🚨CVE-2025-26529: Moodle XSS to RCE Exploit
Description information displayed in the site administration live log required additional sanitizing to prevent a stored XSS risk.
Credit: QXN0cm8
YouTube: https://www.youtube.com/@A5troRo0t
updated 2024-11-21T09:14:20.453000
1 posts
12 repos
https://github.com/juanbelin/CVE-2024-32019-POC
https://github.com/julichaan/CVE-2024-32019-ndsudo-local-privilege-escalation-NetData
https://github.com/AzureADTrent/CVE-2024-32019-POC
https://github.com/C0deInBlack/CVE-2024-32019-poc
https://github.com/AliElKhatteb/CVE-2024-32019-POC
https://github.com/x0da6h/POC-for-CVE-2024-32019
https://github.com/hexared/CVE-2024-32019_poc
https://github.com/80Ottanta80/CVE-2024-32019-PoC
https://github.com/sPhyos/cve-2024-32019-PoC
https://github.com/justjoeyking/CVE-2024-32019-ndsudo
https://github.com/T1erno/CVE-2024-32019-Netdata-ndsudo-Privilege-Escalation-PoC
updated 2024-08-16T20:54:12.043000
1 posts
29 repos
https://github.com/ThemeHackers/CVE-2024-38063
https://github.com/PumpkinBridge/Windows-CVE-2024-38063
https://github.com/ps-interactive/cve-2024-38063
https://github.com/Dragkob/CVE-2024-38063
https://github.com/jip-0-0-0-0-0/CVE-2024-38063-scanner
https://github.com/haroonawanofficial/AI-CVE-2024-38063-0-DAY
https://github.com/fredagsguf/Windows-CVE-2024-38063
https://github.com/becrevex/CVE-2024-38063
https://github.com/Skac44/CVE-2024-38063
https://github.com/thanawee321/CVE-2024-38063
https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix
https://github.com/patchpoint/CVE-2024-38063
https://github.com/Sachinart/CVE-2024-38063-poc
https://github.com/brownpanda29/Cve-2024-38063
https://github.com/zenzue/CVE-2024-38063-POC
https://github.com/KernelKraze/CVE-2024-38063_PoC
https://github.com/idkwastaken/CVE-2024-38063
https://github.com/ArenaldyP/CVE-2024-38063-Medium
https://github.com/akozsentre/CVE-2024-38063
https://github.com/Faizan-Khanx/CVE-2024-38063
https://github.com/p33d/cve-2024-38063
https://github.com/Th3Tr1ckst3r/CVE-2024-38063
https://github.com/dweger-scripts/CVE-2024-38063-Remediation
https://github.com/AdminPentester/CVE-2024-38063-
https://github.com/ynwarcs/CVE-2024-38063
https://github.com/diegoalbuquerque/CVE-2024-38063
https://github.com/Th3Tr1ckst3r/Exip6
https://github.com/AliHj98/cve-2024-38063-Anonyvader
https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063
Let's also not forget this golden moment: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063
##updated 2024-03-15T18:30:45
1 posts
1 repos
@0xabad1dea @mkj @emaksovalec okay _actually_ the last one now, re: that footnote
Logitech has also messed up their code signing security several times so that even such a screw-up would actually not crash their app on macOS in particular, which is bad in its own right: https://nvd.nist.gov/vuln/detail/CVE-2024-2537
tl;dr: avoid logitech's drivers if you can, they are routinely stepping on security & reliability rakes completely unprompted
##updated 2023-01-29T05:03:50
1 posts
@hanno this question came up in the SSH world, relating to terminal SCP clients: https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt
An SCP client had some missing validation checks in download mode, allowing a malicious server to modify parts of the client's filesystem other than the ones the user authorised it to. As a side effect, the client printed diagnostics which would have given the game away – but the client was also happy to print unsanitised escape sequences sent by the SSH server, which allowed the malicious server to send a well chosen combination of 'move up, clear line of text' escapes to wipe those telltale diagnostics off the screen and allow the attack to go undetected.
In that context, the failure to sanitise escape sequences was assigned a CVE number. (In fact, two: CVE-2019-6109 and CVE-2019-6110.) But that was only because in that particular context it allowed the attacker to hide evidence of a more serious crime.
PuTTY's SCP client was not vulnerable to the 'missing validation check' issue, and didn't allow the server to make unauthorised modifications. It _did_ have the 'failure to sanitise escape sequences' issue, but we didn't regard this as a vulnerability when it _wasn't_ allowing the covering-up of a real attack, and the original researcher agreed.
(We did regard it as a _bug_, and we fixed it. But not, by itself, a vulnerability.)
##CVE-2026-21876: OWASP Modsecurity CRS WAF bypass blogpost is out! https://coreruleset.org/20260106/cve-2026-21876-critical-multipart-charset-bypass-fixed-in-crs-4.22.0-and-3.3.8/
##Critical (9.3 CVSS) OWASP ModSecurity CRS WAF bypass advisory and walkthrough is out! https://coreruleset.org/20260106/cve-2026-21876-critical-multipart-charset-bypass-fixed-in-crs-4.22.0-and-3.3.8/
##CVE-2026-21876: OWASP Modsecurity CRS WAF bypass blogpost is out! https://coreruleset.org/20260106/cve-2026-21876-critical-multipart-charset-bypass-fixed-in-crs-4.22.0-and-3.3.8/
##Critical (9.3 CVSS) OWASP ModSecurity CRS WAF bypass advisory and walkthrough is out! https://coreruleset.org/20260106/cve-2026-21876-critical-multipart-charset-bypass-fixed-in-crs-4.22.0-and-3.3.8/
##Docker WAF doesn't filter on username, apparently. Seems weird. The CVE isn't published yet but they are claiming a number for it in the repo. Either way, if you have Docker WAF logs, maybe look for interesting payloads in the username parameter. Or don't.
TLP: Polkit Authentication Bypass in Profiles Daemon in Version 1.9.0 (CVE-2025-67859)
https://security.opensuse.org/2026/01/07/tlp-polkit-authentication-bypass.html
##That's a weird thing to do intentionally.
##An unused function in MicroServer can start a reverse SSH connection to a vendor registered domain, without mutual authentication. An attacker on the local network with admin access to the web server, and the ability to manipulate DNS responses, can redirect the SSH connection to an attacker controlled device.
1 posts
2 repos
CVE-2025-14558 is a 9.8-severity vulnerability in FreeBSD's IPv6 auto-configuration that lets attackers execute arbitrary code with a single crafted network packet. FreeBSD released patches on December 16, 2024, but the threat escalated when multiple proof-of-concept exploits hit GitHub about two weeks ago.
Read More: https://www.security.land/freebsd-ipv6-flaw-enables-remote-code-execution-attacks/
#SecurityLand #CyberWatch #FreeBSD #Cybersecurity #VulnerabilityManagement #IPv6 #CVE
##Unpatched root backdoor found in EoL TOTOLINK EX200 extenders
CERT/CC warned of an unpatched vulnerability (CVE-2025-65606) in the end-of-life TOTOLINK EX200 range extender that allows authenticated attackers to open a root-level telnet backdoor. Because the device is no longer supported, no official fix is available.
**If you are using TOTOLINK EX200, be aware that it can be exploited trivially by anyone with minimal access. Ideally, replace it with another device. If that's not possible, limit the number of authenticated users on the web management, with strong passwords and never expose the management interface to the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/unpatched-root-backdoor-found-in-eol-totolink-ex200-extenders-7-e-d-z-s/gD2P6Ple2L
TOTOLINK
https://www.cve.org/CVERecord?id=CVE-2025-65606 ( not yet published )
##⚪ Critical RCE vulnerability has been discovered in Net-SNMP
🗨️ A critical remote code execution vulnerability (CVE-2025-68615) has been identified in the open-source networking package Net-SNMP, which implements SNMP protocols versions 1, 2c, and 3. This flaw allows attackers to execute arbitrary code remotely on any server where the snmptrapd service is used t…
##🔴 CVE-2025-59157 - Critical (9.9)
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.420.7, the Git Repository field during project creation is vulnerable to command injection. User input is not properly ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-59157/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda
##Critical GNU Wget2 flaw allows attackers to overwrite sensitive files
GNU Wget2 contains a path traversal vulnerability (CVE-2025-69194) that allows remote attackers to overwrite arbitrary system files via malicious Metalink documents.
**Update GNU Wget2 to the latest version to fix the path traversal flaw. Until you patch, do not process Metalink files from untrusted sources and run the tool in a restricted sandbox.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-gnu-wget2-flaw-allows-attackers-to-overwrite-sensitive-files-h-6-z-w-8/gD2P6Ple2L